|
|
3. Determining the content of corporate reporting on human rightsAna Čertanec, 2021, original scientific article Keywords: corporations, management and control, human rights, business reports, non-financial corporate reporting, reporting requirements, UN guiding principles reporting framework, GRI standards Full text (file, 285,39 KB) This document has more files! More... |
4. Biological parameters, phenology and temperature requirements of Halyomorpha halys (Hemiptera: Pentatomidae) in the Sub-Mediterranean climate of Western SloveniaMojca Rot, Lara Maistrello, Elena Costi, Stanislav Trdan, 2022, original scientific article Keywords: Halyomorpha halys, brown marmorated stink bug, plant pests, phenology, temperature requirements, voltinism, life table, Slovenia Full text (file, 744,89 KB) This document has more files! More... |
5. Storyboards as an engineering tool for extraction of functional requirementsVanja Čok, Daria Vlah, Nikola Vukašinović, 2022, published scientific conference contribution Keywords: new product development, user-centred design, storyboards, design education, functional requirements Full text (file, 1008,21 KB) This document has more files! More... |
6. Douglas-fir (Pseudotsuga menziesii (Mirb.) Franco) in EuropeValeriu-Norocel Nicolescu, William L. Mason, Jean-Charles Bastien, Torsten Vor, Krasimira Petkova, Vilém Podrázský, Martina Đodan, Sanja Perić, Nicola La Porta, Robert Brus, 2023, original scientific article Keywords: Douglas-fir, ecological requirements, growth and yield, timber, climate change Full text (file, 1,40 MB) This document has more files! More... |
7. Balancing software and training requirements for information securityDamjan Fujs, Simon Vrhovec, Damjan Vavpotič, 2023, original scientific article Keywords: cyber security, experiment, information security standard, requirements engineering, end user training, information security Full text (file, 4,39 MB) This document has more files! More... |
8. Tailoring security-related software and training requirements to users based on their categorizationDamjan Fujs, 2024, doctoral dissertation Keywords: information security, information security software requirements, information security training requirements, user categorization, tailoring, experiment, mapping tool, technical aspects, human aspects Full text (file, 3,35 MB) |