Zobrazeno 1 - 10
of 55
pro vyhledávání: '"Simon Vrhovec"'
Autor:
Alex Crgol, Simon Vrhovec
Publikováno v:
Journal of Universal Computer Science, Vol 30, Iss 9, Pp 1265-1283 (2024)
This paper investigates the associations between recognition of phishing and genuine emails, and response to phishing attacks, namely susceptibility to phishing emails (i.e., click rate) and full phishing attack compliance (i.e., click on a malicious
Externí odkaz:
https://doaj.org/article/1e1469d6760044f4ae29c5590ad05d14
Publikováno v:
Applied Sciences, Vol 13, Iss 7, p 4563 (2023)
Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key activities, artifacts, and roles that can be employed
Externí odkaz:
https://doaj.org/article/aeaa8fb6dcf9420b8080a26575ee11f7
Publikováno v:
IEEE Access, Vol 9, Pp 157306-157315 (2021)
Users of information systems are the weakest link in information security. Considering their current information security performance is essential for improving information security training. User segmentation can help to improve information security
Externí odkaz:
https://doaj.org/article/c86836adbe594e6882787cf71a4372a5
Publikováno v:
Journal of Universal Computer Science, Vol 26, Iss 7, Pp 764-782 (2020)
Information systems are pervasive in organizations of all sizes. To use them securely, users must be properly trained. Because of the pervasiveness of information systems the number of scientific publications reporting on user training for secure use
Externí odkaz:
https://doaj.org/article/205eabc9a66846c7a23cc90a2eb190ce
Publikováno v:
Journal of Universal Computer Science, Vol 26, Iss 7, Pp 827-853 (2020)
There is a growing number of scientific papers reporting on case studies and action research published each year. Consequently, evaluating the quality of pilling up research reports is becoming increasingly challenging. Several approaches for evaluat
Externí odkaz:
https://doaj.org/article/4a73b70bb563473295e859b5cb45b217
Publikováno v:
Journal of Universal Computer Science, Vol 25, Iss 11, Pp 1458-1477 (2019)
To exploit the human as the "back door" to compromising well-protected information systems of organizations, phishing-type attacks are becoming increasingly sophisticated. There is however a significant lack of real-world studies of phishing campaign
Externí odkaz:
https://doaj.org/article/b47eef172651448eb9277e2e1bd988c8
Autor:
Simon Vrhovec, Blaž Markelj
Publikováno v:
PLoS ONE, Vol 16, Iss 11 (2021)
This study aims to explore the relation between conflict in the project team and user resistance to change in software projects. Following a cross-sectional research design, a survey was conducted among 1,000 largest companies in Slovenia (N = 114).
Externí odkaz:
https://doaj.org/article/865c7f41d4c84da6944aa4b5f8db6647
Autor:
Damjan Fujs, Simon Vrhovec
Publikováno v:
Dve Domovini, Iss 52 (2020)
The authors conducted a survey of online groups on Facebook (N = 270) and a survey of Slovenian migrants (N = 629) to gain insight into the use of social networking services (SNSs) during different phases of the migration process. SNSs can help migra
Externí odkaz:
https://doaj.org/article/836f9ea1c5a74efd8689d914c14b77dd
Publikováno v:
Journal of Universal Computer Science, Vol 25, Iss 11, Pp 1394-1395 (2019)
Externí odkaz:
https://doaj.org/article/4a5d9d7cd6064659804f98ce5abaed89
Publikováno v:
European Interdisciplinary Cybersecurity Conference.