Damjan Fujs

Orcid: 0000-0002-6357-8569

According to our database1, Damjan Fujs authored at least 16 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Concurrent Consideration of Technical and Human Aspects in Security Requirements Engineering.
Informatica (Slovenia), 2024

Cybersecurity competence of older adult users of mobile devices.
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024

2023
Balancing software and training requirements for information security.
Comput. Secur., November, 2023

Are Perceptions About Government and Social Media Providers Related to Protection Motivation Online?
Int. J. Cyber Behav. Psychol. Learn., June, 2023

2022
Use of smart devices by the elderly: Nursing home residents in Slovenia.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Towards personalized user training for secure use of information systems.
Int. Arab J. Inf. Technol., 2022

Improving the efficiency of remote conference tool use for distance learning in higher education: A kano based approach.
Comput. Educ., 2022

2021
Survey about protection motivation on social networking sites: University of Maribor students, 2018.
CoRR, 2021

Know Your Enemy: User Segmentation Based on Human Aspects of Information Security.
IEEE Access, 2021

2020
Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity.
J. Univers. Comput. Sci., 2020

Bibliometric Mapping of Research on User Training for Secure Use of Information Systems.
J. Univers. Comput. Sci., 2020

The role of information sensitivity in adoption of E2EE communication software.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

A Novel Approach for Acquiring Training and Software Security Requirements.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

2019
Social Network Self-Protection Model: What Motivates Users to Self-Protect?
J. Cyber Secur. Mobil., 2019

The power of interpretation: Qualitative methods in cybersecurity research.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
What drives the motivation to self-protect on social networks?: The role of privacy concerns and perceived threats.
Proceedings of the Central European Cybersecurity Conference 2018, 2018


  Loading...