Simon Vrhovec
Orcid: 0000-0002-6951-6369Affiliations:
- University of Maribor, Ljubljana, Slovenia
According to our database1,
Simon Vrhovec
authored at least 46 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees.
Comput. Secur., January, 2024
Recognition of genuine and phishing emails may not be associated with response to phishing attacks.
J. Univers. Comput. Sci., 2024
Adoption of smartphones among older adults and the role of perceived threat of cyberattacks.
CoRR, 2024
State surveillance in the digital age: Factors associated with citizens' attitudes towards trust registers.
CoRR, 2024
We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.
CoRR, 2024
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024
2023
Comput. Secur., November, 2023
Are Perceptions About Government and Social Media Providers Related to Protection Motivation Online?
Int. J. Cyber Behav. Psychol. Learn., June, 2023
Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign.
Comput. Secur., 2023
Comput. Secur., 2023
Older adults and tablet computers: Adoption and the role of perceived threat of cyber attacks.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023
2022
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
Int. Arab J. Inf. Technol., 2022
Improving the efficiency of remote conference tool use for distance learning in higher education: A kano based approach.
Comput. Educ., 2022
Exploring the Associations between Website Trustworthiness, Cookie Consent and Taking an Online Survey.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022
2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Securing edge-enabled smart healthcare systems with blockchain: A systematic literature review.
J. Internet Serv. Inf. Secur., 2021
Survey about cyberattack protection motivation in higher education: Academics at Slovenian universities, 2017.
CoRR, 2021
CoRR, 2021
Survey about protection motivation on social networking sites: University of Maribor students, 2018.
CoRR, 2021
Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation.
Comput. Secur., 2021
IEEE Access, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity.
J. Univers. Comput. Sci., 2020
Bibliometric Mapping of Research on User Training for Secure Use of Information Systems.
J. Univers. Comput. Sci., 2020
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020
2019
J. Univers. Comput. Sci., 2019
J. Cyber Secur. Mobil., 2019
Proceedings of the Third Central European Cybersecurity Conference, 2019
Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does.
Proceedings of the Third Central European Cybersecurity Conference, 2019
Proceedings of the Third Central European Cybersecurity Conference, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Relating Mobile Device Use and Adherence to Information Security Policy with Data Breach Consequences in Hospitals.
J. Univers. Comput. Sci., 2018
J. Univers. Comput. Sci., 2018
What drives the motivation to self-protect on social networks?: The role of privacy concerns and perceived threats.
Proceedings of the Central European Cybersecurity Conference 2018, 2018
2017
Use of Mobile Devices in Hospitals and Perceived Data Breach Consequences: An Explorative Study.
Proceedings of the Advances in Cybersecurity, 2017
Explaining the Employment of Information Security Measures by Individuals in Organizations: The Self-protection Model.
Proceedings of the Advances in Cybersecurity, 2017
2016
Proceedings of the 39th International Convention on Information and Communication Technology, 2016
Proceedings of the 39th International Convention on Information and Communication Technology, 2016
Responding to stakeholders' resistance to change in software projects - A literature review.
Proceedings of the 39th International Convention on Information and Communication Technology, 2016
Proceedings of the 39th International Convention on Information and Communication Technology, 2016
2015
Outsourcing as an Economic Development Tool in Transition Economies: Scattered Global Software Development.
Inf. Technol. Dev., 2015