Simon Vrhovec

Orcid: 0000-0002-6951-6369

Affiliations:
  • University of Maribor, Ljubljana, Slovenia


According to our database1, Simon Vrhovec authored at least 46 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees.
Comput. Secur., January, 2024

Recognition of genuine and phishing emails may not be associated with response to phishing attacks.
J. Univers. Comput. Sci., 2024

Adoption of smartphones among older adults and the role of perceived threat of cyberattacks.
CoRR, 2024

State surveillance in the digital age: Factors associated with citizens' attitudes towards trust registers.
CoRR, 2024

We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.
CoRR, 2024

Cybersecurity competence of older adult users of mobile devices.
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024

2023
Balancing software and training requirements for information security.
Comput. Secur., November, 2023

Are Perceptions About Government and Social Media Providers Related to Protection Motivation Online?
Int. J. Cyber Behav. Psychol. Learn., June, 2023

Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign.
Comput. Secur., 2023

Why people replace their aging smart devices: A push-pull-mooring perspective.
Comput. Secur., 2023

Older adults and tablet computers: Adoption and the role of perceived threat of cyber attacks.
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

2022
Guest Editorial: Special Issue on Interdisciplinary Cybersecurity.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Use of smart devices by the elderly: Nursing home residents in Slovenia.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Security and Privacy Issues of Home Globalization.
IEEE Secur. Priv., 2022

Towards personalized user training for secure use of information systems.
Int. Arab J. Inf. Technol., 2022

Improving the efficiency of remote conference tool use for distance learning in higher education: A kano based approach.
Comput. Educ., 2022

Exploring the Associations between Website Trustworthiness, Cookie Consent and Taking an Online Survey.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

2021
Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Securing edge-enabled smart healthcare systems with blockchain: A systematic literature review.
J. Internet Serv. Inf. Secur., 2021

Survey about cyberattack protection motivation in higher education: Academics at Slovenian universities, 2017.
CoRR, 2021

Survey about social engineering and the Varni na internetu awareness campaign, 2020.
CoRR, 2021

Survey about protection motivation on social networking sites: University of Maribor students, 2018.
CoRR, 2021

Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation.
Comput. Secur., 2021

Know Your Enemy: User Segmentation Based on Human Aspects of Information Security.
IEEE Access, 2021

Crème de la Crème: Lessons from Papers in Security Publications.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity.
J. Univers. Comput. Sci., 2020

Bibliometric Mapping of Research on User Training for Secure Use of Information Systems.
J. Univers. Comput. Sci., 2020

The role of information sensitivity in adoption of E2EE communication software.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

A Novel Approach for Acquiring Training and Software Security Requirements.
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020

2019
Testing the Human Backdoor: Organizational Response to a Phishing Campaign.
J. Univers. Comput. Sci., 2019

Cyberattack Detection and Response.
J. Univers. Comput. Sci., 2019

Social Network Self-Protection Model: What Motivates Users to Self-Protect?
J. Cyber Secur. Mobil., 2019

Cybercrime victimization and seeking help: A survey of students in Slovenia.
Proceedings of the Third Central European Cybersecurity Conference, 2019

Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does.
Proceedings of the Third Central European Cybersecurity Conference, 2019

Towards a delegation-type secure software development method.
Proceedings of the Third Central European Cybersecurity Conference, 2019

The power of interpretation: Qualitative methods in cybersecurity research.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Relating Mobile Device Use and Adherence to Information Security Policy with Data Breach Consequences in Hospitals.
J. Univers. Comput. Sci., 2018

Obligation to Defend the Critical Infrastructure? Offensive Cybersecurity Measures.
J. Univers. Comput. Sci., 2018

What drives the motivation to self-protect on social networks?: The role of privacy concerns and perceived threats.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

2017
Use of Mobile Devices in Hospitals and Perceived Data Breach Consequences: An Explorative Study.
Proceedings of the Advances in Cybersecurity, 2017

Explaining the Employment of Information Security Measures by Individuals in Organizations: The Self-protection Model.
Proceedings of the Advances in Cybersecurity, 2017

2016
Safe use of mobile devices in the cyberspace.
Proceedings of the 39th International Convention on Information and Communication Technology, 2016

Challenges of mobile device use in healthcare.
Proceedings of the 39th International Convention on Information and Communication Technology, 2016

Responding to stakeholders' resistance to change in software projects - A literature review.
Proceedings of the 39th International Convention on Information and Communication Technology, 2016

Agile development of a hospital information system.
Proceedings of the 39th International Convention on Information and Communication Technology, 2016

2015
Outsourcing as an Economic Development Tool in Transition Economies: Scattered Global Software Development.
Inf. Technol. Dev., 2015


  Loading...