Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Older adults and tablet computers: Adoption and the role of perceived threat of cyber attacks., , and . EICC, page 189-190. ACM, (2023)State surveillance in the digital age: Factors associated with citizens' attitudes towards trust registers., , and . CoRR, (2024)Investigating the darknet: limitations in Slovenian legal system., , , and . ARES, page 86:1-86:7. ACM, (2017)Use of smart devices by the elderly: Nursing home residents in Slovenia., , , , , , , , , and 1 other author(s). J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 13 (3): 68-80 (2022)GDPR and Health Personal Data; Tricks and Traps of Compliance., and . EFMI-STC, volume 255 of Studies in Health Technology and Informatics, page 155-159. IOS Press, (2018)Testing the Human Backdoor: Organizational Response to a Phishing Campaign., , , and . J. Univers. Comput. Sci., 25 (11): 1458-1477 (2019)Cyberattack Response Model for the Nuclear Regulator in Slovenia., and . J. Univers. Comput. Sci., 25 (11): 1437-1457 (2019)Cybercrime victimization and seeking help: A survey of students in Slovenia., , , , , and . CECC, page 24:1-24:2. ACM, (2019)Preparation of Response Model to Cyber-attacks at Nuclear Facilities., and . CECC, page 43-54. University of Maribor Press, (2017)Cybercrime: Awareness and Fear: Slovenian Perspectives., and . EISIC, page 28-33. IEEE Computer Soecity, (2011)