


default search action
Simon Vrhovec
Person information
- affiliation: University of Maribor, Ljubljana, Slovenia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Anze Mihelic
, Simon Vrhovec
, Blaz Markelj
, Tomaz Hovelja:
Delegation-Based Agile Secure Software Development Approach for Small and Medium-Sized Businesses. IEEE Access 12: 189611-189635 (2024) - [j23]Samanta Mikuletic
, Simon Vrhovec
, Brigita Skela-Savic
, Bostjan Zvanut
:
Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees. Comput. Secur. 136: 103489 (2024) - [j22]Alex Crgol, Simon Vrhovec
:
Recognition of genuine and phishing emails may not be associated with response to phishing attacks. J. Univers. Comput. Sci. 30(9): 1265-1283 (2024) - [c17]Simon Vrhovec
, Igor Bernik
, Damjan Fujs
, Damjan Vavpotic
:
Cybersecurity competence of older adult users of mobile devices. EICC 2024: 221-223 - [i7]Simon Vrhovec, Igor Bernik, Damjan Fujs, Damjan Vavpotic:
Cybersecurity competence of older adult users of mobile devices. CoRR abs/2403.02459 (2024) - [i6]Simon Vrhovec, Blaz Markelj:
We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers. CoRR abs/2404.04725 (2024) - [i5]Katja Turha, Simon Vrhovec, Igor Bernik:
State surveillance in the digital age: Factors associated with citizens' attitudes towards trust registers. CoRR abs/2408.09725 (2024) - [i4]Patrik Pucer, Bostjan Zvanut, Simon Vrhovec:
Adoption of smartphones among older adults and the role of perceived threat of cyberattacks. CoRR abs/2409.01771 (2024) - 2023
- [j21]Simon Vrhovec
, Igor Bernik
, Blaz Markelj:
Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign. Comput. Secur. 125: 103038 (2023) - [j20]Julia Lenz
, Zdravko Bozakov
, Steffen Wendzel
, Simon Vrhovec
:
Why people replace their aging smart devices: A push-pull-mooring perspective. Comput. Secur. 130: 103258 (2023) - [j19]Damjan Fujs
, Simon Vrhovec
, Damjan Vavpotic
:
Balancing software and training requirements for information security. Comput. Secur. 134: 103467 (2023) - [j18]Simon Vrhovec
, Damjan Fujs
:
Are Perceptions About Government and Social Media Providers Related to Protection Motivation Online? Int. J. Cyber Behav. Psychol. Learn. 13(1): 1-19 (2023) - [c16]Anze Mihelic
, Igor Bernik
, Simon Vrhovec
:
Older adults and tablet computers: Adoption and the role of perceived threat of cyber attacks. EICC 2023: 189-190 - 2022
- [j17]Damjan Fujs
, Simon Vrhovec
, Bostjan Zvanut, Damjan Vavpotic:
Improving the efficiency of remote conference tool use for distance learning in higher education: A kano based approach. Comput. Educ. 181: 104448 (2022) - [j16]Damjan Fujs, Simon Vrhovec
, Damjan Vavpotic:
Towards personalized user training for secure use of information systems. Int. Arab J. Inf. Technol. 19(3): 307-313 (2022) - [j15]Luca Caviglione, Steffen Wendzel, Simon Vrhovec
, Aleksandra Mileva
:
Security and Privacy Issues of Home Globalization. IEEE Secur. Priv. 20(1): 10-11 (2022) - [j14]Simon Vrhovec, Béla Genge, Martin Gilje Jaatun:
Guest Editorial: Special Issue on Interdisciplinary Cybersecurity. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(3): 1-3 (2022) - [j13]Anze Mihelic, Simon Vrhovec, Igor Bernik, Andrej Domej, Damjan Fujs, Tomaz Hovelja, Sanja Kerznar Osolnik, Patrik Pucer, Damjan Vavpotic, Bostjan Zvanut, Kaja Prislan:
Use of smart devices by the elderly: Nursing home residents in Slovenia. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(3): 68-80 (2022) - [c15]Andraz Hovnik, Luka Jelovcan, Anze Mihelic, Simon Vrhovec
:
Exploring the Associations between Website Trustworthiness, Cookie Consent and Taking an Online Survey. EICC 2022: 93-94 - 2021
- [j12]Damjan Fujs
, Simon Vrhovec
, Damjan Vavpotic
:
Know Your Enemy: User Segmentation Based on Human Aspects of Information Security. IEEE Access 9: 157306-157315 (2021) - [j11]Simon Vrhovec
, Anze Mihelic:
Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation. Comput. Secur. 106: 102309 (2021) - [j10]Ziga Kodric, Simon Vrhovec
, Luka Jelovcan:
Securing edge-enabled smart healthcare systems with blockchain: A systematic literature review. J. Internet Serv. Inf. Secur. 11(4): 19-32 (2021) - [j9]Luca Caviglione, Steffen Wendzel, Aleksandra Mileva, Simon Vrhovec:
Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(4): 1-3 (2021) - [c14]Simon Vrhovec
, Luca Caviglione, Steffen Wendzel:
Crème de la Crème: Lessons from Papers in Security Publications. ARES 2021: 92:1-92:9 - [i3]Luka Jelovcan, Simon Vrhovec, Damjan Fujs:
Survey about protection motivation on social networking sites: University of Maribor students, 2018. CoRR abs/2104.07712 (2021) - [i2]Simon Vrhovec:
Survey about social engineering and the Varni na internetu awareness campaign, 2020. CoRR abs/2109.00837 (2021) - [i1]Luka Jelovcan, Simon Vrhovec, Anze Mihelic:
Survey about cyberattack protection motivation in higher education: Academics at Slovenian universities, 2017. CoRR abs/2109.04132 (2021) - 2020
- [j8]Damjan Fujs, Simon Vrhovec, Damjan Vavpotic:
Bibliometric Mapping of Research on User Training for Secure Use of Information Systems. J. Univers. Comput. Sci. 26(7): 764-782 (2020) - [j7]Simon Vrhovec, Damjan Fujs, Luka Jelovcan, Anze Mihelic:
Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity. J. Univers. Comput. Sci. 26(7): 827-853 (2020) - [c13]Luka Jelovcan, Damjan Fujs, Simon Vrhovec
, Anze Mihelic:
The role of information sensitivity in adoption of E2EE communication software. EICC 2020: 10:1-10:2 - [c12]Damjan Fujs, Simon Vrhovec
, Damjan Vavpotic
:
A Novel Approach for Acquiring Training and Software Security Requirements. EICC 2020: 12:1-12:2
2010 – 2019
- 2019
- [j6]Damjan Fujs
, Anze Mihelic, Simon Vrhovec
:
Social Network Self-Protection Model: What Motivates Users to Self-Protect? J. Cyber Secur. Mobil. 8(4): 467-492 (2019) - [j5]Jörg Keller, Wojciech Mazurczyk, Béla Genge, Lothar Fritsch, Simon Vrhovec:
Cyberattack Detection and Response. J. Univers. Comput. Sci. 25(11): 1394-1395 (2019) - [j4]Anze Mihelic, Matej Jevscek, Simon Vrhovec, Igor Bernik:
Testing the Human Backdoor: Organizational Response to a Phishing Campaign. J. Univers. Comput. Sci. 25(11): 1458-1477 (2019) - [c11]Damjan Fujs
, Anze Mihelic, Simon L. R. Vrhovec
:
The power of interpretation: Qualitative methods in cybersecurity research. ARES 2019: 92:1-92:10 - [c10]Aleksander Murko, Simon L. R. Vrhovec
:
Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does. CECC 2019: 15:1-15:6 - [c9]Anze Mihelic, Tomaz Hovelja, Simon L. R. Vrhovec
:
Towards a delegation-type secure software development method. CECC 2019: 21:1-21:2 - [c8]Kaja Prislan, Igor Bernik, Gorazd Mesko
, Rok Hacin, Blaz Markelj, Simon L. R. Vrhovec
:
Cybercrime victimization and seeking help: A survey of students in Slovenia. CECC 2019: 24:1-24:2 - 2018
- [j3]Simon Vrhovec, Blaz Markelj:
Relating Mobile Device Use and Adherence to Information Security Policy with Data Breach Consequences in Hospitals. J. Univers. Comput. Sci. 24(5): 634-645 (2018) - [j2]Anze Mihelic, Simon Vrhovec:
Obligation to Defend the Critical Infrastructure? Offensive Cybersecurity Measures. J. Univers. Comput. Sci. 24(5): 646-661 (2018) - [c7]Damjan Fujs
, Simon Vrhovec
, Anze Mihelic:
What drives the motivation to self-protect on social networks?: The role of privacy concerns and perceived threats. CECC 2018: 11:1-11:6 - 2017
- [c6]Anze Mihelic, Simon Vrhovec
:
Explaining the Employment of Information Security Measures by Individuals in Organizations: The Self-protection Model. CECC 2017: 23-34 - [c5]Simon Vrhovec
, Blaz Markelj:
Use of Mobile Devices in Hospitals and Perceived Data Breach Consequences: An Explorative Study. CECC 2017: 55-64 - [e1]Igor Bernik, Blaz Markelj, Simon Vrhovec
:
Advances in Cybersecurity - Proceedings of the 2017 Central European Cybersecurity Conference, CECC 2017, Ljubljana, Slovenia, November 16-17, 2017. University of Maribor Press 2017, ISBN 978-961-286-114-8 [contents] - 2016
- [c4]Simon L. R. Vrhovec
:
Agile development of a hospital information system. MIPRO 2016: 416-421 - [c3]Simon L. R. Vrhovec
:
Responding to stakeholders' resistance to change in software projects - A literature review. MIPRO 2016: 1157-1161 - [c2]Simon L. R. Vrhovec
:
Challenges of mobile device use in healthcare. MIPRO 2016: 1393-1396 - [c1]Simon L. R. Vrhovec
:
Safe use of mobile devices in the cyberspace. MIPRO 2016: 1397-1401 - 2015
- [j1]Simon L. R. Vrhovec
, Marina Trkman
, Ales Kumer, Marjan Krisper, Damjan Vavpotic
:
Outsourcing as an Economic Development Tool in Transition Economies: Scattered Global Software Development. Inf. Technol. Dev. 21(3): 445-459 (2015)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint