Diagnosing organizational risks in software projects: Stakeholder resistance SLR Vrhovec, T Hovelja, D Vavpotič, M Krisper International journal of project management 33 (6), 1262-1273, 2015 | 110 | 2015 |
The power of interpretation: Qualitative methods in cybersecurity research D Fujs, A Mihelič, SLR Vrhovec Proceedings of the 14th International Conference on Availability …, 2019 | 63 | 2019 |
Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation S Vrhovec, A Mihelič Computers & Security 106, 102309, 2021 | 49 | 2021 |
Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does A Murko, SLR Vrhovec Proceedings of the Third Central European Cybersecurity Conference, 1-6, 2019 | 32 | 2019 |
Improving the efficiency of remote conference tool use for distance learning in higher education: A kano based approach D Fujs, S Vrhovec, B Žvanut, D Vavpotič Computers & Education 181, 104448, 2022 | 30 | 2022 |
Securing edge-enabled smart healthcare systems with blockchain: A systematic literature review Ž Kodrič, S Vrhovec, L Jelovčan Journal of Internet Services and Information Security 11 (4), 19-32, 2021 | 29* | 2021 |
Challenges of mobile device use in healthcare SLR Vrhovec 2016 39th International Convention on Information and Communication …, 2016 | 20 | 2016 |
Why people replace their aging smart devices: A push–pull–mooring perspective J Lenz, Z Bozakov, S Wendzel, S Vrhovec Computers & Security 130, 103258, 2023 | 18 | 2023 |
Testing the Human Backdoor: Organizational Response to a Phishing Campaign A Mihelič, M Jevšček, S Vrhovec, I Bernik Journal of Universal Computer Science 25 (11), 1458-1477, 2019 | 18 | 2019 |
Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign S Vrhovec, I Bernik, B Markelj Computers & Security 125, 103038, 2023 | 17 | 2023 |
Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees S Mikuletič, S Vrhovec, B Skela-Savič, B Žvanut Computers & Security 136, 103489, 2024 | 15 | 2024 |
Bibliometric Mapping of Research on User Training for Secure Use of Information Systems D Fujs, S Vrhovec, D Vavpotic Journal of Universal Computer Science 26 (7), 764-782, 2020 | 14 | 2020 |
Social Network Self-Protection Model: What Motivates Users to Self-Protect? D Fujs, A Mihelič, S Vrhovec Journal of Cyber Security and Mobility 8 (4), 467-492, 2019 | 14 | 2019 |
Outsourcing as an economic development tool in transition economies: Scattered global software development SLR Vrhovec, M Trkman, A Kumer, M Krisper, D Vavpotič Information Technology for Development 21 (3), 445-459, 2015 | 14 | 2015 |
A model for resistance management in IT projects and programs / Model obvladovanja odpora pri projektih in programih IT S Vrhovec, R Rupnik Elektrotehniški vestnik / Electrotechnical review 78 (1-2), 24-37, 2011 | 14* | 2011 |
Agile development of secure software for small and medium-sized enterprises A Mihelič, S Vrhovec, T Hovelja Sustainability 15 (1), 801, 2023 | 13 | 2023 |
Know your enemy: user segmentation based on human aspects of information security D Fujs, S Vrhovec, D Vavpotič IEEe Access 9, 157306-157315, 2021 | 13 | 2021 |
Varna uporaba mobilnih naprav v kibernetskem prostoru / Safe mobile-device use in the cyberspace S Vrhovec Elektrotehniški vestnik / Electrotechnical review 83 (3), 144-147, 2016 | 12 | 2016 |
Relating Mobile Device Use and Adherence to Information Security Policy with Data Breach Consequences in Hospitals S Vrhovec, B Markelj Journal of Universal Computer Science 24 (5), 634-645, 2018 | 11 | 2018 |
What drives the motivation to self-protect on social networks? The role of privacy concerns and perceived threats D Fujs, S Vrhovec, A Mihelič Proceedings of the Central European Cybersecurity Conference 2018, 1-6, 2018 | 9 | 2018 |