Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4
zadetkov: 33
1.
  • An Interface for IoT: Feedi... An Interface for IoT: Feeding Back Health-Related Data to Parkinson’s Disease Patients
    Memedi, Mevludin; Tshering, Gaki; Fogelberg, Martin ... Journal of sensor and actuator networks, 2018, Letnik: 7, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    This paper presents a user-centered design (UCD) process of an interface for Parkinson’s disease (PD) patients for helping them to better manage their symptoms. The interface is designed to visualize ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
2.
  • Summative evaluation of a s... Summative evaluation of a sensor-based cognitive assistive technology: Impact on quality of life and perceived utility
    Kristoffersson, A.; Kolkowska, E.; Loutfi, A. Gerontechnology, 2019, Letnik: 18, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Background: Current research shows that perceived improvement of quality of life (QoL) is among the most important factors influencing acceptance of technology by older adults. Research ...
Celotno besedilo
Dostopno za: UL, VSZLJ
3.
  • Factors influencing seniors... Factors influencing seniors’ acceptance of technology for ageing in place in the post-implementation stage: A literature review
    Tsertsidis, Antonios; Kolkowska, Ella; Hedström, Karin International journal of medical informatics (Shannon, Ireland), 09/2019, Letnik: 129
    Journal Article
    Recenzirano
    Odprti dostop

    To identify factors that influence the acceptance of technology for ageing in place by seniors in the post-implementation stage. This review is among very few that focus on acceptance in ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
4.
  • Towards analysing the ratio... Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method
    Kolkowska, Ella; Karlsson, Fredrik; Hedström, Karin The journal of strategic information systems, 03/2017, Letnik: 26, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    •We develop a method for Value Based Compliance analysis of information security.•We develop a set of design principles for a Value Based Compliance analysis method.•We analyse value conflicts behind ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP

PDF
5.
  • Organizational power and in... Organizational power and information security rule compliance
    Kolkowska, Ella; Dhillon, Gurpreet Computers & security, 03/2013, Letnik: 33
    Journal Article
    Recenzirano
    Odprti dostop

    This paper analyzes power relationships and the resulting failure in complying with information security rules. It argues that an inability to understand the intricate power relationships in the ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK

PDF
6.
Celotno besedilo
Dostopno za: UPUK
7.
  • Information privacy in e-se... Information privacy in e-service: Effect of organizational privacy assurances on individual privacy concerns, perceptions, trust and self-disclosure behavior
    Mutimukwe, Chantal; Kolkowska, Ella; Grönlund, Åke Government information quarterly, January 2020, 2020-01-00, 2020, Letnik: 37, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The increasing use of the Internet for service delivery has paralleled an increase of e-service users' privacy concerns as technology offers ample opportunities for organizations to store, process, ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
8.
  • Information security policy... Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis
    Karlsson, Fredrik; Kolkowska, Ella; Petersson, Johan Computers & security, 03/2022, Letnik: 114
    Journal Article
    Recenzirano
    Odprti dostop

    When end users have to prioritize between different rationalities in organisations there is a risk of non-compliance with information security policies. Thus, in order for information security ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
9.
  • What goes around comes arou... What goes around comes around: an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items
    Gerdin, Marcus; Kolkowska, Ella; Grönlund, Åke Information and computer security, 04/2024
    Journal Article
    Recenzirano
    Odprti dostop

    Purpose Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research methodology and ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
10.
  • The hunt for computerized s... The hunt for computerized support in information security policy management
    Rostami, Elham; Karlsson, Fredrik; Kolkowska, Ella Information and computer security, 01/2020, Letnik: 28, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Purpose The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been suggested, and ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
1 2 3 4
zadetkov: 33

Nalaganje filtrov