{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:25:04Z","timestamp":1750501504452,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T00:00:00Z","timestamp":1605657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100009526","name":"Univerza v Mariboru","doi-asserted-by":"publisher","award":["Human factors in cybersecurity and digital forensics"],"award-info":[{"award-number":["Human factors in cybersecurity and digital forensics"]}],"id":[{"id":"10.13039\/501100009526","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,18]]},"DOI":"10.1145\/3424954.3424967","type":"proceedings-article","created":{"date-parts":[[2021,1,12]],"date-time":"2021-01-12T19:47:00Z","timestamp":1610480820000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The role of information sensitivity in adoption of E2EE communication software"],"prefix":"10.1145","author":[{"given":"Luka","family":"Jelov\u010dan","sequence":"first","affiliation":[{"name":"University of Maribor Ljubljana, Slovenia"}]},{"given":"Damjan","family":"Fujs","sequence":"additional","affiliation":[{"name":"University of Ljubljana Ljubljana, Slovenia"}]},{"given":"Simon","family":"Vrhovec","sequence":"additional","affiliation":[{"name":"University of Maribor Ljubljana, Slovenia"}]},{"given":"An\u017ee","family":"Miheli\u010d","sequence":"additional","affiliation":[{"name":"University of Maribor Ljubljana, Slovenia"}]}],"member":"320","published-online":{"date-parts":[[2021,1,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v10.i2.pp756-762"},{"key":"e_1_3_2_1_2_1","volume-title":"Use of Social Networking Services among Slovenes around the World. Dve domovini \/ Two Homelands 52","author":"Fujs Damjan","year":"2020","unstructured":"Damjan Fujs and Simon Vrhovec . 2020. Use of Social Networking Services among Slovenes around the World. Dve domovini \/ Two Homelands 52 ( 2020 ), 61--79. https:\/\/doi.org\/10.3986\/dd.2020.2.04 10.3986\/dd.2020.2.04 Damjan Fujs and Simon Vrhovec. 2020. Use of Social Networking Services among Slovenes around the World. Dve domovini \/ Two Homelands 52 (2020), 61--79. https:\/\/doi.org\/10.3986\/dd.2020.2.04"},{"key":"e_1_3_2_1_3_1","first-page":"371","article-title":"Emerging Issues in Cyber Security for Institutions of Higher Education","volume":"8","author":"Maranga Mayieka Jared","year":"2019","unstructured":"Mayieka Jared Maranga and Masese Nelson . 2019 . Emerging Issues in Cyber Security for Institutions of Higher Education . International Journal of Computer Science and Network 8 , 4 (2019), 371 -- 379 . Mayieka Jared Maranga and Masese Nelson. 2019. Emerging Issues in Cyber Security for Institutions of Higher Education. International Journal of Computer Science and Network 8, 4 (2019), 371--379.","journal-title":"International Journal of Computer Science and Network"},{"key":"e_1_3_2_1_4_1","first-page":"1458","article-title":"Testing the human backdoor: Organizational response to a phishing campaign","volume":"25","author":"Miheli\u010d An\u017ee","year":"2019","unstructured":"An\u017ee Miheli\u010d , Matej Jev\u0161\u010dek , Simon Vrhovec , and Igor Bernik . 2019 . Testing the human backdoor: Organizational response to a phishing campaign . Journal of Universal Computer Science 25 , 11 (2019), 1458 -- 1477 . https:\/\/doi.org\/10.3217\/jucs-025-11-1458 10.3217\/jucs-025-11-1458 An\u017ee Miheli\u010d, Matej Jev\u0161\u010dek, Simon Vrhovec, and Igor Bernik. 2019. Testing the human backdoor: Organizational response to a phishing campaign. Journal of Universal Computer Science 25, 11 (2019), 1458--1477. https:\/\/doi.org\/10.3217\/jucs-025-11-1458","journal-title":"Journal of Universal Computer Science"},{"volume-title":"Communications in Computer and Information Science","author":"Ophoff Jacques","key":"e_1_3_2_1_5_1","unstructured":"Jacques Ophoff and Mcguigan Lakay . 2019. Mitigating the Ransomware Threat: A Protection Motivation Theory Approach . In Communications in Computer and Information Science , Vol. 973 . Springer International Publishing , Pretoria, South Africa, 163--175. https:\/\/doi.org\/10.1007\/978-3-030-11407-7_12 10.1007\/978-3-030-11407-7_12 Jacques Ophoff and Mcguigan Lakay. 2019. Mitigating the Ransomware Threat: A Protection Motivation Theory Approach. In Communications in Computer and Information Science, Vol. 973. Springer International Publishing, Pretoria, South Africa, 163--175. https:\/\/doi.org\/10.1007\/978-3-030-11407-7_12"}],"event":{"name":"EICC 2020: European Interdisciplinary Cybersecurity Conference","acronym":"EICC 2020","location":"Rennes France"},"container-title":["Proceedings of the European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424954.3424967","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3424954.3424967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:10Z","timestamp":1750197730000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424954.3424967"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,18]]},"references-count":5,"alternative-id":["10.1145\/3424954.3424967","10.1145\/3424954"],"URL":"https:\/\/doi.org\/10.1145\/3424954.3424967","relation":{},"subject":[],"published":{"date-parts":[[2020,11,18]]},"assertion":[{"value":"2021-01-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}