About
24
Publications
11,317
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
144
Citations
Introduction
Dr. Damjan Fujs is an Assistant Professor at the Faculty of Computer and Information Science of the University of Ljubljana. He received his doctorate in 2024. He is a member of the Information Systems Laboratory. He works in research in the fields of information security, requirements engineering, methodologies for the development of information systems and software, and the broader field of informatics.
Current institution
Additional affiliations
July 2024 - October 2024
October 2019 - April 2025
Education
October 2019 - March 2024
Publications
Publications (24)
Information security is one of the key areas of consideration to assure reliable and dependable information systems (IS). Achieving an appropriate level of IS security requires concurrent consideration of the technical aspects of IS and the human aspects related to the end users of IS. These aspects can be described in the form of information secur...
During the COVID-19 pandemic, higher education institutions around the world were challenged to shift from traditional to distance teaching processes. This was not an easy task as educational institutions had to face many technology and human related challenges. The purpose of this paper is to present an approach that helps teachers to use remote c...
Users of information systems are the weakest link in information security. Considering their current information security performance is essential for improving information security training. User segmentation can help to improve information security training by dividing users into smaller groups based on their information security performance. In...
Information systems are pervasive in organizations of all sizes. To use them securely, users must be properly trained. Because of the pervasiveness of information systems the number of scientific publications reporting on user training for secure use of information systems is increasing year by year. To overcome the issue of manually surveying such...
Cybersecurity is a hot topic and researchers have published extensively on studies conducted using a variety of different research methods. This paper aims to determine which qualitative research methods were most used and for studying which topics. A systematic literature review on Web of Science, Scopus and ACM DL has been conducted to achieve an...
Cybersecurity attacks have increased in recent years, both on the EU and global levels, in terms of their number and impact. The public administration sector is particularly at risk, as this is where most cybersecurity attacks take place. It is therefore important to develop comprehensive information security strategies on both the organizational a...
This study aims to explore the relations between perceptions about government and social media providers, and protection motivation of social media users. A survey was conducted among students at a public university in Slovenia (N=276). The results of PLS-SEM analysis indicate that fear of government intrusions is associated with both perceived thr...
Security requirements are an important part of modern information systems. In the past, they have been implemented in final stages of the information systems development. Though, there are many approaches and publications in the field of security requirements engineering, there is a gap in how to find the most relevant sources. To this end, we pres...
Information Systems (IS) represent an integral part of our lives, both in the organizational and personal sphere. To use them securely, users must be properly trained. The main problem is that most training processes still use the one-size-fits-all approach where users receive the same kind of learning material. In addition, personalized training m...
V tem prispevku predstavljamo pristop za kategorizacijo uporabnikov, ki temelji na preverjenem vprašalniku o človeških vidikih informacijske varnosti (HAIS-Q). Na tej podlagi smo izvedli razvrščanje uporabnikov (N = 165). Analiza je pokazala tri skupine uporabnikov (uporabniki z nizkim, zmernim in visokim tveganjem). Izračunali smo indeks silhuete...
V tem prispevku predstavljamo pristop za kategorizacijo uporabnikov, ki temelji na preverjenem vprašalniku o človeških vidikih informacijske varnosti (HAIS-Q). Na tej podlagi smo izvedli razvrščanje uporabnikov (N= 165). Analiza je pokazala tri skupine uporabnikov (uporabniki z nizkim, zmernim in visokim tveganjem). Izračunali smo indeks silhuete (...
V tem prispevku predstavljamo pristop za kategorizacijo uporabnikov, ki temelji na preverjenem vprašalniku o človeških vidikih informacijske varnosti (HAIS-Q). Na tej podlagi smo izvedli razvrščanje uporabnikov (N= 165). Analiza je pokazala tri skupine uporabnikov (uporabniki z nizkim, zmernim in visokim tveganjem). Izračunali smo indeks silhuete (...
This paper reports on a study aiming to explore factors associated with protection motivation of users on social networking sites. The objectives of this study were to determine how trust in internet service provider, trust in social media provider, trust in government, privacy concerns, fear of government intrusions, locus of control, and perceive...
This poster reports on an exploratory study of E2EE communication software adoption factors among academics at five Slovenian universities (N=367). The results of the study suggest that in-formation sensitivity plays an important role in adoption of E2EE communication software. Privacy concerns and fear of government intrusions affect adoption only...
Security is an important software quality attribute albeit, as a non-functional requirement, often overlooked. Although several approaches for security requirements engineering exist, it is not clear how to adapt security requirements to software end users. This poster aims to fill in this gap by developing a novel approach for acquiring security r...
There is a growing number of scientific papers reporting on case studies and action research published each year. Consequently, evaluating the quality of pilling up research reports is becoming increasingly challenging. Several approaches for evaluation of quality of the scientific outputs exist however they appear to be fairly time-consuming and/o...
The purpose of this paper is to place the use of emojis and emoticons in communication, e.g., on social networks and with SMSs, to the field of social engineering. With a systematic literature survey in academic databases Web of Science and Scopus, and opportunistic search, 40 scientific papers about emojis and emoticons in social engineering were...
The authors conducted a survey of online groups on Facebook (N = 270) and a survey of Slovenian migrants (N = 629) to gain insight into the use of social networking services (SNSs) during different phases of the migration process. SNSs can help migrants establish new relationships with migrants in the destination country, which may help them to cop...
Users of information systems (IS) are daily faced with information security threats. As a response to the need to implement efficient information security measures, the paper proposes an innovative model to solve the issues through educating IS users by individually assessing each security measure in terms of its cost and efficiency or benefit for...
[...] The findings of our study show that perceptions of trust in government, fear of government intrusions into the privacy of country residents and government surveillance concerns vary from country to country. Countries are ranked according to these three criteria. The average trust in government seems to be relatively low. It appears that respo...
Social networks are an indispensable activity for billions of users making them an attractive target for cyberattacks. There is however only scarce research on self-protection of individuals outside the organizational context. This study aims to address this gap by explaining what motivates individuals to self-protect on social networks. A survey (...
Social networks offer a wide range of services to their users resulting in a high degree of their involvement in social network users' everyday life. Users are however exposed to a variety of evolving cyberthreats that may be just as harmful as those in the material world even though they are sometimes hard to perceive as such in the cyberspace. To...