Borka Jerman-Blazic

  • University of Ljubljana, Slovenia

According to our database1, Borka Jerman-Blazic authored at least 76 papers between 1990 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:



Overcoming the digital divide with a modern approach to learning digital skills for the elderly adults.
Educ. Inf. Technol., 2020

A Large-Scale Security Analysis of Web Vulnerability: Findings, Challenges and Remedies.
Proceedings of the Computational Science and Its Applications - ICCSA 2020, 2020

An Intelligent and Automated WCMS Vulnerability-Discovery Tool: The Current State of the Web.
IEEE Access, 2019

Advancement in Cybercrime Investigation - The New European Legal Instruments for Collecting Cross-border E-evidence.
Proceedings of the Information Technology and Systems, 2019

Learning Digital Skils for Elderly People by using Touch Screen Technology and Learning Games: A Case Study.
Proceedings of the 10th International Conference on Computer Supported Education, 2018

User bias in online trust systems: aligning the system designers' intentions with the users' expectations.
Behav. Inf. Technol., 2017

New method for determination complexity using in AD HOC cloud computing.
Proceedings of the 40th International Convention on Information and Communication Technology, 2017

Eye Tracking Graphical Passwords.
Proceedings of the Advances in Human Factors in Cybersecurity, 2017

User awareness and tolerance of privacy abuse on mobile Internet: An exploratory study.
Telematics Informatics, 2016

Why That Picture? Discovering Password Properties in Recognition-Based Graphical Authentication.
Int. J. Hum. Comput. Interact., 2016

An Advanced Educational Tool for Digital Forensic Engineering.
iJET, 2016

Semantic Ontology Design for a Multi-Cooperative First Responder Interoperable Platform.
Comput. Informatics, 2016

New cybercrime taxonomy of visualization of data mining process.
Proceedings of the 39th International Convention on Information and Communication Technology, 2016

Information Security Aspects of the Public Safety Data Interoperability Network.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

Missing Solutions in the Fight against Cybercrime and Cyberterrorism - The New EU Research Agenda.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

A Virtual User Community: Cultural Backgrounds in the Design of an Internet-Based Service.
J. Glob. Inf. Manag., 2015

An Authentication and Authorization Solution for a Multiplatform Cloud Environment.
Inf. Secur. J. A Glob. Perspect., 2015

An Innovative Approach in Digital Forensic Education and Training.
Proceedings of the Information Security Education Across the Curriculum, 2015

An Approach in the Design of Common Authentication Solution for a Multi-Platform Cloud Environment.
Proceedings of the CLOSER 2015, 2015

User Understanding of Privacy In Emerging Mobile Markets.
IEEE Technol. Soc. Mag., 2014

Designing a large cross-border secured eID service for e-government and e-business.
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case.
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013

Managing the investment in information security technology by use of a quantitative modeling.
Inf. Process. Manag., 2012

Trust as an Organismic Trait of E-Commerce Systems.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

Four Scenarios for Future Evolution of the Internet.
IEEE Technol. Soc. Mag., 2011

On designing usable and secure recognition-based graphical authentication mechanisms.
Interact. Comput., 2011

A Novel Systemic Taxonomy of Trust in the Online Environment - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

A conceptual framework for evaluating usable security in authentication mechanisms - usability perspectives.
Proceedings of the 5th International Conference on Network and System Security, 2011

Recognition-Based Graphical Authentication with Single-Object Images.
Proceedings of the 2011 Developments in E-systems Engineering, 2011

Quantifying Usability and Security in Authentication.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

The Future of the Internet: Tussles and Challenges in the Evolution Path as Identified.
Proceedings of the Fourth International Conference on Digital Society, 2010

The development of research and innovation policies based on a benchmarking assessment: the case of mobile communications technology R&D in the new member states of the EU.
Technol. Anal. Strateg. Manag., 2008

Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading.
Inf. Syst. Frontiers, 2008

An economic modelling approach to information security risk management.
Int. J. Inf. Manag., 2008

Towards a standard approach for quantifying an ICT security investment.
Comput. Stand. Interfaces, 2008

Standard Approach for Quantification of the ICT Security Investment for Cybercrime Prevention.
Proceedings of the Second International Conference on the Digital Society (ICDS 2008), 2008

Application of Multi-Attribute Decision Making Approach to Learning Management Systems Evaluation.
J. Comput., 2007

An assessment of the usability of an Internet-based education system in a cross-cultural environment: The case of the Interreg crossborder program in Central Europe.
J. Assoc. Inf. Sci. Technol., 2007

Comparative Study and Techno-Economic Analysis of Broadband Backbone Upgrading: a Case Study.
Informatica (Slovenia), 2007

Long-term trusted preservation service using service interaction protocol and evidence records.
Comput. Stand. Interfaces, 2007

Analyses of user rationality and system learnability: performing task variants in user tests.
Behav. Inf. Technol., 2007

An Approach for Backbone Upgrading Technology Selection Based on Techno-economic Evaluation Model.
Proceedings of the First International Conference on the Digital Society (ICDS 2007), 2007

A Multi-attribute Decision Support Model for Learning Management Systems Evaluation.
Proceedings of the First International Conference on the Digital Society (ICDS 2007), 2007

An approach in provision of interoperability of eLearning systems in enlarged EU - the case of iCamp project.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

Privacy provision in e-learning standardized systems: status and improvements.
Comput. Stand. Interfaces, 2005

Future active Ip networks security architecture.
Comput. Commun., 2005

Implementation and Evaluation of Integrity Protection Facilities for Active Grids.
Proceedings of the Computational Science, 2004

Self-Management GRID Services - A Programmable Network Approach.
Proceedings of the Computational Science, 2004

Privacy Issues of a Smart Space for Learning.
Proceedings of the IEEE International Conference on Advanced Learning Technologies, 2004

Assessment of User Rationality and Adaptivity: A Case Study.
Proceedings of the Cognition and Exploratory Learning in Digital Age (CELDA'04), 2004

Approach for preservation the authenticity of digital objects - the Ekeeper service.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004

Implementing trustworthy internet based long term electronic preservation service - the ekeeper project.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004

Privacy-Enhancing Technologies - approaches and development.
Comput. Stand. Interfaces, 2003

Introducing New Business Models in Provision of QOS Networks.
Proceedings of the Digital Communities in a Networked Society: eCommerce, 2003

An active networks security architecture.
Informatica (Slovenia), 2002

Cadenus security considerations.
Proceedings of the Advanced Communications and Multimedia Security, 2002

Towards security architecture for future active IP networks.
Proceedings of the Advanced Communications and Multimedia Security, 2002

Users' responsiveness in the price-controlled best-effort QoS model.
Comput. Commun., 2001

An Infrastructure For Support Of Digital Signatures.
Informatica (Slovenia), 1999

A formalisation and evaluation of certificate policies.
Comput. Commun., 1999

Distributed group collaborative work through the "Symmetric TV" model.
Comput. Commun., 1999

Experience In Shaping The Virtual Lecturing Hall In An International Environment.
Proceedings of WebNet 99, 1999

Modeling Multimedia Networked Systems Through Large-Scale Trials of Distributed Events.
Proceedings of the Internet, Multimedia Systems and Applications, 1999

Standard specification extensions for provision of language and character enabled server.
Comput. Commun., 1997

Certification Authorities in a Global Network - Procedures and Guidelines for a Public Key Infrastructure.
Aust. Comput. J., 1997

Security policy space definition and structuring.
Comput. Stand. Interfaces, 1996

Security platforms in the telecommunication market: technologies, developments and regulations.
Comput. Commun., 1996

A Tool for Support of Key Distribution and Validity Certificate Check in Global Directory Service.
Comput. Networks ISDN Syst., 1996

Formal language for security services base modelling and analysis.
Comput. Commun., 1995

Comparison of three different approaches to the property prediction problem.
J. Chem. Inf. Comput. Sci., 1994

Tool Supporting the Internationalisation of the Generic Network Services.
Comput. Networks ISDN Syst., 1994

Certificates handling and their support within X.500 system.
Microprocess. Microprogramming, 1993

Open Secure Model And Its Functionality In Networks With Value-Added Services.
Informatica (Slovenia), 1993

Multilingual communications in an open system architecture.
Comput. Commun., 1990

Development of 3-dimensional molecular descriptors.
Comput. Chem., 1990

Computer networking for the European academic community: The EUREKA project cosine.
Comput. Chem., 1990