U provođenju sigurnosnih mjera u informatičkoj tehnologiji, svijest i stečene radne navike korisnika neizbježne su komponente. Ipak, može ih se označiti i kao najslabije. Premda informatička tehnologija nastoji činiti najviše što može da bi osigurala maksimum sigurnosti, svijest korisnika o tome je ključna. Uz to, iako se u literaturi mogu naći radovi koji se bave načinima podučavanja sigurnosti u informatici, nema ih mnogo koji razmatraju utjecaj stupnja obrazovanja. Stoga se u ovom radu ispituje utjecaj stupnja obrazovanja na to koliko su korisnici svjesni potrebe primjene zaštitnih mjera pri korištenju proizvoda informatičke i komunikacijske tehnologije (ICT). U tu je svrhu provedeno ispitivanje na grupi od 433 građana, pripadnika raznih...
The development of Information and Communication Technologies (ICTs) is becoming very common through...
While the number of the people and even the instutitions using computer and computer components were...
In today’s business environment where all operations are enabled by technology, information security...
AbstrakIn assuring the security in information technology, user awareness and acquired-user habits a...
Cilj ovog rada bio je opisati važnost računalne pismenosti s aspekta sigurnosti. Opisat će se infor...
Notion of information as the meaning of processing the raw data has been an important for the people...
Due to the widespread integration of ICT in education, both the participants in the teaching-learnin...
Elektronsko obrazovanje postalo je sastavni deo modernog društva znanja. S obzirom na to da se najv...
Elektronsko obrazovanje postalo je sastavni deo modernog društva znanja. S obzirom na to da se najve...
According to the results of a representative survey by ESET Hungary Ltd. and statistics by Eurostat,...
V teoretičnem delu diplomskega dela je opisano ozaveščanje o informacijski varnosti, njegovo stanje ...
Over the past year, cyberattacks have increased and one of the reasons is a lack of security awarene...
U suvremenom svijetu broj novih korisnika računalnih sustava i Interneta vrtoglavo raste. Može se re...
The development of Information and Communication Technologies (ICTs) is becoming very common through...
There are many existing high quality technical security solutions, but ongoing cyberwar is still not...
The development of Information and Communication Technologies (ICTs) is becoming very common through...
While the number of the people and even the instutitions using computer and computer components were...
In today’s business environment where all operations are enabled by technology, information security...
AbstrakIn assuring the security in information technology, user awareness and acquired-user habits a...
Cilj ovog rada bio je opisati važnost računalne pismenosti s aspekta sigurnosti. Opisat će se infor...
Notion of information as the meaning of processing the raw data has been an important for the people...
Due to the widespread integration of ICT in education, both the participants in the teaching-learnin...
Elektronsko obrazovanje postalo je sastavni deo modernog društva znanja. S obzirom na to da se najv...
Elektronsko obrazovanje postalo je sastavni deo modernog društva znanja. S obzirom na to da se najve...
According to the results of a representative survey by ESET Hungary Ltd. and statistics by Eurostat,...
V teoretičnem delu diplomskega dela je opisano ozaveščanje o informacijski varnosti, njegovo stanje ...
Over the past year, cyberattacks have increased and one of the reasons is a lack of security awarene...
U suvremenom svijetu broj novih korisnika računalnih sustava i Interneta vrtoglavo raste. Može se re...
The development of Information and Communication Technologies (ICTs) is becoming very common through...
There are many existing high quality technical security solutions, but ongoing cyberwar is still not...
The development of Information and Communication Technologies (ICTs) is becoming very common through...
While the number of the people and even the instutitions using computer and computer components were...
In today’s business environment where all operations are enabled by technology, information security...