1. Software self-hosting : a systematic review of quantitative research☆Luka Hrgarek, Lili Nemec Zlatolas, 2025, original scientific article Abstract: In an era marked by heightened concerns surrounding personal privacy and data security, software self-hosting has gained significance as a means for individuals and organizations to reclaim control over their digital assets. This systematic review aims to identify relevant research gaps in the quantitative analysis of self-hosting, primarily focusing on studies employing Structural Equation Modeling (SEM) and regression techniques. Employing a refined version of the Systematic Mapping Process, we analyzed 49 quantitative research papers whose concepts were grouped into 12 substantive groups. The findings reveal a predominant concentration on constructs related to the Technology Acceptance Model (TAM), with limited exploration of self-hosting specifically, overshadowed by an emphasis on cloud computing, the Internet of Things (IoT), and privacy aspects. Our review provides a comprehensive overview of the existing literature and highlights the need for more focused research on self-hosting itself. This systematic review serves as a foundational resource for researchers and practitioners aimed at advancing the discourse on self-hosting. Keywords: self-hosting, social networking sites, privacy, quantitative, data sovereignty, technology acceptance model, systematic literature review Published in DKUM: 23.04.2025; Views: 0; Downloads: 1
Full text (1,98 MB) |
2. Models of privacy and disclosure on social networking sites: a systematic literature reviewLili Nemec Zlatolas, Luka Hrgarek, Tatjana Welzer-Družovec, Marko Hölbl, 2022, original scientific article Abstract: Social networking sites (SNSs) are used widely, raising new issues in terms of privacy and
disclosure. Although users are often concerned about their privacy, they often publish information
on social networking sites willingly. Due to the growing number of users of social networking sites,
substantial research has been conducted in recent years. In this paper, we conducted a systematic
review of papers that included structural equations models (SEM), or other statistical models with
privacy and disclosure constructs. A total of 98 such papers were found and included in the analysis.
In this paper, we evaluated the presentation of results of the models containing privacy and disclosure
constructs. We carried out an analysis of which background theories are used in such studies and
have also found that the studies have not been carried out worldwide. Extending the research to
other countries could help with better user awareness of the privacy and self-disclosure of users
on SNSs. Keywords: structural equations modeling, social networking sites, privacy, disclosure Published in DKUM: 28.03.2025; Views: 0; Downloads: 2
Full text (2,50 MB) This document has many files! More... |
3. Proceedings in the case of Benedik v. Slovenia : Bachelor thesis undergraduate study programme Criminal Juctice and Security, B.A.Ana Jovanovska, 2024, undergraduate thesis Abstract: The case of Benedik v. Slovenia is a perfect example of the complexity between the right to privacy and covert investigative measures carried out by law enforcement in the digital age. Thus, this thesis aims to precisely explain the legislation governing the right to privacy under both internal law and the European Convention on Human Rights, with a particular emphasis on covert investigative measures. By exploring and defining the legal frameworks that protect the privacy rights of individuals, we aim to clarify the balance between state surveillance powers and individuals' privacy rights. The study systematically shows the evolution and current state of the legal provisions regarding covert investigative measures in Slovenia. The main focus of this thesis is the legal proceedings in the case of Benedik v. Slovenia. It serves as a prism through which the complexities of privacy protection, specifically, electronic privacy are analyzed in the context of data disclosure and internet usage. The study examines the legal proceedings at all court instances, including Kranj District Court, Ljubljana Higher Court, Supreme Court, and Constitutional Court of the Republic of Slovenia leading to a complaint that the applicant, Benedik, filed at the Strasbourg Court. The later ruling of the European Court of Human Rights addressed the interaction between domestic laws and international human rights norms in detail. An in-depth understanding of how covert investigative measures are integrated with the right to privacy is provided through an analysis of the arguments made, the legal reasoning used by the courts, and the verdicts issued. This thesis's comprehensive explanation offers valuable insights into the balance between state surveillance needs and the protection of individuals' right to privacy, highlighting the complexities of these issues in the modern digital age. Keywords: Benedik v. Slovenia, analysis of the judicial proceedings, human rights, right to privacy, covert investigative measures Published in DKUM: 28.08.2024; Views: 104; Downloads: 31
Full text (918,30 KB) |
4. Data breaches in healthcare: security mechanisms for attack mitigationLili Nemec Zlatolas, Tatjana Welzer-Družovec, Lenka Lhotska, 2024, original scientific article Abstract: The digitalisation of healthcare has increased the risk of cyberattacks in this sector, targeting sensitive personal information. In this paper, we conduct a systematic review of existing solutions for data breach mitigation in healthcare, analysing 99 research papers. There is a growing trend in research emphasising the security of electronic health records, data storage, access control, and personal health records. The analysis identified the adoption of advanced technologies, including Blockchain and Artificial Intelligence, alongside encryption in developing resilient solutions. These technologies lay the foundations for addressing the prevailing cybersecurity threats, with a particular focus on hacking or malicious attacks, followed by unauthorised access. The research highlights the development of strategies to mitigate data breaches and stresses the importance of technological progress in strengthening data security. The paper outlines future directions, highlighting the need for continuous technological progress and identifying the gaps in the attack mitigations. Keywords: data security, privacy, sensitive personal information, electronic health records, cybersecurity Published in DKUM: 23.08.2024; Views: 109; Downloads: 9
Full text (1,51 MB) |
5. Cyber (in)security of personal data and information in times of digitizationMiha Dvojmoč, Mojca Tancer Verboten, 2022, original scientific article Abstract: In an employment relationship, work and pay are no longer the only important aspects, as importance is increasingly shifting toward obligations concerning the protection of personal data and privacy arising from the prohibition of causing harm to the employer and the duty of loyalty to the employer. The article deals with the constitutionally protected right to privacy and the protection of personal data from the point of view of ensuring cyber security at the employer. The employer is obligated to protect the right to privacy by legal provisions, whereas from the point of view of ensuring the protection of privacy and information, the employer must protect, first and foremost, the personal data of employees. The main purpose of the legal protection of personal data is the lawful and fair processing of the personal data of individuals. Employers are thus facing an increasing number of risks related to the safety of employees and the security of business processes, and it is therefore important to establish comprehensive corporate security to ensure adequate security across all levels. Keywords: cyber security, protection of personal data, protection of privacy, cyber threats, protection of business secrets Published in DKUM: 11.06.2024; Views: 150; Downloads: 30
Full text (375,13 KB) This document has many files! More... |
6. Privacy and data protection concerns in the regulatory framework of Slovenian energy lawZoran Dimović, 2023, original scientific article Abstract: The implementation of smart energy systems (SES) in the Slovenian energy sector has raised significant privacy and data protection concerns. The collection and processing of personal data from energy consumers, as well as cybersecurity threats, pose risks that must be addressed. The legal framework governing privacy and data protection in the energy field in Slovenia is based on the GDPR, ZOEE, ZVPot-1, ZVOP-2 and others, which impose significant obligations on entities processing personal data. To mitigate these risks, exact terminology must be used to implement privacy, data protection and also cybersecurity measures and ensure compliance with the legal framework. Keywords: cybersecurity, data protection, energy law, green and digital transformation, privacy protection Published in DKUM: 20.02.2024; Views: 341; Downloads: 34
Full text (456,29 KB) This document has many files! More... |
7. Patient's right to protection of personal data in the legal system of Bosnia and HerzegovinaMarko Bevanda, Maja Čolaković, 2017, original scientific article Abstract: Health-related personal data belong to a category of sensitive data which, therefore, must be specially protected. The protection of personal health data is one of the patients´ fundamental rights. Doctors protect their patients´ interests only when the information gained about patients, while providing them medical treatment, are kept secret. In this paper, the authors provide an overview of the legal framework for the protection of health-related personal data in the legal system of Bosnia and Herzegovina. In addition to the analysis of the relevant legal provisions and considering the situation in practice, it can be concluded that formal harmonisation of legislation with the acquis communautaire in this field is not followed by effective implementation of regulation in practice. Keywords: privacy, doctor, medical malpractice, liability for damage Published in DKUM: 09.10.2018; Views: 1070; Downloads: 156
Full text (573,46 KB) This document has many files! More... |
8. Medical-legal aspects of confidentiality in the field of pharmaceutical health careHajrija Mujovic, 2017, original scientific article Abstract: The field of pharmaceutical health care is becoming increasingly established. Modernly, pharmacists learn more from patients about their prescriptions and other very personal, sensitive information. However, having access to an ever-increasing amount of sensitive, personal information raises serious issues pertaining to patient secrets and confidentiality. The term professional secrecy (hereinafter confidentiality) as well as any other form of discretion connected with a professional activity is construed broadly. However, the precise scope of confidentiality is not strictly defined in legislation. Obligation of professional secrecy has been diminished partly due to the general progress in a society and the progress of medical professions. The development of the protection of human rights is a continuous process. Keywords: pharmaceutical services, privacy, confidentiality, professional secrecy, liability Published in DKUM: 02.08.2018; Views: 986; Downloads: 72
Full text (372,26 KB) This document has many files! More... |
9. Jurisdiction in on-line defamation and violations of privacy : in search of a right balanceJerca Kramberger Škerl, 2017, original scientific article Abstract: This article will address the rules of EU private international law regarding the international jurisdiction in defamation and the violations of the right to privacy committed via the internet. Being that there is no common conflict of laws rule regarding these issues and a number of different courts hold jurisdiction, great efforts are being taken to prevent the so called "forum shopping", or, as regards to defamation, "libel tourism". It is namely very hard to strike a fair balance between the procedural rights of both parties, since this is strongly connected with striking a balance between the freedom of speech, on one hand, and personality rights, on the other, all of which are fundamental rights. During the internet era, the problems regarding cross-border issues on defamation and privacy cases rose to a whole new dimension. The interpretation of the traditional connecting factor, the place where the harmful event occurred, became very difficult. Over the years, the Court of Justice of the EU has issued several milestone judgments interpreting Article 7(2) of the Brussels I Recast Regulation in such a way that the particularities of violations committed via the internet are taken into account. Keywords: defamation, personality rights, privacy, jurisdiction, private international law, libel tourism, forum shopping, Brussels I Recast, torts, delicts Published in DKUM: 02.08.2018; Views: 1263; Downloads: 87
Full text (511,68 KB) This document has many files! More... |
10. The prospects for consumer-oriented social mediaRoger Clarke, 2014, original scientific article Abstract: Background and Purpose: The term ‘social media’ refers to a cluster of applications and online services that support human interaction and content broadcasting and sharing. Current services are isolated islands or ‘walled gardens’, and are based on a business model that is highly exploitative of individuals and their data.
Design/Methodology/Approach: Surveys of the refereed literature have been undertaken on several occasions during the period 2012-13. Reviews were conducted of social media services that are reasonably described as ‘consumer-oriented’. Media reports on those services were uncovered. The available information was then subjected to analysis, including reflection based on prior research conducted by the author.
Results: Required characteristics of consumer-oriented social media, and barriers to emergence and adoption of such services were identified. That provided a basis for proposing means to overcome those barriers. Key impediments to the emergence of such services were identified, and means of overcoming the impediments outlined.
Conclusion: An alternative, consumer-oriented approach is feasible, involving open architecture, inter-operability and portability features, fair terms and privacy-sensitivity. Keywords: social media, social networking service, interoperability, terms of service, privacy Published in DKUM: 22.01.2018; Views: 1676; Downloads: 408
Full text (399,50 KB) This document has many files! More... |