1. The role of intelligent data analysis in selected endurance sports : a systematic literature reviewAlen Rajšp, Patrik Rek, Peter Kokol, Iztok Fister, 2025, review article Abstract: In endurance sports, athletes and coaches shift increasingly from intuition-based decisionmaking to data-driven approaches powered by modern technology and analytics. Since 2018, the field has experienced significant advances, influencing endurance sports disciplines. This systematic literature review identified 75 peer-reviewed studies on intelligent data analysis in endurance sports training. Each study was categorized by its intelligent method (e.g., machine learning, deep learning, computational intelligence), the types of sensors and wearables used, and the specific training application and approach. Our synthesis reveals that machine learning and deep learning are among the most used approaches, with running and cycling identified as the most extensively studied sports. Physiological and environmental data, such as heart rate, biomechanical signals, and GPS, are often used to aid in generating personalized training plans, predicting injuries, and increasing athletes’ long-term performance. Despite these advancements, challenges remain, related to data quality and the small participant sample sizes. Keywords: smart sports training, endurance sports, intelligent data analysis, machine learning, artificial intelligence, computational intelligence, systematic literature review Published in DKUM: 02.10.2025; Views: 0; Downloads: 6
Full text (655,98 KB) |
2. Recent trends in information and cyber security maturity assessment : a systematic literature reviewAlenka Baggia, Alenka Brezavšček, 2025, review article Abstract: This work represents a comprehensive and systematic literature review (SLR)
that follows the PRISMA (Preferred Reporting Items for Systematic Reviews and MetaAnalyses) guidelines for research assessing information and cyber security maturity. The
period from 2012 to 2024 was considered and the final collection of 96 studies was taken
into account. Our findings were summarised in two stages, a quantitative analysis and
a qualitative synthesis. In the first part, various quantitative indicators were used to
analyse the evolution of the information and cyber security maturity assessment domain
over the last twelve years. The qualitative synthesis, which was limited to 36 research
papers, categorises the studies into three key areas: the development of new maturity
models, the implementation of established models and frameworks, and the advancement
of methodologies to support maturity assessments. The findings reveal significant progress
in sector-specific customisation, the growing importance of lightweight models for small
and medium-sized enterprises (SMEs), and the integration of emerging technologies. This
study provides important insights into the evolving landscape of information and cyber
security maturity assessment and provides actionable recommendations for academia and
industry to improve security resilience and support the adoption of tailored, effective
maturity models Keywords: cyber security, information security, maturity assessment, maturity model, maturity framework, systematic literature review, SLR Published in DKUM: 26.08.2025; Views: 0; Downloads: 3
Full text (2,49 MB) This document has many files! More... |
3. A taxonomy of critical success factors for implementing corporate sustainability strategies: a systematic reviewUrška Butolen, Igor Vrečko, Iztok Palčič, 2025, review article Abstract: Businesses are facing increasing pressure to transition to a sustainable economy, requiring the integration of environmental, social, and economic aspects into their corporate strategies. Despite the proliferation of sustainability frameworks, many companies struggle to implement them effectively due to a lack of strategic focus. This study develops a taxonomy of critical success factors (CSFs) for implementing corporate sustainability strategies in production companies, addressing a gap in current research that often focuses on strategy design rather than practical execution. A systematic literature review was conducted to identify critical success factors influencing successful implementation and categorise them, providing a comprehensive understanding of their roles. The proposed taxonomy includes five dimensions: organisational culture, organisational structure, performance management, resources (including digitalisation and technology), and stakeholder integration (including sustainable supply chain management). An explanation is provided of the role of identified CSFs in the successful implementation of corporate sustainability strategies and their interrelationships. The taxonomy serves as a tool for production companies to manage critical success factors influencing the successful implementation of sustainability. This research contributes to the growing body of knowledge on sustainability by providing practical insights for effective strategy implementation and calls for more empirical studies to explore this area further. Keywords: corporate sustainability strategy, strategy implementation, critical success factors, taxonomy, systematic literature review Published in DKUM: 08.07.2025; Views: 0; Downloads: 9
Full text (431,69 KB) This document has many files! More... |
4. Software self-hosting : a systematic review of quantitative research☆Luka Hrgarek, Lili Nemec Zlatolas, 2025, original scientific article Abstract: In an era marked by heightened concerns surrounding personal privacy and data security, software self-hosting has gained significance as a means for individuals and organizations to reclaim control over their digital assets. This systematic review aims to identify relevant research gaps in the quantitative analysis of self-hosting, primarily focusing on studies employing Structural Equation Modeling (SEM) and regression techniques. Employing a refined version of the Systematic Mapping Process, we analyzed 49 quantitative research papers whose concepts were grouped into 12 substantive groups. The findings reveal a predominant concentration on constructs related to the Technology Acceptance Model (TAM), with limited exploration of self-hosting specifically, overshadowed by an emphasis on cloud computing, the Internet of Things (IoT), and privacy aspects. Our review provides a comprehensive overview of the existing literature and highlights the need for more focused research on self-hosting itself. This systematic review serves as a foundational resource for researchers and practitioners aimed at advancing the discourse on self-hosting. Keywords: self-hosting, social networking sites, privacy, quantitative, data sovereignty, technology acceptance model, systematic literature review Published in DKUM: 23.04.2025; Views: 0; Downloads: 28
Full text (1,98 MB) |
5. Measuring climate knowledge : a systematic review of quantitative studiesMaruša Lubej, Žiga Petraš, Andrej Kirbiš, 2025, original scientific article Abstract: Climate change is a pressing issue that necessitates a climate-literate population. This systematic literature review investigates how climate knowledge, a key component of climate literacy, is measured in scientific research. Analysis of 92 studies reveals that climate knowledge is primarily assessed as objective knowledge (facts and evidence). A minority of studies measured subjective knowledge. Most often, the target population was general adult population, followed by students and teachers. Furthermore, most studies are concentrated in North America and Europe, while climate knowledge remains underexplored in other regions. This review highlights the lack of consistency in the measurement of climate knowledge, particularly in defining its dimensions. Our findings underscore the need for future research to focus on developing a standardized, reliable, valid, and comprehensive instrument for measuring climate knowledge. This would enable the comparison of findings across different regions and populations. Keywords: climate changes, climate literacy, climate knowledge measurment, systematic literature review Published in DKUM: 17.03.2025; Views: 0; Downloads: 7
Full text (2,60 MB) This document has many files! More... |
6. Effectiveness of health promotion interventions in primary schools : a mixed methods literature reviewJoca Zurc, Camilla Laaksonen, 2023, review article Abstract: School-based health promotion interventions (HPIs) are commonly used in schools, but scientific evidence about the structures of effective interventions is lacking. Therefore, we conducted a mixed methods systematic literature review to recognize the HPI structures related to their effectiveness. Based on the inclusion criteria, 49 articles were selected for the literature review. The articles, published in 2011–2022, described 46 different school-based interventions conducted in 20 different countries. The average duration of the interventions was 12 months, and they were implemented mostly with an RCT study design (61.2%) and by targeting children (69.4%). Three main groups of interventions were identified and explained: (1) extensive and long-term interventions; (2) school policy-changing interventions; and (3) highly effective interventions. Effective school-based HPIs included multiple target groups, multiple providers with external experts, and an efficient duration and timing of follow-ups. The implications for educational research and school practice are presented. Evidence on the effectiveness of health-related interventions is still lacking and needs to be addressed in further studies. Keywords: education, school health, health promotion, health education, intervention effectiveness, systematic literature review, mixed methods review Published in DKUM: 21.03.2024; Views: 299; Downloads: 35
Full text (935,20 KB) This document has many files! More... |
7. Violence against the elderly - analysis of further research needs based on a systematic review of researchTeja Primc, Branko Lobnikar, Kaja Prislan Mihelič, 2021, review article Abstract: Purpose of the Paper: The purpose of this paper is to investigate the current state of research on the topic of elder abuse both in the institutional and domestic environment and to present the key findings of existing studies. The paper also aims to shed light on areas requiring additional research and present the directions for further research. Methods: A systematic literature review was conducted using the PRISMA method in the Web of Science and Scopus databases. The review included 29 papers published between 2010 and 2021. Findings: Elder abuse is an under-researched topic. The lack of research is particularly apparent in the incidence and nature of the problem in the home environment. Previous studies focus on the various forms of abuse, its perpetrators and risk factors. Rates of psychological abuse, neglect and physical abuse are high in nursing homes and among older visitors to ambulatory care facilities and emergency departments, while self-neglect, neglect and psychological abuse are prevalent in the home environment. Women between the ages of 70 and 75, who are socially isolated and require daily care, are more exposed to abuse. The perpetrators of the abuse are most often family members. Limitations/Applicability of the Research: The ‘paper’s findings provide insight into research on elder abuse and can serve as a basis for planning research into this phenomenon. The paper highlights research gaps and introduces opportunities for improvements in the systemic approaches when addressing the issue. Originality/Relevance of the Paper: The paper presents the systematic and up to date analysis of past studies on elder abuse. The results are intended for professionals and researchers working in the field. Keywords: violence, abuse, neglect, elderly, systematic literature review Published in DKUM: 26.01.2022; Views: 1046; Downloads: 37
Link to file This document has many files! More... |
8. Effectiveness of proactive password checker based on Markov models : doktorska disertacijaViktor Taneski, 2019, doctoral dissertation Abstract: In this doctoral dissertation we focus on the most common method of authentication, the username-password combination. The reason for the frequent use of this authentication mechanism is its simplicity and low cost of implementation. Although passwords are so useful, they have many problems. Morris and Thompson, for the first time almost four decades ago, found that textual passwords were a weak security point of information systems. They have come to the conclusion that users are one of the biggest threats to information system’s security. Since then, we face these problems on a daily basis. Users do not perform the behaviours they need to be done in order to stay safe and secure, although they are aware of the security issues. Because this is a research area that security experts have been dealing with for a long time, in this dissertation we wanted to identify problems related to textual passwords and possible suggested solutions. For this purpose, we first performed a systematic literature review on textual passwords and their security. In doing so, we wanted to evaluate the current status of passwords in terms of their strength, ways of managing passwords, and whether users are still the “weakest link”. We found that one of the less researched solutions is proactive password checking. A proactive password checker could filter out the passwords that are easy-to-guess and only let through the passwords that are harder to guess. In order for a proactive password checking to be more effective, it is necessary for the checker to be able to check the probability that a certain password will be selected by the user. For this purpose, the better password checkers usually use certain tools to calculate password probability i.e., password strength. To find out which method is most suitable for calculating password strength, we have looked at similar solutions throughout history. We have found that Markov models are one of the most common methods used for password strength estimation, although we may encounter some problems when using them, such as sparsity and over-fitting. By reviewing similar solutions, we found that Markov models are mostly trained on only one dataset. This could limit the performance of the model in terms of correctly identifying bad or very strong passwords. As training datasets are important in the development of Markov models, it is clear that they will have some effect in the final assessment of the password’s strength. What we explore in our dissertation, is the importance of this effect on the final password strength estimation. Mainly, we focus on exploring the effect of different but similar datasets on password strength estimation. For the purposes of our study, we analysed publicly available sets of “common passwords” and processed them regarding the frequency distribution of the letters contained in these passwords. We built different Markov models based on these datasets and frequency distribution. This helped us determine if one Markov model was sufficient or if several models were needed to effectively estimate password strength for a wide range of passwords. The results showed statistical differences between the models. In more detail, we found that:
- different Markov models (trained on different databases) showed statistically different results when tested on the same dataset,
- more diverse datasets are needed to be able to calculate the strength of as many passwords as possible, since one “universal” model, trained on one “universal” dataset is less effective at classifying passwords in different categories (i.e., weak, medium, strong),
- different Markov models of 1st and 2nd order, in most cases, give no statistically different outputs,
- overall, Markov models can be used as a basis for constructing a more effective password checker that uses multiple different and specific Markov models, which could be more effective if we want to cover a wider range of passwords. Keywords: passwords, password analysis, password security, password problems, password strength, systematic literature review, Markov models Published in DKUM: 13.01.2020; Views: 1649; Downloads: 252
Full text (1,12 MB) |
9. Business process model and notation : the current state of affairsMateja Bule, Gregor Jošt, Marjan Heričko, Gregor Polančič, 2015, original scientific article Abstract: With business process modelling, companies and organizations can gain explicit control over their processes. Currently, there are many notations in the area of business process modelling, where Business Process Model and Notation (BPMN) is denoted as the de facto standard. Aims: The aim of this research is to provide the state-of-the-art results addressing the acceptance of BPMN, while also examining the purposes of its usage. Furthermore, the advantages, disadvantages and other interests related to BPMN were also investigated. Method: To achieve these objectives, a Systematic Literature Review (SLR) and a semantic examination of articles% citations was conducted. Results: After completing SLR, out of a total of 852 articles, 31 were deemed relevant. The majority of the articles analyzed the notation and compared it with other modelling techniques. The remainder evaluated general aspects of the notation, e.g. history and versions of the standard, usage of the notation or tools. Conclusion: Our findings demonstrate that there are empirical insights about the level of BPMN acceptance. They suggest that BPMN is still widely perceived as the de facto standard in the process modelling domain and its usage is ever-increasing. However, many studies report that only a limited set of elements are commonly used and to this end, several extensions were proposed. The main purpose of BPMN remains the description of business processes. Keywords: business process modeling, BPMN, acceptance, use, systematic literature review Published in DKUM: 06.07.2017; Views: 2083; Downloads: 842
Full text (841,57 KB) This document has many files! More... |