1. Does individual IT experience affect shadow IT usage? : empirical evidence from universities with legal entities in IndonesiaNurfitriansyah, Munir, Disman, Puspodewi Dirgantari, 2023, izvirni znanstveni članek Opis: Background and purpose: Employee dissatisfaction with extant technology is one of the causes of shadow IT use. The selection of alternative technologies is determined by individual IT knowledge. In this study, we intend to examine the relationship between individual IT experience and the use of shadow IT in Indonesian higher education through two job characteristics, namely task identity and autonomy. Methods: This study collects and analyses data from 301 respondents at Indonesian universities with legal status using a quantitative methodology. The direct relationship in the research model was investigated using Smart-PLS data analysis. Results: The results of the study indicate that individual IT experience strongly supports the use of shadow IT by tertiary institutions with legal entities employees in Indonesia, either through task identity or job autonomy. Conclusion: In order for employees to feel satisfied, the organization must prioritize employee IT experience and the information technology requirements they require to complete their work. This can be accomplished by involving employees in the development of information technology. Ključne besede: individual IT experience, task identity, autonomy, shadow IT Objavljeno v DKUM: 20.10.2025; Ogledov: 0; Prenosov: 3
Celotno besedilo (1,57 MB) Gradivo ima več datotek! Več... |
2. From model to mechanism : enforcing delegated authority in ssi with language-based securityMuhamed Turkanović, Vid Keršič, Alen Horvat, Dominik Beron, Špela Čučko, 2025, izvirni znanstveni članek Opis: Delegation of authority remains a critical yet insufficiently addressed capability in SelfSovereign Identity (SSI) systems. Building on an existing delegation model that introduced the concept of a Verifiable Mandate (VM) for expressing authority and access rights, this paper extends the approach with a rigorous formalization of delegation semantics, enabling unambiguous reasoning over roles, grants, and constraints. The formal model is aligned with standards from the World Wide Web Consortium (W3C), and its constructs are embedded into an extended credential schema that preserves compatibility with the Verifiable Credentials (VC) data model while introducing delegation-specific attributes. A generalized VM schema is defined, supporting both generic and business-specific instantiations, and ensuring structural and semantic interoperability. Policy compliance is operationalized through a policy-based enforcement architecture, where rules are authored in the Rego language and evaluated at runtime by the Open Policy Agent (OPA). The architecture incorporates trusted registries for schema and policy distribution, allowing verifiers to define and enforce context-specific delegation rules in a modular and interoperable manner. Validation through realistic scenarios, such as postal service and academic use cases, demonstrates how formal semantics, schema validation, and language-based policy enforcement can be combined to enable secure, verifiable, and context-aware delegation in SSI ecosystems. Ključne besede: self-sovereign identity, delegation, verifiable mandate, formalization, policy-based enforcement, verifiable credentials, blockchain, language-based security Objavljeno v DKUM: 02.10.2025; Ogledov: 0; Prenosov: 9
Celotno besedilo (1,46 MB) |
3. Simplification of the registration process for digital government services with the help of a mobile application : master's thesisNik Jeromel, 2025, magistrsko delo Opis: This master's thesis explores the simplification of the registration process for digital government services in Slovenia through a mobile application. It examines the existing SI-TRUST registration process, identifies challenges such as mandatory in-person identification, and proposes a mobile solution using facial recognition and AI verification to improve accessibility and efficiency. The research includes user experience testing via the System Usability Scale (SUS) method and evaluates the feasibility, security, and legal compliance of the proposed approach. Ključne besede: digital identity, SUS, facial recognition, user experience, e-government Objavljeno v DKUM: 30.09.2025; Ogledov: 0; Prenosov: 14
Celotno besedilo (2,17 MB) |
4. Multilevel investigation of leadership prototype perception : political behavior in relation to effectiveness and trustAykut Arslan, 2024, izvirni znanstveni članek Opis: Background/Purpose: Empirical evidence suggests that a leader’s political skills may act as a moderator that
might decrease the effect of prototypicality’s impact on trust and on leadership effectiveness. The study investigated leading political skills as second-level regulatory variables in connection to leader effectiveness and trust with the purpose of testing a cross-level moderated mediation model within a traditionally collectivist culture like Turkey in efforts to contextualize and expand understanding of leadership prototype perception.
Methods: A total of 442 service sector employees and 28 executive managers were interviewed. Two surveys in two
separate time periods were conducted. Multilevel path analysis was used to evaluate the hypotheses.
Results: The findings suggest that there is a strong and significant impact of leader prototypicality on leadership
effectiveness and a direct impact on trust. Results indicate that leaders who are trusted by their subordinates are
perceived as more effective in their leadership roles. Lower levels of trust from subordinates are negatively associated with leader effectiveness.
Conclusion: If leaders cannot provide their followers a contextualized sense of empowerment and development,
they are perceived to not provide high levels of emotional trust. Therefore, there is greater need for multilevel contextualized studies taking account of collective, two-sided, embedded experiences within groups. Ključne besede: leader political behavior, political skills, leader effectiveness, trust, social identity theory, Turkiye Objavljeno v DKUM: 14.08.2025; Ogledov: 0; Prenosov: 3
Celotno besedilo (1,29 MB) Gradivo ima več datotek! Več... |
5. A novel model for authority and access delegation utilizing self-sovereign identity and verifiable credentialsŠpela Čučko, Muhamed Turkanović, 2025, izvirni znanstveni članek Opis: Self-Sovereign Identity (SSI) is a decentralized, user-centric approach to Identity Management (IdM), that allows users to gain control over their digital identity and data. It brings many advantages and reduces the shortcomings of traditional, centralized IdM systems. Despite its positive features, SSI focuses predominantly on direct interactions between two independent entities. It enables direct identification, authentication, authorization, and access to resources and services where the identity holders are the authenticated bearers of their credentials. On the other hand, it does not address primarily indirect identity control, such as delegation, which is an essential part of life situations and natural human relationships. Delegation is particularly common in organizational contexts, and usually arises from the need for greater efficiency, relief, or distribution of work, collaboration, and cooperation and the inability to perform work, tasks, responsibilities, and duties for various reasons. However, it is relatively unexplored within the SSI framework, and requires additional research efforts and the development of new approaches. Consequently, our research aimed to reduce the aforementioned gap and address delegation in the SSI ecosystem comprehensively. Thus, we present a novel authority and access delegation model utilizing Verifiable Credentials, that enable delegation support for existing use cases, workflows, and processes of organizations and companies, providing resources and services to end users. The model includes delegation building blocks, data objects and data flow, delegation phases and processes, and technology-independent components. It is validated with a case study in the field of Education Ključne besede: access delegation, authority delegation, delegation, self-sovereign identity, verifiable credential, verifiable mandate Objavljeno v DKUM: 25.07.2025; Ogledov: 0; Prenosov: 2
Celotno besedilo (7,67 MB) |
6. Reconciling the Other : travelling objects and collaborative teachingMoe Iezaki, Magdalena Novotná, 2022, izvirni znanstveni članek Opis: A collaborative art education project involving Japan and the Czech Republic focused on the enculturation processes experienced by two teachers and their students, how immersion in visual arts can contribute to cultural understanding and the reconciliation of two pedagogical approaches to art. This project also addressed this reconciliation with the unknowable ‘Other’ through the creation of artwork, ‘travelling objects’ and collaborative teaching. Outcomes include similarities between objects from the two countries and two pedagogical approaches and suggest that participants strived to reconcile the Other, thus creating a spatial and relational intermediate space by dealing with those objects and communicating together. Ključne besede: cultural inclusion, cultural identity, art education, collaborative learning, Other Objavljeno v DKUM: 24.07.2025; Ogledov: 0; Prenosov: 1
Celotno besedilo (595,34 KB) Gradivo ima več datotek! Več... |
7. The analysis of nostalgia in George Orwell’s novel Coming up for air from the perspective of discourse and philosophy : master's thesisGaber Bobek, 2025, magistrsko delo Opis: The thesis explores the theme of nostalgia in George Orwell’s novel Coming Up for Air from various analytical perspectives. The research is made possible by the novel’s detailed story, which captures the tensions between the individual and a rapidly modernising world in pre-World War II Britain. The work is structured into three main sections. First, the theoretical framework provides an overview of different definitions and interpretations of nostalgia from literature, history, and cultural studies. Second, various philosophical perspectives examine the relationship between nostalgia, personal identity, and the individuals’ ways of approaching the memory. From the standpoint of existentialism and the self, the thesis investigates how the protagonist, George Bowling, experiences nostalgia as a mechanism for self-definition. The thesis argues that nostalgia distorts the temporal order, merging past and present into a seamless but fictional continuum. The political philosophy and modernity perspectives place the main character’s nostalgia within the broader socio-political status of 20th century Britain. Orwell employs nostalgia to critique the oppressive forces of industrialisation, totalitarian governance, and capitalist consumerism. Third, the linguistic analysis applies Systemic Functional Linguistics (SFL), using the discourse system framework developed by authors Martin and Rose (2007), to examine how Orwell’s language constructs the protagonist’s nostalgic experience. The analysis looks at how Orwell’s linguistic features show Bowling’s emotional attachment to the past and his disappointment with the present. Engagement is analysed to reveal how the protagonist’s reflections position the reader within his subjective perspective. Ključne besede: Nostalgia, George Orwell, Coming Up for Air, Existentialism, Memory, Self-Identity, Political Philosophy, Systemic Functional Linguistics, Time, History. Objavljeno v DKUM: 29.05.2025; Ogledov: 0; Prenosov: 35
Celotno besedilo (2,45 MB) |
8. Framing the tourist spatial identity of a city as a tourist productMelita Rozman Cafuta, 2022, izvirni znanstveni članek Opis: Purpose – The purpose of this paper is to develop a methodology for shaping the tourist spatial identity of the city and to take advantage of it to discover alternative urban outdoor spaces. As the number of indoor visitors has been limited due to the COVID-19 pandemic, open urban areas such as streets, squares and parks have become more important tourist locations. Design/methodology/approach – The assessment methodology consists of two basic steps. In the first step, the authors look for places or points that are carriers of spatial identity. For this purpose, the method of mental mapping is used. In the second step, statistical methods are used to evaluate the spatial suitability for the most common tourist activities. To obtain a holistic picture, a temporal component is included. Findings – The application of the methodology is presented in the form of a case study. The obtained research results provide an insight into the spatial situation of the city of Maribor (Slovenia, Europe). Tourist spatial identity of a city depends on time. Based on the value of spatial sensitivity indicator and the suitability of activities, it is possible to adapt the tourist offer to the temporal component. Originality/value – To the best of the authors’ knowledge, this is an original perspective on the spatial identity of tourists. The presented approach could be integrated as a good practice in any other city worldwide. It supports the identification of suitable outdoor tourist places that are memorable, cosy, multifunctional and can be recommended by city guides (mobile or printed books). Every city has many hidden gems that tourists have yet to discover Ključne besede: urban tourism, evaluation methodology, image of the city, mental mapping, spatial identity Objavljeno v DKUM: 12.03.2025; Ogledov: 0; Prenosov: 8
Celotno besedilo (611,33 KB) Gradivo ima več datotek! Več... |
9. Orchestrating Digital Wallets for On- and Off-Chain Decentralized Identity ManagementVid Keršič, Urban Vidovič, Andraž Vrečko, Martin Domajnko, Muhamed Turkanović, 2023, izvirni znanstveni članek Opis: Digital identity is becoming one of the core elements during the digitalization age, when more and more processes and interactions are taking place in the digital sphere. Therefore, current identity management approaches will define how these interactions will look in the future, but different fields and communities often approach management with their own solutions and tools, despite their similarities. This includes decentralized digital identities, where the identity is managed with asymmetric cryptographic keys, and no centralized entity oversees the whole identity system. This paper focuses on managing on- and off-chain decentralized digital identities, with the former being used for blockchain networks and the latter for self-sovereignty and privacy. While both types of decentralized identity build on the same cryptographic and identity primitives, there is no single wallet that handles both. Therefore, this paper proposes an orchestration solution for both wallet types, which enables their convergence to a single universal wallet and validates it with a real-life decentralized identity use case. Ključne besede: decentralized identity, self-sovereign identity, wallet, identity, identity management, web3 Objavljeno v DKUM: 13.06.2024; Ogledov: 231; Prenosov: 17
Celotno besedilo (3,25 MB) Gradivo ima več datotek! Več... |
10. Towards a Catalogue of Self-Sovereign Identity Design PatternsŠpela Čučko, Vid Keršič, Muhamed Turkanović, 2023, izvirni znanstveni članek Opis: Self-sovereign identity (SSI) is a user-centric, decentralised identity approach that provides a means for identification, authentication, and authorisation without the involvement of external entities, responsible for identity provisioning and management in current centralised and federated approaches. In general, the basic building blocks of an SSI system include decentralised identifiers, verifiable credentials, identity wallets, a verifiable data registry, and three main actors: issuer, identity holder, and verifier. Even though the SSI field is dominated by proposals, SSI systems can be implemented in different ways, which is reflected in the absence of a well-defined architecture. Thus, the best implementation is still a matter of research, the requirements of the individual system, and its field of application. However, well-designed and implemented systems are crucial to avoiding failures, speeding up the development process, ensuring high quality, and the broader adoption of SSI solutions. Hence, the main objective of this study was to identify design patterns and good practices of the SSI ecosystems by reviewing and analysing the literature, technical documentation, and existing SSI implementations. Therefore, the study is built on existing knowledge, and presents a comprehensive catalogue of thirty-five SSI design patterns that can serve as a starting point for a possible SSI system design. Ključne besede: self-sovereign identity, decentralised identity, design patterns, decentralised identifiers, verifiable credentials, blockchain, verifiable data registry, identity wallets Objavljeno v DKUM: 05.12.2023; Ogledov: 448; Prenosov: 82
Celotno besedilo (2,31 MB) Gradivo ima več datotek! Več... |