Borka Jerman Blažič
#57,080
Most Influential Person Now
Slovenian internet pioneer
Borka Jerman Blažič's AcademicInfluence.com Rankings
Borka Jerman Blažičcomputer-science Degrees
Computer Science
#3183
World Rank
#3334
Historical Rank
Database
#8646
World Rank
#9067
Historical Rank
Download Badge
Computer Science
Borka Jerman Blažič's Degrees
- PhD Computer Science University of Ljubljana
- Masters Computer Science University of Ljubljana
- Bachelors Computer Science University of Ljubljana
Similar Degrees You Can Earn
Why Is Borka Jerman Blažič Influential?
(Suggest an Edit or Addition)According to Wikipedia, Borka Jerman Blažič is a Slovenian Internet pioneer, and the President of the Internet Society - Slovenia. She is also a computer networks scientist, founder and first general secretary of the Yugoslavian Network for the Academic and Education Community , which introduced the first Internet services in SFR Yugoslavia in 1991.
Borka Jerman Blažič's Published Works
Published Works
- Privacy-Enhancing Technologies - approaches and development (2003) (183)
- An economic modelling approach to information security risk management (2008) (175)
- A Quantitative Model for Information-Security Risk Management (2013) (65)
- Development of 3-dimensional molecular descriptors (1990) (56)
- Towards a standard approach for quantifying an ICT security investment (2008) (56)
- Privacy provision in e-learning standardized systems: status and improvements (2005) (50)
- On designing usable and secure recognition-based graphical authentication mechanisms (2011) (49)
- Managing the investment in information security technology by use of a quantitative modeling (2012) (31)
- Quantitative Model for Economic Analyses of Information Security Investment in an Enterprise Information System (2012) (30)
- Overcoming the digital divide with a modern approach to learning digital skills for the elderly adults (2020) (27)
- Application of Multi-Attribute Decision Making Approach to Learning Management Systems Evaluation (2007) (26)
- A conceptual framework for evaluating usable security in authentication mechanisms - usability perspectives (2011) (23)
- Quantifying Usability and Security in Authentication (2011) (19)
- User awareness and tolerance of privacy abuse on mobile Internet: An exploratory study (2016) (19)
- Why That Picture? Discovering Password Properties in Recognition-Based Graphical Authentication (2016) (16)
- ImagePass - Designing graphical authentication for security (2011) (15)
- Comparison of sequences as a method for evaluation of the molecular similarity (1986) (15)
- Security and privacy in advanced networking technologies (2004) (11)
- Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading (2008) (10)
- A formalisation and evaluation of certificate policies (1999) (10)
- Analyses of user rationality and system learnability: performing task variants in user tests (2007) (9)
- A Multi-attribute Decision Support Model for Learning Management Systems Evaluation (2007) (9)
- Formal language for security services base modelling and analysis (1995) (9)
- Advanced Communications and Multimedia Security (2002) (9)
- A Holistic Approach for Designing Human-Centric Trust Systems (2013) (8)
- A Novel Systemic Taxonomy of Trust in the Online Environment - (Invited Paper) (2011) (8)
- QSAR in drug design and toxicology : proceedings of the Sixth European Symposium on Quantitative St[r]ucture-Activity Relationships, Portorož - Portorose (Yugoslavia), 22-26 September 1986 (1987) (8)
- An Authentication and Authorization Solution for a Multiplatform Cloud Environment (2015) (8)
- Recognition-Based Graphical Authentication with Single-Object Images (2011) (7)
- The search for active substructures in structure‐activity studies (1987) (7)
- Security And Privacy In Advanced Networking Technologies (Nato Science Series/ Computer and Systems Sciences) (2004) (7)
- A rational approach to the optimal design of drugs (1987) (6)
- An approach in provision of interoperability of eLearning systems in enlarged EU - the case of iCamp project (2006) (6)
- Evaluation of the molecular similarity and property prediction for QSAR purposes (1989) (6)
- Standard Approach for Quantification of the ICT Security Investment for Cybercrime Prevention (2008) (5)
- Users' responsiveness in the price-controlled best-effort QoS model (2001) (5)
- Eye Tracking Graphical Passwords (2017) (5)
- Future active Ip networks security architecture (2005) (5)
- Comparative Study and Techno-Economic Analysis of Broadband Backbone Upgrading: a Case Study (2007) (4)
- Comparison of three different approaches to the property prediction problem (1994) (4)
- An active networks security architecture (2002) (4)
- Assessment of User Rationality and Adaptivity: A Case Study (2004) (4)
- The development of research and innovation policies based on a benchmarking assessment: the case of mobile communications technology R&D in the new member states of the EU (2008) (4)
- User bias in online trust systems: aligning the system designers’ intentions with the users’ expectations (2017) (4)
- Security in value added networks—security requirements for EDI (1991) (4)
- A Virtual User Community: Cultural Backgrounds in the Design of an Internet-Based Service (2015) (4)
- An Innovative Approach in Digital Forensic Education and Training (2015) (4)
- The Future of the Internet: Tussles and Challenges in the Evolution Path as Identified (2010) (4)
- Advanced communications and multimedia security : IFIP TC6/TC11 sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portorož, Slovenia (2002) (3)
- Tool Supporting the Internationalisation of the Generic Network Services (1994) (3)
- A Large-Scale Security Analysis of Web Vulnerability: Findings, Challenges and Remedies (2020) (3)
- Study of computation, relatedness and activity prediction of topological indices (1991) (3)
- Advanced security technologies in networking (2001) (3)
- Towards the Development of a Research Agenda for Cybercrime and Cyberterrorism – Identifying the Technical Challenges and Missing Solutions (2016) (3)
- The usability aspects of an universal brokerage and delivery system for the pan-European higher education (2000) (3)
- Will the multi-ocet standard character set code solve the world coding problems for information interchange? (1988) (2)
- Erratum to: Advanced Communications and Multimedia Security (2017) (2)
- A Tool for Support of Key Distribution and Validity Certificate Check in Global Directory Service (1994) (2)
- Information Security Aspects of the Public Safety Data Interoperability Network (2016) (2)
- User tolerance of privacy abuse on mobile Internet and the country level of development (2016) (2)
- Trust as an Organismic Trait of E-Commerce Systems (2012) (2)
- An Infrastructure For Support Of Digital Signatures (1999) (2)
- The reduced graph model revisited (1991) (2)
- Modelling molecular structures for computer-assisted studies of drug structure-activity relations (1983) (2)
- Privacy issues of a smart space for learning (2004) (2)
- Advancement in Cybercrime Investigation - The New European Legal Instruments for Collecting Cross-border E-evidence (2019) (1)
- Usability Evaluation and Study of a Video-Conferencing Service Provided via the Virtual Conference Centre (2011) (1)
- Certificates handling and their support within X.500 system (1993) (1)
- Semantic Ontology Design for a Multi-Cooperative First Responder Interoperable Platform (2017) (1)
- Assessment of the ICT Market Development through Study of Web Hosting Services in a Country with Transition Economy (2005) (1)
- Changing the landscape of cybersecurity education in the EU: Will the new approach produce the required cybersecurity skills? (2022) (1)
- Open Secure Model And Its Functionality In Networks With Value-Added Services (1993) (1)
- Self-Management GRID Services - A Programmable Network Approach (2004) (1)
- Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security (2002) (1)
- Security policy space definition and structuring (1996) (1)
- Missing Solutions in the Fight against Cybercrime and Cyberterrorism—The New EU Research Agenda (2016) (1)
- Security in value added networks-security requirements for EDI (1990) (1)
- An Advanced Educational Tool for Digital Forensic Engineering (2016) (1)
- User Understanding of Privacy In Emerging Mobile Markets (2014) (1)
- Four Scenarios for Future Evolution of the Internet (2011) (1)
- Multilingual communications in an open system architecture (1990) (1)
- Learning Digital Skils for Elderly People by using Touch Screen Technology and Learning Games: A Case Study (2018) (1)
- Computer networking for the European academic community: The EUREKA project cosine (1990) (1)
- New method for determination complexity using in AD HOC cloud computing (2017) (1)
- Similarity measures for sets of strings and application in chemical classification (1990) (1)
- An Approach for Backbone Upgrading Technology Selection Based on Techno-economic Evaluation Model (2007) (1)
- Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September ... in Information and Communication Technology) (2013) (0)
- Implementation and Evaluation of Integrity Protection Facilities for Active Grids (2004) (0)
- Interoperability building of distance learning systems within the iCamp project (2006) (0)
- Editor-in-chief Ehealth and Etelemedicine Electronic and Mobile Learning Advanced Knowledge Representation and Processing Contents Mathematical Description of Biological Structures, Mechanisms, and States a Stratified Beta-gaussian Finite Mixture Model for Clustering Genes with Multiple Data Sources (2009) (0)
- Cadenus security considerations (2002) (0)
- Committees eKNOW 2009 (2009) (0)
- The Graphical Interface for Secure Mail (1995) (0)
- A framework for systemic privacy protection in a pervasive platform (2006) (0)
- QSAR analysis of acetylcholinesterase inhibitors by use of structure similarity methods. (1989) (0)
- Standard specification extensions for provision of language and character enabled server (1997) (0)
- Privacy risks with smartphone technologies when using the mobile Internet (2020) (0)
- Certificate policies formalisation and comparison (1999) (0)
- Privacy risks with smartphone technologies when using the mobile Internet (2019) (0)
- Multi‐linguality in networking services: The MAITS project (1996) (0)
- Modeling Multimedia Networked Systems Through Large-Scale Trials of Distributed Events (1999) (0)
- E-learning Service Provision – Market Structure in Slovenia (2006) (0)
- The Contribution of Web 2.0 Technologies and EduCenter Community Portal to the Raising the Quality of Vocational Educational and Training (2010) (0)
- New cybercrime taxonomy of visualization of data mining process (2016) (0)
- Experience In Shaping The Virtual Lecturing Hall In An International Environment (1999) (0)
- Certification Authorities in a Global Network - Procedures and Guidelines for a Public Key Infrastructure (1997) (0)
- Security platforms in the telecommunication market: technologies, developments and regulations (1996) (0)
- Business approaches in provision of QoS in premium IP networks (2004) (0)
- Distributed group collaborative work through the "Symmetric TV" model (1999) (0)
- Group related derivation of the molecular similarity for property prediction (1989) (0)
- The European Character Set Codes and the Networking Requirements of the R & D Community of Europe (1990) (0)
- Game Playing as Educational Support in Learning Digital Skills: the Case of Lifelong Learning for Older Adults (2018) (0)
- Designing a large cross-border secured eID service for e-government and e-business (2014) (0)
- Trans-European Networks and Their Role in Improving the Education in Countries (1997) (0)
- An Approach in the Design of Common Authentication Solution for a Multi-Platform Cloud Environment (2015) (0)
- The International Journal On Advances in Life Sciences is Published by IARIA. ISSN: 1942-2660 (2010) (0)
- A Holistic Approach for Designing Human-Centric Trust Systems (2012) (0)
- Second International Conference on Information, Process, and Knowledge Management, eKNOW 2010, Saint Maarten, Netherlands, Antilles, February 10-15, 2010 (2010) (0)
- Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case (2013) (0)
- Towards security architecture for future active IP networks (2002) (0)
- An Assessment of the Usability of the Virtual Conference Centre Global Plaza and the Associated Social Network (2011) (0)
This paper list is powered by the following services:
Other Resources About Borka Jerman Blažič
What Schools Are Affiliated With Borka Jerman Blažič?
Borka Jerman Blažič is affiliated with the following schools: