Zweryfikowany adres z um.si
Cytowane przez
Cytowane przez
A meta-analysis of e-learning technology acceptance: The role of user types and e-learning technology types
B Šumak, M Heričko, M Pušnik
Computers in human behavior 27 (6), 2067-2077, 2011
EduCTX: A blockchain-based higher education credit platform
M Turkanović, M Hölbl, K Košič, M Heričko, A Kamišalić
IEEE access 6, 5112-5127, 2018
Software fault prediction metrics: A systematic literature review
D Radjenović, M Heričko, R Torkar, A Živkovič
Information and software technology 55 (8), 1397-1418, 2013
An empirical study of virtual learning environment adoption using UTAUT
B Šumak, G Polancic, M Hericko
2010 Second international conference on mobile, hybrid, and on-line learning …, 2010
Privacy antecedents for SNS self-disclosure: The case of Facebook
LN Zlatolas, T Welzer, M Heričko, M Hölbl
Computers in Human Behavior 45, 158-167, 2015
Factors affecting acceptance and use of Moodle: An empirical study based on TAM
B Šumak, M Heričko, M Pušnik, G Polančič
Informatica 35 (1), 2011
Comparison of performance of Web services, WS-Security, RMI, and RMI–SSL
MB Juric, I Rozman, B Brumen, M Colnaric, M Hericko
Journal of Systems and Software 79 (5), 689-700, 2006
An empirical examination of application frameworks success based on technology acceptance model
G Polančič, M Heričko, I Rozman
Journal of systems and software 83 (4), 574-584, 2010
Factors impacting the acceptance of mobile data services–A systematic literature review
B Ovčjak, M Heričko, G Polančič
Computers in human behavior 53, 24-47, 2015
A preliminary review of blockchain-based solutions in higher education
A Kamišalić, M Turkanović, S Mrdović, M Heričko
Learning Technology for Education Challenges: 8th International Workshop …, 2019
Differences between prospective, existing, and former users of interactive whiteboards on external factors affecting their adoption, usage and abandonment
B Šumak, M Pušnik, M Heričko, A Šorgo
Computers in Human Behavior 72, 733-756, 2017
Business process model and notation: The current state of affairs
M Kocbek, G Jošt, M Heričko, G Polančič
Computer Science and Information Systems 12 (2), 509-539, 2015
Java RMI, RMI tunneling and Web services comparison and performance analysis
MB Juric, B Kezmah, M Hericko, I Rozman, I Vezocnik
ACM Sigplan Notices 39 (5), 58-65, 2004
Automated software size estimation based on function points using UML models
A Živkovič, I Rozman, M Heričko
Information and Software Technology 47 (13), 881-890, 2005
Performance Comparison of CORBA and RMI
MB Juric, I Rozman, M Hericko
Information and Software Technology 42 (13), 915-933, 2000
Object serialization analysis and comparison in java and. net
M Hericko, MB Juric, I Rozman, S Beloglavec, A Zivkovic
ACM Sigplan Notices 38 (8), 44-54, 2003
Usability evaluation of a library website with different end user groups
K Kous, M Pušnik, M Heričko, G Polančič
Journal of Librarianship and Information Science 52 (1), 75-90, 2020
Password security—No change in 35 years?
V Taneski, M Heričko, B Brumen
2014 37th International Convention on Information and Communication …, 2014
Improving mining of medical data by outliers prediction
V Podgorelec, M Hericko, I Rozman
18th IEEE Symposium on Computer-Based Medical Systems (CBMS'05), 91-96, 2005
Knowledge discovery with classification rules in a cardiovascular dataset
V Podgorelec, P Kokol, MM Stiglic, M Heričko, I Rozman
Computer Methods and Programs in Biomedicine 80, S39-S49, 2005
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20