Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Marjan Hericko is active.

Publication


Featured researches published by Marjan Hericko.


Computers in Human Behavior | 2011

Review: A meta-analysis of e-learning technology acceptance: The role of user types and e-learning technology types

Bostjan Sumak; Marjan Hericko; Maja Pusnik

Existing literature in the field of e-learning technology acceptance reflects a significant number of independent studies that primarily investigate the causal relationships proposed by technology acceptance theory, such as the technology acceptance model (TAM). To synthesize the existing knowledge in the field of e-learning technology acceptance, we have conducted a systematic literature review of 42 independent papers, mostly published in major journals. Furthermore, in order to view the research context by combining and analyzing the quantitative results of the reviewed research studies, a meta-analysis of the causal effect sizes between common TAM-related relationships was conducted. The main findings of this study, which is the first of its kind, are: (1) TAM is the most-used acceptance theory in e-learning acceptance research, and (2) the size of the causal effects between individual TAM-related factors depends on the type of user and the type of e-learning technology. The results of the meta-analysis demonstrated a moderating effect for user-related factors and technology-related factors for several evaluated causal paths. We have gathered proof that the perceived ease of use and the perceived usefulness tend to be the factors that can influence the attitudes of users toward using an e-learning technology in equal measure for different user types and types of e-learning technology settings.


Journal of Systems and Software | 2006

Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL

Matjaz B. Juric; Ivan Rozman; Bostjan Brumen; Matjaz Colnaric; Marjan Hericko

This article analyses two most commonly used distributed models in Java: Web services and RMI (Remote Method Invocation). The paper focuses on regular (unsecured) as well as on secured variants, WS-Security and RMI-SSL. The most important functional differences are identified and the performance on two operating systems (Windows and Linux) is compared. Sources of performance differences related to the architecture and implementation are identified. The overheads related to the usage of security and the influences of JCE (Java Cryptography Extension) security providers on the performance of secured remote invocations are identified. Finally, the impact of distributed models on design and implementation of distributed applications is identified and guidelines for improving distributed application performance in design and implementation stage are provided. The paper contributes to the understanding of functional and performance related differences between Web services and RMI and their secure variants, WS-Security and RMI-SSL.


Journal of Systems and Software | 2010

An empirical examination of application frameworks success based on technology acceptance model

Gregor Polančič; Marjan Hericko; Ivan Rozman

Framework-based development is currently regarded as one of the most promising software development approaches when it comes to improvements in lead time, productivity and quality. However, many frameworks and projects based on frameworks still report failures, which indicate that there are problems related to both frameworks technology and frameworks usage. The objective of our research was to examine the major drivers that have an impact on a frameworks acceptance and a frameworks success. We used the technology acceptance model (TAM) and Seddons information systems success model as our underlying theory. Data collected from an online survey of 389 active framework users was used to test hypothesized models. Data analysis was performed via structural equation modeling. Our findings support the post-adoption version of TAM and the relationship between continuous use and the successful use of systems, where more use also means more net benefits. We found that the successful use of frameworks is mainly dependent on two factors: continuous framework usage intention and the perceived usefulness of the framework. Several practical and theoretical implications can be foreseen including advances in framework development guidelines and insight into the relationship between the acceptance and success of frameworks.


Computers in Human Behavior | 2015

Privacy antecedents for SNS self-disclosure

Lili Nemec Zlatolas; Tatjana Welzer; Marjan Hericko; Marko Hölbl

Social networking sites privacy issues and self-disclosure are examined.A research model of privacy issues and self-disclosure is built.Structural equations modeling is used to assess the model fit.Path analysis is done to analyze hypothesis whereas 11 out of 14 are accepted.Final model shows privacy and its shaping of self-disclosure in Facebook. In recent years, social networking sites have spread rapidly, raising new issues in terms of privacy and self-disclosure online. For a better understanding of how privacy issues determine self-disclosure, a model which includes privacy awareness, privacy social norms, privacy policy, privacy control, privacy value, privacy concerns and self-disclosure was built. A total of 661 respondents participated in an online survey and a structural equation modeling was used to evaluate the model. The findings indicated a significant relationship between privacy value/privacy concerns and self-disclosure, privacy awareness and privacy concerns/self-disclosure, privacy social norms and privacy value/self-disclosure, privacy policy and privacy value/privacy concerns/self-disclosure, privacy control and privacy value/privacy concerns. The model from the study should contribute new knowledge concerning privacy issues and their shaping of self-disclosure on social networking sites. It could also help networking sites service providers understand how to encourage users to disclose more information.


Sigplan Notices | 2003

Object serialization analysis and comparison in Java and .NET

Marjan Hericko; Matjaz B. Juric; Ivan Rozman; Simon Beloglavec; Ales Zivkovic

This article compares binary and XML object serialization on Java and Microsoft .NET platforms from the performance and size perspective. It uses three different types of objects and different number of objects to make a comparison which reflects real-world circumstances. The article has the following contributions: (1) it compares binary and XML serialization between Java and .NET to compare the efficiency of both platforms; (2) it compares binary and XML serialization within the platforms to compare the differences between the two serialization types; (3) it studies the reasons for performance differences and provides possible performance optimizations.


Sigplan Notices | 2004

Java RMI, RMI tunneling and Web services comparison and performance analysis

Matjaz B. Juric; Bostjan Kezmah; Marjan Hericko; Ivan Rozman; Ivan Vezocnik

This article compares different approaches for developing Java distributed applications which have to communicate through firewalls and proxies, including RMI over open ports, HTTP-to-port, HTTP-to-CGI, HTTP-to-servlet tunneling and web services. A functional comparison of approaches has been done, as well as a detailed performance analysis with overhead analysis and identification of optimizations. Therefore the paper contributes to the overall understanding of different approaches for developing Java distributed applications in circumstances, where the communication through firewalls and/or proxies is inevitable. The paper also contributes to the understanding of performance related issues.


Information & Software Technology | 2000

Performance comparison of CORBA and RMI

Matjaz B. Juric; Ivan Rozman; Marjan Hericko

Abstract Distributed object architectures and Java are important for building modern, scalable, web-enabled applications. This paper is focused on qualitative and quantitative comparison of two distributed object models for use with Java: CORBA and RMI. We compare both models in terms of features, ease of development and performance. We present performance results based on real world scenarios that include single client and multi-client configurations, different data types and data sizes. We evaluate multithreading strategies and analyse code in order to identify the most time-consuming methods. We compare the results and give hints and conclusions. We have found that because of its complexity CORBA is slightly slower than RMI in simple scenarios. On the other hand, CORBA handles multiple simultaneous clients and larger data amounts better and suffers from far lower performance degradation under heavy client load. The article presents a solid basis for making a decision about the underlying distributed object model.


Information & Software Technology | 2005

Automated software size estimation based on function points using UML models

Aleš ivkovič; Ivan Rozman; Marjan Hericko

A systematic approach to software size estimation is important for accurate project planning. In this paper, we will propose the unified mapping of UML models into function points. The mapping is formally described to enable the automation of the counting procedure. Three estimation levels are defined that correspond to the different abstraction levels of the software system. The level of abstraction influences an estimates accuracy. Our research, based on a small data set, proved that accuracy increases with each subsequent abstraction level. Changes to the FPA complexity tables for transactional functions will also be proposed in order to better quantify the characteristics of object-oriented software.


computer-based medical systems | 2005

Improving mining of medical data by outliers prediction

Vili Podgorelec; Marjan Hericko; Ivan Rozman

In the paper a new outlier prediction method is presented that should improve the classification performance when mining the medical data. The method introduces the class confusion score metric that is based on the classification results of a set of classifiers, induced by an evolutionary decision tree induction algorithm. The classification improvement should be achieved by removing the identified outliers from a training set. Our proposition is that a classifier trained by a filtered dataset captures a better, more general knowledge model and should therefore perform better also on unseen cases. The proposed method is applied on the two cardio-vascular datasets and the obtained results are discussed.


Lecture Notes in Computer Science | 2002

Tracking Test First Pair Programming - An Experiment

Matevz Rostaher; Marjan Hericko

The authors ran an experiment where a group of professional programmers working in pairs and a control group programming alone implemented a small system from predefined requirements. Most programmers spent between 50% and 60% of time on testing; only the most inexperienced spent less. Programmers reported more problems with refactoring than testing. The rhythm of switching the driver and navigator role is essential for test-first pair programming. The experiment showed that partners switched roles 21 times per day on average. The comparison of the control group of individuals and the group programming in pairs showed that both groups spent almost the same amount of time to complete the tasks. The result of this comparison is by applying a t-test not statistically significant. We believe that more detailed research apart of evaluating test-first programming is needed to compare solo vs. pair programming in the investigated group.

Collaboration


Dive into the Marjan Hericko's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge