Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy research with marginalized groups: what we know, what's needed, and what's next
People who are marginalized experience disproportionate harms when their privacy is
violated. Meeting their needs is vital for develo** equitable and privacy-protective …
violated. Meeting their needs is vital for develo** equitable and privacy-protective …
Characterizing the technology needs of vulnerable populations for participation in research and design by adopting Maslow's hierarchy of needs
While various frameworks and heuristics exist within the HCI community to guide research
and design for vulnerable populations, most are centered on the researcher's involvement …
and design for vulnerable populations, most are centered on the researcher's involvement …
Sok: A framework for unifying at-risk user research
At-risk users are people who experience risk factors that augment or amplify their chances of
being digitally attacked and/or suffering disproportionate harms. In this systematization work …
being digitally attacked and/or suffering disproportionate harms. In this systematization work …
" Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia
Women in South Asian own fewer personal devices like laptops and phones than women
elsewhere in the world. Further, cultural expectations dictate that they should share mobile …
elsewhere in the world. Further, cultural expectations dictate that they should share mobile …
[PDF][PDF] Privacy threats in intimate relationships
K Levy, B Schneier - Journal of Cybersecurity, 2020 - academic.oup.com
This article provides an overview of intimate threats: a class of privacy threats that can arise
within our families, romantic partnerships, close friendships, and caregiving relationships …
within our families, romantic partnerships, close friendships, and caregiving relationships …
“It cannot do all of my work”: community health worker perceptions of AI-enabled mobile health applications in rural India
Recent advances in Artificial Intelligence (AI) suggest that AI applications could transform
healthcare delivery in the Global South. However, as researchers and technology …
healthcare delivery in the Global South. However, as researchers and technology …
Digital contact does not promote wellbeing, but face-to-face contact does: A cross-national survey during the COVID-19 pandemic
With restricted face-to-face interactions, COVID-19 lockdowns and distancing measures
tested the capability of computer-mediated communication to foster social contact and …
tested the capability of computer-mediated communication to foster social contact and …
Online sexual harassment over anonymous social media in Bangladesh
Prior research on anonymous social media (ASM) has studied the issue of sexual
harassment and has revealed its connections to stereoty**, aggression, interpersonal …
harassment and has revealed its connections to stereoty**, aggression, interpersonal …
Witchcraft and hci: Morality, modernity, and postcolonial computing in rural bangladesh
While Human-Computer Interaction (HCI) research on health and well-being is increasingly
becoming more aware and inclusive of its social and political dimensions, spiritual practices …
becoming more aware and inclusive of its social and political dimensions, spiritual practices …
A deep dive into user's preferences and behavior around mobile phone sharing
Users share their personal devices with different entities in various circumstances. While
prior research shed light on the broad reasons behind the sharing of mobile phones, there is …
prior research shed light on the broad reasons behind the sharing of mobile phones, there is …