Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Adolescents and pornography: A review of 20 years of research
The goal of this review was to systematize empirical research that was published in peer-
reviewed English-language journals between 1995 and 2015 on the prevalence, predictors …
reviewed English-language journals between 1995 and 2015 on the prevalence, predictors …
[HTML][HTML] Social media and adolescent well-being in the Global South
Despite the rapid proliferation of digital technologies in the Global South, most academic
research on social media and adolescent well-being has primarily focused on the Global …
research on social media and adolescent well-being has primarily focused on the Global …
Information security policy compliance model in organizations
The Internet and information technology have influenced human life significantly. However,
information security is still an important concern for both users and organizations …
information security is still an important concern for both users and organizations …
Surveying pornography use: A shaky science resting on poor measurement foundations
ABSTRACT A great deal of pornography research relies on dubious measurements.
Measurement of pornography use has been highly variable across studies and existing …
Measurement of pornography use has been highly variable across studies and existing …
The impact of internet pornography on adolescents: A review of the research
EW Owens, RJ Behun, JC Manning… - Sexual Addiction & …, 2012 - Taylor & Francis
The recent proliferation of Internet-enabled technology has significantly changed the way
adolescents encounter and consume sexually explicit material. Once confined to a personal …
adolescents encounter and consume sexually explicit material. Once confined to a personal …
[КНИГА][B] Digital youth: The role of media in development
K Subrahmanyam, D Šmahel - 2011 - Springer
Youth around the world are fittingly described as digital natives because of their comfort and
skill with technological hardware and content. Recent studies indicate that an overwhelming …
skill with technological hardware and content. Recent studies indicate that an overwhelming …
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
It is widely agreed that a large amount of information systems (IS) security incidents occur in
the workplace because employees subvert existing IS Security Policy (ISSP). In order to …
the workplace because employees subvert existing IS Security Policy (ISSP). In order to …
Cyberbullying and self-esteem: An Italian study
In this study, the cyberbullying risk related to self-esteem, social, and personal variables was
investigated. Cyberbullying describes a pervasive form of aggressive behaviour aimed at …
investigated. Cyberbullying describes a pervasive form of aggressive behaviour aimed at …
Motivation and opportunity based model to reduce information security insider threats in organisations
Abstract Information technology has brought with it many advantages for organisations, but
information security is still a major concern for organisations which rely on such technology …
information security is still a major concern for organisations which rely on such technology …
What matters: Quantity or quality of pornography use? Psychological and behavioral factors of seeking treatment for problematic pornography use
Introduction Pornography has become popular with Internet technology. For most people,
pornography use (PU) is entertainment; for some, it can result in seeking treatment for out-of …
pornography use (PU) is entertainment; for some, it can result in seeking treatment for out-of …