Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] How is privacy behavior formulated? a review of current research and synthesis of information privacy behavioral factors
What influences Information Communications and Technology (ICT) users' privacy
behavior? Several studies have shown that users state to care about their personal data …
behavior? Several studies have shown that users state to care about their personal data …
A qualitative systematic review of trust in technology
Although many information systems (IS) scholars have researched the antecedents and
consequences of trust in technology, the sheer amount of work published, authors' use of …
consequences of trust in technology, the sheer amount of work published, authors' use of …
Data security crisis in universities: Identification of key factors affecting data breach incidents
J Li, W ** a data breach protection capability framework in retailing
Protecting data in retail operations is vital in the age of data-driven digital transformation.
Businesses face a constant challenge from data breaches due to the unpredictable and …
Businesses face a constant challenge from data breaches due to the unpredictable and …
Vendor selection in the wake of data breaches: A longitudinal study
With the increasing digitization and networking of medical data and personal health
information, information security has become a critical factor in vendor selection. However …
information, information security has become a critical factor in vendor selection. However …
Abnormal returns to artificial intelligence patent infringement litigations
Artificial intelligence (AI) has become an important driver of economic growth and
innovation. With rapid advances in AI, firms have a strategic opportunity to re-envision the …
innovation. With rapid advances in AI, firms have a strategic opportunity to re-envision the …
Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps' features and providers
Purpose This study aims to argue that user's continued use behavior is contingent upon two
perceptions (ie the app and the provider). This study examines the moderating effects of …
perceptions (ie the app and the provider). This study examines the moderating effects of …
Investigating the use of protective technologies after data breach: The roles of psychological distance, technological service type and organizational justice
Protective information technologies (PITs) are crucial for preventing security and privacy
issues, but their application by customers following a data breach has not been thoroughly …
issues, but their application by customers following a data breach has not been thoroughly …
Digitally-enabled antecedents of trust, repurchase intention and the impact of blockchain traceability labels
Despite the growing literature focusing on digitalization in e-commerce, there remains a
scarcity of studies exploring innovative ways to enhance online consumers' trust. Our study …
scarcity of studies exploring innovative ways to enhance online consumers' trust. Our study …