Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy research with marginalized groups: what we know, what's needed, and what's next
People who are marginalized experience disproportionate harms when their privacy is
violated. Meeting their needs is vital for develo** equitable and privacy-protective …
violated. Meeting their needs is vital for develo** equitable and privacy-protective …
Characterizing the technology needs of vulnerable populations for participation in research and design by adopting Maslow's hierarchy of needs
While various frameworks and heuristics exist within the HCI community to guide research
and design for vulnerable populations, most are centered on the researcher's involvement …
and design for vulnerable populations, most are centered on the researcher's involvement …
Sok: A framework for unifying at-risk user research
At-risk users are people who experience risk factors that augment or amplify their chances of
being digitally attacked and/or suffering disproportionate harms. In this systematization work …
being digitally attacked and/or suffering disproportionate harms. In this systematization work …
Privacy legislation as business risks: How GDPR and CCPA are represented in technology companies' investment risk disclosures
Power exercised by large technology companies has led to concerns over privacy and data
protection, evidenced by the passage of legislation including the EU's General Data …
protection, evidenced by the passage of legislation including the EU's General Data …
Changes in research ethics, openness, and transparency in empirical studies between CHI 2017 and CHI 2022
In recent years, various initiatives from within and outside the HCI field have encouraged
researchers to improve research ethics, openness, and transparency in their empirical …
researchers to improve research ethics, openness, and transparency in their empirical …
Individually vulnerable, collectively safe: The security and privacy practices of households with older adults
Older adults are especially vulnerable to online cybersecurity and privacy (SP) threats, such
as phishing, ransomware, and targeted misinformation campaigns. Prior work has …
as phishing, ransomware, and targeted misinformation campaigns. Prior work has …
Conducting risky research with teens: co-designing for the ethical treatment and protection of adolescents
The methods in which we study the online experiences of adolescents should be evidence-
based and informed by youth. This is especially true when studying sensitive topics, such as …
based and informed by youth. This is especially true when studying sensitive topics, such as …
Inequalities in privacy cynicism: An intersectional analysis of agency constraints
A growing body of research highlights a trend toward widespread attitudes of privacy
cynicism, apathy and resignation among Internet users. In this work, we extend these …
cynicism, apathy and resignation among Internet users. In this work, we extend these …
[HTML][HTML] Kee** Fit & Staying Safe: A Systematic Review of Women's Use of Social Media for Fitness
Social media has transformed how users create, share, and consume health and fitness
content. Research to date demonstrates that despite positive sharing opportunities, women …
content. Research to date demonstrates that despite positive sharing opportunities, women …
" They Look at Vulnerability and Use That to Abuse You'': Participatory Threat Modelling with Migrant Domestic Workers
The needs of marginalised groups like migrant domestic workers (MDWs) are often ignored
in digital privacy and security research. If considered, MDWs are treated as' bystanders' or …
in digital privacy and security research. If considered, MDWs are treated as' bystanders' or …