Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy research with marginalized groups: what we know, what's needed, and what's next
People who are marginalized experience disproportionate harms when their privacy is
violated. Meeting their needs is vital for develo** equitable and privacy-protective …
violated. Meeting their needs is vital for develo** equitable and privacy-protective …
“It's common and a part of being a content creator”: Understanding How Creators Experience and Cope with Hate and Harassment Online
Content creators—social media personalities with large audiences on platforms like
Instagram, TikTok, and YouTube—face a heightened risk of online hate and harassment. We …
Instagram, TikTok, and YouTube—face a heightened risk of online hate and harassment. We …
Sok: A framework for unifying at-risk user research
At-risk users are people who experience risk factors that augment or amplify their chances of
being digitally attacked and/or suffering disproportionate harms. In this systematization work …
being digitally attacked and/or suffering disproportionate harms. In this systematization work …
Users' expectations about and use of smartphone privacy and security settings
With the growing smartphone penetration rate, smartphone settings remain one of the main
models for information privacy and security controls. Yet, their usability is largely …
models for information privacy and security controls. Yet, their usability is largely …
Sok: Safer digital-safety research involving at-risk users
Research involving at-risk users—that is, users who are more likely to experience a digital
attack or to be disproportionately affected when harm from such an attack occurs—can pose …
attack or to be disproportionately affected when harm from such an attack occurs—can pose …
Accessible and inclusive cyber security: a nuanced and complex challenge
K Renaud, L Coles-Kemp - SN Computer Science, 2022 - Springer
It has been argued that human-centred security design needs to accommodate the
considerations of three dimensions:(1) security,(2) usability and (3) accessibility. The latter …
considerations of three dimensions:(1) security,(2) usability and (3) accessibility. The latter …
The politics of privacy theories: Moving from norms to vulnerabilities
Privacy and surveillance are central features of public discourse around use of computing
systems. As the systems we design and study are increasingly used and regulated as …
systems. As the systems we design and study are increasingly used and regulated as …
“desperate times call for desperate measures”: User concerns with mobile loan apps in kenya
The usage of mobile loan applications has proliferated in develo** countries. This is due
to the ease and speed in which they disburse small loans to users, compared to traditional …
to the ease and speed in which they disburse small loans to users, compared to traditional …
Privacy and power: Acknowledging the importance of privacy research and design for vulnerable populations
Privacy researchers and designers must take into consideration the unique needs and
challenges of vulnerable populations. Normative and privileged lenses can impair …
challenges of vulnerable populations. Normative and privileged lenses can impair …
Too much information: Questioning security in a post-digital society
L Coles-Kemp, RB Jensen, CPR Heath - … of the 2020 CHI Conference on …, 2020 - dl.acm.org
Whilst user-and people-centered design are accepted routes for digital services, they are
less commonly used in the design of technologies that control access to data and the …
less commonly used in the design of technologies that control access to data and the …