Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A deep dive into user's preferences and behavior around mobile phone sharing
Users share their personal devices with different entities in various circumstances. While
prior research shed light on the broad reasons behind the sharing of mobile phones, there is …
prior research shed light on the broad reasons behind the sharing of mobile phones, there is …
The “dark side” and negative consequences of cryptocurrencies usage for unethical purposes as barriers to invest in Middle East and African (MEA) countries
A Sestino, D Tuček, S Bresciani - Journal of Small Business and …, 2024 - emerald.com
Purpose This paper aims to unveil the darker side of cryptocurrencies by delving into its role
as an obstacle to investments in Middle East and African (MEAs) countries, unravelling the …
as an obstacle to investments in Middle East and African (MEAs) countries, unravelling the …
SoK: Social Cybersecurity
We analyze prior work in social cybersecurity and present a structuring of this literature
based on its pertinence to four S&P-relevant social behaviors:(1) negotiating access to …
based on its pertinence to four S&P-relevant social behaviors:(1) negotiating access to …
The security & privacy acceptance framework (spaf)
How can we encourage end-user acceptance of expert recommended cybersecurity and
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …
" I Have to Use My Son's QR Code to Run the Business": Unpacking Senior Street Vendors' Challenges in Mobile Money Collection in China
Mobile payment systems have become an infrastructural component in citizens' socio-
economic life in China. The rapid shift to a cashless society demands vendors of all ages to …
economic life in China. The rapid shift to a cashless society demands vendors of all ages to …
Integrating handcrafted features with deep representations for smartphone authentication
Recent research demonstrates the potential of touch dynamics as a usable and privacy-
preserving scheme for smartphone authentication. Most existing approaches rely on …
preserving scheme for smartphone authentication. Most existing approaches rely on …
SoK: Web Authentication in the Age of End-to-End Encryption
J Blessing, D Hugenroth, RJ Anderson… - arxiv preprint arxiv …, 2024 - arxiv.org
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …
new challenges for usable authentication. Compared to regular web services, the nature of …
Protecting the vulnerable: Dimensions of assisted digital access
L Coles-Kemp, N Robinson, CPR Heath - Proceedings of the ACM on …, 2022 - dl.acm.org
A successful digital society is, in part, predicated on people having secure access to digitally-
delivered services when they need it. It has long been recognised that parts of society are …
delivered services when they need it. It has long been recognised that parts of society are …
Understanding Users' Interaction with Login Notifications
Login notifications intend to inform users about sign-ins and help them protect their accounts
from unauthorized access. Notifications are usually sent if a login deviates from previous …
from unauthorized access. Notifications are usually sent if a login deviates from previous …
“As Usual, I Needed Assistance of a Seeing Person”: Experiences and Challenges of People with Disabilities and Authentication Methods
A Erinola, A Buckmann, J Friedauer… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
According to the World Health organization, about 16% of the world's population live with a
disability. While they could benefit from digital products and services, users with disabilities …
disability. While they could benefit from digital products and services, users with disabilities …