Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Understanding managers' attitudes and behavioral intentions towards using artificial intelligence for organizational decision-making
While using artificial intelligence (AI) could improve organizational decision-making, it also
creates challenges associated with the “dark side” of AI. However, there is a lack of research …
creates challenges associated with the “dark side” of AI. However, there is a lack of research …
Protection motivation theory in information systems security research: A review of the past and a road map for the future
Protection motivation theory (PMT) is one of the most commonly used theories to examine
information security behaviors. Our systematic review of the application of PMT in …
information security behaviors. Our systematic review of the application of PMT in …
Cognition in social engineering empirical research: a systematic literature review
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …
the development and advancement of empirical SE research, making it particularly difficult to …
Understanding online safety behaviors: A protection motivation theory perspective
Internet users experience a variety of online security threats that require them to enact safety
precautions. Protection motivation theory (PMT) provides a theoretical framework for …
precautions. Protection motivation theory (PMT) provides a theoretical framework for …
A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach
Abstract Information security is one of the important domains of information systems
research today, with protection motivation theory (PMT) one of its most influential theoretical …
research today, with protection motivation theory (PMT) one of its most influential theoretical …
Individuals' internet security perceptions and behaviors
Little is known about the context sensitivity of users' online security perceptions and
behaviors to national and individual attributes, and there is inadequate research about the …
behaviors to national and individual attributes, and there is inadequate research about the …
Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda
In this essay, we outline some important concerns in the hope of improving the effectiveness
of security and privacy research. We discuss the need to re-examine our understanding of …
of security and privacy research. We discuss the need to re-examine our understanding of …
" 8 amazing secrets for getting more clicks": detecting clickbaits in news streams using article informality
Clickbaits are articles with misleading titles, exaggerating the content on the landing page.
Their goal is to entice users to click on the title in order to monetize the landing page. The …
Their goal is to entice users to click on the title in order to monetize the landing page. The …
A novel approach to fake news detection in social networks using genetic algorithm applying machine learning classifiers
D Choudhury, T Acharjee - Multimedia Tools and Applications, 2023 - Springer
Now-a-days fake news have become part and parcel of our everyday life due to its quick
spreading in different social media. Fake news identification has been emerging as an …
spreading in different social media. Fake news identification has been emerging as an …
Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors
The current study identified the antecedents of being an Internet scam victim and how it
impacts online privacy concerns and privacy protection behaviors. Structural equation …
impacts online privacy concerns and privacy protection behaviors. Structural equation …