Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[КНИГА][B] Cybercrime in progress: Theory and prevention of technology-enabled offenses
The emergence of the World Wide Web, smartphones, and computers has transformed the
world and enabled individuals to engage in crimes in a multitude of new ways …
world and enabled individuals to engage in crimes in a multitude of new ways …
Neutralization: New insights into the problem of employee information systems security policy violations
Employees' failure to comply with information systems security policies is a major concern
for information technology security managers. In efforts to understand this problem, IS …
for information technology security managers. In efforts to understand this problem, IS …
A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles
Abstract Emerging Connected and Autonomous Vehicles (CAVs) technology have a
ubiquitous communication framework. It poses security challenges in the form of cyber …
ubiquitous communication framework. It poses security challenges in the form of cyber …
User participation in information systems security risk management
JL Spears, H Barki - MIS quarterly, 2010 - JSTOR
This paper examines user participation in information systems security risk management
and its influence in the context of regulatory compliance via a multi-method study at the …
and its influence in the context of regulatory compliance via a multi-method study at the …
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
Organizational insiders have considerable influence on the effectiveness of information
security efforts. However, most research conducted in this area fails to examine what these …
security efforts. However, most research conducted in this area fails to examine what these …
The insider threat to information systems and the effectiveness of ISO17799
Insider threat is widely recognised as an issue of utmost importance for IS security
management. In this paper, we investigate the approach followed by ISO17799, the …
management. In this paper, we investigate the approach followed by ISO17799, the …
Secure multidimensional range queries over outsourced data
In this paper, we study the problem of supporting multidimensional range queries on
encrypted data. The problem is motivated by secure data outsourcing applications where a …
encrypted data. The problem is motivated by secure data outsourcing applications where a …
Insider threats in a financial institution
This study investigates the risk of insider threats associated with different applications within
a financial institution. Extending routine activity theory (RAT) from criminology literature to …
a financial institution. Extending routine activity theory (RAT) from criminology literature to …
The roles of IT strategies and security investments in reducing organizational security breaches
This research examines the joint effects of information technology (IT) strategies and security
investments on organizational security breaches. We focus on two forms of IT strategies …
investments on organizational security breaches. We focus on two forms of IT strategies …
When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse
This manuscript examines the unintended consequences that organizational computer
monitoring can foster within the firm. We apply justice and reactance theories to explain why …
monitoring can foster within the firm. We apply justice and reactance theories to explain why …