Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
An unexpectedly large count of trees in the West African Sahara and Sahel
A large proportion of dryland trees and shrubs (hereafter referred to collectively as trees)
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …
The evolution of HCI and human factors: Integrating human and artificial intelligence
We review HCI history from both the perspective of its 1980s split with human factors and its
nature as a discipline. We then revisit human augmentation as an alternative to user …
nature as a discipline. We then revisit human augmentation as an alternative to user …
Moving from a 'human-as-problem” to a 'human-as-solution” cybersecurity mindset
Cybersecurity has gained prominence, with a number of widely publicised security incidents,
hacking attacks and data breaches reaching the news over the last few years. The …
hacking attacks and data breaches reaching the news over the last few years. The …
A survey on adaptive authentication
Adaptive Authentication allows a system to dynamically select the best mechanism (s) for
authenticating a user depending on contextual factors, such as location, proximity to …
authenticating a user depending on contextual factors, such as location, proximity to …
Why do developers get password storage wrong? A qualitative usability study
Passwords are still a mainstay of various security systems, as well as the cause of many
usability issues. For end-users, many of these issues have been studied extensively …
usability issues. For end-users, many of these issues have been studied extensively …
The nudge puzzle: Matching nudge interventions to cybersecurity decisions
Nudging is a promising approach, in terms of influencing people to make advisable choices
in a range of domains, including cybersecurity. However, the processes underlying the …
in a range of domains, including cybersecurity. However, the processes underlying the …
Beyond credential stuffing: Password similarity models using neural networks
Attackers increasingly use passwords leaked from one website to compromise associated
accounts on other websites. Such targeted attacks work because users reuse, or pick …
accounts on other websites. Such targeted attacks work because users reuse, or pick …
The password is dead, long live the password–A laboratory study on user perceptions of authentication schemes
Password authentication is still ubiquitous although alternatives have been developed to
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
overcome its shortcomings such as high cognitive load for users. Using an objective rating …
[HTML][HTML] The methodology of studying fairness perceptions in Artificial Intelligence: Contrasting CHI and FAccT
The topic of algorithmic fairness is of increasing importance to the Human–Computer
Interaction research community following accumulating concerns regarding the use and …
Interaction research community following accumulating concerns regarding the use and …