Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Review of the theory, principles, and design requirements of human-centric Internet of Things (IoT)
The rapid evolution of Internet of Things (IoT) technologies, with ever more profound
implications for humans and societies, has triggered visions and initiatives to re-align the …
implications for humans and societies, has triggered visions and initiatives to re-align the …
“Okay, whatever”: An evaluation of cookie consent interfaces
Many websites have added cookie consent interfaces to meet regulatory consent
requirements. While prior work has demonstrated that they often use dark patterns—design …
requirements. While prior work has demonstrated that they often use dark patterns—design …
Toward data-driven digital therapeutics analytics: Literature review and research directions
With the advent of digital therapeutics (DTx), the development of software as a medical
device (SaMD) for mobile and wearable devices has gained significant attention in recent …
device (SaMD) for mobile and wearable devices has gained significant attention in recent …
How usable are ios app privacy labels?
Standardized privacy labels that succinctly summarize those data practices that people are
most commonly concerned about offer the promise of providing users with more effective …
most commonly concerned about offer the promise of providing users with more effective …
“It would probably turn into a social faux-pas”: Users' and Bystanders' Preferences of Privacy Awareness Mechanisms in Smart Homes
The opaque data practices in smart home devices have raised significant privacy concerns
for smart home users and bystanders. One way to learn about the data practices is through …
for smart home users and bystanders. One way to learn about the data practices is through …
Still creepy after all these years: The normalization of affective discomfort in app use
It is not well understood why people continue to use privacy-invasive apps they consider
creepy. We conducted a scenario-based study (n= 751) to investigate how the intention to …
creepy. We conducted a scenario-based study (n= 751) to investigate how the intention to …
Aunties, strangers, and the {FBI}: Online privacy concerns and experiences of {Muslim-American} women
Women who identify with Islam in the United States come from many different race, class,
and cultural communities. They are also more likely to be first or second-generation …
and cultural communities. They are also more likely to be first or second-generation …
Understanding privacy-related advice on stack overflow
Privacy tasks can be challenging for developers, resulting in privacy frameworks and
guidelines from the research community which are designed to assist developers in …
guidelines from the research community which are designed to assist developers in …
Exploring tenants' preferences of privacy negotiation in airbnb
Literature suggests the unmatched or conflicting privacy needs between users and
bystanders in smart homes due to their different privacy concerns and priorities. A promising …
bystanders in smart homes due to their different privacy concerns and priorities. A promising …
Less is not more: Improving findability and actionability of privacy controls for online behavioral advertising
Tech companies that rely on ads for business argue that users have control over their data
via ad privacy settings. However, these ad settings are often hidden. This work aims to …
via ad privacy settings. However, these ad settings are often hidden. This work aims to …