Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic review of identity and access management requirements in enterprises and potential contributions of self-sovereign identity
Digital identity and access management (IAM) poses significant challenges for companies.
Cyberattacks and resulting data breaches frequently have their root cause in enterprises' …
Cyberattacks and resulting data breaches frequently have their root cause in enterprises' …
Impact, compliance, and countermeasures in relation to data breaches in publicly traded US companies
A data breach is the unauthorized disclosure of sensitive personal data, and it impacts
millions of individuals annually in the United States, as reported by Privacy Rights …
millions of individuals annually in the United States, as reported by Privacy Rights …
[HTML][HTML] Disintermediation of consumer services through blockchain? The role of intermediary brands, value-added services, and privacy concerns
A Strebinger, H Treiblmaier - International Journal of Information …, 2024 - Elsevier
This paper explores the dynamics between value-added services, intermediary brands, and
consumer privacy concerns in sha** attitudes toward blockchain-enabled consumer …
consumer privacy concerns in sha** attitudes toward blockchain-enabled consumer …
[HTML][HTML] Gamification in workforce training: Improving employees' self-efficacy and information security and data protection behaviours
This research aims to address two questions:(1) how can gamification strategies increase
success of e-training systems and enhance employees' information security and data …
success of e-training systems and enhance employees' information security and data …
A framework for cyber-risk insurance against ransomware: A mixed-method approach
Hackers follow a standard cyber kill chain process and install ransomware payloads using
phishing emails on firms belonging to critical industry, resulting in huge losses in revenue …
phishing emails on firms belonging to critical industry, resulting in huge losses in revenue …
The cybersecurity applied by online travel agencies and hotels to protect users' private data in smart cities
L Florido-Benítez - Smart Cities, 2024 - mdpi.com
The purpose of this paper is to analyse the cybersecurity in online travel agencies (OTAs)
and hotel sectors to protect users' private data in smart cities. Methodologically, this research …
and hotel sectors to protect users' private data in smart cities. Methodologically, this research …
Understanding the state of criminological scholarship on cybercrimes
TJ Holt - Computers in Human Behavior, 2023 - Elsevier
Understanding the state of criminological scholarship on cybercrimes - ScienceDirect Skip to
main contentSkip to article Elsevier logo Journals & Books Help Search My account Sign in …
main contentSkip to article Elsevier logo Journals & Books Help Search My account Sign in …
Corporate social irresponsibility and the occurrence of data breaches: A stakeholder management perspective
Ever-increasing data breach incidents are destroying firms' operations and financial
sustainability. We examine the association between corporate social irresponsibility (CSIR) …
sustainability. We examine the association between corporate social irresponsibility (CSIR) …
Data security crisis in universities: Identification of key factors affecting data breach incidents
J Li, W **ao, C Zhang - Humanities and Social Sciences …, 2023 - nature.com
The extremely complex and dynamic digital environments of universities make them highly
vulnerable to the risk of data breaches. This study empirically investigated the factors …
vulnerable to the risk of data breaches. This study empirically investigated the factors …
Factors influencing technology use among low-income older adults: A systematic review
DYL Chan, SWH Lee, PL Teh - Heliyon, 2023 - cell.com
As the world's aging population increases, leveraging technology to support aging is proving
advantageous. Notably, technology adoption studies among older adults have received …
advantageous. Notably, technology adoption studies among older adults have received …