Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
Judgment and decision making
The science of judgment and decision making involves three interrelated forms of research:
analysis of the decisions people face, description of their natural responses, and …
analysis of the decisions people face, description of their natural responses, and …
An investigation of phishing awareness and education over time: When and how to best remind users
Security awareness and education programmes are rolled out in more and more
organisations. However, their effectiveness over time and, correspondingly, appropriate …
organisations. However, their effectiveness over time and, correspondingly, appropriate …
Predicting impending exposure to malicious content from user behavior
Many computer-security defenses are reactive---they operate only when security incidents
take place, or immediately thereafter. Recent efforts have attempted to predict security …
take place, or immediately thereafter. Recent efforts have attempted to predict security …
Better together: The interplay between a phishing awareness video and a link-centric phishing support tool
Two popular approaches for hel** consumers avoid phishing threats are phishing
awareness videos and tools supporting users in identifying phishing emails. Awareness …
awareness videos and tools supporting users in identifying phishing emails. Awareness …
It's the deceiver and the receiver: Individual differences in phishing susceptibility and false positives with item profiling
Phishing email is one of the biggest risks to online information security due to its ability to
exploit human trust and naivety. Prior research has examined whether some people are …
exploit human trust and naivety. Prior research has examined whether some people are …
Phishing with malicious QR codes
F Sharevski, A Devine, E Pieroni, P Jachim - Proceedings of the 2022 …, 2022 - dl.acm.org
The use of QR codes for malicious purposes was rather limited in the pre-COVID-19 world.
That changed overnight, as the QR codes became a convenient go-between for sharing …
That changed overnight, as the QR codes became a convenient go-between for sharing …
Away from prying eyes: Analyzing usage and understanding of private browsing
Previous research has suggested that people use the private browsing mode of their web
browsers to conduct privacy-sensitive activities online, but have misconceptions about how it …
browsers to conduct privacy-sensitive activities online, but have misconceptions about how it …
[PDF][PDF] How WEIRD is usable privacy and security research?
In human factor fields such as human-computer interaction (HCI) and psychology,
researchers have been concerned that participants mostly come from WEIRD (Western …
researchers have been concerned that participants mostly come from WEIRD (Western …
" Adulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social Media
In order to keep one's computing systems and data secure, it is critical to be aware of how to
effectively maintain security and privacy online. Prior experimental work has shown that …
effectively maintain security and privacy online. Prior experimental work has shown that …