Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Cellulose nanocrystal based composites: A review
Cellulose nanocrystals (CNC) have received much attention as renewable, biodegradable,
nontoxic, and low-cost nanomaterials with some remarkable properties. Desirable …
nontoxic, and low-cost nanomaterials with some remarkable properties. Desirable …
Addressing the gap in information security: an HR-centric and AI-driven framework for mitigating insider threats
M Thite, R Iyer - Personnel Review, 2024 - emerald.com
Purpose Despite ongoing reports of insider-driven leakage of confidential data, both
academic scholars and practitioners tend to focus on external threats and favour information …
academic scholars and practitioners tend to focus on external threats and favour information …
Organisational privacy culture and climate: A sco** review
New regulations worldwide are increasingly pressing organisations to review how they
collect and process personal data to ensure the protection of individual privacy rights. This …
collect and process personal data to ensure the protection of individual privacy rights. This …
BYOD security risks and mitigation strategies: insights from IT security experts
R Palanisamy, AA Norman… - Journal of Organizational …, 2021 - Taylor & Francis
ABSTRACT Bring Your Own Device (BYOD) is considered one of the top security risks
organizations face today as these devices are very much part of the working culture of …
organizations face today as these devices are very much part of the working culture of …
Factors Influencing Employees' Intention to Participate in a Bring Your Own Device Program in the Workplace: A Correlational Study in Ghana
A Blay - 2022 - search.proquest.com
The study investigated factors influencing employees' intention to participate in a Bring-Your-
Own-Device (BYOD) program in Ghana. BYOD programs are organizational strategies that …
Own-Device (BYOD) program in Ghana. BYOD programs are organizational strategies that …
[PDF][PDF] IT Consumerization–A Systematic Map** Study
M Petrović - … Management and Decision Support Systems in …, 2024 - researchgate.net
The utilization of personal IT devices for business purposes, either alongside or instead of
official IT infrastructure, is called IT consumerization. This trend is driven by consumers' …
official IT infrastructure, is called IT consumerization. This trend is driven by consumers' …
[PDF][PDF] What Makes Workplace Privacy Special? An Investigation of Determinants of Privacy Concerns in the Digital Workplace.
MA Teebken - AMCIS, 2021 - researchgate.net
Novel organizational requirements, together with concurrent advances in digital
technologies, promote increasing digitalization in the workplace. The successful …
technologies, promote increasing digitalization in the workplace. The successful …
[PDF][PDF] Become competent in 15 minutes?-The suitability of micro learning for competence development
J Busse, A Lange, M Briesemeister, M Schumann - 2020 - scholar.archive.org
Short learning formats such as micro learning are well suited to meeting the growing
learning needs created by increasing digitalization. With the help of learning content that is …
learning needs created by increasing digitalization. With the help of learning content that is …
Exploring Privacy Concern Effect on Organizational BYOD Policies and Security Measures Compliancy
ZA Johnston - 2022 - search.proquest.com
Over a decade ago, mobile devices became a standard for communication, especially
amongst the digital natives. Digital natives, known as millennials, grew up and are …
amongst the digital natives. Digital natives, known as millennials, grew up and are …
Investigation of Information Privacy in Employment: Fundamental Knowledge and Practical Solutions for the Human-Centered Design of Measures to Preserve the …
J Tolsdorf - 2022 - ediss.uni-goettingen.de
The processing of employee personal data is dramatically increasing. To protect employees'
fundamental right to privacy, the law provides for the implementation of privacy controls …
fundamental right to privacy, the law provides for the implementation of privacy controls …