Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The role of human-centered ai in user modeling, adaptation, and personalization—models, frameworks, and paradigms
This chapter explores the principles and frameworks of human-centered Artificial
Intelligence (AI), specifically focusing on user modeling, adaptation, and personalization. It …
Intelligence (AI), specifically focusing on user modeling, adaptation, and personalization. It …
Self-Adaptive Privacy in Cloud Computing: An overview under an interdisciplinary spectrum
The rapid development of cloud computing environments has resulted in various advances
and personalized services for users, raising thus several privacy issues. Towards this …
and personalized services for users, raising thus several privacy issues. Towards this …
Test‐driven development, engagement in activity, and maintainability: An empirical study
The software engineering community aims to achieve and maintain high‐efficient software
engineering practical activities. One of the techniques used for this purpose is Test‐Driven …
engineering practical activities. One of the techniques used for this purpose is Test‐Driven …
Social media disclosure: maximizing versus satisficing effects on default preferences
Purpose In light of increasing public concern over social media privacy breaches, this study
aims to unveil the context-dependent and individual-specific nature of social media …
aims to unveil the context-dependent and individual-specific nature of social media …
Support Personas: A Concept for Tailored Support of Users of Privacy-Enhancing Technologies
In many applications and websites people use in their everyday life, their privacy and data
are threatened, eg, by script tracking during browsing. Although researchers and companies …
are threatened, eg, by script tracking during browsing. Although researchers and companies …
Data protection officers' perspectives on privacy challenges in digital ecosystems
Digital ecosystems are driving the digital transformation of business models. Meanwhile, the
associated processing of personal data within these complex systems poses challenges to …
associated processing of personal data within these complex systems poses challenges to …
Specification of Self-Adaptive Privacy-Related Requirements within Cloud Computing Environments (CCE)
This paper presents a novel approach to address the challenges of self-adaptive privacy in
cloud computing environments (CCE). Under the Cloud-InSPiRe project, the aim is to …
cloud computing environments (CCE). Under the Cloud-InSPiRe project, the aim is to …
Developers' mindset on self-adaptive privacy and its requirements for cloud computing environments
Privacy design in cloud systems remains complex, with unclear processes and a mismatch
between privacy engineering and cloud integration challenges. Developers play a pivotal …
between privacy engineering and cloud integration challenges. Developers play a pivotal …
Graph-Clustering Anonymity Privacy Protection Algorithm With Fused Distance-Attributes
Z Wang, T Liu, Y Wang, X Bao, X Xu… - Journal of Physics …, 2023 - iopscience.iop.org
Clustering anonymity is a common social network data privacy protection scheme, which is
based on graph-clustering. Many existing graph clustering methods mainly focus on the …
based on graph-clustering. Many existing graph clustering methods mainly focus on the …
Evaluating privacy adaptation presentation methods to support social media users in their privacy-related decision-making process
M Namara - 2022 - open.clemson.edu
Several privacy scholars have advocated for user-tailored privacy (UTP). A privacy-
enhancing adaptive privacy approach to help reconcile users' lack of awareness, privacy …
enhancing adaptive privacy approach to help reconcile users' lack of awareness, privacy …