Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance …
A grave concern to an organization's information security is employees' behavior when they
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …
A survey of AI ethics in business literature: Maps and trends between 2000 and 2021
MT Daza, UJ Ilozumba - Frontiers in Psychology, 2022 - frontiersin.org
Artificial intelligence is spreading rapidly in business products and processes, with
innovations that bring great benefits to society; however, significant risks also arise. AI …
innovations that bring great benefits to society; however, significant risks also arise. AI …
A framework for understanding reasoning errors: From fake news to climate change and beyond
G Pennycook - Advances in experimental social psychology, 2023 - Elsevier
Humans have the capacity, but perhaps not always the willingness, for great intelligence.
From global warming to the spread of misinformation and beyond, our species is facing …
From global warming to the spread of misinformation and beyond, our species is facing …
[HTML][HTML] Higher education during the pandemic: The predictive factors of learning effectiveness in COVID-19 online learning
The global coronavirus disease (COVID-19) outbreak forced a shift from face-to-face
education to online learning in higher education settings around the world. From the outset …
education to online learning in higher education settings around the world. From the outset …
Seeing the forest and the trees
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …
(and noncompliance) with information security policies. However, the number of competing …
[PDF][PDF] Time Will Tell: The Case for an Idiographic Approach to Behavioral Cybersecurity Research.
Many of the theories used in behavioral cybersecurity research have been applied with a
nomothetic approach, which is characterized by cross-sectional data (eg, one-time surveys) …
nomothetic approach, which is characterized by cross-sectional data (eg, one-time surveys) …
Factors for sustainable online learning in higher education during the COVID-19 pandemic
The coronavirus disease 2019 (COVID-19) pandemic has affected educational institutions
and instructors in an unprecedented way. The majority of educational establishments were …
and instructors in an unprecedented way. The majority of educational establishments were …
Planning for Cyber Security in Schools: The Human Factor.
MD Richardson, PA Lemoine, WE Stephens… - Educational Planning, 2020 - ERIC
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st
century. Computer security is an essential instrument for protecting children, but K-12 …
century. Computer security is an essential instrument for protecting children, but K-12 …
Understanding the determinants of digital distraction: An automatic thinking behavior perspective
Digital distraction is a prevalent technology-use behavior that has received increasing public
attention in the recent years. This study draws on the theory of automatic thinking behaviors …
attention in the recent years. This study draws on the theory of automatic thinking behaviors …
Security monitoring and information security assurance behaviour among employees: An empirical analysis
Purpose The purpose of this research is to explain the influence of information security
monitoring and other social learning factors on employees' security assurance behaviour …
monitoring and other social learning factors on employees' security assurance behaviour …