Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Exploring the frontiers of cybersecurity behavior: A systematic review of studies and theories
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …
organizations from cybercrimes and security incidents. Without considering human …
What are cybersecurity education papers about? a systematic literature review of sigcse and iticse conferences
Cybersecurity is now more important than ever, and so is education in this field. However,
the cybersecurity domain encompasses an extensive set of concepts, which can be taught in …
the cybersecurity domain encompasses an extensive set of concepts, which can be taught in …
[HTML][HTML] From cobit to iso 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models
This study investigated the integration readiness of four predominant cybersecurity
Governance, Risk and Compliance (GRC) frameworks–NIST CSF 2.0, COBIT 2019, ISO …
Governance, Risk and Compliance (GRC) frameworks–NIST CSF 2.0, COBIT 2019, ISO …
How do Older Adults feel about engaging with Cyber‐Security?
Older adults are increasingly a target for cyber‐attacks; however, very little research has
investigated how they feel about engaging in protective cyber‐security behaviors. We …
investigated how they feel about engaging in protective cyber‐security behaviors. We …
The evolving menace of ransomware: A comparative analysis of pre-pandemic and mid-pandemic attacks
Drawing upon direct interviews and secondary sources, this article presents a qualitative
comparative analysis of 39 ransomware attacks, 26 of which occurred shortly before the …
comparative analysis of 39 ransomware attacks, 26 of which occurred shortly before the …
[HTML][HTML] The tensions of cyber-resilience: From sensemaking to practice
The growing sophistication, frequency and severity of cyberattacks targeting all sectors
highlight their inevitability and the impossibility of completely protecting the integrity of …
highlight their inevitability and the impossibility of completely protecting the integrity of …
Ransomware: Analysing the impact on Windows active directory domain services
Ransomware has become an increasingly popular type of malware across the past decade
and continues to rise in popularity due to its high profitability. Organisations and enterprises …
and continues to rise in popularity due to its high profitability. Organisations and enterprises …
Participatory threat modelling: Exploring paths to reconfigure cybersecurity
J Slupska, SD Dawson Duckworth, L Ma… - extended abstracts of the …, 2021 - dl.acm.org
We present “participatory threat modelling” as a feminist cybersecurity practice which allows
technology research to centre traditionally marginalized and excluded experiences. We …
technology research to centre traditionally marginalized and excluded experiences. We …
What Motivates and Discourages Employees in Phishing Interventions: An Exploration of {Expectancy-Value} Theory
Organizations adopt a combination of measures to defend against phishing attacks that pass
through technical filters. However, employees' engagement with these countermeasures …
through technical filters. However, employees' engagement with these countermeasures …
Understanding the security and privacy implications of online toxic content on refugees
A Arunasalam, H Farrukh, E Tekcan… - 33rd USENIX Security …, 2024 - usenix.org
Deteriorating conditions in regions facing social and political turmoil have resulted in the
displacement of huge populations known as refugees. Technologies such as social media …
displacement of huge populations known as refugees. Technologies such as social media …