Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Usable Privacy and Security in Mobile Applications: Perception of Mobile End Users in Saudi Arabia
S Saeed - Big Data and Cognitive Computing, 2024 - search.proquest.com
Privacy and security is very critical for mobile users and in-depth research into the area
highlights a need for more scientific literature on the perception and challenges of end users …
highlights a need for more scientific literature on the perception and challenges of end users …
US4USec: A User Story Model for Usable Security
M Gharib - International Conference on Research Challenges in …, 2024 - Springer
Constant integration of new technologies in our daily lives exposes us to various security
threats. While numerous security solutions have been developed to protect us from these …
threats. While numerous security solutions have been developed to protect us from these …
Towards the access to information regarding the Personal Data Handling: A proposal for improvement and simplification of Privacy and Security Policies
The emergence of data-driven business models has boosted computational activities
supported by the manipulation of personal data, as their capacity to generate information …
supported by the manipulation of personal data, as their capacity to generate information …
[PDF][PDF] WG5: Legal factors in cybersecurity for wireless systems: a vertical approach
Abstract Next-Generation Wireless Networks and Systems (NGWN-Ss) are foundational to
realizing a seamlessly connected world, unlocking transformative services and applications …
realizing a seamlessly connected world, unlocking transformative services and applications …
Towards the access to information regarding the Personal Data Handling: A proposal for improvement and simplification of Privacy and Security Policies
The emergence of data-driven business models has boosted computational activities
supported by the manipulation of personal data, as their capacity to generate information …
supported by the manipulation of personal data, as their capacity to generate information …
Von Requirements zu Privacy Explanations: Ein nutzerzentrierter Ansatz für Usable Privacy
W Brunotte - 2024 - repo.uni-hannover.de
Im Zeitalter der fortschreitenden Digitalisierung, in dem die Technologie zunehmend in
unsere Gesellschaft eindringt, rücken sogenannte human values wie Ethik, Fairness …
unsere Gesellschaft eindringt, rücken sogenannte human values wie Ethik, Fairness …
Erreichen von Usable Privacy durch die Einbindung bewährter RE-Methoden in den Human-Centered-Design-Prozess
H Schmitt, EC Groen - Softwaretechnik-Trends Band 43, Heft 1, 2023 - dl.gi.de
Zusammenfassung Bei der Entwicklung interaktiver Systeme sind die Nutzer* innen und
deren Anforderungen und Bedarfe von zentraler Bedeutung. Ein gängiges Verfahren, um …
deren Anforderungen und Bedarfe von zentraler Bedeutung. Ein gängiges Verfahren, um …
[PDF][PDF] Pregled dosadašnjih istraživanja o upotrebljivoj privatnosti i sigurnosti u dizajnu informatičkih usluga
M Kuštelega - Znanstveni skup doktorskih studenata informatike …, 2024 - inf.uniri.hr
Postoji jaz između koncepata upotrebljivosti (engl. usability) i privatnosti/sigurnosti prilikom
dizajniranja informatičkih usluga [1]. Organizacije su tradicionalno pridavale važnost …
dizajniranja informatičkih usluga [1]. Organizacije su tradicionalno pridavale važnost …