Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Tangible privacy: Towards user-centric sensor designs for bystander privacy
Sensor-enabled computers in the form of'IoT'devices such as home security cameras and
voice assistants are increasingly becoming pervasive in our environment. With the …
voice assistants are increasingly becoming pervasive in our environment. With the …
Balancing power dynamics in smart homes: nannies' perspectives on how cameras reflect and affect relationships
Smart home cameras raise privacy concerns in part because they frequently collect data not
only about the primary users who deployed them but also other parties--who may be targets …
only about the primary users who deployed them but also other parties--who may be targets …
Do you need to touch? exploring correlations between personal attributes and preferences for tangible privacy mechanisms
This paper explores how personal attributes, such as age, gender, technological expertise,
or “need for touch”, correlate with people's preferences for properties of tangible privacy …
or “need for touch”, correlate with people's preferences for properties of tangible privacy …
“You just can't know about everything”: Privacy Perceptions of Smart Home Visitors
IoT devices can harvest personal information of any person in their surroundings and this
includes data from visitors. Visitors often cannot protect their privacy in a foreign smart …
includes data from visitors. Visitors often cannot protect their privacy in a foreign smart …
Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …
" They Look at Vulnerability and Use That to Abuse You'': Participatory Threat Modelling with Migrant Domestic Workers
The needs of marginalised groups like migrant domestic workers (MDWs) are often ignored
in digital privacy and security research. If considered, MDWs are treated as' bystanders' or …
in digital privacy and security research. If considered, MDWs are treated as' bystanders' or …
Powering for privacy: improving user trust in smart speaker microphones with intentional powering and perceptible assurance
Smart speakers come with always-on microphones to facilitate voice-based interaction. To
address user privacy concerns, existing devices come with a number of privacy features: eg …
address user privacy concerns, existing devices come with a number of privacy features: eg …
More than just informed: The importance of consent facets in smart homes
Data collection without proper consent is a growing concern as smart home devices gain
prevalence. It is especially difficult to obtain consent from incidental users because they may …
prevalence. It is especially difficult to obtain consent from incidental users because they may …
Priview–exploring visualisations to support users' privacy awareness
We present PriView, a concept that allows privacy-invasive devices in the users' vicinity to
be visualised. PriView is motivated by an ever-increasing number of sensors in our …
be visualised. PriView is motivated by an ever-increasing number of sensors in our …
Data transparency design in internet of things: a systematic review
Data transparency plays a critical role in understanding IoT privacy practices and making
informed decisions. To gain a comprehensive understanding of transparency in the IoT …
informed decisions. To gain a comprehensive understanding of transparency in the IoT …