Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
User motivations in protecting information security: Protection motivation theory versus self-determination theory
Managers desiring to protect information systems must understand how to most effectively
motivate users to engage in secure behaviors. Information security researchers have …
motivate users to engage in secure behaviors. Information security researchers have …
A survey on adaptive authentication
Adaptive Authentication allows a system to dynamically select the best mechanism (s) for
authenticating a user depending on contextual factors, such as location, proximity to …
authenticating a user depending on contextual factors, such as location, proximity to …
Why people (don't) use password managers effectively
Security experts often recommend using password-management tools that both store
passwords and generate random passwords. However, research indicates that only a small …
passwords and generate random passwords. However, research indicates that only a small …
Why users (don't) use password managers at a large educational institution
We quantitatively investigated the current state of Password Manager (PM) usage and
general password habits at a large, private university in the United States. Building on prior …
general password habits at a large, private university in the United States. Building on prior …
Examining the adoption and abandonment of security, privacy, and identity theft protection practices
Users struggle to adhere to expert-recommended security and privacy practices. While prior
work has studied initial adoption of such practices, little is known about the subsequent …
work has studied initial adoption of such practices, little is known about the subsequent …
Why older adults (Don't) use password managers
Password managers (PMs) are considered highly effective tools for increasing security, and
a recent study by Pearman et al.(SOUPS'19) highlighted the motivations and barriers to …
a recent study by Pearman et al.(SOUPS'19) highlighted the motivations and barriers to …
Distrust of big tech and a desire for privacy: Understanding the motivations of people who have voluntarily adopted secure email
Secure email systems that use end-to-end encryption are the best method we have for
ensuring user privacy and security in email communication. However, the adoption of secure …
ensuring user privacy and security in email communication. However, the adoption of secure …
Do password managers nudge secure (random) passwords?
S Zibaei, DR Malapaya, B Mercier… - … Symposium on Usable …, 2022 - usenix.org
Passwords are the most popular authentication method due to their simplicity and
widespread adoption. However, the prevalence of password reuse undermines its security …
widespread adoption. However, the prevalence of password reuse undermines its security …
Unraveling the dynamics of password manager adoption: a deeper dive into critical factors
X Tian - Information & Computer Security, 2025 - emerald.com
Purpose The purpose of this study is to comprehensively explore the password manager
adoption landscape, delving into crucial factors such as performance, trust, social influence …
adoption landscape, delving into crucial factors such as performance, trust, social influence …
" I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers
This paper explores what motivates password manager (PM) users in the US to switch from
one PM to another, the techniques they employ when switching, and challenges they …
one PM to another, the techniques they employ when switching, and challenges they …