Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy champions in software teams: Understanding their motivations, strategies, and challenges
Software development teams are responsible for making and implementing software design
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …
Identification of key cyberbullies: A text mining and social network analysis approach
Cyberbullying is a major problem in society, and the damage it causes is becoming
increasingly significant. Previous studies on cyberbullying focused on detecting and …
increasingly significant. Previous studies on cyberbullying focused on detecting and …
Cyber-resiliency for digital enterprises: a strategic leadership perspective
As organizations increasingly view information as one of their most valuable assets, which
supports the creation and distribution of their products and services, information security will …
supports the creation and distribution of their products and services, information security will …
Linking cybersecurity and accounting: An event, impact, response framework
Due to recent high-profile cybersecurity breaches and increased practitioner and regulatory
attention, organizations are under pressure to consider the accounting implications of these …
attention, organizations are under pressure to consider the accounting implications of these …
Can peers help reduce violations of information security policies? The role of peer monitoring
Peers may help others avoid violating organisational information security policies (ISPs).
This study explores how peer monitoring reduces employee ISP violation intention. We …
This study explores how peer monitoring reduces employee ISP violation intention. We …
[HTML][HTML] Multiplex Social Network Analysis to Understand the Social Engagement of Patients in Online Health Communities
Y Lu, X Wang, L Su, H Zhao - Mathematics, 2023 - mdpi.com
Social network analysis has been widely used in various fields including online health
communities. However, it is still a challenge to understand how patients' individual …
communities. However, it is still a challenge to understand how patients' individual …
Computer network information security protection faced by digital art museums based on the internet of things
Q Wang, L Li, S Hu - Wireless Communications and Mobile …, 2021 - Wiley Online Library
The development of the Internet of things provides a great opportunity for the development of
all walks of life, but it also brings many risks in the process, of which the most important thing …
all walks of life, but it also brings many risks in the process, of which the most important thing …
Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis
IT consumerization, or the end-user's adoption of consumer IT for work purpose, is an
emerging topic which recently attracted the attention of researchers and practitioners. This …
emerging topic which recently attracted the attention of researchers and practitioners. This …
Employees' Cybersecurity Behaviour in the Mobile Context: The Role of Self-Efficacy and Psychological Ownership
SF Verkijika - 2020 2nd International Multidisciplinary …, 2020 - ieeexplore.ieee.org
Mobile devices are widely known to be a cybersecurity risk for organisations. However, their
use for work purposes is largely becoming a common practice as most organisations rather …
use for work purposes is largely becoming a common practice as most organisations rather …
Explaining the development of information security climate and an information security support network: a longitudinal social network analysis
Behavioural information security (InfoSec) research has studied InfoSec at workplaces
through the employees' perceptions of InfoSec climate, which is determined by observable …
through the employees' perceptions of InfoSec climate, which is determined by observable …