Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Sok: Safer digital-safety research involving at-risk users
Research involving at-risk users—that is, users who are more likely to experience a digital
attack or to be disproportionately affected when harm from such an attack occurs—can pose …
attack or to be disproportionately affected when harm from such an attack occurs—can pose …
" I Never Imagined Grandma Could Do So Well with Technology" Evolving Roles of Younger Family Members in Older Adults' Technology Learning and Use
Older adults' technology learning is a long-term process, during which family members often
play significant roles. Although much research has emphasized how family support is …
play significant roles. Although much research has emphasized how family support is …
" We are half-doctors": Family Caregivers as Boundary Actors in Chronic Disease Management
Computer-Supported Cooperative Work (CSCW) and Human--Computer Interaction (HCI)
research is increasingly investigating the roles of caregivers as ancillary stakeholders in …
research is increasingly investigating the roles of caregivers as ancillary stakeholders in …
Infrastructuring telehealth in (in) formal patient-doctor contexts
Telehealth technologies have long remained on the peripheries of healthcare systems that
prioritize in-person healthcare provision. The spread of the COVID-19 pandemic has …
prioritize in-person healthcare provision. The spread of the COVID-19 pandemic has …
“desperate times call for desperate measures”: User concerns with mobile loan apps in kenya
The usage of mobile loan applications has proliferated in develo** countries. This is due
to the ease and speed in which they disburse small loans to users, compared to traditional …
to the ease and speed in which they disburse small loans to users, compared to traditional …
SoK: Social Cybersecurity
We analyze prior work in social cybersecurity and present a structuring of this literature
based on its pertinence to four S&P-relevant social behaviors:(1) negotiating access to …
based on its pertinence to four S&P-relevant social behaviors:(1) negotiating access to …
Unofficial proxies: How close others help older adults with banking
We present results of a survey (n= 42) investigating how close others (family members,
friends, or other community members) assist older adults with banking tasks in Canada. We …
friends, or other community members) assist older adults with banking tasks in Canada. We …
Feeling proud, feeling embarrassed: Experiences of low-income women with crowd work
Women's economic empowerment is central to gender equality. However, work
opportunities available to low-income women in patriarchal societies are infrequent. While …
opportunities available to low-income women in patriarchal societies are infrequent. While …
Navigating traumatic stress reactions during computer security interventions
L Ramjit, N Dolci, F Rossi, R Garcia… - 33rd USENIX Security …, 2024 - usenix.org
At-risk populations need direct support from computer security and privacy consultants, what
we refer to as a security intervention. However, at-risk populations often face security threats …
we refer to as a security intervention. However, at-risk populations often face security threats …
The security & privacy acceptance framework (spaf)
How can we encourage end-user acceptance of expert recommended cybersecurity and
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …