Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Robots in tourism: A research agenda for tourism economics
The technological advances in artificial intelligence and robotics allow the massive
introduction of service robots by travel, tourism and hospitality companies. While research …
introduction of service robots by travel, tourism and hospitality companies. While research …
Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments
AB Garba, J Armarego, D Murray… - Journal of Information …, 2015 - Taylor & Francis
With increasing development and adoption of information and communication technology
initiatives internationally, evolving trends such as bring your own device (BYOD) is rapidly …
initiatives internationally, evolving trends such as bring your own device (BYOD) is rapidly …
Advanced social engineering attacks
Social engineering has emerged as a serious threat in virtual communities and is an
effective means to attack information systems. The services used by today's knowledge …
effective means to attack information systems. The services used by today's knowledge …
Review of security and privacy for the Internet of Medical Things (IoMT)
Day-by-day modern circular economy (CE) models gain ground and penetrate the traditional
business sectors. The Internet of Medical Things (IoMT) is the main enabler for this interplay …
business sectors. The Internet of Medical Things (IoMT) is the main enabler for this interplay …
Beyond the organizational 'container': Conceptualizing 21st century sociotechnical work
The sociotechnical systems (STS) approach provides a framework that is well suited to
grappling with many issues of work in organizations. By conceiving of work systems as …
grappling with many issues of work in organizations. By conceiving of work systems as …
Cloud computing: History and overview
Cloud computing has emerged as a new technology and business paradigm in the last
couple of years. Cloud computing platforms provide easy access, scalability, reliability …
couple of years. Cloud computing platforms provide easy access, scalability, reliability …
Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach
Malware have been regarded as a persistent threat to both individuals and organisations
due to its wide spread via various means of infection. With the increasing use of personal …
due to its wide spread via various means of infection. With the increasing use of personal …
BYOD security engineering: A framework and its analysis
N Zahadat, P Blessner, T Blackburn, BA Olson - Computers & Security, 2015 - Elsevier
With the rapid increase of smartphones and tablets, security concerns have also been on the
rise. Employees find it desirable to use personal mobile devices for their work and make no …
rise. Employees find it desirable to use personal mobile devices for their work and make no …
Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination
The loss and theft of mobile devices is a growing risk that has yet to be addressed in detail
by the IS community. This study extends the literature significantly by examining the roles of …
by the IS community. This study extends the literature significantly by examining the roles of …
You are what you broadcast: Identification of mobile and {IoT} devices from (public){WiFi}
L Yu, B Luo, J Ma, Z Zhou, Q Liu - 29th USENIX security symposium …, 2020 - usenix.org
With the rapid growth of mobile devices and WiFi hotspots, security risks arise. In practice, it
is critical for administrators of corporate and public wireless networks to identify the type …
is critical for administrators of corporate and public wireless networks to identify the type …