Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A systematic analysis of failures in protecting personal health data: A sco** review
Personal health data breaches pose significant challenges to healthcare providers and
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …
Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review
Cybersecurity is one of the main challenges faced by companies in the context of the
Industrial Internet of Things (IIoT), in which a number of smart devices associated with …
Industrial Internet of Things (IIoT), in which a number of smart devices associated with …
[HTML][HTML] From cobit to iso 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models
This study investigated the integration readiness of four predominant cybersecurity
Governance, Risk and Compliance (GRC) frameworks–NIST CSF 2.0, COBIT 2019, ISO …
Governance, Risk and Compliance (GRC) frameworks–NIST CSF 2.0, COBIT 2019, ISO …
Influence of human factors on cyber security within healthcare organisations: A systematic review
Background: Cybersecurity is increasingly becoming a prominent concern among
healthcare providers in adopting digital technologies for improving the quality of care …
healthcare providers in adopting digital technologies for improving the quality of care …
The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
This paper investigates the role of general cybersecurity and cybersecurity policy awareness
in enhancing supply chain cyber resilience reactive capabilities. Theorizing from the …
in enhancing supply chain cyber resilience reactive capabilities. Theorizing from the …
A systematic review of multi perspectives on human cybersecurity behavior
Although the cornerstones of cybersecurity are technical and data-driven solutions, the
human element cannot be disregarded. Understanding users' behavior is essential to spot …
human element cannot be disregarded. Understanding users' behavior is essential to spot …
[HTML][HTML] Addressing human factors in cybersecurity leadership
WJ Triplett - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
This article identifies human factors in workplaces that contribute to the challenges faced by
cybersecurity leadership within organizations and discusses strategic communication …
cybersecurity leadership within organizations and discusses strategic communication …
Digital health innovation: exploring adoption of COVID-19 digital contact tracing apps
With the outbreak of COVID-19, contact tracing is becoming a used intervention to control
the spread of this highly infectious disease. This article explores an individual's intention to …
the spread of this highly infectious disease. This article explores an individual's intention to …
[HTML][HTML] Exploring consumer mobile payment innovations: An investigation into the relationship between co** theory factors, individual motivations, social influence …
This study incorporates the social influence with the conceptualizations from the co**
theory to investigate tourists' disposition towards mobile payment system (MPS). The data …
theory to investigate tourists' disposition towards mobile payment system (MPS). The data …
Privacy at work: A review and a research agenda for a contested terrain
Privacy in the workplace is a pivotal concern for employees and employers. Employees
expect to be in control of the personal information and access they provide to the …
expect to be in control of the personal information and access they provide to the …