Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Deepfakes, phrenology, surveillance, and more! a taxonomy of ai privacy risks
Privacy is a key principle for develo** ethical AI technologies, but how does including AI
technologies in products and services change privacy risks? We constructed a taxonomy of …
technologies in products and services change privacy risks? We constructed a taxonomy of …
Walking the walk of AI ethics: Organizational challenges and the individualization of risk among ethics entrepreneurs
Amidst decline in public trust in technology, computing ethics have taken center stage, and
critics have raised questions about corporate “ethics washing.” Yet few studies examine the …
critics have raised questions about corporate “ethics washing.” Yet few studies examine the …
Investigating practices and opportunities for cross-functional collaboration around AI fairness in industry practice
An emerging body of research indicates that ineffective cross-functional collaboration–the
interdisciplinary work done by industry practitioners across roles–represents a major barrier …
interdisciplinary work done by industry practitioners across roles–represents a major barrier …
A narrative review of factors affecting the implementation of privacy and security practices in software development
Privacy and security are complex topics, raising a variety of considerations and
requirements that can be challenging to implement in software development. Determining …
requirements that can be challenging to implement in software development. Determining …
Translating privacy design principles into human-centered Software Lifecycle: A literature review
Companies and organizations involved in software development are stimulated and often
obliged to consider procedures and technical solutions to guarantee data privacy and …
obliged to consider procedures and technical solutions to guarantee data privacy and …
Privacy legislation as business risks: How GDPR and CCPA are represented in technology companies' investment risk disclosures
Power exercised by large technology companies has led to concerns over privacy and data
protection, evidenced by the passage of legislation including the EU's General Data …
protection, evidenced by the passage of legislation including the EU's General Data …
Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps
We investigate the privacy compliance processes followed by developers of child-directed
mobile apps. While children's online privacy laws have existed for decades in the US, prior …
mobile apps. While children's online privacy laws have existed for decades in the US, prior …
{“Security} is not my field,{I'm} a stats {guy”}: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry
Adversarial machine learning (AML) has the potential to leak training data, force arbitrary
classifications, and greatly degrade overall performance of machine learning models, all of …
classifications, and greatly degrade overall performance of machine learning models, all of …
Evaluating privacy perceptions, experience, and behavior of software development teams
With the increase in the number of privacy regulations, small development teams are forced
to make privacy decisions on their own. In this paper, we conduct a mixed-method survey …
to make privacy decisions on their own. In this paper, we conduct a mixed-method survey …
Privacy engineering in the wild: Understanding the practitioners' mindset, organizational aspects, and current practices
Privacy engineering, as an emerging field of research and practice, comprises the technical
capabilities and management processes needed to implement, deploy, and operate privacy …
capabilities and management processes needed to implement, deploy, and operate privacy …