Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cyberloafing: A review and research agenda
In an increasingly digitized world, the concept of cyberloafing has gained much attention as
employees use the Internet for personal purposes during work hours. Over the last two …
employees use the Internet for personal purposes during work hours. Over the last two …
EPM 20/20: A review, framework, and research agenda for electronic performance monitoring
Electronic performance monitoring (EPM) refers to the use of technological means to
observe, record, and analyze information that directly or indirectly relates to job …
observe, record, and analyze information that directly or indirectly relates to job …
Algorithmic control and gig workers: a legitimacy perspective of Uber drivers
Organisations increasingly rely on algorithms to exert automated managerial control over
workers, referred to as algorithmic control (AC). The use of AC is already commonplace with …
workers, referred to as algorithmic control (AC). The use of AC is already commonplace with …
The rise of human machines: How cognitive computing systems challenge assumptions of user-system interaction
Cognitive computing systems (CCS) are a new class of computing systems that implement
more human-like cognitive abilities. CCS are not a typical technological advancement but an …
more human-like cognitive abilities. CCS are not a typical technological advancement but an …
Seeing the forest and the trees
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …
(and noncompliance) with information security policies. However, the number of competing …
Using design-science based gamification to improve organizational security training and compliance
We conducted a design-science research project to improve an organization's compound
problems of (1) unsuccessful employee phishing prevention and (2) poorly received internal …
problems of (1) unsuccessful employee phishing prevention and (2) poorly received internal …
Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning …
The dramatic increase in social media use has challenged traditional social structures and
shifted a great deal of interpersonal communication from the physical world to cyberspace …
shifted a great deal of interpersonal communication from the physical world to cyberspace …
What are the trend and core knowledge of information security? A citation and co-citation analysis
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …
potential safety hazards to organizations. In response to the increasing academia and …
What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors
Because violations of information security (ISec) and privacy have become ubiquitous in
both personal and work environments, academic attention to ISec and privacy has taken on …
both personal and work environments, academic attention to ISec and privacy has taken on …
Organizational information security policies: a review and research framework
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …
of organizational policies that specify how users of information and technology resources …