Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Children's reflections on privacy and the protection of their personal data: A child-centric approach to data protection information formats
Ample research exists and focuses on teenagers' understanding of interpersonal privacy on
social media. Less is known about younger children's understanding of privacy and data …
social media. Less is known about younger children's understanding of privacy and data …
Informing Children about Privacy: A Review and Assessment of Age-Appropriate Information Designs in Kids-Oriented F2P Video Games
With the rise of free-to-play (F2P) games, the profitability of video-gaming apps critically
depends on the ability of developers to acquire, retain, and monetize large numbers of …
depends on the ability of developers to acquire, retain, and monetize large numbers of …
Child-friendly transparency of data processing in the EU: from legal requirements to platform policies
Vast amounts of personal data of children are collected and processed in today's
increasingly digital, connected society by public and private actors. Children do have a right …
increasingly digital, connected society by public and private actors. Children do have a right …
The GLID method: Moving from design features to underlying values in co-design
In this paper, we present the GLID method to integrate verbal, material and other co-design
outcomes in a structured and coherent analysis. GLID aims to increase internal rigor and …
outcomes in a structured and coherent analysis. GLID aims to increase internal rigor and …
Post-implementation evaluation and challenges of Integrated Financial Management Information Systems for municipalities in South Africa
Background: Municipalities in South Africa are currently grappling with the introduction of
Integrated Financial Management Information Systems (IFMIS) to improve financial …
Integrated Financial Management Information Systems (IFMIS) to improve financial …
Complying with the GDPR when vulnerable people use smart devices
Complying with the GDPR when vulnerable people use smart devices | International Data
Privacy Law | Oxford Academic Skip to Main Content Advertisement Oxford Academic Journals …
Privacy Law | Oxford Academic Skip to Main Content Advertisement Oxford Academic Journals …
[PDF][PDF] Designing technologies for and with children: Theoretical reflections and a practical inquiry towards a co-design toolkit
M Van Mechelen - 2016 - lirias.kuleuven.be
Giving those who are destined to use a product or service a critical role in its design is a core
tenet of the Participatory Design (PD) tradition. PD is characterized by a process of …
tenet of the Participatory Design (PD) tradition. PD is characterized by a process of …
Expert perspectives on GDPR compliance in the context of smart homes and vulnerable persons
This article introduces information gathered through 21 semi-structured interviews
conducted with UK, EU and international professionals in the field of General Data …
conducted with UK, EU and international professionals in the field of General Data …
Understanding the motivations and barriers to adoption and effective use of connectivity technologies by SMEs in RRR Australia
CA Wilson - 2022 - researchonline.jcu.edu.au
Carrie-Ann Wilson studied connectivity technology adoption by rural, regional and remote
(RRR) small and medium enterprises (SMEs). She found that unreliable connectivity …
(RRR) small and medium enterprises (SMEs). She found that unreliable connectivity …
[PDF][PDF] Co-Design as an agile information systems strategy to empower bottom-of-the-pyramid (BoP) ICT end-users in national government departments in develo** …
Lack of user involvements in the design phase of Systems Development Life Cycle (SDLC)
is believed to be the contributing factors to the barriers inherent to the poor use and …
is believed to be the contributing factors to the barriers inherent to the poor use and …