Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The security & privacy acceptance framework (spaf)
How can we encourage end-user acceptance of expert recommended cybersecurity and
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …
[PDF][PDF] Cross-contextual examination of older adults' privacy concerns, behaviors, and vulnerabilities
ABSTRACT A growing body of research has examined the privacy concerns and behaviors
of older adults, often within specific contexts. It remains unclear to what extent older adults' …
of older adults, often within specific contexts. It remains unclear to what extent older adults' …
SoK: Web Authentication in the Age of End-to-End Encryption
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …
new challenges for usable authentication. Compared to regular web services, the nature of …
The Mundane Art of Cybersecurity: Living with Insecure IT in Danish Small-and Medium-Sized Enterprises
Small-and medium-sized enterprises (SMEs) are an essential part of the global economy
and paramount to local communities and employment markets. They are also considered to …
and paramount to local communities and employment markets. They are also considered to …
[PDF][PDF] 'The trivial tickets build the trust': a co-design approach to understanding security support interactions in a large university
Increasingly, organizations are acknowledging the importance of human factors in the
management of security in workplaces. There are challenges in managing security …
management of security in workplaces. There are challenges in managing security …
Co-design and modelling of security policy for cultural and behavioural aspects of security in organisations
A Demjaha - 2023 - discovery.ucl.ac.uk
Organisations have historically applied a technology-oriented approach to information
security. However, organisations are increasingly acknowledging the importance of human …
security. However, organisations are increasingly acknowledging the importance of human …
The Subversive AI Acceptance Scale (SAIA-8): A Scale to Measure User Acceptance of AI-Generated, Privacy-Enhancing Image Modifications
To resist government and corporate use of facial recognition to surveil users through their
personal images, researchers have created privacy-enhancing image filters that use …
personal images, researchers have created privacy-enhancing image filters that use …
[PDF][PDF] Toward a Socio-Cognitive Stage Model of Cybersecurity Behavior Adoption
C Faklaris - 2022 - researchgate.net
My research looks at how to apply insights from social psychology, marketing, and public
health to reduce the costs of cybercrime and improve adoption of security practices. The …
health to reduce the costs of cybercrime and improve adoption of security practices. The …
[PDF][PDF] How a Security Adoption Process Model Might Differ for Information Workers
C Faklaris - researchgate.net
Given the behavioral complexities of cybersecurity, information security workers would
benefit from a model of security practice adoption that is tailored to the organizational …
benefit from a model of security practice adoption that is tailored to the organizational …