Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The experience sampling method on mobile devices
The Experience Sampling Method (ESM) is used by scientists from various disciplines to
gather insights into the intra-psychic elements of human life. Researchers have used the …
gather insights into the intra-psychic elements of human life. Researchers have used the …
Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage
Due to the increasing popularity of recent advanced features and context-awareness in
smart mobile phones, the contextual data relevant to users' diverse activities with their …
smart mobile phones, the contextual data relevant to users' diverse activities with their …
Find me if you can: improving geographical prediction with social and spatial proximity
Geography and social relationships are inextricably intertwined; the people we interact with
on a daily basis almost always live near us. As people spend more time online, data …
on a daily basis almost always live near us. As people spend more time online, data …
Privacy concerns for use of voice activated personal assistant in the public space
A Easwara Moorthy, KPL Vu - International Journal of Human …, 2015 - Taylor & Francis
A review of popular technology adoption models identified several factors that are likely to
influence Voice Activated Personal Assistant (VAPA) use in public spaces. To inform design …
influence Voice Activated Personal Assistant (VAPA) use in public spaces. To inform design …
Understanding and capturing people's privacy policies in a mobile social networking application
A number of mobile applications have emerged that allow users to locate one another.
However, people have expressed concerns about the privacy implications associated with …
However, people have expressed concerns about the privacy implications associated with …
Empowerment through seamfulness: smart phones in everyday life
L Barkhuus, VE Polichar - Personal and Ubiquitous Computing, 2011 - Springer
In this paper, we describe research into use of multifunctional mobile phones by working
adults and posit the device as a plausible realization of ubiquitous computing. We …
adults and posit the device as a plausible realization of ubiquitous computing. We …
Dimensionality of information disclosure behavior
In studies of people's privacy behavior, the extent of disclosure of personal information is
typically measured as a summed total or a ratio of disclosure. In this paper, we evaluate …
typically measured as a summed total or a ratio of disclosure. In this paper, we evaluate …
Location-sharing technologies: Privacy risks and controls
Due to the ability of cell phone providers to use cell phone towers to pinpoint users'
locations, federal E911 requirements, the increasing popularity of GPS-capabilities in …
locations, federal E911 requirements, the increasing popularity of GPS-capabilities in …
Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share
As ubiquitous computing becomes increasingly mobile and social, personal information
sharing will likely increase in frequency, the variety of friends to share with, and range of …
sharing will likely increase in frequency, the variety of friends to share with, and range of …
From awareness to repartee: sharing location within social groups
This paper investigates emergent practices around'microblogging', changing and sharing
status within a social group. We present results from a trial of'Connecto', a phone based …
status within a social group. We present results from a trial of'Connecto', a phone based …