Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A systematic analysis of failures in protecting personal health data: A sco** review
Personal health data breaches pose significant challenges to healthcare providers and
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …
[HTML][HTML] A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises
The proliferation of information and communication technologies in enterprises enables
them to develop new business models and enhance their operational and commercial …
them to develop new business models and enhance their operational and commercial …
[HTML][HTML] Evaluating privacy, security, and trust perceptions in conversational AI: A systematic review
Conversational AI (CAI) systems which encompass voice-and text-based assistants are on
the rise and have been largely integrated into people's everyday lives. Despite their …
the rise and have been largely integrated into people's everyday lives. Despite their …
A systematic literature review of the role of trust and security on Fintech adoption in banking
Fintech's development has amplified cybercrime, prompting trust and security concerns in
banking. While earlier research predominantly viewed Fintech adoption through a tech …
banking. While earlier research predominantly viewed Fintech adoption through a tech …
Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents
Recent information and cybersecurity research have focused on improving individuals'
security compliance behavior. However, improved security performance remains a …
security compliance behavior. However, improved security performance remains a …
[HTML][HTML] Frontline healthcare providers' behavioural intention to Internet of Things (IoT)-enabled healthcare applications: A gender-based, cross-generational study
M Alraja - Technological Forecasting and Social Change, 2022 - Elsevier
There are numerous risks associated with the interconnection of healthcare provision and
the Internet of Things (IoT), with its sensory capabilities shown to reduce confidence in novel …
the Internet of Things (IoT), with its sensory capabilities shown to reduce confidence in novel …
Employees' behavioural intention to smartphone security: A gender-based, cross-national study
Despite the benefits of bring your own device (BYOD) programmes, they are considered one
of the top security risks companies are facing. Furthermore, there is a gap in the literature in …
of the top security risks companies are facing. Furthermore, there is a gap in the literature in …
The role of employees' information security awareness on the intention to resist social engineering
T Grassegger, D Nedbal - Procedia Computer Science, 2021 - Elsevier
Social engineering is a form of attack trying to manipulate employees to make them disclose
confidential information or perform actions that threatens the security of organizations. The …
confidential information or perform actions that threatens the security of organizations. The …
Empowering students for cybersecurity awareness management in the emerging digital era: the role of cybersecurity attitude in the 4.0 industrial revolution era
The purpose of the study is to examine how cybersecurity knowledge, password security,
and self-perception of skill affect cybersecurity awareness issues via the mediating lens of …
and self-perception of skill affect cybersecurity awareness issues via the mediating lens of …
Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach
Individuals and organizations rely on social media to share files and knowledge. On the
other hand, criminals find social media applications a rich place to attack through techniques …
other hand, criminals find social media applications a rich place to attack through techniques …