Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Compliance with information security policies: An empirical investigation
Information security was the main topic in this paper. An investigation of the compliance to
information security policies were discussed. The author mentions that the insignificant …
information security policies were discussed. The author mentions that the insignificant …
Toward a new meta-theory for designing information systems (IS) security training approaches
M Karjalainen, M Siponen - Journal of the Association for …, 2011 - aisel.aisnet.org
Employees' non-compliance with IS security procedures is a key concern for organizations.
To tackle this problem, there exist several training approaches aimed at changing …
To tackle this problem, there exist several training approaches aimed at changing …
Influencing users towards better passwords: persuasive cued click-points
Usable security has unique usability challenges because the need for security often means
that standard human-computerinteraction approaches cannot be directly applied. An …
that standard human-computerinteraction approaches cannot be directly applied. An …
A design theory-based gamification approach for information security training
This study reviews previous information security (InfoSec) training studies and identifies
three significant gaps. They are (1) lacking pedagogical theories developed specifically in IS …
three significant gaps. They are (1) lacking pedagogical theories developed specifically in IS …
Improving text passwords through persuasion
Password restriction policies and advice on creating secure passwords have limited effects
on password strength. Influencing users to create more secure passwords remains an open …
on password strength. Influencing users to create more secure passwords remains an open …
Improving passwords: Influence of emotions on security behaviour
I Gulenko - Information Management & Computer Security, 2014 - emerald.com
Purpose–This paper aims to study the influence of emotions on security behaviour by
reviewing Information Systems Security (ISS) topics in Information Systems (IS) literature …
reviewing Information Systems Security (ISS) topics in Information Systems (IS) literature …
Persuasion for stronger passwords: Motivation and pilot study
Text passwords are the ubiquitous method of authentication, used by most people for most
online services. Many people choose weak passwords that are vulnerable to attackers who …
online services. Many people choose weak passwords that are vulnerable to attackers who …
[PDF][PDF] A world with many authentication schemes
A Forget - 2013 - repository.library.carleton.ca
Usability and security challenges with standard text passwords have led researchers and
professionals to consider alternative authentication schemes. This thesis explores the …
professionals to consider alternative authentication schemes. This thesis explores the …
[PDF][PDF] Usable authentication and click-based graphical passwords
S Chiasson - 2009 - repository.library.carleton.ca
" Humans are incapable of securely storing high-quality cryptographic keys, and they have
unacceptable speed and accuracy when performing cryptographic operations.(They are …
unacceptable speed and accuracy when performing cryptographic operations.(They are …
Persuasive technology for improving information security awareness and behavior: literature review
The use of Persuasive Technology in various fields is rapidly increasing. It can be applied in
many fields such as computing, marketing, sales, environment, education, and health …
many fields such as computing, marketing, sales, environment, education, and health …