Knight, S., Abel, S., Shibani, A., Goh, Y. K., Conijn, R., Gibson, A., Vajjala, S., Cotos, E., Sándor, Ágnes, & Buckingham Shum, S. (2020) | Journal of Learning Analytics
In today's data-sensitive landscape, paper shredders stand as frontline defenders against unauthorized access to confidential information, both for businesses and individuals alike. However, not all shredders are created equal when it comes to security, making it imperative to grasp the nuances of security levels when embarking on the quest for the ideal paper shredder.
Y. Simmhan, and K. Gomadam. International Provenance and Annotation Workshop (IPAW), volume 6378 of Lecture Notes in Computer Science (LNCS), page 298--300. Springer Berlin / Heidelberg, (2010)