Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (22)

Search Parameters:
Keywords = awareness combat network

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 1646 KiB  
Article
Consumer Awareness of Fashion Greenwashing: Insights from Social Media Discussions
by Muzhen Li, RayeCarol Cavender and Min-Young Lee
Sustainability 2025, 17(7), 2982; https://doi.org/10.3390/su17072982 - 27 Mar 2025
Cited by 2 | Viewed by 5385
Abstract
Greenwashing, the phenomenon of companies misleading consumers about their sustainability practices, is prevalent in the fashion industry. This study explores consumer opinions on greenwashing through analysis of social media discourse. Cognitive dissonance theory served as the theoretical framework, explaining how consumers reconcile conflicting [...] Read more.
Greenwashing, the phenomenon of companies misleading consumers about their sustainability practices, is prevalent in the fashion industry. This study explores consumer opinions on greenwashing through analysis of social media discourse. Cognitive dissonance theory served as the theoretical framework, explaining how consumers reconcile conflicting information about brands’ sustainability claims. In Study 1, 446 comments on 12 Reddit posts were collected using the search term “fashion greenwashing”. Using the Latent Dirichlet Allocation (LDA) algorithm and manual review, we identified three major themes: the phenomenon of fashion greenwashing, consumer empowerment in sustainable fashion, and skepticism towards fast fashion brands’ marketing strategies. In Study 2, using the search term, “#fashiongreenwashing”, two researchers collected and analyzed 76 Instagram posts with 370 comments. A manual review was employed to extract major themes, and network graphs of caption tags within the same theme were constructed. Three major themes emerged: strategies to combat fashion greenwashing, examples of fashion greenwashing, and advocacy and regulation in sustainable fashion. Findings from Studies 1 and 2 revealed that consumers are increasingly aware of brands’ deceptive practices and advocacy for sustainable practices to resolve this dissonance when they see greenwashing information. This study underscored the need for fashion brands to provide transparent and authentic information. Full article
(This article belongs to the Section Economic and Business Aspects of Sustainability)
Show Figures

Figure 1

21 pages, 318 KiB  
Article
Child-Centered Anti-Trafficking Approaches in Mediterranean Migration Routes: Italy and Turkey
by Ezgi Yaman Kennedy
Soc. Sci. 2024, 13(12), 700; https://doi.org/10.3390/socsci13120700 - 23 Dec 2024
Cited by 1 | Viewed by 4575
Abstract
Introduction: Child trafficking is a clear violation of human rights, robbing minors of their fundamental entitlements. These encompass the right to personal identity, familial bonds, cultural heritage, access to healthcare and proper nourishment, education, freedom of speech, and the assurance of safety and [...] Read more.
Introduction: Child trafficking is a clear violation of human rights, robbing minors of their fundamental entitlements. These encompass the right to personal identity, familial bonds, cultural heritage, access to healthcare and proper nourishment, education, freedom of speech, and the assurance of safety and security. Children and young people, given their inherent vulnerability and limited access to support networks, frequently struggle to safeguard themselves effectively. This predicament presents traffickers with opportunities to exploit and manipulate them. Therefore, it is essential for professionals across various sectors—including education, healthcare, protective and social services, as well as the justice system—to undergo comprehensive training and be integrated into a robust social protection system. This preparation should equip them to conduct screenings, accurately assess needs, and adhere to international guidelines when addressing cases of child trafficking. Aim: The aim of this study is to explore the child-centered anti-trafficking approaches employed by Italy and Turkey, situated along migration pathways in the Mediterranean region and experiencing significant regular and irregular migration flows in recent years. Both nations fall within the classification of southern European welfare regimes. Methodology: This research specifically delves into the social protection policies aimed at children and young victims established by these two countries. Carried out between 1 February 2020 and 20 May 2021, this study employed a semi-structured interview approach, conducting qualitative in-depth interviews in both Italy and Turkey. This research targeted experts from various disciplines engaged in combating human trafficking in both countries, with a total sample size of 46 participants, comprising 15 experts from Italy and 31 from Turkey. Grounded theory formed the basis of the study, with data analyzed using the MAXQDA 2020 Pro Analytics program, employing a multidisciplinary and empowerment approach. Results: The analysis yielded 2942 codes, 17 sub-themes, and four main themes. The study identified four main themes: (i) characteristics of child victims and vulnerable child groups, (ii) services provided to at-risk groups and child trafficking victims within the current national counter-trafficking framework, (iii) challenges encountered in delivering services to children and young individuals, and (iv) recommendations for establishing an effective and child-centered protection system. Discussion and Conclusion: It is imperative to ensure that victims of child trafficking have access to comprehensive social protection measures. It has been noted that both Italy and Turkey offer various services to victims of child trafficking, including in-kind and -cash social assistance, free legal aid, shelter services, access to education and healthcare, as well as prevention, awareness, and advocacy programs. However, there are also differences between the two countries in certain aspects. Recommendations aimed at addressing these differences can be developed by adhering to the minimum standards outlined in the Council of Europe Convention on Action against Trafficking in Human Beings. Full article
(This article belongs to the Special Issue Emerging Trends and Dimensions of Child Trafficking)
27 pages, 2374 KiB  
Review
Cybersecurity at Sea: A Literature Review of Cyber-Attack Impacts and Defenses in Maritime Supply Chains
by Maria Valentina Clavijo Mesa, Carmen Elena Patino-Rodriguez and Fernando Jesus Guevara Carazas
Information 2024, 15(11), 710; https://doi.org/10.3390/info15110710 - 6 Nov 2024
Cited by 11 | Viewed by 7714
Abstract
The maritime industry is constantly evolving and posing new challenges, especially with increasing digitalization, which has raised concerns about cyber-attacks on maritime supply chain agents. Although scholars have proposed various methods and classification models to counter these cyber threats, a comprehensive cyber-attack taxonomy [...] Read more.
The maritime industry is constantly evolving and posing new challenges, especially with increasing digitalization, which has raised concerns about cyber-attacks on maritime supply chain agents. Although scholars have proposed various methods and classification models to counter these cyber threats, a comprehensive cyber-attack taxonomy for maritime supply chain actors based on a systematic literature review is still lacking. This review aims to provide a clear picture of common cyber-attacks and develop a taxonomy for their categorization. In addition, it outlines best practices derived from academic research in maritime cybersecurity using PRISMA principles for a systematic literature review, which identified 110 relevant journal papers. This study highlights that distributed denial of service (DDoS) attacks and malware are top concerns for all maritime supply chain stakeholders. In particular, shipping companies are urged to prioritize defenses against hijacking, spoofing, and jamming. The report identifies 18 practices to combat cyber-attacks, categorized into information security management solutions, information security policies, and cybersecurity awareness and training. Finally, this paper explores how emerging technologies can address cyber-attacks in the maritime supply chain network (MSCN). While Industry 4.0 technologies are highlighted as significant trends in the literature, this study aims to equip MSCN stakeholders with the knowledge to effectively leverage a broader range of emerging technologies. In doing so, it provides forward-looking solutions to prevent and mitigate cyber-attacks, emphasizing that Industry 4.0 is part of a larger landscape of technological innovation. Full article
Show Figures

Figure 1

18 pages, 1359 KiB  
Article
Distance- and Angle-Based Hybrid Localization Integrated in the IEEE 802.15.4 TSCH Communication Protocol
by Grega Morano, Aleš Simončič, Teodora Kocevska, Tomaž Javornik and Andrej Hrovat
Sensors 2024, 24(12), 3925; https://doi.org/10.3390/s24123925 - 17 Jun 2024
Cited by 1 | Viewed by 1275
Abstract
Accurate localization of devices within Internet of Things (IoT) networks is driven by the emergence of novel applications that require context awareness to improve operational efficiency, resource management, automation, and safety in industry and smart cities. With the Integrated Localization and Communication (ILAC) [...] Read more.
Accurate localization of devices within Internet of Things (IoT) networks is driven by the emergence of novel applications that require context awareness to improve operational efficiency, resource management, automation, and safety in industry and smart cities. With the Integrated Localization and Communication (ILAC) functionality, IoT devices can simultaneously exchange data and determine their position in space, resulting in maximized resource utilization with reduced deployment and operational costs. Localization capability in challenging scenarios, including harsh environments with complex geometry and obstacles, can be provided with robust, reliable, and energy-efficient communication protocols able to combat impairments caused by interference and multipath, such as the IEEE 802.15.4 Time-Slotted Channel Hopping (TSCH) protocol. This paper presents an enhancement of the TSCH protocol that integrates localization functionality along with communication, improving the protocol’s operational capabilities and setting a baseline for monitoring, automation, and interaction within IoT setups in physical environments. A novel approach is proposed to incorporate a hybrid localization by integrating Direction of Arrival (DoA) estimation and Multi-Carrier Phase Difference (MCPD) ranging methods for providing DoA and distance estimates with each transmitted packet. With the proposed enhancement, a single node can determine the location of its neighboring nodes without significantly affecting the reliability of communication and the efficiency of the network. The feasibility and effectiveness of the proposed approach are validated in a real scenario in an office building using low-cost proprietary devices, and the software incorporating the solution is provided. The experimental evaluation results show that a node positioned in the center of the room successfully estimates both the DoA and the distance to each neighboring node. The proposed hybrid localization algorithm demonstrates an accuracy of a few tens of centimeters in a two-dimensional space. Full article
(This article belongs to the Special Issue Integrated Localization and Communication: Advances and Challenges)
Show Figures

Figure 1

22 pages, 6900 KiB  
Article
A Hybrid CNN-LSTM Approach for Precision Deepfake Image Detection Based on Transfer Learning
by Omar Alfarouk Hadi Hasan Al-Dulaimi and Sefer Kurnaz
Electronics 2024, 13(9), 1662; https://doi.org/10.3390/electronics13091662 - 25 Apr 2024
Cited by 16 | Viewed by 8678
Abstract
The detection of deepfake images and videos is a critical concern in social communication due to the widespread utilization of deepfake techniques. The prevalence of these methods poses risks to trust and authenticity across various domains, emphasizing the importance of identifying fake faces [...] Read more.
The detection of deepfake images and videos is a critical concern in social communication due to the widespread utilization of deepfake techniques. The prevalence of these methods poses risks to trust and authenticity across various domains, emphasizing the importance of identifying fake faces for security and preventing socio-political issues. In the digital media era, deep learning outperforms traditional image processing methods in deepfake detection, underscoring its significance. This research introduces an innovative approach for detecting deepfake images by employing transfer learning in a hybrid architecture that combines convolutional neural networks (CNNs) and long short-term memory (LSTM). The hybrid CNN-LSTM model exhibits promise in combating deep fakes by merging the spatial awareness of CNNs with the temporal context understanding of LSTMs. Demonstrating effective performance on open-source datasets like “DFDC” and “Ciplab”, the proposed method achieves an impressive precision of 98.21%, indicating its capability to accurately identify deepfake images with a limited false-positive rate. The model’s error rate is 0.26%, emphasizing the challenges and intricacies inherent in deepfake detection tasks. These findings underscore the potential of hybrid deep learning techniques for addressing the urgent issue of deepfake image detection. Full article
Show Figures

Figure 1

32 pages, 6388 KiB  
Article
Enhancing Cyber Security Governance and Policy for SMEs in Industry 5.0: A Comparative Study between Saudi Arabia and the United Kingdom
by Nisha Rawindaran, Liqaa Nawaf, Suaad Alarifi, Daniyal Alghazzawi, Fiona Carroll, Iyad Katib and Chaminda Hewage
Digital 2023, 3(3), 200-231; https://doi.org/10.3390/digital3030014 - 14 Aug 2023
Cited by 22 | Viewed by 8142
Abstract
The emergence of Industry 5.0 has revolutionized technology by integrating physical systems with digital networks. These advancements have also led to an increase in cyber threats, posing significant risks, particularly for small and medium-sized enterprises (SMEs). This research investigates the resistance of SMEs [...] Read more.
The emergence of Industry 5.0 has revolutionized technology by integrating physical systems with digital networks. These advancements have also led to an increase in cyber threats, posing significant risks, particularly for small and medium-sized enterprises (SMEs). This research investigates the resistance of SMEs in Saudi Arabia and the United Kingdom (UK) to cyber security measures within the context of Industry 5.0, with a specific focus on governance and policy. It explores the cultural and economic factors contributing to this resistance, such as limited awareness of cyber security risks, financial constraints, and competing business priorities. Additionally, the study examines the role of government policies and regulations in promoting cyber security practices among SMEs and compares the approaches adopted by Saudi Arabia and the UK. By employing a mixed methods analysis, including interviews with SME owners and experts, the research highlights challenges and opportunities for improving cyber security governance and policy in both countries. The findings emphasize the need for tailored solutions due to the differing cultural and economic contexts between Saudi Arabia and the UK. Specifically, the study delves into the awareness and implementation of cyber security measures, focusing on SMEs in Saudi Arabia and their adherence to the Essential Cyber Security Controls (ECC-1:2018) guidelines. Furthermore, it examines the existing cyber security awareness practices and compliance in the UK, while also comparing official guidance documents aimed at supporting SMEs in achieving better cyber security practices. Based on the analysis, greater engagement with these documents is recommended in both countries to foster awareness, confidence, and compliance among SMEs, ultimately enhancing their cyber security posture. This paper offers a comparative research study on governance and policy between Saudi Arabia and the UK, presenting a set of recommendations to strengthen cyber security awareness and education, fortify regulatory frameworks, and foster public–private partnerships to combat cyber security threats in the Industry 5.0 landscape. Full article
Show Figures

Figure 1

18 pages, 4407 KiB  
Article
Evaluation of Poly(vinyl alcohol)–Xanthan Gum Hydrogels Loaded with Neomycin Sulfate as Systems for Drug Delivery
by Diana Serbezeanu, Manuela Maria Iftime, Gabriela-Liliana Ailiesei, Alina-Mirela Ipate, Alexandra Bargan, Tǎchiţǎ Vlad-Bubulac and Cristina Mihaela Rîmbu
Gels 2023, 9(8), 655; https://doi.org/10.3390/gels9080655 - 14 Aug 2023
Cited by 10 | Viewed by 2558
Abstract
In recent years, multidrug-resistant bacteria have developed the ability to resist multiple antibiotics, limiting the available options for effective treatment. Raising awareness and providing education on the appropriate use of antibiotics, as well as improving infection control measures in healthcare facilities, are crucial [...] Read more.
In recent years, multidrug-resistant bacteria have developed the ability to resist multiple antibiotics, limiting the available options for effective treatment. Raising awareness and providing education on the appropriate use of antibiotics, as well as improving infection control measures in healthcare facilities, are crucial steps to address the healthcare crisis. Further, innovative approaches must be adopted to develop novel drug delivery systems using polymeric matrices as carriers and support to efficiently combat such multidrug-resistant bacteria and thus promote wound healing. In this context, the current work describes the use of two biocompatible and non-toxic polymers, poly(vinyl alcohol) (PVA) and xanthan gum (XG), to achieve hydrogel networks through cross-linking by oxalic acid following the freezing/thawing procedure. PVA/XG-80/20 hydrogels were loaded with different quantities of neomycin sulfate to create promising low-class topical antibacterial formulations with enhanced antimicrobial effects. The inclusion of neomycin sulfate in the hydrogels is intended to impart them with powerful antimicrobial properties, thereby facilitating the development of exceptionally efficient topical antibacterial formulations. Thus, incorporating higher quantities of neomycin sulfate in the PVA/XG-80/20-2 and PVA/XG-80/20-3 formulations yielded promising cycling characteristics. These formulations exhibited outstanding removal efficiency, exceeding 80% even after five cycles, indicating remarkable and consistent adsorption performance with repeated use. Furthermore, both PVA/XG-80/20-2 and PVA/XG-80/20-3 formulations outperformed the drug-free sample, PVA/XG-80/20, demonstrating a significant enhancement in maximum compressive stress. Full article
(This article belongs to the Special Issue Innovative Biopolymer-Based Hydrogels)
Show Figures

Figure 1

18 pages, 1868 KiB  
Article
Identifying and Prioritizing Barriers to Climate Technology International Cooperation from the Perspective of Korea
by Songhee Han, Jeonghee Park, Heeseob Lee, Wona Lee and JiHee Son
Sustainability 2023, 15(14), 10831; https://doi.org/10.3390/su151410831 - 10 Jul 2023
Cited by 1 | Viewed by 2317
Abstract
Climate technology development and transfer have gained significant attention as a means to combat climate change and promote sustainable development. However, there is a lack of studies that systematically identify, categorize, and prioritize the barriers to technology transfer, especially within international cooperation projects. [...] Read more.
Climate technology development and transfer have gained significant attention as a means to combat climate change and promote sustainable development. However, there is a lack of studies that systematically identify, categorize, and prioritize the barriers to technology transfer, especially within international cooperation projects. This paper addresses this literature gap by conducting an in-depth analysis of closure reports from Climate Technology Centre and Network (CTCN) technical assistance projects and incorporating the perspectives of Korea which has the largest number of CTCN members. The 204 barriers identified from the 77 reports were grouped into 10 categories, and the information and awareness category had the largest number of barriers, followed by the institutional and organizational capacity and the technical categories. When prioritizing the 32 survey responses, the top three difficulties were economic and financial, legal and regulatory; category-level difficulties included ‘technical barriers,’ and sub-category-level difficulties included ‘COVID-19 restrictions’, ‘challenges in gathering good data’, and ‘limited budget.’ These findings will enhance the understanding of policymakers and practitioners on the significance of resource allocation, capacity-building efforts, and risk management strategies to improve the effectiveness of climate technology international cooperation projects. Full article
(This article belongs to the Special Issue Climate Change: Public Policy and Business Strategy Perspectives)
Show Figures

Figure 1

15 pages, 644 KiB  
Article
Effect of Penetration Levels for Vehicle-to-Grid Integration on a Power Distribution Network
by Ana Simarro-García, Raquel Villena-Ruiz, Andrés Honrubia-Escribano and Emilio Gómez-Lázaro
Machines 2023, 11(4), 416; https://doi.org/10.3390/machines11040416 - 23 Mar 2023
Cited by 6 | Viewed by 2610
Abstract
With the exponential growth of electric vehicle sales worldwide over the past years and progress in technology and actions to combat climate change by reducing greenhouse gas emissions, the trend is expected to continue with a significant increase in the deployment of electric [...] Read more.
With the exponential growth of electric vehicle sales worldwide over the past years and progress in technology and actions to combat climate change by reducing greenhouse gas emissions, the trend is expected to continue with a significant increase in the deployment of electric vehicles and plug-in hybrids. Given these circumstances, it is essential to identify the constraints that this increase in the number of electric vehicle charging stations poses for the electricity system. Therefore, the analysis developed in this paper discusses the effect of integrating electric vehicle charging stations in a real distribution network with different penetration levels. For this purpose, a typical electric system in Greece, managed by the Greek distribution system operator (HEDNO), is modeled and simulated in DIgSILENT PowerFactory software, one of the most widely used simulation tools in the electricity sector. To study the feasibility of connecting electric vehicle charging stations to the network, different case studies are presented, showing changes in the quantity of electric vehicles feeding power into the network through vehicle-to-grid technology. Quasi-dynamic simulations are used to analyze and discuss the voltage profiles of the system nodes, active power flows with the external source and power losses of the distribution network to determine whether the system is capable of supporting the increase in load produced by the electric vehicle charging stations and to promote awareness of the benefits of implementing vehicle-to-grid connections. Full article
(This article belongs to the Special Issue Renewable Energy Power Plants and Systems)
Show Figures

Figure 1

24 pages, 2899 KiB  
Article
Early Forest Fire Detection Using a Protocol for Energy-Efficient Clustering with Weighted-Based Optimization in Wireless Sensor Networks
by Puneet Kaur, Kiranbir Kaur, Kuldeep Singh and SeongKi Kim
Appl. Sci. 2023, 13(5), 3048; https://doi.org/10.3390/app13053048 - 27 Feb 2023
Cited by 24 | Viewed by 4230
Abstract
Wireless sensor networks (WSNs) have proven to be incredibly useful for forest applications that rely on sensing technologies for event detection and monitoring. This radical sensing technology has revolutionized data gathering, analysis, and application. Despite the many advantages of this technology, one key [...] Read more.
Wireless sensor networks (WSNs) have proven to be incredibly useful for forest applications that rely on sensing technologies for event detection and monitoring. This radical sensing technology has revolutionized data gathering, analysis, and application. Despite the many advantages of this technology, one key drawback is the rapid drain on sensor batteries caused by their intensive processing activities and communication processes. The effectiveness of sensor nodes is strongly influenced by two factors: the amount of energy they consume and the length of their coverage lifetimes. Using our proposed method, we can find fire zones in a forest, detect and monitor battlefield surveillance, combat monitoring and intruder detection, and then wirelessly send all the information to a central station. So, extending the life of WSNs is essential to ensure that Sensor Nodes (SN) will always be available. Our proposed EEWBP (energy-efficient weighted-based protocol) technique uses a composite weighted metric that includes system elements such as the node degree, residual energy, the number of neighbors’ nodes, average flying speed, and trust value, which are evaluated separately and then added together to help in cluster-building and node-scheduling processes. Our proposed protocol makes it easy to set up many clusters of SNs, each with their own cluster head (CH). This way, data can be sent between clusters in a way that uses the least amount of energy and makes coverage last longer. After putting our cluster-based routing strategy in place, we tested how it worked and evaluated it with different network parameters. The simulation results show that EEWBP consumes less energy and maintains a higher level of consistency in the CH than coverage preserving clustering protocol (CPCP), coverage clustering protocol (CACP), coverage aware unequal clustering algorithm (CUCA), and low-energy adaptive clustering hierarchy (LEACH). EEWBP also shows a better packet delivery rate and an improvement in first-node death. Full article
Show Figures

Figure 1

9 pages, 912 KiB  
Project Report
HepCare Plus: Enhancing Primary Care Identification and Treatment of Hepatitis C Virus in High-Risk Individuals
by Tessa O’Gorman, John S. Lambert, Tina McHugh, Walter Cullen, Gordana Avramovic, Raffaele Federico, Bernard West, Brendan O’Kelly, Louise Vidal, Jeremy Farrell, John Broughan, Eileen O’Connor and James Woo
Pathogens 2022, 11(12), 1428; https://doi.org/10.3390/pathogens11121428 - 27 Nov 2022
Cited by 2 | Viewed by 2162
Abstract
Hepatitis C Virus (HCV) disproportionately affects people who inject drugs, migrants, prisoners and the homeless. An integrated, peer-led model of care involving primary and secondary care is required to enhance the identification and treatment of HCV in these marginalised groups. HepCare Plus builds [...] Read more.
Hepatitis C Virus (HCV) disproportionately affects people who inject drugs, migrants, prisoners and the homeless. An integrated, peer-led model of care involving primary and secondary care is required to enhance the identification and treatment of HCV in these marginalised groups. HepCare Plus builds on the network and achievements of HepCare Europe (a co-funded Third Health Programme of the European Union/Health Service Executive project). It further identifies those not accessing care and facilitates prompt assessment and treatment of those diagnosed with HCV, with the aid of a peer support worker (PSW) and a community HCV nurse specialist. Of 109 individuals identified and assessed for HCV treatment, 100 commenced HCV treatment. Despite interruptions to treatment (COVID-19 pandemic and national health service cyberattack) there was a high-level of treatment completion with PSW engagement (98%, n = 98). Eighty (73%) individuals were previously aware of a positive HCV status, highlighting the ongoing need to address barriers preventing marginalised groups from engaging with care. HepCare Plus reiterates the defining role of peer-led community interventions in HCV treatment engagement and the need for continuous open-ended HCV care. It provides a sustainable framework to meaningfully combat HCV and achieve the United Nations Sustainable Development Goal of HCV elimination by 2030. Full article
(This article belongs to the Special Issue Advances in HCV Research)
Show Figures

Figure 1

13 pages, 8476 KiB  
Article
Detection of Induced Activity in Social Networks: Model and Methodology
by Dmitrii Gavra, Ksenia Namyatova and Lidia Vitkova
Future Internet 2021, 13(11), 297; https://doi.org/10.3390/fi13110297 - 22 Nov 2021
Cited by 4 | Viewed by 3036
Abstract
This paper examines the problem of social media special operations and especially induced support in social media during political election campaigns. The theoretical background of the paper is based on the study fake activity in social networks during pre-election processes and the existing [...] Read more.
This paper examines the problem of social media special operations and especially induced support in social media during political election campaigns. The theoretical background of the paper is based on the study fake activity in social networks during pre-election processes and the existing models and methods of detection of such activity. The article proposes a methodology for identifying and diagnosing induced support for a political project. The methodology includes a model of induced activity, an algorithm for segmenting the audience of a political project, and a technique for detecting and diagnosing induced support. The proposed methodology provides identification of network combatants, participants of social media special operations, influencing public opinion in the interests of a political project. The methodology can be used to raise awareness of the electorate, the public, and civil society in general about the presence of artificial activity on the page of a political project. Full article
Show Figures

Figure 1

27 pages, 4012 KiB  
Article
Machine Learning Cybersecurity Adoption in Small and Medium Enterprises in Developed Countries
by Nisha Rawindaran, Ambikesh Jayal and Edmond Prakash
Computers 2021, 10(11), 150; https://doi.org/10.3390/computers10110150 - 10 Nov 2021
Cited by 50 | Viewed by 12314
Abstract
In many developed countries, the usage of artificial intelligence (AI) and machine learning (ML) has become important in paving the future path in how data is managed and secured in the small and medium enterprises (SMEs) sector. SMEs in these developed countries have [...] Read more.
In many developed countries, the usage of artificial intelligence (AI) and machine learning (ML) has become important in paving the future path in how data is managed and secured in the small and medium enterprises (SMEs) sector. SMEs in these developed countries have created their own cyber regimes around AI and ML. This knowledge is tested daily in how these countries’ SMEs run their businesses and identify threats and attacks, based on the support structure of the individual country. Based on recent changes to the UK General Data Protection Regulation (GDPR), Brexit, and ISO standards requirements, machine learning cybersecurity (MLCS) adoption in the UK SME market has become prevalent and a good example to lean on, amongst other developed nations. Whilst MLCS has been successfully applied in many applications, including network intrusion detection systems (NIDs) worldwide, there is still a gap in the rate of adoption of MLCS techniques for UK SMEs. Other developed countries such as Spain and Australia also fall into this category, and similarities and differences to MLCS adoptions are discussed. Applications of how MLCS is applied within these SME industries are also explored. The paper investigates, using quantitative and qualitative methods, the challenges to adopting MLCS in the SME ecosystem, and how operations are managed to promote business growth. Much like security guards and policing in the real world, the virtual world is now calling on MLCS techniques to be embedded like secret service covert operations to protect data being distributed by the millions into cyberspace. This paper will use existing global research from multiple disciplines to identify gaps and opportunities for UK SME small business cyber security. This paper will also highlight barriers and reasons for low adoption rates of MLCS in SMEs and compare success stories of larger companies implementing MLCS. The methodology uses structured quantitative and qualitative survey questionnaires, distributed across an extensive participation pool directed to the SMEs’ management and technical and non-technical professionals using stratify methods. Based on the analysis and findings, this study reveals that from the primary data obtained, SMEs have the appropriate cybersecurity packages in place but are not fully aware of their potential. Secondary data collection was run in parallel to better understand how these barriers and challenges emerged, and why the rate of adoption of MLCS was very low. The paper draws the conclusion that help through government policies and processes coupled together with collaboration could minimize cyber threats in combatting hackers and malicious actors in trying to stay ahead of the game. These aspirations can be reached by ensuring that those involved have been well trained and understand the importance of communication when applying appropriate safety processes and procedures. This paper also highlights important funding gaps that could help raise cyber security awareness in the form of grants, subsidies, and financial assistance through various public sector policies and training. Lastly, SMEs’ lack of understanding of risks and impacts of cybercrime could lead to conflicting messages between cross-company IT and cybersecurity rules. Trying to find the right balance between this risk and impact, versus productivity impact and costs, could lead to UK SMES getting over these hurdles in this cyberspace in the quest for promoting the usage of MLCS. UK and Wales governments can use the research conducted in this paper to inform and adapt their policies to help UK SMEs become more secure from cyber-attacks and compare them to other developed countries also on the same future path. Full article
(This article belongs to the Special Issue Sensors and Smart Cities 2023)
Show Figures

Figure 1

21 pages, 6645 KiB  
Article
Cross-Societal Analysis of Climate Change Awareness and Its Relation to SDG 13: A Knowledge Synthesis from Text Mining
by Hansu Hwang, SeJin An, Eunchang Lee, Suhyeon Han and Cheon-hwan Lee
Sustainability 2021, 13(10), 5596; https://doi.org/10.3390/su13105596 - 17 May 2021
Cited by 24 | Viewed by 7299
Abstract
The awareness and the engagement of various stakeholders play a crucial role in the successful implementation of climate policy and Sustainable Development Goals (SDGs). SDG 13, which refers to climate action, has three targets for combating climate change and its impact. Among the [...] Read more.
The awareness and the engagement of various stakeholders play a crucial role in the successful implementation of climate policy and Sustainable Development Goals (SDGs). SDG 13, which refers to climate action, has three targets for combating climate change and its impact. Among the three targets, SDG 13.3 aims to “improve education, awareness-raising and human and institutional capacity on climate change mitigation, adaptation, impact reduction, and early warning”. This target should be implemented based on the understanding of climate change awareness among various groups of societies. Furthermore, the indicator related to awareness-raising is absent in SDG 13.3. Hence, this study aims to explore the differences in climate change awareness among various social groups within a country from a text mining technique. By collecting and analyzing a large volume of text data from various sources, climate change awareness was investigated from a multilateral perspective. Two text analyses were utilized for this purpose: Latent Dirichlet Allocation (LDA) topic modeling and term co-occurrence network analysis. In order to integrate and comparatively analyze the awareness differences among diverse groups, extracted topics were compared by classifying them into four indicators derived from the detailed targets in SDG 13.3: mitigation, adaptation, impact reduction, and early warning. The results show that the Korean public exhibited a relatively high awareness of early warning compared to the other four groups, and the media dealt with climate change issues with the widest perspective. The Korean government and academia notably had a high awareness of both climate change mitigation and adaptation. In addition, corporations based in Korea were observed to have substantially focused awareness on climate change mitigation for greenhouse gas reduction. This research successfully explored the disproportion and lack of climate change awareness formed in different societies of public, social, government, industry, and academic groups. Consequently, these results could be utilized as a decision criterion for society-tailored policy formulation and promoting climate action. Our results suggest that this methodology could be utilized as a new SDG indicator and to measure the differences in awareness. Full article
Show Figures

Figure 1

21 pages, 3040 KiB  
Review
Dietary Modulation of Bacteriophages as an Additional Player in Inflammation and Cancer
by Luigi Marongiu, Markus Burkard, Sascha Venturelli and Heike Allgayer
Cancers 2021, 13(9), 2036; https://doi.org/10.3390/cancers13092036 - 23 Apr 2021
Cited by 15 | Viewed by 4840
Abstract
Natural compounds such as essential oils and tea have been used successfully in naturopathy and folk medicine for hundreds of years. Current research is unveiling the molecular role of their antibacterial, anti-inflammatory, and anticancer properties. Nevertheless, the effect of these compounds on bacteriophages [...] Read more.
Natural compounds such as essential oils and tea have been used successfully in naturopathy and folk medicine for hundreds of years. Current research is unveiling the molecular role of their antibacterial, anti-inflammatory, and anticancer properties. Nevertheless, the effect of these compounds on bacteriophages is still poorly understood. The application of bacteriophages against bacteria has gained a particular interest in recent years due to, e.g., the constant rise of antimicrobial resistance to antibiotics, or an increasing awareness of different types of microbiota and their potential contribution to gastrointestinal diseases, including inflammatory and malignant conditions. Thus, a better knowledge of how dietary products can affect bacteriophages and, in turn, the whole gut microbiome can help maintain healthy homeostasis, reducing the risk of developing diseases such as diverse types of gastroenteritis, inflammatory bowel disease, or even cancer. The present review summarizes the effect of dietary compounds on the physiology of bacteriophages. In a majority of works, the substance class of polyphenols showed a particular activity against bacteriophages, and the primary mechanism of action involved structural damage of the capsid, inhibiting bacteriophage activity and infectivity. Some further dietary compounds such as caffeine, salt or oregano have been shown to induce or suppress prophages, whereas others, such as the natural sweeter stevia, promoted species-specific phage responses. A better understanding of how dietary compounds could selectively, and specifically, modulate the activity of individual phages opens the possibility to reorganize the microbial network as an additional strategy to support in the combat, or in prevention, of gastrointestinal diseases, including inflammation and cancer. Full article
(This article belongs to the Special Issue Colorectal Cancers: From Present Problems to Future Solutions)
Show Figures

Figure 1

Back to TopTop