Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (54)

Search Parameters:
Keywords = ownership authentication

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 2612 KB  
Article
The Heritage Paradox: When Tourism Turns the Idyllic into the Mercantile in Rural Transylvania
by Mihaela Preda, Iuliana Vijulie, Gabriel Vânău, Alina Mareci and Anca Tudoricu
Heritage 2026, 9(1), 9; https://doi.org/10.3390/heritage9010009 - 26 Dec 2025
Viewed by 107
Abstract
Heritage tourism is increasingly positioned as a strategy for revitalising rural communities, particularly in areas where structural transformations have changed traditional ways of life. However, its outcomes reveal a paradox. The same processes that preserve cultural landscapes often commodify them, converting living traditions [...] Read more.
Heritage tourism is increasingly positioned as a strategy for revitalising rural communities, particularly in areas where structural transformations have changed traditional ways of life. However, its outcomes reveal a paradox. The same processes that preserve cultural landscapes often commodify them, converting living traditions into marketable symbols. This paper investigates this heritage paradox through a complex study of Viscri, a UNESCO-listed village in Transylvania, Romania. Combining demographic and occupational data (2002–2022) with 51 questionnaires, 7 semi-structured interviews, field observations, and local records, the study examines how tourism-driven heritage valorisation reshapes socio-economic structures and identity narratives. The results show a profound restructuring of livelihoods, with a marked decline in subsistence agriculture and the emergence of micro-entrepreneurial activities related to accommodation, crafts, and gastronomy. These changes, while improving local incomes and infrastructures, have also increased external ownership and redefined authenticity as a performative resource negotiated among residents, entrepreneurs, and visitors. Local voices oscillate between pride and fatigue, between preservation and loss. By conceptualising the heritage paradox as a dynamic interplay between conservation and commodification, this study contributes to global debates on authenticity, sustainable rural transformation, and community resilience, offering an empirically grounded model of heritage tourism’s ambivalent consequences through an original analytical lens for post-socialist rural contexts. Full article
(This article belongs to the Special Issue Revitalizing Heritage Places and Memories for Sustainable Tourism)
Show Figures

Figure 1

26 pages, 16853 KB  
Article
Semi-Fragile Watermarking Scheme for High-Resolution Color Images: Tamper Identification, Ownership Authentication, and Self-Recovery
by Manuel Cedillo-Hernandez, Antonio Cedillo-Hernandez, Francisco Javier Garcia-Ugalde and Juan Carlos Sanchez-Garcia
Algorithms 2026, 19(1), 28; https://doi.org/10.3390/a19010028 - 26 Dec 2025
Viewed by 187
Abstract
The advancements in communication and information technologies have substantially enabled the extensive distribution and modification of high-resolution color images. Although this accessibility provides many advantages, it also presents risks related to security. Specifically, when image modification is conducted with malicious intent, exceeding typical [...] Read more.
The advancements in communication and information technologies have substantially enabled the extensive distribution and modification of high-resolution color images. Although this accessibility provides many advantages, it also presents risks related to security. Specifically, when image modification is conducted with malicious intent, exceeding typical artistic or enhancement objectives, it can cause significant moral or economic harm to the image owner. To address this security requirement, this study presents an innovative semi-fragile watermarking algorithm designed specifically for high-resolution color images. The proposed method utilizes Discrete Cosine Transform domain watermarking implemented via Quantization Index Modulation with Dither Modulation. It incorporates several elements, such as convolutional encoding, a denoising convolutional neural network, and a very deep super-resolution neural network. This comprehensive strategy aims to provide ownership verification using a logo watermark, in conjunction with tamper detection and content self-recovery mechanisms. The self-recovery criterion is determined using a thumbnail image, created by downscaling to standard definition and applying JPEG2000 lossy compression. The resultant multifunctional design enhances the overall security of the information. Experimental validation confirms the enhanced imperceptibility, robustness, and capacity of the proposed method. Its efficacy was additionally corroborated through comparative analyses using contemporary state-of-the-art algorithms. Full article
Show Figures

Figure 1

30 pages, 2068 KB  
Article
Ethical AI in Healthcare: Integrating Zero-Knowledge Proofs and Smart Contracts for Transparent Data Governance
by Mohamed Ezz, Alaa S. Alaerjan and Ayman Mohamed Mostafa
Bioengineering 2025, 12(11), 1236; https://doi.org/10.3390/bioengineering12111236 - 12 Nov 2025
Viewed by 1588
Abstract
In today’s rapidly advancing healthcare landscape, integrating Artificial Intelligence (AI) and Machine Learning (ML) has the potential to significantly improve patient care and streamline medical processes. The utilization of confidential patient data to train and develop these technologies, however, raises significant concerns regarding [...] Read more.
In today’s rapidly advancing healthcare landscape, integrating Artificial Intelligence (AI) and Machine Learning (ML) has the potential to significantly improve patient care and streamline medical processes. The utilization of confidential patient data to train and develop these technologies, however, raises significant concerns regarding authenticity, security, and privacy. In this study, we introduce MediChainAI, a safe and practical framework that allows patients full ownership over their own health data by integrating Self-Sovereign Identity (SSI), Blockchain, and sophisticated cryptography techniques. By clearly outlining the goals and parameters of this access, MediChainAI allows patients to safely and selectively share data with healthcare providers and researchers. While SSI guarantees that patients have ownership of their data, the framework uses Blockchain technology to keep things transparent and secure. Further, MediChainAI makes use of Merkle trees, which provide verified access to subsets of data without jeopardizing the privacy of the whole dataset. The encryption mechanism, which is based on smart contracts, is a distinctive feature of the framework that allows researchers and medical practitioners controlled and secure access to patient data. In order to improve the accuracy and reliability of medical diagnoses and treatment, this strategy makes sure that only confirmed, legitimate data is utilized to train medical models. A significant step toward safer and more personalized healthcare, MediChainAI encourages ethical and patient-focused innovation by effectively resolving essential issues regarding data security and patient privacy. Full article
(This article belongs to the Section Biosignal Processing)
Show Figures

Figure 1

21 pages, 993 KB  
Article
BIMW: Blockchain-Enabled Innocuous Model Watermarking for Secure Ownership Verification
by Xinyun Liu and Ronghua Xu
Future Internet 2025, 17(11), 490; https://doi.org/10.3390/fi17110490 - 26 Oct 2025
Viewed by 970
Abstract
The integration of artificial intelligence (AI) and edge computing gives rise to edge intelligence (EI), which offers effective solutions to the limitations of traditional cloud-based AI; however, deploying models across distributed edge platforms raises concerns regarding authenticity, thereby necessitating robust mechanisms for ownership [...] Read more.
The integration of artificial intelligence (AI) and edge computing gives rise to edge intelligence (EI), which offers effective solutions to the limitations of traditional cloud-based AI; however, deploying models across distributed edge platforms raises concerns regarding authenticity, thereby necessitating robust mechanisms for ownership verification. Currently, backdoor-based model watermarking techniques represent a state-of-the-art approach for ownership verification; however, their reliance on model poisoning introduces potential security risks and unintended behaviors. To solve this challenge, we propose BIMW, a blockchain-enabled innocuous model watermarking framework that ensures secure and trustworthy AI model deployment and sharing in distributed edge computing environments. Unlike widely applied backdoor-based watermarking methods, BIMW adopts a novel innocuous model watermarking method called interpretable watermarking (IW), which embeds ownership information without compromising model integrity or functionality. In addition, BIMW integrates a blockchain security fabric to ensure the integrity and auditability of watermarked data during storage and sharing. Extensive experiments were conducted on a Jetson Orin Nano board, which simulates edge computing environments. The numerical results show that our framework outperforms baselines in terms of predicate accuracy, p-value, watermark success rate (WSR), and harmlessness H. Our framework demonstrates resilience against watermarking removal attacks, and it introduces limited latency through the blockchain fabric. Full article
(This article belongs to the Special Issue Distributed Machine Learning and Federated Edge Computing for IoT)
Show Figures

Figure 1

18 pages, 443 KB  
Article
Balancing Growth and Tradition: The Potential of Community-Based Wellness Tourism in Ubud, Bali
by Ira Brunchilda Hubner, Juliana Juliana, Diena Mutiara Lemy, Amelda Pramezwary and Arifin Djakasaputra
Tour. Hosp. 2025, 6(4), 205; https://doi.org/10.3390/tourhosp6040205 - 9 Oct 2025
Cited by 1 | Viewed by 3047
Abstract
This study examines community-based wellness tourism (CBWT) in Ubud, Bali, focusing on ownership structures, community participation, and the role of local traditions. Using a qualitative design, the data were collected through semi-structured interviews with wellness stakeholders and field observations of spas and yoga [...] Read more.
This study examines community-based wellness tourism (CBWT) in Ubud, Bali, focusing on ownership structures, community participation, and the role of local traditions. Using a qualitative design, the data were collected through semi-structured interviews with wellness stakeholders and field observations of spas and yoga centers. The findings reveal that spas are predominantly locally owned and staffed, ensuring value retention and skill development, while flagship yoga and retreat centers are dominated by non-local actors, creating risks of economic leakage and weaker cultural stewardship. Community involvement is strong in operations but limited in planning and governance, highlighting a policy–practice gap. Integrating Balinese traditions, such as Usada Bali and Melukat, could enhance authenticity but requires careful protection against commodification. The findings reveal that locally owned spas contribute to SDG 1 (No Poverty) and SDG 8 (Decent Work and Economic Growth) through local value retention, employment creation, and skill development, while non-local dominance of yoga and retreat centers risks economic leakage and weakened cultural guardianship. The study also identifies gaps in governance and planning, underscoring the need for inclusive participation and capacity building to align with SDG 11 (Sustainable Cities and Communities). Integrating Balinese traditions, such as Usada Bali and Melukat, highlights the opportunities for safeguarding cultural heritage, provided that protocols against commodification are enforced. To address these challenges, the study proposes a strategic framework emphasizing governance reform through a quadruple-helix model, shared-equity ownership, standardized human capital development, and protocol-based cultural guardianship. Despite the limitations of this being a single-case, cross-sectional study, the findings contribute to wellness tourism research by shifting attention from visitor demands to governance and equity. The study offers practical strategies for institutionalizing CBWT in Ubud while providing a transferable model for destinations seeking to balance growth with tradition. Full article
(This article belongs to the Special Issue Sustainability of Tourism Destinations)
Show Figures

Figure 1

26 pages, 312 KB  
Article
REN+HOMES Positive Carbon Building Methodology in Co-Design with Residents
by Dorin Beu, Alessio Pacchiana, Elena Rastei, Horaţiu Albu and Theodor Contolencu
Architecture 2025, 5(3), 51; https://doi.org/10.3390/architecture5030051 - 23 Jul 2025
Viewed by 659
Abstract
This article demonstrates how positioning residents as active co-designers fundamentally transforms both the process and outcomes of carbon-positive building development. Through structured collaborative workshops, shared decision-making protocols, and continuous partnership throughout the building lifecycle, the REN+HOMES Positive Carbon Building methodology challenges the conventional [...] Read more.
This article demonstrates how positioning residents as active co-designers fundamentally transforms both the process and outcomes of carbon-positive building development. Through structured collaborative workshops, shared decision-making protocols, and continuous partnership throughout the building lifecycle, the REN+HOMES Positive Carbon Building methodology challenges the conventional expert-driven approach to sustainable construction. Developed and validated through the H2020 REN+HOMES project, this resident-centered approach achieved remarkable technical performance—65.9% reduction in final energy demand—while simultaneously enhancing community ownership and long-term sustainability practices. By integrating participatory design with Zero Emissions Building (ZEB) criteria, renewable energy systems, and national carbon offset programs, the methodology proves that resident collaboration is not merely beneficial but essential for creating buildings that truly serve both environmental and human needs. This research establishes a new paradigm where technical excellence emerges from authentic partnership between residents and sustainability experts, offering a replicable framework for community-driven environmental regeneration. Full article
57 pages, 1459 KB  
Article
Sustainable Digital Banking in Turkey: Analysis of Mobile Banking Applications Using Customer-Generated Content
by Yavuz Selim Balcioglu and Furkan Evranos
Sustainability 2025, 17(15), 6676; https://doi.org/10.3390/su17156676 - 22 Jul 2025
Cited by 1 | Viewed by 2438
Abstract
This study addresses a critical gap in understanding how mobile banking applications contribute to sustainable development by introducing a novel text mining framework to analyze sustainability dimensions through user-generated content. We analyzed 120,000 reviews from six major Turkish mobile banking applications using an [...] Read more.
This study addresses a critical gap in understanding how mobile banking applications contribute to sustainable development by introducing a novel text mining framework to analyze sustainability dimensions through user-generated content. We analyzed 120,000 reviews from six major Turkish mobile banking applications using an ownership-sensitive analytical approach that integrates structural topic modeling with four sustainability dimensions (environmental, social, governance, and economic). Our analysis reveals significant institutional differences in sustainability approaches: government-owned banks demonstrate substantially stronger overall sustainability orientation (23.43% vs. 11.83% coverage) with pronounced emphasis on social sustainability (+181.7% growth) and economic development (+104.2% growth), while private banks prioritize innovation-focused sustainability. The temporal analysis (2022–2025) shows accelerating sustainability emphasis across all institutions, with distinct evolution patterns by ownership type. Institution-specific sustainability profiles emerge clearly, with each government bank demonstrating distinctive focus areas aligned with historical missions: cultural heritage preservation, agricultural sector support, and small business development. Mapping to Sustainable Development Goals reveals that government banks prioritize development-focused goals (SDGs 1, 8, and 10), while private banks emphasize innovation-focused goals (SDGs 9 and 17). This research makes three key contributions: demonstrating user-generated content as an effective lens for authentic sustainability assessment, establishing ownership-sensitive evaluation frameworks for digital banking sustainability, and providing empirical evidence for contextualized rather than universal sustainability strategies. The findings offer strategic implications for financial institutions, policymakers, and app developers seeking to enhance sustainable digital banking transformation. Full article
Show Figures

Figure 1

20 pages, 2883 KB  
Article
Sustainable Daily Mobility and Bike Security
by Sergej Gričar, Christian Stipanović and Tea Baldigara
Sustainability 2025, 17(14), 6262; https://doi.org/10.3390/su17146262 - 8 Jul 2025
Viewed by 946
Abstract
As climate change concerns, urban congestion, and environmental degradation intensify, cities prioritise cycling as a sustainable transport option to reduce CO2 emissions and improve quality of life. However, rampant bicycle theft and poor security infrastructure often deter daily commuters and tourists from [...] Read more.
As climate change concerns, urban congestion, and environmental degradation intensify, cities prioritise cycling as a sustainable transport option to reduce CO2 emissions and improve quality of life. However, rampant bicycle theft and poor security infrastructure often deter daily commuters and tourists from cycling. This study explores how advanced security measures can bolster sustainable urban mobility and tourism by addressing these challenges. A mixed-methods approach is utilised, incorporating primary survey data from Slovenia and secondary data on bicycle sales, imports and thefts from 2015 to 2024. Findings indicate that access to secure parking substantially enhances users’ sense of safety when commuting by bike. Regression analysis shows that for every 1000 additional bicycles sold, approximately 280 more thefts occur—equivalent to a 0.28 rise in reported thefts—highlighting a systemic vulnerability associated with sustainability-oriented behaviour. To bridge this gap, the study advocates for an innovative security framework that combines blockchain technology and Non-Fungible Tokens (NFTs) with encrypted Quick Response (QR) codes. Each bicycle would receive a tamper-proof QR code connected to a blockchain-verified NFT documenting ownership and usage data. This system facilitates real-time authentication, enhances traceability, deters theft, and builds trust in cycling as a dependable transport alternative. The proposed solution merges sustainable transport, digital identity, and urban security, presenting a scalable model for individual users and shared mobility systems. Full article
(This article belongs to the Collection Reshaping Sustainable Tourism in the Horizon 2050)
Show Figures

Figure 1

26 pages, 1164 KB  
Review
Digital Watermarking Technology for AI-Generated Images: A Survey
by Huixin Luo, Li Li and Juncheng Li
Mathematics 2025, 13(4), 651; https://doi.org/10.3390/math13040651 - 16 Feb 2025
Cited by 3 | Viewed by 10901
Abstract
The rapid advancement of AI-generated content (AIGC) has significantly improved the realism and accessibility of synthetic images. While large image generation models offer immense potential in creative industries, they also introduce serious challenges, including copyright infringement, content authentication, and the traceability of generated [...] Read more.
The rapid advancement of AI-generated content (AIGC) has significantly improved the realism and accessibility of synthetic images. While large image generation models offer immense potential in creative industries, they also introduce serious challenges, including copyright infringement, content authentication, and the traceability of generated images. Digital watermarking has emerged as a promising approach to address these concerns by embedding imperceptible yet detectable signatures into generated images. This survey provides a comprehensive review of three core areas: (1) the evolution of image generation technologies, highlighting key milestones such as the transition from GANs to diffusion models; (2) traditional and state-of-the-art digital image watermarking algorithms, encompassing spatial domain, transform domain, and deep learning-based approaches; (3) watermarking methods specific to AIGC, including ownership authentication of AI model and diffusion model, and watermarking of AI-generated images. Additionally, we examine common performance evaluation metrics used in this field, such as watermark capacity, watermark detection accuracy, fidelity, and robustness. Finally, we discuss the unresolved issues and propose several potential directions for future research. We look forward to this paper offering valuable reference for academics in the field of AIGC watermarking and related fields. Full article
Show Figures

Figure 1

23 pages, 883 KB  
Article
SAM-PAY: A Location-Based Authentication Method for Mobile Environments
by Diana Gratiela Berbecaru
Electronics 2025, 14(3), 621; https://doi.org/10.3390/electronics14030621 - 5 Feb 2025
Cited by 1 | Viewed by 2677
Abstract
Wireless, satellite, and mobile networks are increasingly used in application scenarios to provide advanced services to mobile or nomadic devices. For example, to authenticate mobile users while obtaining access to remote services, a two-factor authentication mechanism is typically used, e.g., based on the [...] Read more.
Wireless, satellite, and mobile networks are increasingly used in application scenarios to provide advanced services to mobile or nomadic devices. For example, to authenticate mobile users while obtaining access to remote services, a two-factor authentication mechanism is typically used, e.g., based on the ownership of a personal mobile phone, device, or (smart)card and the knowledge of a (static) username and password. Nevertheless, two-factor authentication is considered roughly “adequate” for security problems encountered today on the Internet and even less for ubiquitous or mobile environments. To increase the authentication level, several authentication methods of different classes may be combined to achieve more reliable user identification. In particular, location technologies allow ubiquitous applications to better exploit the (physical) location information in the authentication process. Consequently, in security applications based on multiple authentication factors, an additional authentication factor could be the location information protected for integrity against undesired modification. We present the SAM-PAY authentication method, which combines different authentication factors to obtain a more reliable user identification. The mechanism is based on the use of a (location-aware) device, the location information certified by a trusted external party, such as a component or element in a telecom network, and the knowledge of data, like a static PIN and a dynamically generated one-time password. We also describe the design and implementation of a real case scenario exploiting our SAM-PAY method, namely the refueling service at a self-service gas station. The test-bed put in place for this service demonstrates the feasibility and effectiveness of the SAM-PAY method in open mobile environments. Full article
Show Figures

Figure 1

22 pages, 11189 KB  
Article
VUF-MIWS: A Visible and User-Friendly Watermarking Scheme for Medical Images
by Chia-Chen Lin, Yen-Heng Lin, En-Ting Chu, Wei-Liang Tai and Chun-Jung Lin
Electronics 2025, 14(1), 122; https://doi.org/10.3390/electronics14010122 - 30 Dec 2024
Viewed by 1664
Abstract
The integration of Internet of Medical Things (IoMT) technology has revolutionized healthcare, allowing rapid access to medical images and enhancing remote diagnostics in telemedicine. However, this advancement raises serious cybersecurity concerns, particularly regarding unauthorized access and data integrity. This paper presents a novel, [...] Read more.
The integration of Internet of Medical Things (IoMT) technology has revolutionized healthcare, allowing rapid access to medical images and enhancing remote diagnostics in telemedicine. However, this advancement raises serious cybersecurity concerns, particularly regarding unauthorized access and data integrity. This paper presents a novel, user-friendly, visible watermarking scheme for medical images—Visual and User-Friendly Medical Image Watermarking Scheme (VUF-MIWS)—designed to secure medical image ownership while maintaining usability for diagnostic purposes. VUF-MIWS employs a unique combination of inpainting and data hiding techniques to embed hospital logos as visible watermarks, which can be removed seamlessly once image authenticity is verified, restoring the image to its original state. Experimental results demonstrate the scheme’s robust performance, with the watermarking process preserving critical diagnostic information with high fidelity. The method achieved Peak Signal-to-Noise Ratios (PSNR) above 70 dB and Structural Similarity Index Measures (SSIM) of 0.99 for inpainted images, indicating minimal loss of image quality. Additionally, VUF-MIWS effectively restored the ROI region of medical images post-watermark removal, as verified through test cases with restored watermarked regions matching the original images. These findings affirm VUF-MIWS’s suitability for secure telemedicine applications. Full article
Show Figures

Figure 1

21 pages, 1335 KB  
Article
Does Government Environmental Concern Affect Enterprise Sustainable Development? Evidence from China
by Fan Ren
Sustainability 2024, 16(21), 9527; https://doi.org/10.3390/su16219527 - 1 Nov 2024
Cited by 2 | Viewed by 2083
Abstract
As the executor and agent of China’s environmental policy, local governments’ environmental concern reflects local governments’ determination in environmental governance. To figure out how the strengthening environmental concerns affect enterprises’ long-term activities, this study focuses on pharmaceutical manufacturing enterprises due to the enormous [...] Read more.
As the executor and agent of China’s environmental policy, local governments’ environmental concern reflects local governments’ determination in environmental governance. To figure out how the strengthening environmental concerns affect enterprises’ long-term activities, this study focuses on pharmaceutical manufacturing enterprises due to the enormous and complex composition of emissions. We apply bag of words to summarize relevant environmental words from the annual work reports in local governments to measure environmental concern. The empirical results of the OLS method reveal that the increasing environmental concerns of local governments did decrease the growth rate of chemical oxygen demand (COD) emission authentically. At the same time, it will inhibit the research and experimental development (R&D) activity intensity, but promote production efficiency of pharmaceutical manufacturing enterprises. After that, we discuss the heterogeneity of enterprise ownership, corporate social responsibility and regional regulatory strength of enterprises. Overall, we conclude that environmental concern did reduce COD emission and promote production efficiency, but it also has negative spillover effects. The novel contribution of this paper is that it enriches the trade-off between strengthening environmental compliance costs and long-term production and innovation activities. These results indicate that pharmaceutical manufacturing enterprises prioritize optimizing existing production processes instead of adopting efficient technology when complying with stricter environmental regulation. The reduction of R&D activities may pose risks to the long-term sustainable development of enterprises. Full article
Show Figures

Figure 1

20 pages, 19393 KB  
Article
Integrating Multimodal Generative AI and Blockchain for Enhancing Generative Design in the Early Phase of Architectural Design Process
by Adam Fitriawijaya and Taysheng Jeng
Buildings 2024, 14(8), 2533; https://doi.org/10.3390/buildings14082533 - 16 Aug 2024
Cited by 19 | Viewed by 5643
Abstract
Multimodal generative AI and generative design empower architects to create better-performing, sustainable, and efficient design solutions and explore diverse design possibilities. Blockchain technology ensures secure data management and traceability. This study aims to design and evaluate a framework that integrates blockchain into generative [...] Read more.
Multimodal generative AI and generative design empower architects to create better-performing, sustainable, and efficient design solutions and explore diverse design possibilities. Blockchain technology ensures secure data management and traceability. This study aims to design and evaluate a framework that integrates blockchain into generative AI-driven design drawing processes in architectural design to enhance authenticity and traceability. We employed a scenario as an example to integrate generative AI and blockchain into architectural designs by using a generative AI tool and leveraging multimodal generative AI to enhance design creativity by combining textual and visual inputs. These images were stored on blockchain systems, where metadata were attached to each image before being converted into NFT format, which ensured secure data ownership and management. This research exemplifies the pragmatic fusion of generative AI and blockchain technology applied in architectural design for more transparent, secure, and effective results in the early stages of the architectural design process. Full article
(This article belongs to the Section Architectural Design, Urban Science, and Real Estate)
Show Figures

Figure 1

17 pages, 819 KB  
Article
Voices from Graduate School and the Workforce: Identified Student Outcomes from Completing a Multi-Semester Undergraduate Research Experience Capstone
by Blake C. Colclasure, Arian Alai, Kristina Quinn, Tyler Granberry, Erin L. Doyle and Tessa Durham Brooks
Educ. Sci. 2024, 14(6), 598; https://doi.org/10.3390/educsci14060598 - 2 Jun 2024
Cited by 2 | Viewed by 2184
Abstract
Recent reforms in undergraduate science education have highlighted the need for student-centered learning that challenges students to take ownership of the scientific process through conducting authentic research. As such, Undergraduate Research Experiences (UREs) have become more prevalent in higher education. However, extensive variations [...] Read more.
Recent reforms in undergraduate science education have highlighted the need for student-centered learning that challenges students to take ownership of the scientific process through conducting authentic research. As such, Undergraduate Research Experiences (UREs) have become more prevalent in higher education. However, extensive variations in the structures, durations, and contexts of UREs exist and long-term implications are not well documented. We used the Social Cognitive Career Theory to guide our exploration of student outcomes from completing a required three-semester capstone URE at a predominantly undergraduate institution located in the Midwest, United States. We sought to answer two central research questions: (1) What skills and competencies do alumni perceive to have gained from completing the URE capstone, and (2) What is the impact of the URE capstone on alumni success in the workforce and/or graduate school? We conducted in-depth, one-on-one interviews with 16 alumni who recently completed their undergraduate research capstone and who were currently in a science-based career or attending graduate school. Results indicate long-term benefits from URE capstones and are described through three primary themes: technical skill acquisition and future application, soft skill acquisition and future application, and scientific pursuits. Full article
Show Figures

Figure 1

21 pages, 3788 KB  
Article
A Blockchain-Based Privacy Preserving Intellectual Property Authentication Method
by Shaoqi Yuan, Wenzhong Yang, Xiaodan Tian and Wenjie Tang
Symmetry 2024, 16(5), 622; https://doi.org/10.3390/sym16050622 - 17 May 2024
Cited by 13 | Viewed by 5752
Abstract
With the continuous advancement of information technology, a growing number of works, including articles, paintings, and music, are being digitized. Digital content can be swiftly shared and disseminated via the Internet. However, it is also vulnerable to malicious plagiarism, which can seriously infringe [...] Read more.
With the continuous advancement of information technology, a growing number of works, including articles, paintings, and music, are being digitized. Digital content can be swiftly shared and disseminated via the Internet. However, it is also vulnerable to malicious plagiarism, which can seriously infringe upon the rights of creators and dampen their enthusiasm. To protect creators’ rights and interests, a sophisticated method is necessary to authenticate digital intellectual property rights. Traditional authentication methods rely on centralized, trustworthy organizations that are susceptible to single points of failure. Additionally, these methods are prone to network attacks that can lead to data loss, tampering, or leakage. Moreover, the circulation of copyright information often lacks transparency and traceability in traditional systems, which leads to information asymmetry and prevents creators from controlling the use and protection of their personal information during the authentication process. Blockchain technology, with its decentralized, tamper-proof, and traceable attributes, addresses these issues perfectly. In blockchain technology, each node is a peer, ensuring the symmetry of information. However, the transparent feature of blockchains can lead to the leakage of user privacy data. Therefore, this study designs and implements an Ethereum blockchain-based intellectual property authentication scheme with privacy protection. Firstly, we propose a method that combines elliptic curve cryptography (ECC) encryption with digital signatures to achieve selective encryption of user personal information. Subsequently, an authentication algorithm based on Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zk-SNARK) is adopted to complete the authentication of intellectual property ownership while encrypting personal privacy data. Finally, we adopt the InterPlanetary File System (IPFS) to store large files, solving the problem of blockchain storage space limitations. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

Back to TopTop