Skip to Content

640 Results Found

  • Article
  • Open Access
121 Citations
13,922 Views
27 Pages

2 April 2020

The unequal distribution of costs and benefits of the energy transition is a challenge for energy justice and energy policy. Although the empowerment of consumers to participate in renewable energy communities (RECs) has great potential for a just en...

  • Feature Paper
  • Review
  • Open Access
24 Citations
6,416 Views
17 Pages

25 February 2020

Energy poverty—involving a combination of factors, such as low household incomes, high energy prices, and low levels of residential energy efficiency—is identified as a complex and increasing issue affecting people’s physical health...

  • Article
  • Open Access
12 Citations
6,176 Views
22 Pages

The Failure Risk Analysis of the Water Supply Network

  • Barbara Tchórzewska-Cieślak,
  • Katarzyna Pietrucha-Urbanik and
  • Izabela Piegdoń

31 October 2023

The primary objective of this work is to introduce a novel approach that modifies the method for analyzing and assessing the risk of water supply network failure. The approach aligns with recommendations from the World Health Organization and the Eur...

  • Article
  • Open Access
1,893 Views
22 Pages

Credit Segmentation and Household Vulnerability in Thailand: Formal Versus Informal Debt Risks

  • Sanha Hemvanich,
  • Kanokwan Chancharoenchai and
  • Nattanicha Chairassamee

This study investigates the determinants of household borrowing choices in Thailand, with a focus on the risks associated with formal and informal credit markets. Using cross-sectional survey data from 6949 respondents across 77 provinces collected i...

  • Article
  • Open Access
1 Citations
1,860 Views
15 Pages

Neighborhood Vulnerability and the Consumer Food Environment in an Urban Area

  • Cecilia Craveiro,
  • Mariana Lopes,
  • Patricia Freitas and
  • Aline Lopes

The consumer food environment is an important medium for understanding complex interactions regarding food consumption, health outcomes and social vulnerability. We aimed to analyze the diversity, variety and quality of natural and ultra-processed fo...

  • Article
  • Open Access
792 Views
12 Pages

30 September 2025

This study assesses the potential impact of sea level rise (SLR) on wood-consuming mills in coastal Georgia, a major forestry state in the southern United States. To assess the vulnerability of wood-consuming mills in coastal Georgia, two potential w...

  • Article
  • Open Access
8 Citations
6,275 Views
17 Pages

Panic Buying Behavior Analysis according to Consumer Income and Product Type during COVID-19

  • Irineu de Brito Junior,
  • Hugo Tsugunobu Yoshida Yoshizaki,
  • Flaviane Azevedo Saraiva,
  • Nathan de Campos Bruno,
  • Roberto Fray da Silva,
  • Celso Mitsuo Hino,
  • Larissa Limongi Aguiar and
  • Isabella Marrey Ferreira de Ataide

9 January 2023

In 2020, just before measures were established by governments to minimize the spread of SARS-CoV-2, such as social distancing, quarantine, lockdowns, and internal movement restrictions, people began to buy some products in quantities much superior to...

  • Feature Paper
  • Article
  • Open Access
1,739 Views
26 Pages

Financial Discrimination: Consumer Perceptions and Reactions

  • Miranda Reiter,
  • Di Qing,
  • Kenneth White and
  • Morgen Nations

Access to traditional financial institutions plays a key role in enhancing positive financial outcomes. However, some consumers within the United States experience discrimination from these same institutions. In particular, discrimination based on ra...

  • Article
  • Open Access
43 Citations
18,957 Views
31 Pages

28 February 2023

The increasing deployment of Internet of Things (IoT) devices in mission-critical systems has made them more appealing to attackers. Cyberattacks on IoT devices have the potential to expose sensitive data, disrupt operations, and even endanger lives....

  • Article
  • Open Access
45 Citations
7,269 Views
19 Pages

14 August 2021

Organic foods carry a premium price. They are credence-based foods, i.e., it is difficult for consumers to evaluate the premium aspects of organic food under normal use. In global supply chains, organic food is purchased on institutional trust (certi...

  • Article
  • Open Access
10 Citations
5,201 Views
13 Pages

Characteristics of Distinct Dietary Patterns in Rural Bangladesh: Nutrient Adequacy and Vulnerability to Shocks

  • Zakari Ali,
  • Pauline F. D. Scheelbeek,
  • Kazi Istiaque Sanin,
  • Timothy S. Thomas,
  • Tahmeed Ahmed,
  • Andrew M. Prentice and
  • Rosemary Green

15 June 2021

Food security in Bangladesh has improved in recent years, but the country is now facing a double burden of malnutrition while also being highly vulnerable to climate change. Little is known about how this may affect food supply to different sectors o...

  • Article
  • Open Access
8 Citations
3,578 Views
13 Pages

11 August 2021

There is a critical vulnerability in the 5G AKA protocol of the 3GPP. We propose a protocol that compensates for these vulnerabilities and speed up the existing protocol; and the study implements this protocol to experiment with the vulnerabilities....

  • Proceeding Paper
  • Open Access
1,781 Views
3 Pages

Compulsive Buying and Beliefs about Digital Advertising

  • Christos Livas,
  • Alba Pajollari and
  • Nansy Karali

In view of concerns about consumers’ vulnerability to contemporary marketing tactics, this study aims to examine the extent to which compulsive buying affects beliefs about digital advertising. The results of a survey of 117 consumers suggest t...

  • Article
  • Open Access
7 Citations
2,966 Views
13 Pages

5 July 2024

Financial technology (Fintech) and sustainability are two of the main drivers in the transformation of many organizations. New innovative technologies create new services for consumers. The focus on sustainability is a necessary reaction to the many...

  • Article
  • Open Access
1 Citations
1,545 Views
11 Pages

Food Consumption Inequalities in Primary Care in a Large Metropolis

  • Mariana Souza Lopes,
  • Priscila Lenita Candida dos Santos and
  • Aline Cristine Souza Lopes

The aim of this study was to examine the association between health vulnerability and food consumption according to the NOVA classification within primary care in a major Brazilian city. A cross-sectional study was conducted among adults over 20 year...

  • Article
  • Open Access
12 Citations
3,982 Views
17 Pages

XLNet-Based Prediction Model for CVSS Metric Values

  • Fan Shi,
  • Shaofeng Kai,
  • Jinghua Zheng and
  • Yao Zhong

7 September 2022

A plethora of software vulnerabilities are exposed daily, posing a severe threat to the Internet. It is almost impossible for security experts or software developers to deal with all vulnerabilities. Therefore, it is imperative to rapidly assess the...

  • Article
  • Open Access
3 Citations
1,648 Views
20 Pages

RTMS: A Smart Contract Vulnerability Detection Method Based on Feature Fusion and Vulnerability Correlations

  • Gaimei Gao,
  • Zilu Li,
  • Lizhong Jin,
  • Chunxia Liu,
  • Junji Li and
  • Xiangqi Meng

16 February 2025

Smart contracts are at the core of blockchain technology, but the cost of fixing their security vulnerabilities is high, making pre-deployment vulnerability detection crucial. Existing methods rely on fixed rules, which have limitations in accuracy a...

  • Article
  • Open Access
20 Citations
3,596 Views
23 Pages

Examining the Capacity of Text Mining and Software Metrics in Vulnerability Prediction

  • Ilias Kalouptsoglou,
  • Miltiadis Siavvas,
  • Dionysios Kehagias,
  • Alexandros Chatzigeorgiou and
  • Apostolos Ampatzoglou

5 May 2022

Software security is a very important aspect for software development organizations who wish to provide high-quality and dependable software to their consumers. A crucial part of software security is the early detection of software vulnerabilities. V...

  • Article
  • Open Access
5 Citations
6,473 Views
19 Pages

12 January 2024

Internet-based distributed systems dominate contemporary software applications. To enable these applications to operate securely, software developers must mitigate the threats posed by malicious actors. For instance, the developers must identify vuln...

  • Article
  • Open Access
12 Citations
5,424 Views
17 Pages

6 February 2022

“Ugly food” refers to agricultural products that are discarded because their appearance is not attractive, even though their nutritional content is unaffected. In this study, protection motivation theory (PMT) was applied to analyze wheth...

  • Article
  • Open Access
2 Citations
3,517 Views
19 Pages

25 February 2022

Light clients for distributed ledger networks can verify blockchain integrity by downloading and analyzing blockchain headers. They are designed to circumvent the high resource requirements, i.e., the large bandwidth and memory requirements that full...

  • Article
  • Open Access
4 Citations
4,744 Views
25 Pages

22 November 2022

Since a large number of Linux kernel vulnerabilities are discovered every year, many vulnerabilities cannot be patched in time. Security vendors often prioritize patching high-risk vulnerabilities, and the ratings of vulnerabilities need to be evalua...

  • Article
  • Open Access
8 Citations
2,387 Views
23 Pages

Impact of Spatial Segmentation on the Assessment of Coastal Vulnerability—Insights and Practical Recommendations

  • Christina N. Tsaimou,
  • Andreas Papadimitriou,
  • Vasiliki Ι. Chalastani,
  • Panagiotis Sartampakos,
  • Michalis Chondros and
  • Vasiliki K. Tsoukala

Coastal areas are dynamic multidimensional systems challenged by the complex interactions between natural, environmental, and human-induced pressures, as well as the ever-changing climate. A comprehensive evaluation of their spatial and temporal feat...

  • Article
  • Open Access
3 Citations
3,291 Views
19 Pages

MemConFuzz: Memory Consumption Guided Fuzzing with Data Flow Analysis

  • Chunlai Du,
  • Zhijian Cui,
  • Yanhui Guo,
  • Guizhi Xu and
  • Zhongru Wang

2 March 2023

Uncontrolled heap memory consumption, a kind of critical software vulnerability, is utilized by attackers to consume a large amount of heap memory and consequently trigger crashes. There have been few works on the vulnerability fuzzing of heap consum...

  • Article
  • Open Access
45 Citations
9,782 Views
17 Pages

Purchase Intention for Organic Food Products in Mexico: The Mediation of Consumer Desire

  • Sandra N. Leyva-Hernández,
  • Arcelia Toledo-López and
  • Ana B. Hernández-Lara

26 January 2021

Socially responsible consumption benefits the environment, the consumer, and the producer. In Mexico, smallholder farmers are vulnerable, and the consumption of organic food products is low. Analysing the purchase intention of organic food products c...

  • Review
  • Open Access
3,276 Views
19 Pages

In the digital age, consumer complaints have become significant indicators of operational vulnerabilities, with social media amplifying their impact. Mishandling such complaints has the potential to escalate minor issues into full-scale organizationa...

  • Article
  • Open Access
42 Citations
11,331 Views
18 Pages

Automated Penetration Testing Framework for Smart-Home-Based IoT Devices

  • Rohit Akhilesh,
  • Oliver Bills,
  • Naveen Chilamkurti and
  • Mohammad Jabed Morshed Chowdhury

27 September 2022

Security testing is fundamental to identifying security vulnerabilities on smart home-based IoT devices. For this, penetration testing is the most prominent and effective solution. However, testing the IoT manually is cumbersome and time-consuming. I...

  • Article
  • Open Access
9 Citations
5,194 Views
7 Pages

Though consumers with vulnerabilities, such as visually impaired or blind and partially sighted people (BPSP), face several marketplace problems and challenges, existing literature provides limited guidance. The present study aims to examine the issu...

  • Article
  • Open Access
1 Citations
2,469 Views
18 Pages

16 November 2023

Graph theory is a branch of mathematics that is crucial to modelling applicable systems and networks using matrix representations. In this article, a novel graph-theoretic model was used to assess an urban water distribution system (WDS) in Saudi Ara...

  • Article
  • Open Access
3 Citations
2,849 Views
10 Pages

11 May 2022

The Italian export of agri-food products has been increasingly threatened by the unfair use of misleading Italian symbols (such as the national flag or the green-white-red colors) by non-Italian producers. This research paper investigated what Englis...

  • Article
  • Open Access
4 Citations
3,471 Views
12 Pages

As the global proportion of the elderly population has been growing rapidly, it has become important to better understand the holistic social factors involved in cognitive impairment in the elderly. To investigate the relationship between social vuln...

  • Article
  • Open Access
1 Citations
3,371 Views
17 Pages

10 February 2023

Vulnerability prediction, in which static analysis is leveraged to predict the vulnerabilities of binary programs, has become a popular research topic. Traditional vulnerability prediction methods depend on vulnerability patterns, which must be prede...

  • Article
  • Open Access
7 Citations
3,276 Views
16 Pages

5 October 2020

Prompted by rising concern about weak consumer switching and the practice of price discrimination, over the period of 2016–2019, the Office of Gas and Electricity Markets (Ofgem) undertook a series of trials on communication-based interventions...

  • Article
  • Open Access
3 Citations
4,933 Views
22 Pages

Assessment of Building Vulnerability to Tsunami in Ancon Bay, Peru, Using High-Resolution Unmanned Aerial Vehicle Imagery and Numerical Simulation

  • Carlos Davila,
  • Angel Quesquen,
  • Fernando Garcia,
  • Brigitte Puchoc,
  • Oscar Solis,
  • Julian Palacios,
  • Jorge Morales and
  • Miguel Estrada

29 May 2025

Traditional tsunami vulnerability assessments often rely on empirical models and field surveys, which can be time-consuming and have limited accuracy. In this study, we propose a novel approach that integrates high-resolution Unmanned Aerial Vehicle...

  • Article
  • Open Access
2 Citations
2,679 Views
15 Pages

Changes in Alcohol Consumption among Different Population Groups during the SARS-CoV-2 Pandemic: Outcomes of the Slovenian Cross-Sectional National Survey (SI-PANDA)

  • Sandra Radoš Krnel,
  • Maja Roškar,
  • Marjetka Hovnik Keršmanc,
  • Maruša Rehberger,
  • Gorazd Levičnik and
  • Ada Hočevar Grom

Background: Slovenia ranks amongst the countries with the highest recorded alcohol consumption. The mortality rate attributed to alcohol-related causes of death in Slovenia also exceeds the EU average. The aim of our research was to confirm the chang...

  • Article
  • Open Access
1 Citations
3,162 Views
14 Pages

Unauthorized Access Detection for Network Device Firmware WEB Pages

  • Minwei Peng,
  • Qiang Wei,
  • Rongkuan Ma,
  • Yangyang Geng,
  • Yahui Yang,
  • Shichao Zhang and
  • Yali Zhang

31 August 2023

WEB technology is utilized for the configuration, interaction, and management of network equipment, which has become ubiquitous in the intelligent industry and consumer electronics field. Unauthorized access on WEB allows unauthorized users to access...

  • Article
  • Open Access
16 Citations
3,792 Views
17 Pages

11 April 2019

Assessing the seismic vulnerability of large numbers of buildings is an expensive and time-consuming task, requiring the collection of highly complex and multifaceted data on building characteristics and the use of sophisticated computational models....

  • Article
  • Open Access
10 Citations
5,429 Views
20 Pages

Corporate Sustainability Strategies: A Case Study in Brazil Focused on High Consumers of Electricity

  • Fabricio Casarejos,
  • Mauricio Nogueira Frota,
  • José Eduardo Rocha,
  • Walquíria Rosa Da Silva and
  • José Tenório Barreto

11 August 2016

The decline of socio-ecological resilience has emerged as an unprecedented truth with high risks to local and global economies, thereby increasing the vulnerability of businesses and markets while potentially threatening the wellbeing of civil societ...

  • Article
  • Open Access
10 Citations
3,396 Views
11 Pages

13 June 2022

Adolescent girls are in the key stages of rapid physical and psychological development and have a great demand for iron. Anemia affects adolescent girls’ health, future development, and even the health of their offspring. There has been limited...

  • Article
  • Open Access
6 Citations
12,668 Views
24 Pages

24 February 2024

Cybersecurity failures have become increasingly detrimental to organizations worldwide, impacting their finances, operations, and reputation. This issue is worsened by the scarcity of cybersecurity professionals. Moreover, the specialization required...

  • Article
  • Open Access
1 Citations
3,719 Views
21 Pages

4 October 2024

Upon lifting lockdown measures, pent-up consumer demand resulted in a phenomenon known as “revenge-buying” that was influenced by cognitive and habitual factors. This study collected 629 samples from Beijing consumers using straightforwar...

  • Article
  • Open Access
4 Citations
2,866 Views
14 Pages

While past studies have provided enough evidence to show consumer attitude as a key predictor of the adoption and continuous usage intention of wearable activity trackers (WATs), limited studies have examined the antecedents of consumers’ attit...

  • Article
  • Open Access
110 Citations
14,910 Views
18 Pages

Before consequences of climate change continue to intensify and increasingly affect the entire planet, immediate action must be taken. For instance, adopt the pro-environmental behaviors such as purchase of organic food to minimize the harmful human-...

  • Article
  • Open Access
7 Citations
3,143 Views
13 Pages

Economic Feasibility of Iodine Agronomic Biofortification: A Projective Analysis with Ugandan Vegetable Farmers

  • Solomon Olum,
  • Xavier Gellynck,
  • Joshua Wesana,
  • Walter Odongo,
  • Nathaline Onek Aparo,
  • Bonny Aloka,
  • Duncan Ongeng and
  • Hans De Steur

24 September 2021

Cost–benefit analysis of (iodine) biofortification at farm level is limited in the literature. This study aimed to analyze the economic feasibility of applying iodine-rich fertilizers (agronomic biofortification) to cabbage and cowpea in Northern Uga...

  • Article
  • Open Access
10 Citations
18,478 Views
23 Pages

Improving Society and the Planet: Sustainability and Fashion Post-Pandemic

  • Jessica Strübel,
  • Saheli Goswami,
  • Ji Hye Kang and
  • Rosemary Leger

25 August 2023

The COVID-19 pandemic has exposed the vulnerability of our ecosystem and demonstrated a crucial need to address sustainability across the fashion supply chain, including the end-use consumer. As consumers become more conscious and demand sustainable...

  • Article
  • Open Access
32 Citations
6,410 Views
27 Pages

21 December 2021

Overall, 5G networks are expected to become the backbone of many critical IT applications. With 5G, new tech advancements and innovation are expected; 5G currently operates on software-defined networking. This enables 5G to implement network slicing...

  • Article
  • Open Access
10 Citations
4,943 Views
13 Pages

VTT-LLM: Advancing Vulnerability-to-Tactic-and-Technique Mapping through Fine-Tuning of Large Language Model

  • Chenhui Zhang,
  • Le Wang,
  • Dunqiu Fan,
  • Junyi Zhu,
  • Tang Zhou,
  • Liyi Zeng and
  • Zhaohua Li

24 April 2024

Vulnerabilities are often accompanied by cyberattacks. CVE is the largest repository of open vulnerabilities, which keeps expanding. ATT&CK models known multi-step attacks both tactically and technically and remains up to date. It is valuable to...

  • Review
  • Open Access
3 Citations
5,591 Views
21 Pages

13 October 2023

IP cameras and digital video recorders, as part of the Internet of Surveillance Things (IoST) technology, can sometimes allow unauthenticated access to the video feed or management dashboard. These vulnerabilities may result from weak APIs, misconfig...

  • Article
  • Open Access
6 Citations
2,892 Views
21 Pages

25 May 2022

This study aims to analyze the actual heating energy consumption according to the location and size of apartment houses. The study shows the variation in heating energy consumption in accordance with the living pattern of residents in such apartments...

  • Article
  • Open Access
82 Citations
24,158 Views
25 Pages

27 February 2020

Environmentally sustainable (green) products are frequently advertised to consumers, yet it is debatable whether the consumers are aware whether these green labelled products are environmentally friendly or not. Greenwashing is a phenomenon used by c...

of 13