Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (91)

Search Parameters:
Keywords = vulnerable witness

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
40 pages, 5920 KB  
Article
A Framework for Budget-Constrained Zero-Day Cyber Threat Mitigation: A Knowledge-Guided Reinforcement Learning Approach
by Mainak Basak and Geon-Yun Shin
Sensors 2026, 26(1), 21; https://doi.org/10.3390/s26010021 - 19 Dec 2025
Viewed by 593
Abstract
Conventional machine-learning-based defenses are unable to generalize well to novel chains of ATT&CK actions. Being inefficient with low telemetry budgets, they are also unable to provide causal explainability and auditing. We propose a knowledge-based cyber-defense framework that integrates ATT&CK constrained model generation, budget-constrained [...] Read more.
Conventional machine-learning-based defenses are unable to generalize well to novel chains of ATT&CK actions. Being inefficient with low telemetry budgets, they are also unable to provide causal explainability and auditing. We propose a knowledge-based cyber-defense framework that integrates ATT&CK constrained model generation, budget-constrained reinforcement learning, and graph-based causal explanation into a single auditable pipeline. The framework formalizes the synthesis of zero-day chains of attacks using a grammar-formalized ATT&CK database and compiles them into the Zeek-aligned witness telemetry. This allows for efficient training of detection using the generated data within limited sensor budgets. The Cyber-Threat Knowledge Graph (CTKG) stores dynamically updated inter-relational semantics between tactics, techniques, hosts, and vulnerabilities. This enhances the decision state using causal relations. The sensor budget policy selects the sensoring and containment decisions within explicit bounds of costs and latency. The inherent defense-provenance features enable a traceable explanation of each generated alarm. Extensive evaluations of the framework using the TTP holdouts of the zero-day instances show remarkable improvements over conventional techniques in terms of low-FPR accuracy, TTD, and calibration. Full article
(This article belongs to the Special Issue Cyber Security and AI—2nd Edition)
Show Figures

Figure 1

22 pages, 4829 KB  
Article
Material Vulnerability: Analytical Approaches to the Identification and Characterization of Alterations and Deterioration Processes in Translucent Paper
by Rosa Gutiérrez Juan, Rosario Blanc García, Rafael Lorente Fernández and Ana M. López Montes
Heritage 2025, 8(11), 469; https://doi.org/10.3390/heritage8110469 - 7 Nov 2025
Viewed by 653
Abstract
Research in the field of cultural heritage has grown due to the need to preserve cultural assets that serve as witnesses to history and culture. In conservation and restoration, research on traditional papers is extensive, but translucent papers have received less attention. These [...] Read more.
Research in the field of cultural heritage has grown due to the need to preserve cultural assets that serve as witnesses to history and culture. In conservation and restoration, research on traditional papers is extensive, but translucent papers have received less attention. These documents, of proteinaceous, cellulosic, or synthetic origin, achieve transparency through processes that modify their structure, which makes them more vulnerable to aging. Their degradation is aggravated by inadequate storage and handling, posing challenges because they do not respond well to conventional treatments. This study analyzes these issues using documents from the late nineteenth and primarily the twentieth century, sourced from the Provincial Historical Archive of Granada and the Archive of the Higher Technical School of Architecture in Granada. Through visual, photographic, and bibliographic study, a theoretical and graphic catalogue of the most significant deteriorations has been developed. Concurrently, a physicochemical analysis was applied using techniques such as colorimetry, X-ray Fluorescence Spectroscopy (XRF), and Fourier-Transform Infrared Spectroscopy (FTIR). These tools make it possible to relate the material composition of the documents to their state of preservation. This work provides deeper knowledge about the degradation mechanisms of these supports and lays the foundations for the development of specific restoration strategies for this documentary typology. Full article
(This article belongs to the Special Issue Deterioration and Conservation of Ancient Writing Supports)
Show Figures

Graphical abstract

13 pages, 240 KB  
Perspective
Recent Developments in Eating Disorders in Children: A Comprehensive Perspective
by Silvia Cimino, Arturo Bevilacqua and Luca Cerniglia
J. Clin. Med. 2025, 14(17), 6042; https://doi.org/10.3390/jcm14176042 - 26 Aug 2025
Cited by 1 | Viewed by 2237
Abstract
Recent years have witnessed a concerning rise in early-onset eating disorders (EDs), prompting a re-evaluation of their etiology, diagnosis, and treatment within pediatric populations. This perspective article synthesizes emerging evidence on the multifactorial origins of EDs in children, emphasizing a biopsychosocial framework that [...] Read more.
Recent years have witnessed a concerning rise in early-onset eating disorders (EDs), prompting a re-evaluation of their etiology, diagnosis, and treatment within pediatric populations. This perspective article synthesizes emerging evidence on the multifactorial origins of EDs in children, emphasizing a biopsychosocial framework that integrates genetic, epigenetic, psychological, and environmental factors. While early manifestations often diverge from adolescent or adult profiles—marked by somatic complaints, selective eating, and ritualistic behaviors—the disorders significantly interfere with developmental milestones. The COVID-19 pandemic has further exacerbated vulnerabilities, acting as a catalyst for disordered eating behaviors through increased familial stress, isolation, and disrupted routines. Central to this framework is the role of parental psychopathology and parent–child feeding interactions, which profoundly shape children’s emotional regulation and attachment patterns. Recent studies also underscore genetic susceptibilities—especially variants in the DRD4 and DAT1 genes—and epigenetic modifications that may mediate the transmission of risk across generations. The article reviews evidence from observational and genomic studies, highlighting how altered gene expression linked to early environmental stress contributes to the heterogeneity of EDs. Finally, it evaluates prevention and intervention strategies, including family-based treatments, digital health tools, and school-based programs. These strategies are essential for timely detection, individualized care, and reducing long-term impairment. Overall, the paper advocates for a nuanced understanding of EDs in children—recognizing their complex origins and developmental implications—to inform clinical practice, public health policy, and future research in pediatric mental health. Full article
(This article belongs to the Section Mental Health)
25 pages, 317 KB  
Article
Video Relay Service Interpreters’ Experiences with Caller Behavior: An Occupational Health Risk Call to Action
by Robyn K. Dean, Catherine Cerulli, Daniel J. Devor, Robert Q Pollard, Jr., Sarah E. Biello, Daniel Maffia and Hugh F. Crean
Healthcare 2025, 13(17), 2116; https://doi.org/10.3390/healthcare13172116 - 26 Aug 2025
Viewed by 1526
Abstract
Background/Objectives: Research raising concerns about the occupational health of signed language interpreters has proliferated in the past two decades. Recent studies examining interpreters’ various work settings find that Video Relay Service (VRS) work is linked to greater health risks than other interpreting [...] Read more.
Background/Objectives: Research raising concerns about the occupational health of signed language interpreters has proliferated in the past two decades. Recent studies examining interpreters’ various work settings find that Video Relay Service (VRS) work is linked to greater health risks than other interpreting settings. This study aimed to shed light on why VRS work appears to be particularly hazardous. Methods: This mixed-methods study reports data from an online survey of 345 American VRS interpreters. Participants were queried about a range of potentially stressful experiences with callers. Quantitative data regarding the types, frequency, patterns, and consequences of stressful calls were further informed by qualitative data reported by participants in free-response survey fields. Results: Incidents of VRS interpreters mediating calls regarding sexual activity, drug deals, and prostitution were reported with notable frequency, as was interpreters’ witnessing abuse of vulnerable individuals. Interpreters also were often the object of callers’ derisive sexual, physical, and racial comments. Yet the incidence of participants reporting these experiences to management or outside authorities was quite limited despite the potential legal jeopardy involved. When reports were made, most participants stated their companies took little or no action. We also examined how factors such as the tenure of VRS, hours worked per week, and work shift times were associated with such caller experiences. Conclusions: This study builds upon prior VRS health risk research by examining external factors, including caller behavior and employer policies, that may contribute to interpreter stress and burnout. Suggestions for remediation and workforce development, involving VRS companies, the Federal Communications Commission (FCC) and state legislation are offered. Full article
17 pages, 992 KB  
Article
Improving Vulnerability Management for Security-by-Design of Medical Devices
by Emanuele Raso, Francesca Nanni, Francesco Lestini, Lorenzo Bracciale, Giorgia Panico, Giuseppe Bianchi, Giancarlo Orengo, Gaetano Marrocco and Pierpaolo Loreti
Sensors 2025, 25(14), 4418; https://doi.org/10.3390/s25144418 - 16 Jul 2025
Viewed by 2391
Abstract
The healthcare industry is witnessing a rapid rise in the adoption of wearable and implantable medical devices, including advanced electrochemical sensors and other smart diagnostic technologies. These devices are increasingly used to enable real-time monitoring of physiological parameters, allowing for faster diagnosis and [...] Read more.
The healthcare industry is witnessing a rapid rise in the adoption of wearable and implantable medical devices, including advanced electrochemical sensors and other smart diagnostic technologies. These devices are increasingly used to enable real-time monitoring of physiological parameters, allowing for faster diagnosis and more personalized care plans. Their growing presence reflects a broader shift toward smart connected healthcare systems aimed at delivering immediate and actionable insights to both patients and medical professionals. At the same time, the healthcare industry is increasingly targeted by cyberattacks, primarily due to the high value of medical information; in addition, the growing integration of ICT technologies into medical devices has introduced new vulnerabilities that were previously absent in this sector. To mitigate these risks, new international guidelines advocate the adoption of best practices for secure software development, emphasizing a security-by-design approach in the design and implementation of such devices. However, the vast and fragmented nature of the information required to effectively support these development processes poses a challenge for the numerous stakeholders involved. In this paper, we demonstrate how key features of the Malware Information Sharing Platform (MISP) can be leveraged to systematically collect and structure vulnerability-related information for medical devices. We propose tailored structures, objects, and taxonomies specific to medical devices, facilitating a standardized data representation that enhances the security-by-design development of these devices. Full article
(This article belongs to the Special Issue Wearable and Implantable Electrochemical Sensors)
Show Figures

Figure 1

16 pages, 284 KB  
Article
Suicidal Ideation in U.S. Adolescents Exposed to Neighborhood Violence
by Silviya Nikolova, Eusebius Small and Benjamin Sesay
Adolescents 2025, 5(3), 31; https://doi.org/10.3390/adolescents5030031 - 7 Jul 2025
Cited by 1 | Viewed by 3260
Abstract
Background: Suicidal ideation among adolescents remains a major public health challenge. Exposure to neighborhood violence is associated with increased risk of mental health distress and school-related vulnerabilities. This study investigates the predictors of suicidal ideation among U.S. adolescents who have witnessed neighborhood violence. [...] Read more.
Background: Suicidal ideation among adolescents remains a major public health challenge. Exposure to neighborhood violence is associated with increased risk of mental health distress and school-related vulnerabilities. This study investigates the predictors of suicidal ideation among U.S. adolescents who have witnessed neighborhood violence. Methods: Data were drawn from the 2023 Youth Risk Behavior Survey (YRBS), a nationally representative survey of high school students in the United States. A subsample of 3495 adolescents who reported witnessing neighborhood violence was analyzed. Key variables included sociodemographic characteristics, mental health symptoms, perceived school safety, and experiences of victimization. Multivariable logistic regression was used to identify factors associated with suicidal ideation, defined as seriously considering suicide in the past year. Analyses were conducted using Jamovi (version 2.6), with statistical significance set at p < 0.05. Results: The prevalence of suicidal ideation in the sample was 34.2%. Bisexual adolescents had significantly higher odds of suicidal ideation compared to heterosexual peers (OR = 2.34, p < 0.001). Depressive symptoms were the strongest predictor (OR = 7.51, p < 0.001). Both perceived lack of safety at school and differences in ethnic and population backgrounds were significant. Black and Hispanic/Latino adolescents had lower odds compared to White peers. Conclusions: Findings highlight sexual identity, depressive symptoms, school safety concerns, and ethnic and population background differences as key correlates of suicidal ideation. Culturally responsive, trauma-informed interventions are urgently needed for youth exposed to community violence. Full article
18 pages, 3039 KB  
Article
Security Symmetry in Embedded Systems: Using Microsoft Defender for IoT to Detect Firmware Downgrade Attacks
by Marian Hristov, Maria Nenova and Viktoria Dimitrova
Symmetry 2025, 17(7), 1061; https://doi.org/10.3390/sym17071061 - 4 Jul 2025
Cited by 1 | Viewed by 1421
Abstract
Nowadays, the world witnesses cyber attacks daily, and these threats are becoming exponentially sophisticated due to advances in Artificial Intelligence (AI). This progress allows adversaries to accelerate malware development and streamline the exploitation process. The motives vary, and so do the consequences. Unlike [...] Read more.
Nowadays, the world witnesses cyber attacks daily, and these threats are becoming exponentially sophisticated due to advances in Artificial Intelligence (AI). This progress allows adversaries to accelerate malware development and streamline the exploitation process. The motives vary, and so do the consequences. Unlike Information Technology (IT) breaches, Operational Technology (OT)—such as manufacturing plants, electric grids, or water and wastewater facilities—compromises can have life-threatening or environmentally hazardous consequences. For that reason, this article explores a potential cyber attack against an OT environment—firmware downgrade—and proposes a solution for detection and response by implementing Microsoft Defender for IoT (D4IoT), one of the leading products on the market for OT monitoring. To detect the malicious firmware downgrade activity, D4IoT was implemented in a pre-commissioning (non-production) environment. The solution passively monitored the network, identified the deviation, and generated alerts for response actions. Testing showed that D4IoT effectively detected the firmware downgrade attempts based on a protocol analysis and asset behavior profiling. These findings demonstrate that D4IoT provides valuable detection capabilities against an intentional firmware downgrade designed to exploit known vulnerabilities in the older, less secure version, thereby strengthening the cybersecurity posture of OT environments. The explored attack scenario leverages the symmetry between genuine and malicious firmware flows, where the downgrade mimics the upgrade process, aiming to create challenges in detection. The proposed solution discerns adversarial actions from legitimate firmware changes by breaking this functional symmetry through behavioral profiling. Full article
Show Figures

Figure 1

8 pages, 206 KB  
Essay
Language Abuse: The Politicization and Categorization of People on the Move Through Language and Narrative
by Maurizio Ambrosini, Senyo Dotsey, Audrey Lumley-Sapanski and Holly Oberle
Genealogy 2025, 9(2), 60; https://doi.org/10.3390/genealogy9020060 - 31 May 2025
Cited by 3 | Viewed by 1162
Abstract
Over the last three decades, the once-distinct terms ‘asylum’ and ‘immigration’ have become conceptually intertwined. This process is almost complete in Europe, where politicians, media, the public, and even academia often speak of these concepts interchangeably. Blurring these concepts has implications for migratory [...] Read more.
Over the last three decades, the once-distinct terms ‘asylum’ and ‘immigration’ have become conceptually intertwined. This process is almost complete in Europe, where politicians, media, the public, and even academia often speak of these concepts interchangeably. Blurring these concepts has implications for migratory people: it removes legal rights borne by the state and diminishes the claims of humanitarian protection seekers within these movements. We have simultaneously witnessed the recategorization and reinterpretation of the statuses of vulnerable populations on the move, using geolegality to exclude them from otherwise legally entitled protections. We speak to the problems with narrowing the eligibility for protection through geolegality while simultaneously contributing to conceptual indistinction between people that discredits their identities as rights bearers. This short essay reflects on the ethical dilemmas of language use by researchers in shaping and contributing to this situation. Full article
18 pages, 1336 KB  
Review
The Sociology of Suicide After COVID-19: Assessment of the Spanish Case
by Enrique Fernández-Vilas, Juan R. Coca, Juan José Labora González and Marcos Iglesias Carrera
Behav. Sci. 2025, 15(5), 606; https://doi.org/10.3390/bs15050606 - 1 May 2025
Viewed by 3815
Abstract
The phenomenon of suicide has become a significant global concern, claiming over 800,000 lives annually and resulting in millions of suicide attempts worldwide. In the aftermath of the COVID-19 pandemic, these troubling statistics have worsened, with notable increases in suicidal behavior, especially among [...] Read more.
The phenomenon of suicide has become a significant global concern, claiming over 800,000 lives annually and resulting in millions of suicide attempts worldwide. In the aftermath of the COVID-19 pandemic, these troubling statistics have worsened, with notable increases in suicidal behavior, especially among vulnerable populations such as the youth, the elderly, and those in socioeconomically disadvantaged groups. This paper aims to explore the impact of the COVID-19 pandemic on suicide rates in Spain, using a theoretical ex post facto analysis. Spain has witnessed an alarming rise in suicide rates, particularly among young people, and a disturbing trend of increased suicidal ideation and self-harm behaviors. While some studies report no significant change in suicide rates during the pandemic, others point to the exacerbating effects of social isolation, economic instability, and public health measures. This study provides an in-depth examination of the psychosocial consequences of the pandemic on mental health in Spain, emphasizing the urgency of the need to address pre-existing inequalities and implement effective suicide prevention measures. Furthermore, it highlights the importance of gender-sensitive strategies and the need for systemic reforms to ensure better mental healthcare access for all segments of society. To achieve this goal, this paper uses a narrative literature review combined with a theoretical ex post facto analysis to assess the influence of the COVID-19 pandemic on suicide patterns in Spain. Full article
(This article belongs to the Special Issue Suicidal Behaviors: Prevention, Intervention and Postvention)
Show Figures

Figure 1

23 pages, 3499 KB  
Article
Gut Microbiome Alterations, Mental Health, and Alcohol Consumption: Investigating the Gut–Brain Axis in Firefighters
by Ji Youn Yoo, Anujit Sarkar, Hyo-Sook Song, Sunghwan Bang, Gyusik Shim, Cary Springer, Morgan E. O’Brien, Yoonhwa Shin, Songhyun Ju, Sunhee Han, Sung Soo Kim, Usha Menon, Tae Gyu Choi and Maureen E. Groer
Microorganisms 2025, 13(3), 680; https://doi.org/10.3390/microorganisms13030680 - 18 Mar 2025
Cited by 2 | Viewed by 2484
Abstract
Firefighters across the world face higher risks of occupational hazards, such as exposure to chemicals, extreme heat, traumatic stressors, and intense physical demands, which can increase their vulnerability to a range of psychological and physiological difficulties. These challenges include the risk of developing [...] Read more.
Firefighters across the world face higher risks of occupational hazards, such as exposure to chemicals, extreme heat, traumatic stressors, and intense physical demands, which can increase their vulnerability to a range of psychological and physiological difficulties. These challenges include the risk of developing chronic stress, depression, and post-traumatic stress disorder (PTSD), potentially leading to detrimental negative coping patterns such as alcohol abuse. The consequent health implications impact both short-term and long-term health and well-being. This study aimed to explore the relationship between mental health status, alcohol consumption patterns, and gut microbiome alterations in firefighters from two different regions—America and Korea. By investigating these relationships, we hope to gain insights into how repeated exposure to severe stressors impacts gut health. Healthy male firefighters (ages 21–50) and controls (matched sex, geography, and age) were recruited via flyers and snowball sampling in the United States and South Korea, resulting in 203 participants (102 firefighters and 101 controls). Firefighters reported significantly higher PTSD symptoms and depression and drank 2.3 times more alcohol than the control group. American firefighters reported more drinking than Koreans. There was a significant correlation between higher alcohol consumption and the likelihood of witnessing deaths by suicide. However, there were no correlations between alcohol consumption and PTSD symptom severity. There were associations between alcohol consumption patterns and aspects of the gut microbiome. This study highlights the mental health challenges faced by firefighters, including elevated rates of PTSD, depression, and alcohol consumption, with specific microbial imbalances linked to PTSD and alcohol use, emphasizing the role of the gut–brain axis. Full article
Show Figures

Figure 1

43 pages, 1727 KB  
Review
A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions
by Ashwag Alotaibi, Huda Aldawghan and Ahmed Aljughaiman
Sensors 2025, 25(6), 1649; https://doi.org/10.3390/s25061649 - 7 Mar 2025
Cited by 12 | Viewed by 5973
Abstract
Smart cities have witnessed a transformation in urban living through the Internet of Things (IoT), which has improved connectedness, efficiency, and sustainability. However, the adoption of IoT devices presents significant security vulnerabilities, particularly in authentication. The specific limitations of IoT contexts, such as [...] Read more.
Smart cities have witnessed a transformation in urban living through the Internet of Things (IoT), which has improved connectedness, efficiency, and sustainability. However, the adoption of IoT devices presents significant security vulnerabilities, particularly in authentication. The specific limitations of IoT contexts, such as constrained computational resources, are frequently not adequately addressed by traditional authentication techniques. The existing methods of authentication used for IoT devices in smart cities are critically examined in this review study. We evaluate the advantages and disadvantages of each mechanism, emphasizing real-world applicability. Additionally, we examine cutting-edge developments that offer improved security and scalability, such as blockchain technology, biometric authentication, and machine learning-based solutions. This study aims to identify gaps and propose future research directions to develop robust authentication frameworks that protect user privacy and data integrity. Full article
(This article belongs to the Special Issue Advanced IoT Systems in Smart Cities: 2nd Edition)
Show Figures

Figure 1

37 pages, 735 KB  
Review
Blockchain-Assisted Self-Sovereign Identities on Education: A Survey
by Weilin Chan, Keke Gai, Jing Yu and Liehuang Zhu
Blockchains 2025, 3(1), 3; https://doi.org/10.3390/blockchains3010003 - 11 Feb 2025
Cited by 5 | Viewed by 5934
Abstract
The education sector has witnessed a significant shift towards digitising student records, with relevant data now stored in centralized data repositories. While traditional identity management solutions in education are functional, they often face various challenges, including data privacy concerns, limited portability, and reliability [...] Read more.
The education sector has witnessed a significant shift towards digitising student records, with relevant data now stored in centralized data repositories. While traditional identity management solutions in education are functional, they often face various challenges, including data privacy concerns, limited portability, and reliability challenges. As the volume of student data continues to grow, inadequate data management practices have led to several problems. These include students losing control and empowerment over their educational information, increased vulnerability to potential data breaches and unauthorized access, a lack of transparency and accountability, data silos and inconsistencies, and administrative inefficiencies. To address these limitations, the implementation of a blockchain-assisted self-sovereign identity (Ba-SSI) concept in the education system presents a viable solution. Self-sovereign identity (SSI) represents a paradigm shift from traditional centralized identity systems, allowing individuals to maintain full control of their identity data without relying on centralized authorities. By leveraging the decentralized nature, SSI frameworks can ensure security, interoperability, and scalability, thereby improving user-centric identity management. This survey paper explores the potential of Ba-SSI within the context of education. It thoroughly reviews the current state of digital identity management in education, highlighting the limitations of conventional systems and the emerging role of blockchain technology in addressing these challenges. The paper discusses the fundamental principles of blockchain technology and how it can be utilized to enhance security, interoperability, and scalability in identity management. Additionally, it examines the insights and benefits of this approach for the education system. Finally, the paper concludes by addressing the issues, challenges, benefits, and future research directions in this domain, underscoring the potential of Ba-SSI solutions to revolutionize the management and empowerment of student data within the education sector. Full article
(This article belongs to the Special Issue Feature Papers in Blockchains)
Show Figures

Figure 1

23 pages, 4191 KB  
Review
Non-Indigenous Species (NIS) Know No Geopolitical Borders—An Update of NIS in the Aegean Sea
by Argyro Zenetos, Alper Doğan, Ahmet Kerem Bakir, Georgios Chatzigeorgiou, Maria Corsini-Foka, Ertan Dağli, Athanasios Evangelopoulos, Engin Meriç, Maria Stoumboudi, Ergun Taşkin, Mehmet Baki Yokeş and Marika Galanidi
Diversity 2025, 17(1), 12; https://doi.org/10.3390/d17010012 - 26 Dec 2024
Cited by 6 | Viewed by 3655
Abstract
In this work, combined efforts by Greek and Turkish scientists produced an updated validated NIS inventory of the Aegean ecoregion, covering 120 years of records up to August 2024. Of the 342 NIS currently present in the Aegean Sea, the majority (281 species) [...] Read more.
In this work, combined efforts by Greek and Turkish scientists produced an updated validated NIS inventory of the Aegean ecoregion, covering 120 years of records up to August 2024. Of the 342 NIS currently present in the Aegean Sea, the majority (281 species) have invaded the South Aegean, followed by the North Aegean (128 species out of 206 NIS). A total of 73 species were added to the list, while 56 were removed. Overall, unaided spread of Lessepsian immigrants from the Levantine Sea and shipping are equally responsible for NIS reported at the regional level. An increase in publications addressing NIS matches the upward trend of NIS since the mid-1990s, which continues to the present day. While unaided introductions of Lessepsian species and/or direct introductions via the Suez Canal peaked in the South Aegean during 2000–2005, they peaked in 2012–2017 in the North Aegean—a decade later. The opposite pattern was observed in ship-transferred NIS. The spatial distribution of introduction hotspots largely reflects the following phenomena/processes: unaided introduction is witnessed initially in the southeastern Aegean Sea; monitoring efforts are concentrated in vulnerable and at-risk areas; and research efforts relate to the spatial allocation of institutions and marine experts working on marine NIS along the Aegean coasts. Full article
(This article belongs to the Special Issue Marine Biodiversity and Ecosystems Management—2nd Edition)
Show Figures

Figure 1

15 pages, 2987 KB  
Article
Cyber Sex Crimes Targeting Children and Adolescents in South Korea: Incidents and Legal Challenges
by Yujin Jang and Youngmeen Suh
Soc. Sci. 2024, 13(11), 596; https://doi.org/10.3390/socsci13110596 - 3 Nov 2024
Cited by 1 | Viewed by 15149
Abstract
This review paper addresses the growing and increasingly sophisticated issue of cyber sexual crimes targeting children and adolescents. It explores specific examples of various sexual offenses, analyzes the limitations of current legal frameworks, and offers practical recommendations for prevention. As one of the [...] Read more.
This review paper addresses the growing and increasingly sophisticated issue of cyber sexual crimes targeting children and adolescents. It explores specific examples of various sexual offenses, analyzes the limitations of current legal frameworks, and offers practical recommendations for prevention. As one of the world’s most advanced digital societies, South Korea has witnessed a significant rise in such crimes. These incidents are classified into clear criminal acts, tactics used to lure minors, and occurrences within virtual environments, all of which should be integral to educational programs for children and parents. This study also examines the UK’s Online Safety Act, recognized as a leading model in combating online sexual offenses, and highlights the deficiencies in South Korean law. Given that these crimes often extend into the offline world, exploit vulnerable groups with increasing subtlety, and are challenging for individuals to counteract alone, there is a critical need for specialized education for minors, metaverse training for parents, and the enhancement of both legal measures and international cooperation in this area. Full article
Show Figures

Figure 1

19 pages, 306 KB  
Article
Returnees’ Perspectives of the Adverse Impact of Forced Displacement on Children
by Itunu O. Ilesanmi, Jasmine D. Haynes and Florence O. Ogundimu
Soc. Sci. 2024, 13(9), 484; https://doi.org/10.3390/socsci13090484 - 12 Sep 2024
Cited by 1 | Viewed by 3188
Abstract
Conflict-related forced displacement, characterized by the experiences of witnessing violent acts, bombing, torture, separation, and the execution of family members, can severely and negatively impact a child’s social determinants of health (SDOH). These experiences are both direct and indirect forms of adverse childhood [...] Read more.
Conflict-related forced displacement, characterized by the experiences of witnessing violent acts, bombing, torture, separation, and the execution of family members, can severely and negatively impact a child’s social determinants of health (SDOH). These experiences are both direct and indirect forms of adverse childhood experiences (ACEs), and urgent attention is needed to understand the impact of forced displacement on children, who are a vulnerable group, and to develop interventions for all systems that influence the child. This phenomenological qualitative study involved in-depth interviews based on the experiences of returnees (n = 20), who are parents of children who experienced forced displacement. This study underscores the direct and indirect impacts of forced displacement on children, with two key themes identified from the data analysis, by concluding that forced displacement: (i) disrupts the positive SDOH of children, and (ii) children’s coping mechanisms are influenced by primary and secondary exposure to trauma. The direct effects are visible through the impact of forced displacement on children’s mental health as a result of exposure to traumatic material. In contrast, the indirect effects of forced displacement on children are influenced by its subsequential effect on their parents and their community. The study also illuminates systemic inequalities, with participants recommending steps that governmental and non-governmental bodies can take to address this phenomenon. Full article
(This article belongs to the Special Issue Exploring the Systemic Causes of Adverse Childhood Experiences)
Back to TopTop