Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (140)

Search Parameters:
Keywords = security and border studies

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 1429 KB  
Article
Blockchain-Based Risk Management in Cross-Border Data Supply Chains: A Comparative Analysis of Alibaba and Infosys
by Snovia Naseem and Tang Yong
Sustainability 2025, 17(17), 7704; https://doi.org/10.3390/su17177704 - 27 Aug 2025
Viewed by 393
Abstract
Cross-border data flows are critical to the operation of global supply chains, particularly for digital enterprises such as Alibaba and Infosys. However, these flows introduce substantial challenges related to digital supply chain risk and cybersecurity management. This study examines how blockchain technology addresses [...] Read more.
Cross-border data flows are critical to the operation of global supply chains, particularly for digital enterprises such as Alibaba and Infosys. However, these flows introduce substantial challenges related to digital supply chain risk and cybersecurity management. This study examines how blockchain technology addresses these challenges within the operational contexts of Alibaba and Infosys. Unlike earlier research that often focused on sector-specific implementations or conceptual models, this study positions its findings within broader empirical evidence on blockchain-enabled supply chain governance, offering a comparative perspective that has been largely absent in prior work. Using an explanatory mixed-methods approach, the research combines thematic analysis of 85 peer-reviewed studies with in-depth case evaluations of the two firms. NVivo-based qualitative coding was applied to supporting sources, including GDPR audit reports, blockchain transaction records, and company disclosures. The findings demonstrate that blockchain adoption reduces cybersecurity breaches, enhances data integrity, and improves supply chain resilience. The study further shows how blockchain integration strengthens digital collaboration and regulatory alignment, enabling secure and uninterrupted data flows that support operational continuity and innovation. Overall, the research offers practical insights for digital enterprises and contributes to a deeper understanding of blockchain’s strategic role in cross-border data risk management. Full article
(This article belongs to the Special Issue Advances in Sustainable Supply Chain Management and Logistics)
Show Figures

Figure 1

17 pages, 529 KB  
Article
Coping with Risk: The Three Spheres of Safety in Latin American Investigative Journalism
by Lucia Mesquita, Mathias Felipe de-Lima-Santos and Isabella Gonçalves
Journal. Media 2025, 6(3), 121; https://doi.org/10.3390/journalmedia6030121 - 29 Jul 2025
Viewed by 599
Abstract
Small news media organizations are increasingly reshaping the news media system in Latin America. They are stepping into the role of watchdogs by investigating issues such as corruption scandals that larger outlets sometimes overlook. However, this journalistic work exposes both journalists and their [...] Read more.
Small news media organizations are increasingly reshaping the news media system in Latin America. They are stepping into the role of watchdogs by investigating issues such as corruption scandals that larger outlets sometimes overlook. However, this journalistic work exposes both journalists and their organizations to a range of security threats, including physical violence, legal pressure, and digital attacks. In response, these outlets have developed coping strategies to manage and mitigate such risks. This article presents an exploratory study of the approaches adopted to protect information and data, ensure the safety and well-being of journalists, and maintain organizational continuity. Based on a series of in-depth interviews with leaders of award-winning news organizations for their investigative reporting, the study examines a shift from a competitive newsroom model to a collaborative approach in which information is shared—sometimes across borders—to support investigative reporting and strengthen security practices. We identify strategies implemented by small news organizations to safeguard their journalistic work and propose an integrative model of news safety encompassing the following three areas of security: physical, legal, and digital. This study contributes to the development of the newsafety framework and sheds light on safety practices that support media freedom. Full article
Show Figures

Figure 1

28 pages, 10262 KB  
Article
Driving Forces and Future Scenario Simulation of Urban Agglomeration Expansion in China: A Case Study of the Pearl River Delta Urban Agglomeration
by Zeduo Zou, Xiuyan Zhao, Shuyuan Liu and Chunshan Zhou
Remote Sens. 2025, 17(14), 2455; https://doi.org/10.3390/rs17142455 - 15 Jul 2025
Viewed by 855
Abstract
The remote sensing monitoring of land use changes and future scenario simulation hold crucial significance for accurately characterizing urban expansion patterns, optimizing urban land use configurations, and thereby promoting coordinated regional development. Through the integration of multi-source data, this study systematically analyzes the [...] Read more.
The remote sensing monitoring of land use changes and future scenario simulation hold crucial significance for accurately characterizing urban expansion patterns, optimizing urban land use configurations, and thereby promoting coordinated regional development. Through the integration of multi-source data, this study systematically analyzes the spatiotemporal trajectories and driving forces of land use changes in the Pearl River Delta urban agglomeration (PRD) from 1990 to 2020 and further simulates the spatial patterns of urban land use under diverse development scenarios from 2025 to 2035. The results indicate the following: (1) During 1990–2020, urban expansion in the Pearl River Delta urban agglomeration exhibited a “stepwise growth” pattern, with an annual expansion rate of 3.7%. Regional land use remained dominated by forest (accounting for over 50%), while construction land surged from 6.5% to 21.8% of total land cover. The gravity center trajectory shifted southeastward. Concurrently, cropland fragmentation has intensified, accompanied by deteriorating connectivity of ecological lands. (2) Urban expansion in the PRD arises from synergistic interactions between natural and socioeconomic drivers. The Geographically and Temporally Weighted Regression (GTWR) model revealed that natural constraints—elevation (regression coefficients ranging −0.35 to −0.05) and river network density (−0.47 to −0.15)—exhibited significant spatial heterogeneity. Socioeconomic drivers dominated by year-end paved road area (0.26–0.28) and foreign direct investment (0.03–0.11) emerged as core expansion catalysts. Geographic detector analysis demonstrated pronounced interaction effects: all factor pairs exhibited either two-factor enhancement or nonlinear enhancement effects, with interaction explanatory power surpassing individual factors. (3) Validation of the Patch-generating Land Use Simulation (PLUS) model showed high reliability (Kappa coefficient = 0.9205, overall accuracy = 95.9%). Under the Natural Development Scenario, construction land would exceed the ecological security baseline, causing 408.60 km2 of ecological space loss; Under the Ecological Protection Scenario, mandatory control boundaries could reduce cropland and forest loss by 3.04%, albeit with unused land development intensity rising to 24.09%; Under the Economic Development Scenario, cross-city contiguous development zones along the Pearl River Estuary would emerge, with land development intensity peaking in Guangzhou–Foshan and Shenzhen–Dongguan border areas. This study deciphers the spatiotemporal dynamics, driving mechanisms, and scenario outcomes of urban agglomeration expansion, providing critical insights for formulating regionally differentiated policies. Full article
Show Figures

Figure 1

29 pages, 3782 KB  
Article
Land Use Evolution and Multi-Scenario Simulation of Shrinking Border Counties Based on the PLUS Model: A Case Study of Changbai County
by Bingxin Li, Chennan He, Xue Jiang, Qiang Zheng and Jiashuang Li
Sustainability 2025, 17(14), 6441; https://doi.org/10.3390/su17146441 - 14 Jul 2025
Viewed by 490
Abstract
The sharp decline in the population along the northeastern border poses a significant threat to the security of the region, the prosperity of border areas, and the stability of the social economy in our country. Effective management of human and land resources is [...] Read more.
The sharp decline in the population along the northeastern border poses a significant threat to the security of the region, the prosperity of border areas, and the stability of the social economy in our country. Effective management of human and land resources is crucial for the high-quality development of border areas. Taking Changbai County on the northeastern border as an example, based on multi-source data such as land use, the natural environment, climate conditions, transportation location, and social economy from 2000 to 2020, the land use transfer matrix, spatial kernel density, and PLUS model were used to analyze the spatio-temporal evolution characteristics of land use and explore simulation scenarios and optimization strategies under different planning concepts. This study reveals the following: (1) During the study period, the construction land continued to increase, but the growth rate slowed down, mainly transferred from cultivated land and forest land, and the spatial structure evolved from a single center to a double center, with the core always concentrated along the border. (2) The distance to the port (transportation location), night light (social economy), slope (natural environment), and average annual temperature (climate conditions) are the main driving factors for the change in construction land, and the PLUS model can effectively simulate the land use trend under population contraction. (3) In the reduction scenario, the construction land decreased by 1.67 km2, the scale of Changbai Town slightly reduced, and the contraction around Malugou Town and Badagou Town was more significant. The study shows that the reduction scenario is more conducive to the population aggregation and industrial carrying capacity improvement of shrinking county towns, which is in line with the high-quality development needs of border areas in our country. Full article
Show Figures

Figure 1

22 pages, 603 KB  
Article
The Impact of Digital Finance on the Development of Cross-Border E-Commerce
by Fanyong Meng and Yuqing Xiao
J. Theor. Appl. Electron. Commer. Res. 2025, 20(3), 180; https://doi.org/10.3390/jtaer20030180 - 14 Jul 2025
Viewed by 936
Abstract
Digital finance, a financial innovation paradigm driven by the synergy of digital technology and data elements, has significant advantages in enhancing the convenience, accessibility, and security of cross-border transactions. This study empirically examines the impact of digital finance on the development of cross-border [...] Read more.
Digital finance, a financial innovation paradigm driven by the synergy of digital technology and data elements, has significant advantages in enhancing the convenience, accessibility, and security of cross-border transactions. This study empirically examines the impact of digital finance on the development of cross-border e-commerce using provincial-level panel data from China between 2013 and 2023. After a series of robustness tests, the empirical results remained consistent and robust. The study found that digital finance significantly promotes the development of cross-border e-commerce. Further analysis indicated that digital finance enhances its supportive role in cross-border e-commerce by fostering the development of new, high-quality productive forces in the economy. The moderation effect analysis showed that internet penetration rates, innovation capital investment, and the development level of technology markets all have significant positive moderating effects on the role of digital finance in promoting cross-border e-commerce. The heterogeneity test results indicate that in regions with higher levels of marketization and a larger number of enterprises, the promotional effect of digital finance on cross-border e-commerce development is more pronounced. Full article
Show Figures

Figure 1

18 pages, 22954 KB  
Article
Spatiotemporal Analysis of Drought Variation from 2001 to 2023 in the China–Mongolia–Russia Transboundary Heilongjiang River Basin Based on ITVDI
by Weihao Zou, Juanle Wang, Congrong Li, Keming Yang, Denis Fetisov, Jiawei Jiang, Meng Liu and Yaping Liu
Remote Sens. 2025, 17(14), 2366; https://doi.org/10.3390/rs17142366 - 9 Jul 2025
Viewed by 482
Abstract
Drought impacts agricultural production and regional sustainable development. Accordingly, timely and accurate drought monitoring is essential for ensuring food security in rain-fed agricultural regions. Alternating drought and flood events frequently occur in the Heilongjiang River Basin, the largest grain-producing area in Far East [...] Read more.
Drought impacts agricultural production and regional sustainable development. Accordingly, timely and accurate drought monitoring is essential for ensuring food security in rain-fed agricultural regions. Alternating drought and flood events frequently occur in the Heilongjiang River Basin, the largest grain-producing area in Far East Asia. However, spatiotemporal variability in drought is not well understood, in part owing to the limitations of the traditional Temperature Vegetation Dryness Index (TVDI). In this study, an Improved Temperature Vegetation Dryness Index (ITVDI) was developed by incorporating Digital Elevation Model data to correct land surface temperatures and introducing a constraint line method to replace the traditional linear regression for fitting dry–wet boundaries. Based on MODIS (Moderate-resolution Imaging Spectroradiometer) normalized vegetation index and land surface temperature products, the Heilongjiang River Basin, a cross-border basin between China, Mongolia, and Russia, exhibited pronounced spatiotemporal variability in drought conditions of the growing season from 2001 to 2023. Drought severity demonstrated clear geographical zonation, with a higher intensity in the western region and lower intensity in the eastern region. The Mongolian Plateau and grasslands were identified as drought hotspots. The Far East Asia forest belt was relatively humid, with an overall lower drought risk. The central region exhibited variation in drought characteristics. From the perspective of cross-national differences, the drought severity distribution in Northeast China and Inner Mongolia exhibits marked spatial heterogeneity. In Mongolia, regional drought levels exhibited a notable trend toward homogenization, with a higher proportion of extreme drought than in other areas. The overall drought risk in the Russian part of the basin was relatively low. A trend analysis indicated a general pattern of drought alleviation in western regions and intensification in eastern areas. Most regions showed relatively stable patterns, with few areas exhibiting significant changes, mainly surrounding cities such as Qiqihar, Daqing, Harbin, Changchun, and Amur Oblast. Regions with aggravation accounted for 52.29% of the total study area, while regions showing slight alleviation account for 35.58%. This study provides a scientific basis and data infrastructure for drought monitoring in transboundary watersheds and for ensuring agricultural production security. Full article
Show Figures

Figure 1

23 pages, 1549 KB  
Review
Digital Transitions of Critical Energy Infrastructure in Maritime Ports: A Scoping Review
by Emmanuel Itodo Daniel, Augustine Makokha, Xin Ren and Ezekiel Olatunji
J. Mar. Sci. Eng. 2025, 13(7), 1264; https://doi.org/10.3390/jmse13071264 - 29 Jun 2025
Viewed by 832
Abstract
This scoping review investigates the digital transition of critical energy infrastructure (CEI) in maritime ports, which are increasingly vital as energy hubs amid global decarbonisation efforts. Recognising the growing role of ports in integrating offshore renewables, hydrogen, and LNG systems, the study examines [...] Read more.
This scoping review investigates the digital transition of critical energy infrastructure (CEI) in maritime ports, which are increasingly vital as energy hubs amid global decarbonisation efforts. Recognising the growing role of ports in integrating offshore renewables, hydrogen, and LNG systems, the study examines how digital technologies (such as automation, IoT, and AI) support the resilience, efficiency, and sustainability of port-based CEI. A multifaceted search strategy was implemented to identify relevant academic and grey literature. The search was performed between January 2025 and 30 April 2025. The strategy focused on databases such as Scopus. Due to limitations encountered in retrieving sufficient, directly relevant academic papers from databases alone, the search strategy was systematically expanded to include grey literature such as reports, policy documents, and technical papers from authoritative industry, governmental, and international organisations. Employing Arksey and O’Malley’s framework and PRISMA-ScR (scoping review) guidelines, the review synthesises insights from 62 academic and grey literature sources to address five core research questions relating to the current state, challenges, importance, and future directions of digital CEI in ports. Literature distribution of articles varies across continents, with Europe contributing the highest number of publications (53%), Asia (24%) and North America (11%), while Africa and Oceania account for only 3% of the publications. Findings reveal significant regional disparities in digital maturity, fragmented governance structures, and underutilisation of digital systems. While smart port technologies offer operational gains and support predictive maintenance, their effectiveness is constrained by siloed strategies, resistance to collaboration, and skill gaps. The study highlights a need for holistic digital transformation frameworks, cross-border cooperation, and tailored approaches to address these challenges. The review provides a foundation for future empirical work and policy development aimed at securing and optimising maritime port energy infrastructure in line with global sustainability targets. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

20 pages, 1120 KB  
Article
Safe and Sound: Governance for Planning Public Space in a Security-by-Design Paradigm
by Martina Massari, Danila Longo and Sara Branchini
Urban Sci. 2025, 9(7), 241; https://doi.org/10.3390/urbansci9070241 - 26 Jun 2025
Viewed by 662
Abstract
Security in public spaces has long been the subject of debate and extensive experimentation. With the exponential growth in risks (both expected and unexpected) that public spaces are exposed to, further exacerbated by the pandemic crisis, urban security management increasingly conflicts with the [...] Read more.
Security in public spaces has long been the subject of debate and extensive experimentation. With the exponential growth in risks (both expected and unexpected) that public spaces are exposed to, further exacerbated by the pandemic crisis, urban security management increasingly conflicts with the right to social interaction in space. To avoid creating overly controlled spaces that are unsuitable for generating sociality and spontaneous interactions, and which often reproduce discriminatory social dynamics, while at the same time ensuring users’ awareness of being in a safe environment, it is necessary for all three dimensions of public space security—policy, design, and governance—to converge. This study focuses on governance, exploring how security management shapes public life and how it can align with planning that supports vibrant, spontaneous interaction. Using a multi-method qualitative approach, including a critical literature review, EU policy analysis, and empirical research from the Horizon Europe SAFE CITIES project, the study introduces two tools: the Security and Vulnerability Assessment (SVA) framework and the Atlas for Safe Public Spaces Design. These were tested in pilot sites, including the Gorizia-Nova Gorica cross-border square. Results support a governance model integrating “security by design,” which aligns with Foucault’s view of governance as adaptable to uncertainty and flow. This mixed-method approach allowed for a comprehensive examination of the governance dynamics shaping urban security, ensuring that the study’s conclusions are grounded in theoretical insights and practical implementation, though necessarily limited in generalizability. By framing security as a process of negotiated governance rather than a set of technical constraints, the study offers a conceptual contribution to urban security discourse and practical guidance for planning secure, inclusive public spaces. Full article
Show Figures

Figure 1

22 pages, 9695 KB  
Article
DAENet: A Deep Attention-Enhanced Network for Cropland Extraction in Complex Terrain from High-Resolution Satellite Imagery
by Yushen Wang, Mingchao Yang, Tianxiang Zhang, Shasha Hu and Qingwei Zhuang
Agriculture 2025, 15(12), 1318; https://doi.org/10.3390/agriculture15121318 - 19 Jun 2025
Viewed by 492
Abstract
Prompt and precise cropland mapping is indispensable for safeguarding food security, enhancing land resource utilization, and advancing sustainable agricultural practices. Conventional approaches faced difficulties in complex terrain marked by fragmented plots, pronounced elevation differences, and non-uniform field borders. To address these challenges, we [...] Read more.
Prompt and precise cropland mapping is indispensable for safeguarding food security, enhancing land resource utilization, and advancing sustainable agricultural practices. Conventional approaches faced difficulties in complex terrain marked by fragmented plots, pronounced elevation differences, and non-uniform field borders. To address these challenges, we propose DAENet, a novel deep learning framework designed for accurate cropland extraction from high-resolution GaoFen-1 (GF-1) satellite imagery. DAENet employs a novel Geometric-Optimized and Boundary-Restrained (GOBR) Block, which combines channel attention, multi-scale spatial attention, and boundary supervision mechanisms to effectively mitigate challenges arising from disjointed cropland parcels, topography-cast shadows, and indistinct edges. We conducted comparative experiments using 8 mainstream semantic segmentation models. The results demonstrate that DAENet achieves superior performance, with an Intersection over Union (IoU) of 0.9636, representing a 4% improvement over the best-performing baseline, and an F1-score of 0.9811, marking a 2% increase. Ablation analysis further validated the indispensable contribution of GOBR modules in improving segmentation precision. Using our approach, we successfully extracted 25,556.98 hectares of cropland within the study area, encompassing a total of 67,850 individual blocks. Additionally, the proposed method exhibits robust generalization across varying spatial resolutions, underscoring its effectiveness as a high-accuracy solution for agricultural monitoring and sustainable land management in complex terrain. Full article
(This article belongs to the Section Artificial Intelligence and Digital Agriculture)
Show Figures

Figure 1

18 pages, 282 KB  
Concept Paper
B/Ordering Emotions: Fear, Insecurity and Hope
by Raffaela Puggioni and Maria Julia Trombetta
Societies 2025, 15(6), 168; https://doi.org/10.3390/soc15060168 - 18 Jun 2025
Viewed by 695
Abstract
By focussing on the emotional and affective dimensions of borders, this article suggests integrating the negative emotions that the European Union (EU) states’ border politics aim to instil—including fear, anxiety and trauma—with the positive emotions that the dream of a life in Europe [...] Read more.
By focussing on the emotional and affective dimensions of borders, this article suggests integrating the negative emotions that the European Union (EU) states’ border politics aim to instil—including fear, anxiety and trauma—with the positive emotions that the dream of a life in Europe encourages. Drawing upon the psychological and philosophical approaches to hope, this article highlights the centrality of hope in shaping agency, stimulating alternative visions, and overcoming difficulties. What is the impact of hope and daydreams in shaping migrants’ decision to engage with risky journeys? To what extent might the dream of Europe counterbalance the EU’s securitarian technologies? This article introduces and explores the processes of b/ordering and the role that emotions, as spatially grounded, play in it. This article will ultimately contend that, once confronted with the uncertainties of long and risky journeys and the prospect of a bright and dreamed future, the latter often prevails. Under this scenario, states’ deterrent systems might not be as effective as hoped, as the dream of Europe overrides the fear and anxiety that EU states’ border security aims to generate. Full article
(This article belongs to the Special Issue Borders, (Im)mobility and the Everyday)
34 pages, 950 KB  
Review
An Overview of Critical Success Factors for Digital Shipping Corridors: A Roadmap for Maritime Logistics Modernization
by Seyedeh Azadeh Alavi-Borazjani, Alberto Antonio Bengue, Valentina Chkoniya and Muhammad Noman Shafique
Sustainability 2025, 17(12), 5537; https://doi.org/10.3390/su17125537 - 16 Jun 2025
Viewed by 2954
Abstract
Digital Shipping Corridors (DSCs) are gaining traction as integrated models for increasing transparency, efficiency, and sustainability in maritime logistics. Yet, the enabling conditions for their effective implementation remain insufficiently explored. This study employs a qualitative thematic review approach, analyzing the academic literature, global [...] Read more.
Digital Shipping Corridors (DSCs) are gaining traction as integrated models for increasing transparency, efficiency, and sustainability in maritime logistics. Yet, the enabling conditions for their effective implementation remain insufficiently explored. This study employs a qualitative thematic review approach, analyzing the academic literature, global policy documents, and selected case studies to identify and synthesize the critical success factors for DSC development. The analysis reveals seven interdependent factors: technological infrastructure, economic feasibility, regulatory frameworks, logistical efficiency, logistical security, stakeholder collaboration, and environmental sustainability. These factors are not independent but interact dynamically, requiring coordinated development across technical, institutional, and environmental domains. This study proposes a dynamic interaction framework that illustrates how progress in one area (e.g., digital infrastructure) depends on readiness in others (e.g., governance and cross-sector collaboration). The outcomes contribute both conceptually and practically. The framework offers a system-level understanding of DSC implementation and identifies key leverage points for intervention. The findings provide strategic guidance for policymakers, port authorities, and supply chain stakeholders pursuing digitally enabled sustainable maritime corridors. This study also highlights areas for future empirical validation, particularly in relation to governance integration and cross-border alignment. Full article
Show Figures

Figure 1

25 pages, 1083 KB  
Article
STALE: A Scalable and Secure Trans-Border Authentication Scheme Leveraging Email and ECDH Key Exchange
by Jiexin Zheng, Mudi Xu, Jianqing Li, Benfeng Chen, Zhizhong Tan, Anyu Wang, Shuo Zhang, Yan Liu, Kevin Qi Zhang, Lirong Zheng and Wenyong Wang
Electronics 2025, 14(12), 2399; https://doi.org/10.3390/electronics14122399 - 12 Jun 2025
Viewed by 520
Abstract
In trans-border data (data transferred or accessed across national jurisdictions) exchange scenarios, identity authentication mechanisms serve as critical components for ensuring data security and privacy protection, with their effectiveness directly impacting the compliance and reliability of transnational operations. However, existing identity authentication systems [...] Read more.
In trans-border data (data transferred or accessed across national jurisdictions) exchange scenarios, identity authentication mechanisms serve as critical components for ensuring data security and privacy protection, with their effectiveness directly impacting the compliance and reliability of transnational operations. However, existing identity authentication systems face multiple challenges in trans-border contexts. Firstly, the transnational transfer of identity data struggles to meet the varying data-compliance requirements across different jurisdictions. Secondly, centralized authentication architectures exhibit vulnerabilities in trust chains, where single points of failure may lead to systemic risks. Thirdly, the inefficiency of certificate verification in traditional Public Key Infrastructure (PKI) systems fails to meet the real-time response demands of globalized business operations. These limitations severely constrain real-time identity verification in international business scenarios. To address these issues, this study proposes a trans-border distributed certificate-free identity authentication framework (STALE). The methodology adopts three key innovations. Firstly, it utilizes email addresses as unique user identifiers combined with a Certificateless Public Key Cryptography (CL-PKC) system for key distribution, eliminating both single-point dependency on traditional Certificate Authorities (CAs) and the key escrow issues inherent in Identity-Based Cryptography (IBC). Secondly, an enhanced Elliptic Curve Diffie–Hellman (ECDH) key-exchange protocol is introduced, employing forward-secure session key negotiation to significantly improve communication security in trans-border network environments. Finally, a distributed identity ledger is implemented, using the FISCO BCOS blockchain, enabling decentralized storage and verification of identity information while ensuring data immutability, full traceability, and General Data Protection Regulation (GDPR) compliance. Our experimental results demonstrate that the proposed method exhibits significant advantages in authentication efficiency, communication overhead, and computational cost compared to existing solutions. Full article
Show Figures

Figure 1

16 pages, 1092 KB  
Article
Trends and Determinants of Virtual Water Trade and Water Resource Utilization in Ghanaian Vegetable Production
by Emmanuel Adutwum Ampong, Alexander Sessi Kosi Tette and Kyung-Sook Choi
Water 2025, 17(11), 1689; https://doi.org/10.3390/w17111689 - 3 Jun 2025
Viewed by 799
Abstract
Water plays a critical role in ensuring sustainable food security, particularly in the face of increasing freshwater scarcity and climate variability. This study examines virtual water use and virtual water trade in Ghana’s vegetable production sector over a 30-year period (1994–2023), focusing on [...] Read more.
Water plays a critical role in ensuring sustainable food security, particularly in the face of increasing freshwater scarcity and climate variability. This study examines virtual water use and virtual water trade in Ghana’s vegetable production sector over a 30-year period (1994–2023), focusing on four key crops: tomato, pepper, onion, and eggplant. Using secondary data on production volumes, trade flows, and virtual water content, the research quantifies imported and exported virtual water volumes and assesses net virtual water trends. The results reveal a substantial increase in virtual water use for most crops, with the exception of pepper, which experienced a marked decline. Onion and tomato are identified as the dominant contributors to both imports and exports of virtual water, while pepper and eggplant play relatively minor roles. The study finds that Ghana is a net importer of virtual water in vegetable trade, emphasizing the need for integrated water resource management to balance agricultural growth with water sustainability. A gravity model analysis was applied to identify the primary determinants of virtual water trade, revealing that GDP per capita, population size, distance, land availability, virtual water use, and border-sharing significantly influence trade patterns. The findings suggest that enhancing domestic production capacity and promoting efficient water use practices can reduce Ghana’s reliance on imports and improve resilience against water-related risks. This research provides valuable insights for policymakers, researchers, and practitioners aiming to develop sustainable water and food systems in Ghana and similar contexts. Full article
(This article belongs to the Section Water Use and Scarcity)
Show Figures

Figure 1

26 pages, 7235 KB  
Article
Ecological Network Construction and Optimization in the Southwest Alpine Canyon Area of China Based on Habitat Quality Assessment
by Xiran Chen, Jiayue Xiong, Yinghui Guan and Jinxing Zhou
Remote Sens. 2025, 17(11), 1913; https://doi.org/10.3390/rs17111913 - 31 May 2025
Viewed by 647
Abstract
The Southwest Alpine Canyon Area (SACA) is a typical ecologically sensitive location in China; therefore, constructing and optimizing an ecological network for this area is essential to ensure the regional ecological security of its fragile ecosystems. This study employed the InVEST model to [...] Read more.
The Southwest Alpine Canyon Area (SACA) is a typical ecologically sensitive location in China; therefore, constructing and optimizing an ecological network for this area is essential to ensure the regional ecological security of its fragile ecosystems. This study employed the InVEST model to quantitatively assess the habitat quality of the SACA for the years 2000, 2010, and 2020. The ecological sources were determined based on the results of a habitat quality assessment and a Morphological Spatial Pattern Analysis (MSPA). Finally, ecological corridors, ecological pinch points, and ecological barrier points were identified using circuit theory. The results indicated that the SACA’s habitat quality was relatively good, but experienced slight degradation from 0.87 in 2000 to 0.84 in 2020. Anthropogenic activities have been identified as the primary contributor to habitat quality decline in the region. Geographically, the habitat quality is significantly poorer in the southeast and northwest of the SACA. A total of 319 ecological sources were identified, predominantly located in the southwest and northeast of the SACA, comprising 43.27% of the total area. Furthermore, 94 ecological corridors were delineated, covering an area of 74,015.61 km2 and extending over 182.80 km in length in total. A total of 38 ecological pinch points and 39 ecological barrier points were distinguished, with a noticeable concentration in regions undergoing ecological degradation. Overall, while the ecological network structure in the SACA is complex and highly interconnected, it faces challenges relating to material cycling and ecological network circulation. Future ecological restoration and protection efforts should focus on areas along the border between the ecological maintenance area in southeastern Tibet (Region I) and the water conservation area in eastern Tibet–western Sichuan (Region II). Additionally, the establishment of ecological protection belts around potential ecological corridors is proposed to enhance ecosystem connectivity. These findings could provide a robust scientific foundation for territorial spatial planning, ecological preservation, and restoration in the SACA. Full article
Show Figures

Figure 1

19 pages, 2491 KB  
Article
A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data
by Abdulrahman Hussian, Foud Murshed, Mohammed Nasser Alandoli and Ghalib Aljafari
Computers 2025, 14(5), 178; https://doi.org/10.3390/computers14050178 - 6 May 2025
Viewed by 1422
Abstract
Despite significant advancements in fingerprint-based authentication, existing models still suffer from challenges such as high false acceptance and rejection rates, computational inefficiency, and vulnerability to spoofing attacks. Addressing these limitations is crucial for ensuring reliable biometric security in real-world applications, including law enforcement, [...] Read more.
Despite significant advancements in fingerprint-based authentication, existing models still suffer from challenges such as high false acceptance and rejection rates, computational inefficiency, and vulnerability to spoofing attacks. Addressing these limitations is crucial for ensuring reliable biometric security in real-world applications, including law enforcement, financial transactions, and border security. This study proposes a hybrid deep learning approach that integrates Convolutional Neural Networks (CNNs) with Long Short-Term Memory (LSTM) networks to enhance fingerprint authentication accuracy and robustness. The CNN component efficiently extracts intricate fingerprint patterns, while the LSTM module captures sequential dependencies to refine feature representation. The proposed model achieves a classification accuracy of 99.42%, reducing the false acceptance rate (FAR) to 0.31% and the false rejection rate (FRR) to 0.27%, demonstrating a 12% improvement over traditional CNN-based models. Additionally, the optimized architecture reduces computational overheads, ensuring faster processing suitable for real-time authentication systems. These findings highlight the superiority of hybrid deep learning techniques in biometric security by providing a quantifiable enhancement in both accuracy and efficiency. This research contributes to the advancement of secure, adaptive, and high-performance fingerprint authentication systems, bridging the gap between theoretical advancements and real-world applications. Full article
(This article belongs to the Special Issue Using New Technologies in Cyber Security Solutions (2nd Edition))
Show Figures

Graphical abstract

Back to TopTop