Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (175)

Search Parameters:
Keywords = website security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 1318 KB  
Article
Quantifying Website Privacy Posture Through Technical and Policy-Based Assessment
by Ioannis Fragkiadakis, Stefanos Gritzalis and Costas Lambrinoudakis
Future Internet 2025, 17(10), 463; https://doi.org/10.3390/fi17100463 - 9 Oct 2025
Abstract
With the rapid growth of digital interactions, safeguarding user privacy on websites has become a critical concern. This paper introduces a comprehensive framework that integrates both technical and policy-based factors to assess a website’s level of privacy protection. The framework employs a scoring [...] Read more.
With the rapid growth of digital interactions, safeguarding user privacy on websites has become a critical concern. This paper introduces a comprehensive framework that integrates both technical and policy-based factors to assess a website’s level of privacy protection. The framework employs a scoring system that evaluates key technical elements, such as HTTP security headers, email authentication protocols (SPF, DKIM, DMARC), SSL/TLS certificate usage, domain reputation, DNSSEC, and cookie practices. In parallel, it examines the clarity and GDPR compliance of privacy policies. The resulting score reflects not only the technical strength of a website’s defenses but also the transparency with which data processing practices are communicated to users. To demonstrate its effectiveness, the framework was applied to two similarly sized private hospitals, generating comparative privacy scores under a unified metric. The results confirm the framework’s value in producing measurable insights that enable cross-organizational privacy benchmarking. By combining policy evaluation with technical analysis, this work addresses a significant gap in existing research and offers a reproducible, extensible methodology for assessing website privacy posture from a visitor’s perspective. Full article
Show Figures

Figure 1

28 pages, 1164 KB  
Review
Invisible Pursuit: A Scoping Review of Global Policy for Continuity of Care of Vulnerable Infants Under 6 Months and Their Mothers in Low- and Middle-Income Countries
by Marie McGrath, Hedwig Deconinck, Stephanie V. Wrottesley, Marko Kerac and Tracey Smythe
Children 2025, 12(10), 1328; https://doi.org/10.3390/children12101328 - 2 Oct 2025
Viewed by 223
Abstract
Background/Objectives: Worldwide, millions of infants under 6 months are at increased risk of poor growth and development, illness, and death. We investigated the coherence of global policy characteristics, vulnerability, and continuity of care, which guides the care of vulnerable infants under 6 months [...] Read more.
Background/Objectives: Worldwide, millions of infants under 6 months are at increased risk of poor growth and development, illness, and death. We investigated the coherence of global policy characteristics, vulnerability, and continuity of care, which guides the care of vulnerable infants under 6 months and their mothers. Methods: We conducted a scoping review according to PRISMA-ScR guidance. We included English publications with no time limit, applicable to low- and middle-income countries, sourced through Google Scholar, contacts, WHO and UNICEF databases, global networks, and agency websites. The search was conducted from August 2023 to February 2024. We identified 34 documents for review. We categorised policies into guidelines, namely, WHO evidence-based recommendations and multi-source guidance documents with implementation details. We consolidated 49 vulnerability descriptors into 28 vulnerability factors and four sub-groups. We did not assess policy quality. Results: We found rich but fragmented global policy guidance. Multiple terminologies create superficial differences and mask important ones. Growth appraisal was mostly limited to nutrition-oriented guidance and was lacking in health-centric documents. Continuity of care lacked scope and depth. WHO policies are out of sync with each other and the latest evidence on mortality risk markers. WHO procedures need to accommodate non-UN documents to leverage existing guidance potential. A living policy system to manage evidence-to-policy processes and policy interactions is needed. The WHO-INTEGRATE evidence for decision frameworks could help country-led adaptations, system-sensitive global support, and WHO methodological development. Conclusions: There are immediate opportunities for interdisciplinary policy cooperation. Action is urgently needed to secure coherent evidence-based policies for equitable and effective care. Full article
(This article belongs to the Section Global Pediatric Health)
Show Figures

Figure 1

65 pages, 2973 KB  
Systematic Review
Machine Learning and Neural Networks for Phishing Detection: A Systematic Review (2017–2024)
by Jacek Lukasz Wilk-Jakubowski, Lukasz Pawlik, Grzegorz Wilk-Jakubowski and Aleksandra Sikora
Electronics 2025, 14(18), 3744; https://doi.org/10.3390/electronics14183744 - 22 Sep 2025
Viewed by 980
Abstract
Phishing remains a persistent and evolving cyber threat, constantly adapting its tactics to bypass traditional security measures. The advent of Machine Learning (ML) and Neural Networks (NN) has significantly enhanced the capabilities of automated phishing detection systems. This comprehensive review systematically examines the [...] Read more.
Phishing remains a persistent and evolving cyber threat, constantly adapting its tactics to bypass traditional security measures. The advent of Machine Learning (ML) and Neural Networks (NN) has significantly enhanced the capabilities of automated phishing detection systems. This comprehensive review systematically examines the landscape of ML- and NN-based approaches for identifying and mitigating phishing attacks. Our analysis, based on a rigorous search methodology, focuses on articles published between 2017 and 2024 across relevant subject areas in computer science and mathematics. We categorize existing research by phishing delivery channels, including websites, electronic mail, social networking, and malware. Furthermore, we delve into the specific machine learning models and techniques employed, such as various algorithms, classification and ensemble methods, neural network architectures (including deep learning), and feature engineering strategies. This review provides insights into the prevailing research trends, identifies key challenges, and highlights promising future directions in the application of machine learning and neural networks for robust phishing detection. Full article
Show Figures

Figure 1

15 pages, 4502 KB  
Article
A Comprehensive QR Code Protection and Recovery System Using Secure Encryption, Chromatic Multiplexing, and Wavelength-Based Decoding
by Paola Noemi San Agustin-Crescencio, Leobardo Hernandez-Gonzalez, Pedro Guevara-Lopez, Oswaldo Ulises Juarez-Sandoval, Jazmin Ramirez-Hernandez and Eduardo Salvador Estevez-Encarnacion
Appl. Sci. 2025, 15(17), 9708; https://doi.org/10.3390/app15179708 - 3 Sep 2025
Viewed by 683
Abstract
QR codes (Quick Response) were originally developed by the automotive industry to enable rapid data exchange and have since evolved into versatile tools for commercial applications, such as linking to products or websites. However, the scope of their adoption has expanded into sensitive [...] Read more.
QR codes (Quick Response) were originally developed by the automotive industry to enable rapid data exchange and have since evolved into versatile tools for commercial applications, such as linking to products or websites. However, the scope of their adoption has expanded into sensitive domains including financial, corporate, and governmental sectors. In order to address increasing security concerns, this work proposes a novel three-layer protection scheme. First, data confidentiality is ensured through encryption—in this study, symmetric AES (Advanced Encryption Standard) encryption is used as an example, though any encryption algorithm can be employed. Second, a multiplexing technique is employed to integrate two independent dichromatic QR codes into a single printed chromatic structure. Third, the recovery of each dichromatic code is achieved through the controlled incidence of specific wavelengths, not only providing improved channel separation but also functioning as a physical access control mechanism. This physical layer restricts unauthorized reading. Full article
Show Figures

Figure 1

23 pages, 994 KB  
Article
Driving Consumer Engagement Through AI Chatbot Experience: The Mediating Role of Satisfaction Across Generational Cohorts and Gender in Travel Tourism
by José Magano, Joana A. Quintela and Neelotpaul Banerjee
Sustainability 2025, 17(17), 7673; https://doi.org/10.3390/su17177673 - 26 Aug 2025
Viewed by 1440
Abstract
This study explores how AI chatbot experiences on travel websites influence consumer engagement, with satisfaction from using AI chatbots as a mediating factor. Grounded in the Stimulus-Organism-Response (S-O-R) framework, the research shifts the focus from utilitarian models to examine how chatbot attributes—e.g., ease [...] Read more.
This study explores how AI chatbot experiences on travel websites influence consumer engagement, with satisfaction from using AI chatbots as a mediating factor. Grounded in the Stimulus-Organism-Response (S-O-R) framework, the research shifts the focus from utilitarian models to examine how chatbot attributes—e.g., ease of use, information quality, security, anthropomorphism, and omnipresence—affect satisfaction of using AI chatbots and subsequent consumer engagement behaviours. Survey data from 519 Portuguese travellers were analysed using partial least squares structural equation modelling (PLS-SEM). The study contributes to theory by (1) demonstrating S-O-R’s advantages over utilitarian models in capturing relational and emotional dimensions of AI interactions, (2) identifying satisfaction with using AI chatbots as a pivotal mediator between AI chatbot experience and consumer engagement, and (3) revealing generational disparities in drivers of engagement. Notably, satisfaction strongly influences engagement for Generation X, while direct experience matters more for Generation Z. Millennials exhibit a distinct preference for hybrid human–AI service handoffs. The practical implications include prioritizing natural language processing for ease of use, implementing generational customization (e.g., gamification for Gen Z, reliability assurances for Gen X), and ensuring seamless human escalation for Millennials. These insights equip travel businesses to design AI chatbots that foster long-term loyalty and competitive differentiation. Full article
Show Figures

Figure 1

30 pages, 388 KB  
Article
Do Security and Privacy Attitudes and Concerns Affect Travellers’ Willingness to Use Mobility-as-a-Service (MaaS) Systems?
by Maria Sophia Heering, Haiyue Yuan and Shujun Li
Information 2025, 16(8), 694; https://doi.org/10.3390/info16080694 - 15 Aug 2025
Viewed by 557
Abstract
Mobility-as-a-Service (MaaS) represents a transformative shift in transportation, enabling users to plan, book, and pay for diverse mobility services via a unified digital platform. While previous research has explored factors influencing MaaS adoption, few studies have addressed users’ perspectives, particularly concerning data privacy [...] Read more.
Mobility-as-a-Service (MaaS) represents a transformative shift in transportation, enabling users to plan, book, and pay for diverse mobility services via a unified digital platform. While previous research has explored factors influencing MaaS adoption, few studies have addressed users’ perspectives, particularly concerning data privacy and cyber security. To address this gap, we conducted an online survey with 320 UK-based participants recruited via Prolific. This study examined psychological, demographic, and perceptual factors influencing individuals’ willingness to adopt MaaS, focusing on cyber security and privacy attitudes, as well as perceived benefits and costs. The results of a hierarchical linear regression model revealed that trust in how commercial websites manage personal data positively influenced willingness to use MaaS, highlighting the indirect role of privacy and security concerns. However, when additional predictors were included, this effect diminished, and perceptions of benefits and costs emerged as the primary drivers of MaaS adoption, with the model explaining 54.5% of variance. These findings suggest that privacy concerns are outweighed by users’ cost–benefit evaluations. The minimal role of trust and security concerns underscores the need for MaaS providers to proactively promote cyber security awareness, build user trust, and collaborate with researchers and policymakers to ensure ethical and secure MaaS deployment. Full article
Show Figures

Figure 1

16 pages, 1212 KB  
Article
“Encyclopaedia Cloacae”—Mapping Wastewaters from Pathogen A to Z
by Aurora Hirvonen, Sara Comero, Simona Tavazzi, Giulio Mariani, Caterina Cacciatori, Roberta Maffettone, Francesco Pierannunzi, Giulia Panzarella, Luis Bausa-Lopez, Sorin Sion, Tanja Casado Poblador, Natalia Głowacka, Davey L. Jones, Mauro Petrillo, Antonio Marchini, Maddalena Querci, Bernd Manfred Gawlik and on behalf of the Encyclopaedia Cloacae Collaborators
Microorganisms 2025, 13(8), 1900; https://doi.org/10.3390/microorganisms13081900 - 15 Aug 2025
Viewed by 1020
Abstract
The Encyclopaedia Cloacae is a novel and centralised digital platform designed to support and advance wastewater-based epidemiology (WBE) by cataloguing pathogens detectable in wastewater and their relevance to public health surveillance. The platform is hosted on the EU Wastewater Observatory for Public Health [...] Read more.
The Encyclopaedia Cloacae is a novel and centralised digital platform designed to support and advance wastewater-based epidemiology (WBE) by cataloguing pathogens detectable in wastewater and their relevance to public health surveillance. The platform is hosted on the EU Wastewater Observatory for Public Health (EU4S) website, where it is populated with peer-reviewed research through a structured workflow under harmonised criteria which address the presence of pathogens in human excreta, detectability in wastewater, and integration into public health systems. This tri-criteria approach ensures that the database is both scientifically robust and operationally actionable. Complemented by the Visualising the Invisible dashboard, the platform offers geospatial insights into global WBE research activity. By consolidating peer-reviewed evidence on pathogen detectability in wastewater and human excreta, the Encyclopaedia Cloacae enables early detection of infectious diseases, whether already known or newly emerging. The continuously updated repository and geospatial dashboards help to identify surveillance gaps and research hotspots, to support timely public health responses, enhance pandemic preparedness, and strengthen global health security. In addition, it supports One Health strategies, connecting the health of humans, animals, and the shared environment. This article outlines the platform’s architecture, data curation methodology, and future directions, including automation and expansion to encompass broader health determinants such as antimicrobial resistance and chemical hazards. Full article
(This article belongs to the Special Issue Surveillance of SARS-CoV-2 Employing Wastewater)
Show Figures

Figure 1

19 pages, 1339 KB  
Article
Convolutional Graph Network-Based Feature Extraction to Detect Phishing Attacks
by Saif Safaa Shakir, Leyli Mohammad Khanli and Hojjat Emami
Future Internet 2025, 17(8), 331; https://doi.org/10.3390/fi17080331 - 25 Jul 2025
Viewed by 886
Abstract
Phishing attacks pose significant risks to security, drawing considerable attention from both security professionals and customers. Despite extensive research, the current phishing website detection mechanisms often fail to efficiently diagnose unknown attacks due to their poor performances in the feature selection stage. Many [...] Read more.
Phishing attacks pose significant risks to security, drawing considerable attention from both security professionals and customers. Despite extensive research, the current phishing website detection mechanisms often fail to efficiently diagnose unknown attacks due to their poor performances in the feature selection stage. Many techniques suffer from overfitting when working with huge datasets. To address this issue, we propose a feature selection strategy based on a convolutional graph network, which utilizes a dataset containing both labels and features, along with hyperparameters for a Support Vector Machine (SVM) and a graph neural network (GNN). Our technique consists of three main stages: (1) preprocessing the data by dividing them into testing and training sets, (2) constructing a graph from pairwise feature distances using the Manhattan distance and adding self-loops to nodes, and (3) implementing a GraphSAGE model with node embeddings and training the GNN by updating the node embeddings through message passing from neighbors, calculating the hinge loss, applying the softmax function, and updating weights via backpropagation. Additionally, we compute the neighborhood random walk (NRW) distance using a random walk with restart to create an adjacency matrix that captures the node relationships. The node features are ranked based on gradient significance to select the top k features, and the SVM is trained using the selected features, with the hyperparameters tuned through cross-validation. We evaluated our model on a test set, calculating the performance metrics and validating the effectiveness of the PhishGNN dataset. Our model achieved a precision of 90.78%, an F1-score of 93.79%, a recall of 97%, and an accuracy of 93.53%, outperforming the existing techniques. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Graphical abstract

17 pages, 2475 KB  
Article
Testicular Tumors and Environmental Pollution: A Comparative Oncoepidemiology Study in the Campania Region from 2020 to 2023
by Evaristo Di Napoli, Davide De Biase, Barbara degli Uberti, Maria Dimatteo, Loredana Baldi, Stefania Cavallo, Guido Rosato, Daniela Izzillo, Giuseppe Piegari, Valeria Russo, Sabrina Rossetti, Francesca Bruzzese, Chiara Palmieri, Alfredo Budillon and Orlando Paciello
Vet. Sci. 2025, 12(8), 695; https://doi.org/10.3390/vetsci12080695 - 24 Jul 2025
Viewed by 1039
Abstract
A comparative analysis of testicular tumors in dogs and humans highlights notable similarities in cancer behavior, particularly regarding environmental influences. The ubiquitous distribution of endocrine disruptors in industrialized countries and their effects are strongly linked to the development of testicular cancers. This study [...] Read more.
A comparative analysis of testicular tumors in dogs and humans highlights notable similarities in cancer behavior, particularly regarding environmental influences. The ubiquitous distribution of endocrine disruptors in industrialized countries and their effects are strongly linked to the development of testicular cancers. This study examined 221 and 174 cases of testicular tumor in dogs and humans, respectively, from the Campania Animal Cancer Registry and the database of the National Cancer Institute “Fondazione G. Pascale-IRCCS”, between 2020 and 2023. These data were integrated with environmental data from the Ministry of Environment and Energy Security website and the Campania Regional Agency for Environmental Protection (ARPAC). The areas with the highest frequency of testicular tumors in both species were the municipalities of Napoli, Salerno, and Caserta, and their corresponding provinces. The same locations experienced severe contamination of soil and water by environmental pollutants, probably correlated to testicular tumors. Although the molecular mechanisms are not yet fully understood, our data suggest a strong link between the frequency of testicular tumors in humans and dogs and high concentrations of environmental pollutants in the reported locations. These findings emphasize the value of dogs as a potential animal model for studying human health and the effect of environmental factors on cancer development. Full article
Show Figures

Figure 1

16 pages, 1765 KB  
Article
Māori Before English: Religious Education in Aotearoa NZ Ko tōku reo tōku ohooho, ko tōku reo tōku māpihi maurea—My Language Is My Awakening, My Language Is the Window to My Soul
by Margaret Carswell, Colin MacLeod and Laurel Lanner
Religions 2025, 16(8), 947; https://doi.org/10.3390/rel16080947 - 22 Jul 2025
Viewed by 516
Abstract
In 2021, the National Centre for Religious Studies in New Zealand published the new religious education curriculum for Catholic schools in Aotearoa New Zealand. While in many ways, very like other religious education curricula, from its naming in Māori before English, Tō Tātou [...] Read more.
In 2021, the National Centre for Religious Studies in New Zealand published the new religious education curriculum for Catholic schools in Aotearoa New Zealand. While in many ways, very like other religious education curricula, from its naming in Māori before English, Tō Tātou Whakapono Our Faith shines a light on the role of culture and language in the transmission and expression of faith. This paper is written in two parts. Part 1 of this paper provides an examination of the key curriculum documents and website to find that Tō Tātou Whakapono Our Faith is unique in three ways. First, it enjoys a level of security in the dominant presence of Catholics in the Catholic school, guaranteed by the Integration Act of 1975. Second, it offers flexibility in approach, necessary for a curriculum with national status, and finally, it demonstrates an extraordinary commitment to the inclusion of Māori culture and language. Part 2 of this paper takes up the inclusion of Māori culture and language to offer a response to the call that Māori need to be allowed to develop a theology from within their own culture and language. It proposes that the introduction of a new hermeneutical lens in the study of scripture, one that would replicate the practice of the Bible authors who drew freely on their own experience and language to speak of God, could provide a simple but effective way of developing such a theology. It is in Part 2 that the significance of the subtitle of this paper will become apparent. Full article
Show Figures

Figure 1

24 pages, 354 KB  
Systematic Review
Tracking HIV Outcomes Among Key Populations in the Routine Health Information Management System: A Systematic Review
by Mashudu Rampilo, Edith Phalane and Refilwe Nancy Phaswana-Mafuya
Sexes 2025, 6(3), 32; https://doi.org/10.3390/sexes6030032 - 25 Jun 2025
Viewed by 1918
Abstract
Despite having the world’s largest HIV burden, South Africa has yet to attain the 95-95-95 targets. Accurate, complete, and timely data are critical for monitoring a country’s HIV progress. The integration of unique identifier codes (UICs) for key populations (KPs) into routine health [...] Read more.
Despite having the world’s largest HIV burden, South Africa has yet to attain the 95-95-95 targets. Accurate, complete, and timely data are critical for monitoring a country’s HIV progress. The integration of unique identifier codes (UICs) for key populations (KPs) into routine health information management systems (RHIMS) strengthens data accuracy and completeness, facilitating more targeted HIV interventions and greater accountability. This systematic review assessed how Sub-Saharan African (SSA) countries have integrated KPs’ UICs into RHIMS, highlighting key enablers, challenges, and opportunities. A comprehensive search was conducted across PubMed, Scopus, Google Scholar, MEDLINE, PLOS ONE, and various government and non-government websites to identify the published and grey literature relevant to the study objective from June 2013 to December 2024. References were managed using Zotero version 6.0.36. Two authors independently screened studies using Covidence software. The review was done in accordance with the “Preferred Reporting Items for Systematic Reviews and Meta-Analyses” (PRISMA) guidelines and was registered with the “International Prospective Register of PROSPERO) Systematic Reviews” with the registration number CRD42023440656. Out of 1735 studies screened, 361 duplicates were removed. The review found that only nine of the fifty-three SSA countries have incorporated UICs for KPs into their RHIMS through alphanumeric codes. They include Burundi, Burkina Faso, Ghana, Mali, Kenya, Uganda, Togo, Malawi, and Liberia. Facilitators for KPs’ UIC adoption included strong data security and political will, whereas barriers encompassed compromised privacy, stigma and discrimination. In South Africa, the UIC for KPs can be integrated into the new electronic medical record (EMR) system. Full article
Show Figures

Figure 1

14 pages, 340 KB  
Article
The Impact of the E-Marketing Mix on Brand Equity in the Jordanian Banking Sector
by Tayseer Mohammad Afaishat, Mahmoud Alghizzawi and Sakher Faisal AlFraihat
Adm. Sci. 2025, 15(6), 232; https://doi.org/10.3390/admsci15060232 - 16 Jun 2025
Cited by 1 | Viewed by 1426
Abstract
This study aimed to identify the impact of the e-marketing mix on brand equity in the Jordanian banking sector. This study used a descriptive analysis approach. The study population consisted of all (13) commercial banks in Jordan listed on the Amman Stock Exchange. [...] Read more.
This study aimed to identify the impact of the e-marketing mix on brand equity in the Jordanian banking sector. This study used a descriptive analysis approach. The study population consisted of all (13) commercial banks in Jordan listed on the Amman Stock Exchange. A random sample of administrative personnel at commercial banks was selected, including administrators and department heads. It was distributed electronically via Google Forms, and 293 questionnaires (79.1%) from the total study sample were retrieved. The SPSS program version 26 was used to examine the collected data. The results showed that there is a statistically significant effect at the level (α ≥ 0.05) of e-marketing on brand equity in the Jordanian banking sector. It was found that there is a positive correlation between e-marketing and the three dimensions of brand equity (brand loyalty, perceived quality, and brand image). Moreover, a positive brand image should be maintained through the consistent delivery of promises, excellent customer service, and a strong online reputation. Cultivating brand loyalty among customers can be achieved through personalized services, exclusive rewards, and tailored promotions. By integrating these strategies into their e-marketing efforts, banks can effectively engage with customers, differentiate themselves from competitors, and build long-term relationships. Full article
Show Figures

Figure 1

36 pages, 5316 KB  
Article
Risk Assessment of Cryptojacking Attacks on Endpoint Systems: Threats to Sustainable Digital Agriculture
by Tetiana Babenko, Kateryna Kolesnikova, Maksym Panchenko, Olga Abramkina, Nikolay Kiktev, Yuliia Meish and Pavel Mazurchuk
Sustainability 2025, 17(12), 5426; https://doi.org/10.3390/su17125426 - 12 Jun 2025
Cited by 1 | Viewed by 2409
Abstract
Digital agriculture has rapidly developed in the last decade in many countries where the share of agricultural production is a significant part of the total volume of gross production. Digital agroecosystems are developed using a variety of IT solutions, software and hardware tools, [...] Read more.
Digital agriculture has rapidly developed in the last decade in many countries where the share of agricultural production is a significant part of the total volume of gross production. Digital agroecosystems are developed using a variety of IT solutions, software and hardware tools, wired and wireless data transmission technologies, open source code, Open API, etc. A special place in agroecosystems is occupied by electronic payment technologies and blockchain technologies, which allow farmers and other agricultural enterprises to conduct commodity and monetary transactions with suppliers, creditors, and buyers of products. Such ecosystems contribute to the sustainable development of agriculture, agricultural engineering, and management of production and financial operations in the agricultural industry and related industries, as well as in other sectors of the economy of a number of countries. The introduction of crypto solutions in the agricultural sector is designed to create integrated platforms aimed at helping farmers manage supply lines or gain access to financial services. At the same time, there are risks of illegal use of computing power for cryptocurrency mining—cryptojacking. This article offers a thorough risk assessment of cryptojacking attacks on endpoint systems, focusing on identifying critical vulnerabilities within IT infrastructures and outlining practical preventive measures. The analysis examines key attack vectors—including compromised websites, infected applications, and supply chain infiltration—and explores how unauthorized cryptocurrency mining degrades system performance and endangers data security. The research methodology combines an evaluation of current cybersecurity trends, a review of specialized literature, and a controlled experiment simulating cryptojacking attacks. The findings highlight the importance of multi-layered protection mechanisms and ongoing system monitoring to detect malicious activities at an early stage. Full article
(This article belongs to the Section Sustainable Agriculture)
Show Figures

Figure 1

16 pages, 2423 KB  
Review
Microelimination of Hepatitis C in Thailand, Phetchabun Model: Progress, Challenges, and Future Directions
by Yong Poovorawan, Sitthichai Kanokudom, Nungruthai Suntronwong, Pornjarim Nilyanimit, Ritthideach Yorsaeng, Wijittra Phaengkha, Napaporn Pimsing and Chatree Jullapetch
J. Clin. Med. 2025, 14(11), 3946; https://doi.org/10.3390/jcm14113946 - 3 Jun 2025
Viewed by 1693
Abstract
Hepatitis C virus (HCV) remains a global health challenge, contributing to chronic liver disease and hepatocellular carcinoma. In Thailand, HCV prevalence has declined from ~2% in the 1990s due to universal blood screening, harm reduction, and expanded treatment. This narrative review draws on [...] Read more.
Hepatitis C virus (HCV) remains a global health challenge, contributing to chronic liver disease and hepatocellular carcinoma. In Thailand, HCV prevalence has declined from ~2% in the 1990s due to universal blood screening, harm reduction, and expanded treatment. This narrative review draws on diverse sources—including PubMed and Scopus databases, international and national health websites, government reports, and local communications—to compile epidemiological data, genotype distribution, and elimination strategies, with a focus on Phetchabun province, Thailand, as a model for achieving the World Health Organization’s (WHO) hepatitis C elimination targets. National surveys in 2004, 2014, and 2024 show a prevalence drop from 2.15% to 0.56%. However, HCV persists among high-risk groups, including people who inject drugs, people living with HIV, patients undergoing maintenance hemodialysis, and prisoners. Thailand’s National Health Security Office has expanded treatment access, including universal screening for those born before 1992. The Phetchabun Model, launched in 2017, employs a decentralized test-to-treat strategy. By April 2024, 88.64% (288,203/324,916) of the target population was screened, and 4.88% were anti-HCV positive. Among those tested, 72.61% were HCV-RNA positive, and 88.17% received direct-acting antivirals (i.e., SOF/VEL), achieving >96% sustained virological response. The Phetchabun Model demonstrates a scalable approach for HCV elimination. Addressing testing costs, improving access, and integrating microelimination strategies into national policy are essential to achieving the WHO’s 2030 goals. Full article
(This article belongs to the Section Epidemiology & Public Health)
Show Figures

Figure 1

23 pages, 1421 KB  
Article
C2C E-Commerce Platform Trust from the Seller’s Perspective Based on Institutional Trust Theory and Cultural Dimension Theory
by Yulu Sun, Zhenhua Wang, Hongxiao Lyu and Qixing Qu
Systems 2025, 13(5), 309; https://doi.org/10.3390/systems13050309 - 23 Apr 2025
Cited by 3 | Viewed by 3774 | Correction
Abstract
With the development of electronic retailing in C2C e-commerce platforms, the issue of trust loss from sellers has worsened. It is urgent for platform operators to learn how to retain quality sellers and improve their trust. Based on institutional trust theory, we combine [...] Read more.
With the development of electronic retailing in C2C e-commerce platforms, the issue of trust loss from sellers has worsened. It is urgent for platform operators to learn how to retain quality sellers and improve their trust. Based on institutional trust theory, we combine formal institutions (structural assurance) and informal institutions (cultural factors), intending to examine the direct effects of masculinity, uncertainty avoidance, and long-term orientation on platform trust, the moderating effects of website quality, institutional guarantee and security systems, and the relationships among cultural factors. A total of 2970 valid responses were collected and analyzed from individual sellers on Taobao, which is one of the most representative C2C e-commerce platforms in China. The results reveal that uncertainty avoidance is negatively associated with platform trust, while masculinity and long-term orientation are positively associated with platform trust. Significant associations are also found among cultural factors. Website quality and institutional guarantee weaken the negative correlation between uncertainty avoidance and platform trust, while the security system strengthens it. Details of theoretical and managerial implications are discussed. Full article
(This article belongs to the Section Systems Practice in Social Science)
Show Figures

Figure 1

Back to TopTop