Articles published on Digital identity
Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
2128 Search results
Sort by Recency
- New
- Research Article
- 10.61336/jiclt/25-01-131
- Dec 7, 2025
- Journal of International Commercial Law and Technology
- Prachi Mishra
India’s citizenship laws have seen massive changes brought forth by The Citizenship Amendment Act (CAA) and National Register of Citizens (NRC). These changes have significantly created a state of uneasiness and unrest among certain sections of the society such as, women, children, elderly and the disabled, exposing them to significant vulnerabilities mainly due to the lack of trust in the manual documentation. The authors aim to highlight the importance of a robust digital infrastructure, thereby advocating the intersection of technology and law, which can prove to be a boon for safeguarding the rights of the vulnerable communities. The paper focuses on addressing the urgent need responsible for the furore and unrest among vulnerable groups created by CAA and NRC. The traditional methods of documentation have resulted in widespread legal uncertainty and marginalization, thus proving to be an inadequate method and leading to an adverse impact on the vulnerable sections with no fault of them. This paper critically examines the highlighted gaps and how they can be bridged using the digital solutions, thereby showcasing a transformative potential of the modern technology and giving a techno-legal angle to the solutions of the issues highlighted. Through this paper the authors aim to foster an inclusive and equitable society by solving the complex legal challenges through technology driven methods.
- New
- Research Article
- 10.62335/aksioma.v2i12.1985
- Dec 4, 2025
- AKSIOMA : Jurnal Sains Ekonomi dan Edukasi
- Zahra Pitaloka Islami
The rapid advancement of digital technology and cyber globalization has accelerated the emergence of a new order of social, economic, and political interactions that increasingly depend on cross-border data flows, thereby giving rise to new configurations of crime that are no longer subject to the physical territorial boundaries of the state. In this context, cybercrime, data theft, attacks on critical infrastructure, misuse of digital identities, as well as various forms of manipulation of information systems challenge the classical paradigm of national law enforcement, which rests on the principles of territoriality, personality, and the protection of state interests that were designed for an analog world. The situation becomes even more complex when offenders, victims, servers, service providers, and the impacts of crime are dispersed across multiple jurisdictions, while national legal instruments, criminal procedure rules, and the institutional capacity of law-enforcement agencies still operate within a framework that assumes that the locus and tempus delicti can be clearly determined within a single sovereign territory. This paper seeks to identify the weaknesses of the national legal system in responding to global cybercrime and to formulate law-enforcement strategies that are adaptive to the characteristics of the digital space, which does not recognize state borders, by analyzing the dimensions of legal substance, institutional structure, and legal culture that shape the way the state responds to these threats. The approach employed is normative juridical, supported by a criminal-policy perspective, by revisiting the principles of jurisdiction, extradition, mutual legal assistance, and due process of law in the context of digital transformation, while at the same time weighing the need for regulatory harmonization, the strengthening of the technical capacity of law-enforcement agencies, and the establishment of agile cross-border cooperation mechanisms that nonetheless respect human rights and the protection of personal data. The results of the discussion show that an effective national law-enforcement strategy in the era of digital globalization cannot stop at merely revising individual criminal provisions, but instead presupposes a comprehensive reconstruction of how the state understands sovereignty in cyberspace, designs procedures for electronic evidence, manages cooperation with global private actors, and integrates the role of society in preventing and reporting cybercrime. This paper then offers a series of normative and practical recommendations that include updating the regulatory framework, strengthening institutions, developing multi-stakeholder digital governance, and improving digital literacy as efforts to build a law-enforcement architecture that is more responsive, adaptive, and just amid the challenges of digital globalization.
- New
- Research Article
- 10.52846/mnmk.23.2.02
- Nov 30, 2025
- Management & Marketing
- Daniela Victoria Popescu + 4 more
In an era of fast-pace technological change, the internet is evolving from Web 1.0 (static, one-way communication) and Web 2.0 (interactive, collaborative platforms) to Web 3.0, characterized by decentralization, artificial intelligence, blockchain, and a focus on authentic values and meaningful connections. Web 3.0 empowers consumers and transforms the internet into a decentralized platform where users control their personal data, intermediaries are replaced by smart contracts and blockchain, but it also introduces challenges such as technological complexity, security risks, regulatory difficulties, and interoperability with Web 2.0. Web 3.0 marketing emphasizes an approach that includes emotional, cultural, and spiritual dimensions, enabling brands to gain a profound and lasting relevance. In this paper we analyse the multifacets of Web 3.0 marketing in the fashion industry, a sector intensely transformed by social, cultural, and technological dynamics. We investigate how marketing principles and Web 3.0 technologies, such as non-fungible tokens (NFTs), the metaverse, and digital identity, are being incorporated into fashion brand strategies, highlighting the benefits and challenges of building authentic relationships with consumers. Fashion brands are embracing emerging technologies to create immersive experiences and loyalty through NFTs, augmented reality, and virtual spaces in the metaverse.
- New
- Research Article
- 10.62383/aksisosial.v2i4.2443
- Nov 27, 2025
- Pemberdayaan Masyarakat : Jurnal Aksi Sosial
- Aldo Yanuarto + 8 more
Digital transformation in public service is an inevitable necessity in the era of modern governance. This study aims to analyze the effectiveness of the implementation of the Smart Civil Registration System (Smart System Dukcapil) in digital administrative services in Palangka Raya City as part of the national e-government initiative and the strengthening of electronic-based governance. The research employs a qualitative descriptive method, collecting data through in-depth interviews, direct observations, and document analysis of relevant regulations and the implementation of the system within the Department of Population and Civil Registration (Disdukcapil) of Palangka Raya City.The findings indicate that the implementation of the Smart System Dukcapil through applications such as the Sistem Informasi Dukcapil Oloh Itah (SI-DOI) and Digital Population Identity (IKD) has significantly improved efficiency, transparency, and data accuracy in population administration services. These digital innovations have streamlined bureaucratic processes, minimized physical interaction, and enhanced public satisfaction with administrative services. However, the system’s effectiveness is still constrained by challenges such as limited internet infrastructure in peripheral areas, low digital literacy among citizens, and inadequate technical capacity among civil servants in operating digital systems optimally. Theoretically, the implementation of the Smart System Dukcapil reflects the realization of good governance and smart governance principles through the integration of technology, bureaucratic reform, and community participation. This study recommends strengthening human resource capacity, expanding digital infrastructure, and promoting continuous public education to ensure system sustainability. Consequently, digital population administration in Palangka Raya has the potential to become an innovative, inclusive, and adaptive model for regional public service governance.
- New
- Research Article
- 10.59188/eduvest.v5i11.52365
- Nov 27, 2025
- Eduvest - Journal of Universal Studies
- Lalang Gumirang + 2 more
The exchange of personal data in Indonesia remains predominantly manual, involving form-filling and photocopying of electronic identity cards (e-KTP), despite the availability of embedded electronic chips designed for automated data processing. This study proposes an integrated data extraction and validation system combining YOLOv8 for precise region detection and Optical Character Recognition (OCR) with advanced preprocessing techniques for textual information extraction. Unlike previous approaches relying solely on OCR (e.g., Vision AI), this method employs YOLOv8 object detection to accurately localize key fields (NIK, Name, Address) before text extraction, followed by validation through the DUKCAPIL API. The system was evaluated using 20 e-KTP images captured under various conditions. Results demonstrate that the proposed approach achieves an average OCR accuracy of 98.7% with an Intersection over Union (IoU) of 0.975, significantly outperforming baseline Vision AI extraction by 15–20%. All extracted data successfully passed validation against the official DUKCAPIL database, confirming 100% authenticity verification. This system provides an economical and efficient solution for automating population data administration, particularly suitable for small non-governmental organizations with limited budgets. The integration of deep learning-based object detection and preprocessed OCR offers a robust framework for digital identity verification systems.
- New
- Research Article
- 10.18421/tem144-04
- Nov 27, 2025
- TEM Journal
- Boumedyen Shannaq
Recent studies regarding the topic of cybersecurity imply that the issue of password poisoning through AI is rapidly growing in severity, and additional systems of authentication that are more intelligent and behavior-aware are required. Multi-factor authentication (MFA) provides better security but is often more inconvenient for users, and existing authentication systems do not extensively leverage behavioral analysis of password creation and use. Although there has been a recent trend toward Passkey deployments instead of passwords, their effectiveness and widespread adoption have not been tested. The given work, in turn, is more realistic and empirically justified through behavioral password profiling, making it practical and reliable. This paper addresses the gap by exploring the hypothesis that clustering-based password profiling can effectively distinguish a legitimate user from a potential attacker. The password clustering model is a centroid-based model that assumes it enhances authentication accuracy by training on the password patterns users use. In the study, a list of passwords from multiple users was used to determine Centroid Password (CP) profiles via machine learning clustering. The proposed model proved more effective at classifying valid passwords and produced fewer false positives than traditional methods. The results confirm that password behavior can be categorized to enhance the authentication and verification of user identities. The research can be used to develop new, behavior-driven security models to improve the protection of digital identities against emerging AI threats.
- New
- Research Article
- 10.11114/smc.v13i4.7949
- Nov 26, 2025
- Studies in Media and Communication
- Kamel Gharbi + 1 more
The objective of this study, "Digital Identity Building and Self-presentation on SMS - Case Study of Content Creators in the Kingdom of Bahrain," is to determine how digital identity is constructed and formed through social media. Additionally, it seeks to investigate the role of social media in shaping digital identity and self-presentation, as well as the tactics employed by content creators to achieve this objective through social media. The semi-structured interview is used as a data collection tool for the research sample, comprising eleven content creators in the Kingdom of Bahrain (n = 11). The study adopted a qualitative approach. The research demonstrated the importance of content creators presenting their authentic selves without the use of fabricated identities to be readily accepted by their community of followers. The people who created the content also agreed that social media is the most effective approach to developing a digital identity. They said that the ideal platform to use depends on the message they want to send and the audience they want to reach. Additionally, digital identity and self-presentation through social media are entirely dependent on spontaneity and honesty. Some of them are attempting to increase their likes and views, even if it means submitting content that contradicts their own beliefs. In the digital ecosystem, identity is established through personal experiences and education. The essential components of this process are spontaneity and respect for the values shared within society.
- New
- Research Article
- 10.64753/jcasc.v10i2.1889
- Nov 25, 2025
- Journal of Cultural Analysis and Social Change
- Edgar L Martínez-Huamán + 3 more
Technology management allows for the development of adequate processes related to the fulfillment of college professors’ fundamental functions. The main aim of this study was to interpret the management of technology for digital identity optimization based on the experience of a group of teachers. The study presents a qualitative approach by using the phenomenological interpretative method. The technique and instruments that were used were the semi-structured interview and a guide for interviews with teachers from the José María Arguedas National University in Perú. The information was organized by reading and analyzing the content; categories emerged and were validated by triangulation. Findings show that most university teachers have difficulties related to the use of technology for the optimization of digital identity because of a lack of training, incorporation to networks, and academic associations, as well as investigations, that limit teachers from building, maintaining, and updating their digital identity in the academic field. Academic programs for the enhancement of skills related to technological programs and devices that give teachers the possibility of storing, organizing, and developing information that supports their knowledge and allow for visibility of their digital identity on the web, are needed. In conclusion, adequate technology management of these aspects will allow for the increase of visibility in teachers’ digital identity.
- New
- Research Article
- 10.3390/microorganisms13122683
- Nov 25, 2025
- Microorganisms
- Pedro Mauricio Moran-Olvera + 9 more
The genus Billgrantia includes species with characteristics relevant to biotechnology. Several of these species can produce polyhydroxyalkanoates (PHAs), biodegradable biopolymers that play a role in adaptation to extreme conditions and have industrial applications. In this study, we describe a new species of the genus Billgrantia isolated from a sodium-saline soil in the community of Los Negritos, Villamar, Michoacán de Ocampo, Mexico. The strain LNSP4103-1T was characterized at the genomic level using digital DNA-DNA hybridization and Average Nucleotide Identity (ANI) approaches. The difference indices between strain LNSP4103-1T and the type strains (<86%) were below the threshold, supporting its classification as a novel species. The LNSP4103-1T strain produced polyhydroxyalkanoates, with a maximum specific polymer yield of YPHA/X 0.71 g PHA g−1 biomass and a yield YPHA/S 0.56 g PHA g−1 glucose under conditions of 12.5% (w/v) NaCl and pH 7.5. Additionally, sucrose, mannitol, lactose and galactose were identified as substrates for PHA production. The draft genome version was deposited in the NCBI under the accession number JBMIQI000000000. The polyphasic analysis identified strain LNSP4103-1T (TDS-413T, CAIM 1962T) as a new species. We proposed its taxonomic assignment as Billgrantia hypersalina sp. nov.
- New
- Research Article
- 10.64753/jcasc.v10i2.1990
- Nov 25, 2025
- Journal of Cultural Analysis and Social Change
- Hernán Yonathan Barragán-Huamán + 1 more
This research examines recent legislative additions related to artificial intelligence (AI) in the Peruvian Penal Code (CPP), as well as the challenges posed by its use in the commission of complex crimes, such as the creation of deepfakes, digital identity theft, automated fraud, and other forms of cybercrime. Despite some progress, regulatory gaps persist to address these new criminal modalities, highlighting the need for a more precise and up-to-date criminal classification. In this framework, the study analyzes the deficiencies of the current legal system and contrasts them with comparative legislative proposals from other countries, it also underlines the urgency of incorporating modern penal provisions that address the misuse of intelligent systems, while respecting the principles of legality and due process. To ensure methodological rigor, a qualitative approach is adopted, based on the dogmatic analysis of Peruvian criminal law, a review of specialized legal doctrine and a comparative study of foreign legislative models. In addition, landmark cases are examined to identify key legal challenges. The aim is to propose guidelines that inform an effective criminal policy adapted to the impact of artificial intelligence in the criminal field.
- New
- Research Article
- 10.1080/1369118x.2025.2588351
- Nov 22, 2025
- Information, Communication & Society
- Maud Rebergen + 2 more
ABSTRACT Digital identity systems serve as essential gateways to public services in digital-by-default societies, yet they are often overlooked or regarded as ‘neutral’ tools. We argue, however, that these systems are shaped by sociotechnical imaginaries that influence both policy and technological design. This paper examines how such imaginaries inform and justify the development of national digital identity systems, using the Dutch ‘DigiD’ system as a case study. Through a critical discourse analysis of 366 governmental documents published by the Dutch government from 2004 to 2023, we identify three dominant sociotechnical imaginaries over time: efficiency (2004–2010), security (2010–2017), and user-centricity (2017–2023). Our findings suggest that DigiD’s technological development mirrors shifting value paradigms in political discourse. By examining DigiD, we suggest that sociotechnical imaginaries about digital identity systems are inherently performative. They describe and prescribe the trajectory of technological design at the same time. In doing so, this paper offers a framework for critically assessing the development of technologies that increasingly affect access and inclusion in digital societies.
- New
- Research Article
- 10.52783/jisem.v10i62s.13639
- Nov 18, 2025
- Journal of Information Systems Engineering and Management
- Vasu Sunil Kumar Grandhi
Financial institutions are accelerating the transition from passwords to FIDO2-based authentication to mitigate credential-related breaches and enhance regulatory compliance. This shift removes shared secrets from authentication, eliminating the primary attack vector exploited in credential-driven fraud. This article presents a Blueprint for Passwordless Banking, detailing a phased strategy for deploying FIDO2- and biometric-based authentication in high-compliance environments. The framework covers architectural prerequisites, risk evaluation, customer journey adaptation, and coexistence strategies with legacy multi-factor authentication systems. Practical guidance derives from large-scale banking implementations, emphasizing security gains, reduced credential-reset costs, and measurable improvements in user experience. The proposed model demonstrates how regulated institutions can meet FINRA and PCI-DSS requirements while embracing passwordless paradigms that align with NIST SP 800-63B digital identity guidelines. Financial institutions implementing passwordless strategies report measurable reductions in account takeover incidents, decreased support costs associated with credential management, and enhanced customer satisfaction metrics reflecting streamlined authentication experiences. The regulatory landscape governing financial services authentication has evolved to accommodate passwordless methodologies while maintaining rigorous identity assurance requirements through possession-based authenticators and biometric verification as acceptable alternatives to knowledge-based credentials.
- New
- Research Article
- 10.52088/ijesty.v5i4.1133
- Nov 13, 2025
- International Journal of Engineering, Science and Information Technology
- Mona Sharma + 5 more
This study presents a comprehensive bibliometric analysis of the scholarly literature on fintech and financial inclusion. Using a structured search strategy, 611 articles published in Scopus-indexed journals were analysed to uncover key trends, contributors, and research themes within this rapidly evolving field. The analysis identifies “sustainable development” and “China” as well-developed and central motor themes, while “fintech,” “financial inclusion,” and “electronic money” remain central yet still developing areas of inquiry. Notably, Ozili P.K. emerged as the most influential author, with a high citation impact and H-index, followed by Banna H and Mhlanga D. The Journal of Risk and Financial Management, Sustainability (Switzerland), and Finance Research Letters were the leading publication outlets. Geographically, India led in terms of publication volume, reflecting its dynamic fintech ecosystem, whereas the UK and US showed strong international research collaborations. Despite a solid foundation, the literature reveals underdeveloped focus areas, particularly regarding the traditional financial system and the integration of emerging technologies. These points point to meaningful gaps for future exploration, including the application of blockchain, artificial intelligence, and digital identity frameworks to promote inclusive finance. Additionally, socio-cultural factors influencing fintech adoption remain insufficiently explored, especially in underserved communities. Cross-country comparative research and long-term studies are also needed to deepen our understanding of fintech’s role in achieving inclusive and sustainable economic growth.
- Research Article
- 10.33701/jk.v7i1.5389
- Nov 7, 2025
- Jurnal Konstituen
- Wiwik Roso Sri Rejeki + 2 more
Abstract The Directorate General of Population and Civil Registration of the Ministry of Home Affairs has set performance achievement targets for 2024 for the Population and Civil Registration Offices at the regency/city level, as outlined in the Minister of Home Affairs Decree Number 100.4.6-635 Dukcapil of 2024. Accordingly, the Population and Civil Registration Offices are implementing various efforts and strategies to improve performance targets that are still relatively low, namely electronic ID card (KTP-el) recording (92.24%), Child Identity Card (KIA) ownership (33.32%), and the implementation of Digital Population Identity (IKD) (8.9%). However, these efforts and strategies have not been fully effective due to several obstacles, such as geographical conditions, limited telecommunications infrastructure, budget constraints, and shortages of KTP-el blanks. This research focuses on strategies to enhance the achievement of national targets, aiming to identify and analyze existing obstacles through SWOT analysis. This research is descriptive qualitative, with informants selected using purposive and snowball sampling techniques. Data analysis was conducted using qualitative methods, including organizing and preparing data for analysis, reading all data, coding data, identifying themes, developing interpretations, further analysis using analytical frameworks, and presenting and interpreting the research findings. The results indicate that, based on the SWOT analysis, achieving the performance targets requires extensive socialization efforts through social media platforms such as TikTok, Instagram, Facebook, and others. It is also necessary to establish collaborations with related agencies and user institutions to optimize the utilization of population data and documents. Keywords: Performance Target, SWOT Analysis, Population Documents
- Research Article
- 10.1080/10691316.2025.2586544
- Nov 6, 2025
- College & Undergraduate Libraries
- Kolawole Francis Ogunbodede + 1 more
The study examined the digital literacy proficiency among undergraduates of Library and Information Science (LIS) in federal universities in South-South Nigeria and how this proficiency influences peer leadership among their peers. The study employed a descriptive survey design, and a stratified random sampling technique was used to select 408 participants from a population of 2,723 students across nine universities. Data were collected using a self-developed questionnaire, with 327 valid responses analyzed through descriptive and inferential statistics using SPSS version 29. Findings revealed that LIS undergraduates possess a moderate level of digital literacy, with strengths in basic Information and Communication Technology (ICT) skills, digital communication, and information retrieval, but notable gaps in digital content creation, collaborative tools, and identity management. Students were found to utilize both formal and informal methods to enhance their digital skills, demonstrating adaptability and initiative. Furthermore, the study found that digital literacy proficiency moderately influences peer leadership, especially in areas like peer support, academic collaboration, and responsible digital engagement. A statistically significant relationship was found between digital literacy and peer leadership. The results of the study may assist library management in enhancing the digital competencies of LIS students, thereby fostering the development of peer leadership in university libraries. It suggests incorporating advanced digital proficiency in LIS programs, peer-guided learning, and enhancing digital infrastructure to assist students in their progress further.
- Research Article
- 10.3389/fcomm.2025.1683130
- Nov 6, 2025
- Frontiers in Communication
- Krupa Ann Mathew + 2 more
Background Dating applications, or “dating apps,” are widely used by sexual minority men (SMM) to form social and sexual connections. These platforms support intimacy, identity expression, and community engagement but have also been linked to sexual health risks and psychological distress. Although research on dating app use is growing, studies remain limited. This study examines dating app use, tribe identity, and sexual health behaviors in a sample of U.S. SMM. Methods A total of 549 gay and bisexual men aged 18–50 years completed an online survey and were recruited via Qualtrics Survey Panels, assessing dating app use, tribe identity, sexual activity, condom use, and awareness and use of pre-exposure prophylaxis (PrEP). Descriptive statistics explored patterns of digital engagement, identity expression, and sexual health behaviors. Results Most participants (69.4%) reported using dating apps, primarily for casual sex (46.3%). Among sexually active participants, 39.9% did not use condoms during their last sexual encounter. Only 17.8% of those aware of PrEP were currently using it, and 33.5% had never heard of it. Tribe identity was diverse but not universal; 32.1% reported no affiliation, while others identified with groups such as “Clean-cut,” “Bear,” and “Jock,” revealing potential links to appearance-based norms and sexual decision-making. Conclusion Dating app use may influence both health behaviors and digital communication patterns among sexual minority men. Our findings underscore the need for inclusive, culturally responsive interventions that address gaps in sexual health knowledge while also considering how digital discourse and platform design shape communication, perception, and engagement.
- Research Article
- 10.54254/2753-7064/2025.ht29167
- Nov 5, 2025
- Communications in Humanities Research
- Taozhi Jiang
This paper revisited Erving Goffmans dramaturgical theory in the context of digital self-presentation on social media platforms. Drawing on Goffmans concepts of frontstage, backstage, and impression management, it examined how the affordances and constraints of platforms like Instagram, TikTok, and Rednote (Xiaohongshu) reshaped the boundaries between public and private spheres. Integrating perspectives from Ben Aggers concept of oversharing, Lee Humphreyss notion of the qualified self, and Michel Foucaults theory of disciplinary power, the analysis identified the structural forcesparticularly algorithms and persistent data tracesthat increasingly governed online performances. The paper argued that while Goffmans framework remained a valuable analytical lens, its emphasis on individual agency is challenged in a platform-mediated environment where users perform not only for human audiences but also for systems. The discussion concluded with implications for future research on digital identities, algorithmic governance, and the potential emergence of new backstages in virtual spaces.
- Research Article
- 10.54254/2753-7064/2025.bj29060
- Nov 5, 2025
- Communications in Humanities Research
- Xianglin Nan
In the digital era, social media has become a pivotal tool for athletes to engage with fans, promote personal brands, and influence public perception. Platforms such as Instagram, TikTok, and Twitter provide athletes with direct communication channels, bypassing traditional media. This paper investigates the impact of social media on athlete branding, focusing on the motivations behind establishing personal online presence, the benefits of enhanced visibility, and the challenges athletes face in managing their digital identity. Using a mixed-methods approach that combines case studies of elite athletes such as LeBron James and Gu Ailing with content analysis of digital platforms, the study identifies three main drivers of athlete social media use: brand promotion, fan engagement, and revenue generation. It also examines associated risks, including privacy breaches, reputational damage, and exposure to online criticism. Findings suggest that while social media empowers athletes to shape their narratives and maximize commercial opportunities, it simultaneously creates vulnerabilities that require strategic management. This dual nature underscores the necessity of balancing authenticity with risk mitigation in modern athlete branding.
- Research Article
- 10.1099/ijsem.0.006941
- Nov 5, 2025
- International journal of systematic and evolutionary microbiology
- Yulu Chen + 10 more
Four strains (LJ668T/LJ756 and CY350T/CY353) belonging to the genus Chryseobacterium were isolated from the Qinghai-Tibet Plateau soils. Cells were aerobic, Gram-stain-negative, rod-shaped, yellow-pigmented, non-motile and non-spore-forming. According to the 16S rRNA gene sequence alignment, the strain pair LJ668T/LJ756 shared the highest similarities to Chryseobacterium aahli T68T (98.09%) and Chryseobacterium limigenitum SUR2T (98.09%), and the other one (CY350T/CY353) to Chryseobacterium aquaticum KCTC 12483T (97.98/98.13%). The phylogenetic analyses based on 16S rRNA gene and genomic sequences indicated that these four strains generated two separate clades in genus Chryseobacterium. The digital DNA-DNA hybridization and average nucleotide identity values of four novel isolates with other members of the genus Chryseobacterium were far below 70.0% and 95.0-96.0 % thresholds. The genomic DNA G+C content of LJ668T and CY350T is both 35.0 mol%. The major cellular fatty acids of the two pair strains are iso-C15 : 0 and summed feature 3 (C16 : 1 ω7c and/or C16 : 1 ω6c). MK-6 is the only respiratory quinone for strains LJ668T and CY350T. The polar lipids of strain LJ668T are phosphatidylethanolamine (PE), L1-5 and AL1-5, and the strain CY350T is PE, L1-4, AL1-2, diphosphatidylglycerol, phosphoglycolipid and GL1-3. According to the results of genotypic, phenotypic and biochemical analyses, these four strains represent two novel species of the genus Chryseobacterium, for which the names Chryseobacterium chendengshani sp. nov. and Chryseobacterium wangxinyae sp. nov. are proposed. The type strains are LJ668T (=CGMCC 1.17165T=JCM 33877T) and CY350T (=GDMCC 1.3790T=KCTC 25690T), respectively.
- Research Article
- 10.62951/karya.v2i4.2334
- Nov 4, 2025
- Masyarakat Berkarya : Jurnal Pengabdian dan Perubahan Sosial
- Firqin Fuad + 1 more
This community service program was carried out in Dolok Kahean Village, Tapian Dolok District, Simalungun Regency, with the main focus on optimizing digital literacy to increase the competitiveness of micro, small, and medium enterprises (MSMEs). The purpose of this program is to strengthen the competitive position of MSMEs, especially Rengginang Ibu Saliem, who still rely on conventional marketing systems and have a minimal understanding of business digitalization. The method used is a participatory and educational approach, carried out in four systematic stages: needs assessment, material design, program implementation, and mentoring and evaluation. The results of the activity showed significant achievements, with an increase in digital literacy understanding by 80% based on a comparison of pre-service and post-service. In practice, partners have succeeded in forming a business digital identity, namely @rengginanghuta_ibusaliem Instagram accounts, and are able to run digital marketing starting from content processes to customer interaction. Theoretically, these findings strengthen the argument that digital literacy is an essential foundation in facing the challenges of the digital economy, where increased competitiveness is not only influenced by technical skills, but also by changes in mindset and business independence. The implication of this program is that local MSMEs now have adequate capabilities and platforms to expand market reach beyond the village boundaries.