2022
DOI: 10.1016/j.envsci.2022.03.023
|View full text |Cite
|
Sign up to set email alerts
|

Towards a classification of vulnerability of small-scale fisheries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 74 publications
0
6
0
Order By: Relevance
“…Challenges in the existing literature are rooted in the lack of a comprehensive understanding of fish landing classification complexities [3]. These complexities are crucial for developing effective resource management strategies.…”
Section: *Author For Correspondencementioning
confidence: 99%
“…Challenges in the existing literature are rooted in the lack of a comprehensive understanding of fish landing classification complexities [3]. These complexities are crucial for developing effective resource management strategies.…”
Section: *Author For Correspondencementioning
confidence: 99%
“…Someone or something (e.g., small-scale fisheries are more vulnerable than large-scale fisheries) may be considered vulnerable [6,67]. SSFs are at risk because of a wide range of complex environmental, economic, and political stressors and changes [68]. SSF communities are particularly sensitive to local and global change processes because of their heavy reliance on natural resources and close linkages to the coastal environment [2].…”
Section: Key Vulnerabilities From Water-quality Issuesmentioning
confidence: 99%
“…Many factors affect the effectiveness of vulnerability classification, among which the main elements are dimensionality reduction processing techniques [16] and classification algorithms [17]. The purpose of dimensionality reduction processing techniques is to convert a high-dimensional vulnerability dataset into a low-dimensional representation while trying to preserve the structure and information of the vulnerability data, that is, how to represent a vulnerability with as few feature words as possible; classification algorithms are the process of automatically classifying unknown vulnerability information based on known vulnerability training datasets.…”
Section: Related Workmentioning
confidence: 99%