All

‘You really have to have a thick skin’: A cross-cultural perspective on how online harassment influences female journalists

‘You really have to have a thick skin’: A cross-cultural perspective on how online harassment influences female journalists

Jul 15, 2025

            In-depth interviews with 75 female journalists who work or have worked in Germany, India, Taiwan, the United Kingdom, and the United States of America reveal that they face rampant online gendered harassment that influences how they do their jobs. Many of the women report that if they aim to engage with their audience online – which is a job requirement for many of them – they frequently face sexist comments that criticize, attack, marginalize, stereotype, or threaten them based on their gender or sexuality. Often, criticism of their work is framed as misogynistic attacks and, sometimes, even involves sexual violence. The journalists have developed a variety of strategies for dealing with the abuse, including limiting what they post online, changing what stories they report on, and using technological tools to prevent people from posting offensive words on the journalists’ public social media pages. Results show that this harassment disrupts the routinized practice of reciprocal journalism because it limits how much these women can interact with the audience in mutually beneficial ways without being attacked or undermined sexually. While experiences of harassment were consistent across the countries studied, cultural differences were evident in how much the journalists were expected to engage online. Results are discussed in relation to the hierarchy of influences model that aims to explain how multiple forces influence media content.

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

Jul 14, 2025

Introduction           Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. Inspired by security evolution in prior generations, this work provides a systematic review of existing research efforts on security and privacy for 6G networks. The article reviews the issues of 6G enabling technologies and state-of-the-art defense methods. By conducting the problems in each technology, our goal is to provide a holistic view of the evolution of core security and privacy issues, along with the remaining challenges for further enhancements. To this end, the study aims to answer the fundamental question: What are the major potential changes of 6G security infrastructure from the prior generations? What are new challenges and prospective approaches for privacy preservation in 6G to satisfy the requirements in laws, such as General Data Protection Regulation (GDPR)? The main contributions of this article are multi-fold. First, the work provides a systematic overview of the evolution of security architecture and vulnerabilities in legacy networks. By investigating the shortcomings of the standards and technical insights of protocol flaws in such networks, required enhancements to 6G security and privacy are highlighted. Second, our survey provides a holistic view of security and privacy issues and how the existing solutions must be changed to satisfy the new demands in 6G. Since 6G will continue on the techno-economic trajectory of 5G, a systematic review on transition and possible changes of 6G security and privacy can shed light on the best plan for the operators/developers to upgrade the security infrastructure/defense systems at the right time. Finally, our discussions about lessons learned from the shortcomings of existing security architecture and remaining technical challenges may help researchers/developers quickly identify relevant issues and starting points for further works. The key security aspects are summarized in Figure 1.   Figure 1. A taxonomy of key points of our survey on security & privacy for 6G   Key findings from the research:      1. Major differences between 5G and 6G:  5G introduced substantial advancements like improved subscriber identity protection through SUCI (Subscription Concealed Identifier), and basic AI-assisted threat detection, it still carries many vulnerabilities, including weaknesses in mutual authentication, susceptibility to fake base stations, and the reuse of legacy protocols that expose outdated threats. In contrast, 6G security is envisioned to go far beyond patching existing flaws. It will operate in a space-air-ground-sea integrated network environment with radically diverse applications such as brain-computer interfaces, holographic telepresence, and autonomous systems. However, new technologies mean novel vulnerabilities. Unlike 5G, 6G will incorporate quantum-safe cryptography, AI-empowered real-time adaptive security, and physical layer security in beamforming and directional communications that leverages wireless channel characteristics. Also, unlike 5G’s centralized identity model, 6G may move toward decentralized, passwordless authentication through biometrics and system-on-chip identities. Blockchain and distributed ledgers are also considered for ensuring data integrity and mutual trust across domains. Furthermore, 6G networks are expected to fully support real-time zero-touch threat responses and zero-trust architectures, emphasizing dynamic, policy-based access control. This leap from static protection models to intelligent, self-defending infrastructures marks a transformative shift from 5G’s reactive posture to 6G’s proactive and predictive security paradigm. A summary of typical 6G vs 5G applications and security requirements is illustrated in Figure 2. 6G security will upgrade 5G security with new capability in terms of intelligence, automation, and energy efficiency. Figure 2. 6G security vs 5G security.         2. Space-Air-Ground-Sea Integrated Networks will be the next frontier of security defense, probably national security: As the rising popularity of satellite-based broadband networks and drones in civil applications, Space-Air-Ground-Sea Integrated Networks (SAGIN) will be the reachable target of mobile networks in the coming years. By combining terrestrial, aerial, maritime, and satellite systems, 6G SAGIN will achieve expansive coverage and support critical applications like emergency rescue and autonomous navigation. However, this integration introduces heightened risks, including jamming, eavesdropping, and masquerading attacks on high-altitude platforms. Given the strategic relevance of SAGIN infrastructure for national defense, public safety, and global communications, securing it becomes essential. Further research on efficient and secure SAGIN models for national targets will be critical.      3. AI-based functions in 6G will be the new target of the tit-for-tat battle between attackers and security defenders: AI-based functions in 6G are expected to revolutionize network operations through automation, real-time decision-making, and adaptive security responses. However, this reliance on AI introduces a new battleground where attackers and defenders will continually outmaneuver each other. Adversaries may exploit vulnerabilities in AI models, such as data poisoning or adversarial inputs, to mislead or disable security mechanisms. Meanwhile, defenders must develop more robust, transparent, and resilient AI systems to detect and neutralize evolving threats. This cat-and-mouse dynamic will define the future of 6G security, demanding continuous innovation to stay ahead of increasingly intelligent and adaptive cyberattacks. Figure 3 summarizes key attacks and defense approaches for AI-based functions and case studies in 6G. Figure 3. Attack and defense methods in AI-based functions for 6G and case studies for security in AI-based 6G V2X.         4. The starting era of post-quantum cryptography, quantum security, and semantic communications: 6G will mark the starting era of post-quantum cryptography, where traditional encryption methods can no longer withstand the power of quantum computing. To ensure long-term data protection and mitigate the risks of “collect now, decrypt later” attacks, 6G will adopt quantum-safe cryptographic algorithms, such as ML-KEM and HQC, and explore quantum key distribution technologies (e.g., using satellites or aerial systems). In parallel, semantic communication—a paradigm that transmits meaning rather than raw bits—will transform how information is conveyed and protected amid the explosion of data and the limitations of Shannon’s theory. Together, these advancements will redefine digital trust, enhancing network intelligence, security, and resilience for the quantum age.   Provided by: Van-Linh Nguyen

Synchrony facilitates altruistic decision making for non-human avatars

Synchrony facilitates altruistic decision making for non-human avatars

Jun 04, 2025

Negotiation is a ubiquitous social activity in which individuals work together to reach a consensus on issues that are in dispute. The complicated interplay of competition and cooperation is a remarkable feature of negotiation, and negotiators go into it with a highly mixed motivation. Most negotiators seek to reach an agreement with the other, but they also strive for an agreement that serves their own goals. Thus, effective negotiators must find a tenuous balance between facilitating positive and cooperative interactions within a competitive and often distrustful environment. Prior research on negotiation emphasizes the importance of rapport, a feeling of connection, mutual attentive ness and positivity, in establishing cooperation and obtaining mutually beneficial outcomes. Rapport is known to be reflected in a particular pattern of nonverbal behavioral dynamics between interlocutors: interactional synchrony, hereafter, synchrony (Bernieri & Rosenthal, 1991; Fujiwara et al., 2020). Synchrony refers to ‘‘similarity in rhythmic qualities and enmeshing or coordination of the behavioral patterns of both parties’’ in an interaction (Burgoon et al., 1995, p. 128), which is believed a natural part of human interactions. The research field of human-computer interaction, known as HCI, has emerged to bring together ideas from diverse fields such as psychology, engineering, computer science, design, sociology, and communication. Advances in automation now allow humans to have realistic interactions with virtual human interviewers and have interactive conversations that resemble human-human interactions. The degree to which the human and non-human agent behaviors are synchronized with one another goes a long way toward building rapport and improving outcomes. Thus, the purpose of this research was to examine whether human negotiators would synchronize their movements when working with non-human avatars and if so, whether that would affect their perceptions of their negotiations. In formulating our hypotheses, we relied on two assumptions. Namely, one is that people unconsciously treat computers as social actors (the “media equation” effect), and the other is that synchrony breaks down when the competitive aspect of negotiation is emphasized. The three hypotheses formulated on the basis of these are as follows: H1. Participants will synchronize their movements with the movements of their non-human negotiation partner. H2. Greater synchrony will occur when participants engage in an integrative (win-win) negotiation compared to distributive (win-lose or zero-sum) negotiations. H3. Participants that engage in synchrony will report greater impression of affiliation, a proxy of rapport, with their non-human partner. People are not purely selfish in negotiations, but try to accommodate the other party’s goals somehow. The extent of this “other regard” is shaped by the relationship to the other party. Indeed, prior research suggests that affiliation towards one’s negotiation partner will influence concession-making, so in addition to these hypotheses, we also examine how synchrony impacts the outcomes participants obtain. Methods The 172 participants were instructed to negotiate with an avatar in order to come to an agreement, the maximum interaction time for this task was 10 min. The avatar was named “Sam” for both the male and female version of the avatar (Fig. 1). There were several items on the negotiation table, and participants were informed of the relative value of each item before starting the interaction. The specific values of these items were determined by the setting of the study; in the distributive (zero-sum) setting, items were worth the same amount for both participant and avatar. On the contrary, in the integrative condition, the item value differed between the participant and the avatar, allowing both the participant and the avatar to receive their highest value items. Participants were not told the avatar’s value of items in either condition, however they could discover this during the negotiation by asking questions or observing the avatar’s pattern of offers (the avatar always responded truthfully to questions about what it values). If no agreement was reached within the 10 min time limit, each party would only receive a single copy of their highest value item.   Fig. 1. Appearance of female and male avatar (“Sam”). The skeleton rendered by OpenPose is overlaid on each joint point of the avatar. Participants could talk to the agent without any restrictions, and the avatar was controlled by two experimenters through a graphical user interface; i.e., the Wizard of Oz method. One experimenter controlled the agent’s speech and verbal behavior, while the other controlled the avatar’s nonverbal behavior such as facial expressions and gestures. The interactions were video recorded, which was used in the subsequent synchrony analysis. Using video films of the negotiation, time-series bodily movement data was obtained using OpenPose (Cao et al., 2021; Fujiwara & Yokomitsu, 2021). Since a video is a series of still images, the movement time-series was created by calculating the distance the joint points traveled between each frame. For avatars, 10 coordinate points (i.e., eyes, nose, neck, shoulders, elbows, and hands/wrists) was used whereas 3 coordinate points (i.e., eyes and nose) were targeted for humans because many participants were videotaped with only their faces (i.e., above the chin). The sampling frequency was set to 30 Hz, which was equal to the video frame rate. As for synchrony analysis, we performed the dynamic time warping for each dyadic time series (Figure 2). The distance score obtained was the main variable (as an inverse) indicating the degree of synchrony. To test the validity of a synchrony measure, we randomly shuffled data within each time series to generate artificial “interactions.” This technique is a time-series equivalent of a permutation test that offers a baseline to assess the level of synchrony in the genuine dyadic interactions. Fig. 2. Example of dynamic time warping on movement time series: (A) A genuine human-avatar interaction, (B) A pseudo interaction of a randomly shuffled series. The heatmap represents the cost matrix created based on the difference between the two series; blue denotes smaller costs, red denotes larger costs. The black least-cost path minimizes the total cost (the cumulative addition of the costs on the path) from the start to the end of the matrix. In (A), the path can travel through the blue area, while the path must take the red area in (B), resulting in (A) having a smaller difference or a greater similarity. Deviations from the white diagonal show traces of adjustment using “warping” series, which align time series by their shape instead of time.   Results We used the distance score to test H1 and H2. H1 predicted that the participants would synchronize their movement with the non-human avatar, which was supported, as the distance was significantly smaller in the genuine human-avatar dyad compared to the dyad with shuffled artificial data. H2 was also supported; the distance score was significantly smaller in the integrative (cooperative) condition than that in the distributive condition. H3 predicted that synchrony with non-human avatars will lead to a favorable impression of the avatar. A mediation analysis that incorporated the impact of the experimental manipulation verified that the impact of the negotiation setting on impression of avatar was fully mediated by synchrony (Figure 3). Thus, H3 was supported. Fig. 3. The effect of experimental manipulation on the impression of affiliation to the avatar is mediated by synchrony. Negotiation setting is binarily coded: integrative (1), distributive (0). All the estimates were standardized (**p < .01).   In addition to the hypothesis tests, we explored whether synchrony leads to better negotiation outcomes for the human player. The results showed that participants’ willingness to engage in synchrony boosted the avatar-friendly decision in the integrative negotiation where they could accomplish a win-win deal (Figure 4). Instead, synchrony had no impact on their outcomes in the zero-sum negotiation.   Fig. 4. The interaction effect of synchrony and the negotiation setting on the negotiation outcome. On the left is the human player's score: the more synchrony they show with the avatar (left side of the figure), the lower their score. On the right is the avatar's score: synchrony was associated with increased score.   Overall, these findings reinforce the importance of synchrony in human-machine interactions. Here, we demonstrated that human-machine synchrony predicted positive subjective feelings as well as the outcomes that were negotiated. Our findings further suggest that people seem strategic in their willingness to engage in synchrony (Dunbar et al., 2020), because they only synchronized their movements to the avatar partner when there appeared to be material benefits to this behavior in an integrative negotiation. Also, our study may raise important practical and ethical questions for agent design. We complement a growing body of research that anthropomorphic interfaces can use subtle nonverbal signals to shape both perceptions and behavior. Some of these findings have obvious societal benefits such as enhancing physical and mental health. But other uses may be more problematic. For example, we have found that agents can extract greater concessions from a human negotiation partner by strategically using synthetic emotional expressions (de Melo et al., 2011) and potential consumers would want to own such an agent if it helped them manipulate others for their own personal gain (Mell et al., 2020). The field of artificial intelligence is becoming more aware of the need to work through ethical principles to guide the development of such technology. Our findings lend greater urgency to such efforts.   Related papers Bernieri, F. J., & Rosenthal, R. (1991). Interpersonal coordination: Behavior matching and interactional synchrony. In R. Feldman, & B. Rime (Eds.), Fundamentals of nonverbal behavior: Studies in emotion & social interaction (pp. 401–432). Cambridge University Press. Burgoon, J. K., Stern, L. A., & Dillman, L. (1995). Interpersonal adaptation: Dyadic interaction patterns. Cambridge University Press. Cao, Z., Hidalgo, G., Simon, T., Wei, S., & Sheikh, Y. A. (2021). OpenPose: Realtime multi-person 2d pose estimation using part affinity fields. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43, 172–186. https://doi.org/10.1109/TPAMI.2019.2929257 Dunbar, N. E., Giles, H., Bernhold, Q., Adams, A., Giles, M., Zamanzadeh, N., et al. (2020). Strategic synchrony and rhythmic similarity in lies about ingroup affiliation. Journal of Nonverbal Behavior, 44(1), 153–172. https://doi.org/10.1007/s10919-019- 00321-2 Fujiwara, K., Kimura, M., & Daibo, I. (2020). Rhythmic features of movement synchrony for bonding individuals in dyadic interaction. Journal of Nonverbal Behavior, 44(1), 173–193. https://doi.org/10.1007/s10919-019-00315-0 Fujiwara, K., & Yokomitsu, K. (2021). Video-based tracking approach for nonverbal synchrony: A comparison of Motion Energy Analysis and OpenPose. Behavior Research Methods, 53(6), 2700–2711. https://doi.org/10.3758/s13428-021-01612-7 Mell, J., Lucas, G., Mozgai, S., & Gratch, J. (2020). The effects of experience on deception in human-agent negotiation. Journal of Artificial Intelligence Research, 68, 633–660. https://doi.org/10.1613/jair.1.11924 de Melo, C., Carnevale, P. J., & Gratch, J. (2011). The effect of expression of anger and happiness in computer agents on negotiations with humans. Taipei, Taiwan: Paper presented at the Tenth International Conference on Autonomous Agents and Multiagent Systems.

Wavelet Approximation-Aware Residual Network for Single Image Deraining

Wavelet Approximation-Aware Residual Network for Single Image Deraining

May 15, 2025

It has been made great progress on single image deraining based on deep convolutional neural networks (CNN). In most existing deep deraining methods, CNNs aim to learn a direct mapping from rainy images to clean rain-less images, and their architectures are becoming more and more complex. However, due to the limitation of mixing rain with object edges and background, it is difficult to separate rain and object/background, and the edge details of the image cannot be effectively recovered in the reconstruction process. To address this problem, we propose a novel wavelet approximation-aware residual network (WAAR), wherein rain is effectively removed from both low-frequency structures and high-frequency details at each level separately, especially in low-frequency sub-images at each level. After wavelet transform, we propose novel approximation aware (AAM) and approximation level blending (ALB) mechanisms to further aid the low-frequency networks at each level recover the structure and texture of low-frequency sub-images recursively, while the high-frequency network can effectively eliminate rain streaks through block connection and achieve different degrees of edge detail enhancement by adjusting hyperparameters. In addition, we also introduce block connection to enrich the high-frequency details in the high-frequency network, which is favorable for obtaining potential interdependencies between high- and low-frequency features. Experimental results indicate that the proposed WAAR exhibits strong performance in reconstructing clean and rain-free images, recovering real and undistorted texture structures, and enhancing image edges in comparison with the state-of-the-art approaches on synthetic and real image datasets. It shows the effectiveness of our method, especially on image edges and texture details.

Deep-Learning Technique for Bed-exit Action Prediction of Elderly Using Extremely Low-resolution Thermopile Sensor Array

Deep-Learning Technique for Bed-exit Action Prediction of Elderly Using Extremely Low-resolution Thermopile Sensor Array

Mar 01, 2025

Elderly Care is becoming an increasingly important issue in aging and super-aged societies. In particular, Taiwan’s Long-Term Care 3.0 policy highlights “smart assistive technologies” as one of its key areas for promotion. A critical focus in elderly care is fall prevention, as falls in older adults often result in serious or even fatal injuries. Given that bedrooms and bathrooms are the two primary hotspots for falls, this study focuses on the former. The core objective of this research is to prevent falls. However, predicting when a fall will occur is extremely difficult—even in healthy individuals (e.g., someone might trip unexpectedly). Therefore, we considered the typical routines and potential fall causes among elderly individuals and identified a high-risk period during the transition out of bed. During this period, conditions such as orthostatic hypotension or musculoskeletal weakness may lead to momentary dizziness and result in falls. To address this issue, our approach transforms the goal of “fall prevention” into a strategy of “early bed-exit prediction.” By detecting—or even predicting—the elderly person’s intention to get out of bed, our system can alert caregivers, who can then assist verbally (e.g., calling out) or physically, thereby preventing potential falls. To provide caregivers with sufficient response time, this study emphasizes bed-exit prediction rather than simple detection, allowing a buffer of 5–8 seconds for verbal or physical intervention. Currently, smart assistive devices in many care centers rely on air cushions or pressure mats (placed under mattresses) that detect movement only after the person has already gotten out of bed. This is often too late to prevent a fall. Our technology, by contrast, provides an alert during the critical 5–8 second window, significantly improving the chances of fall prevention. Because cameras often raise privacy concerns, our study uses a thermopile-type far-infrared sensor with very low resolution (32×32 pixels). This sensor is inexpensive and inherently privacy-preserving, as the images it produces are unrecognizable to the human eyes. We apply cutting-edge AI and deep learning technologies to predict bed-exit intent on average 5.78 seconds before the actual action. Our database tests show 99.37% accuracy and 99.09% precision. The system supports real-time, online, continuous operation, not just offline database testing, placing it at the forefront of international research. The thermopile sensor used in this study does not present the privacy risks associated with RGB color cameras and is affordably priced between NT$1,500–10,000. However, due to its low resolution (32×32 pixels), traditional image processing and computer vision algorithms perform poorly. To overcome this, we adopted the latest AI and deep learning techniques for practical effectiveness in action prediction. We installed 1–3 far-infrared sensors above the bed (non-intrusive to daily activities) to continuously capture thermal imagery. The data is integrated to anticipate the senior’s intent to get out of bed, allowing caregivers to assist before a fall might occur due to orthostatic hypotension or insufficient leg support. Our system utilizes a combined CNN/LSTM/GRU neural network, along with a custom early-prediction loss function, to accurately predict the senior’s intent to get up—without triggering false alarms caused by minor movements like turning over or lifting a leg during sleep. The results of this research have been showcased at our university’s CIRAS center (Center of Innovative Research for Aging Society) on several occasions, leaving a strong impression on visitors. The findings were also published in 2023 in the IEEE Transactions on Circuits and Systems for Video Technology, an SCI Q1 journal (Ranking: 91.1%) 圖 1 本研究熱電堆紅外線 (TPA) 影像實拍圖 圖 2. 本研究三個紅外線影像感測器 (TPA) 實際配置圖 (床上天花板處) 圖 3. TPA 紅外線影像動作預測系統介面 (左上為三個 TPA 影像,右面為估測之離床機率曲線之時間變化及使用之紅色門檻線(threshold), 當超越門檻線,及發出告警。   Research team:Intelligent Signal Processing, ISP: 520 多媒體實驗室 賴文能老師團隊 (Lie group), Lie group team, R520 laboratory of Intelligent Signal Processing (ISP) group, Department of Electrical Engineering, National Chung Cheng University, Taiwan

Designing Life for 100 Years: From Taiwan’s Active Aging Learning Initiatives to an Action Blueprint for a Longevity Society

Designing Life for 100 Years: From Taiwan’s Active Aging Learning Initiatives to an Action Blueprint for a Longevity Society

Feb 28, 2025

Background: The Turning Point of an Aging Society Has Arrived   Taiwan is entering a super-aged society at an unprecedented pace. According to data from the National Development Council, by 2025, people aged 65 and over will account for more than 20% of Taiwan's total population. In the future, Taiwan’s rate of population aging is projected to surpass Japan’s starting in 2047 and, by 2070, be only slightly behind South Korea’s—ranking among the highest globally. This is no longer a future scenario—it is already happening. Many individuals are unprepared mentally, and both social systems and personal planning are struggling to keep up. While past aging policies have focused largely on care and medical support, the emergence of a decades-long elderly stage of life calls for a new paradigm. Shouldn’t we reimagine this challenge through the lens of education? How can we help people proactively plan, engage, and live meaningfully in the second half of life? Fig. 1. 臺中市樂齡學習示範中心   A Global First: Taiwan’s “Senior Learning Policy” as a Model for Educational Prevention and Proactive Aging Since 2008, my team and I have implemented a “Active Aging Learning Initiative,” which became the world’s first government-led, systemically implemented educational policy for older adults1. Unlike the international norm that prioritizes the “right to be cared for,” we advocate for a different concept: the “responsibility to design one’s later life through learning before entering old age.” Senior learning is not just about course delivery—it is a pathway to social participation and self-actualization. Over 18 years, more than 372 senior learning centers have been established across Taiwan. A community-based, intergenerational, and action-oriented model has emerged, deepening education’s role in building a longevity society2. Fig. 2. from 劉文端   The “1-2-3 Instructional Model": A New Pedagogical Paradigm for Adult Learning To overcome the passivity of traditional learning, we developed the “1-2-3 Instructional Model” tailored for older and adult learners. It emphasizes three core components3: l 1 Learning Focus: Center on a clear learning objective. l 2 Learning Activities:Combine conceptual understanding with hands-on experiences to boost motivation and contextual awareness. l 3 Applications: Transform learning into practical actions—whether personal, social, or purposeful. This model is now part of Taiwan’s Professional Training and Certification in Active Aging Education, with over 8,000 certified instructors actively teaching in Active Aging Learning Centers and community programs, becoming catalysts of educational transformation in the age of longevity. Fig. 3. 高雄市樂齡學習示範中心   The Third Life University: A New Lifelong Learning Blueprint for the 55+ Generation In 2024, commissioned by the Ministry of Education, we developed the framework and pilot for the “Third Life University” targeting adults aged 55 and above. Key features include: l Core literacy curriculum modules for a 100-year life l Ministry-accredited credit and certification systems l A hybrid learning model linking university resources with communities. l Program designs to support career transitions, meaningful engagement, and dream realization The Third Life University is not just a place for learning—it is a platform for new social roles and personal value in a long-lived society. From Anxiety to Action: Life Design Modules for a 100-Year Life Our research shows that many individuals face two tensions in later life: anxiety over identity shifts and lack of clear goals, alongside uncertainty about what they truly want. To address this, we created a “Designing Life for 100 Years” learning module, incorporating self-directed learning, narrative inquiry, and action planning to support: l Life review and future exploration l Values clarification and goal setting l Micro-practices and reflective action This module now serves as the foundation for the “Life Design for 100” Facilitator Certification, aimed at training professionals equipped to guide and inspire others45.   Beyond Academia: Social Advocacy for Designing Life After 50 As a scholar, I’ve realized that research without real-world application cannot address society’s urgent needs. Since 2012, we have translated academic insights into public initiatives and publications, including:  l Practical books such as Design Your Second Half: A Happiness Guide for Active Aging and Designing a Life That Moves You l Certified Life Design Facilitator l Public education campaigns, social innovation projects, and experimental courses for longevity living Through interdisciplinary collaboration and community co-creation, we aim to inject hope and agency into the rapidly aging society6.   A Sincere Invitation to Like-Minded Changemakers If you resonate with any of the following: l You wish to explore cutting-edge theories and practices in elder education l You hope to become a “100-Year Life” facilitator and support others in their later-life transitions l You aim to design learning programs or action plans for the 55+ generation l You want to contribute to policies or fieldwork for a longevity society We warmly invite you to join the Learning & Action Movement of Designing Life for 100 Years7. Because now is the best time to redesign the future. Fig. 5. National Chung Cheng University Aging & Education Research Center   1 Findsen, B., Wei, H.-C., & Li, A.-T. (Eds.). (2022). Taiwan's Senior Learning Movement: Perspectives from the outside in and from the inside out (Lifelong Learning Series 28). Springer. DOI: https://doi.org/10.1007/978-3-030-93567-2 2 Findsen, B., & Wei, H.-C. (2023). Senior Learning in Taiwan: Achievements and Challenges. Adult Education Discourses, 24, 103-119. DOI: https://doi.org/10.34768/dma.vi24.685 3 Wei, H.-C., & Li, A.-T. (in press). Taiwan's active aging learning practice through the 1-2-3 Instructional Model: Facilitating learning among individuals 55 years old and above. In Qiu Wang & Guofang Wan (edit.). Life-long Learning: The Education of the Aging Population (pp. xx–xx). Chinese American Educational Research and Development Association Book Series, Information Age Publishing. https://tinyurl.com/4p7427rr 4 Liao, F.-M., Chen, G.-L., Hsu, C.-T., Liu, Y.-H., Cheng, L.-L., Chan, X.-C., & Wei, H.-C.* (2023). Validation of the self-directed learning scale for middle-aged and older adults. Educational Gerontology 50(4), 304-319. DOI: https://doi.org/10.1080/03601277.2023.2270874 5 Liao, F.-M., Chen, G.-L., Hsu, C.-T., & Wei, H.-C.* (2024). Assessing the ability of self-directed learning as a prerequisite for active aging among middle-aged and older adult learners: cross-sectional study. Educational Gerontology, 51(3), 313-329. DOI: https://doi.org/10.1080/03601277.2024.2391164 6 Wei, H.-C., Lin, Y.-H., & Chang, L.-H. (2023). The Effectiveness of a Blended Learning‐Based Life Design Course: Implications of Instruction and Application of Technology. SN Computer Science, 4, Article 360. https://doi.org/10.1007/s42979-023-01730-3 7 Wei, H.-C. (2022, July). My Personal and Professional Growth in the Second Half of Life: The Impact of My Active Aging Learning Experiences. PIMA Bulletin, 43, 25-28. Special Issue on Later Life Learning, guest editors Brian Findsen and Diana Amundsen. https://vn.seameocelll.org/wpcontent/uploads/2023/12/PIMA-Bulletin-No.43-Jul-2022.pdf

1