• Title/Summary/Keyword: Self-attacking

Search Result 11, Processing Time 0.024 seconds

Mediating Effects of Self-reassuring and Self-attacking on Relationship between Mental Health and Psychological Well-being among College Students (대학생의 정신건강과 심리적 안녕감 간의 관계에서 자기위안과 자기공격의 매개효과)

  • Shin, Sun-Hwa
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.1
    • /
    • pp.596-606
    • /
    • 2018
  • This study examined the mediating effects of self-reassuring and self-attacking in the relationship between mental health and psychological well-being among college students. The study subjects were 230 (98 males and 132 females), and the collected data were analyzed using the SPSS PROCESS Macro based on regression analysis. The results of the study were as follows. First, there were significant relationship among mental health, psychological well-being, self-reassuring and self-attacking. Second, depression, obsessive compulsive disorder, interpersonal sensitivity and psychosis had a significant negative effect on psychological well-being. Third, self-reassuring and self-attacking had a partial mediating effect on the relationship between mental health and psychological well-being. The indirect effect of mental health on psychological well-being through self-reassuring was significantly higher than the indirect effect of psychological well-being through self-attacking. Based on the results of this study, we discussed the role of self-reassuring in the relationship between mental health and psychological well-being.

A Design of Attacking Tool Using Self Movement Techni (자가 이동 기법을 이용한 공격도구의 설계)

  • 김승겸;장성만;이극;권영미;이건호
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.227-232
    • /
    • 2004
  • 현재의 전쟁에서는 자국의 정보자원 및 시스템을 보호하고 적의 중요 정보자원 및 시스템에 피해를 입히거나 파괴하는 정보전이 중요한 수단이 되고 있다. 본 논문에서는 정보전에서 우위를 점하기 위하여 자가 이동기법을 이용한 공격도구를 설계한다. 자가 이동기법은 악성 프로그램이 네트워크상의 경로를 통하여 원격지 시스템으로 스스로 이동하는 기술이다.

  • PDF

A Self-Authentication and Deniable Efficient Group Key Agreement Protocol for VANET

  • Han, Mu;Hua, Lei;Ma, Shidian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3678-3698
    • /
    • 2017
  • With the rapid development of vehicular ad hoc Network (VANET), it has gained significant popularity and received increasing attentions from both academics and industry communities in aspects of security and efficiency. To address the security and efficiency issues, a self-authentication and deniable efficient group key agreement protocol is proposed in this paper. The scheme establishes a group between road side units (RSUs) and vehicles by using self-authentication without certification authority, and improves certification efficiency by using group key (GK) transmission method. At the same time, to avoid the attacker attacking the legal vehicle by RSUs, we adopt deniable group key agreement method to negotiation session key (sk) and use it to transmit GK between RSUs. In addition, vehicles not only broadcast messages to other vehicles, but also communicate with other members in the same group. Therefore, group communication is necessary in VANET. Finally, the performance analysis shows superiority of our scheme in security problems, meanwhile the verification delay, transmission overheard and message delay get significant improvement than other related schemes.

Detection Mechanism of Attacking Web Service DoS using Self-Organizing Map (SOM(Self-Organizing Map)을 이용한 대용량 웹 서비스 DoS 공격 탐지 기법)

  • Lee, Hyung-Woo;Seo, Jong-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.5
    • /
    • pp.9-18
    • /
    • 2008
  • Web-services have originally been devised to share information as open services. In connection with it, hacking incidents have surged. Currently, Web-log analysis plays a crucial clue role in detecting Web-hacking. A growing number of cases are really related to perceiving and improving the weakness of Web-services based on Web-log analysis. Such as this, Web-log analysis plays a central role in finding out problems that Web has. Hence, Our research thesis suggests Web-DoS-hacking detective technique In the process of detecting such problems through SOM algorithm, the emergence frequency of BMU(Best Matching Unit) was studied, assuming the unit with the highest emergence frequency, as abnormal, and the problem- detection technique was recommended through the comparison of what's called BMU as input data.

Study on the Civil Legal Remedies against Cyber Defamation

  • Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.3
    • /
    • pp.93-100
    • /
    • 2018
  • Cyber defamation is the act of damaging the reputation of the other person on the Internet, and the act of attacking by the commenting the article through a word or blog. The reason why punishment is stronger than general contempt is that the nature of crime about defamation is worse than contempt. Also, punishment intensity is higher than defamation because the nature of cyber information spreads widely. Honor is not only a question of self-esteem or identity, but also a function that economically reduces the cost of seeking information or socially trustworthy. Through these two functions, it has been developed as a legal system to protect the honor as well as asking the legal sanction for defamation. However, although honor is used in various meanings in everyday life, the honor of legal level is understood in a more limited sense. It is because the law cannot actively lead and protect all honor feelings for one's feelings or mood occurred by hurt. However, if the social evaluation of a group or individual is undermined through a certain distortion of the truth, the law will actively intervene. However, due to the ambiguity of the legal sanctions standards and the identification of the parties involved in the defamation of cyberspace, it was difficult to solve the problems related to defamation in fact. Therefore, this paper will try to find out the problems of civil legal remedy due to the cyber defamation, and seek a solution for civil legal remedy.

A Study on Sexual Desire Outburst of the Male Elderly Residents Experienced by the Workers in Living Facilities (생활시설 종사자가 경험한 남성노인의 성적욕구 표출에 관한 연구)

  • Lee, In-Soo
    • Journal of Families and Better Life
    • /
    • v.26 no.1
    • /
    • pp.31-49
    • /
    • 2008
  • This study has been performed to explore verbal and behavioral expression of sexual desires among male elderly residents who have been living in long tenn care facilities. There are three topics covered in this study; first, in what situations and how seriously do care workers encounter expression of sexual desires of the elderly residents? Second, what kind of negative consequences do they believe those sexual behaviors will lead to? Third, how can we implement defensive measures against the sexual behaviors? In this study, twenty three care workers working full time in five retirement and care facilities were asked about their experience and perception of the above study agendas, and answers of the qualitative interview were drawn as follow; first, the elderly residents apparently show a variety of sexual harassment and provoking behaviors such as sticking to specific women, physically touching and attacking, and induce obscenely activities against female residents, care workers, and volunteer visitors. Second, their sexual behaviors are often influenced by their isolated and abandoned emotionality as well as living situation in rural areas. Third, their sexual behaviors often critically affect care work plan and facility managements by severely discouraging female care givers and community supporters. Therefore in this study, suggestions and defensive measures were made as follows: first, education and counselling programs toward female workers and volunteers need to be developed, and the programs should cover psychological and behavioral mechanism of sexuality in later life. Second, self control plans need to be empowered toward the elderly residents; in the plans, the elderly residents shall be encouraged to evaluate primary cause and proper solutions of sexual behaviors of their peering residents. Third, combination of healthy housing and care facilities for frail elderly need to be integrated in a neighboring location, so that when residents and workers encounter extreme episodes of sexuality of healthy residents in a housing facility, the problematic sexual residents are partially transferred into a neighboring care facility and thereafter other residents and cafe givers are relieved from stressful contacts with the extremely sexual residents.

The influence to pro-social aggression and self-sacrificing security-activity psychology through fearlessness and coldheartedness in the PPI-R (PPI-R 중 대담성과 냉담성이 친사회적 공격성과 희생적 경호활동심리에 미치는 영향)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.139-167
    • /
    • 2015
  • It is known that Psychopathy is excessively selfish, using as a tool to achieve the purpose to others, irresponsible, easy liars in common. They were recognized that it is people of harmful to society, impulsive, attacking others body, ignorant others safety, enjoying or callousing others suffers. But, another aggressive behaviors are described as pro-social aggressive acts as the cops bring under control by firearms to hostage committing a crime in social norms. The proper aggression is related with national security and safety of the people that is pro-social aggression for nation and human society. Security service with the legal grounds and the convinced commitment needs self-giving works, self-sacrificial security-activity is in the center of security service. These days, psychologists reveal the people of psychopathy are CEO, politician, broadcaster, surgeon, special forces, police officer. And they distinguish themselves and contribute to a community in various fields. Therefor, this research wanted to find out the relationship between fearlessness, coldheartedness in the PPI-R(applying to the university student for checking psychopathy, except anti-social traits) and pro-social aggression, self-sacrificial security-activity.

  • PDF

A Study on the Cyber Weapons Classification System (사이버무기 분류체계에 관한 시론)

  • Lee, Yongseok;Kwon, Hunyeong;Choi, Jeongmin;Lim, Jongin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.905-917
    • /
    • 2018
  • The sovereign state has the right to engage in self-defense or war with the approval of the Security Council when it receives an invasion of territory from a foreign country. War is conducted under the principle of the necessity and proportionality of self-defense. In case of cyber attack, proportional countermeasure must be made through attack means and effect analysis, and cyber weapons need to be classified for this purpose. Therefore, this study aims to provide a rational and legitimate response according to the necessity and proportionality of the self - defense right by suggesting definition and classification criteria of cyber weapons. In this study, cyber weapons were defined as "means of collecting, attacking, and protecting information using cyber technology in the cyber space according to military objectives. Based on existing weapon systems and public cyber weapons cases, cyber weapons were classified as (1) cyber weapons for information gathering, (2) cyber weapons for attack, and (3) cyber weapons for protection. We suggest the considerations for applying the proportional response according to this functional classification. In order to guarantee the principle of proportionality to cyber attacks in the future, the classification study based on the cyber weapon effect should be conducted. This study has conducted an exploratory study on the classification of cyber clusters which constitutes one axis of the proportionality principle.

Temporality and Modernity: A Reading of William Carlos Williams's Spring and All (시간성과 모더니티 -윌리암스의 『봄과 모든 것』을 중심으로)

  • Son, Hyesook
    • Journal of English Language & Literature
    • /
    • v.55 no.1
    • /
    • pp.83-105
    • /
    • 2009
  • Modern poetry begins as criticism of modernity and, by so doing, rejects its idea of time. Modernity emphasizes sequential, linear, and irreversible time and progress. Williams rejects the modern view of time, and attempts to substitute literature for history assuming that literature can take us into the immediacy of time. His poetry asserts the true moment of experience as an immediacy, of words co-existent with things. He suggests that modernity and its idea of time already led to World War I and could clearly lead to an actual, manmade apocalypse with continued technological progress. Already in the 1920s, Williams sensed that he was living in a world where such an end could come all true, which is why Spring and All, his greatest early achievement, begins with a parody of the modern apocalypse. Throughout the work, Williams criticizes "crude symbolism" and expresses his longing to annihilate "strained associations," for he believes that the metaphoric or symbolic association is related to order, the center, and the traditional concept of time itself. The metonymic model of Spring and All substitutes a self-reflexive, open-ended, and indeterminate structure of time for the linear and closed one. Instead of supplying an end, Williams only asserts the rebirth of time and attempts to arrive at immediacy while attacking the mediacy of traditional art. His characteristic use of fragmentation and abrupt juxtapositions disrupts the reader's generic, conceptual, syntactic, and grammatical expectations. His radical poetic experiments, such as the isolation of words and the disruption of syntax, produce a sense of immediacy and force the reader to confront the presence of the poem. His destruction of traditional forms, of the tyrannous designs of history and time, opens up rather than closes the possibility of signification, and takes us into a moment of beginning while disallowing temporal distancing. Spring and All, as a criticism of the modern idea of time, asks us to view Williams's work not as an ahistorical text but as a cultural subversion of modernity.

Biological Control of Thrips Using a Self-produced Predatory Mite Stratiolaelaps scimitus (Acari: Laelapidae) in the Greenhouse Chrysanthemum (시설재배지 국화에서 자가생산한 뿌리이리응애 (응애아강: 가시진드기과)를 활용한 총채벌레의 생물적 방제)

  • Jung, Duck-Oung;Hwang, Hwal-Su;Kim, San-Young;Lee, Kyeong-Yeoll
    • Korean journal of applied entomology
    • /
    • v.58 no.3
    • /
    • pp.233-238
    • /
    • 2019
  • For greenhouse crops, thrips is one of the major insect pests, but its control is difficult owing to short generation time, rapid escaping behavior, and development of pesticide resistance. Stratiolaelaps scimitus (Womersley) is a soil-dwelling predatory mite attacking various soil invertebrate species, including thrips. Using the method by growers' self-production, we mass-reared S. scimitus colony and investigated thrips control in the greenhouse chrysanthemum. The initial density of thrips was six individuals/flower. The treatment with one S. scimitus box in the greenhouse was estimated to be $1,000individuals/m^2$. From August to September 2018, the greenhouse was released with a total of 10 boxes of S. scimitus. The density of thrips in the untreated and the treated cultivar was $53.7{\pm}7.0$ and $13.5{\pm}1.7$ on the late September, respectively, which indicated a reduction of 74.9% in the treated cultivar. Our results suggest that S. scimitus was highly effective for the control of thrips in the greenhouse chrysanthemum although temperature is very high during the summer season.