• Title/Summary/Keyword: 공격적 행동성

Search Result 200, Processing Time 0.025 seconds

The Main and Interaction Effects of Day-care Experiences and Maternal Parenting Behavior on Preschoolers' Problem Behaviors (보육경험과 어머니의 양육행동이 유아의 문제행동에 미치는 주효과와 상호작용 효과)

  • Choi, Mi Na;Shin, Nana
    • Korean Journal of Childcare and Education
    • /
    • v.11 no.2
    • /
    • pp.283-310
    • /
    • 2015
  • The purpose of this study was to examine the main and interaction effects of day-care experiences and maternal parenting behavior on preschoolers' externalizing and internalizing problem behaviors. A total of 248 preschoolers(112 boys and 136 girls) and their mothers participated in this study. Mothers provided information about their children's day-care experiences(i.e., age of entry, hours per week, days per week, and number of day care centers attended by the preschoolers), their parenting behavior, and their children's problem behavior. Data were analyzed using correlations, multiple and hierarchical regressions, and post-hoc analysis suggested by Aiken and West(1991). First, preschoolers who frequently changed day-care centers showed higher levels of aggression. Second, maternal logical explanation, coercive and neglecting parenting behavior significantly influenced preschoolers' externalizing and internalizing problem behavior. Finally, interactions of day-care experiences and maternal parenting behavior were significant in predicting preschoolers' problem behavior. These findings suggest that day-care experiences need to be considered with other family variables in predicting preschoolers' developmental outcomes.

Technique for PIN Entry Using an Accelerometer Sensor and a Vibration Sensor on Smartphone (스마트폰에서 가속도 센서와 진동 센서를 이용한 PIN 입력 기법)

  • Jung, Changhun;Jang, RhongHo;Nyang, DaeHun;Lee, KyungHee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.12
    • /
    • pp.497-506
    • /
    • 2017
  • There have been previous researches about user authentication by analyzing the user's gait or behavior or action using the accelerometer sensor of smartphone, but there was a lack of user convenience to apply PIN entry. In this paper, we propose the technique for PIN entry without a touch on smartphone, the technique uses an accelerometer sensor and a vibration sensor built in the smartphone to enter the PIN. We conducted a usability experiment using the proposed technique and confirmed that the usability can be increased according to users become accustomed to this technique and that the users can enter PIN with 12.9 seconds and a probability of 100% on average. Also we conducted a security experiment and confirmed that an attack success rate is 0% when an attacker attacked the user using the recording attack and that it is more secure than the previous PIN entry technique. As a result, we was able to confirm that this technique can be used sufficiently.

Adaptive Anomaly Movement Detection Approach Based On Access Log Analysis (접근 기록 분석 기반 적응형 이상 이동 탐지 방법론)

  • Kim, Nam-eui;Shin, Dong-cheon
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.45-51
    • /
    • 2018
  • As data utilization and importance becomes important, data-related accidents and damages are gradually increasing. Especially, insider threats are the most harmful threats. And these insider threats are difficult to detect by traditional security systems, so rule-based abnormal behavior detection method has been widely used. However, it has a lack of adapting flexibly to changes in new attacks and new environments. Therefore, in this paper, we propose an adaptive anomaly movement detection framework based on a statistical Markov model to detect insider threats in advance. This is designed to minimize false positive rate and false negative rate by adopting environment factors that directly influence the behavior, and learning data based on statistical Markov model. In the experimentation, the framework shows good performance with a high F2-score of 0.92 and suspicious behavior detection, which seen as a normal behavior usually. It is also extendable to detect various types of suspicious activities by applying multiple modeling algorithms based on statistical learning and environment factors.

  • PDF

The Effects of Self-Differentiation and Ego-Resilience on Service Maladjustment Behaviors of Social Service Agent (사회복무요원의 자아분화와 자아탄력성이 복무 부적응행동에 미치는 영향)

  • Lee, Kyung-hee;Park, Jung-yoone
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.4
    • /
    • pp.60-76
    • /
    • 2018
  • The objective of this study was to determine the effects of self-differentiation and ego-resilience on service maladjustment behaviors of Social Service Agent. To achieve this, we chose these research questions. To verify these research questions, data were collected by distributing 470 questionnaires to Social Service Agent serving in service organizations located in Seoul. Four hundred twenty-seven surveys were used for statistical analysis. The results of this study are as follows: First, Social Service Agents were shown to generally adjust well to service, as self-differentiation and ego-resilience were slightly higher than the median, while service maladjustment behavior was slightly lower than the median. Second, when the effects of sociodemographic characteristics, self-differentiation and ego-resilience on service maladjustment behavior were studied, all values of sociodemographic characteristics, self-differentiation and ego-resilience affected all lower factors of service maladjustment behavior with significance. For social withdrawal, the effectiveness of interpersonal relations, optimistic attitude, and the degree of family regression had a negative correlation, and emotional divorce, education level, and term of service had a positive correlation. The degree of family regression, anger management, and cognitive function vs. emotional function had a negative correlation with hyperactivity while self unity had a positive one. Family regression, cognitive function vs. emotional function, anger management, and family's economic level negatively correlated with aggression. Family regression, optimistic attitude, cognitive function vs. emotional function, family's economic level and term of service had a negative correlation with obsession and compulsion.

Research on Emergency CAS Mission asset scoring for cyber battle damage assesment (사이버 전투 피해평가를 위한 긴급 CAS 임무 자산 스코어링 연구)

  • Kim, Jaekeun;Kim, Seongjung;Kim, Kookjin;Lee, Donghwan;Shin, Dongil;Shin, Dongkyoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.157-160
    • /
    • 2020
  • 사이버 공격은 조직과 국가에 큰 피해를 주려는 목적으로 정보를 가로채고 파괴하는 의도적인 행동으로 빚어지는 경우가 많다. 이에 따라 국제 표준화 기구(ISO)는 ISO/IEC 27000 시리즈 등 정보 자산의 보호를 위한 표준 문서를 지침으로 제공한다. 하지만 지침만 제공할 뿐 자산 보호를 위한 구체적인 방법이나 절차가 포함되어 있지 않다. 본 연구에서는 공군의 긴급 CAS(Close Air Support) 작전을 대상으로 추후 사이버 전투 피해평가를 위해 사이버 공격에 의한 정보 자산에 대한 점수를 가산화 한다. 긴급 CAS 작전 시뮬레이션 진행 후 도출된 요소를 가지고 객관적인 수치라고 할 수 있는 CIA(Confidentiality, Integrity, Availability)지표들과 군 정보를 접목시켜 자산의 중요성을 계산하고 나아가 가중치를 주어 차별성을 가지게 된다.

The Structure of Driving Behavior Determinants and Its Relationship between Reckless Driving Behavior (운전행동 결정요인의 구성과 위험운전행동과의 관계)

  • Ju Seok Oh ;Soon Chul Lee
    • Korean Journal of Culture and Social Issue
    • /
    • v.17 no.2
    • /
    • pp.175-197
    • /
    • 2011
  • This study aimed to expand and reconstruct the Driving Behavior Determinants' factors in order to confirm the relationship between Driving Behavior Determinants(DBD) and drivers' reckless driving behavior level. To expand the structure of DBD, drivers anger, introversion and type A characteristics were added, which were never considered as related factors in existing DBD studies before. The correlations between the new factors of DBD and reckless driving behavior(includes driver's personal records of driving experiences for the last three years) were verified. A factor analysis result showed us that new DBD questionnaire consists of five factors such as, 'Problem Evading', 'Benefits/Sensation Seeking', 'Anti-personal Anxiety', 'Anti-personal Anger', and 'Aggression'. Also, reckless driving behavior consists of 'Speeding', 'Inexperienced Coping', 'Wild Driving', 'Drunken Driving', and 'Distraction'. The result of correlation between the DBD and reckless driving behavior indicates that inappropriate level of DBD is highly correlated with dangerous driving behavior and strong possibilities of traffic accidents. Based on these results, we might be able to discriminate drivers according to DBD level and predict their reckless driving behavior through a standardization procedure. Futhermore, this will make us to provide drivers differentiated safety education service.

  • PDF

Individual Pig Detection Using Kinect Depth Information (키넥트 깊이 정보를 이용한 개별 돼지의 탐지)

  • Choi, Jangmin;Lee, Jonguk;Chung, Yongwha;Park, Daihee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.319-326
    • /
    • 2016
  • Abnormal situation caused by aggressive behavior of pigs adversely affects the growth of pigs, and comes with an economic loss in intensive pigsties. Therefore, IT-based video surveillance system is needed to monitor the abnormal situations in pigsty continuously in order to minimize the economic demage. In this paper, we propose a new Kinect camera-based monitoring system for the detection of the individual pigs. The proposed system is characterized as follows. 1) The background subtraction method and depth-threshold are used to detect only standing-pigs in the Kinect-depth image. 2) The moving-pigs are labeled as regions of interest. 3) A contour method is proposed and applied to solve the touching-pigs problem in the Kinect-depth image. The experimental results with the depth videos obtained from a pig farm located in Sejong illustrate the efficiency of the proposed method.

Geospatial analysis of terrorist bombing attacks in Afghanistan (아프가니스탄 폭탄테러공격에 관한 지리-공간 분석)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.261-290
    • /
    • 2012
  • Since the launch of Operation Enduring Freedom in 2001, Afghanistan has been a critical battle ground for war against global terrorism. For the last 10 years, the U.S. government and its allies and the Afghan government have put a considerable effort to crush terrorists and insurgents and at the same time to construct nationwide governance system. Yet, the noble mission still seems far from complete. Terrorist or insurgent operations in Afghanistan are still active and troublesome. Thus this subject continues to draw a considerable attention of research or investigative reports to grasp an insightful knowledge or intelligence that may allow a better handling of terrorist troubles in this war-torn nation. This study hopes to serve this purpose by providing analyzed information on terrorist bombings in Afghanistan occurred between 2004 and 2007. It adopts GIS (Geographic information System) analysis technique to uncover spatially patterned aspects of terrorist bombing attacks in Afghanistan. The specific focus of this study is to examine whether terrorists behave rationally when they decide which targets to attack. For analysis, this study will focus on examining whether characteristics of localities have certain impact on the risk of being targets of terrorist bombing attacks. To examine the hypothesis of this study, it will explore how the spatial risk of becoming targets of terrorist bombing attack interacts with cost necessary for executing a ttack paid b y terrorists; 1) by demonstrating the spatial distribution of bombing attacks in Afghanistan and 2) by estimating the distance between headquarters (or home base) of terrorists groups and the bombed target area.

  • PDF

Defending Multiple Terrorist Targets (대테러전략의 게임이론적 분석)

  • Lee, Sanghoon K.
    • KDI Journal of Economic Policy
    • /
    • v.35 no.3
    • /
    • pp.91-124
    • /
    • 2013
  • This paper analyzes a situation where multiple targets are exposed to a potential terrorist attack. The probability of an attack is determined endogenously in a game where a terrorist chooses the target while the targets independently determine the level of deterrence. As each target tries to divert an attack to others, the symmetric equilibrium becomes suboptimal and exhibits dispersion in the level of deterrence. The analysis shows that the first best deterrence level may be achieved when the targets can write a binding risk-sharing contract. Such a contract has limited applicability however as it suffers from a potential verification problem.

  • PDF

Social Psychological Characteristics of Juvenile Offenders (소년범죄자의 사회심리적 성격특성)

  • Koh, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.702-711
    • /
    • 2021
  • In order to examine the type of PAI profile for criminally charged juvenile offenders, the study sought to find out personality types and behavioral characteristics of 251 juvenile offenders and 173 ordinary adolescents from 2018-2020. Looking at the overall profiles of juvenile offenders and ordinary adolescents, we found differences in Infrequency(INF), Mania(MAN), Antisocial Features(ANT), Alcohol problems(ALC), Drug problems(DRG), Aggression (AGG), and Dominance(DOM) and Warmth(WRM). Based on these results, we perform clustering as factors Antisocial features(ANT), Aggression(AGG), and Dominance (DOM) with an average difference of more than five points. It was classified as Cluster 1 with a high percentage of adolescents and Cluster 2 with a high percentage of juvenile offenders, and Cluster 1 was named as a defense group because it showed a similar model to the profile of ordinary adolescents. The profile type of cluster 2 was named externalization, which can be represented as an externalization group. The results were similar to previous studies, and the profile type of juvenile offenders has higher overall clinical scale than that of ordinary adolescents, indicating behavioral problems. Continued research on juvenile offenders could lead to understanding of youth as well as juvenile offenders.