• Title/Summary/Keyword: 선행적 공격성

Search Result 49, Processing Time 0.031 seconds

The Effect of Tem Parament and Parenting on Children's Reactive and Proactive Aggression (아동의 반응적, 선행적 공격성에 대한 기질과 부모양육태도의 영향)

  • Lee, Ju-Lie
    • Journal of Families and Better Life
    • /
    • v.28 no.4
    • /
    • pp.117-125
    • /
    • 2010
  • This study examines the additive and interactive effects of temperament and parenting on children's reactive and proactive aggression. The participants were 2844 4th graders(1524 boys, 1320 girls) from the Korea Youth Panel Study(KYPS). The results show sthat : (1) Children's emotion regulation influenced reactive aggression, whereas sensation seeking influenced proactive aggression. Children's anger/frustration influenced both subtypes of aggression. (2) Harsh parenting influenced children's proactive aggression. (3) There are some significant temperament $\times$ temperament and temperament $\times$ parenting interactions.

Design and Implementation of Efficient detection System for Network Scanning (효율적인 네트워크 스캐닝 탐지 시스템의 설계 및 구현)

  • Lee, Hyun-Joo;Han, Young-Ju;Kim, Hui-Seung;Chung, Tae-Myung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1019-1022
    • /
    • 2004
  • 일반적으로 해커들은 네트워크상에 있는 목표(Target) 시스템에 대해 공격을 시도하기 위한 사전 단계로 포트 스캐닝(Port Scanning)을 통한 정보 수집의 단계를 선행하게 된다. 이 때, 사용되는 포트 스캐닝 기술은 이미 여러가지 방법이 알려져 있으며, 네트워크 관리자의 입장에서는 정상적인 네트워크 접속과 포트 스캐닝 공격을 구분해야만 한다. 본 논문에서는 네트워크를 통한 공격의 가장 많은 부분을 차지하고 있는 스캐닝 공격을 빠르고 효율적으로 탐지할 수 있는 룰 기반의 침입 탐지 시스템을 커널레벨과 응용레벨에서 설계하고 구현하였다.

  • PDF

Effects of Social Exclusion on Displaced Aggression: the Mediatingon Effect of Stress and Conditional Direct Effect of Social Support (사회적 배제가 전위된 공격성에 미치는 영향: 스트레스의 매개효과 및 사회적지지의 조건부 직접효과)

  • Yoonjae Noh;Sangyeon Yoon
    • Korean Journal of Culture and Social Issue
    • /
    • v.29 no.4
    • /
    • pp.455-476
    • /
    • 2023
  • This study focused on the characteristics of motiveless crimes that mainly originated from interpersonal problems and were acts of revenge against innocent third parties. This study confirmed the relationship between the experience of social exclusion and displaced aggression and examined the relationship between the two variables. We sought to confirm the role of related factors such as stress and social support. For this purpose, we established and tested hypotheses about the mediatingon effect of stress and the moderated mediatingon effect of social support on the effect of social exclusion experience on displaced aggression among 353 adult males aged between 19 and 49 years. The main results are that, first, social exclusion had a positive effect on displaced aggression. Second, stress was found to partially mediate the relationship between social exclusion and displaced aggression. Third, the hypothesis that social support would moderate the mediating effect of stress was not provedvaild, but the conditional direct effect of social support was confirmed in the mediation model. In other words, social support did not affect the indirect effect mediated by stress, but appeared to moderate the direct effect between social exclusion and displaced aggression. Social exclusion's prediction of displaced aggression was significant only in the average social support group (mean) and the high group (M+1SD), and appeared to increase as the group increased. This means that in groups with high social support, displaced aggression is used as a stress control strategy, which is a different result from previous studies that found that social support plays a role in lowerings aggression. People with low levels of social support showed unexpected results in that they used displaced aggression less frequently despite their experiencinge of social exclusion. In the discussion, the social implications of these results were interpreted, and additional research ideas were proposed to specify the relationship between social exclusion and displaced aggression.

Social Behaviors, Psychosocial Adjustments, and Language Ability of Aggressive Victims, Passive Victims, and Bullies in Preschool Children (또래 괴롭힘 공격적 피해, 수동적 피해 및 가해 유아의 사회적 행동, 심리사회적 적응과 언어능력)

  • Shin, Yoo-Lim
    • Journal of the Korean Home Economics Association
    • /
    • v.49 no.6
    • /
    • pp.1-12
    • /
    • 2011
  • This study investigated prevalence rates and differences in social behaviors, psychosocial adjustments, and language ability of preschool children who engaged in bully/victim subgroups: aggressive victims, passive victims, bullies, and non-involved. The participants were 297 preschool children and their teachers in Jeju City. The teachers measured children's peer victimization, social behaviors, and teacher-child relationships. Children's language ability and self-concept were also assessed by individual interview. There were significant differences in social behaviors, psychosocial adjustments, and language ability among the bully/victim subgroups. Aggressive victims included in a high risk group characterized by a high level of aggression, ADHD, peer rejection as well as conflicted relationships with teachers. Moreover, they had limited language ability. The findings highlight behavioral heterogeneity among the bully/victim subgroups in early childhood.

Optimal thresholds of algorithm and expansion of Application-layer attack detection block ALAB in ALADDIN (ALADDIN의 어플리케이션 계층 공격 탐지 블록 ALAB 알고리즘의 최적 임계값 도출 및 알고리즘 확장)

  • Yoo, Seung-Yeop;Park, Dong-Gue;Oh, Jin-Tae;Jeon, In-Ho
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.127-134
    • /
    • 2011
  • Malicious botnet has been used for more malicious activities, such as DDoS attacks, sending spam messages, steal personal information, etc. To prevent this, many studies have been preceded. But malicious botnets have evolved and evaded detection systems. In particular, HTTP GET Request attack that exploits the vulnerability of the application layer is used. ALAB of ALADDIN proposed by ETRI is DDoS attack detection system that HTTP GET, Incomplete GET request flooding attack detection algorithm is applied. In this paper, we extend Incomplete GET detection algorithm of ALAB and derive the optimal configuration parameters to verify the validity of the algorithm ALAB by the study of the normal and attack packets.

A Study on the Interrelationship between DISC Personality Types and Cyber Security Threats : Focusing on the Spear Phishing Attacks (DISC 성격 유형과 사이버 보안 위협간의 상호 연관성에 관한 연구 : 스피어피싱 공격 사례를 중심으로)

  • Kim, Mookjung;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.215-223
    • /
    • 2019
  • The recent trend of cyber attack threat is mainly APT (Advanced Persistent Threat) attack. This attack is a combination of hacking techniques to try to steal important information assets of a corporation or individual, and social engineering hacking techniques aimed at human psychological factors. Spear phishing attacks, one of the most commonly used APT hacking techniques, are known to be easy to use and powerful hacking techniques, with more than 90% of the attacks being a key component of APT hacking attacks. The existing research for cyber security threat defense is mainly focused on the technical and policy aspects. However, in order to preemptively respond to intelligent hacking attacks, it is necessary to study different aspects from the viewpoint of social engineering. In this study, we analyze the correlation between human personality type (DISC) and cyber security threats, focusing on spear phishing attacks, and present countermeasures against security threats from a new perspective breaking existing frameworks.

A Study on Priority Analysis of Evaluation Factors for Cyber Threats using Open Source Intelligence (OSINT) (공개출처정보를 활용한 사이버위협 평가요소의 중요도 분석 연구)

  • Kang, Sungrok;Moon, Minam;Shin, Kyuyong;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.49-57
    • /
    • 2020
  • It is no exaggeration to say that we live with cyber threats every day. Nevertheless, it is difficult for us to obtain objective information about cyber threats and attacks because it is difficult to clearly identify the attacker, the purpose of attack, and the range of damage, and rely on information from a single source. In the preceding research of this study, we proposed the new approach for establishing Database (DB) for cyber attacks using Open Source Intelligence(OSINT). In this research, we present the evaluation factors for cyber threats among cyber attack DB and analyze the priority of those factors in oder to quantify cyber threats. We select the purpose of attack, attack category, target, ease of attack, attack persistence, frequency of OSINT DB, and factors of the lower layer for each factor as the evaluation factors for cyber threats. After selection, the priority of each factor is analyzed using the Analytic Hierarchy Process(AHP).

The Relationship between Players' Characteristics and Trolling Behavior: Focused on (플레이어의 개인 성향과 게임 내의 트롤링 행위의 관계 : <리그 오브 레전드>를 중심으로)

  • Lee, Jun Myong;Na, Jung Hwan;Doh, Young Yim
    • Journal of Korea Game Society
    • /
    • v.16 no.1
    • /
    • pp.63-72
    • /
    • 2016
  • This study explores how players' characteristic factors affect on trolling behaviors. The data was collected through online survey from online communities of League of Legends(N=914, male=770, female=144, average of age=22.19, SD of age=4.78). Questionnaire includes age, level/tier, self-esteem, basic psychological needs, aggression, and trolling behaviors. Result shows that player characteristic factors which influence on players trolling behavior are 'age', 'physical aggression', 'verbal aggression'. Discussion suggests that the understanding of player's characteristics which influence on trolling behaviors has to precede the improvement of system structure in order to eradicate trolling behaviors.

A Study on the Factors Influencing College Students' Smartphone Addiction

  • Kim, Kyung Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.173-181
    • /
    • 2020
  • The objective of the present study was to identify the factors influencing the smartphone addiction among college students and to obtain basic information in terms of enhancing proper use of the smartphone. Based on the previous literature with constructs of depression, aggression, self-control and smartphone addiction, a research model was prepared. A total of 332 students were selected from 5 universities in G Metropolitan City and collected data were analyzed through hierarchical multiple regression. The major results of the study were as follows. First, self-control was the most powerful predictor of smartphone addiction. Second, anger caused smartphone addiction to increase whereas social experience caused smartphone addiction to decrease. Third, depression did not cause smartphone addiction to increase. Finally, implications for preventing and decreasing the smartphone addiction among college students were also provided.

The Design of IPv6 Traffic Analysis Tool for Detecting Network Attacks (네트워크 공격을 탐지하기 위한 IPv6 트래픽 분석 도구)

  • Oh, Seung-Hee;Oh, Jin-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.848-851
    • /
    • 2005
  • The BcN is applying from public networks to local networks and each terminal step by step until 2007. By IPv6 network introduction, IP address lack problem can be solved. However, the threats that network attacks of another method can be caused with new problem of network security in IPv6 networks. In this paper, we suggest the traffic analysis tool which analyze IPv6 traffic efficiently to detect/response network attack in IPv6 environment. The implemented IPv6 traffic analysis tool uses IPv6 header to analyze traffic and detect network attacks. Also, we also propose detection algorithm to detect network attacks in IPv6 networks.

  • PDF