• Title/Summary/Keyword: New version

Search Result 1,082, Processing Time 0.035 seconds

Comparative Morphology and Morphometry of the Olfactory Organ of Carassius auratus and Carassius cuvieri (Cypriniformes, Cyprinidae) (붕어 Carassius auratus와 떡붕어 Carassius cuvieri 후각기관의 형태 및 형태계측학적 비교 연구)

  • Hyun-Tae Kim;Jin-hui Lee
    • Korean Journal of Ichthyology
    • /
    • v.35 no.3
    • /
    • pp.171-176
    • /
    • 2023
  • The olfactory organ of Carassius auratus and C. cuvieri was compared morphologically and morphometrically using stereomicroscopy and statistical program (SPSS version 18.0). The external morphology of the olfactory organ consists of the open semicircular anterior and posterior nostril, and nasal flap. The internal structure showed the oval rosette consisting of several lamellae arranged radiately. In statistical analysis of standard length (SL), olfactory lamellar number (LN), and SL/LN ratio between two species using independent two sample t-test and Pearson's correlation and coefficient, C. cuvieri is the longer SL than that of C. auratus and C. auratus LN (14~20) is lager than that of C. cuvieri (14~16) (P<0.001) and C. auratus LN/SL ratio (12.7±0.7%) is larger than that of C. cuvieri (8.2±0.6%). These results suggest that i) open semicircular nostrils is functional morphology to offset the boundary layer and ii) the lager LN of smaller C. auratus may be a morphological adaptation to reflect its higher olfactory dependence than C. cuvieri and iii) such interspecific difference in LN and LN/SL ratio could be applied as a new taxonomic trait for identification.

A Research on RC3(RMF-CMMC Common Compliance) meta-model development in preparation for Defense Cybersecurity (국방 사이버보안을 위한 RMF-CMMC 공통규정준수 메타모델 개발방안 연구)

  • Jae-yoon Hwang;Hyuk-jin Kwon
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.123-136
    • /
    • 2024
  • The U.S. Department of Defense, leading global cybersecurity policies, has two main cybersecurity frameworks: the Cybersecurity Maturity Model Certification (CMMC) for external defense industry certification, and the Risk Management Framework (RMF) for internal organizational security assessments. For Republic of Korea military, starting from 2026, the Korean version of RMF (K-RMF) will be fully implemented. Domestic defense industry companies participating in projects commissioned by the U.S. Department of Defense must obtain CMMC certification by October 2025. In this paper, a new standard compliance meta-model (R3C) development methodology that can simultaneously support CMMC and RMF security audit readiness tasks is introduced, along with the implementation results of a compliance solution based on the R3C meta-model. This research is based on practical experience with the U.S. Department of Defense's cybersecurity regulations gained during the joint project by the South Korean and U.S. defense ministries' joint chiefs of staff since 2022. The developed compliance solution functions are being utilized in joint South Korean-U.S. military exercises. The compliance solution developed through this research is expected to be available for sale in the private sector and is anticipated to be highly valuable for domestic defense industry companies that need immediate CMMC certification.

A Review of the List of Plant Diseases in Korea and the Names of Korean Tree Diseases (한국식물병명목록과 우리나라 나무병 이름에 대한 소고)

  • Byeongjin Cha;Sang-Tae Seo;Sang-sup Han
    • Research in Plant Disease
    • /
    • v.30 no.1
    • /
    • pp.1-12
    • /
    • 2024
  • Since the List of Plant Diseases in Korea (DisList) was first published in 1986, the 6th edition appeared 36 years later. In 2023, the 6.1 edition, a revised and improved version of the 6th edition, was released to the public on the web free of charge. The contents of DisList increased, with the number of hosts increasing from 437 taxa to 1,420 taxa and the number of disease species increasing from 1,539 to 6,680. Among these, tree diseases are 3,586 species and their hosts include 504 taxa, providing much help to experts who need them. Meanwhile, the importance of accurate disease names continues to grow with the legalization of tree care, but many disease names are still inappropriate or misused, causing confusion. Disease names that do not follow the naming regulations are still registered, and even if the same pathogen infects hosts of the same taxa, the disease names are given differently, and there are many disease names that do not indicate the characteristics of the disease. Also, there are diseases reported without Korean names. In order to make DisList better, the review committee for disease names should establish the regulations to review and register disease names, and establish a system to review new disease names before publishing papers.

Evaluation of Social Nicotine Dependence Using the Kano Test for Social Nicotine Dependence (KTSND-K) Questionnaire in Korea (Kano Test for Social Nicotine Dependence(KTSND-K) 설문지를 통한 한국인의 사회적 니코틴의존성의 평가)

  • Jeong, Jae Hee;Choi, Sang Bong;Jung, Wou Young;Byun, Min Gwang;Park, Moo Suk;Kim, Young Sam;Kim, Se Kyu;Chang, Joon;Yoshii, Chiharu;Kim, Sung Kyu
    • Tuberculosis and Respiratory Diseases
    • /
    • v.62 no.5
    • /
    • pp.365-373
    • /
    • 2007
  • Background: Smoking is one of the most important leading causes of morbidity and mortality. Smoking habit is recognized as nicotine dependence, which consists of physical and psychosocial dependence. To evaluate social nicotine dependence, the Kano Test for Social Nicotine Dependence (KTSND) working group developed a new questionnaire, which consists of 10 questions with a total score of 30 in Japan. We examined the social nicotine dependence among healthy adults using the new KTSND questionnaire and evaluated validity of the KTSND questionnaire in Korea. Method: We applied Korean KTSND questionnaire version 2 to employees of hospital, university students and people for medical examination and promotion test. Complete data obtained from the 741 responders were analyzed. Result: The mean age of responders was 31.8 years. Among them, males were 57.8%. Current smokers, ex-smokers, and non-smokers were 13.8%, 12.8%, and 73.4% respectively. According to smoking status, the total KTSND scores of current smokers were significantly higher than those of ex-smokers, and of non-smokers ($17.1{\pm}5.4$ versus $14.3{\pm}5.5$, and $12.3{\pm}5.5$, $p{\leq}0.001$). The total KTSND scores of males were higher than those of females, suggesting that males have a propensity for depending nicotine socially much more than females ($14.3{\pm}5.7$ and $11.7{\pm}5.4$ respectively, p<0.001). Eight of ten questions produced significantly different scores among three different smoking groups. When current smokers were sub-classified by heavy smoking index (HSI) that represented physical nicotine dependence, we did not find a significant difference of KTSND score between low HSI group (<4) and high HSI group (${\geq}4$), This finding suggested that the psychosocial dependence might play a different role from physical nicotine dependence in smoking. Most of the non-smokers (62.5%) had an experience of harmful passive smoking especially in public place. Conclusion: Our study suggested that the KTSND questionnaire could be a useful method to evaluate psychosocial aspects of smoking.

The Adoption and Diffusion of Semantic Web Technology Innovation: Qualitative Research Approach (시맨틱 웹 기술혁신의 채택과 확산: 질적연구접근법)

  • Joo, Jae-Hun
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.33-62
    • /
    • 2009
  • Internet computing is a disruptive IT innovation. Semantic Web can be considered as an IT innovation because the Semantic Web technology possesses the potential to reduce information overload and enable semantic integration, using capabilities such as semantics and machine-processability. How should organizations adopt the Semantic Web? What factors affect the adoption and diffusion of Semantic Web innovation? Most studies on adoption and diffusion of innovation use empirical analysis as a quantitative research methodology in the post-implementation stage. There is criticism that the positivist requiring theoretical rigor can sacrifice relevance to practice. Rapid advances in technology require studies relevant to practice. In particular, it is realistically impossible to conduct quantitative approach for factors affecting adoption of the Semantic Web because the Semantic Web is in its infancy. However, in an early stage of introduction of the Semantic Web, it is necessary to give a model and some guidelines and for adoption and diffusion of the technology innovation to practitioners and researchers. Thus, the purpose of this study is to present a model of adoption and diffusion of the Semantic Web and to offer propositions as guidelines for successful adoption through a qualitative research method including multiple case studies and in-depth interviews. The researcher conducted interviews with 15 people based on face-to face and 2 interviews by telephone and e-mail to collect data to saturate the categories. Nine interviews including 2 telephone interviews were from nine user organizations adopting the technology innovation and the others were from three supply organizations. Semi-structured interviews were used to collect data. The interviews were recorded on digital voice recorder memory and subsequently transcribed verbatim. 196 pages of transcripts were obtained from about 12 hours interviews. Triangulation of evidence was achieved by examining each organization website and various documents, such as brochures and white papers. The researcher read the transcripts several times and underlined core words, phrases, or sentences. Then, data analysis used the procedure of open coding, in which the researcher forms initial categories of information about the phenomenon being studied by segmenting information. QSR NVivo version 8.0 was used to categorize sentences including similar concepts. 47 categories derived from interview data were grouped into 21 categories from which six factors were named. Five factors affecting adoption of the Semantic Web were identified. The first factor is demand pull including requirements for improving search and integration services of the existing systems and for creating new services. Second, environmental conduciveness, reference models, uncertainty, technology maturity, potential business value, government sponsorship programs, promising prospects for technology demand, complexity and trialability affect the adoption of the Semantic Web from the perspective of technology push. Third, absorptive capacity is an important role of the adoption. Fourth, suppler's competence includes communication with and training for users, and absorptive capacity of supply organization. Fifth, over-expectance which results in the gap between user's expectation level and perceived benefits has a negative impact on the adoption of the Semantic Web. Finally, the factor including critical mass of ontology, budget. visible effects is identified as a determinant affecting routinization and infusion. The researcher suggested a model of adoption and diffusion of the Semantic Web, representing relationships between six factors and adoption/diffusion as dependent variables. Six propositions are derived from the adoption/diffusion model to offer some guidelines to practitioners and a research model to further studies. Proposition 1 : Demand pull has an influence on the adoption of the Semantic Web. Proposition 1-1 : The stronger the degree of requirements for improving existing services, the more successfully the Semantic Web is adopted. Proposition 1-2 : The stronger the degree of requirements for new services, the more successfully the Semantic Web is adopted. Proposition 2 : Technology push has an influence on the adoption of the Semantic Web. Proposition 2-1 : From the perceptive of user organizations, the technology push forces such as environmental conduciveness, reference models, potential business value, and government sponsorship programs have a positive impact on the adoption of the Semantic Web while uncertainty and lower technology maturity have a negative impact on its adoption. Proposition 2-2 : From the perceptive of suppliers, the technology push forces such as environmental conduciveness, reference models, potential business value, government sponsorship programs, and promising prospects for technology demand have a positive impact on the adoption of the Semantic Web while uncertainty, lower technology maturity, complexity and lower trialability have a negative impact on its adoption. Proposition 3 : The absorptive capacities such as organizational formal support systems, officer's or manager's competency analyzing technology characteristics, their passion or willingness, and top management support are positively associated with successful adoption of the Semantic Web innovation from the perceptive of user organizations. Proposition 4 : Supplier's competence has a positive impact on the absorptive capacities of user organizations and technology push forces. Proposition 5 : The greater the gap of expectation between users and suppliers, the later the Semantic Web is adopted. Proposition 6 : The post-adoption activities such as budget allocation, reaching critical mass, and sharing ontology to offer sustainable services are positively associated with successful routinization and infusion of the Semantic Web innovation from the perceptive of user organizations.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

X-tree Diff: An Efficient Change Detection Algorithm for Tree-structured Data (X-tree Diff: 트리 기반 데이터를 위한 효율적인 변화 탐지 알고리즘)

  • Lee, Suk-Kyoon;Kim, Dong-Ah
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.683-694
    • /
    • 2003
  • We present X-tree Diff, a change detection algorithm for tree-structured data. Our work is motivated by need to monitor massive volume of web documents and detect suspicious changes, called defacement attack on web sites. From this context, our algorithm should be very efficient in speed and use of memory space. X-tree Diff uses a special ordered labeled tree, X-tree, to represent XML/HTML documents. X-tree nodes have a special field, tMD, which stores a 128-bit hash value representing the structure and data of subtrees, so match identical subtrees form the old and new versions. During this process, X-tree Diff uses the Rule of Delaying Ambiguous Matchings, implying that it perform exact matching where a node in the old version has one-to one corrspondence with the corresponding node in the new, by delaying all the others. It drastically reduces the possibility of wrong matchings. X-tree Diff propagates such exact matchings upwards in Step 2, and obtain more matchings downwsards from roots in Step 3. In step 4, nodes to ve inserted or deleted are decided, We aldo show thst X-tree Diff runs on O(n), woere n is the number of noses in X-trees, in worst case as well as in average case, This result is even better than that of BULD Diff algorithm, which is O(n log(n)) in worst case, We experimented X-tree Diff on reat data, which are about 11,000 home pages from about 20 wev sites, instead of synthetic documets manipulated for experimented for ex[erimentation. Currently, X-treeDiff algorithm is being used in a commeercial hacking detection system, called the WIDS(Web-Document Intrusion Detection System), which is to find changes occured in registered websites, and report suspicious changes to users.

Assessing Impacts of Global Warming on Rice Growth and Production in Korea (지구온난화에 따른 벼 생육 및 생산성 변화 예측)

  • Shim, Kyo-Moon;Roh, Kee-An;So, Kyu-Ho;Kim, Gun-Yeob;Jeong, Hyun-Cheol;Lee, Deog-Bae
    • Journal of Climate Change Research
    • /
    • v.1 no.2
    • /
    • pp.121-131
    • /
    • 2010
  • This study was carried out to evaluate spatial variations in rice production areas by simulating rice growth and yield with CERES-Rice growth model under GCM $2{\times}CO_2$ climate change scenarios. A modified window version(v4.0) of CERES-Rice was used to simulate the growth and development of three varieties, representing early, medium, and late maturity classes. Simulated growth and yield data of the three cultivars under the climate for 1971 to 2000 was set as a reference. Compared with the current normal(1971 to 2000), heading period from transplanting to heading date decreased by 7~8 days for the climate in $2^{\circ}C$ increase over normal, and 16~18 days for the climate in UKMO with all maturity classes, while change of ripening period from heading to harvesting date was different with maturity classes. That is, physical maturity was shortened by 1~3 days for early maturity class and 14~18 days for late maturity class under different climate change scenarios. Rice yield was in general reduced by 4.5%, 8.2%, 9.9%, and 14.9% under the climate in $2^{\circ}C$, $3^{\circ}C$, $4^{\circ}C$, and about $5^{\circ}C$ increase, respectively. The yield reduction was due to increased high temperature-induced spikelet sterility and decreased growth period. The results show that predicted climate changes are expected to bring negative effects in rice production in Korea. So, it is required for introduction of new agricultural technologies to adapt to climate change, which are, for example, developing new cultivars, alternations of planting dates and management practices, and introducing irrigation systems, etc.

Evaluating Reverse Logistics Networks with Centralized Centers : Hybrid Genetic Algorithm Approach (집중형센터를 가진 역물류네트워크 평가 : 혼합형 유전알고리즘 접근법)

  • Yun, YoungSu
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.55-79
    • /
    • 2013
  • In this paper, we propose a hybrid genetic algorithm (HGA) approach to effectively solve the reverse logistics network with centralized centers (RLNCC). For the proposed HGA approach, genetic algorithm (GA) is used as a main algorithm. For implementing GA, a new bit-string representation scheme using 0 and 1 values is suggested, which can easily make initial population of GA. As genetic operators, the elitist strategy in enlarged sampling space developed by Gen and Chang (1997), a new two-point crossover operator, and a new random mutation operator are used for selection, crossover and mutation, respectively. For hybrid concept of GA, an iterative hill climbing method (IHCM) developed by Michalewicz (1994) is inserted into HGA search loop. The IHCM is one of local search techniques and precisely explores the space converged by GA search. The RLNCC is composed of collection centers, remanufacturing centers, redistribution centers, and secondary markets in reverse logistics networks. Of the centers and secondary markets, only one collection center, remanufacturing center, redistribution center, and secondary market should be opened in reverse logistics networks. Some assumptions are considered for effectively implementing the RLNCC The RLNCC is represented by a mixed integer programming (MIP) model using indexes, parameters and decision variables. The objective function of the MIP model is to minimize the total cost which is consisted of transportation cost, fixed cost, and handling cost. The transportation cost is obtained by transporting the returned products between each centers and secondary markets. The fixed cost is calculated by opening or closing decision at each center and secondary markets. That is, if there are three collection centers (the opening costs of collection center 1 2, and 3 are 10.5, 12.1, 8.9, respectively), and the collection center 1 is opened and the remainders are all closed, then the fixed cost is 10.5. The handling cost means the cost of treating the products returned from customers at each center and secondary markets which are opened at each RLNCC stage. The RLNCC is solved by the proposed HGA approach. In numerical experiment, the proposed HGA and a conventional competing approach is compared with each other using various measures of performance. For the conventional competing approach, the GA approach by Yun (2013) is used. The GA approach has not any local search technique such as the IHCM proposed the HGA approach. As measures of performance, CPU time, optimal solution, and optimal setting are used. Two types of the RLNCC with different numbers of customers, collection centers, remanufacturing centers, redistribution centers and secondary markets are presented for comparing the performances of the HGA and GA approaches. The MIP models using the two types of the RLNCC are programmed by Visual Basic Version 6.0, and the computer implementing environment is the IBM compatible PC with 3.06Ghz CPU speed and 1GB RAM on Windows XP. The parameters used in the HGA and GA approaches are that the total number of generations is 10,000, population size 20, crossover rate 0.5, mutation rate 0.1, and the search range for the IHCM is 2.0. Total 20 iterations are made for eliminating the randomness of the searches of the HGA and GA approaches. With performance comparisons, network representations by opening/closing decision, and convergence processes using two types of the RLNCCs, the experimental result shows that the HGA has significantly better performance in terms of the optimal solution than the GA, though the GA is slightly quicker than the HGA in terms of the CPU time. Finally, it has been proved that the proposed HGA approach is more efficient than conventional GA approach in two types of the RLNCC since the former has a GA search process as well as a local search process for additional search scheme, while the latter has a GA search process alone. For a future study, much more large-sized RLNCCs will be tested for robustness of our approach.

Media Habits of Sensation Seekers (감지추구자적매체습관(感知追求者的媒体习惯))

  • Blakeney, Alisha;Findley, Casey;Self, Donald R.;Ingram, Rhea;Garrett, Tony
    • Journal of Global Scholars of Marketing Science
    • /
    • v.20 no.2
    • /
    • pp.179-187
    • /
    • 2010
  • Understanding consumers' preferences and use of media types is imperative for marketing and advertising managers, especially in today's fragmented market. A clear understanding assists managers in making more effective selections of appropriate media outlets, yet individuals' choices of type and use of media are based on a variety of characteristics. This paper examines one personality trait, sensation seeking, which has not appeared in the literature examining "new" media preferences and use. Sensation seeking is a personality trait defined as "the need for varied, novel, and complex sensations and experiences and the willingness to take physical and social risks for the sake of such experiences" (Zuckerman 1979). Six hypotheses were developed from a review of the literature. Particular attention was given to the Uses and Gratification theory (Katz 1959), which explains various reasons why people choose media types and their motivations for using the different types of media. Current theory suggests that High Sensation Seekers (HSS), due to their needs for novelty, arousal and unconventional content and imagery, would exhibit higher frequency of use of new media. Specifically, we hypothesize that HSS will use the internet more than broadcast (H1a) or print media (H1b) and more than low (LSS) (H2a) or medium sensation seekers (MSS) (H2b). In addition, HSS have been found to be more social and have higher numbers of friends therefore are expected to use social networking websites such as Facebook/MySpace (H3) and chat rooms (H4) more than LSS (a) and MSS (b). Sensation seekers can manifest into a range of behaviors including disinhibition,. It is expected that alternative social networks such as Facebook/MySpace (H5) and chat rooms (H6) will be used more often for those who have higher levels of disinhibition than low (a) or medium (b) levels. Data were collected using an online survey of participants in extreme sports. In order to reach this group, an improved version of a snowball sampling technique, chain-referral method, was used to select respondents for this study. This method was chosen as it is regarded as being effective to reach otherwise hidden population groups (Heckathorn, 1997). A final usable sample of 1108 respondents, which was mainly young (56.36% under 34), male (86.1%) and middle class (58.7% with household incomes over USD 50,000) was consistent with previous studies on sensation seeking. Sensation seeking was captured using an existing measure, the Brief Sensation Seeking Scale (Hoyle et al., 2002). Media usage was captured by measuring the self reported usage of various media types. Results did not support H1a and b. HSS did not show higher levels of usage of alternative media such as the internet showing in fact lower mean levels of usage than all the other types of media. The highest media type used by HSS was print media, suggesting that there is a revolt against the mainstream. Results support H2a and b that HSS are more frequent users of the internet than LSS or MSS. Further analysis revealed that there are significant differences in the use of print media between HSS and LSS, suggesting that HSS may seek out more specialized print publications in their respective extreme sport activity. Hypothesis 3a and b showed that HSS use Facebook/MySpace more frequently than either LSS or MSS. There were no significant differences in the use of chat rooms between LSS and HSS, so as a consequence no support for H4a, although significant for MSS H4b. Respondents with varying levels of disinhibition were expected to have different levels of use of Facebook/MySpace and chat-rooms. There was support for the higher levels of use of Facebook/MySpace for those with high levels of disinhibition than low or medium levels, supporting H5a and b. Similarly there was support for H6b, Those with high levels of disinhibition use chat-rooms significantly more than those with medium levels but not for low levels (H6a). The findings are counterintuitive and give some interesting insights for managers. First, although HSS use online media more frequently than LSS or MSS, this groups use of online media is less than either print or broadcast media. The advertising executive should not place too much emphasis on online media for this important market segment. Second, social media, such as facebook/Myspace and chatrooms should be examined by managers as potential ways to reach this group. Finally, there is some implication for public policy by the higher levels of use of social media by those who are disinhibited. These individuals are more inclined to engage in more socially risky behavior which may have some dire implications, e.g. by internet predators or future employers. There is a limitation in the study in that only those who engage in extreme sports are included. This is by nature a HSS activity. A broader population is therefore needed to test if these results hold.