• Title/Summary/Keyword: 자기 보호

Search Result 506, Processing Time 0.031 seconds

Psychological well being and living conditions of children with working mothers depending on the type of after school care (초등학교 저학년의 방과후 보호형태에 따른 생활실태 및 심리적 복지에 관한 연구)

  • 최정미;오선영
    • Journal of Korean Home Economics Education Association
    • /
    • v.16 no.2
    • /
    • pp.85-97
    • /
    • 2004
  • This study attempted to understand the living conditions of children after school, focusing on 437 children attending an elementary school with working parent. This investigation also analyzed socio-demographic variables, the forms of after school child-care and differences in psychological well-being of children. The major findings were as follows First, self-care children took up 42.3% as the result of the survey on living conditions after school of lower-grade children. It showed that children under the condition of self-caring for more than four hours a day on the average took up 2/3 of the child group. Second, the results of examining the differences of psychological well being of children secondary to socio-demographic variables, it showed significant differences in the area of anxiety with respect to children’s genders, Parental occupations in the area maternal educational levels. Third, the results of the findings on whether there were differences in the psychological well-eing of these children depending on the form of after school hour child care showed that there were significant differences between loneliness and self-perceives competence felt by children.

  • PDF

A New Class of Self-Shrinking Generators (새로운 자기 수축 발생기)

  • 최세아;양경철
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.88-91
    • /
    • 2002
  • 자기 수축 발생기(self-shrinking generator)는 Meier와 Staffelbach에 의해 제안되었으며[4], 구조가 간단하고 키수열을 생성하는 속도가 빠르기 때문에 스트림 암호시스템으로 각광받고 있다 [5]. 본 논문에서는 자기 수축 발생기의 새로운 구성방법을 제안한다. 제안된 자기 수축 발생기는 하나의 선형귀환회로와 주어진 짝수 m에 의하여 정의되며 일반적으로 선형귀환회로의 귀환다항식으로 원시다항식을 사용한다. 이 경우 키수열은 균형성을 만족하며, 선형귀환회로의 귀환다항식의 차수를 $d_{Y}$ 라고 하면 주기는 $d_{Y-2}$ 이다. m을 $2^{η}$ζ로 표현하면 선형복잡도 Lz는 $d_{Y}$ +η-3/$\leq$ $L_{Z}$ $\leq$m/2($d_{Y}$ -1 - ($d_{Y}$ -2))이다. 따라서 제안된 자기 수축 발생기는 기존의 자기 수축 발생기에 비하여 암호학적으로 우수한 성질을 갖는다.다.

  • PDF

Predictors of Caregivers' First Aid Confidence (요양보호사의 응급처치 수행자신감 예측요인)

  • Soon-Ok Kim;Mi-Hee Kim
    • Journal of the Korean Applied Science and Technology
    • /
    • v.40 no.4
    • /
    • pp.811-824
    • /
    • 2023
  • The purpose of this study was to investigate the communication confidence, self-efficacy, and self confidence in first aid and to identify the predictors of self confidence in first aid. Subjects were 202 caregivers and data were collected by questionnaires from march 1 to 31, 2023. Data were analyzed using t-test, ANOVA, Scheffe's test, Pearson correlation coefficients and Multiple regression analysis using the SPSS 29.0 program. Self-efficacy was a positive correlation with communication confidence (r=.54, p<.001), and self confidence in first aid was a negative correlation with communication confidence(r=-.18, p<.05) and self-efficacy(r=-.31, p<.001). Predictive factors for self confidence in first aid were absence of nurse's aide(β=-.18, p=.009) and self-efficacy(β=-.30, p<.001), and explanatory power was 11.0%(Adj R2=.110, p<.001). Based on the results of this study, to develop and apply an educational program focusing on emergency problems.

Certificate Issuing using Proxy Signature and Threshold Signature in Self-initialized Ad Hoc Network (자기 초기화하는 Ad Hoc 네트워크에서의 대리 서명과 임계 서명 기법을 이용한 인증서 발급 기법)

  • Kang, Jeon-Il;Choi, Young-Geun;Kim, Koon-Soon;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.55-67
    • /
    • 2007
  • In ad hoc network, especially in the environment which the system authority only exists at the beginning of the network, it is very important problem how to issue the certificates in self-initialized public key scheme that a node generates its certificate with public and private key pair and is signed that by the system authority. In order to solve this problem, early works present some suggestions; remove the system authority itself and use certificate chain, or make nodes as system authorities for other nodes' certificates. In this paper, we suggest another solution, which can solve many problem still in those suggestions, using proxy signature and threshold signature, and prove its performance using simulation and analyse its security strength in many aspects.

Variations and Outcomes in the After-School Care of children from Low-Income Families (저소득층 아동의 학업, 및 사회성 발달 : 부모보호와 자기보호 비교)

  • Ok, Kyung Hee;Kim, Mee Hae;Chun, Hui Young
    • Korean Journal of Child Studies
    • /
    • v.22 no.2
    • /
    • pp.91-111
    • /
    • 2001
  • The present study investigated differences in children's school achievement and emotional and social development by type of after-school care: self-care and mother-care. It also examined relationships between children's developmental outcomes and ecological variables, including individual, familial, and environmental variables by care methods. The data of 330 mother-care and 161 self-care children was provided by teachers, mothers, and the children themselves. The analyses of the data were conducted by t-test, correlation, and regression. Findings were that mother-care children had higher scores in grades, school adjustment and teacher relationship and lower depression and withdrawn behaviors than self-care children; after-school activities and peer support predicted the developmental outcomes of mother-care children; gender, autonomous ability, and behavior control predicted the development of self-care children.

  • PDF

The Influence of Sanctions and Protection Motivation on the Intention of Compliance with Information Security Policies: Based on Parameter of Subjective Norm (제재 및 보호동기와 정보보호정책 준수 의도에 관한 연구: 주관적 규범을 매개로)

  • Shin, Hyuk
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.47-58
    • /
    • 2019
  • This study applied the Theory of Reasoned Action by Fishbein & Ajzen(1975) as the grounded theory and adopt sanctions of the General Deterrent Theory and protection motivation of the Protection Motivation Theory as the antecedents to discuss the theoretical factors and the cases of application in the field of information security. Then, it adopted subjective norm, a variable of the Theory of Reasoned Action, as a parameter to analyze the causality of sanctions, perceived vulnerability, response cost, and self-efficacy with the intention to follow the information security policies. As a result, all of the antecedents except for sanctions had causality with the intention and subjective norm proved its mediating effect as a parameter between the antecedents and the intention.