• Title/Summary/Keyword: Cyber Deviant Behavior

Search Result 4, Processing Time 0.018 seconds

Exploratory Study on Perceptions and Relationships Among Dominants of Deviant Behavior in Cyber Space (사이버 일탈행위에 영향을 미치는 요인에 관한 탐색적 연구)

  • Kim, Mi-Ryang;Um, Myoung-Yong;Kim, Tae-Ung
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.5
    • /
    • pp.27-35
    • /
    • 2007
  • The purpose of this research is to explore gender differences in perceptions and relationships among dominants affecting deviant behavior of adolescent in cyber space. This study developed a research model to analyze the factors explaining the intensity level of cyber deviant behavior, employing internet usage, awareness of anonymity, fear of cyber crime, and perceived seriousness as major research variables, and collected 478 survey responses from college students in Seoul.

Factors Affecting Information Protection Efforts for Preventing Deviant Behavior of Adolescent in Cyber Space (사이버 일탈행위 예방을 위한 개인 정보보호 노력의 영향요인 연구)

  • Um, Myoungyong;Park, Jin-Hee;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.5
    • /
    • pp.31-41
    • /
    • 2005
  • The purpose of this study is to identify the determinants of planned behavior of adolescent, toward information security and cyber crime prevention. A survey methodology was used to investigate a proposed model of influence, and regression analysis was used to analyze the results. The hypothesized model was largely supported by this analysis, and the overall results indicate that the intention to actively participate in information security and cyber crime prevention is mostly influenced by the fear for cyber crime and the perceived usefulness of information security and cyber crime prevention activity. In addition, it was found that the perceived easy of use for information-security related ICT skill, fear for cyber crime, and social norm for information security influence the level of usefulness, but that the prior experience with information leaking was statistically insignificant factor to the level of usefulness and fear for crime. Useful suggestions for promoting information security and cyber crime prevention are also provided.

  • PDF

The Impact of Spiritual Commitment, Social Support and Self-esteem on Deviant Behavior of Middle-aged Man (중년기 남성의 영성지향도, 사회적 지지, 자아존중감이 일탈행동에 미치는 영향)

  • Ko, Ki-Sook
    • Korean Journal of Social Welfare
    • /
    • v.57 no.4
    • /
    • pp.197-223
    • /
    • 2005
  • The purpose of this study is to examine the impact of spiritual commitment, social support and self-esteem for the deviant behaviors of middle-aged men from 40 to 59 years old. Further, this study seeks for providing basic data for designing social welfare service programs to intervene and prevent such deviant behaviors The findings of this study can be summarized as follows: The relationship among variables are as follows. First, spiritual commitment could directly affect the mid-life deviant behavior, and could cause influence indirectly through the self-esteem. Second, social support could not directly affect the mid-life deviant behavior, but could cause negative influence indirectly through the self-esteem. The significant is that this study triggered off interest in deviant behavior of middle-aged men. Especially, this study realized to us interest in spiritual commitment which has been not interested in the social work. This implicated that social support and self-esteem might effect to be deviant behavior of middle-aged men as well as deviant behavior of youth.

  • PDF

Prediction Model for Deviant Hacking Behavior and Hacking Type in Hackers Based on Psychological Variable (해커들의 심리변인에 기반한 탈선적 해킹활동 및 해킹타입 예측 모델)

  • Park, Chan Hyun;Song, In Uk;Kim, Min Ji;Chang, Eun Hee;Heo, Jun;Kim, Hyun Taek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.489-498
    • /
    • 2016
  • Despite the extant quantum communication technology that does not allow copying, wiretapping, and/or monitoring, cyber-terror-attempts from hackers with unconscientious purposes and motives are prospected to persist. Hence, it is imperative and necessary to invest in studies geared toward understanding the psychology of hackers. The current study referred to Beebe & Clark (2006) and sought out the psychological variables in hackers involved in deviant hacking activities, measured the purpose of hacking and actual hacking experiences, and constructed a predictive model that can categorize hacker types based on their intentions.