• Title/Summary/Keyword: peer communication

Search Result 405, Processing Time 0.191 seconds

A Study on The Effects of Cyber-Bullying in Adolescents on SNS Addiction: Focusing on the Moderating Effects of Friendship (청소년의 SNS 중독이 사이버불링에 미치는 영향: 또래애착관계의 조절효과검증)

  • Jun, Ji Hyoung;Kim, Ri Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.499-506
    • /
    • 2021
  • The purpose of this study is to verify the effect of SNS addiction on cyber-bullying among adolescents, considering the adjustment effect of friendship on this relationship. This study involved 811 middle/high school students with a gender distribution of 391 males and 420 females. According to the analysis, the higher the level of SNS addiction, the higher the level of cyber-bullying. A hierarchical regression analysis was conducted to verify the moderating effect of friendship. The result shows that better peer communication and reliance lowers the impact of cyber-bullying from SNS addiction. Based on research results suggesting the popularization of proactive pre-diagnosis programs to solve SNS addiction, practical intervention plans and the limitations of research on SNS addiction and cyber-bullying in youth are suggested.

The Use of Social Media among First-Year Student Groups: A Uses and Gratifications Perspective

  • Owusu-Ansah, Christopher M.;Arthur, Beatrice;Yebowaah, Franklina Adjoa;Amoako, Kwabena
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.11 no.4
    • /
    • pp.7-34
    • /
    • 2021
  • The purpose of the study was to explore the uses and gratification of social media among first-year student groups at a satellite campus of a public university in Ghana. The study employed a descriptive survey design. The study involved all 1061 first-year university students in six academic departments of the College. A total of 680 (64%) participants returned validly completed copies of the questionnaire. Descriptive statistics and thematic analysis were employed for data analysis. The findings indicate that WhatsApp was the most popular application for social media groups, while a need for information-sharing, peer-tutoring and learning, and finding and keeping friends were the primary motivations for joining social media groups. First-year students are involved mainly in reactive activities, as most engage when solving an academic assignment through group discussions. Though challenges persist, such as posting of unwanted images, inadequate participation, and ineffective and irrelevant communication, most are willing to continue their social media groups' membership in the long term. This study provides valuable insight into transitioning students' lived experiences on social media from the group perspective. These insights are valuable conceptually and practically to academic counsellors, librarians and student affairs officers who are expected to provide on-going education on (social) media literacy to first-year students to enhance the adjustment process. The study is the first of its kind in Ghana that investigates social media group participants' exit intentions.

A Proposal for Drone Entity Identification and Secure Information Provision Technology Using Quantum Entropy Chip-Based Cryptographic Module in WLAN Environment (무선랜 환경에서 양자 엔트로피 칩 기반 암호모듈을 적용한 드론 피아식별과 안전한 정보 제공 기술 제안)

  • Jung, Seowoo;Yun, Seunghwan;Yi, Okyeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.891-898
    • /
    • 2022
  • Along with global interest, drones are expanding the base of utilization such as transportation of goods, forest protection, and safety management, and cluster flights are being applied in various fields such as military operations and environmental monitoring. Currently, specialized networks such as e-UM 5G for services in specific industries are being established in Korea. In this regard, drone systems are also moving to establish specialized networks to provide services that are fused with AI and autonomous flight. As drones converge with various services, various security threats in various environments are also subordinated, and in response, requirements and guidelines for drone security are being prepared in Korea. In this paper, we propose a technology method for peer identification and safe information provision between cluster flight drones by utilizing a cryptographic module equipped with wireless LAN and quantum entropy-based random number generator in a cluster flight system and a mobile communication network such as e-UM 5G.

Analysis of Role Modeling Experiences and Reflection Level of Fourth-Year Medical Students at a Single Medical College: A Focus on the Clinical Clerkship (일개 의과대학 본과 4학년의 롤 모델링 경험과 성찰수준 분석: 임상실습을 중심으로)

  • Lee, Sangmi Teresa;Park, Kyung Hye;Park, Yon Chul;Yeh, Byung-il
    • Korean Medical Education Review
    • /
    • v.24 no.1
    • /
    • pp.46-55
    • /
    • 2022
  • This study aimed to analyze the subjects, situations, and reflection levels related to role modeling experienced by medical students during their clinical clerkship and their own reflections. This study intends to suggest ways of improving how residents and clinical faculty should treat and teach medical students. Written interviews were conducted regarding senior medical students' role modeling experiences during their clinical clerkships in 2018 and 2019. Content analysis was conducted for a total of 224 cases from 196 students. Content analysis revealed three types of role modeling content: subjects (faculty, residents, nurses, peer students), situations (clinical competence, personal qualities, teaching skills), and the level of reflection (critical reflection, reflection, thoughtful action, and habitual action) in each case. As role model subjects, faculty were found to be the paramount role model (n=142, 62.83%). Role modeling was the most frequently performed for clinical competence (n=103, 45.98%). Clinical competence was frequently shown in communication and empathic listening during rounds and outpatient relationships between the patient and doctor. Regarding the level of reflection for role modeling, the number of critical reflections was 86 (38.39%) and that of reflections was 80 (35.71%). In particular, negative role modeling showed a high level of critical reflection in relation to faculty (64.44%) and nurses (8.89%). In conclusion, role modeling of medical students participating in clinical clerkships occurs in situations that the role models are not aware of, with positive or negative effects on the formation of professional identity among medical students.

A Study on the Digital Therapeutics Based Community Care for Rehabilitation in Dysarthria in the Post-COVID-19 Era (Post-COVID-19 시대 마비말장애 재활을 위한 디지털 치료제 기반의 커뮤니티케어 방안)

  • Lee, Sang-Do
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.1
    • /
    • pp.313-323
    • /
    • 2022
  • The purpose of this study was to explore ways a digital therapeutics-based community care plans for the rehabilitation in dysarthria in a situation where non-face-to-face services are expanding in the COVID-19 era. To this end, a qualitative study was conducted on experts working in hospitals, speech-language pathology centers, and social welfare centers, and as a result of the study, 3 topics, 9 sub-themes, and 18 content units were derived. Based on the analysis results, the digital therapeutics-based community care model consisted of 9 types: remote diagnosis, telepractice, rehabilitation training program, peer supporters, clinical support, communication, psychosocial intervention, and care plan services. This study will be able to provide basic data for health care & welfare services using digital therapeutics and guidelines for establishing shared care plans based on multidisciplinary cooperation.

Unraveling the Web of Health Misinformation: Exploring the Characteristics, Emotions, and Motivations of Misinformation During the COVID-19 Pandemic

  • Vinit Yadav;Yukti Dhadwal;Rubal Kanozia;Shri Ram Pandey;Ashok Kumar
    • Asian Journal for Public Opinion Research
    • /
    • v.12 no.1
    • /
    • pp.53-74
    • /
    • 2024
  • The proliferation of health misinformation gained momentum amidst the outbreak of the novel coronavirus disease 2019 (COVID-19). People stuck in their homes, without work pressure, regardless of health concerns towards personal, family, or peer groups, consistently demanded information. People became engaged with misinformation while attempting to find health information content. This study used the content analysis method and analyzed 1,154 misinformation stories from four prominent signatories of the International Fact-Checking Network during the pandemic. The study finds the five main categories of misinformation related to the COVID-19 pandemic. These are 1) the severity of the virus, 2) cure, prevention, and treatment, 3) myths and rumors about vaccines, 4) health authorities' guidelines, and 5) personal and social impacts. Various sub-categories supported the content characteristics of these categories. The study also analyzed the emotional valence of health misinformation. It was found that misinformation containing negative sentiments got higher engagement during the pandemic. Positive and neutral sentiment misinformation has less reach. Surprise, fear, and anger/aggressive emotions highly affected people during the pandemic; in general, people and social media users warning people to safeguard themselves from COVID-19 and creating a confusing state were found as the primary motivation behind the propagation of misinformation. The present study offers valuable perspectives on the mechanisms underlying the spread of health-related misinformation amidst the COVID-19 outbreak. It highlights the significance of discerning the accuracy of information and the feelings it conveys in minimizing the adverse effects on the well-being of public health.

A Study on the Effects of Traditional Dance Program on the Improvement of Interpersonal Relationships of Foster Care Children (전통춤프로그램이 가정위탁아동의 대인관계향상에 미치는 영향에 관한 연구)

  • Bae, Na-Rae;Cho, Tae-Seon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.12
    • /
    • pp.242-247
    • /
    • 2017
  • The foster care system is a social welfare service that supplements the functions of the family while enabling children, who cannot receive proper care from their biological parents, to receive the necessary protection under the plan within the prescribed period of time within a substitute or foster family. A large part of the emotional instability experienced by foster care children is interpersonal maladjustment. Low self-esteem leads to difficulty in forming social relationships due to negative interpersonal relationships. Thus, the purpose of this study is to investigate the effects of traditional dance programs on the foster children who live in Daejeon Metropolitan City. A comparison between the pre- and post-interpersonal scores showed that the scores were improved after the traditional dance program, and the children's intimacy formation and communication were also improved. The participants were less active at the beginning of the program, but became more interested and more active toward the middle of the program. The majority of the participants increased their degree of communication with the formation of intimacy toward the middle of the program, and their self-confidence improved in terms of their peer relationships. The purpose of this study was to investigate the effects of traditional dancing on the development of interpersonal relationships. In a subsequent study, a traditional dancing program consisting of various contents will be applied over a long period of time, which should provide them with the opportunity to improve their interpersonal skills. In addition, it is necessary to provide educational opportunities for helping foster children reduce their emotional instability with systemic and diverse traditional dance programs.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

The Myth of Youthism (청소년주의와 세대 신화)

  • Won, Yong-Jin;Lee, Dong-Yeon;Nho, Myung-Woo
    • Korean journal of communication and information
    • /
    • v.36
    • /
    • pp.324-347
    • /
    • 2006
  • `Youthism` is pushing the youth research field into a trap of binarism fallacy. It tends to divide the whole population into the young and the old, and further gives an acceleration toward moving the division into the discursive realm of generation gap. The discursive transference is not taking place without any reasonable grounds. The series of discourse is based on two significant phenomena: changes in media background and longer schooling than ever before. Media environment overriding youth culture binds the young in a group and makes them enjoy homogeneous cultural genres. And schooling also seems to play an important role for the youth to have same cultural menus regardless of region, social strata, cultural background. But we need to recognize that after getting into the adulthood, they are not existing in the form of alliance. The youth are not in a homogeneous group. Neither are their culture. The youth are consisted of a variety of groups along such variables as gender, class of their parents. They tend to make distinction not only from the older generation but from the other peer groups. Unless avoiding the trap of youthism, we are blamed for closing eyes to the youth's desire to be distinctive among themselves. Youthism seems to be an active myth even in our academic society.

  • PDF

Identity-Exchange based Privacy Preserving Mechanism in Vehicular Networks (차량 네트워크에서 신원교환을 통해 프라이버시를 보호하는 방법)

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1147-1157
    • /
    • 2014
  • Intelligent transportation system (ITS) is realized through a highly ephemeral network, i.e. vehicular ad hoc network (VANET) which is on its way towards the deployment stage, thanks to the advancements in the automobile and communication technologies. However, it has not been successful, at least to date, to install the technology in the mass of vehicles due to security and privacy challenges. Besides, the users of such technology do not want to put their privacy at stake as a result of communication with peer vehicles or with the infrastructure. Therefore serious privacy measures should be taken before bringing this technology to the roads. To date, privacy issues in ephemeral networks in general and in VANET in particular, have been dealt with through various approaches. So far, multiple pseudonymous approach is the most prominent approach. However, recently it has been found out that even multiple pseudonyms cannot protect the privacy of the user and profilation is still possible even if different pseudonym is used with every message. Therefore, another privacy-aware mechanism is essential in vehicular networks. In this paper, we propose a novel identity exchange mechanism to preserve conditional privacy of the users in VANET. Users exchange their pseudonyms with neighbors and then use neighbors' pseudonyms in their own messages. To this end, our proposed scheme conditionally preserves the privacy where the senders of the message can be revoked by the authorities in case of any dispute.