81 research outputs found

    Problematic Facebook use and problematic video gaming as mediators of relationship between impulsivity and life satisfaction among female and male gamers

    Get PDF
    Over the past few decades, many new technologies have emerged, such as portable computers, the internet and smartphones, which have contributed to improving the lives of individuals. While the benefits of these new technologies are overwhelmingly positive, negative consequences are experienced by a minority of individuals. One possible negative aspect of new technologies is their problematic use due to impulsive use which may lead to lower life satisfaction. The present study investigated the mediating role of problematic video gaming (PVG) and problematic Facebook use (PFU) in the relationship between impulsivity dimensions and life satisfaction as well as the relationship between impulsivity dimensions and problematic behaviors. Additionally, the potential impact of gender differences was also examined. The study comprised 673 gamers (391 females) aged 17–38 years (M = 21.25 years, SD = 2.67) selected from 1365 individuals who completed an offline survey. PFU was assessed using the Facebook Intrusion Scale, and PVG was assessed using the nine-item Internet Gaming Disorder Scale–Short-Form (IGDS9-SF). Impulsivity dimensions such as attention, cognitive instability, motor, perseverance, self-control, and cognitive complexity were assessed using the Barratt Impulsiveness Scale (BIS-11), and life satisfaction was assessed using the Satisfaction With Life Scale (SWLS). Depending on the specific impulsivity dimension, findings showed both positive and negative relationships between impulsivity and life satisfaction. Attention and perseverance subtypes of impulsivity were primarily associated with problematic behaviors. Additionally, cognitive complexity was associated with PFU among female gamers, whereas cognitive instability was associated with PVG among male gamers. Additionally, PVG was primarily associated with lower life satisfaction. However, there was no mediation effects between impulsivity dimensions and life satisfaction via PFU or PVG. These findings provide a better understanding of the relationship between problematic behaviors, life satisfaction, and impulsivity among gamers and the differences between male and female gamers

    Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content

    Get PDF
    Mixed Flash and JavaScript content has become increasingly prevalent; its purveyance of dynamic features unique to each platform has popularized it for myriad web development projects. Although Flash and JavaScript security has been examined extensively, the security of untrusted content that combines both has received considerably less attention. This article considers this fusion in detail, outlining several practical scenarios that threaten the security of web applications. The severity of these attacks warrants the development of new techniques that address the security of Flash-JavaScript content considered as a whole, in contrast to prior solutions that have examined Flash or JavaScript security individually. Toward this end, the article presents FlashJaX, a cross-platform solution that enforces fine-grained, history-based policies that span both Flash and JavaScript. Using in-lined reference monitoring, FlashJaX safely embeds untrusted JavaScript and Flash content in web pages without modifying browser clients or using special plug-ins. The architecture of FlashJaX, its design and implementation, and a detailed security analysis are exposited. Experiments with advertisements from popular ad networks demonstrate that FlashJaX is transparent to policy-compliant advertisement content, yet blocks many common attack vectors that exploit the fusion of these web platforms

    Enforcing More with Less: Formalizing Target-aware Run-time Monitors

    No full text
    Abstract. Run-time monitors ensure that untrusted software and system behavior adheres to a security policy. This paper defines an expressive formal framework, based on I/O automata, for modeling systems, policies, and run-time monitors in more detail than is typical. We explicitly model, for example, the environment, applications, and the interaction between them and monitors. The fidelity afforded by this framework allows us to explicitly formulate and study practical constraints on policy enforcement that were often only implicit in previous models, providing a more accurate view of what can be enforced by monitoring in practice. We introduce two definitions of enforcement, target-specific and generalized, that allow us to reason about practical monitoring scenarios. Finally, we provide some meta-theoretical comparison of these definitions and we apply them to investigate policy enforcement in scenarios where the monitor designer has knowledge of the target application and show how this can be exploited to make more efficient design choices.

    Typographic style is more than cosmetic

    No full text
    • …
    corecore