21 research outputs found

    Exploring Risk and Protective Factors for Cyberbullying and Their Interplay: Evidence from a Sample of South Korean College Students

    No full text
    This study explored risk and protective factors for cyberbullying perpetration and examined whether they independently and interactively predicted cyberbullying perpetration. Based on key propositions of micro-level theories of crime and delinquency, we adopted two risk factors, cyberbullying victimization and association with cyberbullying peers, and two protective factors, morality and self-control. Using a sample of South Korean college students (N = 244; 112 women (45.9%), 132 men (54.1%); Mean (age) = 22), we found that the two risk factors were positively associated with cyberbullying perpetration, while only one of the two protective factors, which is morality, had a negative relationship with cyberbullying perpetration. In addition, the two protective factors partially buffered the effects of both risk factors on cyberbullying perpetration. The implications and limitations of these findings were also discussed

    Automated Cybersecurity Tester for IEC61850-Based Digital Substations

    No full text
    Power substations are the crucial nodes of an interconnected grid, serving as the points where power is transferred from the transmission/distribution grids to the loads. However, interconnected cyberphysical systems and communication-based operations at substations lead to many cybersecurity vulnerabilities. Therefore, more sophisticated cybersecurity vulnerability analyses and threat modeling are required during productization phases, and system hardening is mandatory for the commercialization of products. This paper shows the design and methods to test the cybersecurity of multicast messages for digital substations. The proposed vulnerability assessment methods are based on the semantics of IEC61850 Generic Object Oriented Substation Event (GOOSE) and Sampled Value (SV), and cybersecurity features from IEC62351-6. Different case scenarios for cyberattacks are considered to check the vulnerabilities of the device under test (DUT) based on the IEC62351-6 standard. In order to discover security vulnerabilities in a digital substation, the proposed cybersecurity tester will generate malicious packets that compromise the regular functionality. The results show that the proposed cybersecurity testing module is able to detect potential vulnerabilities in multicast messages and the authentication methods (e.g., message authentication code) of multicast communications. Both commercial and simulated devices are used for the case studies

    The Dynamics of Intra-Family Relationships During Incarceration and the Implications for Children of Incarcerated Parents

    No full text
    The current study examines effects of changes in intra-family relationships after parental incarceration on internalizing behaviors of the children of incarcerated parents. Using data from a sample of 249 incarcerated parents with minor children in South Korea, the present study found that perceived degradation of family relationships among inmate parents, their non-incarcerated spouses, and children was a significant risk factor of internalizing behaviors of children of incarcerated parents. The current study also found that inmate parents who had more frequent family contact were more likely to perceive improvements of all forms of intra-family relationships during incarceration. The implications of these findings are discussed

    Automated Cybersecurity Tester for IEC61850-Based Digital Substations

    No full text
    Power substations are the crucial nodes of an interconnected grid, serving as the points where power is transferred from the transmission/distribution grids to the loads. However, interconnected cyberphysical systems and communication-based operations at substations lead to many cybersecurity vulnerabilities. Therefore, more sophisticated cybersecurity vulnerability analyses and threat modeling are required during productization phases, and system hardening is mandatory for the commercialization of products. This paper shows the design and methods to test the cybersecurity of multicast messages for digital substations. The proposed vulnerability assessment methods are based on the semantics of IEC61850 Generic Object Oriented Substation Event (GOOSE) and Sampled Value (SV), and cybersecurity features from IEC62351-6. Different case scenarios for cyberattacks are considered to check the vulnerabilities of the device under test (DUT) based on the IEC62351-6 standard. In order to discover security vulnerabilities in a digital substation, the proposed cybersecurity tester will generate malicious packets that compromise the regular functionality. The results show that the proposed cybersecurity testing module is able to detect potential vulnerabilities in multicast messages and the authentication methods (e.g., message authentication code) of multicast communications. Both commercial and simulated devices are used for the case studies

    OpenCL Performance Evaluation on Modern Multicore CPUs

    No full text
    Utilizing heterogeneous platforms for computation has become a general trend, making the portability issue important. OpenCL (Open Computing Language) serves this purpose by enabling portable execution on heterogeneous architectures. However, unpredictable performance variation on different platforms has become a burden for programmers who write OpenCL applications. This is especially true for conventional multicore CPUs, since the performance of general OpenCL applications on CPUs lags behind the performance of their counterparts written in the conventional parallel programming model for CPUs. In this paper, we evaluate the performance of OpenCL applications on out-of-order multicore CPUs from the architectural perspective. We evaluate OpenCL applications on various aspects, including API overhead, scheduling overhead, instruction-level parallelism, address space, data location, data locality, and vectorization, comparing OpenCL to conventional parallel programming models for CPUs. Our evaluation indicates unique performance characteristics of OpenCL applications and also provides insight into the optimization metrics for better performance on CPUs

    Synthesis, structure, and ligand exchange of a copper(II)-based molecular helix with 2,6-pyridinedicarboxylates

    No full text
    <div><p>An one-dimensional (1-D) metal–organic polymer, [Cu<sub>2</sub>(PDA)<sub>2</sub>(DMF)<sub>2</sub>]<sub>n</sub> (PDA = 2,6-pyridinedicarboxylate, DMF = dimethylformamide), was synthesized by reaction of copper(II) nitrate hemi(pentahydrate) and 2,6-pyridinedicarboxylic acid in DMF. The complex shows a molecular helix structure consisting of five-coordinate Cu(II) building blocks with distorted square pyramidal geometry. Tridentate chelating PDA, DMF, and an oxygen from the carboxylate of the adjacent Cu(II) building unit are coordinated to the copper(II) center. The weakly coordinated DMF groups in [Cu<sub>2</sub>(PDA)<sub>2</sub>(DMF)<sub>2</sub>]<sub>n</sub> easily exchange with a pyridine to generate a pyridine-coordinated non-helical 1-D metal–organic polymer with six-coordinate pseudooctahedral Cu(II) units.</p></div
    corecore