Within the framework of Patterson et al.'s (1989) antisocial developmental model, this study explored the associations between harsh maternal discipline and adolescents' externalizing problem behaviors. We investigated the independent mediating effects of inhibitory control and deviant peer affiliation as well as the chain mediating effect of these variables. Participants were 367 adolescents who completed validated scales assessing maternal discipline, inhibitory control, deviant peer affiliation, and externalizing problem behaviors. The results showed that harsh maternal discipline affected adolescents' externalizing problem behaviors through the chain intermediary effect of inhibitory control and deviant peer affiliation. These findings facilitate understanding of the pathway of harsh maternal discipline on adolescents' externalizing problem behaviors. It is important to avoid harsh maternal discipline, establish harmonious parent–child relationships, avoid deviant peer affiliations, and achieve healthy physical and mental development of adolescents.
In order to effectively realize the management of educational correction for problem teenagers, improve the security and reliability of encrypted storage of educational correction information for problem teenagers, and shorten the encrypted storage time of educational correction information for problem teenagers, educational correction management for problem teenagers based on information encryption storage method is proposed. Analyze the information encryption storage method and combine it with the necessary theoretical foundation of education and correction of issue teenagers to create an encryption and secure storage management method for education and correction of problem teenagers’ information. The CP-ABE algorithm is used to obtain the initial key of the system, express the encrypted cipher-text, specify the attributes of each user in the problematic youth education and correction user permission list, and obtain the problem youth education and correction user permission control structure. Using tent mapping and cat mapping methods, the key parameters are calculated, respectively, and the encrypted file is piecewise, linearly mapped. Then, XOR is the plaintext bytes and key bytes of the encrypted and safe storage of the problem youth’s education and correction information, completing the encrypted and safe storage of the data information in the problem youth’s education and correction management and realizing the problem youth’s education and correction management. The results of the experiments show that the proposed technology is secure and reliable and that it can efficiently reduce the encryption storage time of educational corrective material for troubled teenagers.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.