• Title/Summary/Keyword: 대응 체제

Search Result 557, Processing Time 0.033 seconds

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

Risk Management and Strategies in Airport Security Check (공항 보안검색에 있어서의 위험관리와 대응과제)

  • Kim, Jae-Woon
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.89-113
    • /
    • 2013
  • Travel by airplane using airport in globalized modern society is familiar to our life but such airport can be a target of terrorists who would threaten our safety. However, aviation terrorism which is represented by 9.11 terror gives horror beyond our imagination to modern people. Since the first airplane hijacking in Peru in 1931 happened, security organization in each nation has taken various prevention measures to block aviation terrorism. The most realistic measures to prevent aviation terrorism would be security check activity to control approach of terrorist that passengers on airplane and cargos are checked to find out dangerous article like explosive etc. But security check activity in Korea shifted to security check activity focused on private security for efficiency of airport operation differently from security check activity in advanced countries where public interests is strengthened according to risk of terror after 9.11 system. That is, since Incheon airport opened in March 2001, security check system focused on the police was changed. Now Incheon international airport Corporation instructs and supervises security check job and private security personnel are in charge of actual security check activity. But this check system has limitation in blocking terror activity by terrorists which is systematized and intelligent as time passes due to deteriorated job satisfaction of private security personnel and confusing supervising system. Accordingly, it is suggested to introduce risk management skill which is one of management strategy of private corporation for security check activity to prevent terror activity. With this skill, risk factors of aviation terror are identified and analyzed regularly, and each process such as setting of priority, activity to reduce risk, and assessment of security is carried out. And it would be necessary to do efforts, for example, to properly change level of security check according to threat of terror such as to place policeman at airport security in case threat of terror is severe. On the other hand, it is necessary to establish national police organization for good communication of security check activity in field and supervising function, which can encourage systematization and specialization of aviation security job.

  • PDF

Regulation of Professional Advertising: Focusing on Physician Advertising (전문직 표시·광고규제의 몇 가지 쟁점: 의료광고를 중심으로)

  • Lee, Dongjin
    • The Korean Society of Law and Medicine
    • /
    • v.17 no.2
    • /
    • pp.177-219
    • /
    • 2016
  • A commercial advertisement is not only a way of competition but also a medium of communication. Thus, it is under the constitutional protection of the freedom of business (article 15 of the Constitution) as well as the freedom of press [article 21 (1) of the Constitution]. In terms of the freedom of business or competition, it should be noted that an unfair advertising (false or misleading advertisement) can be regulated as an unfair competition, while any restraint on advertising other than unfair one might be doubted as an unjustifiable restraint of trade. In terms of the freedom of press or communication, it is important that article 21 (2) of the Constitution forbids any kind of (prior) censorship, and the Constitutional Court applies this restriction even to commercial advertising. In this article, the applicability of these schemes to advertising of the so-called learned professions, especially physician, are to be examined, and some proposals for the reformation of the current regulatory regime are to be made. Main arguments of this article can be summarized as follows: First, the current regime which requires advance review of physician advertising as prescribed in article 56 (2) no. 9 of Medical Act should be reformed. It does not mean that the current interpretation of article 21 of the Constitution is agreeable. Though a commercial advertising is a way of communication and can be protected by article 21 (1) of the Constitution, it should not be under the prohibition of censorship prescribed by article 21 (2) of the Constitution. The Constitutional Court adopts the opposite view, however. It is doubtful that physician advertising needs some prior restraint, also. Of course, there exists severe informational asymmetry between physicians and patients and medical treatment might harm the life and health of patients irrevocably, so that medical treatment can be discerned from other services. It is civil and criminal liability for medical malpractice and duty to inform and not regulation on physician advertising, to address these differences or problems. Advance review should be abandoned and repelled, or substituted by more unproblematic way of regulation such as an accreditation of reviewed advertising or a self-regulation preformed by physician association independently from the Ministry of Health and Welfare or any other governmental agencies. Second, the substantive criteria for unfair physician advertising also should correspond that of unfair advertising in general. Some might argue that a learned profession, especially medical practice, is totally different from other businesses. It is performed under the professional ethics and should not persue commercial interest; medical practice in Korea is governed by the National Health Insurance system, the stability of which might be endangered when commercial competition in medical practice be allowed. Medical Act as well as the condition of medical practice market do not exclude competition between physicians. The fact is quite the opposite. Physicians are competing even though under the professional ethics and obligations and all the restrictions provided by the National Health Insurance system. In this situation, regulation on physician advertising might constitute unjustifiable restraint of competition, especially a kind of entry barrier for 'new physicians.'

  • PDF

Vietnam in 2017: The Situations and Prospects of Economics, Politics, and International Relations (베트남 2017: 경제, 정치, 대외관계의 현황과 전망)

  • CHAE, Su Hong;LEE, Han Woo
    • The Southeast Asian review
    • /
    • v.28 no.1
    • /
    • pp.21-51
    • /
    • 2018
  • This article takes several approaches in explaining recent developments in Vietnam. First, it draws upon an array of sources that idealize Vietnam's embrace of capitalism and integration into the global market in order to sketch out its economy's progress in 2017. Second, it observes, evaluates, and diagnoses recent changes in the Vietnamese economy in the medium to long term by incorporating conflicting perspectives on Vietnam's performance as a capitalist country. Third, this article traces the power shifts that have risen from internal struggles in the Communist Party over political and social issues. Fourth, it elaborates on the aforementioned impact that foreign relations have had on socio-political developments in Vietnam, as well as the government's response. In so doing, it also attempts to evaluate, however briefly, the significance of the 25th anniversary of South Korea-Vietnam relations. Finally, it examines the public's reaction to the post-reform transitions in light of recent sociocultural changes. 2017 was a memorable year for Vietnam: a continuous march toward capitalism; the resulting expansion of the Vietnamese people's demands; political controversies and government control; the looming instability of United States-China relations and various attempts to address the situation. These events will inevitably replicate themselves in the future as the ostensibly socialist Vietnam adopts a capitalist model. The problem is that it is unclear whether these experiences will continue with the consent of the people of socialist Vietnam or engender resistance. It is difficult to achieve meaningful consent in the status quo of worsening inequalities, widespread corruption, monopoly on power, and sustained use of unskilled low-wage workers. In other words, when concerns such as welfare, public health, and the environment are set aside in favor of economic development and commercialization as they have been, discontent, rather than consent, will prevail. It is thus important to keep a watchful eye on the viability of the nominal economic growth, surface-level political stability, and strategic responses to foreign relations that took place in 2017.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

A Study on pluralistic Reformation for Education of Telecommunication -for Establishment of Individual System for Comm. Education- (통신교육의 계열화와 계층화 -고유한 교역의 형성을 위하여-)

  • 조정현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.3 no.1
    • /
    • pp.28-30
    • /
    • 1978
  • Communication actions as a social band or Human community stick (fast) to human being ceaselessly w without stopping everywhere. All of comm. actions can be kept up and developed by the education of its own. Comm. actions have to include a character of social process, and so for it the social science should t to be some essential part of it. Therefore, Comm. education have to be schemed for achieving with a point of view of synthetical s science including technical and social factor. However, recentry Comm. education be suffered to lose of itowns essential attribute and individual i independence becausing to reduce social weight recklessly in their education It is a prindiple that Comm. science is an integrate science being composed of human, social and t technical subdepartments and so comm. education have to obey for Comm. constuctional theory, i international and social claim. Originally in Korea a educational idea and genealogy forming by the comm. scientific theory has I inherited on orthodoxy. But in 1961, communication college that is only the orthodox model of Comm. education, was f forced to close by some reckless policy and then the national administration for the Comm. education h have been weakened, and so recently it’s education became to degenerate as out of genealogy or n nonsystem alike some scattering Family. On the other side, today comm. science make to it’s modern scientific factor and to keep its l integrate level, therefore, all of educational provisions and administration for the telecomm. should t to be supplement to be fit for their plural chatacters. Comm. education have to occupy an individual educational system through the comm. theory, and t then it can be coexisted with neighbour scientific field equally and can include, connect coordinate o or effect its inference in each subfactor organically. Finally, educational system for telecommunication should to be requested as preeedence that i independent field including pluralism must be formed and sufficient autonomy be guarenteed, and s so Comm. education must be to restored its orthodox genealogy and be recovered individual system a and seIfrestraint field, and then it can be accomplished its own duty for nation and society.

  • PDF

The Ownership Structure of Korea's Big Business Conglomerates and Its Policy Implications (우리나라 기업집단(企業集團)의 소유(所有)·경영구조(經營構造)와 정책대응(政策對應))

  • Yoo, Seong-min
    • KDI Journal of Economic Policy
    • /
    • v.14 no.1
    • /
    • pp.3-36
    • /
    • 1992
  • "Corporate control by owners" characterizes the current structure of ownership, control and management of big business groups in Korea. It has become an ever more serious obstacle for the Korean economy to end its distinctive "personal capitalism" and to transform the current system into people's capitalism. The current issue, the deconcentration of ownership, through the course of heated debates should be treated from an integrated perspective. That is, the debate should center on the concentration of economic power and it effects on national economy, instead of sticking to the issue of ownership-control issue per se. This paper, by referring to the historical experiences and development paths which advanced countries have already traveled, analyzes the respective aspects of the concentration issue in a rather descriptive and taxonomist manner - market concentration, business diversification, ownership concentration, integrated management of conglomerates, i.e., managing in groups' unit, and the roles of financial institutions. The government policies against the concentration of economic power have so far focused on the size of big business groups and their diversification activities. The two major policy measures are restrictions on cross-ownership and excess capital investment by big business groups, and controls on their credit deals. This paper strongly suggests that the government should change its current priorities in targeting its policies against concentration. The government should reduce the regulations on size and diversification, and focus its policies on substantial dispersion of corporate ownership. The efficacy of government intervention in the management and control of business enterprises seems quite dubious and even anachronistic given the extent of maturity of Korean firms. Therefore, it should be noted that the current regulation-oriented stance taken by the government against the management style of big business groups should be suppressed, as it has assumed some a priori and typical pattern in advance in directing big business groups, such as independent and specialized management in respective firms' unit. This paper, also, raises the need for introducing new regulations on inter-sectoral diversifications between finance, industry and the press.

  • PDF

A Study on Strategy of Forest Rehabilitation Support Corresponding to the Spread of Marketization in North Korea (북한의 시장화 확산에 대응한 대북 산림복구 지원전략 연구)

  • Song, Minkyung;Yi, Jong-Min;Park, Kyung-Seok
    • Journal of Korean Society of Forest Science
    • /
    • v.106 no.4
    • /
    • pp.487-496
    • /
    • 2017
  • The marketization in North Korea is spreading rapidly. This study proposes forest rehabilitation strategy for North Korea in light of their major shift toward market economy. This current trend of marketization in North Korea is now affecting the forest sector, especially the way the residents utilize small forest land. For analyzing the influence of marketization on forest management in North Korea, we reviewed the official documents issued by North Korea and related materials of North Korean marketization. The government of Kim Jong Eun has set up policies and systems regarding the spread of marketization, such as guaranteeing individuals a right to dispose certain products on their own and establishing a special economic zone to attract foreign investments. In the forestry sector, the North Korean government has been trying to fully implement its forest restoration plan by carrying out measures like re-claiming of sloping lands that had been previously used by residents. However, as marketization progresses, it is expected that there lies much difficulty in government-led massive mobilization for forest restoration due to the increase of illegal logging to meet high demand for timber, illegal firewood harvesting, collecting non-timber products for livelihoods and illegal crop cultivation to sell in the market. Therefore, South Korea's support for forest restoration should also consider the recent marketization phenomenon in North Korea. It is necessary to formulate strategic measures such as conducting joint commercialization project on agroforestry management using cooperative farming unit, helping to improve income source from small forest lands, and to activate a comprehensive mountain village special economic zone by utilizing forest business. We do hope that our proposed forest rehabilitation strategy in this paper regarding the changes in North Korea's marketization and forest policy can give a meaningful suggestion on supporting forest restoration in North Korea in an effective way.

The Study of a Development Plan of the Industrial Security Expert System (산업보안관리사 자격제도 발전 방안에 대한 고찰)

  • Cho, Yong-Sun
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.175-207
    • /
    • 2014
  • This paper focuses on the study of a development direction of the industrial security Expert system. First of all, in order to manage Industrial security system, we need to have law, criminology, business and engineering professionals as well as IT experts, which are the multi-dimensional convergence professionals. Secondly, industrial organizations need to have workforce who can perform security strategy; security plan; security training; security services; or security system management and operations. Industrial security certification system can contribute to cultivate above mentioned professional workforce. Currently Industrial Security Expert(ISE) is a private qualification. However, the author argued that it have to be changed to national qualification. In addition, it is necessary that the system should be given credibility with verifying the personnel whether they are proper or not in the their field. In terms of quality innovation, it is also necessary that distinguish the levels of utilization of rating system of the industrial security coordinator through a long-term examination. With respect to grading criteria, we could consider the requirements as following: whether they must hold the degree of the industrial security-related areas of undergraduate or postgraduate (or to be); what or how many industrial security-related courses they should complete through a credit bank system. If the plan of completing certain industrial security-related credits simply through the credit bank system, without establishing a new industrial security-related department, has established, then industrial security study would be spreaded and advanced. For private certification holders, the problem of the qualification succeeding process is important matter. Additionally, it is necessary to introduce the certifying system of ISMS(Industrial Security Management System) which is a specialized system for protecting industrial technology. To sum up, when the industrial security management system links the industrial security management certification, industrial security would realize in the companies and research institutions dealing with national key technology. Then, a group synergy effect would occurs.

  • PDF

A Study on the Army Tactical C4I System Information Security Plan for Future Information Warfare (미래 정보전에 대비한 육군전술지휘정보체계(C4I) 정보보호대책 연구)

  • Woo, Hee-Choul
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.1-13
    • /
    • 2012
  • This study aims to analyze actual conditions of the present national defense information network operation, the structure and management of the system, communication lines, security equipments for the lines, the management of network and software, stored data and transferred data and even general vulnerable factors of our army tactical C4I system. Out of them, by carrying out an extensive analysis of the army tactical C4I system, likely to be the core of future information warfare, this study suggested plans adaptive to better information security, based on the vulnerable factors provided. Firstly, by suggesting various information security factor technologies, such as VPN (virtual private network), IPDS (intrusion prevention & detection system) and firewall system against virus and malicious software as well as security operation systems and validation programs, this study provided plans to improve the network, hardware (computer security), communication lines (communication security). Secondly, to prepare against hacking warfare which has been a social issue recently, this study suggested plans to establish countermeasures to increase the efficiency of the army tactical C4I system by investigating possible threats through an analysis of hacking techniques. Thirdly, to establish a more rational and efficient national defense information security system, this study provided a foundation by suggesting several priority factors, such as information security-related institutions and regulations and organization alignment and supplementation. On the basis of the results above, this study came to the following conclusion. To establish a successful information security system, it is essential to compose and operate an efficient 'Integrated Security System' that can detect and promptly cope with intrusion behaviors in real time through various different-type security systems and sustain the component information properly by analyzing intrusion-related information.