• Title/Summary/Keyword: 방어전략

Search Result 206, Processing Time 0.027 seconds

An Agent based Emergency Warning System for Dealing With Defensive Information Warfare in Strategic Simulation Exercises (전략시뮬레이션 훈련에서의 방어적 정보전을 위한 에이전트 기반 위기경보시스템의 개발)

  • Lee Yong-Han;Kumara Soundar R.T.
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.11-26
    • /
    • 2004
  • Software for analyzing documents on the net to detect specific categories of occurrences is in great demand. In the current world where detecting terrorist threats is critical there is a great need for such systems. One of the critical application areas of such software is the automatic detection of a national infrastructure emergency. In this research an agent-based generic architecture for emergency warning systems is proposed and implemented. This system, called the National Infrastructure Emergency Warning System (NIEWS), is designed to analyze given documents, to detect threats, and to report possible threats with the necessary information to the appropriate users autonomously. In addition, a systematic analysis framework to detect emergencies on the subject of defensive information warfare is designated and implemented through a knowledge base. The developed system along with the knowledge base is implemented and successfully deployed to Strategic Crisis Exercise (SCE) at the United State Army War College (USAWC), saving a good amount of money by replacing human SMEs (subject matter experts) in the SCE.

  • PDF

Analysis of Strategic Priorities for Strengthening Cybersecurity Capability of Cambodia (캄보디아의 사이버보안 역량강화를 위한 전략적 우선순위 분석)

  • Heng, Mara;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.93-102
    • /
    • 2019
  • This paper aims to set the priorities for the cybersecurity strategy of Cambodian government. To this end, we built a AHP research model by adopting 4 factors from the ITU national interests model and selecting 7 strategies from best practices of 8 countries leading the cyber security. Using a questionnaire, 19 experts evaluated Cambodia's cybersecurity strategy priorities. The key policy factors were evaluated in the order of homeland defense, economic welfare, value promotion and favorable world order. Their strategic alternatives were identified in the order of legislation, capacity building, and cyber attack prevention for critical infrastructure. This study will contribute to setting the strategic priorities and feasible action plans to strengthen Cambodia's cybersecurity capabilities.

Phenomenal Concept Strategy and A posteriori Physicalism (현상적 개념 전략과 후험적 물리주의)

  • Kim, Hyo-eun
    • Journal of Korean Philosophical Society
    • /
    • no.94
    • /
    • pp.163-192
    • /
    • 2011
  • A posteriori physicalists criticize non-physicalist arguments based on the framework of two-dimensional semantics. Most of them argue for physicalism based on the analogy between scientific identity statements and psychophysical identity statements. This paper argues for another version of aposteriori physicalism, so called physicalism employing 'phenomenal concept strategy' or 'exceptionalist strategy', which appeals to merely the nature of phenomenal concept without recourse to a semantic framework. Loar's phenomenal concept strategy employs the aspect of our recognitional ability of objects in criticizing non-physicalism, leading to the argument that phenomenal concepts are 'exceptional' in applying conceivability-possibility link. I critically examine Stoljar's, Chalmers', Raffman's criticisms against Loar's exceptionalists strategy. Loar's phenomenal concept strategy reflects well our psychological aspects surrounding the acquisition and the possession of 'phenomenal concept'. In several respects, Loar's exceptionalist version of a posteriori physicalism is the best explanation for accounting for both the explanatory gap and the a posteriority of psychophysical identity.

미래 지식정보사회의 정보보호 전략 프레임워크

  • Hwang, Jung-Yeon
    • Information and Communications Magazine
    • /
    • v.26 no.1
    • /
    • pp.31-37
    • /
    • 2009
  • 우리나라는 세계 최고 수준의 IT 인프라를 기반으로 네트워크 및 서비스 융합, RFID 등 u-IT 서비스 확산 등을 통해 유비쿼터스 사회로 빠르게 진입하고 있다. 향후 디지털 융합이 가속화됨에 따라 시간과 공간의 제약 없이 원하는 정보의 획득 활용이 증가하고, u-Health, u-learning 등 IT가 타산업과 융합되면서 높은 부가가치를 창출할 것으로 전망 된다. 그러나 정보화의 급속한 진전에 따른 사회 전반의 편의성과 효율성이 향상하였으나, 해킹 바이러스, 개인정보 유출사고, 스팸 등 역기능으로 인한 피해도 확산되고 있다. 최근에는 네트워크 방어체계를 무력화시키는 지능화된 해킹, 대량의 고객정보 유출, 사회공학 기법을 활용한 피싱 등 이용자의 자산과 프라이버시를 침해하는 사이버범죄 증가 등으로 이용자자산과 권리 보호관점에서의 정보보호의 중요성이 부각되고 있다. 향후 시간과 장소에 상관없이 지식정보를 활용하여 편리하고 쾌적한 생활을 누리게 하는 지식정보사회는 예측 불가능한 위험이 곳곳에 산재한 정보위험사회로의 진입을 의미 할 수도 있다. 그러므로 미래사회에서 예상되는 위협을 예측하여 효과적으로 사전에 예방할 수 있는 체계를 마련하는 것은 안전하고 신뢰할 수 있는 지식정보사회를 향유하기 위한 전제조건으로 작용한다. 이에 본고에서는 미래 지식정보사회에 대비한 정보보호 전략으로 안전한 u-사회 청사진 설계 및 환경조성 선도와 국제화, 사이버위협 예방 및 대응체계의 입체적 조화와 융합, 정보보호 기술 제품 산업간 선순환 촉진과 성장 등 3대 전략을 설정하고 실행방안을 제시한다.

North Korean Nuclear & Ballistic Missile Threats and U.S. Strategy: Shaping the Strategic Environment by Synchronizing Sticky and Sharp Power with Allies (북한의 핵, 탄도미사일 위협과 미국의 전략: 동맹국과의 경제적, 군사적 수단의 동기화를 통한 전략적 환경의 조성)

  • Moon, Chong-Hwa
    • Strategy21
    • /
    • s.37
    • /
    • pp.242-274
    • /
    • 2015
  • 2015년 5월 수중발사 탄도미사일(SLBM) 발사시험을 통해 북한은 전 세계의 이목을 또 다시 집중시켰다. 북한은 2013년 제3차 핵실험을 감행한 이후 최근까지도 탄도미사일과 로켓 발사 등의 무력도발을 지속해 왔다. 이와 같은 북한의 무력도발은 한반도의 안정뿐만 아니라 미국 본토의 안보에도 매우 부정적인 영향을 미치고 있다. 지금까지 미국은 북한의 핵미사일 개발 저지를 위해 경제적 또는 군사적 방안들을 선별적으로 적용해 왔다. 그러나, 이러한 미국의 노력에도 불구하고 북한은 여전히 핵미사일을 개발하겠다는 꿈을 포기하지 않고 있는 것이 사실이다. 본 논문은 북한의 핵미사일 개발에 대한 미국의 대안적 전략(Alternative Strategy)을 제시하는데 그 목적이 있다. 필자는 대안적 전략 제시에 앞서 북한의 핵과 탄도미사일 개발현황을 내용(Contents)과 맥락(Context) 차원에서 분석하고 미 오바마 행정부의 대북전략을 비판적으로 검토하였다. 그리고 대안적 전략으로 동맹국과 함께 경제적(Sticky Power), 군사적(Sharp Power) 수단의 동기화(Synchronizing)를 통해 북한이 감당하기 힘든 전략적 환경을 조성(Shaping the Strategic Environment)하는 것이 '북한의 핵개발 포기' 라는 전략목표를 달성하는 방안 임을 강조하고 있다. 미국이 대안적 전략목표를 달성하기 위해서는 경제적 수단으로 ① 북한의 자금세탁 및 위조지폐 발행국 지정, ② 북한을 지원하는 모든 해외자산에 대한 제재조치, ③ 북한의 테러지원국 재지정, ④ 북한 제재를 위한 미국의 입법추진, ⑤ 대량살상무기 관련 금수품목의 확대를 적용함과 동시에 군사적 수단으로 ① 대량살상무기 비확산 활동 강화, ② 대탄도미사일 전략 개발 및 정보(ISR: Intelligence Surveillance and Reconnaissance) 공유, 맞춤형 억제전략(TDS: Tailored Deterrence Strategy)의 구체화 등을 통한 한·미 군사 억제방안의 강화, 그리고 ③ SM-3, THAAD(Terminal High Altitude Area Defense) 등 한·미·일 3자간 MD(Missile Defense)체제의 구축 등을 동기화하여 적용해야만 할 것이다. 미국의 대안적 전략은 ① 북한의 핵미사일 개발에 대한 중국의 협력방지, ② 한·중간 경제관계의 악화, ③ 한·일간의 역사적 긴장관계라는 위험요소를 내포하고 있는 것 또한 사실이다. 따라서 미국이 대안적 전략목표인 '북한의 비핵화' 달성을 위해서는 이와 같은 위험요소를 완화시키는 노력도 병행되어야 할 것이다. 끝으로, 미국은 북한의 김정은이 핵미사일 개발 포기라는 상이한 방향의 전략적 결정을 할 경우에 대비하여 한·미 연합훈련의 보류, 북한에 대한 경제제재조치 해제 등 북한과의 협상 가능성도 열어두고 이에 대해서도 철저하게 준비해 나가야 할 것이다.

Strategic Approach of Dredging the Port of Busan with the Change of Global Port Logistics Circumstances: Focusing on Financial Validity (항만물류환경 변화에 따른 부산항의 증심 준설 전략 - 재무적 타당성을 중심으로 -)

  • Ha, Myung-Shin;Chang, Byoung-Ky
    • Journal of Korea Port Economic Association
    • /
    • v.24 no.2
    • /
    • pp.131-154
    • /
    • 2008
  • The purpose of this paper is to verify the financial validity of dredging the port of Busan with the change of global port logistics circumstances. In order to do so, NPV, IRR, B/C ratio, DPP techniques are adopted. The whole dredging at Northern port area is supposed to be negative at the depth of 16m water. Based upon its financial validity, however, the priority is Shinsundae (option 1) followed by Shinsundae (option 1) and Gamman (option 1), Shinsundae (option 1) and Gamman (option 2), Shinsundae (option 2) and Gamman (option 2), Shinsundae (option 2) and Gamman (option 2) and ShinGamman in sequence. In addition to this, Busan New port is considered to be the positive financial validity at the dredging of 16m water depth. This is because the ultra containerships of over 8,000TEU are trying to call at the port and Hanjin shipping and Hyundai Merchant shipping companies which are now the most significant customers in Northern port are scheduled to divert it.

  • PDF

The Effect of Business Strategy on Audit Delay (기업의 경영전략이 회계감사 지연에 미치는 영향)

  • Kim, Jeong-Hoon;Kim, Min-Hee;Do, Kee-Chul;Lee, Yu-Sun
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.219-228
    • /
    • 2022
  • In order to improve audit quality, it is essential to understand the occurrence of disagreement between auditors and managers, and this study aims to analyze the impact of Business Strategies on audit risk and accounting audit delay. To this end, we conducted an empirical analysis using sample 2,910 firm-year data from 2018 to 2020 of KOSPI-listed and KOSDAQ-listed companies. The results of the empirical analysis of this study are as follows. First, compared to the companies of defender type, prospectors can expand audit procedures for new products, R&D costs, and intangible assets, and increase audit delays due to disagreement between managers and auditors. Second, compared to KOSPI-listed companies, the prospectors in KOSDAQ are more likely to have lower financial reporting quality, which further increases audit delays. The results of this study analyzed whether a company's Business Strategy affects the possibility of disagreement between an auditor and a company, and verified whether there is a difference in the audit report lag by stock market. The results of this study show that auditors' strong duty of care is needed for the companies of prospector type with high audit risk, and it is meaningful to present reinforced audit systems and specific guidelines for the companies of prospector type through the definition of prospector type. It also enables the expansion of research to identify the relationship between non-financial factors and audit risks that make up the companies of prospector type.

A Study on the Domatia Structure of Broad-leaved Trees in Korea (한국산 활엽수종의 도마티아 구조에 대한 연구)

  • Kim, Gab-Tae;Choo, Gab-Cheul;Kim, Hoi-Jin
    • Korean Journal of Environment and Ecology
    • /
    • v.24 no.3
    • /
    • pp.258-263
    • /
    • 2010
  • To study on the typical domatia structure, the leaves of six broad-leaved tree species were examined. Domatia of the leaves of the broad-leaved trees is the defense strategies against hervivory of many broad-leaved tree species. We observed four type domatia; Pouch type, Tuft type, Pocket type, and Pocket + tuft type. This result suggests that broad-leaved trees have develope leaf domatia structures for mutualism with predatory mites.

An Analysis of the Characteristics of China's Naval Strategy to Become a Maritime Power: Focusing on analyzing the "goals, methods, and means" of strategy (해양강국 달성을 위한 중국 해군전략의 성격 분석: 전략의 "목표·방법·수단"을 이용한 분석을 중심으로)

  • Kim, nam-su
    • Maritime Security
    • /
    • v.2 no.1
    • /
    • pp.1-42
    • /
    • 2021
  • Controversy continues over the offensive nature of China's naval strategy to become a maritime power. Therefore, the purpose of this study is to identify the characteristics of China's naval strategy to become a maritime power by using the three elements of strategy and predict China's military actions in the future. For this purpose, research was conducted by considering the three elements of strategy and the distinct characteristics of naval strategy, and it was found that China's naval strategy was overall aggressive, but there was an imbalance in the pursuit of aggression between each strategic element. Offensive nature was prominent in terms of the methods, but there were limitations in the goals and means, such as the need to cooperate with neighboring countries to become a maritime power and the lack of military technology and operational continuity. The prospects for China's future military actions derived from the imbalance between these strategic elements are as follows. ① The risk of all-out military conflict with the US is low for now. ② China may use its naval power to force or cause limited military clashes against neighboring countries within the first island chain. ③ Accidental military conflicts with the US and neighboring countries may occur over naval confrontation over territorial disputes.

  • PDF

An Empirical Study on the Cryptocurrency Investment Methodology Combining Deep Learning and Short-term Trading Strategies (딥러닝과 단기매매전략을 결합한 암호화폐 투자 방법론 실증 연구)

  • Yumin Lee;Minhyuk Lee
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.377-396
    • /
    • 2023
  • As the cryptocurrency market continues to grow, it has developed into a new financial market. The need for investment strategy research on the cryptocurrency market is also emerging. This study aims to conduct an empirical analysis on an investment methodology of cryptocurrency that combines short-term trading strategy and deep learning. Daily price data of the Ethereum was collected through the API of Upbit, the Korean cryptocurrency exchange. The investment performance of the experimental model was analyzed by finding the optimal parameters based on past data. The experimental model is a volatility breakout strategy(VBS), a Long Short Term Memory(LSTM) model, moving average cross strategy and a combined model. VBS is a short-term trading strategy that buys when volatility rises significantly on a daily basis and sells at the closing price of the day. LSTM is suitable for time series data among deep learning models, and the predicted closing price obtained through the prediction model was applied to the simple trading rule. The moving average cross strategy determines whether to buy or sell when the moving average crosses. The combined model is a trading rule made by using derived variables of the VBS and LSTM model using AND/OR for the buy conditions. The result shows that combined model is better investment performance than the single model. This study has academic significance in that it goes beyond simple deep learning-based cryptocurrency price prediction and improves investment performance by combining deep learning and short-term trading strategies, and has practical significance in that it shows the applicability in actual investment.