• 제목/요약/키워드: Foreign security Policy

Search Result 167, Processing Time 0.022 seconds

Protection of Information Sovereignty as an Important Component of the Political Function of the State

  • Zadorozhnia, Halyna;Mykhtunenko, Viktoriia;Kovalenko, Hanna;Kuryliuk, Yurii;Yurchenko, Liubov;Maslennykova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.151-154
    • /
    • 2021
  • State information policy is an important component of foreign and domestic policy of the country and covers all spheres of society. The rapid development of the information sphere is accompanied by the emergence of fundamentally new threats to the interests of the individual, society, state and its national security. The article considers the components of the state information policy to ensure information security of the country and identifies the main activities of public authorities in this area. Internal and external information threats to the national security of Ukraine and ways to guarantee the information security of the country are analyzed. Information security is seen as a component of national security, as well as a global problem of information protection, information space, information sovereignty of the country and information support of government decisions. Approaches to ensure the process of continuity of the information security system of the state in order to monitor new threats, identify risks and levels of their intensity are proposed.

A Study on the Motivating Factors for Nuclear Development in the Kim Jong-un Era (2011-2017)

  • Deog-Sung Jung;Yong-Hyun Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.281-285
    • /
    • 2024
  • Within five years of Kim Jong-un's rise to power, North Korea conducted four nuclear tests and launched the Hwasong-15, an intercontinental ballistic missile (ICBM), in 2017, declaring the completion of its nuclear forces. During the period when Kim Jong-un completed nuclear forces to maintain the regime, foreign policy factors of the United States, China, Russia, and South Korea drove North Korea's accelerated nuclear development. The main motivating factors were the hostile policies and external threats as security factors. The completion of nuclear forces is also the result of the interplay of domestic political factors, normative factors, and hereditary factors. North Korea has been developing nuclear weapons and missiles for the survival of its regime. To achieve lasting peace on the Korean Peninsula, a new modus vivendi must be sought. It is necessary to set the ultimate goal of North Korea's complete denuclearization and engage in strategic thinking for a realistic and effective phased approach.

Efficiency of Innovative Development Management: Interstate Assessment of the Economic Competitiveness in the Context of European Integration and Economic Security

  • Khodakivska, Olga;Ramos, Olena Ribeiro;Nechyporenko, Oleksandr;Tsiutsiupa, Svitlana;Krasnoshtan, Olexander;Mayovets, Yaryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.67-72
    • /
    • 2021
  • The article identifies areas for effective management of innovative development. The competitiveness of the economy in the context of European integration and economic security is assessed. The level of innovative economy of some countries of the world is analyzed. The issue of attracting foreign investors to stimulate innovative production in Ukraine is raised. It is identified the need for the formation of an updated state policy capable of providing innovative development and improving the competitive position of the state in international rankings. Emphasis is placed on the need to form a critical mass of managers-civil servants capable of developing, implementing and monitoring the policy of innovative development of entrepreneurship.

United States-China Competition for Technological Supremacy in Quantum Computing and Policy Trends (미중 기술패권 경쟁과 양자컴퓨팅 정책 동향)

  • S.J. Lee;S.H. Jeong;B.S. Cho
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.4
    • /
    • pp.47-57
    • /
    • 2023
  • The competition for technological supremacy is unfolding in the high-tech field, and quantum computing can be determinant for economic and security ripple effects. The United States and China, leaders in quantum computing, have developed this field through adequate policies. The United States has fostered quantum computing through government policies and competition among private companies, while China has secured world-class technology through large-scale government investment and attracting foreign talent. In quantum computing, securing talented people is essential to guarantee independent technology development regarding academic attributes and security. We analyze quantum computing policies in the United States and China on a timeline and determine their policy trends. In addition, the policies for securing talent in these countries are reviewed, and the policy effects are compared based on literature analysis. Through the analysis of policy cases between the United States and China, bilateral policy implications for Korea are delineated.

The Europeanization of Bulgarian Nationalism: The Impact of Bulgaria's European Union Accession on Bulgarian-Macedonian Relations

  • Benedict E., DeDominicis
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.39-66
    • /
    • 2022
  • Modern Bulgarian nationalists aspired towards incorporating the self-identified Bulgarian lands into the Bulgarian state. The Treaty of San Stefano ending the Russo-Turkish War of 1877-78 tantalizingly achieved these so-called national ideals. Great Power diplomacy quickly diminished Bulgaria's borders and international legal status with the 1878 Treaty of Berlin, exacerbating nationalist grievances. Bulgaria would expand vast resources to restore the San Stefano borders until Balkan Communist authoritarian regimes eventually suppressed the Macedonian issue as a foreign policy subject. Sofia's policy towards its neighbor has been overdetermined by the efforts of successive Bulgarian governments to institutionalize post-communist Bulgaria's own national identity. Bulgaria's integration into so-called Euro-Atlantic structures, i.e., NATO and the EU, had been the primary strategic objective of the Bulgarian authorities since the end of the Zhivkov regime. North Atlantic community security policy aims in response to the earliest post-Cold War foreign policy crises in the Western Balkans framed the parameters of Bulgarian diplomacy. The stabilization of FYROM in 2001, followed by Bulgaria's 2007 EU accession, led to Bulgarian nationalist values become more salient in Bulgarian politics and foreign policy. Sofia-Skopje relations are a test case for the effects of Europeanization on interdependent Balkan ethno-sectarian nationalisms and state territorial institutional development.

A Study on the Privacy Policy Comparison by Domestic and Foreign Portal Sites and Domestic Web sites Classified by Industry (국내·외 포털사이트 및 업종별 국내 사이트의 개인정보취급방침 비교)

  • Jeon, Changuk;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.713-724
    • /
    • 2016
  • In providing services by using informations of each client, business managers have duties to maintain the personal information under the procedure of collecting, storing, using/providing, and destroying them. Besides, they also have duties to inform their clients, the subject of the personal information, of how to manage and use their client's informations. In this study, the privacy policies, stipulated at domestic and foreign portals will be compared with one another, and the differences between domestic and foreign portals will be shown. The implication in each field and categories of domestic web sites will be found.

DYNAMICS OF PAKISTAN'S POST 9/11 CRISIS FOREIGN POLICY DECISION-MAKING PROCESS

  • Hussain, Mehmood
    • Korea and Global Affairs
    • /
    • v.2 no.2
    • /
    • pp.157-184
    • /
    • 2018
  • The study has applied the four stage "Model of State Behavior in Crisis" to trace the post 9/11 crisis foreign policy decision making process in Pakistan. It argues that ominous attacks on the United States by al-Qaeda and subsequent declaration of President Bush to fight against terrorism transformed the global and regional politico-security dimensions at t1 stage. Being a neighboring country, Pakistan's support was inevitable in the war on terror and Washington applied coercive diplomacy to win the cooperation from Islamabad. Consequently, in case of decline to accept American demands, Pakistan perceived threat to basic values/objectives of the country and simultaneous time pressure amplified the psychological stress in decision makers at t2 stage. Therefore, the decisional forum was setup at t3 stage and Pakistan decided to join the United States at t4 stage, which defused the foreign policy crisis.

The Efficiency of ROK-U.S. Alliance in Order to Overcome North Korea's Nuclear Threats: Evaluations & Measures (북한 핵위협 극복을 위한 한미동맹 효용성: 평가와 대책)

  • Kim, Yeon Jun
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.89-100
    • /
    • 2017
  • Last January 2017, Donald Trump was inaugurated as the 45th president of the United States. He actively claimed a priority for the United States, which is referred as America First, during his presidential campaign. However, his political assertions turned out to be as Isolationist in terms of foreign policy. It becomes a serious problem for South Korea because South Korea is solely dependent on the U.S. "Extended Deterrence" of North Korea's nuclear threats. In other words, there will be a higher likelihood for North Korea to misinterpret the relationship between South Korea and the U.S. Due to his foreign policy, there is a possible provocation by North Korea. Therefore, ROK-U.S. Alliance, the model of Asymmetry Alliance in order to prepare for North Korea's nuclear provocation, will be evaluated through America's perspective based on "Autonomy-Security Trade-off Model". For this purpose, this research will evaluate ROK-U.S. Alliance with regards to a threat perception, policy coordination, and a value as an ally. Based on the evaluation, it will deduce tactical implications of South Korea's alliance.

Analysis of Domestic and Foreign Financial Security Research Activities and Trends through Topic Modeling Analysis (토픽모델링 분석 기법을 활용한 국내외 금융보안 분야 연구동향 분석)

  • Chae, Ho-Geun;Lee, Gi-Hyun;Lee, Joo-Yeoun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.1
    • /
    • pp.83-95
    • /
    • 2021
  • In this study, major research trends at home and abroad were compared and analyzed in order to derive key research fields in the financial security field and to suggest directions. To this end, 689 domestic and 20,736 foreign data were collected from domestic and international academic journal DB, and major research fields related to financial security were extracted through LDA analysis. After that, hot & cold topics were derived through time series linear regression analysis. As a result of the analysis, studies related to government policy issues, personal information, and accredited certification were derived as promising research fields in Korea. In the case of foreign countries, related studies were drawn to develop advanced security systems such as cryptographic protocols and quantum security. Recently, it has become possible to apply various security technologies in Korea through the abolition of public certification. Accordingly, as changes in promising research fields are expected, the results of this study are expected to contribute to the establishment and development of a successful roadmap for domestic financial security.

A Study on the Software Supply Chain Security Policy for the Strengthening of Cybersecurity: Based on SBOM Policy Cases (사이버안보 강화를 위한 소프트웨어 공급망 보안 정책 연구: SBOM 정책 추진 사례를 중심으로)

  • Son, Hyo-Hyun;Kim, Dong-Hee;Kim, So-Jeong
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.9-20
    • /
    • 2022
  • Supply chain attacks target critical infrastructure, causing large amounts of damage and evolving into a threat to public safety and national security. Accordingly, when establishing cybersecurity strategies and policies, supply chain risk management is specified to enhance security, and the US Biden administration recently issued the Executive Order on Improving the Nation's Cybersecurity, SBOM was mentioned as part of the guidelines for strengthening software supply chain security. If the government mandates SBOM and uses it as a security verification tool for supply chains, it can be affected by the domestic procurement system in the future and can be referenced when establishing a security system for domestic supply chains according to the progress of policy implementation. Accordingly, in this paper, countries that are promoting the SBOM policy as a way to strengthen the security of the software supply chain were selected and analyzed with a focus on related cases. In addition, through comparison and analysis of foreign SBOM policy trends, methods for using domestic SBOM in terms of technology, policy, and law were considered. As the value of using SBOM as a supply chain integrity/transparency verification tool is expected in the future, it is necessary to continuously identify trends in the establishment of international standardization and policy development for SBOM and study the standard format.