• Title/Summary/Keyword: Government army

Search Result 87, Processing Time 0.027 seconds

An Analysis of Application Performance of Defense R&D Technologies Acquired by Offset Programs (절충교역을 통해 획득한 연구개발 기술의 활용성과 분석)

  • Hong, Seoksoo;Seo, Jaehyun;Shim, Sang-Ryul
    • Journal of Technology Innovation
    • /
    • v.22 no.2
    • /
    • pp.1-30
    • /
    • 2014
  • Offset trade has been applied in Republic of Korea's defense acquisition programs since early 1980s and used for national economic development as well as enhancement of military capabilities. The accumulated offset trade value amounts to over 10 billion dollars by 2010. However, questions in regards to the effectiveness of offset trade have been constantly raised. As it is a quite difficult task to analyze and calculate the application performance of defense technologies acquired by offsets objectively, limited level of quantitative analysis of application performance have been conducted so far. Hence, in this paper, we came to understand the overall status of application of those technologies through in-depth performance analysis and suggested some specific policies for the further development of offset trade based on the analysis results. To begin with, we developed a questionnaire based on performance indicator deducted through literature review of relevant researches, and conducted survey of major offset recipients. Also, another survey of offset experts belonged to the army, government organization, research institute and companies was conducted to evaluate the performance and effectiveness of offsets qualitatively. And we analyzed the efficiency of application performance using DEA. The results of all surveys are showing that there is positive accomplishment in the technological aspect, but in economic aspect, it shows relatively inactive outcome. Based on these results, policy direction is considered to be changed from the emphasis on the acquisition of core technology to revitalization of domestic defense industry in line with new government's policy orientation.

Reflecting on the History and Future of Republic of Korea Navy (대한민국 해군창설 : 회고와 당부)

  • Hahm, Myung-Soo
    • Strategy21
    • /
    • s.37
    • /
    • pp.5-31
    • /
    • 2015
  • The Republic of Korean Navy (ROKN) started from scratch. However, ROKN demonstrated its Blue Navy capabilities successfully to the entire world by conducting "Operation Early Dawn" at the Aden Bay, Yemen in Jan 2011. On the event of the 70th anniversary of the ROKN, I would like to retrospect past gleaning from voyages and challenges we had in the past. At the very inception of the ROKN, Korean government as well as senior military leaders recognized that it had no time to spare to clean up military those were insinuated deeply by communist agents. It was the top priority of the government. The Mongumpo Operation which was not well known, conducted by ROKN was one of the clean-up drive. The Korean War sometimes called as "a fire from land put-off at the sea". The world famous "Incheon Landing" which reversed war situation from the Nakdong Perimeter also done by Sea Power. ROKN conducted various maritime operations including not only Incheon Landing, but amphibious operation at Hungnam, mine sweeping, sea convoy, Wonsan Withdrawal. On the same day of the Korean War started, 25th June 1950, unless the victory of the ROKNS Baekdusan (PC 701) at the Korean Strait, the waning lamp light of Korea could not be rekindled by the participation of the U.N. The ROKN rescued the 17th regiment of Korean Army from the isolation at the Ongjin Peninsular and transported gold and silver bars stored at the Bank of Korea to the Navy supply deposit in Jinhae safely. ROKN special intelligence unit conducted critical HUMINT which led Incheon Landing success. One of important mission ROKN conducted successfully was not only transporting war fighting materials but also U.S. provided grains to starving Koreans. ROKN participated Vietnam campaign from 1960s and conducted numerous maritime transportation operations supplying materials to Vietnam military forces along the long coastal lines. Experienced Naval Officers and enlisted men who discharged and acquired as merchant marine certificate supported most of the U.S. sea lift operations throughout the Vietnam campaign. ROK-US Combined Forces which had been honed and improved its war fighting capabilities through the Korean War and out of Vietnam jungle playing key deterrent against threat from north Korea. However, those threat level will be completely different when north Korea finish its nuclear weapon ambition. In order to stand firm against north Korean nuclear threat, I would like to expect strong political leadership supporting nuclear submarine for ROKN.

Mysteries and truth of the Major Bibliocaust in the East and West (동서양 주요 비블리오코스트의 미스터리와 진상)

  • Hee-Yoon, Yoon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.4
    • /
    • pp.29-49
    • /
    • 2022
  • The book is a footnote of life and memory, a sign of knowledge and intelligence, including divinity and reason, idols and destruction, praise and curse, arrogance and prejudice, truth and falsehood. The past emperors, monarchs, priests, and rulers have been controlled or slaughtered by censorship and prohibition, burning and destruction, etc. In ancient history, archaeology, war history, cultural history, and library and information science, many studies have been conducted on the burning and destruction of books, but the Western perspective is dominant, and there are nationalistic approaches and logical leaps. This study traced the truth about the destruction of the Royal Library of Alexandria in Egypt, destruction of the Baghdad libraries by the Mongol Empire, and burning more than 200,000 volumes of Korean historical documents of Japanese Government-General in Korea among the major bibliocausts with many mysteries and controversial issues in the East and West. As a result, the Royal Library of Alexandria is most likely destroyed under the rule of the Roman Empire. The massacre of the Baghdad library by the Mongolian army is a historical fact, not the manipulation and extreme exaggeration of western society. And Korean historical documents have been stolen and burned by the Government-General of Chōsen for 35 years and should be recognized as '200,000 + α'. Lastly, On the premise of excavating historical materials, research to investigate the truth behind the blibiocaust or libricide should be continued.

Ganjae's lecture activities in Mungyeong (간재(艮齋) 전우(田愚)의 문경(聞慶)에서의 강학활동)

  • Lim, Ok-kyun
    • The Journal of Korean Philosophical History
    • /
    • no.52
    • /
    • pp.131-155
    • /
    • 2017
  • While the lecture activities in Simwonsa, Ganjae Jeon Wu(1841~1922) has established a "law of lecture activities" which was an ritual between a teacher and pupil, between the couple. Through this way he expected to recover the former ritual, even within their own school. In 1884 he built a "law of Sidong school", meaning to build a large object, elementary scholarship will serve as the rules of conduct, and argued that human nature mainly served to the core in the course of study. Ganjae in Mungyeong area was also discussing studies with Song Byeong-hwa(1852~1916) and received correspondence with scholars in areas related to Mungyeong. They were Kim Jae-kyung(1841~1926) and Park Se-hwa (1834~1910). Ganjae had also some big national events on the sojourn time in Mungyeong. In 1882 there were army incident, in 1884 there were a command of the government that people must pull on western clothes. Ganjae did not follow the command of the government. Someone asked "Can we not follow the command of the government?" Ganjae replied "We have a right to resist to the illegal command of the government. There were also 1884's Gapsin-coup, Ganjae saw that we must defend the country by rejecting foreign power and keeping our rituals. Given the above, the timing that Ganjae lectured in Mungyeong personally was a time that provided a clue to establish his core ideas. Nationally it was a time that must defend the country from foreign nations. Ganjae had faith that for keeping the country we must keep firmly our own rituals.

Records Management and Archives in Korea : Its Development and Prospects (한국 기록관리행정의 변천과 전망)

  • Nam, Hyo-Chai
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.1 no.1
    • /
    • pp.19-35
    • /
    • 2001
  • After almost one century of discontinuity in the archival tradition of Chosun dynasty, Korea entered the new age of records and archival management by legislating and executing the basic laws (The Records and Archives Management of Public Agencies Ad of 1999). Annals of Chosun dynasty recorded major historical facts of the five hundred years of national affairs. The Annals are major accomplishment in human history and rare in the world. It was possible because the Annals were composed of collected, selected and complied records of primary sources written and compiled by generations of historians, As important public records are needed to be preserved in original forms in modern archives, we had to develop and establish a modern archival system to appraise and select important national records for archival preservation. However, the colonialization of Korea deprived us of the opportunity to do the task, and our fine archival tradition was not succeeded. A centralized archival system began to develop since the establishment of GARS under the Ministry of Government Administration in 1969. GARS built a modem repository in Pusan in 1984 succeeding to the tradition of History Archives of Chosun dynasty. In 1998, GARS moved its headquarter to Taejon Government Complex and acquired state-of-the-art audio visual archives preservation facilities. From 1996, GARS introduced an automated archival management system to remedy the manual registration and management system complementing the preservation microfilming. Digitization of the holdings was the key project to provided the digital images of archives to users. To do this, the GARS purchased new computer/server systems and developed application softwares. Parallel to this direction, GARS drastically renovated its manpower composition toward a high level of professionalization by recruiting more archivists with historical and library science backgrounds. Conservators and computer system operators were also recruited. The new archival laws has been in effect from January 1, 2000. The new laws made following new changes in the field of records and archival administration in Korea. First, the laws regulate the records and archives of all public agencies including the Legislature, the Judiciary, the Administration, the constitutional institutions, Army, Navy, Air Force, and National Intelligence Service. A nation-wide unified records and archives management system became available. Second, public archives and records centers are to be established according to the level of the agency; a central archives at national level, special archives for the National Assembly and the Judiciary, local government archives for metropolitan cities and provinces, records center or special records center for administrative agencies. A records manager will be responsible for the records management of each administrative divisions. Third, the records in the public agencies are registered in the computer system as they are produced. Therefore, the records are traceable and will be searched or retrieved easily through internet or computer network. Fourth, qualified records managers and archivists who are professionally trained in the field of records management and archival science will be assigned mandatorily to guarantee the professional management of records and archives. Fifth, the illegal treatment of public records and archives constitutes a punishable crime. In the future, the public records find archival management will develop along with Korean government's 'Electronic Government Project.' Following changes are in prospect. First, public agencies will digitize paper records, audio-visual records, and publications as well as electronic documents, thus promoting administrative efficiency and productivity. Second, the National Assembly already established its Special Archives. The judiciary and the National Intelligence Service will follow it. More archives will be established at city and provincial levels. Third, the more our society develop into a knowledge-based information society, the more the records management function will become one of the important national government functions. As more universities, academic associations, and civil societies participate in promoting archival awareness and in establishing archival science, and more people realize the importance of the records and archives management up to the level of national public campaign, the records and archival management in Korea will develop significantly distinguishable from present practice.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Study of Korean Scientific Community's Groping for Scientific Ideology in the Period of Liberation, 1945-53 (해방 공간과 과학자 사회의 이념적 모색)

  • Kim Dong-Kwang
    • Journal of Science and Technology Studies
    • /
    • v.6 no.1 s.11
    • /
    • pp.89-118
    • /
    • 2006
  • The formation of early korean scientific community is a dynamic process of korean modern history in which colonialization, liberation, United States Army Military Government and Korean War is included. Particularly, scientist's crossing over the border into north korea and south korea have profound effect on the early stage of our scientific community. This period is so important to understand the nature of korean scientific community that we need to re-interpret the role of 'ideology' in the development of scientific community. On the other hand, war is a important element in our formation of the image of the science. This study purported to interpret the problem of political ideology, it's role in the formation of early scientific society, it's implication on our idea of science positively. Also the study is a an attempt to re-construct the scientist's struggle(1945-1950) to demarcate new science from old, colonial science.

  • PDF

A study on the transition of native korean terminology in elementary mathematics (우리나라 초등학교 고유어 수학 용어의 변천에 대한 연구)

  • Park, Kyo Sik
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.21 no.2
    • /
    • pp.291-308
    • /
    • 2017
  • In 1946, many native korean mathematical terms are coined newly by the ministry of education of USAMGIK(the United States Army Military Government in Korea) through referring to the opinions of various circles. In native korean mathematical terms created at the time, many of them are coined, either by using native korean words corresponding to the meaning of chines characters, or by abbreviating newly coined native korean mathematical terms. However, in less than 20 years, about half of native korean mathematical terms made in 1946~1947 has been went back to chines character mathematical terms, and most of those chines character mathematical terms has been used up to now from then. Although, in the teaching and learning of mathematics, the discomfort of chinese characters mathematical terms is pointed out and it is claimed that the use of native korean mathematical terms is helpful, it is not everything to hurry to use native korean mathematical terms. Attempts to convert chinese characters mathematical terms into native korean mathematical terms should be prudent. When a certain native korean mathematical term is used, if it must be used only because it is a native korean mathematical term, then the term has no choice but to fail. In this paper, we propose the following three implications as conclusions for the successful use of native korean mathematical terms in this viewpoint. First, attempts to coin native korean mathematical terms should be continued. Second, it is necessary to identify the survival power of well-preserved native korean mathematical terms. Third, it is necessary to identify the failure factors of native korean mathematical terms which does not survive today.

  • PDF

For Making an Efficient Disaster Emergency Communication System for Public Safety in South Korea (국민안전 확보를 위한 긴급통신망시스템 통합구축 방안)

  • Choi, Kwan;Kim, Min-Ji
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.169-198
    • /
    • 2015
  • The purpose of present study is to provide an efficient 'Disaster Emergency Communication System' (below DECS) to deal with serious disaster situations in national levels. Currently, DECSs such as the VHF, UHF, and TRS are worked to control some disaster situations in the world. However, new system such as for sending the correct image and big data is more likely to need than current the DECSs in the comtemporary societies. Several serious disaster events such as the Sam-Poong Department Store Collapse, Daegu Subway Fire, and Sewol Submerge event, nevertheless, there was not the DECS based on the field in South Korea. In July 2014, finally, South Korean government started to provide a PS-LTE system which is the new and one system with fire fighting, police, army, railway. however, there are no many academic studies for DECSs to deal with disaster situations in South Korea. The present research highlights to explore an efficient DECS of Korean styles to fix some national security and public safety. The paper provides three key findings: first is how to make a unified Korean DECS based on PS-LTE. Second is how to make sure the frequency of 700MHz levels to communicate in the shady areas. Three is what kinds of communication facility is adequate for fixing PS-LTE DECS.

  • PDF

The Effectiveness of Accounting Information in Military Construction Contracts under the Qualification Assessment System (적격심사낙찰제 계약에서 회계정보의 유용성에 관한 연구)

  • Hur, Hyung
    • Journal of the military operations research society of Korea
    • /
    • v.37 no.1
    • /
    • pp.49-70
    • /
    • 2011
  • This paper re-evaluated the research on the accounting information's effectiveness in military construction contracts, questioning the former research results on the central army's construction contract that was under the Qualification Assessment System, especially concerning the relations between the accounting information and the bidding ratios as well as the relations between the bidding rates and the defect rates, which targeted between 1 to 10 billions civil engineering, construction, electricity, telecommunication, and environment work types. Unlike the previous results, the relationship between the accounting information and the bidding rates was shown to be considerably limited that the bidding ratio could not be identified through the accounting information, while it could discern the relations with the defect rates. Furthermore, the proven results did not support the hypothesis that the differences in bidding rates could affect the defect ratio. However, through the prediction model of bidding and defect ratios, we could identity the accounting variables that influenced the ratios. Additionally through the results regarding the non-financial indexes in the Pre-Qualification items, the weight on these indexes could be adjusted. In conclusion, the research results has given us new understanding of the problems in the Qualification Assessment System which accounts for the majority of the current military construction contracts and provide validity on the government's expanded implementation of the Lowest Price Award System.