• Title/Summary/Keyword: Middle East security

Search Result 38, Processing Time 0.025 seconds

Time and Newsweek's Coverage of the Arab Uprisings in 2011: A Content Analysis Survey

  • Abushouk, Ahmed Ibrahim
    • Asian review of World Histories
    • /
    • v.2 no.1
    • /
    • pp.81-104
    • /
    • 2014
  • The popular uprisings that took place in the Arab world, and led to the overthrow of four heads of states, namely Zine El-Abidine Ben Ali (January 14, 2011) of Tunisia, Hosni Mubarak (February 11, 2011) of Egypt, Muammar al-Gaddafi (August 23, 2011) of Libya and Ali Abdullah Saleh (November 23, 2011) of Yemen, have attracted the attention of the world media and policy makers in the West and the Middle East, and triggered their concern for the political future of the region. This article does not offer a comprehensive assessment of these uprisings, but rather analyzes the coverage of Time and Newsweek of the underlying causes of the uprisings and their anticipated consequences. It also investigates how the two magazines have highlighted the scenarios that may pose a real challenge to Arab regimes supported by the American administration, and internationally reshape the priorities of American foreign policy in the region. These issues are examined from the two magazines' perspectives, which under line the features of U.S. foreign policy in the region, where the White House is more concerned about the security of the state of Israel, control of the Arab oil and suppression of "Muslim fundamentalism."

Global Market Entry Strategy for Smart Personal Recognition-based Non-contact Thermometer Convergence access Control System (스마트 개인 인식기반 비접촉 체열측정기 융합 출입통제시스템의 글로벌 시장 진출전략)

  • Chung, Jason;Kim, hyung-o
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.673-675
    • /
    • 2021
  • Biometric technology is a next-generation information security technology that provides reliability and convenience. As a core technology in the post-corona era, then on-contact biometric access control system is capable of non-face-to-face and automated technology, and is active not only in Korea but also in overseas markets such as the United States, Europe, and the Middle East. There are precautions that must be taken to reflect requirements such as cooperation between companies and approval of the US Food and Drug Admin is tration in developing IoT-based smart device customized sensors and securing H/W systems.

  • PDF

North Korea's sudden change scenario 2 : Focusing on the cases of Jasmine revolution countries (북한의 급변사태 시나리오 2 : 재스민혁명 국가들의 사례분석을 중심으로)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.47-52
    • /
    • 2017
  • The wave of democratization that started in southern Europe spread to South America and Asia, dismantling the Soviet Union and Eastern European countries and appeared as a Jasmine revolution in countries of North Africa and the Middle East. As a result, many scholars have actively carried out researches related to the sudden change of North Korea, while taking a cautious view that the Jasmine Revolution might occur in North Korea. The focuses of the studies were on the cause and timing of the sudden change and the main forces of the revolution in North Korea. There weren't enough discussions on how the process will be developed and whether there will be a system change. In this study, based on the results of analyzing the systematic changes of the Jasmine revolution nations, it suggested five scenarios that can be developed after the sudden change of North Korea. Scenario type I: Relatively peaceful and the possibility of regime change, Scenario type II: Reunification and then civil war, Scenario type III: Regime changed but one of Kim Il Sung family grabbing the power, Scenario type IV: Successful regime change but civil war happening, Scenario type V: Regime change failed and civil war continuing.

Scenario for sudden change in North Korea! : Comparing North Korea with countries of Jasmine Revolution (북한 급변사태 시나리오 I : 재스민혁명 국가들과 북한의 비교를 중심으로)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.63-68
    • /
    • 2017
  • The Jasmine Revolution started from Tunisia in January 2011 has brought many changes into countries in North Africa and Middle East. We need to study the causes of the revolution. First, the kings and dictators in those countries oppressed the opposition parties and the media aiming for long-term seizure of power. The power concentrated on specific people produced illegalities and corruption. Secondly, most of the national income of those countries belonged to kings and dictators producing problems during the distribution of the income. Especially, with the decrease of oil price in 1990s and the increase of the price of daily necessities in 2000s people lost their credits on their governments. Lastly, the number of people in those countries using the Internet has increased by 4,863% from 2000 to 2010. The expansion of social network services such as Facebook and Twitter was one of factors that made the information control by those countries difficult. We should think about the possibility of sudden change in North Korea. It is necessary to compare and analyze the political, economic and social characteristics between those countries and North Korea. It shouldn't be just a simple comparison or analysis. It should provide basic data for objective and quantified index development in relation to sudden change in North Korea.

A Study on the Methodology to Performance Security on the Korea Small/Medium Sized Construction Firms for Venturing into International Market (국내 중소건설업체의 해외 진출 활성화를 위한 건설 보증 확대 방안에 관한 연구)

  • Ahn, Hyoung-Jun;Kim, Ju-Hyung;Kim, Jae-Jun
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2009.11a
    • /
    • pp.225-229
    • /
    • 2009
  • International construction market has been open to other countries, and it derives the development of our overseas construction industry quantitatively as well as qualitatively. Until now, the major companies have an absolute majority in the overseas construction market, and the small and medium enterprises have had difficulty to get a leadership in the international construction market because of the lack of the technical expertise and the capital strength. Especially in the Middle East Asia, our construction companies has touched off a boom, so our market share also has grown, which derived from the up toward ratchet oil prices and a worldwide boom in real estate development. The small and medium enterprise minority have recognition that the overseas construction market is the major company's native territory. But Data from the existing researches and many statistics indicate the most companies tend to underestimate the capacity and international competitiveness of the small and medium enterprises. As a matter of fact, hundreds of small and medium enterprise cut a conspicuous figure in overseas market. Consequently, it is indispensable to overcome the international financial crisis by revitalizing our overseas construction industry which obtains excellent results in international market. this study suggested the ways to expand overseas bonding capacity of Korean financial institution. This study proposed the Korean government to allow Construction Guarantee (former Korea Construction Financial Cooperative) to deal with foreign exchange so that Construction Guarantee will underwrite the overseas construction bond.

  • PDF

The Role of Intelligence Activity in the Building of Israel and its Identity (이스라엘의 정체성과 국가형성과정에서 정보의 역할 연구)

  • Seok, Jae-Wang
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.251-276
    • /
    • 2015
  • The purpose of this article is to examine Israeli intelligence activity which had contributed to the building of Israel and of its national identity. In the late 19th, the Jews scattered around the world had shared the image of victims shaped in the history of the persecution. In this process, intelligence activity was a staple factor which established the state of Israel; political and religious community. Fighting against Arabs, Israel's intelligence agents had played key role in migrating Jews to Palestine and building their own state. In other words, Intelligence activity was the instrument of implementing political Zionism, Jewish nationalism. Even after independence in 1948, despite the opposition of Arab, Israeli intelligence agencies had persuaded the United States and the Soviet Union to recognize Israel as a member of the international society. Arab countries, nevertheless, had regarded Israel as 'a state to be disappeared', and its national identity was totally denied. However, Israel officially gained recognition for statehood through Arab-Israeli war and summit talks with Egypt. Israel finally restored the 'Promised Land' that is recorded in the Bible and established its identity of a winner. In conclusion, Israeli intelligence agency played a decisive role in founding the nation and even forming the consciousness of the people.

  • PDF

The Korean Peninsula security and Military Strategy of USA and China (미.중의 군사전략과 한반도 안보)

  • Son, Do-Sim
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.289-350
    • /
    • 2006
  • The world has been rapidly restructured in an agenda of national security from center of military strength to that of economic strength since the post cold-war era China military leadership-division carried out RMA through learning of a lesson from Gulf war in 1990 -1991 and Iraq war in 2003, thus the leadership-division made an attempt to convert the military system to a technical intensive system. The principle based on RMA of China military is (National defense strategy) drafted by the central military committee 1985 and (Four modernization general principles) 1978. China has introduced Russian high-technological arms and equipment in order to build up the military arms greatly thanks to an economical development, and they take pragmatism line as chinese socialism with their strategy to make secure a position as military powers such as they successfully launched a manned spacecraft and are building an air-craft carrie and soon. USA has a theory of dichotomy whether a country is a cooperator for USA, or not. and also enemy or friend since 9.11terror, thus USA is different from their direction of police. This is because USA stands a position as the superpower of the supremacy hegemony of the world. We must be carefully aware that USA considers as important area for Middle east, West south Asia, Central Asia and Northwest Asia to meet the demands of 2lcentury. Accordingly, the focus of USA's military strategy will be probably concentrated at the above mentioned four areas. On the other hand, USA enjoys such a superpower position due to collapse of USSR which was the past main enemy since the post cold war era. We could give an conclusive example as fact that USA has recurred to unilateralism But USA carry on the military operations to the terror groups at global around by converting thje military strike strategy to pre-emptive strike strategy since9.11 terror, 2001. USA seeks for transformation to the mobile military forces with light-quantity oriented in order to carry on such the military operations and makes progress GPR, And the USA forces in Korea makes progress a military renovation as part of such a military strategy. On the other hand, USA promotes the measures of choose for the countries standing at the crossroads of strategy and carries forward a main scheme of provision for four priority aims that the leaders of a hostile country and mis-country shall be prohibited from use and obtainment of weapons of mass destruction. Accordingly, this treatise found out a significant meaning to have an effect on the national security in the korean peninsula.

  • PDF

Decentralization from Al-Qaida central among Salafi-jihadist groups, Boko Haram and the Islamic States (살라피 지하디스트의 탈-알카에다 중심화와 보코하람, IS에 대한 분석연구)

  • Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.185-212
    • /
    • 2014
  • This research examines the decentralization of al-Qaida and other Salafi-jihadist terrorist groups, which is a subject of intense debate in the West. Especially, this study focused on investigating the status and evolution of al Qa'ida and other two Salafi-jihadist groups, Boko Haram and the Islamic States. These terrorist groups are currently considered as the most active Salafi-jihadist terrorist groups leading today's decentralization from Al-Qaida central terrorism network. This study also aims to examine the contemporary threats posed by the two extremely violent jihadist terrorist groups and these groups's terrorist networks. In order to achieve the purpose of this study, this study conducted content analyses with a wide range of documents reporting about Salafi-jihadist terrorists groups. Also this study utilized GTD data set drwan from START centner to provide descriptive analyses regarding IS and Boko Haram's activities and threats. On the basis of analyses, this study argues that recently the threats posed by core al Qaida has been severely weakened. Further, the broader Salafi-jihadist movement has become more decentralized among four tiers: first, core al Qaida in Pakistan; second, formal al Qa'ida affiliated groups that have sworn allegiance to core al Qaida; a number of Salafi-jihadist groups that have committed to establishing an extremist Islamic emirate without sworn allegiance to al Qaida; third, individual followers and networks inspired by al Qaida and other Salafi-jihadist groups. In concusion and discussion, this study highlights the need for a long-term engagement counter terrorism strategy against Salifi-jihadist terrorists groups on behalf of the peace and security of the world society.

  • PDF

Islamist Strategic Changes against U.S. International Security Initiative (미국(美國)의 대외안보전략(對外安保戰略)에 대응한 이슬람Terrorism의 전술적(戰術的) 진화(進化))

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.517-534
    • /
    • 2007
  • Since the beginning of human society, there have always been struggles and competitions for survival and prosperity, terrorism is not a recent phenomenon, however in modern times it has progressed to reflect the advances in civilization and power structures. At the time of the 9.11 terrorist attacks in the U.S. A., a new world order was in the process of being established after the breakdown of the Cold War era. The attacks drove both the Western and the Islamic worlds into heightened fear of terrorism and war, which threatened the quality of life of the whole mankind. Through two war campaigns against the Islamic world, it seems the U.S. has been pushing its own militaristic security road map of the Greater Middle East democratic initiative, justifying it as a means to retaliate and eradicate the terrorist threats towards themselves. However, with its five-year lopsided victories that cost the nation almost four thousand military casualties, and the war expenses that could match the Vietnam war, the U.S. does not yet seem to be totally emancipated from the fears of terrorism. Terrorism, in itself, is a means of resisting forced rules a form of alternative competition by the weak against the strong, and a way of expressing a dismissive response against dictatorial ideas or orders which allow for no normal changes. Intrinsically, the nature of terrorism is a reaction opposing power logics. Confronted with the absolute military power of the U.S., the Islamic strategies of terrorism have begun to rapidly evolve into a new stage. The new strategies take advantage of their civilization and circumstances, they train and inspire their front-line fighters on the Internet, and issue their orders through the clandestine network of the Al Qaeda operatives. These spontaneously generated strategies have been gained speed among the second, and third Islamic generations, many of whom are now spread throughout western societies. This represents a failure of the power-driven, one-sided overseas security initiatives by the U.S., and is creating a culture of fear and distrust in western societies. It is feared that the U.S. war campaigns have made the clash of religions far worse than before, and may ever lead to global ethnic separations and large-scale population movements. Eventually, it may result in the terrorist groups, enlarged and secretly supported by the huge sums of oil money, driving all mankind into a series of irreparable catastrophes.

  • PDF

A Study on the Possibility of Homegrown Terrorism in Korea Depending on Internalization and Strategy to Cope with the Terrorism (국제화에 따른 한국내 자생테러 발생 가능성과 대응전략)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.125-155
    • /
    • 2012
  • Terrorist organization has shown the trend of secret organization and it is harder to cope with terrorism because of uncertainty of terrorism. Homegrown terrorism is the one, whose preparation, execution and effect are restricted to domestic area. By the way, in the worldwide economic depression, violence and radical demonstration have shown the expansion trends as in Middle East, political revolution of Africa, anti-social resistance of Europe and Wall Street Occupation of USA. Homegrown terrorism is occurring in various countries such as UK and Spain as well as USA. Specialists warn homegrown terrorism in Korea. The purpose of this study was to prospect the possibility of homegrown terrorism that can be generated in the transfer to multi-culture society as various foreigners come to Korea rapidly and suggest the method to cope with the trend. The study analyzed environment and analysis of homegrown terrorism that Korea faces now. The methods to cope with homegrown terrorism are as follows. First, distribution of radical homegrown terrorism via internet should be prevented. Second, the connection between terrorist organization and homegrown terrorist should be prevented. Third, there should be a cooperation among government, residents and religious group. Fourth, there should be an open approach against multi-culture society. Fifth, there should be a systematic control for cause of new conflict. Finally, there should be a long-term approach to cause of new conflict. If we do not make an effort to prevent homegrown terrorism, terrorism environment may face new aspect and national and social cost for it will increase.

  • PDF