• Title/Summary/Keyword: Military Security policy

Search Result 199, Processing Time 0.028 seconds

An Analysis of the US 3rd Offset Strategy (미국의 제3차 국방과학기술 상쇄전략에 대한 분석)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.27-35
    • /
    • 2016
  • This thesis analyzes the backgrounds of the third offset strategy of the US Department of Defense. The key technology areas to be developed and the implications of the 3rd strategy are also examined. The potential great powers, China and Russia have catched up with US in the certain areas of military technologies. The technological superiority of US military is found to have been eroded. The US DOD needs a new defense policy called the 3rd offset strategy to meet this new challenge. The 5 basic technology areas were identified; learning machines, human-machine collaboration, machine-assisted human operations, human-machine combat teaming, and autonomous weapons. The 3rd offset strategy should be managed not to move to the new arms race with rivalries. The defense acquisition system also needs to be improved for the smooth flow of the advanced commercial technologies to the defense sector. Korea needs to figure out the possible technologies of co-research and development with US.

A Study on Application of u-Learning System in Network Centric Warfare Environment (네트워크중심전 환경에서의 u-러닝 시스템 적용방안에 관한 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.43-49
    • /
    • 2010
  • With the development of information and communications technology(ICT), the concept of ubiquitous that we can communicate regardless of time and place appears. Due to the development of the technology delivering information, current society is called intellectualization society developed from informatization society. The intellectualization society is based on knowledge accumulated by processing information. The education methods are also developed into a concept of u-Learning applying the concept of ubiquitous from the concept of e-Learning using a computer. The military also points out education as a key policy. The aspect of war is changing to NCW(Network Centric Warfare) from platform centric warfare. Therefore, collecting and managing the war situations in real time is a key to controlling command. To this end, it needs to maximize individuals and groups' ability to cultivate the military with cutting-edge knowledge. Therefore, this study aims to look into methods to apply u-learning system in training and military actions according to changes in war environments and ICT.

Curriculum development group specializing in the Department of Hu-man Resources plan (군 전문인력 양성학과 교육과정 개발 방안)

  • Kim, Young Joung
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.195-202
    • /
    • 2013
  • Defense reform our military for the globalization of information. Scientific command structure, troop structure, unit structure, step-by-step into the power structure while promoting a history of quantitative-oriented structure, and structure of the quality of state-of-the-art technology-driven transition in the middle of the bottle numberplans about the current 3.3-fold increase in reducing the cadre(officers and NCOs). NCO groups in the executive, especially expanding the current level of 100% increase in the rate of long-serving, while ensuring a stable job and to superior resources to secure a stable policy through science. Military alliance is now underway. In the midst of this group, and urged the group at the University of the leading military and specialized resources to ensure each agreement required by subjects to reflect. Thus effectively improve the quality of education and the demands of the job analysis, DACUM curriculum development methods and procedures can be applied at the time of urgent need for foster an excellent resource for the discharge of curriculum development at the University of Selected as a core job, career, and job classification configuration inside of Duty according to KST derived from the group reflect on the training courses to meet the requirements in the curriculum through the development of curriculum, job definition, job model set to propose.

A situation-Flexible and Action-Oriented Cyber Response Mechanism against Intelligent Cyber Attack (지능형 사이버공격 대비 상황 탄력적 / 실행 중심의 사이버 대응 메커니즘)

  • Kim, Namuk;Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.3
    • /
    • pp.37-47
    • /
    • 2020
  • The In the 4th industrial revolution, cyber space will evolve into hyper-connectivity, super-convergence, and super-intelligence due to the development of advanced information and communication technologies, which will connect the nation's core infrastructure into a single network. As applying the 4th industrial revolution technology to the cyber attack technique, it is evolving in an intelligent and sophisticate method. In order to response intelligent cyber attacks, it is difficult to guarantee self-defense in cyberspace by policy-oriented, preplanned-centric and hierarchical cyber response strategies. Therefore, this research aims to propose a situation-flexible & action-oriented cyber response mechanism that can respond flexibly by selecting the most optimal smart security solution according to changes in the cyber attack steps. The proposed cyber response mechanism operates the smart security solutions according to the action-oriented detailed strategies. In addition, artificial intelligence-based decision-making systems are used to select the smart security technology with the best responsiveness.

A Study on the Factors Affecting Drone Use Intention -Comparative analysis of Korea and United Kingdom

  • Park, Seo Youn
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.6
    • /
    • pp.33-41
    • /
    • 2021
  • As interest in drones controlled by remote technology rapidly increases worldwide, drones are used in many fields such as military, rescue, and transportation as future innovations in many countries. In particular, as the drone has been spotlighted as a new future strategic industry, it is also used for public purposes such as disaster relief and crime investigation. However, security concerns such as the penetration of major national facilities, collisions with aircraft, and the possibility of privacy infringement due to aerial photography are also being raised. Unlike the increased interest in drones, there have been few studies on drone use, drone safety, and public attitudes toward drone use. This paper analyzed the perceptions of drone attitudes, drone stability and policy support for drones for Korean and United Kingdom.

A Study on Conflict Prevention in the Site Selection of National Defense Facility Relocation Projects (국방시설 이전사업 적지 선정시 갈등방지에 관한 연구)

  • Seung-Hyun Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.201-208
    • /
    • 2024
  • This study aims to analyze the causes and characteristics of conflicts arising from the relocation of national defense facilities, focusing on the Jeonju Aviation School relocation project, and to explore effective conflict management strategies. As urbanization progresses, military facilities initially located on the outskirts of cities have been integrated into urban areas, increasing the need for relocation. This process frequently results in conflicts among the government, the military, and local residents due to differing interests. This study employs a combination of literature review and surveys to examine perceptions of conflict causes and resolution strategies. The findings reveal that the primary conflict factors include inadequate information provision and consultation, noise and property value decline, and unilateral decision-making processes. Participatory decision-making was found to be effective in resolving conflicts. Based on these findings, the study proposes policy recommendations such as institutional improvements, enhanced information disclosure and communication, comprehensive compensation systems, and strengthened expertise in conflict management. This research is significant in empirically confirming the importance of participatory decision-making in national defense facility relocation projects and providing specific policy suggestions for conflict management.

A Study on Improvement of Test & Evaluation of Vehicle Part in Mixed Equipment and Defense Industrial Technology (혼성장비 차량부 시험평가 및 방위산업기술 보호 제도 개선에 관한 연구)

  • Yoon, Heung-Soo;Ryu, Yeon-Seung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.241-249
    • /
    • 2018
  • The military purpose vehicles are developed by using the platform of civil vehicles according to the commercial vehicle expansion plan and military supplied product commercialization policy. But the information related to the military purpose vehicle which adopts the same platform with the civil vehicle is forced to be exposed because its information is revealed by containing into the maintenance manual and electric circuit diagram. Especially, the information disclosure should be blocked by reviewing the application of technology protection because the military vehicle becomes combating purposed mixed equipment when the missile and radar are mounted. The mixed equipment means the one configured with more than 2 types of equipment, and it is categorized into the main and sub equipment. This study was performed to derive the problems in Korean system for vehicle part test evaluation on the mixed equipment and the defense industry technology protection system, and to derive the methods for improving through interviews with the specialists. The conflicts between the civil laws and army regulation were reduced by adding a clause that the engine reflected with the newest emission gas standard should be mounted based on the time of force integration, and the commercialized military supplies were designated as element technology of defense industry technology in consideration of its roles and functions.

A Study of Geostationary Atmospheric Environmental Monitoring Satellite Data Management Policies (정지궤도 대기환경 관측 위성 자료 관리 정책 방안 연구)

  • Choi, Won Jun;Eun, Jong Won
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.4
    • /
    • pp.10-14
    • /
    • 2016
  • Korean satellite development projects were divided military objectives such as national security, and commercial communication satellites. The First geostationary Korean earth observation satellite, GeoKOMPSAT is a turning point to concern another way to utilizing satellite. In the past, the main concern was the sharp ground images, now days, it is more important to make high added value from satellite data. In particular, environmental payload, GEMS mounted on the satellite GeoKOMPSAT-2 will monitor air quality which is not observed by visual material, may be referred to as case by utilizing the satellite. Satellite data utilization is likely to receive a great influence on the appropriate public policy data. If the public is expected to be fully revealed that potential demand. It is time to change the management policy on the security aspects of weak satellite data. Depending on the expanding use of satellites, it is necessary to investigate the status of disclosing satellite data, and suggests policy options for the distribution of materials for the environment satellite characteristics.

A study on the security threat and security requirements for multi unmanned aerial vehicles (무인기 군집 비행 보안위협 및 보안요구사항 연구)

  • Kim, Mansik;Kang, Jungho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.195-202
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) have mostly been used for military purposes but with the progress in ICT and reduced manufacturing costs, they are increasingly used for various private services. UAVs are expected to carry out autonomous flying in the future. In order to carry out complex tasks, swarm flights are essential. Although the swarm flights has been researched a lot due to its different network and infrastructure from the existing UAV system, There are still not enough study on security threats and requirements for the secure swarm flights. In this paper, to solve these problems, UAV autonomous flight technology is defined based on US Army Corps of Engineers (USACE) and Air Force Research Laboratory (AFRL), and swarm flights and security threat about it are classified. And then we defined and compared security requirements according to security threats of each swarm flights so as to contribute to the development of secure UAC swarm flights in the future.

A Study on Establishing of the Future Development Strategy for National Cyber Terror Response (국가 사이버테러대응 미래 발전전략 수립에 관한 연구)

  • Kim, MinSu;Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.15-24
    • /
    • 2020
  • Cyber terror and cyberwarfare are no longer virtual, but real, and as an actual security situation, it is necessary to have new understanding through expanding the concept of war to neutralize not only the other country's military command system, but also the country's main functions such as telecommunications, energy, finance, and transport systems, and it also needs to establish the future development strategy of cyber terror response at the national level. Through analysis of cyberwarfare trends in each country and current status of cyberwarfare in Korea, it will systematically explore the demand of new policy based on laws and systems, including the strategies of cyber security technology development, industry promotion, and manpower training and existing information protection policies. through this, it effectively manages a sustainable national crisis, and it suggests to establish a future strategy for the medium and long term cyber security that can effectively and actively respond to cyberwarfare.