• Title/Summary/Keyword: Military security

Search Result 926, Processing Time 0.025 seconds

Examination of NATO's Strategic Changes After the Russia-Ukraine War and Korea's Security Strategic Implications (러-우 전쟁 이후 NATO의 전략 변화와 한국의 안보전략적 함의 고찰)

  • Kim Hyun Jin;Bae Il Soo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.25-29
    • /
    • 2024
  • After the Russia-Ukraine War, NATO broke away from the peacekeeping strategy that it had maintained and declared that it would strengthen the multilateral security consultative body, pursue strategic stability, expand armaments, cooperate security, and strengthen dialogue and cooperation in the Indo-Pacific region. Changes in NATO's strategy directly and indirectly affect Korea's security environment. Only by clearly analyzing this and establishing policies and strategies to respond to it can the threat be suppressed and national interests protected. NATO designates China and Russia as threats. By using cooperation and solidarity with NATO as an opportunity, we will be able to strengthen security cooperation and alliances, develop and expand the defense industry market, and expand opportunities to participate in the Ukraine reconstruction project.

An Active Planning of the Information Security and Technology (정보보호와 기술의 활성화 방안)

  • 장우권
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.11 no.2
    • /
    • pp.83-112
    • /
    • 2000
  • In the 21st Century of the Knowledge-based Economy Internet's Openness, Globality, and Ease to access is the central axis to construct the new melting down and the development of the technology, industry. and culture. However it takes place the disordered ability in the information society. That is, to intrude personal privacy, unlawful actions, to circulate an illegal information, to encroach and to destroy information system, even to, to be in confusion society, national strategy, administration, economy, and military action. As conclusion, first, in this article it looks into and analyzes the information security technology and paradigm to prevent and to stop up criminal actions in the cyberspace. Second, this author propose an active planning of the information security and technology.

  • PDF

Competitive Efforts Regarding the South Pacific Islands by South Korea, Japan and China (동아시아 국가들의 태평양 쟁탈전 : 한국, 일본, 중국의 남태평양 도서국가 외교)

  • Park, Young-June
    • Ocean and Polar Research
    • /
    • v.35 no.4
    • /
    • pp.373-381
    • /
    • 2013
  • The Pacific Island Forum that consists of 14 island countries in the South Pacific has long been the focus of keen attention from East Asian countries such as South Korea, Japan and China. The South Pacific area was controlled by Japan right after the First World War. The League of Nations bestowed the right of trusteeship over the region to Japan, one of the victors in the war. However, the U.S. considered the area indispensible for its security interests in the Pacific after victory in the Second World War. With the end of Cold War period, the region again began to gain the competitive attention of Japan, China and Korea. Japan has made efforts to give economic assistance to this region by holding the Japan-Pacific Islands summit every three years. In addition, Japan is promoting a security engagement with this region by dispatching Self Defense Forces with the aim of initiating construction and development projects. In response to Japan's active involvement in the region, China also began to convene a summit meeting with these countries in 2006, making pledges of economic assistance. Furthermore, Chinese civilian companies struck deals of investment with municipal institutions in the region with a view to enhancing China's influence in the region. Japan's and China's active engagement in the region has galvanized South Korea to craft a more effective strategic approach to the region.

A Study on the Activation Technique of Detection nodes for Intrusion Detection in Wireless Sensor Networks (무선 센서네트워크에서 침입탐지를 위한 탐지노드 활성화기법 연구)

  • Seong, Ki-Taek
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.11
    • /
    • pp.5238-5244
    • /
    • 2011
  • Recently, wireless sensor networks have become increasingly interesting areas over extensive application fields such as military, ecological, and health-related areas. Almost sensor networks have mission-critical tasks that requires very high security. Therefore, extensive work has been done for securing sensor networks from outside attackers, efficient cryptographic systems, secure key management and authorization, but little work has yet been done to protect these networks from inside threats. This paper proposed an method to select which nodes should activate their idle nodes as detectors to be able to watch all packets in the sensor network. Suggested method is modeled as optimization equation, and heuristic Greedy algorithm based simulation results are presented to verify my approach.

International Ocean Issues and Policy Regime (국제 해양환경안전 이슈와 정책레짐 변화)

  • Choi Sung-Doo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.12 no.2 s.25
    • /
    • pp.115-123
    • /
    • 2006
  • The policy regime of ocean is changed from ocean liberty paradigm to ocean management paradigm. Ocean resources have the characteristics of weak excludability and strong rivalry. Therefore, they need rational ocean management so as to curb the tragedy of commons. The important ocean issues and policy regimes today is ocean pollution, coastal management, sea-level rise, fishery, whaling, ocean jurisdictions, deep seabed resources, military security, piracy, ecological environmental security and so on. This paper aims at reviewing these major international ocean issues, the policy regimes for them, and the desirable tasks of ocean policy regimes in the future from the macro perspective of international ocean politics or policy-making.

  • PDF

Dynamism Competent LEACH Replication Deliberate for Wireless Sensor Network

  • KONDA HARI KRISHNA;TAPSI NAGPAL;Y. SURESH BABU
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.7-12
    • /
    • 2023
  • Remote sensor systems are utilized in a few applications, including military, restorative, ecological and family unit. In every one of these applications, vitality use is the deciding component in the execution of wireless sensor systems. Thusly, strategies for information steering and exchanging to the base station are critical in light of the fact that the sensor hubs keep running on battery control and the vitality accessible for sensors is constrained. There are two explanations for the various leveled directing Low Energy Adaptive Clustering Hierarchy convention be in investigated. One, the sensor systems are thick and a considerable measure of excess is engaged with correspondence. Second, with a specific end goal to build the versatility of the sensor arrange remembering the security parts of correspondence. In this exploration paper usage of LEACH steering convention utilizing NS2 test system lastly upgraded vitality productive EE-LEACH directing convention guarantees that the chose cluster heads will be consistently conveyed over the system with a specific end goal to enhance the execution of the LEACH convention. EE-LEACH enhances vitality utilization by around 43%.

Rediscovery of the Arctic: A New Arena of Competition for Natural Resources in the 21st Century? (북극의 재발견: 국제 자원경쟁의 새로운 각축장?)

  • Lee, Seo-Hang
    • Strategy21
    • /
    • s.30
    • /
    • pp.200-235
    • /
    • 2012
  • Over the past few years, due to the climate change of the earth, the Arctic's sea ice cover is undergoing a historic transformation - thinning, extent reduction in all seasons, and mitigation in the area of multi-year ice in the central Arctic Ocean. These changes allow for increases in maritime access throughout the Arctic Ocean and for potential longer seasons of navigation and possibly transarctic voyage in the summer. These changes also allow more exploration for oil, gas, and other minerals. The Arctic is now an archetype of the complex, multi-dimensional global problems of the twenty-first century. Military security, environmental security, and economic security interact. The potentially enormous economic stakes, sufficient to change the strategic balance among the states of the region, set off competitive pressures for national advantage. Korea, which is heavily dependent upon the sea lane in terms of transportation of its exports and imports, is very much interested in the Arctic sea routes. Korea believes that the Artic sea route, particularly the Northern Sea Route (NSR), could serve as a new useful sea lane, which will enable shorter times between East Asia and Europe, thus resulting in substantial cost saving for ship operators. In addition to shipping, Korea is interested in other Arctic-related maritime industries. Korea, as a leading shipbuilder in the global market, is interested in building ice breakers, drill ships, and other vessels which can contribute to safe operation in Arctic resource development and exploration. Korea, as one of the future stakeholders in Arctic maritime activities, should be ready to foster international cooperation in the region.

  • PDF

Challenges in nuclear energy adoption: Why nuclear energy newcomer countries put nuclear power programs on hold?

  • Philseo Kim;Hanna Yasmine;Man-Sung Yim;Sunil S. Chirayath
    • Nuclear Engineering and Technology
    • /
    • v.56 no.4
    • /
    • pp.1234-1243
    • /
    • 2024
  • The pressing need to mitigate greenhouse gas emissions has stimulated a renewed interest in nuclear energy worldwide. However, while numerous countries have shown interest in nuclear power over the course of history, many of them have not continued their pursuit and chosen to defer or abandon their peaceful nuclear power projects. Scrapping a national nuclear power program after making initial efforts implies significant challenges in such a course or a waste of national resources. Therefore, this study aims to identify the crucial factors that influence a country's decision to terminate or hold off its peaceful nuclear power programs. Our empirical analyses demonstrate that major nuclear accidents and leadership changes are significant factors that lead countries to terminate or defer their nuclear power programs. Additionally, we highlight that domestic politics (democracy), lack of military alliance with major nuclear suppliers, low electricity demand, and national energy security environments (energy import, crude oil price) can hamper a country's possibility of regaining interest in a nuclear power program after it has been scrapped, suspended, or deferred. The findings of this study have significant implications for policymakers and stakeholders in the energy sector as they strive to balance the competing demands of energy security, and environmental sustainability.

Transboundary Environmental Harm as a Threat to National Security - Theoretical Analysis and Case Studies - (국가안보에 대한 위협으로서의 국제적 환경손상 - 환경안보의 이론과 사례에 대한 검토 -)

  • Moh, Young-Dawng
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.201-225
    • /
    • 2013
  • The link between transnational environmental harm and national security has attracted new attention due to the environmental crisis such as climate change, nuclear accidents and, pollution. However, both domestic and international environmental regimes are still tied to the unsuccessful and unclear notion-sustainable development. The present author argues that environment should be considered as a security matter for the effective environmental protection. If, for example, a nation committed a serious environmental harm and the effects spans borderlines, and the source nation refuses to cooperate or compensate, would sustainable development still be an appropriate measure? Then, what would be the victim state's tool to protect its own security? The present author first looks into the possibility utilizing UN Security Council. But due to its limited legality and effectiveness in this environmental matter the present author would like to propose a non-traditional but a not-brand new method. This new method reflects two new trends both from international law and security areas. First, this approach clearly moves from the military focused security concept to broader security concept. Second, this is also a shift from traditional international law to transnational law. With these two new approaches, we will find a more suitable answer both for securing national environmental security and for protecting environment.

  • PDF

Development Plan for the Identity and Future of Security Science (경호학의 정체성과 미래에 대한 발전 방안)

  • Kwon, Hyuck-Bin;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.145-172
    • /
    • 2017
  • In 2015 the Department of Education announced that it will make downsizing efforts by recommending classified downsizing ratio according to the evaluation of universities for active support toward autonomous efforts of universities with the possibilities of reform and qualitative structural reform for customized human resource cultivation according to the social demands. This is the preemtive structural reform preparing against the rapid decrease of the number of students, and the preparation for changing into competitive universities so that customized human resource that is needed in the society can be trained. Security Science Departments of Korea, first established in 1996, need changes in curriculum in order to prepare for the fourth revolution of the future, and are stagnant on the education goal and employment course. Therefore the adoption of related certificates, curriculum, NCS, and professional curriculum is needed. For example, Hansei University, Chung-Ang University, and Far East University have established the Department of Industrial Security, and Kyonggi University and Sungshin Women's University have established the Department of Convergence Security. Also, Konkuk University has established the Graduate School of Security and Disasters, the Graduate School of Information and Policy, the Graduate School of Criminal Justice, Gachon University the Graduate School of National Security, Sungkyunkwan University the Graduate School of Strategic Studies. This shows that the field of Security Science should not settle for itself. This article analyzes current curriculum and subjects of security, police, industrial security, military related academic departments of key universities. It is necessary to prepare for the future by predicting the change from the merge of academic departments and the demands of the times. As technical colleges are adopting NCS, this is the time to seek for systematic collaboration between universities and technical colleges and between industry, government, and academida.

  • PDF