• Title/Summary/Keyword: National defense policy

Search Result 257, Processing Time 0.026 seconds

I3A Framework of Defense Network Centric Based C2 Facilities (국방 NC 기반 C2 시설 I3A Framework)

  • Kim, Young-Dong;Lee, Tae-Gong;Park, Bum-Shik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.615-625
    • /
    • 2014
  • Ministry of National Defense, MND, established a "Master Plan of Military Facility" in 2010 based on the defense reform to prepare for future war. It was a plan for consolidating small military facilities into battalion units, reflecting on and preparing for the needs of various changes in defense environment as well as balanced growth of ROK Army, Navy, and Air Force. However, to move forward with "Military Facility Master Plan," current design criteria for military facilities need to be revised to be enacted due to numerous calculation errors in facility footprints because of the absence of a sound facility criteria. Because the future war environment will be changed from Platform basis to Network Centric Warfare basis, Command & Control capability of C4I systems is getting more important. Therefore, Successful mission accomplishment can be secured by convergence of facility and military Information Technology(IT). So, MND should quickly prepare for the operational guidance, design criteria and policy that are suitable for Network Centric Warfare accomplishment, and implement infrastructure of IT and installation of C2 facility in conjunction with consolidation movement of military facilities. In this paper, we propose the defense I3A framework in order to solve this problem.

The study on user satisfaction at Military Hospital Information System (군병원정보시스템 사용자의 만족도에 관한 연구)

  • Chung, Woo-Jin;Lee, Soo-Kyung;Shin, Seung-Ho;Cho, Woo-Hyun;Ryu, Si-Won;Lee, Sun-Mi
    • Korea Journal of Hospital Management
    • /
    • v.7 no.2
    • /
    • pp.80-98
    • /
    • 2002
  • The purpose of this study was to investigate user satisfaction at Defense Medical Information System as it has been utilized as a part of National Defense Information Strategies since Aug. 2000. The subjects of this study were nurse officers and army surgeons of a hospital with 1,000 beds. The results of this study are as follows; First, according to the characteristics of the subjects, there was statistically significant difference in system satisfaction, job satisfaction and information satisfaction at Military Hospital Information System. Second, according to the intention of participation, there was a statistically significant difference in user satisfaction at Military Hospital Information System. Third, according to a level of dexterity at Military Hospital Information System, there was statistically significant difference only in job satisfaction. Fourth, factors to influence system satisfaction were one's duty, using period of Military Hospital Information System, and a level of dexterity at Military Hospital Information System. Factors to influence job satisfaction were a level of dexterity at Military Hospital Information System, one's duty and intention of participation. Factors to influence information satisfaction were one's duty, a level of dexterity at Military Hospital Information System, and intention of participation. As the first study on user satisfaction at Military Hospital Information System, this study suggests the followings. First, a plan to inspire users with intention of participating in information system should be prepared. Second, it is necessary to provide policy activities for job standardization of Military Hospital Information System and legal system improvement.

  • PDF

Analysis of Key Factors in Operational Control Transition Resolution using Analytic Hierarchy Process (AHP) (계층적 분석방법(AHP)을 적용한 전시작전통제권 전환의 주요 결정요인 분석)

  • Park, Sang-Jung;Koh, Chan
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.153-163
    • /
    • 2011
  • This study analyzes the military and political factors that influenced the Participatory Government's resolution in Wartime Operational Control (OPCON) Transition. The research on key factors in OPCON transition firstly implemented literature research and then increased feasibility through additional use of AHP. The analysis results showed that there was a negative effect for Korean Peninsular Defense in the 'ROK-US Alliance Asymmetry' area, a positive effect to increase ROK-led Capability of Theater Operation in the 'ROK and U.S. Alliance Interdependence' area and a positive effect for Invocation of ROK Self-Defense Power in the 'Interests of Participatory Government's Liberal Regime' area respectively. After applying AHP, "ROK exercise of Self-defense" in the 'Interests of Participatory Government's Liberal Regime' area received the highest assessment, while the "Increasement of North Korea's Threat" in the 'ROK-US Alliance Asymmetry' area received the lowest assessment. This study is meaningful in that it analyzed the key military and political factors in the Participatory Government's resolution of Wartime OPCON Transition using AHP.

K-Defense Cloud Computing System Design through Cloud Modeling and Analysis of Social Network Service Application (소셜 네트워크 서비스 어플리케이션의 클라우드 모델링 및 분석을 통한 국방 클라우드 컴퓨탱 시스템 설계)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.37-43
    • /
    • 2013
  • In 2010, the Ministry of National Defense decided to build a MegaCenter including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. The Cloud computing system environment should be designed applying cloud computing technology and policy for an efficient infrastructure that many IT resources are available in the data center as a concentrated form. That is, the system should be designed in such a way that clouding services will be efficiently provided to meet the needs of users and there will not be unnecessary waste of resources. However, in order to build an optimal system, it should be possible to predict the service performance and the resource availability at the initial phase of system design. In this paper, using the CloudAnalyst simulator to predict availability of the K-defence cloud computing system service, conducts cloud modeling and analysis of the 'Facebook', one of the most famous social network service applications with most users in the world. An Optimal K-Defense cloud computing design model is proposed through simulation results.

Development on Fuzzy-AHP Ranking Risk Assessment Model for the monitoring systems (관제시스템 구축을 위한 Fuzzy-AHP 위험 순위 평가 모델 개발)

  • Chung, Sung-Hak;Park, Tae-Joon
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.2
    • /
    • pp.51-59
    • /
    • 2011
  • The objective of this study is to develop an evaluation model for the National highway risky areas. Thus, for the purposes of doing this, National highway risky area evaluated targeting to provide determination ranking and suggesting rival-superiority factors as well as under-inferiority factors in ten National highway risky areas. This study developed for modules of risky areas evaluation, using fuzzy set theory and analytic hierarchy process for evaluation model of National highway risky area in transport environment. The preceding studies assess risk analysis through analysis of causal relationships by National highway safety sector not only handles rating scale development suitable for assessment area by referring to accident frequency model but also geometric structures model. As result of this study, this model of Fuzzy Ahp Risk Analysis (FARA) apply for programmable design in real time processing through easily derive strategy for improvement activities to provide a decision-making effectively. Furthermore, this study contributes frame for improvements of National highway construction for renovation's priority strategy as well as future's policy schemes.

Study on Emerging Security Threats and National Response

  • Il Soo Bae;Hee Tae Jeong
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.34-41
    • /
    • 2023
  • The purpose of this paper is to consider the expansion of non-traditional security threats and the national-level response to the emergence of emerging security threats in ultra-uncertain VUCA situations. As a major research method for better analysis, the theoretical approach was referred to papers published in books and academic journals, and technical and current affairs data were studied through the Internet and literature research. The instability and uncertainty of the international order and security environment in the 21st century brought about a change in the security paradigm. Human security emerged as the protection target of security was expanded to individual humans, and emerging security was emerging as the security area expanded. Emerging security threatsthat have different characteristicsfrom traditionalsecurity threats are expressed in various ways, such as cyber threats, new infectious disease threats, terrorist threats, and abnormal climate threats. First, the policy and strategic response to respond to emerging security threats is integrated national crisis management based on artificial intelligence applying the concept of Foresight. Second, it is to establish network-based national crisis management smart governance. Third, it is to maintain the agile resilience of the concept of Agilience. Fourth, an integrated response system that integrates national power elements and national defense elements should be established.

A Dynamic Analysis on the Relative Effectiveness of Promoting Policies for Information Security Industry (정보보호 산업 육성정책의 상대적 효과 분석)

  • 전재호
    • Korean System Dynamics Review
    • /
    • v.4 no.2
    • /
    • pp.5-44
    • /
    • 2003
  • The focus of this paper is comparing relative effects of government policies for upbringing information security industry from the dynamic point of view. For the purpose of simplicity, these policies are classified into three groups, and then the relative effectiveness of these policy groups is examined using System Dynamics. The three policy groups are composed of technology development policies (TDP), human resource development policies (HDP), and direct supporting policies for overseas expansion (DSP). From the result of the analysis, DSP appears to be the most effective and HDP is the second-best group. By the way, for successful carrying into effect of DSP, marketing manpower should be strengthen. However, current HDP has been focusing on the bringing up technical experts. Therefore, overseas marketing manpower should be reared as well as technicians. Also, the existing infrastructure for overseas expansion for other industries should be shared for DSP of information security industry, because this is essential for success of DSP in terms of timing and costing. Finally, in spite of its low effect, TDP should be maintained continuously. The importance of information security technology is increasing and some countries have already considered these technologies as a core of future national defense. Therefore, we should acquire the competitiveness for a few technologies through continuous development of selected technologies at least.

  • PDF

Substantial Improvement of Medical Care for Detainees in Republic of Korea (대한민국 수용자 의료처우의 실질적 개선)

  • Samin Hong
    • Health Policy and Management
    • /
    • v.33 no.3
    • /
    • pp.370-375
    • /
    • 2023
  • The responsibility to ensure the health rights of detainees, particularly their medical rights, fundamentally lies with the state in all nations. However, in the correctional facilities of the Republic of Korea, these rights are currently not adequately safeguarded. Numerous detainees express dissatisfaction with the medical services provided and show a preference for voluntary external treatment. However, barriers such as prolonged application processes for external treatment and the requirement for detainees to cover their medical expenses present significant challenges. Therefore, the National Human Rights Commission of Korea has advocated for an increased medical budget in correctional facilities and a bolstered professional medical workforce to improve the medical care of detainees. Recommendations for improvements include: (1) establishing dedicated correctional hospitals for detainees, (2) setting up specialized correctional wards, (3) collaborating with military hospitals, (4) launching mobile medical buses for diverse specialties, (5) enhancing collaboration with public and private medical institutions, (6) increasing compensation for partnering external medical institutions, (7) improving the working conditions of medical officers, (8) safeguarding the defense rights of medical staff, (9) improving the working conditions of public health doctors from the Ministry of Justice in correctional facilities, and (10) pre-assigning public health specialists and military doctors to correctional facilities. By implementing these measures, it is anticipated that the quality of medical services in the Republic of Korea's correctional facilities will improve, reducing the demand for external treatments among detainees and ensuring their health and medical rights are realistically upheld.

Design and Simulation of Policy Based Integrated Server System Capable to Provide Real-time Internet Security Service (실시간 인터넷 보안 서비스 제공을 위한 정책기반 통합 서버 설계 및 시뮬레이션)

  • Kim, Gi-Yeong;An, Gae-Il;Jang, Jong-Su;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.565-572
    • /
    • 2001
  • Recently, due to the open architecture of the internet and wide spread of internet users, the cyber terror threatens to the network\`s weak point are tending grow. Until now, information security solutions are passive on security host and particular security system. This passive information security solution is weak from the attacks through the networks connected worldwide internet systems, and has limitation on the defense against cyber terror attacks. Therefore, network level integrated security function must be provided. In this paper, we consider technology limitations on the information security problems and its environment. Then we present the architecture and functions of policy-based information security services for network level active information security function. This paper also includes design of target system, which provide information security services. Finally, we discuss network level system deployment direction and discuss with Network Security Simulation.

  • PDF

Optimal number of initial products test quantity applied Korean version of LRIP (한국형 초도생산제도 도입을 적용한 초도생산품 시험 수량 산출 방안 연구)

  • Jung, Sung-Chan;Kang, Seok-Joong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.120-129
    • /
    • 2020
  • This paper aims to benchmark the United States' LRIP, the country's initial production policy, and provide a Korean version of such policy which reflects the circumstances of the country's weapon system research & development(R&D) and acquisition procedures. The research suggests measures to improve the country's initial production policy in a direction that the policy could execute two stage continuously: (1) employment test & evaluation(OT&E), conducted on prototypes during the development stage, and (2) field employment tests(FT), conducted on initial products during the production stage. In addition, the research provides an equation calculating the optimal number of initial test products to be produced, applying statistical theories of t-distribution. The research aims to be used a reference to calculate the optimal number of initial products to be produced for testing in order to improve future national defense acquisition systems and the stable R&D of weapons systems.