• Title/Summary/Keyword: National defense policy

Search Result 261, Processing Time 0.029 seconds

A Study on the Direction of the Military Personnel Act Revisions for the Implementation of Defense Vision 2050 (국방비전 2050 구현을 위한 군(軍) 인사법 개정방향 연구)

  • Chang-In Lee;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.401-405
    • /
    • 2023
  • From a phenomenological perspective on military human resources to carry out the government's "Defense Vision 2050" project, this study presents the direction of revision of the military pension along with the age and continuous retirement age system under Article 8 of the Military Personnel Act and the promotion criteria under Article 33 of the Enforcement Decree of the Military Act. The Military Personnel Act and the Enforcement Decree of the Military Personnel Act, which was created 60 years ago, are contrary to the equity of the current situation in 2022, and the conflicts continue to be drawn in terms of internal and external aspects of military human resources carrying out the "Defense Vision 2050" project, which is the keynote of the government's policy. In addition, this is linked to the national financial burden of military pension finances. Therefore, this study began with the need to revise the Military Personnel Act so that excellent human resources can continue to be introduced into a military system and perform stable duties through retirement age guarantee systems rather than class retirement.

Protection of Information Sovereignty as an Important Component of the Political Function of the State

  • Zadorozhnia, Halyna;Mykhtunenko, Viktoriia;Kovalenko, Hanna;Kuryliuk, Yurii;Yurchenko, Liubov;Maslennykova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.151-154
    • /
    • 2021
  • State information policy is an important component of foreign and domestic policy of the country and covers all spheres of society. The rapid development of the information sphere is accompanied by the emergence of fundamentally new threats to the interests of the individual, society, state and its national security. The article considers the components of the state information policy to ensure information security of the country and identifies the main activities of public authorities in this area. Internal and external information threats to the national security of Ukraine and ways to guarantee the information security of the country are analyzed. Information security is seen as a component of national security, as well as a global problem of information protection, information space, information sovereignty of the country and information support of government decisions. Approaches to ensure the process of continuity of the information security system of the state in order to monitor new threats, identify risks and levels of their intensity are proposed.

Anti-Corruption Policy to Ensure Public Order in the State Security System

  • Shchekhovska, Larysa;Gavrylechko, Yuriy;Vakuliuk, Vasyl;Ivanyuta, Viktoriya;Husarina, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.57-62
    • /
    • 2022
  • Today, in many countries of the world, the problems of forming and implementing anti-corruption policies are among the most pressing, since the scale of the spread of corruption poses a real threat to national security and democratic development. Without a victory over corruption as a system of social relations, any country will never be able to ensure the safety of its citizens, have a high standard of living, build an efficient economy and a democratic state based on the rule of law, protect its sovereignty, and become competitive among the developed countries of the world community. The main purpose of the article is to analyze the key aspects of the anti-corruption policy of ensuring public order in the state security system. The research methodology includes methods for researching aspects of the anti-corruption policy of ensuring public order in the state security system. Based on the results of the study, the main aspects of the anti-corruption policy of ensuring public order in the state security system are characterized.

A Linear Approximation Model for an Asset-based Weapon Target Assignment Problem (자산기반 무기할당 문제의 선형 근사 모형)

  • Jang, Jun-Gun;Kim, Kyeongtaek;Choi, Bong-Wan;Suh, Jae Joon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.3
    • /
    • pp.108-116
    • /
    • 2015
  • A missile defense system is composed of radars detecting incoming missiles aiming at defense assets, command control units making the decisions on weapon target assignment, and artillery batteries firing of defensive weapons to the incoming missiles. Although, the technology behind the development of radars and weapons is very important, effective assignment of the weapons against missile threats is much more crucial. When incoming missile targets toward valuable assets in the defense area are detected, the asset-based weapon target assignment model addresses the issue of weapon assignment to these missiles so as to maximize the total value of surviving assets threatened by them. In this paper, we present a model for an asset-based weapon assignment problem with shoot-look-shoot engagement policy and fixed set-up time between each anti-missile launch from each defense unit. Then, we show detailed linear approximation process for nonlinear portions of the model and propose final linear approximation model. After that, the proposed model is applied to several ballistic missile defense scenarios. In each defense scenario, the number of incoming missiles, the speed and the position of each missile, the number of defense artillery battery, the number of anti-missile in each artillery battery, single shot kill probability of each weapon to each target, value of assets, the air defense coverage are given. After running lpSolveAPI package of R language with the given data in each scenario in a personal computer, we summarize its weapon target assignment results specified with launch order time for each artillery battery. We also show computer processing time to get the result for each scenario.

Research on make-or-buy decision making strategy using system dynamics: Focused on Korea's military improvement project (시스템 다이내믹스를 이용한 제조-구매 결정 전략: 한국의 방위력 개선 사업을 중심으로)

  • Choi, Jeong-Hwan;Ko, Seong-Pil;Lee, Jeong-Dong
    • Korean System Dynamics Review
    • /
    • v.13 no.1
    • /
    • pp.159-182
    • /
    • 2012
  • Strategic decision on the execution of national security improvement project is greatly important for the present and future national security. Though, the importance of strategic decision, decision making process has been executed under one-way thinking framework. This research provides a decision-making tool with make-or-buy approach for the national security improvement policy execution methods: foreign purchase and military R&D project, and, via simulation, confirms dynamic change of military capability index respect to change in ratio of foreign purchase and military R&D. A result shows that current ratio of foreign purchases and military R&D is insufficient for national security improvement policy goal. Applying the model from this research provides an appropriate ratio for short term and long term defense strategy and policy goal, and consequent result of increase in national security capability. Thus, this research model can be effectively utilized for national security improvement project.

  • PDF

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.

A Study on the Consideration Factors for State-of-the-art Defense Business Orders from Chasm Marketing Perspective (캐즘마케팅 관점으로 바라본 최첨단 무기체계 수주를 위한 고려요소에 관한 연구)

  • Kim, Young-Bok;Kim, Hong-Ki;Lee, Seung-Hee
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.81-90
    • /
    • 2016
  • In the civil market, companies launch new products when the acquired innovations are ready, but in defense, customer requests the innovation applied weapon systems. The technology adoption cycle model takes unusual form of market like inverse chasm takes technology inversely. This thesis describes an inverse chasm from the perspective of technology adoption cycle, equipped product model, and technical progress S-curve. As a way to overcome the inverse chasm, considering factors like a self-investment demo model, customer needs, and the temporary chasm expanding phenomenon are derived. And order-effective relationship analysis and chasm marketing strategy are suggested. Especially securing the core technologies and possibility for equipped product by developing self-investment demo model are identified as a good marketing strategy of chasm. This analysis and strategy suggest the policy implications for preemptive advantage of market positioning in the procurement process of defense, discontinuous innovation technology applied on.

Endosymbiotic Evolutionary Algorithm for the Combined Location Routing and Inventory Problem with Budget Constrained (초기투자비 제약을 고려한 입지..경로..재고문제의 내공생진화 알고리듬 해법)

  • Song, Seok-Hyun;Lee, Sang-Heon
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.37 no.1
    • /
    • pp.1-9
    • /
    • 2011
  • This paper presents a new method that can solve the integrated problem of combined location routing and inventory problem (CLRIP) efficiently. The CLRIP is used to establish facilities from several candidate depots, to find the optimal set of vehicle routes, and to determine the inventory policy in order to minimize the total system cost. We propose a mathematical model for the CLRIP with budget constrained. Because this model is a nonpolynomial (NP) problem, we propose a endosymbiotic evolutionary algorithm (EEA) which is a kind of symbiotic evolutionary algorithm (SEA). The heuristic method is used to obtaining the initial solutions for the EEA. The experimental results show that EEA perform very well compared to the existing heuristic methods with considering inventory control decisions.

Trend of Space Development and Issue (우주개발동향과 주요 이슈)

  • Cho, Hong-Je;Shin, Yong-Do
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.1
    • /
    • pp.97-126
    • /
    • 2014
  • October 4, 1957 the Soviet Sputnik 1 was launched into space the first time in the history of mankind. After launching, the realm of humankind was expanded to space. Today all countries of the world wage a fierce competition in order to utilize space for various purposes. World powers of space such as United States, Russia, China, and Japan, put reconnaissance satellites and ocean surveillance satellites into orbit, being able to easily see equipment and troops movement on earth. Each country makes efforts to occupy space assets through the militarization of space and expand national interests. Recently private companies or individuals involved in commercial space activities are becoming more prevalent. Thus, in addition to space activities for military purposes, commercial space activities become widespread. Individuals and private companies as well as nations are also involved in space activities. Outer space is not the monopoly of space powers such as the United States and Russia. The whole human race can benefit from free access to space, being the common heritage of mankind. In particular, outer space becomes an indispensable element of military activities and human life. Many countries are now entering space development, putting a lot of budget into new development programs. Republic of Korea also built the Narodo Space Center, starting its space development with budget and manpower. We have to find out ways to use space not only for military purposes but also for commercial space activities that can contribute to the national economy. In addition, through the joint efforts of the international community, we have to make efforts for preservation and peaceful use of space. Various issues relating to space activities and research should be studies in order to contribute to the progress of humanity. Those issues include the definition of outer space, space debris reduction and environmental conservation issues, non-bind measure cooperation - European International Code of Conduct, space law and national legislation related empowerment issues, arms control measures in space, and restrictions on the use of nuclear fuel. We also need to be involved in the discussion of those issues as one of responsible space countries. In addition, we try to find out regional cooperation schemes such as the ESA in the Europe actively. Currently in the Northeast Asia, cooperation bodies led by Japan and China respectively, are operated in the confrontational way. To avoid such confrontation, a new cooperative body needs to be established for cooperation on space exploration and information. The system to allow the exchange of satellite information for early warning of natural disasters needs to be built as well. In addition, efforts to enhance the effectiveness of the relevant international treaties on space, and fill in the blanks in international space laws should be made at the same time. To this end, we have to do a leading role in the establishment of standards such as non-binding measures (resolution) - Code of Conduct, being discussed in the UN and other organizations, and compliance with those standards. Courses in aerospace should be requires in law schools and educational institutes, and professional manpower need to be nurtured. In addition, the space-related technology and policy needs to be jointly studied among the private, public, and military groups, and the cross exchange among them should be encouraged.

Shedding Light on the Use of AS Relationships for Path Inference

  • Deng, Wenping;Muhlbauer, Wolfgang;Yang, Yuexiang;Zhu, Peidong;Lu, Xicheng;Plattner, Bernhard
    • Journal of Communications and Networks
    • /
    • v.14 no.3
    • /
    • pp.336-345
    • /
    • 2012
  • Autonomous system (AS) business relationships and their inference have been widely studied by network researchers in the past. An important application of inferred AS relationships can be the prediction of AS paths between a source and destination AS within a model. However, besides knowing the topology and inferred AS relationships, AS path prediction within a model needs to be understood in order for us to know how we can derive border gateway protocol (BGP) policies from AS relationships. In this paper, we shed light onto the predictive capabilities of AS relationships by investigating whether they can be translated into BGP policies such that inferred AS paths are consistent with real AS paths, e.g., paths observed from BGP routing tables. Our findings indicate that enforcing constraints such as the well-known valley-free property and the widely assumed preference of customer routes always results in a very low consistency for AS path inference. In addition, this is true irrespective of whether customer, peer, or provider routes are preferred. Apparently, applying such constraints eliminates many "correct" paths that are observed in BGP routing tables and that are propagated in a simple shortest path model where AS relationships are ignored. According to our findings, deriving BGP routing policies for predicting with high accuracy AS paths in a model directly from AS relationships is still difficult.