• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.028 seconds

Strategies for Implementing Civilian Personnel Management Methods to Recruit and Retain Officers in Military Organizations (군 조직의 간부 유치 및 유지를 위한 민간 방식 인사관리 방법 도입 전략)

  • Ju-Yong Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.219-227
    • /
    • 2024
  • The rapidly changing security environment and technological innovations of the 21st century present new challenges to military organizations. Particularly, as the MZ generation, comprised of Millennials (born 1981-1996) and Generation Z (born 1997-2012), emerges as the primary workforce in the military, traditional military personnel management methods are being called into question. The MZ generation, as digital natives, are technologically proficient, prioritize personal growth and quality of life, and prefer horizontal communication and participation. The purpose of this study is to reestablish talent acquisition and retention strategies for military organizations, considering the characteristics and demands of the MZ generation. To this end, we analyzed advanced talent management techniques from the corporate sector and explored ways to apply them to the unique context of military organizations. Additionally, by examining the current status and challenges of the Korean military, we attempted a balanced approach that considers both global trends and Korea's specific circumstances. The research results suggest various strategies including career development programs, cultural innovation, improvement of reward systems, participatory decision-making, enhancement of digital competencies, and creation of flexible work environments. These strategies are expected to improve the efficiency and competitiveness of military organizations while simultaneously enhancing job satisfaction and organizational commitment among MZ generation service members.

A Study on the Utilization of Private Security for Park Safety (공원안전관리를 위한 민간경비 활용방안 연구)

  • Kang, Yong-Gil
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.7-32
    • /
    • 2013
  • The idea of this study was derived from awareness of local governments and police's limitation on attempts to 'creating safe park'. The purpose of this study is to examine current political measures of preventing various types of possible crimes in the park and the limitation of those policies. Furthermore, this study aims to suggest possible explanations to utilize Private Security Sector for the effective and continuous way of managing park safety by considering legal and practical solutions and its expectations. The methods of analysis used in this study are, first, literature review of current park safety management policies. Second, this article examined implications of strategies of those policies throughout the case study of the USA's park safety policy. Third, this study suggested plans of action and role of Private Security Sector to improve park safety. The results present several arguments for the park safety. First, legislation of mandatory crime preventing programme in the early stages of designing park is required. Introducing the 'park special judicial police system' to the major parks for a immediate response to the crime can be one of suggestions. Moreover, proactive police response systems, such as one of the Seoul Metropolitan Police's policies- 'returning safe parks to a citizen' are required. Second, the case study of the USA regarding park safety confirmed that major parks in the USA have rigorous and detailed park regulations. It also showed that those parks take not only preventing measures, but also follow-up measures against crimes. Third, the results suggest creating human resources by contracting out Park Managers and Private Security Sector that have specialized experiences and techniques to prevent crimes and public disorders. Overall in this study, increased citizen's satisfaction level, control of continuous and systematic crimes, the spread of joint-production of public safety, and increased fields of the Private Security Sector are expected from the findings.

  • PDF

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Strategy for South Korea-Vietnamese Military Cooperation in the field of defense (한(韓)·베트남 군사협력 추진전략 : 방산분야를 중심으로)

  • Lee, Kang Kyong
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.105-112
    • /
    • 2018
  • South Korea and Vietnam have been engaged in extensive political, economic and cultural exchanges since the establishment of diplomaticties in 1992. In March 2018, Moon Jae-in, President of South Korea, made an official visit to Vietnam, a key partner of the New Southern Policy and discussed comprehensive cooperation measures, including expanding trade volume and measures to establish peace on the Korean Peninsula. At the defense ministers' meeting held in April 2018, the two countries signed a joint defense and defense cooperation statement, which included promotion of maritime security, defense cooperation, UN PKO activities, excavation of remains, and joint military cooperation. Currently, Vietnam is facing territorial disputes with China over the South China Sea, and is stepping up military modernization and military buildup to counter this. In particular, Vietnam is strengthening its external military cooperation beyond ideology with the U.S., Russia, India and France to strengthen its maritime power. Against this backdrop, the bilateral cooperation between South Korea and Vietnam needs to expand beyond the traditional economic and cultural exchanges to military cooperation. The study aims to review the relationship between South Korea and Vietnam on the 26th anniversary of the normalization of diplomaticties and seek ways to develop military cooperation with Vietnam, which has grown to the next China. To that end, it analyzed Vietnam's security environment and military strategy and presented strategies for promoting military cooperation focusing on defense areas.

  • PDF

A Study on the Strategy for Improvement of Operational Test and Evaluation of Weapon System and the Determination of Priority (무기체계 운용시험평가 개선전략 도출 및 우선순위 결정)

  • Lee, Kang Kyong;Kim, Geum Ryul;Yoon, Sang Don;Seol, Hyeon Ju
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.177-189
    • /
    • 2021
  • Defense R&D is a key process for securing weapons systems determined by mid- and long-term needs to cope with changing future battlefield environments. In particular, the test and evaluation provides information necessary to determine whether or not to switch to mass production as the last gateway to research and development of weapons systems and plays an important role in ensuring performance linked to the life cycle of weapons systems. Meanwhile, if you look at the recent changes in the operational environment of the Korean Peninsula and the defense acquisition environment, you can see three main characteristics. First of all, continuous safety accidents occurred during the operation of the weapon system, which increased social interest in the safety of combatants, and the efficient execution of the limited defense budget is required as acquisition costs increase. In addition, strategic approaches are needed to respond to future battlefield environments such as robots, autonomous weapons systems (RAS), and cyber security test and evaluation. Therefore, in this study, we would like to present strategies for improving the testing and evaluation of weapons systems by considering the characteristics of the security environment that has changed recently. To this end, the improvement strategy was derived by analyzing the complementary elements of the current weapon system operational test and evaluation system in a multi-dimensional model and prioritized through the hierarchical analysis method (AHP).

Teaching Competencies of University Professors in Future Society (미래 사회 대학 교원의 교수(teaching)역량 프레임 제안)

  • Baek, Jongnam;Baek, Yoojin;Kim, Seyeon;Choi, Sookyoung
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.6
    • /
    • pp.349-357
    • /
    • 2020
  • This study explored the theoretical basis of the teaching competency of university professors in the future society represented by the Fourth Industrial Revolution through literature analysis and the researcher's council. To this end, this study first derived the implications for cultivating of teaching competency of university professors according to the social needs of future social universities. Next, according to the social needs of future social universities, the teaching competency required for university professors was presented. Finally, based on this theoretical argument, the concept of teaching competency of professors in the future society was defined and its sub-elements were presented. As a result of this study, the teaching competency frame of professors in the future society was proposed with 8 capabilities in 3 areas including 2 ability to respond to change, 2 ability to promote innovation, and 4 ability to instruct. Through the theoretical basis proposed in this study, it is hoped that the university professors' teaching competency development plan will be established to prepare for the instability of the uncertain future in the era of the fourth industrial revolution. In addition, it is expected that innovation and change strategies of each university will be established, and class innovation strategies will be established to meet the needs of students.

Rainfed Areas and Animal Agriculture in Asia: The Wanting Agenda for Transforming Productivity Growth and Rural Poverty

  • Devendra, C.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.25 no.1
    • /
    • pp.122-142
    • /
    • 2012
  • The importance of rainfed areas and animal agriculture on productivity enhancement and food security for economic rural growth in Asia is discussed in the context of opportunities for increasing potential contribution from them. The extent of the rainfed area of about 223 million hectares and the biophysical attributes are described. They have been variously referred to inter alia as fragile, marginal, dry, waste, problem, threatened, range, less favoured, low potential lands, forests and woodlands, including lowlands and uplands. Of these, the terms less favoured areas (LFAs), and low or high potential are quite widely used. The LFAs are characterised by four key features: i) very variable biophysical elements, notably poor soil quality, rainfall, length of growing season and dry periods, ii) extreme poverty and very poor people who continuously face hunger and vulnerability, iii) presence of large populations of ruminant animals (buffaloes, cattle, goats and sheep), and iv) have had minimum development attention and an unfinished wanting agenda. The rainfed humid/sub-humid areas found mainly in South East Asia (99 million ha), and arid/semi-arid tropical systems found in South Asia (116 million ha) are priority agro-ecological zones (AEZs). In India for example, the ecosystem occupies 68% of the total cultivated area and supports 40% of the human and 65% of the livestock populations. The area also produces 4% of food requirements. The biophysical and typical household characteristics, agricultural diversification, patterns of mixed farming and cropping systems are also described. Concerning animals, their role and economic importance, relevance of ownership, nomadic movements, and more importantly their potential value as the entry point for the development of LFAs is discussed. Two examples of demonstrated success concern increasing buffalo production for milk and their expanded use in semi-arid AEZs in India, and the integration of cattle and goats with oil palm in Malaysia. Revitalised development of the LFAs is justified by the demand for agricultural land to meet human needs e.g. housing, recreation and industrialisation; use of arable land to expand crop production to ceiling levels; increasing and very high animal densities; increased urbanisation and pressure on the use of available land; growing environmental concerns of very intensive crop production e.g. acidification and salinisation with rice cultivation; and human health risks due to expanding peri-urban poultry and pig production. The strategies for promoting productivity growth will require concerted R and D on improved use of LFAs, application of systems perspectives for technology delivery, increased investments, a policy framework and improved farmer-researcher-extension linkages. These challenges and their resolution in rainfed areas can forcefully impact on increased productivity, improved livelihoods and human welfare, and environmental sustainability in the future.

Use Strategies of CPTED for the Safety of University Campus (대학 캠퍼스의 안전을 위한 CPTED 운용전략)

  • Park, Dong-Kyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.4
    • /
    • pp.340-347
    • /
    • 2010
  • Though there are many crimes on and out university campus in Korea, no one knows anything about the size or the types of campus crime. But, there are many theft crimes and sex assault in the library and one-room village near the university campus. This study suggested the establish ways and means needed to improve the campus security system, with the focus on the CPTED(Crime Prevention Through Environmental Design). Various types of crime prevention methods are being considered instead of conventional crime suppression measures. Among them, CPTED is drawing global attention. Crime prevention through environmental design is a multi-disciplinary approach to deterring criminal behavior through environmental design. CPTED strategies rely upon the ability to influence offender decisions that precede criminal acts. A truly safe campus can be achieved only through the cooperation of all students, faculty, staff and visitors. The cooperation and involvement of the entire campus community in campus crime prevention is absolutely necessary. University should adopt a series of policies and procedures designed to ensure that every possible precaution is taken to protect persons and property on campus.

A Study on Global Strategies of Tank Terminal Operators and Implications for Korea's Oil Hub Policy in Northeast Asia (탱크터미널 운영기업의 글로벌 전략과 우리나라의 동북아 석유물류허브 정책에 대한 시사점)

  • Lee, Choong-Bae;Park, Sun-Young
    • Journal of Korea Port Economic Association
    • /
    • v.25 no.1
    • /
    • pp.63-86
    • /
    • 2009
  • With increasing uncertainty of energy market in the world, the policies for the energy resource security have become crucial Several countries with poor energy resource like Netherlands and Singapore have pursued the policy for becoming an oil hub in the region. Singapore has been an oil hub in East Asia for a long time not only because it is well located with a large number of countries exporting and importing oil but it has also pursued strong policies to become an oil hub while establishing favourable institutional, regulatory and business environment for accommodating major refineries and petro-chemical companies. However with growing trading volume of petroleum products in Northeast Asia and a record high price of oil in these days, the necessities of another oil hub in the region are considered in order to reap benefits of the security of economical and stable oil. South Korea is situated astride the main North Pacific shipping route, with deep water ports and proximity to Chinese and Japanese industrial centres that make tank terminal operators Ideal choices for the oil hub in Northeast Asia although it has several disadvantages such as lack of independent storage facilities, underdeveloped oil trading market and unfavourable business friendly climates etc. This study is focused on examining the globalization strategies of tank terminal operators such as Vopak, Oiltanking and Odfjell in order to suggest the policy implications for becoming an oil tub in Northeast Asia.

  • PDF