• Title/Summary/Keyword: deterrence

Search Result 94, Processing Time 0.027 seconds

A Coherent Model in Upholding General Deterrence Theory and Impact to Information Security Management

  • Choi, Myeong-Gil;Ramos, Edwin R.;Kim, Man-Sig;Kim, Jin-Soo;Whang, Jae-Hoon;Kim, Ki-Joo
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.73-86
    • /
    • 2009
  • To establish an effective security strategy, business enterprises need a security benchmarking tool. The strategy helps to lessen an impact and a damage in any threat. This study analyses many aspects of information security management and suggests a way to deal with security investments by considering important factors that affect security manager's decision. To address the different threats resulting from a major cause of accidents inside an enterprise, we investigate an approach that followed ISO17799. We unfold a criminology theory that has designated many measures against the threat as suggested by General Deterrence Theory. The study proposes a coherent model of the theory to improve the security measures especially in handling and protecting company assets and human lives as well.

  • PDF

Nuclear-First Politics of Kim Jung Un Regime and South Korea's Deterrence Strategy (김정은 정권의 선핵(先核) 정치와 한국의 억제전략)

  • Kim, Tae Woo
    • Strategy21
    • /
    • s.39
    • /
    • pp.5-46
    • /
    • 2016
  • North Korea's 4th nuclear test on Jan. 6 and following developments once again awakened the world into seriousness of the nuclear matters on the Korean peninsula. On March 2, UNSC adopted Resolution 2270 which is complemented by Seoul government's measures such as withdrawal from the Gaesung Industrial Complex (Feb. 9) and announcement of unilateral sanction (March 8). Seoul government also strongly urged the international community to strangle North Korea's 'financial resources.' The U.S., Japan, China, and other countries have issued unilateral sanctions to complement the UNSC measure. South Korea and the U.S. conducted their annual joint military drill (Resolve-Foal Eagle) in the largest-ever scale. North Korea, however, responded with demonstration of its nuclear capabilities and announcement of de facto 'nuclear-first' politics. North Korea test-fired a variety of delivery vehicles, threatened nuclear strikes against South Korea and the U.S., and declared itself as an 'invincible nuclear power armed with hydrogen bombs' at the 7th Workers 'Party Congress held in May, 2016. Considering the circumstantial evidences, the North's 4th nuclear test may have been a successful boosted fission bomb test. North Korea, and, if allowed to go on with its nuclear programs, will become a nuclear power armed with more than 50 nuclear weapons including hydrogen bombs. The North is already conducting nuclear blackmail strategy towards South Korea, and must be developing 'nuclear use' strategies. Accordingly, the most pressing challenge for the international community is to bring the North to 'real dialogue for denuclearization through powerful and consistent sanctions. Of course, China's cooperation is the key to success. In this situation, South Korea has urgent challenges on diplomacy and security fronts. A diplomatic challenge is how to lead China, which had shown dual attitudes between 'pressure and connivance' towards the North's nuclear matters pursuant to its military relations with the U.S, to participate in the sanctions consistently. A military one is how to offset the 'nuclear shadow effects' engendered by the North's nuclear blackmail and prevent its purposeful and non-purposeful use of nuclear weapons. Though South Korea's Ministry of Defense is currently spending a large portion of defense finance on preemption (kill-chain) and missile defense, they pose 'high cost and low efficiency' problems. For a 'low cost and high efficiency' of deterrence, South Korea needs to switch to a 'retaliation-centered' deterrence strategy. Though South Korea's response to the North's nuclear threat can theoretically be boiled down into dialogue, sanction and deterrence, now is the time to concentrate on strong sanction and determined deterrence since they are an inevitable mandatory course to destroy the North' nuclear-first delusion and bring it to a 'real denuclearization dialogue.'

Implications of Focused Deterrence Strategy for Municipal Police in South Korea (집중억제전략이 자치경찰제에 주는 시사점)

  • Park, Si Young;Choi, Eung Ryul
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2023.11a
    • /
    • pp.289-290
    • /
    • 2023
  • 이 연구의 목적은 집중억제전략(focused deterrence)이 자치경찰제에 미칠 수 있는 영향을 검토하는 데 있다. 구체적으로 집중억제전략이 실시된 보스턴 총기 프로젝트의 성공 원인을 검토하고, 국내 자치경찰위원회의 시책과 비교·분석하였다. 이를 통해 집중억제전략이 자치경찰제에 가지는 의미를 파악하고, 국내에서 집중억제전략이 성공적으로 실행되기 위한 방안을 제언하였다.

  • PDF

Defending Multiple Terrorist Targets (대테러전략의 게임이론적 분석)

  • Lee, Sanghoon K.
    • KDI Journal of Economic Policy
    • /
    • v.35 no.3
    • /
    • pp.91-124
    • /
    • 2013
  • This paper analyzes a situation where multiple targets are exposed to a potential terrorist attack. The probability of an attack is determined endogenously in a game where a terrorist chooses the target while the targets independently determine the level of deterrence. As each target tries to divert an attack to others, the symmetric equilibrium becomes suboptimal and exhibits dispersion in the level of deterrence. The analysis shows that the first best deterrence level may be achieved when the targets can write a binding risk-sharing contract. Such a contract has limited applicability however as it suffers from a potential verification problem.

  • PDF

Factors Affecting Information Breach Intention: Based on General Deterrence Theory and Rational Choice Theory (정보유출의도에 대한 영향요인: 일반 억제 이론 및 합리적 선택 이론을 기반으로)

  • Kim, June-Young;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1507-1517
    • /
    • 2017
  • Generally, information breach incidents are thought to be caused by external hackers. However, both direct and indirect information breach incidents by insiders are more frequent than by external hackers. It also accounts for more than half of the total information breach, so it should be prepared against insider breach. In this study, based on General Deterrence Theory(GDT) and Rational Choice Theory(RCT), we integrated the risk sensitivity and situational anxiety, which were studied in the field of traffic psychology to construct research model. Result of analysis shows that the impact of risk perceptions on the severity and certainty of perceived punishment was not statistically significant, but perceived benefits, situational anxiety, and severity and certainty of perceived punishment were found to influence the information breach intention.

Development and Implementation of a 2-Phase Calibration Method for Gravity Model Considering Accessibility (접근성 지표를 도입한 중력모형의 2단계 정산기법 개발 및 적용)

  • CHOI, Sung Taek;RHO, Jeong Hyun
    • Journal of Korean Society of Transportation
    • /
    • v.33 no.4
    • /
    • pp.393-404
    • /
    • 2015
  • Gravity model has had the major problem that the model explains the characteristics of travel behavior with only deterrence factors such as travel time or cost. In modern society, travel behavior can be affected not only deterrence factors but also zonal characteristics or transportation service. Therefore, those features have to be considered to estimate the future travel demand accurately. In this regard, there are two primary aims of this study: 1. to identify the characteristics of inter-zonal travel, 2. to develop the new type of calibration method. By employing accessibility variable which can explain the manifold pattern of trip, we define the zonal travel behavior newly. Furthermore, we suggest 2-phase calibration method, since existing calibration method cannot find the optimum solution when organizing the deterrence function with the new variables. The new method proceeds with 2 steps; step 1.estimating deterrence parameter, step 2. finding balancing factors. The validation results with RMSE, E-norm, C.R show that this study model explains the inter-zonal travel pattern adequately and estimate the O/D pairs precisely than existing gravity model. Especially, the problem with estimation of short distance trip is overcomed. In conclusion, it is possible to draw the conclusion that this study suggests the possibility of improvement for trip distribution model.

Nuclear Weapons and Extended Deterrence in the U.S.-ROK Alliance (핵무기와 한·미 핵 확장억제 능력)

  • Huntley, Wade L.
    • Strategy21
    • /
    • s.34
    • /
    • pp.236-261
    • /
    • 2014
  • The future role of nuclear extended deterrence in the security alliance between the United States and the Republic of Korea is currently a central concern. The gradually lessening role of reliance on nuclear weapons in US security policies broadly, combined with increasing North Korean nuclear capabilities and belligerence, raise fresh questions about the sufficiency of the "nuclear umbrella" as a pillar of the US-ROK defense posture. This article addresses the current and future role of nuclear extended deterrence in Korea in this dynamic context. The article reviews the longstanding trend toward reducing the overall size of the US nuclear arsenal, and assesses developments in US-ROK outlooks toward extended deterrence in response to the Obama administration's nuclear policies and North Korea's recent smaller-scale aggressions. The analysis finds that the challenges of deterrence credibility and allied reassurance are difficult and long-term. The analysis explains how these challenges emerge less from a shrinking US numerical arsenal size than from the sufficiency of specific nuclear and non-nuclear capabilities to meet emerging smaller-scale threats. The analysis also highlights the importance of broader strategic and political interaction in sustaining allied confidence in any joint security posture. The evaluation concludes that a strong US-ROK alliance relationship can be maintained while the size of the US nuclear arsenal continues to decline, in part because nuclear weapons in any deployment configuration are relatively ineffective means for deterring smaller-scale aggression. Nevertheless, continuing adjustment of the US-ROK extended deterrence posture to the evolving, complex and uncertain Korean peninsula security environment will remain an ongoing challenge. Finally, the article encourages further examination of the potential specific role ROK maritime forces might serve in enhancing deterrence of smaller-scale threats while minimizing risks of conflict escalation.

Software Piracy in Vietnam: Analysis of Key Factors

  • Tuan, Vo-Quoc;Yoo, Chul-Woo;Kim, Mi-Suk;Choe, Young-Chan
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.487-492
    • /
    • 2007
  • This research focuses on the development and empirical validation of a model of software piracy behavior on the basis of deterrence theory, expected utility theory and the theory of reasoned action. The total of sample numbered 86 and PLS (Partial Least Square) was utilized for analysis. The test of this study revealed that punishment severity was the greatest significant factor to influence to software piracy and subjective norms was also significantly related to it. However punishment certainty and software cost do not significantly affect to software piracy.

  • PDF

An Integrated Computer Security Model Based on the General Trust Theory (신뢰성이론을 바탕으로 한 통합 컴퓨터 보안 모형에 관한 연구)

  • Lee, Sang-Gun;Yoo, Sang-Jin
    • Asia pacific journal of information systems
    • /
    • v.12 no.1
    • /
    • pp.123-138
    • /
    • 2002
  • For the last two decades, there has been much research on computer abuse from the perspective of the general deterrence theory based on objectism, which covers security policy, security awareness programs, and physical security system. The traditional view offered by the general deterrence theory indicates that security policy, security awareness, and security system play a major role in preventing computer abuse. In spite of continuous organizational efforts and investments based on these systematic factors, the incidence of computer abuse in organizations is still rapidly increasing. This paper proposes another perspective-the social control theory based on subjectism-in preventing computer abuse. According to the social control theory, organizational trust, which comprises organizational attachment, commitment, involvement and norms, can prevent computer abuse by reducing insider's computer abuse. The aim of this article is to assess the role of organizational trust come from attachment, commitment, involvement, norms in preventing computer abuse. The results indicate that both organizational trust and deterrent factors are effective in preventing computer abuse.

A Microeconomic Analysis on Terrorism and Anti-terror Policies (테러와 테러정책에 대한 미시경제학적 분석)

  • Choe, Hyo-Cheol
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.201-235
    • /
    • 2004
  • This paper provides a simple microeconomic model of terrorist attcks and anti-terrorism policies. The terrorists can be characterised as rational actors, choosing between legal activities and terrorist activities to promote their political goals. Since their resources are limited, one can think of anti-terrorist policies by examining how such policies affect the objectives and constraints of terrorists. Deterrence policy seeks to reduce terrorist attacks by raising the cost of undertaking terrorist acts. Proactive policy aims at preventing attacks by destroying terrorists' resources (fund, personnel, leadership). This paper suggests another type of anti-terrorist policy which is to reduce the benefits of (or in other words, raising the opportunity costs of) terrorist acts. Such a policy is based on decentralisation in political decision-making and economic power.

  • PDF