• Title/Summary/Keyword: military security policy

Search Result 197, Processing Time 0.023 seconds

Curriculum development group specializing in the Department of Hu-man Resources plan (군 전문인력 양성학과 교육과정 개발 방안)

  • Kim, Young Joung
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.195-202
    • /
    • 2013
  • Defense reform our military for the globalization of information. Scientific command structure, troop structure, unit structure, step-by-step into the power structure while promoting a history of quantitative-oriented structure, and structure of the quality of state-of-the-art technology-driven transition in the middle of the bottle numberplans about the current 3.3-fold increase in reducing the cadre(officers and NCOs). NCO groups in the executive, especially expanding the current level of 100% increase in the rate of long-serving, while ensuring a stable job and to superior resources to secure a stable policy through science. Military alliance is now underway. In the midst of this group, and urged the group at the University of the leading military and specialized resources to ensure each agreement required by subjects to reflect. Thus effectively improve the quality of education and the demands of the job analysis, DACUM curriculum development methods and procedures can be applied at the time of urgent need for foster an excellent resource for the discharge of curriculum development at the University of Selected as a core job, career, and job classification configuration inside of Duty according to KST derived from the group reflect on the training courses to meet the requirements in the curriculum through the development of curriculum, job definition, job model set to propose.

A situation-Flexible and Action-Oriented Cyber Response Mechanism against Intelligent Cyber Attack (지능형 사이버공격 대비 상황 탄력적 / 실행 중심의 사이버 대응 메커니즘)

  • Kim, Namuk;Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.3
    • /
    • pp.37-47
    • /
    • 2020
  • The In the 4th industrial revolution, cyber space will evolve into hyper-connectivity, super-convergence, and super-intelligence due to the development of advanced information and communication technologies, which will connect the nation's core infrastructure into a single network. As applying the 4th industrial revolution technology to the cyber attack technique, it is evolving in an intelligent and sophisticate method. In order to response intelligent cyber attacks, it is difficult to guarantee self-defense in cyberspace by policy-oriented, preplanned-centric and hierarchical cyber response strategies. Therefore, this research aims to propose a situation-flexible & action-oriented cyber response mechanism that can respond flexibly by selecting the most optimal smart security solution according to changes in the cyber attack steps. The proposed cyber response mechanism operates the smart security solutions according to the action-oriented detailed strategies. In addition, artificial intelligence-based decision-making systems are used to select the smart security technology with the best responsiveness.

A Study on the Factors Affecting Drone Use Intention -Comparative analysis of Korea and United Kingdom

  • Park, Seo Youn
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.6
    • /
    • pp.33-41
    • /
    • 2021
  • As interest in drones controlled by remote technology rapidly increases worldwide, drones are used in many fields such as military, rescue, and transportation as future innovations in many countries. In particular, as the drone has been spotlighted as a new future strategic industry, it is also used for public purposes such as disaster relief and crime investigation. However, security concerns such as the penetration of major national facilities, collisions with aircraft, and the possibility of privacy infringement due to aerial photography are also being raised. Unlike the increased interest in drones, there have been few studies on drone use, drone safety, and public attitudes toward drone use. This paper analyzed the perceptions of drone attitudes, drone stability and policy support for drones for Korean and United Kingdom.

A Study on Conflict Prevention in the Site Selection of National Defense Facility Relocation Projects (국방시설 이전사업 적지 선정시 갈등방지에 관한 연구)

  • Seung-Hyun Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.201-208
    • /
    • 2024
  • This study aims to analyze the causes and characteristics of conflicts arising from the relocation of national defense facilities, focusing on the Jeonju Aviation School relocation project, and to explore effective conflict management strategies. As urbanization progresses, military facilities initially located on the outskirts of cities have been integrated into urban areas, increasing the need for relocation. This process frequently results in conflicts among the government, the military, and local residents due to differing interests. This study employs a combination of literature review and surveys to examine perceptions of conflict causes and resolution strategies. The findings reveal that the primary conflict factors include inadequate information provision and consultation, noise and property value decline, and unilateral decision-making processes. Participatory decision-making was found to be effective in resolving conflicts. Based on these findings, the study proposes policy recommendations such as institutional improvements, enhanced information disclosure and communication, comprehensive compensation systems, and strengthened expertise in conflict management. This research is significant in empirically confirming the importance of participatory decision-making in national defense facility relocation projects and providing specific policy suggestions for conflict management.

A Study on Improvement of Test & Evaluation of Vehicle Part in Mixed Equipment and Defense Industrial Technology (혼성장비 차량부 시험평가 및 방위산업기술 보호 제도 개선에 관한 연구)

  • Yoon, Heung-Soo;Ryu, Yeon-Seung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.241-249
    • /
    • 2018
  • The military purpose vehicles are developed by using the platform of civil vehicles according to the commercial vehicle expansion plan and military supplied product commercialization policy. But the information related to the military purpose vehicle which adopts the same platform with the civil vehicle is forced to be exposed because its information is revealed by containing into the maintenance manual and electric circuit diagram. Especially, the information disclosure should be blocked by reviewing the application of technology protection because the military vehicle becomes combating purposed mixed equipment when the missile and radar are mounted. The mixed equipment means the one configured with more than 2 types of equipment, and it is categorized into the main and sub equipment. This study was performed to derive the problems in Korean system for vehicle part test evaluation on the mixed equipment and the defense industry technology protection system, and to derive the methods for improving through interviews with the specialists. The conflicts between the civil laws and army regulation were reduced by adding a clause that the engine reflected with the newest emission gas standard should be mounted based on the time of force integration, and the commercialized military supplies were designated as element technology of defense industry technology in consideration of its roles and functions.

A Study of Geostationary Atmospheric Environmental Monitoring Satellite Data Management Policies (정지궤도 대기환경 관측 위성 자료 관리 정책 방안 연구)

  • Choi, Won Jun;Eun, Jong Won
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.4
    • /
    • pp.10-14
    • /
    • 2016
  • Korean satellite development projects were divided military objectives such as national security, and commercial communication satellites. The First geostationary Korean earth observation satellite, GeoKOMPSAT is a turning point to concern another way to utilizing satellite. In the past, the main concern was the sharp ground images, now days, it is more important to make high added value from satellite data. In particular, environmental payload, GEMS mounted on the satellite GeoKOMPSAT-2 will monitor air quality which is not observed by visual material, may be referred to as case by utilizing the satellite. Satellite data utilization is likely to receive a great influence on the appropriate public policy data. If the public is expected to be fully revealed that potential demand. It is time to change the management policy on the security aspects of weak satellite data. Depending on the expanding use of satellites, it is necessary to investigate the status of disclosing satellite data, and suggests policy options for the distribution of materials for the environment satellite characteristics.

A study on the security threat and security requirements for multi unmanned aerial vehicles (무인기 군집 비행 보안위협 및 보안요구사항 연구)

  • Kim, Mansik;Kang, Jungho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.195-202
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) have mostly been used for military purposes but with the progress in ICT and reduced manufacturing costs, they are increasingly used for various private services. UAVs are expected to carry out autonomous flying in the future. In order to carry out complex tasks, swarm flights are essential. Although the swarm flights has been researched a lot due to its different network and infrastructure from the existing UAV system, There are still not enough study on security threats and requirements for the secure swarm flights. In this paper, to solve these problems, UAV autonomous flight technology is defined based on US Army Corps of Engineers (USACE) and Air Force Research Laboratory (AFRL), and swarm flights and security threat about it are classified. And then we defined and compared security requirements according to security threats of each swarm flights so as to contribute to the development of secure UAC swarm flights in the future.

A Study on Establishing of the Future Development Strategy for National Cyber Terror Response (국가 사이버테러대응 미래 발전전략 수립에 관한 연구)

  • Kim, MinSu;Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.15-24
    • /
    • 2020
  • Cyber terror and cyberwarfare are no longer virtual, but real, and as an actual security situation, it is necessary to have new understanding through expanding the concept of war to neutralize not only the other country's military command system, but also the country's main functions such as telecommunications, energy, finance, and transport systems, and it also needs to establish the future development strategy of cyber terror response at the national level. Through analysis of cyberwarfare trends in each country and current status of cyberwarfare in Korea, it will systematically explore the demand of new policy based on laws and systems, including the strategies of cyber security technology development, industry promotion, and manpower training and existing information protection policies. through this, it effectively manages a sustainable national crisis, and it suggests to establish a future strategy for the medium and long term cyber security that can effectively and actively respond to cyberwarfare.

Competitive Efforts Regarding the South Pacific Islands by South Korea, Japan and China (동아시아 국가들의 태평양 쟁탈전 : 한국, 일본, 중국의 남태평양 도서국가 외교)

  • Park, Young-June
    • Ocean and Polar Research
    • /
    • v.35 no.4
    • /
    • pp.373-381
    • /
    • 2013
  • The Pacific Island Forum that consists of 14 island countries in the South Pacific has long been the focus of keen attention from East Asian countries such as South Korea, Japan and China. The South Pacific area was controlled by Japan right after the First World War. The League of Nations bestowed the right of trusteeship over the region to Japan, one of the victors in the war. However, the U.S. considered the area indispensible for its security interests in the Pacific after victory in the Second World War. With the end of Cold War period, the region again began to gain the competitive attention of Japan, China and Korea. Japan has made efforts to give economic assistance to this region by holding the Japan-Pacific Islands summit every three years. In addition, Japan is promoting a security engagement with this region by dispatching Self Defense Forces with the aim of initiating construction and development projects. In response to Japan's active involvement in the region, China also began to convene a summit meeting with these countries in 2006, making pledges of economic assistance. Furthermore, Chinese civilian companies struck deals of investment with municipal institutions in the region with a view to enhancing China's influence in the region. Japan's and China's active engagement in the region has galvanized South Korea to craft a more effective strategic approach to the region.

May 24 Measures and Future North Korea Policy (5.24 대북조치와 향후 대북정책 과제)

  • Kim, Tae-Woo
    • Strategy21
    • /
    • s.34
    • /
    • pp.128-148
    • /
    • 2014
  • In south Korea, the so-called 'conservative-liberal' rivalry over the assessment of the government's North Korean policies is seen to be impeding the road to right policy choices. For example, the liberals accused former President Lee Myung-bak's hardline policy of provoking Pyongyang and leading to a deterioration of inter-Korean relations, while the conservatives appreciated it for helping nurture mutually beneficial inter-Korean relations in the longer term by compelling North Korea to observe international norms. However, such debate over the vices and virtues of Seoul's North Korea policies is hardly meaningful as the measuring sticks used by the liberals and the conservatives are entirely different matters. The two major goals South Korea must pursue with its North Korean policies should be 'peaceful management of division' and 'change in North Korea'. The former is related to maintaining stability within South Korea and promoting co-prosperity with North Korea. For this, the nation needs to engage, encompass and assist the Pyongyang regime. The second goal is also necessary since South Korea, as a divided nation, must seek a unified Korea under the system of democracy and market economies by bringing change in North Korea. For this, South Korea needs powerful leverages with which it can persuade and coerce the North. This means that the nation is destined to simultaneously chase the above-mentioned two goals, while also both recognizing and negating the legitimacy of the North Korean regime. This situation necessitates Seoul to apply flexibility in reconciling with Pyongyang while applying firm principles to sever the vicious circle involving the North's military provocations. The May 25 Measures, which banned trade and economic cooperation with the North except those related to humanitarian assistance, were taken as sanctions against Pyongyang for sinking the South Korean corvette Chonan in March 2010. The Measures were taken by the Seoul government immediately after a multinational investigation team discovered evidence confirming that the South Korean naval ship had been torpedoed by a midget North Korean submarine. Naturally, the May 24 Measures have since then become a major stumbling block in inter-Korean exchange, prompting opposition politicians and concerned entrepreneurs to demand Seoul to unilaterally lift the Measures. Given the significant damages the Measures have inflicted on inter-Korean economic relations, removing them remains as homework for both Koreas. However, the Measures pertains to the 'principles on national security' the Seoul government must adhere to under all circumstances. This is why North Korea's apology and promises not to repeat similar provocations must come first. For now, South Korea has no alternative but to let North Korea solve the problems it has created. South Korea's role is to help the North do so.