• Title/Summary/Keyword: mutual security

Search Result 476, Processing Time 0.026 seconds

A Study on Verifying the Morality behind 'Mutual Beneficence': A Phenomenological Investigation on the 'Propensity towards Sympathy' (상생적 관계형성을 위한 도덕성 확인에 관한 연구 - '공감적 성향'에 대한 현상학적 고찰 -)

  • Chung, Byung-hwa
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.28
    • /
    • pp.103-131
    • /
    • 2017
  • As the establishment of self-identity is based on 'Relationships of Mutual Beneficence,' the formation of 'Relationships of Mutual Beneficence' is the only road to the security and confirmation of self-existence. But given that our ordinary life almost entirely consists of actions objectifying others, the formation of 'Relationships of Mutual Beneficence' is by no means easy. The formation of 'Relationships of Mutual Beneficence' should be based on morality, controlling self-desire, and not objectifying others. Philosophy based on a priori reasoning describes self-control over selfdesire as the domination of the body through a priori reasoning. But this practical philosophy cannot present a self-evidential internal motivation behind moral actions. Due to this, the application of moral order given by a priori reasoning in response to reality is likely to be reinterpreted on basis of self-interest. With regards to this, the 'propensity towards sympathy' is given as new moral norm. The 'propensity towards sympathy' as emotion is direct and consistent given that feeling occurs prior to thinking. The 'propensity towards sympathy' is intuitive in the sense that it is an instinctual response preceeding a reasoned judgment. The 'propensity towards sympathy,' as a natural moral emotion, is self-validating given that all human beings know it and practice it. But previous studies on the 'propensity towards sympathy' have an obvious limitation because they adopt phenomenological approaches to the 'propensity towards sympathy' which eschew the investigation of morality. Though they present the 'propensity towards sympathy' as a natural emotion based on body rather than reason, they do not philosophically explain the 'propensity towards sympathy.' Thus the 'propensity towards sympathy' as a natural moral emotion is likely to be interpreted as a subjective and relative moral norm. This paper philosophically explains that the 'propensity towards sympathy' is a universal moral norm on the basis of Merleau-Ponty's 'flesh.' 'Flesh' is formed as the entanglement between oneself and others and presents the 'propensity towards sympathy' as its philosophical basis. In other words, 'flesh' formed as the mixture or entanglement between oneself and others is the material foundation upon which one can activate the 'propensity towards sympathy.' This paper's approach to the 'propensity of sympathy' can be desribed as a phenomenological approach to the 'propensity towards sympathy' as a universal moral norm.

The Mutual Assistance System and Cooperation between South Korea, the U.S. and China for the North Korean Nuclear Issue and Unification of the Korean Peninsula (북핵과 한반도 통일에 대한 한·미·중 3국 공조체제와 협력)

  • Kim, Joo-Sam
    • Korea and Global Affairs
    • /
    • v.1 no.1
    • /
    • pp.71-96
    • /
    • 2017
  • This study speculates on responses to the nuclear threats of North Korea and mutual assistance and cooperation between South Korea, the U.S. and China for the unification of the Korean Peninsula. As for the North Koreas nuclear issue and unification of the Korean Peninsula, South Korea is the subject of national division, the U.S. is a responsible country in international issues and does not have diplomatic ties with North Korea. China is a traditional socialist nation and a supporter of North Korea. As North Korea's strategic weapons including nuclear weapons and ballistic missiles are international issues, to defend against Kim Jung-Eun's unexpected acts, the three countries should actively cooperate with each other and develop countermeasures. However, with respect to the road map of the North Koreas issue, there are subtle differences between the U.S. and China in recognition of and sanctions against North Korea as a resolution of the U..N. Security Council. The U.S. has continued a deterrence policy and sanctions against North Korea based on joint threats between South Korea and the U.S. while China has showed a negative position in the process of solving the North Korean nuclear issue because of the unstable security derived from the U.S. 's intervention in the Korean peninsula. North Korea should change its diplomatic policy in a more concrete way towards world peace although it has continued trade of strategic weapons with Middle Eastern countries to maintain its political system. For example, to restart the summit talks and open multilateral security channels. Although the issue of unification of the Korean peninsula should be resolved by South and North Korea themselves, it is strange that South and North Korea depend on the logic of powerful countries for the resolution of a national problem. As for North Koreas nuclear and the Unification issues, peaceful solutions presented by South Korea seem more persuasive than the solution presented by North Korea which did not secure any international support. However, South Korea, the U.S. and China need to develop uni-directional two-tract strategies for sanctions against North Korea and talks with North Korea for peace on the Korean peninsula, and should continue to support the economic independence of North Korea.

Formation of a Professional Communication Culture Among the Students Using Information Technologies

  • Vakulyk, Iryna;Koval, Valentyna;Lukiianchuk, Inna;Romanenko, Nataliia;Grygorenko, Tetyana;Balalaieva, Olena;Oros, Ildiko
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.75-82
    • /
    • 2022
  • Analyzing the psychological and pedagogical literature, we found the researchers' interest in the problem posed. The concept of "culture of professional communication» is considered, which is interpreted as the level of realization of creative abilities, exchange of messages, organization of mutual understanding, mutual knowledge in the process of professionally directed interaction between subjects, in which interpersonal relationships arise, manifest and form. The concept of "professional culture of communication of a teacher" is interpreted. The motives that are socially significant in the professional communication of the teacher are highlighted. The necessity of forming a culture of professional communication among students, in particular by means of information technologies in the present, is clarified. The interactive component of professional communication is considered. The types of interactions between people in everyday life (ritual and entertainment interaction, joint purposeful activity, no interaction, game and interpersonal interaction) are identified. Traditional and specific forms and methods of teaching are written out. All interactive technologies carried out by means of information technologies are conventionally divided into four groups, depending on the form of educational activity appropriate for their use (pair (work of the subject with the teacher or peers one on one by means of Information Technologies); frontal (the teacher simultaneously teaches a group of subjects by means of Information Technologies); group or cooperative (all subjects teach each other by means of Information Technologies); individual (independent work of the subject using Information Technologies)). In the higher education institution, future specialists should learn knowledge, acquire skills on the basic rules of the culture of professional communication and methods of interaction and their effective use, which is possible with the use of Information Technologies. Recommendations for optimal professional communication have been developed that help you express your thoughts easily and beautifully, and conduct a dialogue in a relaxed and harmonious way.

Comparison Study between the Cyber Weapon System and the Conventional Weapons Systems on Their Core Technologies Levels and Features (국방 사이버 무기체계와 기존 재래식 무기체계의 핵심기술 수준 및 특성 비교 연구)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.985-994
    • /
    • 2016
  • Since the inauguration of Defense Acquisition Program Administration(DAPA) in 2006, the national defense core technology research & development business has not only pertained to the weapons systems development but also to the improvement of the national science & technology capability via the acquisition of cutting-edge technologies. Furthermore, it has been closely related to the promotion of the defense industry and the mutual improvements of defense and civil technologies. The cyber warfare weapon system, a newly added national defense weapon system field since 2015, has become a promising weapon system branch for improving the national defense power as well as the national defense industry as shown in the case of Israel. By utilizing the existing result of the national defense core technology level, in order to establish the direction of technology planning of the cyber warfare weapon system, this paper analyzes the technology level and features of the cyber warfare weapon system in various aspects via comparisons with other weapons systems. The result of these analyses shows that the cyber warfare weapon system possesses a relatively high technology level due to the technology accumulation in the civilian sector while the relatively slow inclusion to the national weapons systems and the lack of the correspondence case regarding aggressive cyber responses in the defense sector yields a relatively low national rank. However, the technological gap between South Korea and the most advanced country in the field of cyber warfare technology is analyzed to be among the lowest, which indicates that with efficient and effective pursuits in terms of pthe weapons systems acquisitions as well as the core technologies research & development business, an outstanding cyber warfare capacity can be obtained in a short time.

The Plans for Core Personnel Management to Prevent Industrial Technology Leakage (산업기술 유출방지를 위한 핵심인력 관리방안에 관한 연구)

  • Kim, Soon-Seok;Shin, Jae-Chul
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.109-130
    • /
    • 2010
  • As many countries in the world including the Republic of Korea have used all their national resources in the accelerating economic information warfare, illegal leakage of industrial technologies and information has increased rapidly. The costs required for damage prevention from 2007 to 2008 are estimated at approximately KRW 180 trillion which is expected to increase gradually in future. Because the tricks of leaking key technologies are also getting increasingly systematized, sophisticated and bigger, e.g., simple theft at the individual level or the conspiracy of all the staff taking part in the research activities, we should pay special attention to technology security in addition to technology development. While there are several factors affecting such the brain drain, they usually include personal, social, political and cultural factors, for instance, very heavy educational expenditure of children compared to relatively low pay, the speedy labor market circulation for experienced personnel, or political restrictions on researches. In this context, as part of efforts made to prevent the outflow of core personnel, individual companies and research institutes should establish systematically appropriate core personnel management systems for their own organizational or business goals and principles which are intented to ensure to give better treatment and benefit to core personnel and to exercise closer supervision over them. Furthermore, the conventional personnel management system should be radically and flexibly improved in the manner of encouraging the core personnel returning to the organization to combine their external experiences with practices, instead of penalizing them. At the same time, it is necessary to train and educate core personnel through mutual collaboration and in-house training facilities as well as external academic programs operated jointly at the level of the industry. Finally, as the issues concerning the outflow of core personnel are not just problems of relevant companies and other advanced countries have devoted their best efforts to secure their own key technologies at the national level, it is urgent for the industry and the competent authorities to cooperate closely.

  • PDF

Secure and Efficient Protocol for Vehicular Communication with Privacy Preservation (프라이버시를 보호하며 안전하고 효율적인 차량간 통신 프로토콜)

  • Kim, In-Hwan;Choi, Hyoung-Kee;Kim, Jung-Yoon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.420-430
    • /
    • 2010
  • Due to increasing demand for improving road safety and optimizing road traffic, Vehicular Ad-Hoc Networks (VANET) have been subject to extensive attentions from all aspects of commercial industry and academic community. Security and user privacy are fundamental issues for all possible promising applications in VANET. Most of the existing security proposals for secure VANET concentrate authentication with privacy preservation in vehicle-to-vehicle (V2V) and vehicle-to-roadside infrastructure (V2I) communications and require huge storage and network capacity for management of revocation list. Motivated by the fact, we propose a new scheme with security and privacy preservation which combines V2V and V2I communication. With our proposed scheme, the communication and computational delay for authentication and overhead for management of revocation list can be significantly reduced due to mutual authentication between a vehicle and a Roadside Unit (RSU) requires only two messages, and the RSU issues the anonymous certificate for the vehicle on behalf of the Trust Authority (TA). We demonstrate that the proposed protocol cannot only guarantee the requirements of security and privacy but can also provide efficiency of authentication and management of revocation list.

A Study on the Protection for Original Technology and Improved Patent when Research Institutes or Universities Transfer their Research Outputs (출연연 및 대학에서 연구성과물의 기술이전 시 개량특허와 원천기술의 보호에 관한 검토 : H대학교와 D제약사의 신약후보물질 관련 개량특허 탈취논쟁여부를 중심으로 (대상판결: 서울중앙지방법원 2014.12.24. 선고 2013가합85597 판결))

  • Kang, Sun Joon;Kim, Min Ji;Won, Yoo Hyung;Oh, Keon Taek
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.2
    • /
    • pp.313-333
    • /
    • 2017
  • As science and technology advanced, specialized and massive, development through mutual cooperation or research based on patent licensing such as material transfer contract, technology transfer contract etc are actively taking place to minimize or separate the cost and risk of R&D. In R&D, such mutual work can enjoy the merit of division of labor by effectively allocating resources and manpower to accomplish its goal. Inevitably, however, there are also many possibilities of disputes regarding the ownership and use of intellectual property rights resulting from such mutual/post-studies, or inventions upgraded by using prior patents. The case reviewed by this paper is noticeable regarding the recent trend of upgraded inventions. In the case, a pharmaceutical company conducted tests/assessments on the complete technology of patent owned by a university on the premise of transferring the technology, and then terminated the technology transfer contract due to reasons of toxicity. The university then filed a damage claim suit against the company for infringing the contract. This is a dispute case betw een a university which developed a potential ingredient for new medicine and a pharmaceutical company which agreed to transfer and receive the technological later on. Regarding the upgraded inventions of source patents, this case has many implications on the protection of prior patents, research contract, and research security to protect the accomplishment of research. This paper reviews the subject ruling and the protection of upgraded patents and source technologies. As critical notes, the paper also summarizes the major issues of case ruling to observe the standard of ruling patent infringement related to the extortion of upgraded patents. Then, through the ruling of the case above, the paper suggests implications and future strategies.

A Secure Protocol for Contents Service in IMT-2000 (IMT-2000 기반 컨텐츠 서비스를 위한 보안 프로토콜)

  • Lee, Deok-Gyu;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.241-252
    • /
    • 2003
  • IMT-2000 appeared in order to satisfy the desires of the uses who wish to supply through wireless most of the services being provided through wire, such as Internet services and multimedia high-speed data information. However, during global roaming, the signal data and the user data get transmitted through the networks of other users. Also, it is judged that with the provision of high speed data communication the amount of data communication necessary for confidentiality protection will increase. It is planned that the recent IMT-2000 Project will begin its commercial service in 2002. From this viewpoint, wireless contents, due to their special characteristics, are greatly exposed to illegal actions by third persons. As a result, it can be said that security and certification issues in the mobile telecommunication environment are indispensable matters. For this purpose, it is intended that in this thesis through an analysis of the existent IMT-2000 certification method, a more safe and efficient authentication method is presented and, at the same time, a security protocol necessary in the provision of wireless contents is designed.

Design and Implementation of a Client Mail Security System for Secure Mail Exchange using Public Key Infrastructure (공개키 기반 구조에서 안전한 메일 전송을 위한 클라이언트 메일 보안 시스템 설계 및 구현)

  • 정창렬;고진광
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.149-157
    • /
    • 2003
  • Recently, the Internet enhanced by development of IT makes the processing and exchanging of information, As the Internet is sending and receiving digitized documents over the Internet e-mail system. The security of document information is being threated when exchanging digitized documents over an open network such as the Internet. The degree of threat is even higher when sensitive documents are involved Therefore, in this paper, the secure e-mail system on a client is designed and implemented in order to make secure exchanging of digitized documents. By using the public key infrastructure in which encrypted mail transmission, proof of delivery and integrity of the message are garanted, unauthorized manipulation, illegal acquisition and mutual authentication problem can be prevented in order to secure the document information which is crucial and sensible when exchanging the digitized document over the Internet. Futhenmore, by using the SET protocol based on public key cryptography, the secure mail system is designed and implemented in order for the users not having any professional knowledge to deal with the system easily and friendly in GUI environment.

Contents Error and Security Analysis of 'Security Analysis and Improvements of a Biometrics-based User Authentication Scheme Using Smart Cards' ('스마트카드를 이용한 생체인식기반 사용자 인증스킴의 분석 및 개선'의 내용 오류와 안전성 분석)

  • Park, Mi-Og;Oh, Gi-Oug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.99-106
    • /
    • 2014
  • In this paper, we analyze weaknesses of the biometrics-based user authentication scheme proposed by An. The result of analysis An's authentication scheme by the login success scenario proposed in this paper, if the attacker successes to get user's random number, he/she can pass user authentication phase of the legal server. Also the biometrics guessing scenario proposed in this paper shows the legal user's the biometric information is revealed in lost smart card. Since An's authentication scheme submit user ID and biometrics in plain text to the server, it is very vulnerable to inner attack and it is not provide the user anonymity to the server as well as the one to the third by user ID in plain text. Besides An's authentication scheme is contextual error too, due to this, it has weakness and so on that it did not check the validity of the smart card holder.