• Title/Summary/Keyword: 국가안보

Search Result 611, Processing Time 0.025 seconds

A Study on the Effect of Organizational Culture on Security Performance (조직문화가 보안성과에 미치는 영향 연구 - 군인 가치관의 매개효과를 중심으로 -)

  • Park, Jaegon
    • Korean Security Journal
    • /
    • no.58
    • /
    • pp.215-241
    • /
    • 2019
  • This study approached the military security problem from the viewpoint of social psychology in view of the fact that the military security problem has been focused on the technical field such as cyber security along with the development of defense science and technology. In this background, we examined the causal relationship between variables after extracting variables affecting the security problem of the military through previous research. The significance of the study results is as follows. First, the military culture has a direct and indirect influence on improving the willingness to adhere to security and the security level of military organizations, as well as contributing to the establishment of military values. This indicates that the overall organizational culture of the current military is influencing the security consciousness of the soldiers and the achievement of organizational security, while at the same time showing the need for effort to create the right organizational culture. Second, the values of soldiers had a positive effect on the willingness of the individual to obey the security and the security performance. Values begin with an understanding of organizational culture and indicate that efforts can be made to establish an organizational security posture when the right values are formed. Third, we have improved the completeness of the study by verifying the causal relationship by extracting variables that correspond to the context of the ROK military.

The Optimal Energy Mix in South Korea's Electricity Sector for Low Carbon Energy Transition in 2030: In Consideration of INDC and Sequential Shutdown of Decrepit Nuclear Power Plants (저탄소 에너지 전환을 위한 2030년 최적전력구성비: 노후 원전 단계적 폐쇄와 INDC를 고려한 시나리오)

  • Kim, Dongyoon;Hwang, Minsup
    • Journal of Environmental Impact Assessment
    • /
    • v.26 no.6
    • /
    • pp.479-494
    • /
    • 2017
  • After Fukushima incident, negative sentiment towards nuclear power has led to transition in policies that reduce the dependency on nuclear power in some countries. President Moon of Republic of Korea also announced a national plan of decommissioning retired nuclear power plants stage by stage. Therefore, nuclear power that once was considered the critical solution to energy security and climate change is now a limited option. This study aims to find an optimal energy mix in Korea's electricity system from 2016 through 2030 to combat climate change through energy transition with minimum cost. The study is divided into two different scenarios; energy transition and nuclear sustenance, to compare the total costs of the systems. Both scenarios show that electricity generated by wind technology increases from 2018 whereas that of photovoltaic(PV) increases from 2021. However, the total cost of the energy transition scenario was USD 4.7 billion more expensive than the nuclear sustenance scenario.

A Study on the Cooperation & Development Schemes of South-North Korea Logistics in the Age of Changes (변화시대 남북물류의 협력과 발전방안에 관한 연구)

  • Kim, Hong-Seop
    • Journal of Korea Port Economic Association
    • /
    • v.28 no.1
    • /
    • pp.229-261
    • /
    • 2012
  • Concerning the political situations of Korea, after the coming of MB Administration the blockades between South and North has been deepened. Because of stopping of the tourism of Diamond Mountain, the Cheonan ship accidents and the ** bombardment of Yeonpyung island, the situation of confrontation of South and North is enlarged. After the death of Kim Jong-il, on 17 Dec. 2011, the new situations are opened in North Korea(NK). On the basis of economic cooperation between South and North, various logistical cooperation of South and North has been progressed. On November of 2002, the 1st Shipping Cooperation Meeting of South and North, which may be a basis of Shipping Agreement has been discussed. And the railway between South and North has been connected. This study, screening the change of South and North conditions, analyzed the tasks and current conditions of South and North logistics based on economic cooperation, with the previous researches and data of South and North Korea. And it grouped and suggested future development directions and practical agenda, after considering the recent changes. Furthermore it proposed the medium-long term logistical system of Korea peninsula and future strategies and vision. To solve the confrontation situations the role of South Korea is more important.

Similarity on Types of Illegal Weapon Self-report (불법무기 자진신고의 대상별 유사성)

  • Joo, Il-Yeob;Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.137-157
    • /
    • 2017
  • The purpose of this study was to analyze similarity on types of illegal weapon self-report such as firearms, swords, shells, bullets, explosives in 16 regions of Korea in 2011, 2015. The results of this study were as follows. First, the types of illegal weapon self-report in 2011 were divided into two clusters, such as (1) 'cluster 1' including firearms, swords, shells and explosives, (2) 'cluster 2' including bullets. Second, the multidimensional scales on the types of illegal weapon self-report in 2011 were firearms located in the lower right corner(4/4), swords located in the lower right corner(4/4), shells located in the lower right corner(4/4), bullets located in the center left corner(3/4), explosives located in the higher right corner(1/4). Third, the types of illegal weapon self-report in 2015 were divided into two clusters, such as (1) 'cluster 1' including firearms, swords, shells and explosives, (2) 'cluster 2' including bullets. Forth, the multidimensional scales on the types of illegal weapon self-report in 2015 were firearms located in the lower right corner(4/4), swords located in the higher right corner(1/4), shells located in the higher right corner(1/4), bullets located in the center left corner(2/4), explosives located in the center right corner(4/4).

  • PDF

The Pyeongchang 2018 Olympic Winter Games and North Korea's Denuclearization (2018 평창동계올림픽과 북한의 비핵화)

  • Lee, Hong Jong
    • Korea and Global Affairs
    • /
    • v.2 no.1
    • /
    • pp.93-112
    • /
    • 2018
  • The Pyeongchang 2018 Olympic Winter Games is a good example of functionalism in integration theories. President Moon Jae-in is extremely lucky to play host to the Winter Olympics. Moon should be particularly happy to have declared the 23rd Winter Games open, because a handful of North Korean athletes marched into the Pyeongchang Stadium as members of a joint team from "Corea," the result of his strenuous efforts to have the North participate in the world festival of sports on snow and ice. But the president of this divided nation hardly draws envy from other world leaders, as he is faced with the daunting task of accommodating the selfish positions of surrounding powers concerning North Korean nuclear and missile threats. North Korea, a trivial competitor in winter sports, scored big outside the games' sporting arenas by inviting President Moon to summit talks in Pyongyang. As a precondition for a 2018 summit, Pyongyang will first ask for the cessation of the annual joint Korea-US military exercises. President Moon invested a lot in the Olympic delegates from the North. Korea's leader will now have to start a truly difficult game which will require the best of best strategies as well as a great deal of wisdom and tenacity not only to deal with the weapons of mass destruction-toting North Koreans, but also with allies. On the other hand, Moon needs to make the effort to reset domestic politics with tolerance and compromise, so he can better concentrate on the conundrum of North Korean nuclear and missile threats.

The Landscape of Post-ELSI Methodologies: The Governance of Synthetic Biology and 'Undone Social Science' (Post-ELSI 지형도: 합성생물학 거버넌스와 '수행되지 않은 사회과학')

  • Woo, Taemin;Park, Buhm Soon
    • Journal of Science and Technology Studies
    • /
    • v.14 no.2
    • /
    • pp.85-125
    • /
    • 2014
  • This paper explores what we call 'the problem of undone social science' by examining the lack of interests in the social, ethical, and legal issues of synthetic biology among social scientists in Korea. This new field of science, which has emerged in the twenty-first century with the promise of solving future problems of energy, food, and disease in the world, has also created a considerable degree of anxiety over the issues of bioethics, biosafety, and biosecurity. From its beginning, therefore, researchers of synthetic biology in Europe and the U.S. have sought to engage social scientists in their projects. Yet scientists and social scientists in Korea have shown no sign of working together to deal with both potential benefits and risks of synthetic biology. Why this silence? What strategic moves would be needed to overcome the structural barrier for their collaboration? Surveying the diverse methodologies developed during and after ELSI (ethical, legal, social implications) experiments, this paper aims to provide three suggestions that might make possible mutually profitable and continuously stimulating dialogues between the two worlds of science and social science: first, institutionalize the ELSI studies on any newly emerging science and technology of concern; second, explore diverse post-ELSI methodologies experimented elsewhere and develop ones that might be applicable best to the Korean situation; and third and perhaps most important, create an intellectual space and a lawful protection for social scientists to exercise their research freedom at the reasonable level and receive a fair review by their peers, not solely by funding agencies and scientific organizations.

  • PDF

국방예산(國防豫算)의 국민경제적(國民經濟的) 효과분석(效果分析)과 지출구조(支出構造) 개선방안(改善方案)

  • Hwang, Seong-Hyeon
    • KDI Journal of Economic Policy
    • /
    • v.20 no.3_4
    • /
    • pp.175-222
    • /
    • 1998
  • 본 논문에서는 우리나라 국방예산 운영의 국민경제적 파급효과에 대한 실증분석에 기초하여 국방예산 규모논쟁에 대한 검토, 지출구조의 개선방안, 그리고 지출구조 개성을 위한 국방부문의 효율화 방향을 제시하였다. 실증분석을 위해 Feder-Ram 2부문-외부효과모형에 기초하여 1970년대 이후 총국방비 운영유지비 방위력개선비 등 3가지의 국방부문 지표를 이용한 실증분석 결과, 방위력개선비가 국민총생산에 대해 유의한 정(正)의 효과를 갖는 것으로 나타났다. 총국방비의 경우 유의성이 없었으며, 운영유지비의 경우 유의한 부(負)의 효과를 갖는 것으로 나타났다. 국방예산 규모논쟁과 관련하여, 최근 GDP 대비 국방비 비중과 안보위협을 고려한 국가군별 비교 등을 통해볼 때, 지금까지의 우리나라 국방비규모의 상대적 비중이 하락하는 추세를 더 이상 기대하기는 어렵다고 보는 것이 현실적인 인식이라고 판단된다. 이제 국방예산 관련 논의의 초점은 상대적 규모를 포함하여 국방예산규모 자체보다는 국방예산의 지출구조와 내역에 맞추어져야 하고, 국방예산 운영의 낭비사례를 방지하고 효율성 투명성을 높여서 적절한 지출구조와 배분내역 방식을 이루는 것이 되어야 한다고 판단된다. 국방예산 지출구조의 개선을 위해서 투자비 성격의 방위력개선비 비중을 높이는 예산구조상의 개선이 매우 중요한 과제이다. 이를 위해 각종 경사경비에 대한 영점기준의 검토작업과 더불어 인력과 장비의 대체, 인력구조의 조정 등을 통해 기술집약형 전력구조를 지향하는 보다 근본적인 구조조정노력이 이루어져야 할 것이다. 미래전 양상에 대비한 군 첨단화의 핵심인 해상방위력 및 항공력 증강 등이 필수적이며, 지상군 위주에서 상대적으로 해 공군 중심의 군 구조로 개선되어야 할 것이다. 구조개선의 완급조절과 군별배분의 수평적 구조개선을 통해서 예산규모의 커다란 증대 압력 없이 추진 할 수 있는 구조개선은 시급히 실현되어야 할 것이며, 구조조정 재원의 상당부분은 군 내부의 낭비사례를 막고 생산성을 획기적으로 제고해서 확보할 수 있어야 할 것이다. 국방예산 운영의 효율성 투명성 제고를 위해서는 군 내부 자원관리기능이 강화되어야 하고, 군조직 운영에 있어서도 민간부문에 상응하는 경영효율성 개념의 과감한 도입이 요구된다. 지금까지의 '국방전력 극대화'를 위한 군인중심의 획일적 폐쇄적 군조직 운영에서 벗어나 조직 인사 예산 운영 전반에 걸친 경영혁신이 이루어져야 한다. 국방부문에 경영효율성 개념을 도입하여 경영혁신을 이루어나가는 주요 정책방향은 일부 기능 조직의 민영화 및 민간위탁의 확대, 민간전문인력의 활용도 제고, 자율적 책임경이 필요한 부문을 대상으로 한 "책임경영사업소(Agency)제도"의 도입 등이다. 또한 유사기능을 갖는 조직과 각군별로 별도로 설립되어 중복되는 기능을 수행하는 기관을 통폐합해야 할 것이다.

  • PDF

A Study on the Cyber Weapons Classification System (사이버무기 분류체계에 관한 시론)

  • Lee, Yongseok;Kwon, Hunyeong;Choi, Jeongmin;Lim, Jongin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.905-917
    • /
    • 2018
  • The sovereign state has the right to engage in self-defense or war with the approval of the Security Council when it receives an invasion of territory from a foreign country. War is conducted under the principle of the necessity and proportionality of self-defense. In case of cyber attack, proportional countermeasure must be made through attack means and effect analysis, and cyber weapons need to be classified for this purpose. Therefore, this study aims to provide a rational and legitimate response according to the necessity and proportionality of the self - defense right by suggesting definition and classification criteria of cyber weapons. In this study, cyber weapons were defined as "means of collecting, attacking, and protecting information using cyber technology in the cyber space according to military objectives. Based on existing weapon systems and public cyber weapons cases, cyber weapons were classified as (1) cyber weapons for information gathering, (2) cyber weapons for attack, and (3) cyber weapons for protection. We suggest the considerations for applying the proportional response according to this functional classification. In order to guarantee the principle of proportionality to cyber attacks in the future, the classification study based on the cyber weapon effect should be conducted. This study has conducted an exploratory study on the classification of cyber clusters which constitutes one axis of the proportionality principle.

Efficient Feature Selection Based Near Real-Time Hybrid Intrusion Detection System (근 실시간 조건을 달성하기 위한 효과적 속성 선택 기법 기반의 고성능 하이브리드 침입 탐지 시스템)

  • Lee, Woosol;Oh, Sangyoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.471-480
    • /
    • 2016
  • Recently, the damage of cyber attack toward infra-system, national defence and security system is gradually increasing. In this situation, military recognizes the importance of cyber warfare, and they establish a cyber system in preparation, regardless of the existence of threaten. Thus, the study of Intrusion Detection System(IDS) that plays an important role in network defence system is required. IDS is divided into misuse and anomaly detection methods. Recent studies attempt to combine those two methods to maximize advantagesand to minimize disadvantages both of misuse and anomaly. The combination is called Hybrid IDS. Previous studies would not be inappropriate for near real-time network environments because they have computational complexity problems. It leads to the need of the study considering the structure of IDS that have high detection rate and low computational cost. In this paper, we proposed a Hybrid IDS which combines C4.5 decision tree(misuse detection method) and Weighted K-means algorithm (anomaly detection method) hierarchically. It can detect malicious network packets effectively with low complexity by applying mutual information and genetic algorithm based efficient feature selection technique. Also we construct upgraded the the hierarchical structure of IDS reusing feature weights in anomaly detection section. It is validated that proposed Hybrid IDS ensures high detection accuracy (98.68%) and performance at experiment section.

A Review of Change Detection Techniques using Multi-temporal Synthetic Aperture Radar Images (다중시기 위성 레이더 영상을 활용한 변화탐지 기술 리뷰)

  • Baek, Won-Kyung;Jung, Hyung-Sup
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.5_1
    • /
    • pp.737-750
    • /
    • 2019
  • Information of target changes in inaccessible areas is very important in terms of national security. Fast and accurate change detection of targets is very important to respond quickly. Spaceborne synthetic aperture radar can acquire images with high accuracy regardless of weather conditions and solar altitude. With the recent increase in the number of SAR satellites, it is possible to acquire images with less than one day temporal resolution for the same area. This advantage greatly increases the availability of change detection for inaccessible areas. Commonly available information in satellite SAR is amplitude and phase information, and change detection techniques have been developed based on each technology. Those are amplitude Change Detection (ACD), Coherence Change Detection (CCD). Each algorithm differs in the preprocessing process for accurate automatic classification technique according to the difference of information characteristics and the final detection result of each algorithm. Therefore, by analyzing the academic research trends for ACD and CCD, each technologies can be complemented. The goal of this paper is identifying current issues of SAR change detection techniques by collecting research papers. This study would help to find the prerequisites for SAR change detection and use it to conduct periodic detection research on inaccessible areas.