• Title/Summary/Keyword: 국방정책론

Search Result 18, Processing Time 0.019 seconds

A Study on the Identifying Emerging Defense Technology using S&T Text Mining (S&T Text Mining을 이용한 국방 유망기술 식별에 관한 연구)

  • Lee, Tae-Bong;Lee, Choon-Joo
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.1
    • /
    • pp.39-49
    • /
    • 2010
  • This paper tries to identify emerging defense technology using S&T Text Mining. As a national agenda, there has been much effort to build S&T information systems including NTIS and DTiMS that enable researchers, policy makers, or field users to analyze technological changes and promote the best policy practices for efficient workflow, knowledge sharing, strategy development, or institutional competitiveness. In this paper, the S&T Text Mining application to unmanned combat technology using INSPEC DB is empirically illustrated and shows that it is a feasible approach to identify emerging defense technology as well as the structure of knowledge network of the future technology candidates.

An Estimation Method of the Operational Cost for Weapon Systems Acquisition (신무기체계구매에 따른 운영비의 추계 방법론 -항공기 중심으로-)

  • Kim, Hyung-Ki
    • Journal of the military operations research society of Korea
    • /
    • v.3 no.2
    • /
    • pp.103-117
    • /
    • 1977
  • 국방조직과 규모의 대형화와 군사위협에 따른 전략전술개념의 변동은 방위비의 부담을 가속화시킬 것이다. 군사력 증강소요의 제기와 국민경제에 의한 가용자원의 합목적적인 자원배분과정은 능률적인 정책과제의 선택과 결정을 위한 기본정보자료가 정책법정권자나 입안자들에게 요구된다. 따라서 신무체계의 구매우선순위 결정은 물론 기존 무기체계의 경제적 운용 기간에 대한 운영총괄비용의 추계방법론을 시도하였다. 이는 분석내용이나 결과의 사용에 대한 관점의 상이성을 제시해 주고 있다. 또한 신항공무기체계를 중심으로 운영총괄비용의 추계를 위한 일반적인 개념정립은 물론 비용산정의 구체적인 절차와 기법을 기구하였다.

  • PDF

국방기술정책의 패러다임 변화와 최근동향(2)

  • Hong, Seong-Beom
    • Defense and Technology
    • /
    • no.4 s.170
    • /
    • pp.20-27
    • /
    • 1993
  • 국가가 산업 경쟁력과 국방력을 동시에 확보하기 위해, 지원해야 하는 기술을 선정하고, 지원 정도 및 개발된 기술의 활용방안을 결정하는 것은 기술이 가지는 복합적 성격과 기술을 둘러싼 기술외적인 환경 때문에 결코 쉬운 일이 아닙니다. 따라서 민군 공용 기술개발 프로그램의 수행은 국가 산업 경쟁력 및 국방력의 강화라는 명분과 지원 과정에서 야기될수 있는 정치적 현실사이의 괴리감을 극복할수 있는 명확한 원칙과 방법론이 요구됩니다

  • PDF

The Study on Development of R&D Technology Rating Methodology in the Defense Area (국방 R&D기술 등급평가 방법론 개발 연구)

  • Jung, You-Jin;Kim, Joon-Young;Joung, Tae-Yun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.2
    • /
    • pp.158-167
    • /
    • 2017
  • This paper presents the technology rating methodology that is applicable to defense R&D technology. First, a technology profitability index was developed using multiple regression analysis to forecast the revenue from technology transfer. Secondly, the technology evaluation index was derived using hierarchical analysis with expert opinion. Finally, the weighted average of the technology profitability index and technology evaluation index were calculated to derive the technology rating. This study is significant in that it is first attempt to evaluate defense R&D technology by rating. If the defense R&D technology rating methodology is applied in practice, it can contribute to efficient R&D budget allocation. In addition, it will help in the vitalization of technology transfer in the defense R&D sector.

The Trend and Implications of the Publication of China's Defense and Security White Papers (중국의 국방·안보백서 발간의 추이와 함의)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.3 no.1
    • /
    • pp.39-76
    • /
    • 2019
  • This paper is to analyze the trend and implications of the publication of China's defense and security white papers. To this end the paper is composed of 5 chapters titled instruction; publication details and composition of China's defense and security white paper; the gist of the white paper on national defense and security during the Chinese president Xi Jinping era; the implications of Chinese white paper on national defense and security during the Chinese president Xi Jinping era; and conclusion. The Chinese Ministry of National Defense had published seven books every two years since 1998 to 2010. In 1995, the ministry published a white paper titled 'China's arms control and disarmament' for the first time. In 2013, it published a white paper titled 'The Diversified Employment of China's Armed Forces' and 'China's Military Strategy' in 2015. All have the common characteristic of being a propaganda policy reflecting China's strategic calculations. It seems that China has began to publish defense white papers in a proactive manner, due to the following factors: (1)pressure on China to demand military transparency from neighboring countries such as the United States; (2)the erosion of the 'China threat.' and (3)confidence in the achievement of China's military modernization. The 'active defensive strategy' and the 'strong defense strategy' of Si Jinping are implied in the words "China's dream is a dream of a powerful country and dream of a strong nation is essential to construct a strong nation." His these strategies have raised security concerns for neighboring countries. We need to maintain and reinforce strong ROK-US security cooperation, and hedging strategies to harmoniously promote ROK-China economic cooperation.

A study on the analysis of cyber warfare using Clausewitz's trinity theory (클라우제비츠의 삼위일체론을 통한 사이버공간 전쟁 해석 연구)

  • Lee, Hanhee;Kang, Ji-Won
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.41-47
    • /
    • 2018
  • Theorists of war have often used Clausewitz's trinity theory as a framework for analyzing war strategies and histories. Heretofore, studies on cyber warfare have focused primarily on laws, policies, structuring organizations, manpower, and training pertaining to preparing the cyberspace for war. Currently, studies highlighting the comparative characteristics of war in cyberspace, how it differs from conventional warfare, and analytical frameworks for understanding war in cyberspace are rare. Using Clausewitz's trinity theory, this paper interprets the essence of war from the perspectives of (1) Intellect, (2) Bravery, and (3) Passion, to propose an analytical model for understanding war in cyberspace, one that factors in the intrinsic qualities and characteristics of cyberspace under spatial and temporal constraints. Furthermore, this paper applies the aforementioned analytical model to the Iraq War and concludes with a theoretical illustration that cyber warfare played a significant role in winning the war.

  • PDF

Gubong Song IK- Pil's Thought of Statecraft(經世思想) (구봉 송익필의 경세사상)

  • Lee, Young-Ja
    • The Journal of Korean Philosophical History
    • /
    • no.59
    • /
    • pp.313-342
    • /
    • 2018
  • Gubong Song Ik-pil could not behave according to his aspiration directly due to restrictions in his social standing. Despite that, he actually did so indirectly through either close friends or younger students by exhibiting 'cheobyeonwigwon (處變爲權) with the goal of jichijuui (至治主義). He insisted on people-oriented politics grounded on cheonmyeongsasang (天命思想) and also suggested the humbleness of the royal family and jinhyulchaek (賑恤策) based on love of the people. In addition, he promoted public welfare and stability to enhance patriotism and also insisted on the policy of strengthening national defense with seoeolgongsacheon (庶?公私賤)'s provision of military service through the enforcement of yangcheonjongbujongmobeop (良賤從父從母法). Also, according to the letter sent to Lee San-bo, he suggested public service ethics, for instance, personally, getting rid of ulterior motives, exhibiting diligence, integrity, and wisdom, and doing one's utmost to handle tasks fairly without causing any problems and externally, being actively involved in managing and utilizing persons of ability and also relieving the poor and managing masters as well. In brief, we can assume that Song Ik-pil's thought of statecraft (經世思想) is the concrete methodology to reach the politics of kingcraft called 'jichi (至治)' by stabilizing public welfare grounded on benevolent and benign administration. He is often compared to Jegalryang on account of his innate qualities and cleverness. He was equipped with the excellent capacity of gyeongse even referred to as the moju (謀主) of four persons, Yi Yi, Seong Hon, Jeong Cheol, and Lee Gwi, and harshly criticized as a slick evil (奸鬼), too. His gyeongsesasang, however, ended up being incomplete due to restrictions in his social status. He was a person who loved the people more than anyone else, kept suggesting innovative reform plans to stabilize the people's lives, and was capable of practicing them all. His ideal of jichi was left unfulfilled, however.

The 1965 Korea-Japan Treaty on Basic Relations: A New Perspective on the Normalization Process (1965년 한일기본조약 : 국교정상화 요인에 대한 새로운 해석)

  • Moon, William J.;Oh, Hyun-Seung
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.1
    • /
    • pp.43-58
    • /
    • 2007
  • With every Yasukuni Shrine visit by a Japanese Prime Minister, one can expect that the Korean government will jump up and down to condemn Japan. The blatant antagonism between the two powerhouses in Asia, lingering around more than sixty years after the end of the colonial period, is unmistakably more than interplay of their colonial history. It is an illumination of a largely unsettled post-colonial diplomacy that was executed in the name of economic advancement. The purpose of this paper is to shed lights on a largely ignored subject matter that unambiguously shaped the peculiar relationship between Korea and Japan.

U.S. FOIA(FREEDOM OF INFORMATION ACT) AND ACCESS TO INFORMATION AFTER 9/11 TERRORIST ATTACKS (9/11 테러 이후 강화된 미국 연방정부의 국가안보 정책이 정보자유법 (Freedom of Information Act) 및 연방 정보공개정책에 미친 영향)

  • Kwon, Hyuck-Bin
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.365-392
    • /
    • 2009
  • The increased concern about national security in the U.S. after the 9/11 terrorist attacks has influenced public rights of access to government information and its legal foundation, the Freedom of Information Act (FOIA). Public access to government information has been restricted at the policy level by a series of legislative and executive changes in FOIA after September 11, 2001, but the examination of statistics on FOIA implementation between fiscal years 1999 and 2004 shows that the strengthened national security measures did not have a considerable impact at the implementation level during this period. These contrasting findings might be due to the public officials' informal reaction to the criticism of the restriction on public access, bureaucratic inertia, and the use of new record categories not subject to FOIA.

  • PDF

A Research on RC3(RMF-CMMC Common Compliance) meta-model development in preparation for Defense Cybersecurity (국방 사이버보안을 위한 RMF-CMMC 공통규정준수 메타모델 개발방안 연구)

  • Jae-yoon Hwang;Hyuk-jin Kwon
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.123-136
    • /
    • 2024
  • The U.S. Department of Defense, leading global cybersecurity policies, has two main cybersecurity frameworks: the Cybersecurity Maturity Model Certification (CMMC) for external defense industry certification, and the Risk Management Framework (RMF) for internal organizational security assessments. For Republic of Korea military, starting from 2026, the Korean version of RMF (K-RMF) will be fully implemented. Domestic defense industry companies participating in projects commissioned by the U.S. Department of Defense must obtain CMMC certification by October 2025. In this paper, a new standard compliance meta-model (R3C) development methodology that can simultaneously support CMMC and RMF security audit readiness tasks is introduced, along with the implementation results of a compliance solution based on the R3C meta-model. This research is based on practical experience with the U.S. Department of Defense's cybersecurity regulations gained during the joint project by the South Korean and U.S. defense ministries' joint chiefs of staff since 2022. The developed compliance solution functions are being utilized in joint South Korean-U.S. military exercises. The compliance solution developed through this research is expected to be available for sale in the private sector and is anticipated to be highly valuable for domestic defense industry companies that need immediate CMMC certification.