• Title/Summary/Keyword: Close Combat

Search Result 25, Processing Time 0.022 seconds

Clustering Keywords to Define Cybersecurity: An Analysis of Malaysian and ASEAN Countries' Cyber Laws

  • Joharry, Siti Aeisha;Turiman, Syamimi;Nor, Nor Fariza Mohd
    • Asia Pacific Journal of Corpus Research
    • /
    • v.3 no.2
    • /
    • pp.17-33
    • /
    • 2022
  • While the term is nothing new, 'cybersecurity' still seems to be defined quite loosely and subjectively depending on context. This is problematic especially to legal writers for prosecuting cybercrimes that do not fit a particular clause/act. In fact, what is more difficult is the non-existent single 'cybersecurity law' in Malaysia, rather than the current implementation of 10-related cyber security acts. In this paper, the 10 acts are compiled into a corpus to analyse the language used in these acts via a corpus linguistics approach. A list of frequent words is firstly investigated to see whether the so-called related laws do talk about cybersecurity followed by close inspection of the concordance lines and habitually associated phrases (clusters) to explore use of these words in context. The 'compare 2 wordlist' feature is used to identify similarities or differences between the 10 Malaysian cybersecurity related laws against a corpus of cyber laws from other ASEAN countries. Findings revealed that ASEAN cyber laws refer mostly to three cybersecurity dominant themes identified in the literature: technological solutions, events, and strategies, processes, and methods, whereas Malaysian cybersecurity-related laws revolved around themes like human engagement, and referent objects (of security). Although these so-called cyber related policies and laws in Malaysia are highlighted in the National Cyber Security Agency (NACSA), their practical applications to combat cybercrimes remain uncertain.

A Simplified Assessment Method and Application for Consideration of Survivability in Spatial Layout Design at the Early Design Stage of Naval Vessels (함정 초기 설계 단계에서 레이아웃 설계 시 생존성을 고려하기 위한 간이 평가 방법과 애플리케이션)

  • Jung, Jin-Uk;Jeong, Yong-Kuk;Ju, SuHeon;Shin, Jong Gye;Kim, JongChul
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.55 no.1
    • /
    • pp.9-21
    • /
    • 2018
  • Survivability of naval vessels is defined as the ability to perform functions and missions in a combat environment. Survivability has close relationship with the spatial layout of naval vessels. In order to maximize survivability, it must be considered from the early stage of design. However the existing concept of survivability was intended to be applied to unit vessels. So it was not suitable for assessment of spatial layout results at the early stage of design. In this paper, a simplified assessment method which can evaluate the spatial layout considering the survivability in the early stage of design has been proposed. For this, assessment layers were defined on survivability components such as susceptibility, vulnerability, and recoverability. Assessment layers of each component were overlapped to deduce a survivability layer of spatial layout alternatives. In addition, the proposed method and optimization algorithm were used to derive optimal spatial layout alternatives considering survivability.

A Study on VV&A Application for the Korean Wartime Resource Requirement Model (한국형 전시자원소요산정 모델에 대한 VV&A 적용방안 연구)

  • Kim, Min-Suk;Jung, Whan-Sik;Lee, Jae-Yeong
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.2
    • /
    • pp.51-61
    • /
    • 2009
  • Recently, the necessity of VV&A and the importance of M&S are increasing in the national defense area. The purpose of VV&A is to assure a proper development of M&S and to provide users with sufficient information to determine if M&S could meet their demands. Therefore, VV&A process needs to be performed to guarantee the credibility of the M&S. However, the basic guidance and regulation of VV&A are not yet developed in Korea. This paper proposed the VV&A application process in the Korean Wartime Resource Requirement Model, focusing on the close combat situation of the model. The VV&A process provided in this paper can also be applied to other analytical models currently developing in Korea.

A Case Study of the US Military Utilizing Female Personnel Strengths during the War on Terror (테러와의 전쟁(War on Terror) 시기 여성 인력의 강점을 활용한 미군 사례 연구)

  • Hong, Myung Sook;Yu, Sun Young;Lee, Seon Jeong;Kim, In Chan;Cho, Sang Keun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.21-26
    • /
    • 2021
  • After starting the war on terrorism, the U.S. military began to utilize the strength of its women's workforce by operating a cultural support team (CST) and a women's close combat team (FET) that obtained the information needed for civil operations with emphasis on civil factors. In addition, in order to subdue resistance forces that carry out surprise attacks by covering the shielded terrain of the rugged land or among residents, female personnel with excellent understanding, calmness, and detail were operated as unmanned aircraft operators (RPA). Since the situations that the U.S. has already experienced are likely to be reproduced on the Korean Peninsula, the South Korean military will be able to overcome uncertainties in the future battlefield environment by utilizing the U.S. female workforce.

A Study on UAV and The Issue of Law of War (무인항공기의 발전과 국제법적 쟁점)

  • Lee, Young-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.2
    • /
    • pp.3-39
    • /
    • 2011
  • People may operate unmanned aerial vehicles (UAVs or drones) thousands of miles from the drone's location. Drones were first used (like balloons) for surveillance. By 2001, the United States began arming drones with missiles and using them to strike targets during combat in Afghanistan. By mid-2010, over forty states and other entities possessed drones, many with the capability of launching missiles and dropping bombs. Each new development in military weapons technology invites assessment of the relevant international law. This Insight surveys the international law applicable to the recent innovation of weaponizing drones. In determining what international law rules govern drone use, the most salient feature is not the fact that drones are unmanned. The fact drones carry no human operator may be the most important new technological breakthrough, but the key feature for international law purposes is the type of weaponry drones carry. Whether law enforcement rules govern drone use depends on the situation and not necessarily who is operating the drone. Battlefield weapons may also be lawfully used before an armed conflict in the following situations: when initiating self-defense under Article 51 of the United Nations Charter; when authorized by the UN Security Council; when a government seeks to suppress internal armed conflict; and, perhaps, when a state is invited to assist a government in suppressing internal armed conflict. The rules governing resort to force in self-defense are found in Article 51 of the UN Charter and a number of decisions by international courts and tribunals. Commentators continue to debate whether drone technology represents the next revolution in military affairs. Regardless of the answer to that question, drones have not created a revolution in legal affairs. The current rules governing battlefield launch vehicles are adequate for regulating resort to drones. More research must be undertaken, however, to understand the psychological effects of deploying unmanned vehicles and the effects on drone operators of sustained, close visual contact with the aftermath of drone attacks.

  • PDF