• Title/Summary/Keyword: Cooperative Security

Search Result 206, Processing Time 0.031 seconds

A Study on the Threat of North Korean Small Drones (북한 소형 드론 위협 사례에 대한 연구)

  • Kwang-Jae Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.397-403
    • /
    • 2024
  • North Korea's rapidly advancing drone development and operational capabilities have become a significant threat to South Korea's security. The drone incursions by North Korea in 2014, 2017, and 2022 demonstrate the technological advancement and provocative potential of North Korean drones. This study aims to closely analyze the military threats posed by North Korean drones and seek effective countermeasures. The research examines the development level of North Korean drone technology, its military applications, the characteristics and patterns of recent drone incursions, the adequacy and limitations of South Korea's current response systems, and future countermeasures. For this purpose, domestic and international research literature and media reports were reviewed, and specific North Korean drone incursion cases were analyzed. The results indicate that North Korea's small drones possess technological features such as small size, low altitude, low-speed flight, long-duration flight, and reconnaissance equipment. These drones pose threats that can be utilized for reconnaissance, surveillance, surprise attacks, and terrorism. Additionally, South Korea's current response systems reveal limitations such as inadequate detection and identification capabilities, low interception success rates, lack of an integrated response system, and insufficient specialized personnel and equipment. Therefore, this study suggests various technical, policy, and international cooperative countermeasures, including the development of drone detection and identification technologies, the utilization of diverse drone neutralization technologies, the establishment of legal and institutional foundations, the construction of a cooperative framework among relevant agencies, and the strengthening of international cooperation. The study particularly emphasizes the importance of raising awareness of the North Korean drone threat across South Korean society and unifying national efforts to respond to these threats.

Study on the Direction of Korea's National Defense Strategy Focused on the Hegemony Strategy of U.S.A. (미국의 패권전략과 한국 군사전략 발전방향)

  • Kim, Sung-Woo
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.239-270
    • /
    • 2010
  • This thesis is to make an appropriate national defense policy of Republic of Korea through studying the Hegemony Strategy of United States. I searched the theory of hegemony. The hegemony was differently defined by the point of time and region. The strong power nations with the hegemony have been making efforts to maintain their hegemony everytime. I have conclusion that the presence of hegemony once emerged, it brought regional stability in place whether it is coercive or beneficial. The stability and instability of international order IS not exclusively dependent on hegemony. Even if the safety of hegemony cannot guarantee absolute stability of international order, there IS on doubt that the hegemony has enormous impact on that. According to the hegemonic theory, the history of mankind equals to the history of rising and falling hegemony. The international order was changed as the hegemony changes. The United States has been making efforts to maintain her global hegemony during the post cold-war era as well. Taking all these into consideration, relevant military strategy direction able to pursue national interest is that to make up for the relative weakness in the strategic environment. South Korea have to prepare security policy response as following. First, South Korea should build the military force equipped with advanced weapons in military technology sector and solidify military diplomatic relation able to form cooperative relation in wartime. Second, South Korea should make solid Alliance of Korea and U.S. Third, develop and maintain multilateral security cooperation of East Asia. Forth, we could realize that there are means that can neutralize opponent's strong point by seeking one or two and more asymmetry in the aspect of strategy, tactics, and means through asymmetric strategy. Than the military force of South Korea should develop into a force that is able to overcome to the traditional North Korea's threat and new type of conflicts. And the force should have sufficient strength and be deployed to effectively defend the Korean Peninsula. So, we need to establish a denial and defense system against any hostile neighboring country. Therefore, ROK military forces preparing for the future should try to construct a future military power to gradually establish enough strength for self-defense to prepare for a uncertain security environment and when the Korean Peninsula is unified in a future.

  • PDF

A Study on the Copyright Protection Liability of Online Service Provider and Filtering Measure (온라인서비스제공자(OSP)의 저작권보호 책임과 필터링)

  • Oh, Yeong-Woo;Jang, Gye-Hyun;Kwon, Hun-Yeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.97-109
    • /
    • 2010
  • Although the primary liability for online copyright infringement may fall on the individual who illegally copies, transfers, and/or distributes the copyrighted content, the issue of indirect liability for Online Service Providers (OSPS) that provide a channel for the distribution of illegal content has recently come under the spotlight. Currently, in an effort to avoid liability for indirect copyright infringement and improve their reputation, most OSPs have voluntarily applied filtering technology. Under the Copyright Act of Korea, special types of OSPS including P2P and Web-based Hard Drive (WebHard) are required to incorporate filtering technology, and may be charged with penalties if found without one. However, despite the clear need for filtering mechanisms, several arguments have been set forth that question the efficacy and appropriateness of the system. As such, this paper discusses the liability theory adopted in the US. -a leader in internet technology development-and analyzes the scope of liability and filtering related regulations in our copyright law. In addition, this paper considers the current applications of filtering as well as limits of the applied filtering technology in OSPS today. Finally, we make four suggestions to improve filtering in Korea, addressing issues such as clarifying the limits and responsibilities of OSPS, searching for cooperative solutions between copyright holders and OSPS, standardizing the filtering technology to enable compatibility among different filtering techniques, and others.

Field Police Activity Focused on Community Policig (지역사회 경찰활동 관점에서 본 현장 경찰활동)

  • Kim, Hyun-Dong;Lee, Moon-Soo;Jo, Hyun-Bin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.6
    • /
    • pp.177-186
    • /
    • 2013
  • Recently, with the sudden changes in the security environment, expectations towards the police and fear towards safety are increasing. Thus, the local community police operation, which creates a mutually cooperative relationship between the police and local residents, is coming to the fore as the paradigm of the nationwide police operation. The police operation in Korea has also gone through change, and as part of the local community police operation, Korea has implemented a community police system since 2003. Recently, the system has been going through change in that the operations are centralizing around not only prevention of crime including the safe city program, protection of multicultural families, response to foreign crime, protection of the socially disadvantaged but also life security of the citizens. Along these lines, this study seeks to examine conditions of the three elements of local community police operation - Strategic Oriented Policing (SOP), Neighborhood Oriented Policing (NOP), Problem Oriented Policing (POP) - and policy suggestions accordingly.

Study on ICT utilization contents for physical education (체육수업 ICT 콘텐츠에 관한 연구)

  • Kang, Sunyoung;Kang, Seungae;Jung, Hyungsu
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.17-22
    • /
    • 2016
  • This study examined the current state of ICT utilization in physical education and presented the available physical education ICT contents configuration model. Using ICT in physical education is expected to be an alternative of overcome the bad physical education facilities and environment, also highly utilized as a valuable material that can provide specific feedback in learning motor skill. The types of ICT use in physical education classes are being utilized divided by web-use learning and application program-use learning. In composing physical education ICT contents, the server presents a problem to be solved by each student and encourage cooperative learning. If one team determines the solving idea about learning problem through team discussion, they solve the problem by repeating the process of giving teacher and other team's feedback on determining opinion. On the other hand, the class begins after learning the principle of specific movement utilizing the VTR or computer S/W in the practical training lesson of physical education. If the good hardware and software environment combine with the transformation of the recognition on physical education which has been away from the ICT, it will be able expected a broad using of ICT in physical education.

A Study on Model fostering for Cloud Service Brokerage (클라우드서비스 브로커리지 성공모델 육성 연구)

  • Choi, Sung
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.1-11
    • /
    • 2015
  • The growing company that provides high quality service to every customer by introducing a cloud-system organization. However, the information needs of diverse and different, so every cloud system, and acts as a barrier to entry for cloud services provide appropriate. Cloud services are becoming complicated and diversified depending on concerns about cloud security continues, the growing need of professionalism held by the cloud service(Cloud Service Brokerage) CSB companies. Thus, to analyze the various services, find my support legislation, security and compatibility issues, the services of the best new business through service offerings tailored to the environment, and will implement the necessary management services which brokerage (CSB) is. This study presents a brokerage(CSB) development model, and suggested policy measures that apply to the co-op that I am having difficulties in cloud services business models.

An Application of Contract Net Protocol for The Distributed Intrusion Detection (분산 침입 탐지를 위한 계약망 프로토콜의 적용)

  • 서희석;김희완
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.38-47
    • /
    • 2003
  • Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.

  • PDF

A Study on the Methodology to Performance Security on the Korea Small/Medium Sized Construction Firms for Venturing into International Market (국내 중소건설업체의 해외 진출 활성화를 위한 건설 보증 확대 방안에 관한 연구)

  • Ahn, Hyoung-Jun;Kim, Ju-Hyung;Kim, Jae-Jun
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2009.11a
    • /
    • pp.225-229
    • /
    • 2009
  • International construction market has been open to other countries, and it derives the development of our overseas construction industry quantitatively as well as qualitatively. Until now, the major companies have an absolute majority in the overseas construction market, and the small and medium enterprises have had difficulty to get a leadership in the international construction market because of the lack of the technical expertise and the capital strength. Especially in the Middle East Asia, our construction companies has touched off a boom, so our market share also has grown, which derived from the up toward ratchet oil prices and a worldwide boom in real estate development. The small and medium enterprise minority have recognition that the overseas construction market is the major company's native territory. But Data from the existing researches and many statistics indicate the most companies tend to underestimate the capacity and international competitiveness of the small and medium enterprises. As a matter of fact, hundreds of small and medium enterprise cut a conspicuous figure in overseas market. Consequently, it is indispensable to overcome the international financial crisis by revitalizing our overseas construction industry which obtains excellent results in international market. this study suggested the ways to expand overseas bonding capacity of Korean financial institution. This study proposed the Korean government to allow Construction Guarantee (former Korea Construction Financial Cooperative) to deal with foreign exchange so that Construction Guarantee will underwrite the overseas construction bond.

  • PDF

Robot Development Trend and Prospect (신 성장동력의 로봇개발 동향과 전망)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.153-158
    • /
    • 2017
  • The robot imitates humans and recognizes the external environment and judges the situation. The robot is a machine that operates autonomously. Robots are divided into manufacturing robots and service robots. Service robots are classified as professional service robots and personal service robots. Because of the intensified competition of productivity in manufacturing industries, rising safety issues, low birth rate and aging, the robots industry is emerging. Recently, the robot industry is a complex of advanced technology fields, and it is attracting attention as a new industry where innovation potential and growth potential are promising. IT, BT, and NT related elements are fused and implemented, and the ripple effect is very large. Due to changes in social structure and life patterns, social interest in life extension and health is increasing. There is much interest in the medical field. Now the artificial intelligence (AI) industry is growing rapidly. It is necessary to secure global competitiveness through strengthening cooperation between large and small companies. We must combine R&D investment capability and marketing capability, which are advantages of large corporations, and robotic technology. We need to establish a cooperative model and secure global competitiveness through M&A.

Multimodal Interaction Framework for Collaborative Augmented Reality in Education

  • Asiri, Dalia Mohammed Eissa;Allehaibi, Khalid Hamed;Basori, Ahmad Hoirul
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.268-282
    • /
    • 2022
  • One of the most important technologies today is augmented reality technology, it allows users to experience the real world using virtual objects that are combined with the real world. This technology is interesting and has become applied in many sectors such as the shopping and medicine, also it has been included in the sector of education. In the field of education, AR technology has become widely used due to its effectiveness. It has many benefits, such as arousing students' interest in learning imaginative concepts that are difficult to understand. On the other hand, studies have proven that collaborative between students increases learning opportunities by exchanging information, and this is known as Collaborative Learning. The use of multimodal creates a distinctive and interesting experience, especially for students, as it increases the interaction of users with the technologies. The research aims at developing collaborative framework for developing achievement of 6th graders through designing a framework that integrated a collaborative framework with a multimodal input "hand-gesture and touch", considering the development of an effective, fun and easy to use framework with a multimodal interaction in AR technology that was applied to reformulate the genetics and traits lesson from the science textbook for the 6th grade, the first semester, the second lesson, in an interactive manner by creating a video based on the science teachers' consultations and a puzzle game in which the game images were inserted. As well, the framework adopted the cooperative between students to solve the questions. The finding showed a significant difference between post-test and pre-test of the experimental group on the mean scores of the science course at the level of remembering, understanding, and applying. Which indicates the success of the framework, in addition to the fact that 43 students preferred to use the framework over traditional education.