• Title/Summary/Keyword: Cyber-military

Search Result 143, Processing Time 0.019 seconds

Comparative Study of US-China Discourse on Cross-border Data Regulation and Cybersecurity: Focusing on ASEAN Development Assistance Cases (미·중 초국경 데이터 규제와 사이버안보 담론 비교: 아세안 개발원조 사례를 중심으로)

  • Kayeon Lee
    • Informatization Policy
    • /
    • v.30 no.1
    • /
    • pp.89-108
    • /
    • 2023
  • Science, technology and innovation (STI) has expanded the activity of actors from the traditional physical territory to the cyberspace. Data-driven platform services and markets advance new discussions on cross-border cooperation and cyber security, as well as discourse on sovereignty in cyberspace. These changes are also affecting the hegemony competition between the US and China. In particular, competition for aid to developing countries that are located along major resource transportation routes, such as natural gas and deep sea resources, is fierce. ASEAN is not only a geopolitical military and security point where the US and China powers collide, but its population of 600 million has great potential for the development of the digital economy due to its data resources. In this regard, this article aims to connect the discourse of liberalism and authoritarianism with data regulation and cybersecurity in international development cooperation, and derive implications for ASEAN integration through this. This study has significance as a convergence study that links international political issues related to big data in terms of global governance.

A Study on the Generation and Transmission of Drone Jamming Signals Based on the MAVLink Protocol (MAVLink 프로토콜 기반 드론 교란 신호 생성 및 송출에 관한 연구)

  • Woojin Lee;Changhan Lim;Jaeyeon Lee
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.75-84
    • /
    • 2023
  • Recently, as the use of drones for military purposes is increasing, such as the Russia-Ukraine War, North Korea's reconnaissance against South Korea, and Army Tiger 4.0's dronebot system, anti-drone technology is developing a lot in each country. However, traditional anti-drone technologies in the form of using conventional weapons or electronic warfare weapons have the disadvantage of being expensive, so anti-drone technologies that can be performed at low cost are currently being newly researched. Therfore, in response to these anti-drone technologies, many efforts are being made to increase the survivability of our allies. In line with this trend, this study assumes a virtual anti-drone system applied with cyber domain and electronic warfare domain technologies that can be performed at low cost, rather than a technique using expensive conventional weapons or electronic warfare weapons among various anti-drone technologies. In response to this, we would like to present a plan to increase the survivability of friendly drones.

A study on security requirements for Telecommuting in defense industry (방산업체 비대면(재택) 근무를 위한 보안 요구사항 연구)

  • Hwang Gue Sub;Yeon Seung Ryu
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.209-221
    • /
    • 2023
  • Due to the rapid spread of the COVID-19 virus in December 2019, the working environment was rapidly converted to telecommuting. However, since the defense industry is an organization that handles technology related to the military, the network separation policy is applied, so there are many restrictions on the application of telecommuting. Telecommuting is a global change and an urgent task considering the rapidly changing environment in the future. Currently, in order for defense companies to implement telecommuting, VPN, VDI, and network interlocking systems must be applied as essential elements. Eventually, some contact points will inevitably occur, which will increase security vulnerabilities, and strong security management is important. Therefore, in this paper, attack types are selected and threats are analyzed based on the attack tactics of the MITER ATT&CK Framework, which is periodically announced by MITER in the US to systematically detect and respond to cyber attacks. Then, by applying STRIDE threat modeling, security threats are classified and specific security requirements are presented.

Study on Selection Methodology of Applicable Prospective Civil Information Security Technologies in Defense Cyberwarfare Sector (국방 사이버전 분야에 적용 가능한 유망 민간 정보보호 기술 선정 방법론에 대한 고찰)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1571-1582
    • /
    • 2015
  • This paper suggests a methodology for linking technology classification of nongovernmental information security field and technology classification of cyber-warfare in national defense field. Based on this methodology, Multi-Attribute Utility Theory(MAUT) is applied for the purpose of selecting promising nongovernmental technology that is worthy of later introduction or development. After studying the result of the survey regarding the research progression plan of the selected promising technology, the following three facts are discovered: Firstly, the greater the social spillover effect, the greater the need for the government lead R&D. Secondly, among the spillover effects, the social aspect has the highest correlation with respect to the need for the government lead R&D, while the economical aspect and the technological aspect come in the second and the third place, respectively. Finally, according to the correlation analysis, the defense application and the technological importance do not affect the subject of investment or the subject of development. This indicates that even though the R&D for technology with high social spillover effect should be lead by the government, the subject of the investment or the development cannot be determined solely by factors such as military application and technological importance.

The Effects of Professional Soldiers' Family Healthiness on Organizational Effectiveness - Mediated effect of empowerment and multi-group analysis according to whether they are living with their families or not - (직업군인의 가족건강성이 조직효과성에 미치는 영향 -임파워먼트 매개효과와 가족동거 여부별 다집단 분석-)

  • Kim, Jung-Eun;Chae, Hyun-Tak
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.146-152
    • /
    • 2016
  • The purposes of this study were to investigate the effects of professional soldiers' family healthiness on the organizational effectiveness of the military and test for any differences in the structural modeling path caused by the mediating effects of empowerment depending on whether they lived with their families or not. Data were collected with a self-administered survey distributed to 480 professional soldiers after the approval of the Ministry of National Defense. The data collected were then analyzed using descriptive statistics, structural equation modeling, and multi-group analysis. The analysis results show that the family healthiness of all of the professional soldiers had direct or indirect effects on their organizational effectiveness via empowerment and that family healthiness was a variable with a very large explanatory power for organizational effectiveness. Both family healthiness and empowerment had effects on the organizational effectiveness of the solders that were living with their families and those who lived separately from their families. The levels of family healthiness, empowerment, and organizational effectiveness were all high among the professional soldiers that were living with their families and all low among those who were not. Increasing the family healthiness and empowerment was found to enhance the organizational effectiveness in all of the models, and a higher organizational effectiveness would be expected from professional soldiers living with their families. These findings led to a proposal that various plans should be prepared to help professional soldiers live with their families and provide them with family welfare support.

The Nuclear Security Summit Achievements, Limitations, and Tasks against Nuclear Terrorism Threat (핵테러리즘 위협에 대한 핵안보정상회의 성과, 한계 및 과제)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.73-81
    • /
    • 2017
  • In April 2009, in the wake of President Obama's Prague speech, the international community held four nuclear sec urity summits from 2010 to 2016 to promote nuclear security and prevent nuclear terrorism. The Nuclear Security S ummit has made significant progress in preventing terrorists from attempting to acquire nuclear weapons or fissile materials, but it still has limitations and problems. To solve this problem, the international community should resume the joint efforts for strengthening bilateral cooperation and multilateral nuclear security regime, and the participating countries should strive to protect their own nuclear materials and fulfill their commitments to secure nuclear facilitie s. Second, the United Nations(UN), the IAEA(International Atomic Energy Agency), International Criminal Police Or ganization(INTERPOL), the Global Initiative to Combat Nuclear Terrorism(GICNT), and the Global Partnership(G P) must continue their missions to promote nuclear security in accordance with the five action plans adopted at the Fourth Nuclear Security Summit. Third, the participating countries should begin discussions on the management and protection of military nuclear materials that could not be covered by the Nuclear Security Summit. Fourth, the intern ational community must strive to strengthen the implementation of the Convention on the Physical Protection of Nuc lear Material(CPPNM) Amendment and International Convention for the Suppression of Acts of Nuclear Terrori sm(ICSANT), prepare for cyber attacks against nuclear facilities, and prevent theft, illegal trading and sabotage invo lving nuclear materials.

A Study on the Iconization of Che Guevara Expressed in Contemporary Fashion (현대 패션에 나타난 체 게바라(Che Guevara)의 아이콘화에 관한 연구)

  • Kim, Hye-Jeong
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.3 s.102
    • /
    • pp.1-11
    • /
    • 2006
  • Che Guevara spearheading the Cuban Revolution was not only the icon as the revolutionary to the New-leftists of the 1960s advocating the ideology of Marxism but, as the cultural revolutionary, had a tremendous influence on the younger generation living in the digital age Che Guevara take on a figure of both the symbol of the Leftist but the romantic revolutionary because he had the external features such as black beret, red stars, military upper jackets and trousers, beard and pipe tobacco. In fact, the symbolic image of Che Guevara was made as the popular image by the avantgarde artists and political vanguard forces of the times under the necessity of Cuban government. Afterwards, the image of Che Guevara has been patronized in making people of aware of the resistant and revolutionary image to capital, power and the power of the media and symbolized as the resistant image to the American capital as well as the revolutionary guerrilla. And his image has continued to be reproduced and symbolized for the commercial and political purposes and as the enthusiastic image of youth culture. This can be seen as having been created as a new image by the popular culture formed by the development of the cyber culture and mass media in the cyberspace shaped by contemporary 'N' generations. The use of Che Guevara's symbolic image was made in the fashion field as well as in the cultural and artistic circles. The borrowing of the icon of Che Guevara represented in a fashion field is attributed to his free spirit, and it can be seen that fashion exists as the vehicle for representing both the symbol system and the sign system containing ideologies and texts as the communicator of resistance to the regime and to social issues. Therefore, this study attempted to investigate the commercial iconization of Che Guevara in the 1990s by comparing the ideology of the symbol in the 1960s and the 1990s and inquire into the borrowing of his image by the fashion domain as well as the fashion worn by him by reference to domestic books and materials on the fashion site. Thereby, this study attempted to make clear that the borrowing of Che Guevara in the realm of fashion since the 1990s not only contained the meaningful interpretation as the symbolic code in the culture of young people living in a digital era but fashion performs an intervening role in the cultural phenomenon.

The Nature of Reform in the U.S., UK, Germany National Intelligence Systems and Implications for Reform of the Korean National Intelligence Service (미국·영국·독일 국가정보체계 개혁 양상과 한국 국가정보원 개혁에 대한 시사점)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.167-177
    • /
    • 2018
  • Major countries, such as the U.S., UK and Germany have reformed their national intelligence systems in the face of transnational, asymmetric and comprehensive threats since September 11, 2001 and have strengthened the intelligence capacity involved in countering terrorism and WMD proliferation, right/left extremism threats. The Korean Moon Jae-in government is preparing a reform plan to eliminate illegal political intervention and abuse of power by the National Intelligence Service(NIS) and to rebuild it as an efficient national intelligence agency for national security. In discussing the reform direction of the NIS, it is necessary to discuss in detail whether adopting a separate model of intelligence agencies to restrict domestic intelligence activities of the NIS and concentrate on foreign intelligence activities or establish new domestic intelligence agencies. Second, as for the issue of transferring anti-Communism investigation authority of the NIS to the police, it needs to be carefully considered in terms of balancing the efficiency and professionalism of intelligence agency activity in the context of North Korea's continuous military provocation, covert operations and cyber threats. Third, it should strive to strengthen the control and supervision functions of the administration and the National Assembly to ensure the political neutrality of the NIS in accordance with the democratization era, to guarantee citizens' basic rights and to improve the transparency of budget execution.

  • PDF

The gender difference in concept of calling in childrearing: Visual Comparison through Social Network Analysis (부모소명 개념에 대한 부와 모의 인식 차이: 사회연결망 분석을 통한 시각적 비교)

  • Su Jin Kim;Young Woo Shon;Suran Lee
    • The Korean Journal of Coaching Psychology
    • /
    • v.6 no.2
    • /
    • pp.93-114
    • /
    • 2022
  • The purpose of this study is to investigate whether there was a difference between men and women in conceptualizing a calling in childrearing through social network analysis. The results are as follows. IAs a result of the study, it was found that mothers showed significantly larger networks and higher density than fathers did, indicating that mothers, more than fathers do, experience parenting and child-rearing based more on a concept of calling in childrearing. Parents directly linked responsibility, children's growth, direction, commitment, and parental character to a calling in childrearing. In addition, mothers also linked a sense of identity and parental growth to it. In the case of fathers, only four concepts were directly connected with a calling in childrearing. This shows that mothers, in comparison to fathers, connect essential self-concepts, such as identity as a parent and themes of growth, to a calling in childrearing. In centrality, similar concepts also were evaluated as important. The common parental closeness centrality is composed of responsibility, child growth, direction, and belief starting from the center. In the case of fathers, child growth, responsibility, and belief were evaluated in order, and in the case of mothers, responsibility, parental growth, and identity were evaluated as relatively important concepts.

The effect of student-perceived teacher's calling on student's well-being: Emotional support and adaptive cognitive emotion regulation as serial mediators (학생이 지각한 교사의 소명의식이 학생의 안녕감에 미치는 영향: 정서적 지지와 적응적 인지적 정서조절전략의 순차적 매개효과)

  • Hee Woong Park ;Sang Woo Park ;Suran Lee
    • The Korean Journal of Coaching Psychology
    • /
    • v.6 no.2
    • /
    • pp.1-26
    • /
    • 2022
  • This study investigated the effect of student-perceived teacher's calling on student's well-being and the mediating effects of student-perceived emotional support and adaptive cognitive emotion regulation strategies. We analyzed data from 494 high school students in South Korea by using structural equation modeling. The results showed that student-perceived emotional support from the teachers mediated the relationship between student-perceived teacher's calling and adaptive cognitive emotion regulation strategies. Also, adaptive cognitive emotion regulation strategies mediated the relationship between student-perceived emotional support and student's well-being. Furthermore, student-perceived emotional support and adaptive cognitive emotion regulation strategies sequentially mediated the indirect positive relationship between student-perceived teacher's calling and student's well-being. Based on these results, implications and recommendations for future research are discussed.