• Title/Summary/Keyword: Defense IT Policy

Search Result 272, Processing Time 0.029 seconds

Analysis of Security System Priority for the Systematic Defense Technology Security (체계적인 방위산업기술보호를 위한 보호체계 우선순위 분석 연구)

  • Park, Heungsoon;Kim, Seyong;Kim, Yonghwan
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.3-12
    • /
    • 2019
  • The outflow of defense technology can cause serious damage not only in terms of business losses, but also in terms of national security and national interests. Recently, the government has enacted the Defense Technology Security Act, recognizing the importance of technology in the defense industry, and prepared guidelines for the defense technology security accordingly. According to the law, institutions and companies with defense technologies should establish a defense technology protection system, and the government should implement various technology protection policies to improve their level of technology protection. In this study, the implications were derived by comparing existing technology protection guidelines and priority analysis was performed on the protection system details through AHP for self-diagnosis items in the defense technology security guidelines. As a result, it is expected that it will enable efficient diagnosis of the level of protection and policy support for the systematic establishment of the protection system for the target institutions.

On The Performance of A Suboptimal Assignment Policy in N-Queue m-Server System

  • Ko Soon-Ju
    • Journal of the military operations research society of Korea
    • /
    • v.17 no.1
    • /
    • pp.43-60
    • /
    • 1991
  • Consider N queues without arrivals and with m identical servers. All jobs are independent and service requirements of jobs in a queue are i.i.d. random variables. At any time only one server may be assigned to a queue and switching between queues are allowed. A unit cost is imposed per job per unit time. The objective is to minimized the expected total cost. An flow approximation model is considered and an upperbound for the percentage error of best nonswitching policies to an optimal policy is found. It is shown that the best nonswitching policy is not worse than $11\%$ of an optimal policy For the stochastic model, we consider the case in which the service requirements of all jobs are i.i.d. with an exponential distribution. A longest first policy is shown to be optimal and a worst case analysis shows that the nonswitching policy which starts with the longest queues is not worse than $11\%$ of the optimal policy.

  • PDF

Energy-efficient Joint Control of Epidemic Routing in Delay Tolerant Networks

  • Wu, Yahui;Deng, Su;Huang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.2
    • /
    • pp.234-252
    • /
    • 2013
  • Due to the uncertain of connections in Delay Tolerant Networks (DTNs), most routing algorithms in DTNs need nodes to forward the message to others based on the opportunistic contact. The contact is related with the beaconing rate. In particular, nodes have more chances to encounter with each other with bigger beaconing rate, but more energy will be used. On the other hand, if the nodes forward the message to every node all the time, the efficiency of the routing algorithm is better, but it needs more energy, too. This paper tries to exploit the optimal beaconing rate and forwarding rate when the total energy is constraint. First, a theoretical framework is proposed, which can be used to evaluate the performance with different forwarding rate and beaconing rate. Then, this paper formulates a joint optimization problem based on the framework. Through Pontryagin's Maximal Principle, this paper obtains the optimal policy and proves that both the optimal forwarding and beaconing rates conform to threshold form. Simulation results show the accuracy of the theoretical framework. Extensive numerical results show that the optimal policy obtained in this paper is the best.

Efficiency and Failing Firm Defenses in Merger Assessment: Economic Rationale and Policy Implications (기업결합 규제에서의 효율성 및 파산기업 항변: 경제적 논거와 정책적 함의)

  • Jin, Yangsoo
    • KDI Journal of Economic Policy
    • /
    • v.35 no.1
    • /
    • pp.103-135
    • /
    • 2013
  • This paper provides consistent understanding between the economic rationale of the 'efficiency' and 'failing firm' defenses and the conditions that the defenses require in the merger assessment process, focusing on two main concepts, 'enhancing competition' and 'counterfactual'. This paper states that the economic rationale of the 'efficiency' defense rests on the effect of enhancing competition rather than on the improvement of efficiency itself. Regarding the 'failing firm' defense, the rationale is stated that competition would not deteriorate even when the merger proceeds compared to the counterfactual where it is prohibited. This understanding reflects not only recent international discussion but also the merger guidelines of advanced competition authorities. It also consistently explains the requirements of the defenses. Finally, this paper includes some comments on the Merger Review Guideline of Korea for its improvement based on various domestic merger cases.

  • PDF

Research on management plan of Defense Facilities and Equipments through DRES (국방연구시설장비 정보시스템(DRES)을 통한 국방연구시설·장비 관리 방안 연구)

  • Kim, Jin-sik
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.79-88
    • /
    • 2018
  • Major countries stay to expand invest in R&D to promote new growth engines in the future and to secure new technologies and Korea is also expanding to R&D investment. Quality of R&D investment is getting more Important than quantity of R&D investment because Korea's indicator related to R&D investment is already world class with other countries's investment scale by comparison with GDP. According to this trend, Korea's policy in R&D is focusing the R&D Innovation Plan and "Utilization of R&D Facility and Equipment(F&E)" has been getting important. In this research, it research on facility and equipment management plan through Defense R&D Equipment information System(DRES). It analyzes existing process F&E in Defense field and Nation. Furthermore, it explains major process, function, and menu reflecting Defense F&E management rule enacted recently. Lastly, it shows the development direction for Defense F&E management.

The study of the relationship of the defense industry-specific factors effect the innovation of manufacturing technology and the market share. (방위산업의 시장구조 결정요인이 기술혁신과 시장지배에 미치는 영향)

  • Chung, Young-Hyun
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.241-280
    • /
    • 2007
  • This study examines the relationship of the industry-specific factors that effect innovation of manufacturing technology and the market share within the defense industry. Since the establishment of the basic defense industry framework in 1973, there were numerous interactions of the industry-specific factors of the defense industry structure with the technological innovation and market organization of the defense industry. During last three decades, the domestic defense industry has achieved the considerable level but the framework of the basic system has not developed much in areas of the military science and the defense manufacturing technology. Industry-specific factors were formed in the process and appeared in a variety of behavioral characteristics as subsystems. Currently, there IS a growing trend where the management of defense industry is gradually deteriorating due to limitation of the domestic industry-specific factor (e.g. defense technologies, amount of demand, etc.). If there is a prominent imbalance of the industry-specific factors. it can trigger the potential problem of conflict, lack of cooperation and control, slowing the growth of the manufacturing technology thereby diminishing the market and deteriorating the defense supply/demand relationship. In a research conducted by Joe S. Bain, Bain analyzed the relationship of the traditional industrial organization where industry-specific factor(S) not only impacts the conductor(C). And, conductor(C) influences the shaping of the performance(P) of relationship of the traditional industrial organization. Consequently, the researcher has identified the demand monopoly, barriers to entry, and market competition with comparison of defense industry issues. These defense issues were three industry-specific factors identified, which are 1) The demand monopoly and The entry barriers to new market competition, 2) the industrial technical factor to a production technical competitiveness and a market sharing competitiveness, 3) the probability factor to revolution for military affairs(RMA) and a R&D production. According to baseline with these factors, the following research model is established from the special companies group(Group A), the systematization companies group(Group B), and the general companies group(Group 0. The hypothesis is that if there are more industry-specific factors, then there will be more relationships of defense industry relation statutes. This research is an empirical study on the relationship that the industry specific factors effects the innovation of manufacturing technology and the shaping of the market in the defense industry. Moreover, the existing models to evaluate the industry specific factors of the defense industry IS much to be desired with the controlled statistical analysis of the result. It is vital to study on current situation with suggesting alternative strategy to the efficient strategy. The descriptive analysis approach analysis is conducted with SPSSWIN to conduct reliability test, factor analysis, correlation analysis, cross-tabulation analysis, one-way ANOVA, and multiple regression analysis. However, there were some limitations of the survey such as the rigidity of concept about the technical factors and various market management factors. The wishes is that the decision-maker could be utilized these defence industrial factors to formulate efficient defence policy and strategy in the future.

  • PDF

Contract Awarding Process and its Reasonable Improvement for Defense Acquisition (공공사업 경쟁입찰에서 낙찰자 결정방법분석 및 국방획득사업의 합리적인 사업자결정 방안)

  • Eo, Hajoon;Kim, Sung-Chul
    • Journal of Information Technology Services
    • /
    • v.14 no.2
    • /
    • pp.69-86
    • /
    • 2015
  • The current contract awarding process regulated by laws and ordinances is analyzed and more reasonable processes are suggested. To this end, the principle of economic analysis is described with emphasis on the cost-effectiveness analysis, and the laws and ordinances regulating the process are thoroughly examined. The current contract awarding rule is based on the weighted sum of effectiveness score and cost score. This may not conform to the framework of economic analysis where effectiveness is supposed to be measured as an output and cost measured as an input. An improvement is attempted to the defense acquisition system and it is recognized that the economic analysis and policy consideration should be performed separately. Concept of statistical testing is introduced to see if the results of the cost effectiveness analyses show the significant difference between the alternatives. It is suggested that the contract awarding process can be improved by performing significance test followed by the aggregation of the two analyses. A minor improvement is also suggested on the application of current rules.

The Process of R&B Project-Priority Ordering in Defense Technology (국방과학기술 연구개발 우선순위설정에 관한 연구)

  • Lee Jeong-Dong;Lee Choon-Joo;Jang Won-Joon;Park Hong-Suk
    • Journal of the military operations research society of Korea
    • /
    • v.30 no.2
    • /
    • pp.122-132
    • /
    • 2004
  • The aim of this paper is to show the process of R&D Project-Priority Ordering in the Defense Technology field. We propose specific methods (Delphi, Analytic Hierarchy Process (AHP), Scoring) to order the R&D Project-Priority. In general, to decide the priority of R&D projects most of researches depend on questionnaires which are surveyed by experts. However, it is criticized that this process cannot reflect the limitation of experience and knowledge of experts. In this process, we separate evaluators in two parts: the first is strategic experts, the second is technical experts. Evaluators can choose and evaluate the alternatives which they are familiar with, so we can obtain reliable results. Finally, based on our process of the R&D Project-Priority Ordering we formulate policy implications for managing the defense technology.

A Study on the Development of Evaluation Model for Selecting a Standard for DITA using AHP (AHP를 이용한 국방정보기술표준 선정 평가 모델 개발에 관한 연구)

  • Kim, Ja-Hee;Kim, Woo-Je;Cho, Hyun-Ki;Lee, Eun-Young;Seo, Min-Woo
    • IE interfaces
    • /
    • v.25 no.1
    • /
    • pp.96-105
    • /
    • 2012
  • Recently, the interoperability has become more important to enhance the net-centric capabilities of the warfighter. DITA (Defense Information Technical stAndard) is the set of IT standards for improving interoperability, scalability, effectiveness, and efficiency. In this paper, we analyzed the standardizing process to derive the selection criteria and structurized the derived selection criteria using the KJ (Kawakita Jiro) method. Finally, we developed an evaluation model for selecting a standard for DITA using AHP (Analytic Hierarchy Process). As a result, we present eight selection criteria (maintainability, trend, stability, portability, effect of other standard, constraint of the network, and applicability to the systems). We also applied some examples that several IT standards to our selection model for validating the model. We expect our model to help to decide objectively whether the new standard can be listed in DITA.

Reinforcement Learning-Based APT Attack Response Technique Utilizing the Availability Status of Assets (방어 자산의 가용성 상태를 활용한 강화학습 기반 APT 공격 대응 기법)

  • Hyoung Rok Kim;Changhee Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1021-1031
    • /
    • 2023
  • State-sponsored cyber attacks are highly impactful because they are carried out to achieve pre-planned goals. As a defender, it is difficult to respond to them because of the large scale of the attack and the possibility that unknown vulnerabilities may be exploited. In addition, overreacting can reduce the availability of users and cause business disruption. Therefore, there is a need for a response policy that can effectively defend against attacks while ensuring user availability. To solve this problem, this paper proposes a method to collect the number of processes and sessions of defense assets in real time and use them for learning. Using this method to learn reinforcement learning-based policies on a cyber attack simulator, the attack duration based on 100 time-steps was reduced by 27.9 time-steps and 3.1 time-steps for two attacker models, respectively, and the number of "restore" actions that impede user availability during the defense process was also reduced, resulting in an overall better policy.