• 제목/요약/키워드: Defense Information Technology(IT)

검색결과 470건 처리시간 0.026초

국방정보화 전망과 미래 유망 국방정보기술 발굴 (Defense Informationization Outlook and Emerging Defense Information Technologies)

  • 서민우;권경용
    • 기술혁신연구
    • /
    • 제19권2호
    • /
    • pp.77-97
    • /
    • 2011
  • 최근 IT기술의 발전과 기술융합으로 다양한 기술이 급속하게 변화하고 있다. 이에 따라 정부에서도 중장기 전략적 기술개발 목표를 달성하기 위해 필요한 기술을 발굴하고 기술로드맵을 제시하고 있다. 국방에서는 무기체계 중심으로 국방과학기술 기획 프로세스를 정립하였으나, 국방 IT 분야는 아직 그 틀이 마련되지 못했다고 할 수 있다. 이에 따라, 본 논문에서는 국방 정보기술 환경분석을 통한 국방정보화 전망을 제시하였고, 국방 정보기술 조사 분석 방법론을 통한 미래 유망 국방정보기술을 발굴하고, 국방 정보기술 기획 발전 방안을 제시하였다.

  • PDF

국방정보화기본계획 성과 분석 및 평가 (Performance Analysis and Evaluation on the Defense Information Technology Master Plan)

  • 김수진;이승진;박태현;윤웅직;심승배
    • 한국IT서비스학회지
    • /
    • 제20권1호
    • /
    • pp.11-27
    • /
    • 2021
  • The defense IT master plan is the plan for promoting defense informatization and is established by the Ministry of National Defense every five years. In addition, an implementation plan has been established in accordance with the master plan every year to promote the informatization project. However, since there is no systematic methodology to check and analyze the master plan comprehensively, it is difficult to judge whether the goals suggested in the master plan are achieved, and continuous monitoring of the project is limited. This study proposes a concept and framework for defense IT investment management and proposes a methodology for examining and analyzing the progress of the defense IT plan by referring to the U.S. Department of Defense's IT Plan and the performance management structure of the national IT master plan. As a methodology for managing defense IT investment, we propose an IT investment management code system from the perspective of an IT portfolio and verify its applicability through case studies. The results of this study are expected to improve the defense IT performance management system and improve the efficiency and effectiveness of the defense IT project.

국방IT융합 추진방법론 및 사례 연구 (A Methodology of Defense IT Convergence and Case Study)

  • 심승배;정호상;유천수;정봉주
    • 한국IT서비스학회지
    • /
    • 제11권sup호
    • /
    • pp.17-26
    • /
    • 2012
  • Information technology convergence has been recognized one of the key drivers in the industry perspective. Korea government established IT convergence policy in 2008 and has been implementing it to the core industry such as automotive, shipbuilding and defense industries. This research analyzes various IT convergence issues based on an operation of defense IT convergence center, one of the industry IT convergence centers. Defense IT convergence issues are as follows : the methods for introducing rapid changing IT to military area, rapid deployment procedures of verified commercial technologies and products, regulations for using of domestic software promotion and so on. We define the concept of defense IT convergence and propose the framework and processes for applying IT to our defense sector as one of industries. Also, we establish various business models in the military perspective using defense IT convergence framework. In this paper, we focus the development of defense IT convergence through the alignment of national IT convergence policy and propose various business models established through operating a defense IT convergence center.

국방 IT융합 비즈니스 모델 사례와 성과 분석 (Case Study and Performance Analysis of IT Convergence Business Models for Defense Sector)

  • 심승배;유천수;홍수민
    • 한국IT서비스학회지
    • /
    • 제14권2호
    • /
    • pp.275-287
    • /
    • 2015
  • Information technology (IT) convergence have been recognized one of the key drivers in the industry perspective. Especially, IT convergence have been one of the most important innovative way for defense sector. Korea government established IT convergence policy in 2008 and have been applying it to the core industry such as automotive, shipbuilding and defense industries. Recently, the creative vitamin project has been launched. Vitamin 'D' means the way to create the value of defense industry. This research analyzes and evaluates various IT convergence business models based on an operation of defense IT convergence center from 2011 to 2014, which is the industry IT convergence centers. Defense IT convergence business models can be classified into four types of mission area as follows : weapon acquisition and management, military intelligence, military power construction, and resources management. We define the concept of defense IT convergence and describe the framework and processes for applying IT to the defense sector. We analyzes and evaluates various business models designed through defense IT convergence framework and processes.

국방정보기술표준 적용실태 조사 분석에 관한 연구 (A Study on the Investigation and Analysis of Defense Information Technical Standard Application)

  • 김혜령;최상영
    • 한국군사과학기술학회지
    • /
    • 제12권3호
    • /
    • pp.325-332
    • /
    • 2009
  • This study is aimed to investigate the application of DITA(Defense Information Technical stAndard) on the weapon information systems and defense management information systems in order not only to update the current DITA version 4.0, but also to develop SoS(System of systems) interoperability policy in the armed forces of Korea. For this study, 18 information systems were considered, their development products(System/Sub-system Specification, Technical architecture View, System Interoperability Test and Evaluation products) were reviewed and analysed. As a result of the investigation and analysis, it was found that the 44% of the DITA standard profiles were used for the development of the defense information systems. We conclude that DITA should be updated to be a minimal set so that all the defense information systems should be DITA-compliant. And it should be reviewed periodically to reflect the new information technology.

국방 정보기술조사 개선을 위한 실태 분석 및 기술수준조사 연구 (A Study on the Technology Level Survey and Analysis of Problems for improving the Defense IT Survey)

  • 권경용;서민우
    • 한국컴퓨터정보학회논문지
    • /
    • 제18권1호
    • /
    • pp.111-121
    • /
    • 2013
  • 본 논문은 기존의 국방 정보기술(IT) 조사의 개선을 위한 실태를 분석하고 기술수준조사 결과를 바탕으로 2012 국방 정보기술(IT)을 제시한다. 기존의 국방IT조사는 2008년과 2009년에 실시되어 책자형태로 배포되어 시스템으로 관리되고 있다. 기존의 국방IT조사는 86개 기술을 대상으로 조사하였으나, 선정 방법 등 제공되는 내용이 단순하였다. 따라서 기존의 국방IT조사 개선을 위해 관련 유관자들에게 인터뷰 및 설문을 실시하였고, 활용 측면에서 시스템 분석과 배포된 문서를 파악하여 개선사항을 도출하였다. 이를 바탕으로 조사대상 기술을 다양한 측면에서 검토하여 선정하였고, 약 130명의 전문가들에게 자료에 대한 검토 및 기술수준을 위한 설문을 의뢰하였다. 기술수준은 최고기술 보유국가, 기술격차, 파급효과, 기술 달성시기, 연구개발방법 등을 요소로 하였다. 이를 통해 2012 국방IT조사의 40개의 기술을 선정하였고, 각 기술별 수준조사결과를 제시하였다.

국방정보시스템의 진화적 획득전략 (An Evolutionary Acquisition Strategy for Defense Information Systems)

  • 조성림;심승배;김성태;정봉주
    • 한국IT서비스학회지
    • /
    • 제9권4호
    • /
    • pp.187-206
    • /
    • 2010
  • Evolutionary acquisition is an alternative to the grand design acquisition approaches. It has activities to make it possible to develop quickly and respond flexibly to changing customer needs and technological opportunities. The Ministry of Defense adopted an evolutionary strategy to acquire defense information systems. but it does not work well always. We look at problems from aspects of acquisition system and project management. We benchmark successful cases for evolutionary acquisition strategy in the DoD, the pubic and the private sector. We suggest an evolutionary strategy for defense information systems. The evolutionary strategy in this study includes an evolutionary acquisition framework, an evolutionary acquisition process, and an evolutionary acquisition guideline for defense information systems. The evolutionary strategy can help to implement evolutionary acquisition process for defense information system, and the process can increase the success rate of projects.

AI 기반 국방정보시스템 개발 생명주기 단계별 보안 활동 수행 방안 (A Methodology for SDLC of AI-based Defense Information System)

  • 박규도;이영란
    • 정보보호학회논문지
    • /
    • 제33권3호
    • /
    • pp.577-589
    • /
    • 2023
  • 국방부는 국방혁신 4.0 계획에 기반한 첨단과학기술군 육성을 위해 AI를 향후 전력 증강의 핵심 기술로 활용할 계획이다. 그러나 AI의 특성에 따른 보안 위협은 AI 기반의 국방정보시스템에 실질적인 위협이 될 수 있다. 이를 해소하기 위해서는 최초 개발 단계에서부터 체계적인 보안 활동의 수행을 통한 보안 내재화가 필요하다. 이에 본 논문에서는 AI 기반 국방정보시스템 개발 시 단계별로 수행해야 하는 보안 활동 수행 방안을 제안한다. 이를 통해 향후 국방 분야에 AI 기술 적용에 따른 보안 위협을 예방하고 국방정보시스템의 안전성과 신뢰성을 확보하는데 기여할 수 있을 것으로 기대한다.

국방물자정보시스템 성능개선 사업평가에 대한 사례 (A Case on the Evaluation of the Information System Project to Enhance the Performance of DIMS(Defense Material Information System))

  • 조성림;임규건;이대철
    • 한국IT서비스학회지
    • /
    • 제11권1호
    • /
    • pp.109-123
    • /
    • 2012
  • There are many evaluation models to measure the informatization level of an organization and information system project in the ministry of National Defense of Korea. A information system has to keep up with the environment change as well as the advanced recent information technology (IT). Therefore, the evaluation of an information system project to enhance the performance of the information system should be different from the existing evaluation methods. This study suggests an evaluation case of information system projects to enhance the performance of an information system. In order to achieve the objective of this study, the following steps are taken. First, it reviews the background and the scope of the project to enhance the performance of the Defense Material Information System (DMIS). And it sets up the evaluation logic and develops performance indexes. Then it applies these newly developed performance indexes to the information system project and measures the performance. From this study, we found that both the diffusion and the experience accumulation by its continuous use are significant factors in such evaluations.

국방조직의 정보보호 평가 방법론 개발 (Development of the Information Security Methodology for Defense Organization)

  • 조성림;최인수;박지훈;신우창
    • 한국IT서비스학회지
    • /
    • 제12권4호
    • /
    • pp.77-90
    • /
    • 2013
  • As Cyber threats are rising, the scope of information Security (IS) is extending from technical protection of a single information system to organizational comprehensive IS capability. The ministry of National Defense (MND) has established the IS evaluation for defense organization in 'the Directive for Defense Informatization Affairs.' However, no information about an evaluation method, process and organization is provided. We surveyed information security management system (ISMS) and related best practices in public sector and other countries, and analysed the military information security affairs. Thus, this paper recommends the IS evaluation method and process. The trial IS evaluation is in progress this year and the MND will expand this IS evaluation to the entire organization.