• Title/Summary/Keyword: Defense sector

Search Result 134, Processing Time 0.031 seconds

A Study on Valuation of Defense Technology -Focusing on Overseas Technology Transfer- (국방 기술가치평가에 관한 연구 -국외 기술이전을 중심으로-)

  • Goh, Hwa-Jin;Jeon, Jeong-hwan;Kim, Joon-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.147-154
    • /
    • 2021
  • Recently, it has been observed that as the level of Science and Technology in Korea is improving, the demand for technology transfer from overseas buyers is also increasing. A technical value is an important factor for the technology transfer process and the valuation of technology should be performed reasonably. Specifically, a non-economical value has to be examined thoroughly when conducting the valuation for a technology that depends on public values. Since public technology has public benefit as its purpose when compared to technology from the private sector, its discount rate should be appropriately assessed and reflected in its valuation process. In this context, this study presents the methodology of valuation of public technology particularly relating to the transfer of technology from the national defense industries. To be specific, both an application method of the discount rate according to the characteristics and the purpose of the target technology and a qualitative and quantitative evaluation method to reflect the public values are presented. The proposed method for the valuation of defense technology could be used practically both in strengthening bargaining capability based on the reasonably derived technical values for transfer of national defense technology abroad and in the compilation of budgets for technology development in the future.

A Research on RC3(RMF-CMMC Common Compliance) meta-model development in preparation for Defense Cybersecurity (국방 사이버보안을 위한 RMF-CMMC 공통규정준수 메타모델 개발방안 연구)

  • Jae-yoon Hwang;Hyuk-jin Kwon
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.123-136
    • /
    • 2024
  • The U.S. Department of Defense, leading global cybersecurity policies, has two main cybersecurity frameworks: the Cybersecurity Maturity Model Certification (CMMC) for external defense industry certification, and the Risk Management Framework (RMF) for internal organizational security assessments. For Republic of Korea military, starting from 2026, the Korean version of RMF (K-RMF) will be fully implemented. Domestic defense industry companies participating in projects commissioned by the U.S. Department of Defense must obtain CMMC certification by October 2025. In this paper, a new standard compliance meta-model (R3C) development methodology that can simultaneously support CMMC and RMF security audit readiness tasks is introduced, along with the implementation results of a compliance solution based on the R3C meta-model. This research is based on practical experience with the U.S. Department of Defense's cybersecurity regulations gained during the joint project by the South Korean and U.S. defense ministries' joint chiefs of staff since 2022. The developed compliance solution functions are being utilized in joint South Korean-U.S. military exercises. The compliance solution developed through this research is expected to be available for sale in the private sector and is anticipated to be highly valuable for domestic defense industry companies that need immediate CMMC certification.

A Study on Measuring the Efficiency of the Army Supply-Transportation Battalions (육군 보급수송대대 효율성 측정에 관한 연구)

  • Seo, Me-Young;Song, Yong-Il
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.2
    • /
    • pp.85-106
    • /
    • 2010
  • Recently, government is endeavoring for Defense Ministry unit's efficiency improvement according as requires low cost, high effectiveness continuously about public sector. But, by real condition that measuring analysis about logistical corps'(LOG) efficient operation is not, this study was done to present method to estimate efficient management availability of logistical corps(LOG). Presents choosing variable that is suitable in Quartermaster Corps' efficiency estimation for this through existing virtue study investigation, and takes advantage of DEA (Data Envelopment Analysis) technique that divert in public sector efficiency measurement, I wish to present plan for inefficient organization's efficiency improvement after evaluate efficiency to Quartermaster Corps.

Security measures of Information and Communication infrastructure of Water Resources Field (댐·보 등 수자원분야 정보통신기반시설 보안대책)

  • Yu, Se-Hwan;Jang, Dong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.1034-1037
    • /
    • 2013
  • ICT infrastructure is electronic control systems or communication network related to national security, public administration, defense, policing, finance. Water resources sector has been building a system of control that can be performed electronically, communications, management, energy, and other work-related. Water resources sector has been a paradigm shift in water management and the control system is integrated into a single network. The control system security vulnerabilities are exposed - other control networks, business networks, linking with outside agencies, etc. Cyber terrorist society can cause a huge mess economically, The importance of security for control systems is becoming. In this paper, ICT infrastructure - the water resources in the field of control systems will analysis security measures.

  • PDF

A Study on Test Report Information Service Architecture for Preventing Forgery and Alteration in Defense Industry (군수품 시험성적서 위·변조 방지 시스템 아키텍처에 대한 연구)

  • Lee, Donghun;Jeon, Sooyune;Bae, Manjae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.43-51
    • /
    • 2016
  • Preventing the forgery and alteration of test reports is important, in order to maintain the reliability of military supplies. Based on a survey of reports on testing institutions and a case study of established electronic document systems in the public sector, we propose a system architecture, which helps prevent the forgery and alteration of test reports with legal force. The proposed architecture takes advantage of both the time stamp that records the time a document is received and a server synchronized with the testing institution. Using the proposed system architecture, the user is able to request a test and receive reports from the testing institution without delay. Also, a defense agency is able to conveniently prove the authenticity of the test reports and utilize the statistical data collected by the architecture. Therefore, we expect that the proposed system architecture will help defense agencies to prevent the forgery and alteration of test reports and ensure their reliability and quality.

A Study on ESS Process Modeling and Application for Improving Reliability of Electronic Equipments (전자장비 신뢰성 향상을 위한 ESS 프로세스 모델링 및 적용에 관한 연구)

  • Choi, Jong-Soo;Lee, Chang-Woo
    • Journal of Korean Society for Quality Management
    • /
    • v.40 no.3
    • /
    • pp.286-294
    • /
    • 2012
  • Purpose: In this study, we propose the ESS process model which, in order to improve reliability of electronic equipment, can be referenced in both development and production phases. Methods: ESS guidelines such as MIL handbooks or private sector ESS guidelines are used for devising the proposed ESS model. Especially, proposed model is customized by using those references in order to be optimized in the domestic development and production phases. Results: ESS-related-requirements which is specified in the Technical Data Package(TDP) for the area of guided missile systems are analyzed. Current status of the requirement and screening strength are analyzed for those systems to show what kind of weak points should be improved. Conclusion: A ESS guideline which is applicable to the domestic weapon acquisition environment is proposed. As such, the necessity and detail guidelines of the proposed model are explained.

Improvement of Computer Security Check Program and User Inspection Items In Response To Military Cyber Security Breachment(For Army sector) (국방 사이버 침해 대응을 위한 전산보안점검 프로그램 및 사용자 진단항목 개선 연구(육군 중심))

  • Kim, Jee Won;Jung, Ui Seob;Jung, Chan Gi
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.101-107
    • /
    • 2017
  • Recent cyber attacks on South Korea, including hacking and viruses, are increasing significantly. To deal with the cyber invasion of cyber aggression, the Ministry of National Defense defined the necessary procedures for cyber security with guidelines for cyber security. In spite of, based on the analyses the cyber defense operations published, the number of violations are increasing. To address issues stated above, the safety check items should be reviewed and revised. This paper will revisit current safety check items and provide new guidelines to prevent cyber security breaches, which will provide more safe and efficient cyber environment.

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

A Study on the Activation·Specification of 119 Rescue & Care in JeJu (제주도 119구조·구급대의 활성화 및 전문화 방안)

  • Koh, Jae-Moon;Kim, Tae-Min;Kim, Hyo-Sik;Lee, Young-A
    • The Korean Journal of Emergency Medical Services
    • /
    • v.6 no.1
    • /
    • pp.153-168
    • /
    • 2002
  • Since 1992, conventional fire fighting businesses have been converted into a metropolitan autonomous fire fighting system to be ready for a variety of disasters. However, the corresponding investment has been overlapped due to the non-integration of businesses to prevent any potential disasters, and a series of collaborative systems have been not functioning so well. In the meantime, our fire fighting sector has been trying to set up its own clean and faithful position by abolishing any inconvenient system or outsourcing private sectors, and expanded its work scope from conventional fire fighting even to rescue and emergency works. While focusing on handling disaster, the fire fighting sector has been widely trusted and reliable throughtout our nation. Moreover, our fire fighting sector has secured nation wide mobile organizations, technical personnel by field, special equipments and independent communication network. In addition, the fire fighting sector has knowledges, expertise and capabilities required for managing disasters, while in charge of almost every disaster management works including fire, explosion, collapse, disaster and flood. It becomes an organization for comprehensive disaster management under an absolute national trust, which is based on the system for prevention, preparation and countermeasure against a variety of disasters. Thus, our fire fighting sector must make many efforts and try to modernize conventional education and training. The ways to facilitate rescue and emergency works may include the nurture of technical fire fighting personnel along with modernized equipments, the reinforcement of rescue and emergency education, the facilitation of operating civil defense corps, the facilitation of operating volunteer fire fighting corps, the better arrangement of 119 briefing room for public healthcare in provincial offices, the sterilization of rescue instruments and equipments the better repair education for emergency rescue member, the establishment of regional emergency assistant system and the expansion of fire fighting personnel and equipments. In terms of reinforcing the functions and services of rescue 119 and emergency corps, we must review the following considerations: Building up security system along with operational expansion, building up a system for emergency medical treatment, building up a comprehensive information management system for rescue and emergency, constructing a provincial safety museum and so forth. For the ways to better the works of rescue 119 we can review the following considerations : Improving the education for fire fighting training corps under Jeju Provincial Fire and Disaster Management Department, providing rescue members with more opportunities for clinical practices, enhancing the morale of rescue members, installing a comprehensive briefing room for emergency rescue members, building up medical networks along with reasonable policies for information service, operating the consulting system for rescue 119 and so on. If these requirements are met, it is expected that the fire fighting departments in Jeju province can cope with every accident and disaster a little more rapidly and quickly in compliance with local needs, so that they can keep their own position as a public fire fighting organization which may be trusted by the public.

  • PDF

What Drives International Technology Cooperation?: Joint R&D Cooperation in Defense Core Technology (국제기술협력 결정요인에 관한 연구: 무기체계 핵심기술의 공동연구개발 중심으로)

  • Lee, Hyungjin;Chung, Sunyang
    • Journal of Technology Innovation
    • /
    • v.21 no.2
    • /
    • pp.355-373
    • /
    • 2013
  • This research paper is to identify factors affecting the need for international cooperation in defense science and technology sector. This study set a new hypothesis based on the previous research in terms of the theory of transaction cost, knowledge-based and technology readiness level perspective. After setting a new hypothesis, the following facts were found. First, it showed that the greater the importance of defense technology also increases the need for international technology cooperation for its technology. Second, the relatively higher distance of technology comparing to the developed countries was the need for international technology cooperation to be bigger. Lastly, the relatively higher technology readiness level of technology showed the negative relationship with the need for international cooperation. This results showed that the international cooperation in defense science and technology was regarded as complementary to get their short knowledge. The results of these analyzes showed that the international defense cooperation should be push forward based on the level of technology comparing to the developed countries and the technology readiness level.

  • PDF