• Title/Summary/Keyword: International security

Search Result 2,981, Processing Time 0.02 seconds

A study on the rules and policy of the maritime and aviation supply chain security (해상 및 항공물류보안의 법규 및 정책에 관한 연구)

  • Choi, Byoung-Kwon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.42
    • /
    • pp.247-274
    • /
    • 2009
  • The supply chain security programs are designed to prevent terrorist attacks on world transit system, and to help protect the passengers and workers who use these systems on a daily basis. as evidenced by the train bombings in London and Madrid in recent years, the threats to America's transit systems are real. After 9 11 terrors in 2001, security problem is appearing to every nations and international organizations main pending issue than any problem and various countermeasure is prepared. Security is the major issue in international trade, with significant potential costs and economic impact. So, We need to ensure that supply chain security does not become a new non-tariffs barrier. The aim of this study is to examine the international maritime and aviation law on the supply chain security. Also I review the supply chain security in U.S. and other countries.

  • PDF

A Simulation Modeling for the Effect of Resource Consumption Attack over Mobile Ad Hoc Network

  • Raed Alsaqour;Maha Abdelhaq;Njoud Alghamdi;Maram Alneami;Tahani Alrsheedi;Salma Aldghbasi;Rahaf Almalki;Sarah Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.111-119
    • /
    • 2023
  • Mobile Ad-hoc Network (MANET) is an infrastructure-less network that can configure itself without any centralized management. The topology of MANET changes dynamically which makes it open for new nodes to join it easily. The openness area of MANET makes it very vulnerable to different types of attacks. One of the most dangerous attacks is the Resource Consumption Attack (RCA). In this type of attack, the attacker consumes the normal node energy by flooding it with bogus packets. Routing in MANET is susceptible to RCA and this is a crucial issue that deserves to be studied and solved. Therefore, the main objective of this paper is to study the impact of RCA on two routing protocols namely, Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR); as a try to find the most resistant routing protocol to such attack. The contribution of this paper is a new RCA model (RCAM) which applies RCA on the two chosen routing protocols using the NS-2 simulator.

Features of the Implementation of Public Authority in the Context of Modern International Security Challenges: Information Component

  • Borysenko, Olha;Kitsak, Taras;Pasichnyi, Roman;Akimova, Liudmyla;Karpa, Marta;Akimov, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.123-128
    • /
    • 2022
  • The main purpose of the study is to determine the features of the implementation of public authority in the context of modern international security challenges. The fact that public authority is a necessary regulator of the life of society ensures its development, unity, and manageability, which is an important factor in the organization and orderliness of society adds to the actualization of the research topic. The research methodology includes a set of theoretical methods of analysis. Based on the results of the study, key aspects of the implementation of public authority in the context of modern international security challenges were identified. The study has limitations, and they relate to the practical aspect of the implementation of public authority in the context of modern international security challenges.

A literature review of Korean and International research on the supply chain security (공급 사슬 보안에 관한 국내외 문헌 조사 연구)

  • Yang, Byoung-Hak
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.3
    • /
    • pp.87-96
    • /
    • 2011
  • This research is a literature survey on the Supply chain security. International organization and governments have build security regulations to improve the security in the shipment through supply chain. The researches on supply chain security were increasing during last 10 years. We were surveyed 53 research including Korean and international papers. ills study was classified by research subjects, security regulation, and research methods. Korean researches were focused to introducing and reviewing on the security regulation, but the researches on specific security reinforcement were very rare. International researches were concerned with the subject of the airport security scanning problem, transportation security problem, port selection problem.

South Korea and EU Practices for Maritime Transport and Port Security: A comparative Study on Attitude to respond (한-EU 해상운송보안 제도 대응전략 비교연구)

  • KIM, Si-Hyun;SHIN, Gun-Hoon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.68
    • /
    • pp.23-42
    • /
    • 2015
  • According to the increasing attention to safety and security in maritime shipping, there are diverse security systems in international logistics activities. Although prior studies on maritime transport and port security reviewed security policy and practices in order to provide useful insights for strategic agenda, a few focused on attitude to respond it. Moreover, there are no prior study on a comparative study between continents. To tackle this, this paper compared confrontation attitude to maritime transport and port security between South Korea and European Union. Results identified that maritime shipping security incorporates container cargo security management, logistics security management, logistics security certificate system, and environmental impacts management caused by maritime shipping. Further, the comparison between two countries suggests that South Korea need to take more positive attitude to respond, such as investment in equipment and technologies for maritime shipping security, construction of comprehensive management system, political supports for logistics security, and training and education for safety and security. The results provide useful insights for strategic review of security systems in South Korea, and to help strategic agenda for future improvement.

  • PDF

A Study on the Establishment of a Security and Customs Cooperation System for Reinforcement of the International Air Cargo Supply Chain Security (국제항공화물 공급망 보안 강화를 위한 보안과 세관의 협조체계 구축방안에 관한 연구)

  • Park, Man-Hui;Hwang, Ho-Won
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.4
    • /
    • pp.142-152
    • /
    • 2021
  • The International Civil Aviation Organization (ICAO) and the World Customs Organization (WCO) emphasize securing supply chain security through mutual cooperation between aviation security and customs by establishing a standardized security system by regulations, procedures and practices of international air cargo. Accordingly, in accordance with the Aviation Security Act, the known consignors system aims to secure cargo security before loading air cargo into the aircraft, while the customs AEO system is a public-private cooperation program that focuses on simplification of customs clearance procedures. These systems basically have the same purpose of effectively identifying high-risk cargo through a risk-based approach in international air cargo transportation and preventing risks in advance, and the content that a common basic standard for cargo security must be established is also similar. Therefore, it is necessary to establish a cooperation system by simplifying problems such as cumbersome and redundant authentication procedures and on-site verification through coordination of security requirements for mutual recognition between the two systems. As a result, it is necessary to establish a process for coordinating security and customs' supply chain security program and maximize the effect of harmonizing supply chain security by strengthening the linkage between known consignors and AEO.

Return of Geopolitics and the East Asian Maritime Security (지정학의 부활과 동아시아 해양안보)

  • Lee, Choon-Kun
    • Strategy21
    • /
    • s.36
    • /
    • pp.5-32
    • /
    • 2015
  • Geopolitics or Political Geography is an essential academic field that should be studied carefully for a more comprehensive analysis of international security relations. However, because of its tarnished image as an ideology that supported the NAZI German expansion and aggression, geopolitics has not been regarded as a pure academic field and was rejected and expelled from the academic communities starting from the Cold War years in 1945. During the Cold War, ideology, rather than geography, was considered more important in conducting and analyzing international relations. However, after the end of the Cold War and with the beginning of a new era in which territorial and religious confrontations are taking place among nations - including sub national tribal political organizations such as the Al Quaeda and other terrorist organizations - geopolitical analysis again is in vogue among the scholars and analysts on international security affairs. Most of the conflicts in international relations that is occurring now in the post-Cold War years can be explained more effectively with geopolitical concepts. The post - Cold War international relations among East Asian countries are especially better explained with geopolitical concepts. Unlike Europe, where peaceful development took place after the Cold War, China, Japan, Korea, the United States, Taiwan and Vietnam are feeling more insecure in the post-Cold War years. Most of the East Asian nations' economies have burgeoned during the Cold War years under the protection of the international security structure provided by the two superpowers. However, after the Cold War years, the international security structure has not been stable in East Asia and thus most of the East Asian nations began to build up stronger military forces of their own. Because most of the East Asian nations' national security and economy depend on the oceans, these nations desire to obtain more powerful navies and try to occupy islands, islets, or even rocks that may seem like a strategic asset for their economy and security. In this regard, the western Pacific Ocean is becoming a place of confrontation among the East Asian nations. As Robert Kaplan, an eminent international analyst, mentioned, East Asia is a Seascape while Europe is a Landscape. The possibility of international conflict on the waters of East Asia is higher than in any other period in East Asia's international history.

Legal Implications of the ISPS Code on Contract of Carriage by Sea (국제해상보안규정(ISPS Code)의 시행이 해상법에 미칠 영향)

  • Yang, Jung-Ho;Myung, Chang-Sig
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.37
    • /
    • pp.217-250
    • /
    • 2008
  • The International Ship and Port Facility Security (ISPS) Code which was developed as the main response of the shipping sector to the miserable event of 11 September 2001 came into effect on 1 July 2004. The ISPS Code designed to detect and eliminate security threats affecting ships and port facilities used in international trade will significantly impact not only on the management and operation of the shipping industry but also on maritime law despite the fact that it is the regulatory framework of public law. It is expected that implementing the ISPS Code will contribute to reinforcement of maritime security on the one hand. However, on the other hand, more intensified security inspection and control measures of port states will also cause delay and additional costs which cause uncertainty in allocating security risk and cost between the contracting parties. Therefore, it is desire to insert new security clause dealing with main security issues or adapt existing clauses to new shipping environments to minimize disputes.

  • PDF

International cyber security strategy as a tool for comprehensive security assurance of civil aviation security: methodological considerations

  • Grygorov, Oleksandr;Basysta, Albina;Yedeliev, Roman;Paziuk, Andrii;Tropin, Zakhar
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.332-338
    • /
    • 2021
  • Civil aviation cybersecurity challenges are global in nature and must be addressed using global best practices and the combined efforts of all stakeholders. This requires the development of comprehensive international strategies and detailed plans for their implementation, with appropriate resources. It is important to build such strategies on a common methodology that can be applied to civil aviation and other interrelated critical infrastructure sectors. The goal of the study was to determine the methodological basis for developing an international civil aviation cybersecurity strategy, taking into account existing experience in strategic planning at the level of international specialized organizations. The research was conducted using general scientific and theoretical research methods: observation, description, formalization, analysis, synthesis, generalization, explanation As a result of the study, it was established the specifics of the approach to formulating strategic goals in civil aviation cybersecurity programs in the documents of intergovernmental and international non-governmental organizations in the aviation sphere, generally based on a comprehensive vision of cybersecurity management. A comparative analysis of strategic priorities, objectives, and planned activities for their implementation revealed common characteristics based on a single methodological sense of cybersecurity as a symbiosis of five components: human capacity, processes, technologies, communications, and its regulatory support. It was found that additional branching and detailing of priority areas in the strategic documents of international civil aviation organizations (by the example of Cybersecurity Strategy and Cybersecurity Action Plan) does not always contribute to compliance with a unified methodological framework. It is argued that to develop an international civil aviation cybersecurity strategy, it is advisable to use the methodological basis of the Cyber Security Index.

Evaluation for Incheon International Airport security: passenger satisfaction and significance, using IPA method (IPA기법을 활용한 인천국제공항 이용객의 항공보안서비스 만족도와 중요도 평가)

  • Byeon, A-Reum;Choi, Jin-Young;Choi, Youn-Chul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.2
    • /
    • pp.77-82
    • /
    • 2017
  • Currently the international flight passenger visit at Incheon International Airport increased 12.4% compared to January 2017. Such increase affects on the congestion of an airport and the security check is one of the most congested area. There is a prejudice that airport security is not related to the airport service and is only a type of control that limits the quality of service. However, considering the huge impact that airport security agents have on passenger move within the airport, trustworthy, fast and kind service at airport security check is one of the most important part of airport service quality improvement. This research is an importance performance analysis of Incheon International Airport security service passenger satisfaction and its significance using IPA method. This research will contribute to the improvement of airport operation and service quality, by proving the relation between airport security and service.