• Title/Summary/Keyword: Military Organizations

Search Result 167, Processing Time 0.032 seconds

A Study on the Improvement of SE Based Operation Requirements Documents Application in Defence Acquisition (국방획득에서 SE기반의 운용요구서(ORD) 적용 개선방안 연구)

  • Kim, Heung Bin;Jung, Chan Young;Yang, Myeng Hee
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.18 no.1
    • /
    • pp.33-45
    • /
    • 2022
  • This paper relates to the improvement application of operation requirements documents(ORD) on which empirical researches are not sufficient. The application of ORD was drawn up and operated in the acquisition phase, and recently it was decided to apply it in the requirements planning phase. However, the reality is that there are deficiencies in the performance of works, such as the classification of works among related organizations. Therefore, this study analyzed the cases of writing ORD that have been promoted so far, and Its status was enhanced by reflecting it in laws and regulations. In addition, the concept was redefined, and improvement measures such as the level of writing ORD were suggested for each acquisition stages. Above all, it is desirable to incrementally supplement and develop from preliminary conceptual research in the planning stage and drafting at the military level. In addition, the relevant legal system should be supplemented so that such ORD application can be flexibly established in defence acquisition.

Quantification Analysis of Soft Power through Sentiment Analysis (감성분석을 통한 소프트 파워의 수치화 분석)

  • An-Min;Bong-Hyun Kim
    • Advanced Industrial SCIence
    • /
    • v.3 no.2
    • /
    • pp.1-7
    • /
    • 2024
  • This paper deals with the topic of quantification of soft power through emotional analysis. Sentiment analysis refers to the process of detecting and analyzing emotions or emotions in various data such as text, voice, and images. Therefore, in this paper, we explored the methodology and significance of how soft power can be quantified through emotional analysis. Soft power refers to the ability of a country or organization to influence the behavior of another country or organization in a desired direction. It is built by soft factors such as culture, values, and political system rather than military or economic means. Additionally, sentiment analysis is being used as a useful tool to measure and understand these soft areas.

China's Diplomatic Challenges and Prospect in the Xi Jinping Era (시진핑 시대 중국의 외교적 과제와 전망)

  • Cho, Young Nam
    • Strategy21
    • /
    • s.33
    • /
    • pp.5-36
    • /
    • 2014
  • This article aims to analyze the diplomatic challenges currently facing China as well as the foreign policy the Xi Jinping administration is adopting to address them. With these purposes in mind, it will look into three areas: first, diplomatic tasks confronting the Xi leadership; second, foreign policy that the Xi administration has implemented since the 18th Party Congress in 2012; and third, the prospects for China's foreign policy under the Xi leadership. As the Xi Jinping administration entered into office, it has encountered two major diplomatic challenges. One is the searching for a new foreign policy, and the other the restructuring of the existing foreign affairs and national security systems. The Xi administration, during its first year in office, has responded actively to tackle these issues. To begin with, it has attempted to make some adjustments on foreign policy while maintaining the Deng Xiaoping line of foreign policy. One of these modifications is placing emphasis on national "core interest," as illustrated by changes in guideline for maritime conflicts, pushing for building maritime power, and proclamation of Air Defense Identification Zone in the East China Sea. Second is the decision on the new guideline for peripheral diplomacy. That is, the administration regarded creating peaceful and stable environments to realize "Chinese Dream" as an important goal of foreign policy, and proposed such new guiding ideology as "familiarity, integrity, benefit, and accommodation." In additoin, the Xi administration restructured the existing foreign affairs and national security systems. Establishing the Central State Security Committee and the Internet Leading Small Group (LSG) are cases in point. As comprehensive organizations for policy coordination that encompass party, government, and military, the two LSGs are in charge of enacting related policies and fine-tuning policy implementation, based upon leadership consisting of chiefs of each relevant organs. Moreover, since Xi himself became the chief of these two newly-found organs, the conditions under which these LSGs could demonstrate unified leadership and adjusting role in its implementation of military, diplomatic, and security policies were developed. The future Chinese diplomacy will be characterized with three main trends. First, peripheral diplomacy will be reinforced. The peripheral diplomacy has become far more important since the Work Conference on Peripheral Diplomacy in October 2013. Second, economic diplomacy will be strengthened with an eye on reducing the "China Threat Theory," which still exists in Asia. Third, the policies to isolate the Philippines and Japan will continue in regard to maritime disputes. All in all, Chinese diplomacy in the Xi Jinping era is likely to feature practical diplomacy which combines both hard and soft approaches to best realize Chinese national interest.

A Study on Strengthening Consequence Management System Against CBRN Threats (CBRN 위협에 대비한 사후관리체계 강화방안)

  • Kwon, Hyuckshin;Kwak, Minsu;Kim, Kwanheon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.4
    • /
    • pp.429-435
    • /
    • 2020
  • North Korea declared itself complete with nuclear force after its sixth nuclear test in 2017. Despite efforts at home and abroad to denuclearize the Korean Peninsula, the prospects for the denuclearization are not bright. Along with political and diplomatic efforts to deter NK's WMD threats, the government is required to strengthen its consequence management capabilities against 'catastrophic situations' expected in case of emergency. Accordingly, this study was conducted to present measures to strengthen follow-up management against CBRN threats. The research model was partially supplemented and utilized by the THIRA process adopted and utilized by the U.S. Department of Homeland Security among national-level disaster management plan development models. Korea's consequence management (CM) system encompasses risk and crisis management on disaster condition. The system has been carried out in the form of a civil, government and military integrated defense operations for the purpose of curbing the spread or use of CBRNs, responding to threats, and minimizing expected damages. The preventive stage call for the incorporation of CBRN concept and CM procedures into the national management system, supplementing the integrated alarm systems, preparation of evacuation facilities, and establishment of the integrated training systems. In the preparation phase, readjustment of relevant laws and manuals, maintenance of government organizations, developing performance procedures, establishing the on-site support systems, and regular training are essential. In the response phase, normal operations of the medical support system for first aid and relief, installation and operation of facilities for decontamination, and development of regional damage assessment and control guidelines are important. In the recovery phase, development of stabilization evaluation criteria and procedures, securing and operation of resources needed for damage recovery, and strengthening of regional damage recovery capabilities linked to local defense forces, reserve forces and civil defense committees are required.

A Study on The Effects of Organizational Citizenship Behavior on Work-Family Conflict (군 조직에서 조직시민 행동이 직장-가정 갈등에 미치는 영향에 관한 연구)

  • Jeong, Min-Cheol;Kim, Oh-Hyun
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.3
    • /
    • pp.119-138
    • /
    • 2009
  • Work and family are two major fields of one's life. In the past, the role of each gender has been separated, and there was no conflict between two fields. However, the increasing rate of working woman and the mode of social change that the male has also responsible of caring family and individuals has more interested in their personal life make consider these two fields as a whole. A number of studies have shown that OCB contribute in important ways to organizational functioning and performance. Whereas citizenship behavior may affect organizations in several positive ways, it is also possible that engaging in such behaviors could have negative consequences for the employees who do so. There may be other personal costs such as work-family conflict that accrue to individuals who engage in high levels of citizenship behavior. The purpose of this study is to investigate the moderating effect of the SOC strategy and Family Friendly Atmosphere on the negative effects of OCB on Work-Family Conflict. Questionnaire data were collected from 590 in different jobs. According to the result of empirical analysis, it proved that the more OCB effect on the more Work-Family Conflict. it also was found that the SOC strategy and Family Friendly Atmosphere moderate the relation between OCB and Work-Family Conflict. At the end of the paper, theoretical and managerial implications of this study, future research directions are discussed.

A Case Study of Infographics for National Defense - Focusing on the Datajournalism of Afghanistan War in Guardian (국방분야에서 인포그래픽 적용사례 연구 - 영(英) 가디언지 아프가니스탄전 데이터저널리즘을 중심으로)

  • Kim, Dong Hwan
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.43-52
    • /
    • 2014
  • Recently, Big Data is a buzzword in the creative economy generation. The organizations related to spatial information society focus on building the spatial big data systems. As spatial big data is a combination of spatial information and big data, the data visualization is essential in order to utilize them efficiently. One of the great methodologies for data visualization is infographics. Nationally, Chousn.com initiated the infographics news in 2010. Korean Administration Branches also recognized the importance of infographic and they adopted infographics for their briefings from 2013. Internationally, Visual.ly is leading company in the infographics market and they produced noticeable interactive infographics for Egypt Parliamentary Elections results. In the defense part, Guardian's datajournalism of Afghanistan war log was a good example of utilizing infographics. Throughout the research, five requirements are extracted. First source data should have precision and accuracy in terms of time and space manner. Second, infographics images have a compressibility. Third, the infographics is properly processed for military commanders. Fourth, sharing, openness and communication are essential for high quality infographic. Lastly, infographics should be an analytic tool for predicting future event based on the past data. Infographics is not a direct representation of data but an analytic tool for helping user's choice and decision in critical moments.

The Emerging security initiatives and forecasting future social and natural environment changes (신흥안보 창발과 미래 사회 및 자연환경 변화예측)

  • Jung, Min-Sub;NamKung, Seung-Pil;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.327-331
    • /
    • 2020
  • In that this study is a subject and character of risk, emerging security covers non-military areas in addition to traditional military security: environmental security, human security, resource security, and cyber security. The rise of these risks is not only changing the phenomenon of the new expansion of security areas, but also the expansion of the number and scope of security entities and the aspect of security world politics. These risks are transnational security issues at the global level in terms of their nature and extent of the damage, as well as multi-layered ones that affect local and personal security issues at the regional and national levels. In addition to national actors, non-state actors such as international organizations, multinational corporations, and global civil society, and furthermore, technology and social systems themselves are causing risks. Therefore, to solve the new security problem, it is necessary to establish a middle-level and complex governance mechanism that is sought at the regional and global levels beyond the fragmented dimension of the occurrence of new security issues that have been overlooked in the existing frame of perception, and to predict and find ways to respond to new security paradigms that have been identified in a broader sense.

A Study on the Length of DMZ and MDL (비무장지대 및 군사분계선의 길이에 관한 연구)

  • KIM, Chang-Hwan
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.1
    • /
    • pp.19-27
    • /
    • 2019
  • This study is to measure the length of the Demilitarized Zone and the Military Demarcation Line(MDL) on the Korean Peninsular. For this purpose, maps of the Armistice Agreement Volume II were used. These maps are nine sheets. In order to extract the MDL shown on the map, coordinates were assigned to the scanned image maps using the georeferencing module of ArcGIS based on the sheet line coordinates. The accuracy of the extracted vectors was checked by overlaying them on the maps of the Armistice Agreement Volume II. And I tried to validate these vectors through comparative analysis with vectors extracted from Kim(2007). Vectors extracted from Kim(2007) had errors in the curvilinear parts of the MDL, but the vectors extracted from this study exactly matched the MDL in the Armistice Agreement Volume II. The measured length is 239.42km(148.77miles). This means that the expression '155mile MDL' or '248km DMZ' in papers, reports or mass media has so far been inappropriate. I think this study will be able to provide information on the exact length of the DMZ in studies related with DMZ or in policy decisions by the national and local government. However, it is deemed necessary to verify this result by national organizations such as the NGII(National Geographic Information Institute). After these verification procedures, I hope that the national government will inform the people of the exact length of DMZ and MDL.

Comparative Analysis and Implications of Command and Control(C2)-related Information Exchange Models (지휘통제 관련 정보교환모델 비교분석 및 시사점)

  • Kim, Kunyoung;Park, Gyudong;Sohn, Mye
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.59-69
    • /
    • 2022
  • For effective battlefield situation awareness and command resolution, information exchange without seams between systems is essential. However, since each system was developed independently for its own purposes, it is necessary to ensure interoperability between systems in order to effectively exchange information. In the case of our military, semantic interoperability is guaranteed by utilizing the common message format for data exchange. However, simply standardizing the data exchange format cannot sufficiently guarantee interoperability between systems. Currently, the U.S. and NATO are developing and utilizing information exchange models to achieve semantic interoperability further than guaranteeing a data exchange format. The information exchange models are the common vocabulary or reference model,which are used to ensure the exchange of information between systems at the content-meaning level. The information exchange models developed and utilized in the United States initially focused on exchanging information directly related to the battlefield situation, but it has developed into the universal form that can be used by whole government departments and related organizations. On the other hand, NATO focused on strictly expressing the concepts necessary to carry out joint military operations among the countries, and the scope of the models was also limited to the concepts related to command and control. In this paper, the background, purpose, and characteristics of the information exchange models developed and used in the United States and NATO were identified, and comparative analysis was performed. Through this, we intend to present implications when developing a Korean information exchange model in the future.

Changes in the Law Regulating Contraband of war under the Law of Neutrality and Implications for the Korean Peninsula (중립법상 전시금제품 제도의 변천과 한반도에서의 함의)

  • Park, Ji-hong
    • Maritime Security
    • /
    • v.8 no.1
    • /
    • pp.41-71
    • /
    • 2024
  • In international armed conflict, 'the contraband of war' under 'the law of neutrality' was developed to balance the interests of belligerents' belligerent rights and neutrals' economic interests and it began to change and evolve with the development of trade in the 19th century. The scope of material control expanded during the First and Second World Wars and continues to this day. In particular, a trend toward preventing the military use of 'conditional contraband' that could be used for both military and civilian purposes. In the process, the law regulating contraband of war expanded conceptually to become an 'international export control system' led by international organizations. Today, the contraband of war is still in effect, but there are no laws or guidelines related to the contraband of war in Korea in case of an emergency for the Korean Peninsula. Considering that it is an international practice to create and publicize a list of the contraband of war, it is necessary for Korea to prepare for it. Therefore, this paper examines the historical origins and development of the law regulating of war under the law of neutrality and examines the state practice of the contraband of war control over time. In doing so, this paper will examine the implications of the law regulating contraband of war for the Korean Peninsula through changing in the law regulating contraband of war and state practice.

  • PDF