• Title/Summary/Keyword: Organizational Space

Search Result 95, Processing Time 0.02 seconds

A study on Operation Rules of Korean Air Defence Identification Zone (한국 방공식별구역 운영규칙에 관한 고찰)

  • Kwon, Jong-Pil;Lee, Yeong H.
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.189-217
    • /
    • 2017
  • Declaration of Air Defense and Identification Zones started with the United States in 1950, which was followed by declaration of KADIZ by the Republic of Korea in 1951. Initial ADIZ were solely linked with air defense missions, but their roles have changed as nations around the globe manifested a tendency to expand their influence over maritime resources and rights. In particular, China declared ADIZ over the East China Sea in October 2013 and forced all passing aircraft to submit flight plan to ATC or military authority, saying failure of submission will be followed by armed engagement. China announced it would declare another zone over the South China Sea despite the ongoing conflict in the area, clearly showing ADIZ's direct connection with territorial claim and EEZ and that it serves as a zone within which a nation can execute its rights. The expanded KADIZ, which was expanded in Dec 15, 2013 in response to Chinese actions, overlaps with the Chinese ADIZ over the East China Sea and the Japanese ADIZ. The overlapping zone is an airspace over waters where not only the Republic of Korea but also of China and Japan argue to be covering their continental shelf and EEZ. Military conventions were signed to prevent contingencies among the neighboring nations while conducting identifications in KADIZ, including the overlapping zone. If such military conventions and practice of air defense identification continue to be respected among states, it is under the process of turning into a regional customary law, although ADIZ is not yet recognized by international law or customary law. Moreover, identification within ADIZ is carried out by military authorities of states, and misguided customary procedures may cause serious negative consequences for national security since it may negatively impact neighboring countries in marking the maritime border, which calls for formulation of operation rules that account for other state activities and military talks among regional stake holders. Legal frameworks need to be in place to guarantee freedom of flights over international seas which UN Maritime Law protects, and laws regarding military aircraft operation need to be supplemented to not make it a requirement to submit flight plan if the aircraft does not invade sovereign airspace. Organizational instructions that require approval of Chairman of Joint Chiefs of Staff for entrance and exit of ADIZ for military aircraft need to be amended to change the authority to Minister of National Defense or be promoted to a law to be applicable for commercial aircraft. Moreover, in regards to operation and management of ADIZ, transfer of authority should be prohibited to account for its evolution into a regional customary law in South East Asia. In particular, since ADIZ is set over EEZ, military conventions that yield authority related to national security should never be condoned. Among Korea, China, Japan and Russia, there are military conventions that discuss operation and management of ADIZ in place or under negotiation, meaning that ADIZ is becoming a regional customary law in North East Asia region.

  • PDF

The present situation and trend of China archives science (중국(中國) 당안학(檔案學)와 현황(現況) 및 발전추세(發展趨勢))

  • Feng, Fuj-Ling
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.1 no.1
    • /
    • pp.37-52
    • /
    • 2001
  • 1. establishment and development of China archives science: With the centuries-old history of archives and archives management, early China archives science came into being in 1930s, and the research pushed forward by archives enterprise has made great achievements since then. 1.1 Expanding research fields: Foundation

The Direction of Development of Leisure and Tourism Contents in Connection with Osaek District (강원도 오색지구 레저·관광 콘텐츠 개발 방향)

  • Lee, Gye-Young;Kim, Tae-Dong
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.7
    • /
    • pp.307-319
    • /
    • 2019
  • This study aims to provide the basic materials for the development of leisure and tourism contents in connection with Osaek cableway for the revitalization of Osaek District. For such a purpose, the following policy directions were presented through the analysis of the present situation and conditions of Osaek District, the direction of development of leisure and tourism contents of Osaek District, etc. The first is increasing the participation of local residents and reinforcing their capabilities. The suggested promotion plans are ① establishing organizational system and strengthening support, ② reinforcing the capabilities of local residents and ③ constructing networks with external human resources. The second is setting the guidelines for contents development. It was proposed to prepare contents for leisure experience using the natural environment of Osaek District in response to the trend of increase of people who enjoy "contents using culture and arts" and leisure. The third is typological approach to contents. It was proposed to develop cultural contents with the theme of Osaek such as "Osaek Light Festival", "Osaek Concert", "Osaek Photo Exhibition" and "Osaek Good Men and Women Contest" for the promotion of the brand of the place name of Osaek and the creation of the "Picture Book Village" for the compilation of the history and culture of Osaek District with pictures. The fourth is securing marketing channels. For this, it was proposed to produce the website of Yangyang County or a website tentatively named as "Osaek-ri with Beautiful Osaek" and introduce an integrated travel product (transportation + lodging + foods + experience (hot spring, mineral water therapy, leisure experience, etc.) + purchasing local specialty products, etc.) composed of the leisure and tourism contents, transportation, lodging, foods, etc. of Osaek District through travel agencies. The final policy direction presented was phased implementation of the development and operation of the contents. Proposed policies include support of a consulting project to upgrade the organization of local residents; implementation of "Tourism Dure (Cooperative)" project for the solution of the problem of tourism in Osaek District by the residents themselves together using the space of culture and arts made by remodeling idle public and private facilities after benchmarking exemplary places; system improvement for the introduction of leisure and tourism contents appropriate for local conditions; and the establishment of a master plan for the introduction of various leisure and tourism contents in Osaek District.

India's Maritime-Security Strategy: Pretext, Context and Subtext (인도의 해상 안보 전략: 구실, 맥락 및 숨은 의미)

  • Khurana, Gurpreet S
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.1-56
    • /
    • 2022
  • Why has India become a key actor in the maritime-configured Indo-Pacific region? There are some external factors, but for India, its geo-strategic frontier encompassing its geopolitical and maritime interests is expanding rapidly beyond its territorial space across both the Indian and Pacific oceans amidst an increasingly arduous geopolitical and security environment. India must, therefore, acquire the ability to influence events within this strategic arena using all facets of national power, including maritime-military power. Lately, therefore, New Delhi has invested much intellectual capital to review its maritime-security strategy. India's new strategy is premised on the concept of holistic security involving the 'softer' aspects of maritime-security, and a rekindling of maritime consciousness in India, a nation that has traditionally been beset by 'sea-blindness'. The strategy adopts a region-wide, inclusive, and a more proactive approach than hitherto, as is evident in its title 'Ensuring Secure Seas: Indian Maritime Security Strategy'. While it deals with the growing concern of new non-traditional threats in the Indian littoral and the need for military deterrence and preparedness, it also addresses the imperatives for India to seek a favorable and rules-based benign environment in its immediate and extended maritime periphery, including through multi-vectored strategic partnerships dictated by its enduring principle of strategic autonomy. For a more profound and comprehensive understanding of India's maritime-security strategy, this paper examines the key unstated and implicit factors that underpin the strategy. These include India's historical and cultural evolution as a nation; its strategic geography; its geopolitical and security perceptions; and the political directions to its security forces. The paper deals specifically with India's response to maritime threats ranging from natural disasters, crime and state-sponsored terrorism to those posed by Pakistan and China, as well as the Indian Navy's envisaged security role East of the Malacca Straits. It also analyzes the aspects of organizational restructuring and force planning of India's maritime-security forces.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF