• Title/Summary/Keyword: Security issues

Search Result 1,598, Processing Time 0.031 seconds

Dokdo of Korea, A Chance for Peace and Co-Prosperity A Study Using Perspectives of Public Diplomacy and Negotiation Strategies (Memorial Lesson from fisherman, An Yong-bok as a Supreme Negotiator) (한국의 독도, 평화와 상생의 기회: 공공외교 및 협상 관점의 연구 (탁월한 소시민 협상가, 어부 안용복을 기리며))

  • Mi-ae Hwang
    • Journal of Public Diplomacy
    • /
    • v.2 no.2
    • /
    • pp.27-52
    • /
    • 2022
  • Objectives: The neighboring countries of South Korea and Japan in Northeast Asia have interacted in both positive and negative ways, at times as close partners and other times adversaries, throughout their long and thorny history of extensive dynamics. The controversial dispute over Dokdo is one of the most critical issues evoking harsh tensions and arguments asserting wholly opposite claims. Dokdo is a small island between two coastal states, but significant in terms of territorial, botanical, and marine resources, and thus ownership of the island has become a point of conflict accompanied by a troubled history. But why has Dokdo been a source of conflicts and how should the controversial Dokdo issue be addressed in a way that fosters positive influence and co-prosperity? Methods: This study provides comprehensive and critical insights from a wealth of previous research and strategic suggestions for the Korean government. It utilizes the three perspectives of historical documents and political context, international regulations and legal frames, and public diplomacy. Furthermore, it applies these resources to negotiation theories and strategies to propose reasonable solutions. Results: This study suggests that it is important for Korea and Japan to try to build mutual trust through more active communication and interaction in order to understand each other before attempting to create a formal resolution via negotiation. In addition to these efforts, Korea needs to be ready for the inevitable need to take decisive action in terms of negotiation, using analytic and efficient strategies. The study proposes three solutions: 1) Strong Action Strategy, 2) International Legal Strategy, and 3) Public Diplomacy Strategy. Conclusions: From the perspective of public diplomacy, the Dokdo issue needs to be converted from a symbol of conflicts between Korea and Japan into a symbol of peace and co-prosperity. In addition to promoting a positive relationship between the two states, it can also contribute to the security environment of the Northeast Asian region and global peace.

A study on Convergence Weapon Systems of Self propelled Mobile Mines and Supercavitating Rocket Torpedoes (자항 기뢰와 초공동 어뢰의 융복합 무기체계 연구)

  • Lee, Eunsu;Shin, Jin
    • Maritime Security
    • /
    • v.7 no.1
    • /
    • pp.31-60
    • /
    • 2023
  • This study proposes a new convergence weapon system that combines the covert placement and detection abilities of a self-propelled mobile mine with the rapid tracking and attack abilities of supercavitating rocket torpedoes. This innovative system has been designed to counter North Korea's new underwater weapon, 'Haeil'. The concept behind this convergence weapon system is to maximize the strengths and minimize the weaknesses of each weapon type. Self-propelled mobile mines, typically placed discreetly on the seabed or in the water, are designed to explode when a vessel or submarine passes near them. They are generally used to defend or control specific areas, like traditional sea mines, and can effectively limit enemy movement and guide them in a desired direction. The advantage that self-propelled mines have over traditional sea mines is their ability to move independently, ensuring the survivability of the platform responsible for placing the sea mines. This allows the mines to be discreetly placed even deeper into enemy lines, significantly reducing the time and cost of mine placement while ensuring the safety of the deployed platforms. However, to cause substantial damage to a target, the mine needs to detonate when the target is very close - typically within a few yards. This makes the timing of the explosion crucial. On the other hand, supercavitating rocket torpedoes are capable of traveling at groundbreaking speeds, many times faster than conventional torpedoes. This rapid movement leaves little room for the target to evade, a significant advantage. However, this comes with notable drawbacks - short range, high noise levels, and guidance issues. The high noise levels and short range is a serious disadvantage that can expose the platform that launched the torpedo. This research proposes the use of a convergence weapon system that leverages the strengths of both weapons while compensating for their weaknesses. This strategy can overcome the limitations of traditional underwater kill-chains, offering swift and precise responses. By adapting the weapon acquisition criteria from the Defense force development Service Order, the effectiveness of the proposed system was independently analyzed and proven in terms of underwater defense sustainability, survivability, and cost-efficiency. Furthermore, the utility of this system was demonstrated through simulated scenarios, revealing its potential to play a critical role in future underwater kill-chain scenarios. However, realizing this system presents significant technical challenges and requires further research.

  • PDF

The Impact of Utilizing Online Outsourcing in Startups on Member Organizational Commitment and Job Satisfaction (스타트업의 온라인 아웃소싱 활용이 구성원 조직몰입과 직무만족에 미치는 영향에 관한 연구)

  • Kim, Joonhak;Park, Jae-Whan
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.19 no.3
    • /
    • pp.139-153
    • /
    • 2024
  • The importance of sustainable growth and cost reduction has increased globally, leading to the expansion of outsourcing by companies. Additionally, the spread of the platform economy has brought changes in the way we work, and the online outsourcing market, where tasks are mediated through platforms, is growing. Academically, while research on general outsourcing is actively conducted, studies on online outsourcing are relatively insufficient compared to its actual utilization. This study aims to analyze the factors and performance factors of online outsourcing utilization by startups, to identify the effects and concerns of using online outsourcing from multiple perspectives, and to suggest the roles of various stakeholders for effective utilization and industry development. For the research, a survey was conducted with 281 employees of startups who have experience in using online outsourcing, and the main findings are as follows. First, the enhancement of efficiency, profitability, and innovation through the use of online outsourcing positively affects organizational commitment and job satisfaction of startup members. Especially, the improvement of efficiency due to the use of online outsourcing has a significant effect on enhancing job satisfaction. Second, concerns about the burden of online outsourcing fees or uncertain outcomes negatively affect organizational commitment and job satisfaction. Third, there are perceptual differences in the motivations and performance regarding the utilization of online outsourcing depending on the job position. Practitioners perceive that the use of online outsourcing increases organizational commitment, whereas managers have relatively higher concerns about the uncertainty of outsourced task outcomes and information security. Through this study, the possibility that human resource shortages and employee management issues in startups can be improved through online outsourcing was confirmed. By verifying the influence of various factors of online outsourcing utilization, this study also provides meaningful implications for establishing business strategies for online outsourcing intermediary platform companies and for formulating startup support policies by government and other startup support organizations.

  • PDF

Application of Deep Learning for Classification of Ancient Korean Roof-end Tile Images (딥러닝을 활용한 고대 수막새 이미지 분류 검토)

  • KIM Younghyun
    • Korean Journal of Heritage: History & Science
    • /
    • v.57 no.3
    • /
    • pp.24-35
    • /
    • 2024
  • Recently, research using deep learning technologies such as artificial intelligence, convolutional neural networks, etc. has been actively conducted in various fields including healthcare, manufacturing, autonomous driving, and security, and is having a significant influence on society. In line with this trend, the present study attempted to apply deep learning to the classification of archaeological artifacts, specifically ancient Korean roof-end tiles. Using 100 images of roof-end tiles from each of the Goguryeo, Baekje, and Silla dynasties, for a total of 300 base images, a dataset was formed and expanded to 1,200 images using data augmentation techniques. After building a model using transfer learning from the pre-trained EfficientNetB0 model and conducting five-fold cross-validation, an average training accuracy of 98.06% and validation accuracy of 97.08% were achieved. Furthermore, when model performance was evaluated with a test dataset of 240 images, it could classify the roof-end tile images from the three dynasties with a minimum accuracy of 91%. In particular, with a learning rate of 0.0001, the model exhibited the highest performance, with accuracy of 92.92%, precision of 92.96%, recall of 92.92%, and F1 score of 92.93%. This optimal result was obtained by preventing overfitting and underfitting issues using various learning rate settings and finding the optimal hyperparameters. The study's findings confirm the potential for applying deep learning technologies to the classification of Korean archaeological materials, which is significant. Additionally, it was confirmed that the existing ImageNet dataset and parameters could be positively applied to the analysis of archaeological data. This approach could lead to the creation of various models for future archaeological database accumulation, the use of artifacts in museums, and classification and organization of artifacts.

The Status of North Korean Airspace after Reunification (북한 공역의 통일 후 지위)

  • Kwon, Chang-Young
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.1
    • /
    • pp.287-325
    • /
    • 2017
  • Considering the development of aerospace, military science and technology since the 20th century, the sky is very important for the nation's existence and prosperity. The proverb "Whosoever commands the space commands the world itself!" emphasizes the need for the command of the air. This essay is the first study on the status of airspace after reunification. First, the territorial airspace is over the territory and territorial sea, and its horizontal extent is determined by the territorial boundary lines. Acceptance of the present order is most reasonable, rather than attempting to reconfigure through historical truths about border issues, and it could be supported by neighboring countries in the reunification period. For peace in Northeast Asia, the reunified Korea needs to respect the existing border agreement between North Korea and China or Russia. However, the North Korean straight baselines established in the East Sea and the Yellow Sea should be discarded because they are not available under United Nations Convention on the Law of the Sea. It is desirable for the reunified Korea to redefine the straight baselines that comply with international law and determine the territorial waters up to and including the 12-nautical mile outside it. Second, the Flight Information Region (hereinafter "FIR") is a region defined by the International Civil Aviation Organization (hereinafter "ICAO") in order to provide information necessary for the safe and efficient flight of aircraft and the search and rescue of aircraft. At present, Korea is divided into Incheon FIR which is under the jurisdiction of South Korea and Pyongyang FIR which is under the jurisdiction of North Korea. If North Korea can not temporarily exercise control of Pyongyang FIR due to a sudden change of circumstances, it is desirable for South Korea to exercise control of Pyongyang FIR, and if it is unavoidable, ICAO should temporarily exercise it. In reunified Korea, it is desirable to abolish Pyongyang FIR and integrate it into Incheon FIR with the approval of ICAO, considering systematic management and control of FIR, establishment of route, and efficiency of management. Third, the Air Defense Identification Zone (hereinafter "ADIZ") is a zone that requires easy identification, positioning, and control of aircraft for national security purposes, and is set up unilaterally by the country concerned. The US unilaterally established the Korea Air Defense Identification Area (KADIZ) by the Declaration of Commitment on March 22, 1951. The Ministry of Defense proclaimed a new KADIZ which extended to the area including IEODO on December 13, 2013. At present, North Korea's military warning zone is set only at maritime boundaries such as the East Sea and the Yellow Sea. But in view of its lack of function as ADIZ in relations with China and Russia, the reunified Korea has no obligation to succeed it. Since the depth of the Korean peninsula is short, it is necessary to set ADIZ boundary on the outskirts of the territorial airspace to achieve the original purpose of ADIZ. Therefore, KADIZ of the reunified Korea should be newly established by the boundary line that coincides with the Incheon FIR of the reunified Korea. However, if there is no buffer zone overlapping with or adjacent to the ADIZs of neighboring countries, military tensions may rise. Therefore, through bilateral negotiations for peace in Northeast Asia, a buffer zone is established between adjacent ADIZs.

  • PDF

Security and Safety Assessment of the Small-scale Offshore CO2 Storage Demonstration Project in the Pohang Basin (포항분지 해상 중소규모 CO2 지중저장 실증연구 안전성 평가)

  • Kwon, Yi Kyun;Chang, Chandong;Shinn, Youngjae
    • The Journal of Engineering Geology
    • /
    • v.28 no.2
    • /
    • pp.217-246
    • /
    • 2018
  • During the selection and characterization of target formations in the Small-scale Offshore $CO_2$ Storage Demonstration Project in the Pohang Basin, we have carefully investigated the possibility of induced earthquakes and leakage of $CO_2$ during the injection, and have designed the storage processes to minimize these effects. However, people in Pohang city have a great concern on $CO_2$-injection-intrigued seismicity, since they have greatly suffered from the 5.4 magnitude earthquake on Nov. 15, 2017. The research team of the project performed an extensive self-investigation on the safety issues, especially on the possible $CO_2$ leakage from the target formation and induced earthquakes. The target formation is 10 km apart from the epicenter of the Pohang earthquake and the depth is also quite shallow, only 750 to 800 m from the sea bottom. The project performed a pilot injection in the target formation from Jan. 12 to Mar. 12, 2017, which implies that there are no direct correlation of the Pohang earthquake on Nov. 15, 2017. In addition, the $CO_2$ injection of the storage project does not fracture rock formations, instead, the supercritical $CO_2$ fluid replaces formation water in the pore space gradually. The self-investigation results show that there is almost no chance for the injection to induce significant earthquakes unless injection lasts for a very long time to build a very high pore pressure, which can be easily monitored. The amount of injected $CO_2$ in the project was around 100 metric-tonne that is irrelevant to the Pohang earthquake. The investigation result on long-term safety also shows that the induced earthquakes or the reactivation of existing faults can be prevented successfully when the injection pressure is controlled not to demage cap-rock formation nor exceed Coulomb stresses of existing faults. The project has been performing extensive studies on critical stress for fracturing neighboring formations, reactivation stress of existing faults, well-completion processes to minimize possible leakage, transport/leakage monitoring of injected $CO_2$, and operation procedures for ensuring the storage safety. These extensive studies showed that there will be little chance in $CO_2$ leakage that affects human life. In conclusion, the Small-scale Offshore $CO_2$ Storage Demonstration Project in the Pohang Basin would not cause any induced earthquakes nor signifiant $CO_2$ leakage that people can sense. The research team will give every effort to secure the safety of the storage site.

A Study on the Establishment of Comparison System between the Statement of Military Reports and Related Laws (군(軍) 보고서 등장 문장과 관련 법령 간 비교 시스템 구축 방안 연구)

  • Jung, Jiin;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.109-125
    • /
    • 2020
  • The Ministry of National Defense is pushing for the Defense Acquisition Program to build strong defense capabilities, and it spends more than 10 trillion won annually on defense improvement. As the Defense Acquisition Program is directly related to the security of the nation as well as the lives and property of the people, it must be carried out very transparently and efficiently by experts. However, the excessive diversification of laws and regulations related to the Defense Acquisition Program has made it challenging for many working-level officials to carry out the Defense Acquisition Program smoothly. It is even known that many people realize that there are related regulations that they were unaware of until they push ahead with their work. In addition, the statutory statements related to the Defense Acquisition Program have the tendency to cause serious issues even if only a single expression is wrong within the sentence. Despite this, efforts to establish a sentence comparison system to correct this issue in real time have been minimal. Therefore, this paper tries to propose a "Comparison System between the Statement of Military Reports and Related Laws" implementation plan that uses the Siamese Network-based artificial neural network, a model in the field of natural language processing (NLP), to observe the similarity between sentences that are likely to appear in the Defense Acquisition Program related documents and those from related statutory provisions to determine and classify the risk of illegality and to make users aware of the consequences. Various artificial neural network models (Bi-LSTM, Self-Attention, D_Bi-LSTM) were studied using 3,442 pairs of "Original Sentence"(described in actual statutes) and "Edited Sentence"(edited sentences derived from "Original Sentence"). Among many Defense Acquisition Program related statutes, DEFENSE ACQUISITION PROGRAM ACT, ENFORCEMENT RULE OF THE DEFENSE ACQUISITION PROGRAM ACT, and ENFORCEMENT DECREE OF THE DEFENSE ACQUISITION PROGRAM ACT were selected. Furthermore, "Original Sentence" has the 83 provisions that actually appear in the Act. "Original Sentence" has the main 83 clauses most accessible to working-level officials in their work. "Edited Sentence" is comprised of 30 to 50 similar sentences that are likely to appear modified in the county report for each clause("Original Sentence"). During the creation of the edited sentences, the original sentences were modified using 12 certain rules, and these sentences were produced in proportion to the number of such rules, as it was the case for the original sentences. After conducting 1 : 1 sentence similarity performance evaluation experiments, it was possible to classify each "Edited Sentence" as legal or illegal with considerable accuracy. In addition, the "Edited Sentence" dataset used to train the neural network models contains a variety of actual statutory statements("Original Sentence"), which are characterized by the 12 rules. On the other hand, the models are not able to effectively classify other sentences, which appear in actual military reports, when only the "Original Sentence" and "Edited Sentence" dataset have been fed to them. The dataset is not ample enough for the model to recognize other incoming new sentences. Hence, the performance of the model was reassessed by writing an additional 120 new sentences that have better resemblance to those in the actual military report and still have association with the original sentences. Thereafter, we were able to check that the models' performances surpassed a certain level even when they were trained merely with "Original Sentence" and "Edited Sentence" data. If sufficient model learning is achieved through the improvement and expansion of the full set of learning data with the addition of the actual report appearance sentences, the models will be able to better classify other sentences coming from military reports as legal or illegal. Based on the experimental results, this study confirms the possibility and value of building "Real-Time Automated Comparison System Between Military Documents and Related Laws". The research conducted in this experiment can verify which specific clause, of several that appear in related law clause is most similar to the sentence that appears in the Defense Acquisition Program-related military reports. This helps determine whether the contents in the military report sentences are at the risk of illegality when they are compared with those in the law clauses.

Legal Issues on the Collection and Utilization of Infectious Disease Data in the Infectious Disease Crisis (감염병 위기 상황에서 감염병 데이터의 수집 및 활용에 관한 법적 쟁점 -미국 감염병 데이터 수집 및 활용 절차를 참조 사례로 하여-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.29-74
    • /
    • 2022
  • As social disasters occur under the Disaster Management Act, which can damage the people's "life, body, and property" due to the rapid spread and spread of unexpected COVID-19 infectious diseases in 2020, information collected through inspection and reporting of infectious disease pathogens (Article 11), epidemiological investigation (Article 18), epidemiological investigation for vaccination (Article 29), artificial technology, and prevention policy Decision), (3) It was used as an important basis for decision-making in the context of an infectious disease crisis, such as promoting vaccination and understanding the current status of damage. In addition, medical policy decisions using infectious disease data contribute to quarantine policy decisions, information provision, drug development, and research technology development, and interest in the legal scope and limitations of using infectious disease data has increased worldwide. The use of infectious disease data can be classified for the purpose of spreading and blocking infectious diseases, prevention, management, and treatment of infectious diseases, and the use of information will be more widely made in the context of an infectious disease crisis. In particular, as the serious stage of the Disaster Management Act continues, the processing of personal identification information and sensitive information becomes an important issue. Information on "medical records, vaccination drugs, vaccination, underlying diseases, health rankings, long-term care recognition grades, pregnancy, etc." needs to be interpreted. In the case of "prevention, management, and treatment of infectious diseases", it is difficult to clearly define the concept of medical practicesThe types of actions are judged based on "legislative purposes, academic principles, expertise, and social norms," but the balance of legal interests should be based on the need for data use in quarantine policies and urgent judgment in public health crises. Specifically, the speed and degree of transmission of infectious diseases in a crisis, whether the purpose can be achieved without processing sensitive information, whether it unfairly violates the interests of third parties or information subjects, and the effectiveness of introducing quarantine policies through processing sensitive information can be used as major evaluation factors. On the other hand, the collection, provision, and use of infectious disease data for research purposes will be used through pseudonym processing under the Personal Information Protection Act, consent under the Bioethics Act and deliberation by the Institutional Bioethics Committee, and data provision deliberation committee. Therefore, the use of research purposes is recognized as long as procedural validity is secured as it is reviewed by the pseudonym processing and data review committee, the consent of the information subject, and the institutional bioethics review committee. However, the burden on research managers should be reduced by clarifying the pseudonymization or anonymization procedures, the introduction or consent procedures of the comprehensive consent system and the opt-out system should be clearly prepared, and the procedure for re-identifying or securing security that may arise from technological development should be clearly defined.