• Title/Summary/Keyword: Strategic Communications

Search Result 104, Processing Time 0.031 seconds

International cyber security strategy as a tool for comprehensive security assurance of civil aviation security: methodological considerations

  • Grygorov, Oleksandr;Basysta, Albina;Yedeliev, Roman;Paziuk, Andrii;Tropin, Zakhar
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.332-338
    • /
    • 2021
  • Civil aviation cybersecurity challenges are global in nature and must be addressed using global best practices and the combined efforts of all stakeholders. This requires the development of comprehensive international strategies and detailed plans for their implementation, with appropriate resources. It is important to build such strategies on a common methodology that can be applied to civil aviation and other interrelated critical infrastructure sectors. The goal of the study was to determine the methodological basis for developing an international civil aviation cybersecurity strategy, taking into account existing experience in strategic planning at the level of international specialized organizations. The research was conducted using general scientific and theoretical research methods: observation, description, formalization, analysis, synthesis, generalization, explanation As a result of the study, it was established the specifics of the approach to formulating strategic goals in civil aviation cybersecurity programs in the documents of intergovernmental and international non-governmental organizations in the aviation sphere, generally based on a comprehensive vision of cybersecurity management. A comparative analysis of strategic priorities, objectives, and planned activities for their implementation revealed common characteristics based on a single methodological sense of cybersecurity as a symbiosis of five components: human capacity, processes, technologies, communications, and its regulatory support. It was found that additional branching and detailing of priority areas in the strategic documents of international civil aviation organizations (by the example of Cybersecurity Strategy and Cybersecurity Action Plan) does not always contribute to compliance with a unified methodological framework. It is argued that to develop an international civil aviation cybersecurity strategy, it is advisable to use the methodological basis of the Cyber Security Index.

Analysis of Strategic Priorities for Strengthening Cybersecurity Capability of Cambodia (캄보디아의 사이버보안 역량강화를 위한 전략적 우선순위 분석)

  • Heng, Mara;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.93-102
    • /
    • 2019
  • This paper aims to set the priorities for the cybersecurity strategy of Cambodian government. To this end, we built a AHP research model by adopting 4 factors from the ITU national interests model and selecting 7 strategies from best practices of 8 countries leading the cyber security. Using a questionnaire, 19 experts evaluated Cambodia's cybersecurity strategy priorities. The key policy factors were evaluated in the order of homeland defense, economic welfare, value promotion and favorable world order. Their strategic alternatives were identified in the order of legislation, capacity building, and cyber attack prevention for critical infrastructure. This study will contribute to setting the strategic priorities and feasible action plans to strengthen Cambodia's cybersecurity capabilities.

Effect Analysis of MW Transmission System for Strategic Unit Using Adaptive Modulation (적응변조 적용 전략제대 MW전송시스템 효과 분석)

  • Lim, Young-Gab;Youn, Jong-Taek;Choi, Young-Min;Kim, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.412-419
    • /
    • 2020
  • The strategic unit communication infrastructure for military command, communications requires a dualized network structure of various communication methods, considering the direction of development, strategic unit and line characteristic. It has been pointed out that MicroWave, which is typical of wireless systems, is inefficient because it operates only with existing technologies. Therefore, it is necessary to analyze the structure, efficiency of the MW transmission system and its effects. It is difficult to transfer efficiently considering wireless environment due to a fixed type of access structure in the existing MW transmission system. Adaptive modulation allows improvement, but with traditional access structures and fixed bandwidth, there is a limit. Following the transmission performance improvement technique considering availability and link distance in the previous study, this paper presented improved packetized MW transmission system structure and variable bandwidth transmission in consideration of adaptive modulation based variable transmission waveform, bandwidth and distance, and performed the analysis in view of the strategic unit and command control circuit.

Extending Plans of the Role of ROK Navy vis-'a-vis the Expansion of Maritime Security Threats (해양안보위협의 확산에 따른 한국해군의 역할 확대방안)

  • Kil, Byung-ok
    • Strategy21
    • /
    • s.30
    • /
    • pp.63-98
    • /
    • 2012
  • Northeast Asia has a multi-layered security structure within which major economic and military powers both confront one another and cooperate at the same time. Major regional powers maintain mutually cooperative activities in the economic sphere while competing one another in order to secure a dominant position in the politico-military arena. The multifarious threats, posed by the North Korea's nuclear development, territorial disputes, and maritime demarcation line issues demonstrate that Northeast Asia suffers more from military conflicts and strifes than any other region in the world. Specifically, major maritime security threats include North Korea's nuclear proliferation and missile launching problems as well as military provocations nearby the Northern Limit Line(NLL) as witnessed in the Cheonan naval ship and Yeonpyong incidents. The ROK Navy has been supplementing its firm military readiness posture in consideration of North Korea's threats on the NLL. It has performed superb roles in defending the nation and establishing the Navy advanced and best picked. It also has been conducive to defend the nation from external military threats and invasion, secure the sea lanes of communications, and establish regional stability and world peace. In order to effectively cope with the strategic environment and future warfares, the ROK Navy needs to shift its military structure to one that is more information and technology intensive. In addition, it should consolidate the ROK-US alliance and extend military cooperative measures with neighboring countries in the Asia-Pacific region. Evolved steadily for the last 60 years, the ROK-US alliance format has contributed to peace and security on the Korean peninsula and in the Northeast Asian region. In conclusion, this manuscript contends that the ROK Navy should strive for the establishment of the following: (1) Construction of Jeju Naval Base; (2) Strategic Navy Equipped with War Deterrence Capabilities; (3) Korean-type of System of Systems; (4) Structure, Budget and Human Resources of the Naval Forces Similar to the Advanced Countries; and (5) Strategic Maritime Alliance and Alignment System as well as Domestic Governance Network for the Naval Families.

  • PDF

Anti-crisis Communications in Legal Discourse in Terms of Ensuring Information Security

  • Gorai, Oleg;Ohar, Emiliya;Snitsarchuk, Lidiya;Polulyah, Ruslan;Druzhynin, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.103-108
    • /
    • 2022
  • Mass media in the digital age are not only one of the most important elements of the information society but also a strategic resource for its development. Effectively implemented communication makes it possible to build connections not only between individuals, but also between social institutions and representatives of various generational groups of the mass audience, as well as ensure information security in a crisis period. At the same time, in the context of a constantly increasing amount of information flows, more and more often "a person loses the ability to independently think, analyze, and critically perceive information." At the same time, "imposing" on the representatives of this or that society, through the content of multi-format mass media or active authors of social networks, a certain point of view on the problem becomes a completely realizable task. Thus, the main task of the study is to analyze the anti-crisis communications in legal discourse in terms of ensuring information security. As a result of the study, current trends and prerequisites of anti-crisis communications in legal discourse in terms of ensuring information security were revealed.

KT의 부산 U-City 및 인천 IFEZ U-City 구축 사례분석

  • 한현배;전인성
    • Information and Communications Magazine
    • /
    • v.22 no.7
    • /
    • pp.49-66
    • /
    • 2005
  • KT는 2004년 7월 정보화신도시추진단을 발족, 2005년 1월 U-City추진단으로 그 사업 범위를 확대하면서 인천 경제자유구역의 U-City사업, 부산 U-City USP(U-City Strategic Planning)프로젝트, 화성 동탄 디지털시티 구축 및 흥덕, 대전, 광교, 광주, 울산, 제주 등 전국의 지자체를 대상으로 U-City 구축사업을 추진하고 있다. 본 고에서는 이중 대표적인 사례인 인천경제자유구역의 U-City사업과, 부산 U-City 프로젝트의 추진현황 및 사례를 살펴보고 그 의의를 짚어보고자 한다.

A New Venture Performance Model in the Korean Information and Telecommunications Industry

  • Park, Myeong-Cheol;Lee, Sang-Woo
    • ETRI Journal
    • /
    • v.22 no.4
    • /
    • pp.51-65
    • /
    • 2000
  • In this paper, we investigate on the determinants of new venture performance empirically and suggest a new venture performance model in the Korean Information and Telecommunications (IT) industry. A total of seven hypotheses is established and tested using a combination of factor analysis, cluster analysis, analysis of variance, and correlation analysis. Ninety-two sample ventures in the Korean IT industry were investigated and analyzed to test hypotheses. We found that new ventures performance depends on their environment, strategy, internal resources factors, and, most importantly, two-way and three-way interactions of these factors. These findings could be interpreted as supporting the general strategy theory that when environment and internal resources and fitted, performance might be maximized and, further, strategy is the means that make internal resources and environment fit. The venture performance model presented in this paper can explain how new ventures achieve their successes. The strategic implications to the venture firms are also discussed.

  • PDF

A Review for the Successful Implementation Factors of Performance Management Systems

  • Chung, Yang-Hon;Youn, Su-Jin
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.807-813
    • /
    • 2007
  • Although firms are adopting strategic performance management systems (PMS) that provide information that allows the firms to identify the strategies offering the highest potential for achieving the firms' objectives, many firms still suffer from making the implementation of PMS a success. The purpose of this paper is to identify those factors that influence the successful implementation of performance management systems. This paper performs a comprehensive literature scrutiny on the implementation factors of PMS including the Balanced Scorecard, Performance Prism, Intellectual Capital Navigation, and Activity-based Costing, as well as traditional performance management systems. The findings of this research will provide useful insights into the anatomy of the success factors for implementing performance management systems and will help management to all the different sized organizations in the different sectors and industries. This paper also provides some future directions for research.

  • PDF

Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications

  • Kim, Sungwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4177-4190
    • /
    • 2015
  • Current research on Internet of Things (IoT) has primarily addressed the means to enhancing smart resource allocation, automatic network operation, and secure service provisioning. In particular, providing satisfactory security service in IoT systems is indispensable to its mission critical applications. However, limited resources prevent full security coverage at all times. Therefore, these limited resources must be deployed intelligently by considering differences in priorities of targets that require security coverage. In this study, we have developed a new application of Cognitive Radio (CR) technology for IoT systems and provide an appropriate security solution that will enable IoT to be more affordable and applicable than it is currently. To resolve the security-related resource allocation problem, game theory is a suitable and effective tool. Based on the Blotto game model, we propose a new strategic power allocation scheme to ensure secure CR communications. A simulation shows that our proposed scheme can effectively respond to current system conditions and perform more effectively than other existing schemes in dynamically changeable IoT environments.

The Economic Value of Next-Generation Converged Communications and Broadcasting Services

  • Kang, Shin-Won;Cho, Sang-Sup;Lie, Han-Young
    • ETRI Journal
    • /
    • v.27 no.6
    • /
    • pp.759-767
    • /
    • 2005
  • This research is to substantially analyze the economic value of portable Internet (WiBro), WCDMA High Speed Downlink Packet Access (HSDPA), WiBro+VoIP, and WiBro+DMB regarded as the next generation of broadcasting. Based on the empirical analysis of economic values, we provide the optimal paths of converged communications and broadcasting services related to WiBro. 1,000 Internet users in the Seoul and Gyeonggi areas were surveyed in their homes. The collected survey was calculated as an accurate economic value distribution for relevant services, and the average and mean were taken using a parametric logit model, semi-parametric Spike model, and nonparametric Turnbull and Kernel estimations in order to analyze the contingent economic value of the amount offered to the subjects of the analysis. The contingent value analysis results varied slightly according to the different methodologies; however, all showed the following common features. The economic value of WiBro, Internet-based WCDMA, VoIP, and DMB with WiBro appeared to be similar. Therefore, if WiBro and WCDMA (HSDPA) form a competitive relationship, the types of bundled services offered as portable Internet service and the supply point of such bundled services are expected to emerge in a strategic plan for stimulating service markets and the prior occupation of the market.