• Title/Summary/Keyword: Tactics

Search Result 376, Processing Time 0.028 seconds

The Role of Cyber in Kim Jong Un's Byungjin Line: North Korea's Political Culture, Hackers, and Maritime Tactics (김정은의 병진노선에서 사이버의 역할: 북한의 정치문화, 해커, 해양전술)

  • Young, Benjamin R.
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.45-72
    • /
    • 2021
  • North Korea's cyber capabilities represent a relatively new threat to global financial institutions and foreign governments, particularly the U.S and South Korean governments. Based primarily on publicly available sources, such as journalistic accounts and scholarly publications, this qualitative paper analyzes the ways in which North Korean leader Kim Jong Un has bolstered his country's asymmetric power and advanced his line of byungjin (dual development in the economy and military). Particularly by merging the cyber and maritime domains, North Korean operatives generate more revenue for the regime and helps keep the heavily sanctioned leadership in power. Despite the increased international attention to North Korean hackers, few analysts have examined the important role of cyber in the DPRK's internal political culture, specifically in advancing Kim Jong Un's byungjin line. Cyber fits into the DPRK's longstanding tradition of irregular warfare and guerilla-based armed struggle. Cyber also further advances Kim's personal reputation in the DPRK as an economic innovator and military strategist. This paper pays particular attention to the role of the DPRK's cyber operations in both ideological and maritime contexts. Recently, North Korean hackers have targeted South Korean shipbuilding industries and developed a blockchain scam, known as Marine Chain. North Korean cyber agents have increasingly paid attention to the nexus of cyber and maritime domains in their activities.

  • PDF

New Roles and Identity of Literary Writers from the Perspective of Cultural Intermediary (문화매개자 개념으로 바라본 문학 작가의 새로운 역할과 정체성)

  • Shim, Bo-Seon
    • Korean Association of Arts Management
    • /
    • no.58
    • /
    • pp.49-88
    • /
    • 2021
  • Contemporary literary writers engage in multiple jobs and activities in the changing industrial and institutional environments to manage careers and produce literary value. The notion of art entrepreneurship envisages writers as the actors pursuing optimal rewards at both literary and economic levels by applying creative knowledge and skills to the management of career. In contrast, the notion of creative labor argues that writers go through career insecurity as they pursue self-fulfillment through work. This paper critically reviews two notions and suggests the notion of cultural intermediaries to better understand their production of literary value within the variety of relational contexts where they are situated. This paper analyzes the structures and characteristics of a wide range of intermediary practices by literary writers. Based on the analysis, I argue that the autonomy of literary value the writers construct and their status of entrepreneur-labourer are contingent upon the relational contexts within which they practice the intermediary work. I also suggest that literary writers by utilizing a variety of tactics cope with the changes that shape the autonomy of literature and invent new roles and identities as cultural intermediaries. Furthermore, literary writers develop not only self-management skills to adapt to the changing environments but also the collective capacity to cope with the constraints derived from the structural change of literary production and circulation. Finally, I argue that the art management discipline can reflect upon and support the creative endeavors of literary writers by embracing the critical understanding of structural changes suggested by the disciplines of humanities and social sciences.

Modeling and Simulation for Effectiveness Analysis of Anti-Ballistic Warfare in Naval Vessels (함정의 대탄도탄전 효과도 분석을 위한 모델링 및 시뮬레이션)

  • Jang Won Bae;GuenHo Lee ;Hyungho Na ;Il-Chul Moon
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.3
    • /
    • pp.55-66
    • /
    • 2023
  • In recent years, naval vessels have been developed to fulfill a variety of missions by being equipped with various cutting-edge equipment and ICT technologies. One of the main missions of Korean naval vessels is anti-ballistic missile warfare to defend key units and areas against the growing threat of ballistic missiles. Because the process of detection and interception is too complex and the cost of failure is much high, a lot of preparation is required to effectively conduct anti-ballistic missile warfare. This paper describes the development of a simulation model of anti-ballistic missile warfare with combat systems and equipment to be installed on future naval vessels. In particular, the DEVS formalism providing a modular and hierarchical modeling manner was applied to the simulation model, which can be utilized to efficiently represent various anti-ballistic missile warfare situations. In the simulation results presented, experiments were conducted to analyze the effectiveness of the model for effective detection resource management in anti-ballistic missile warfare. This study is expected to be utilized as a variety of analysis tools necessary to determine the optimal deployment and configuration of combat resources and operational tactics required for effective anti-ballistic missile warfare of ships in the future.

Physical Model Experiment for Estimating Wave Overtopping on a Vertical Seawall under Regular Wave Conditions for On-Site Measurements (현장 월파계측을 위한 규칙파 조건에서 직립식 호안의 월파량 추정에 관한 모형실험)

  • Dong-Hoon Yoo;Young-Chan Lee;Do-Sam Kim;Kwang-Ho Lee
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.35 no.4
    • /
    • pp.75-83
    • /
    • 2023
  • Apart from implementing hardware solutions like raising the crest freeboard of coastal structures to efficiently counter wave-overtopping, there is a simultaneous requirement for software-driven disaster mitigation strategies. These tactics involve the swift and accurate dissemination of wave-overtopping information to the inland regions of coastal zones, enabling the regulation of evacuation procedures and movement. In this study, a method was proposed to estimate wave-overtopping by utilizing the temporal variation of wave heights exceeding the structure's crown level, with the aim of developing an on-site wave measurement system for providing wave-overtopping information in the field. Laboratory model experiments were conducted on vertical seawall structures to measure wave-overtopping volumes and wave runup heights under different wave conditions and structural freeboard variations. By assuming that the velocity of water inundation on the top of the structure during wave-overtopping events is equivalent to the long-wave velocity, an overtopping discharge coefficient was introduced. This coefficient was utilized to estimate the rate of wave-overtopping based on the temporal changes in wave runup heights measured at the top of the structure. Upon reasonably calculating the overtopping discharge coefficient, it was verified that the estimation of wave-overtopping could be achieved solely based on the wave runup heights.

Crisis in Venezuela, Solitude of Latin America, the Old Future (베네수엘라 위기와 라틴아메리카의 고독 그 오래된 미래)

  • Choi, Myoung-Ho
    • Iberoamérica
    • /
    • v.21 no.2
    • /
    • pp.83-114
    • /
    • 2019
  • Now Venezuela is the most attentional country in Latin America not only in our country but also all world. Unfortunately, the current crisis is a danger that threatening the venezuelan people's right to live, so most of the news is negative. Some analysts in Korea insist that everything is the result of invasion by US imperialism, others say it is a state of default due to excessive populism. The others also described as a power game of the powers of the world by the new Cold War. But most essential thing is that Sovereign of Venezuela, Venezuelan people are marginalized in this process. Venezuela's crisis seems to have been both a combination of internal and external factors, but internal factors been a main cause. The internal factors are the dictatorship and corruption of crony capitalism of nepotism which are considered historical ailments in Latin America. Chávez criticized the oligarchy, but paradoxically, the Chávezian or current ruling forces became another oligarchy. Unfortunately, Western powers such as the United States and the EU and Venezuela's current ruling powers are at an extreme confrontation, so can be seen using cliff-edge tactics. The best solution is the free and peaceful reelection of the president. After the patriarchal winter, which spring will come the Venezuelan people must decide.

Exploring the Humanistic Practice of Je Baek-seok (齊白石(제백석)의 인학(印學)적 실천 탐색)

  • Zhu, Yuanye
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.427-436
    • /
    • 2023
  • Je Baek-seok, who is well versed in poetry, calligraphy, painting, and sculpture, has established himself as the most outstanding painter and pavilion in the history of modern and contemporary Chinese art. During the Ming and Qing Dynasties, the art of the pavilion was developed greatly during the enlightenment period, with the emergence of many masters of the pavilion, including Jeonggyeong, Hwanghwangseokyeo, Oyangji, Jo Ji-gyeom, Hwang Mok-bo, and Oh Chang-seok. Je Baek-seok formed an original ritual under this social background. Je Baek-seok's tactics were formed by imitating works from the Hanwi period, and he harmonized Jin Kwon, Sopan, and Janggunin while using the penmanship of the Cheonbal Shinchambi based on the "Sasam Gongsanbi." In addition, by boldly using the Danipdo method, it is possible to use the human face as much as possible while fully exhibiting the artistry of calligraphy and adding to the atmosphere of gold stone. This paper mainly analyzed and reviewed the process of Je Baek-seok's transcription transformation and humanities practice from two aspects. First, it is planned to summarize the process of Je Baek-seok's transformation into a Jeonseo. Second, Je Baek-seok's humanities practice was analyzed. This paper will further understand Je Baek-seok's humanistic ideas and practical search by clarifying the originality of Je Baek-seok's engraving art with examples of Je Baek-seok's works, and it is believed that this will provide future scholars with learning paths and rich experiences.

A Study on Improving Performance of Software Requirements Classification Models by Handling Imbalanced Data (불균형 데이터 처리를 통한 소프트웨어 요구사항 분류 모델의 성능 개선에 관한 연구)

  • Jong-Woo Choi;Young-Jun Lee;Chae-Gyun Lim;Ho-Jin Choi
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.7
    • /
    • pp.295-302
    • /
    • 2023
  • Software requirements written in natural language may have different meanings from the stakeholders' viewpoint. When designing an architecture based on quality attributes, it is necessary to accurately classify quality attribute requirements because the efficient design is possible only when appropriate architectural tactics for each quality attribute are selected. As a result, although many natural language processing models have been studied for the classification of requirements, which is a high-cost task, few topics improve classification performance with the imbalanced quality attribute datasets. In this study, we first show that the classification model can automatically classify the Korean requirement dataset through experiments. Based on these results, we explain that data augmentation through EDA(Easy Data Augmentation) techniques and undersampling strategies can improve the imbalance of quality attribute datasets, and show that they are effective in classifying requirements. The results improved by 5.24%p on F1-score, indicating that handling imbalanced data helps classify Korean requirements of classification models. Furthermore, detailed experiments of EDA illustrate operations that help improve classification performance.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

Characteristics of Aggressive Victims of Dating Violence and their Commitments in Dating Relationships (데이트 폭력의 공격적 피해여성들의 특성과 연인관계에 대한 개입)

  • Kyung-Hyun Suh ;Gwi-Yeo-Roo Ahn
    • Korean Journal of Culture and Social Issue
    • /
    • v.13 no.2
    • /
    • pp.77-96
    • /
    • 2007
  • The purpose of this study was to investigate characteristics of victims, especially aggressive victims of dating violence, and examine how they constructed the dating relationship and their commitments in dating relationships. The participants were 526 female college students who had the experience of heterosexual dating relationships, whose ages ranged from 18 to 37 (M=20.10, SD=2.70). The psychological tests used in this research included the following: Straus' Conflict Tactics Scale, Foo and Margolin's Justification of Violence Scale, Korean Version of Gender-Role Scale, and Lee and Han's Relationship Measures. Results revealed that aggressive victims of dating violence were more likely to receive mild violence as well as severe violence from their dating partners than victims only, while women who were victim only experienced sexual harassments more than aggressive victims from their dating partners. Aggressive victims of dating violence had experienced fathers' domestic violence more than women who had not experienced dating violence. Victims of dating violence showed less negative attitude toward dating violence than women who had not experienced dating violence. Victims of dating violence showed stronger commitments in their dating relationships than women who had not experienced dating violence. The results of this study may provide valuable information for professionals who help victims of dating violence.

  • PDF

DEVS-Based Simulation Model Development for Composite Warfare Analysis of Naval Warship (함정의 복합전 효과도 분석을 위한 DEVS 기반 시뮬레이션 모델 개발)

  • Mi Jang;Hee-Mun Park;Kyung-Min Seo
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.4
    • /
    • pp.41-58
    • /
    • 2023
  • As naval warfare changes to composite warfare that includes simultaneous engagements against surface, underwater, and air enemies, performance and tactical analysis are required to respond to naval warfare. In particular, for practical analysis of composite warfare, it is necessary to study engagement simulations that can appropriately utilize the limited performance resources of the detection system. This paper proposes a DEVS (Discrete Event Systems Specifications)-based simulation model for composite warfare analysis. The proposed model contains generalized models of combat platforms and armed objects to simulate various complex warfare situations. In addition, we propose a detection performance allocation algorithm that can be applied to a detection system model, considering the characteristics of composite warfare in which missions must be performed using limited detection resources. We experimented with the effectiveness of composite warfare according to the strength of the detection system's resource allocation, the enemy force's size, and the friendly force's departure location. The simulation results showed the effect of the resource allocation function on engagement time and success. Our model will be used as an engineering basis for analyzing the tactics of warships in various complex warfare situations in the future.