• Title/Summary/Keyword: a regional security

Search Result 334, Processing Time 0.025 seconds

Extending Plans of the Role of ROK Navy vis-'a-vis the Expansion of Maritime Security Threats (해양안보위협의 확산에 따른 한국해군의 역할 확대방안)

  • Kil, Byung-ok
    • Strategy21
    • /
    • s.30
    • /
    • pp.63-98
    • /
    • 2012
  • Northeast Asia has a multi-layered security structure within which major economic and military powers both confront one another and cooperate at the same time. Major regional powers maintain mutually cooperative activities in the economic sphere while competing one another in order to secure a dominant position in the politico-military arena. The multifarious threats, posed by the North Korea's nuclear development, territorial disputes, and maritime demarcation line issues demonstrate that Northeast Asia suffers more from military conflicts and strifes than any other region in the world. Specifically, major maritime security threats include North Korea's nuclear proliferation and missile launching problems as well as military provocations nearby the Northern Limit Line(NLL) as witnessed in the Cheonan naval ship and Yeonpyong incidents. The ROK Navy has been supplementing its firm military readiness posture in consideration of North Korea's threats on the NLL. It has performed superb roles in defending the nation and establishing the Navy advanced and best picked. It also has been conducive to defend the nation from external military threats and invasion, secure the sea lanes of communications, and establish regional stability and world peace. In order to effectively cope with the strategic environment and future warfares, the ROK Navy needs to shift its military structure to one that is more information and technology intensive. In addition, it should consolidate the ROK-US alliance and extend military cooperative measures with neighboring countries in the Asia-Pacific region. Evolved steadily for the last 60 years, the ROK-US alliance format has contributed to peace and security on the Korean peninsula and in the Northeast Asian region. In conclusion, this manuscript contends that the ROK Navy should strive for the establishment of the following: (1) Construction of Jeju Naval Base; (2) Strategic Navy Equipped with War Deterrence Capabilities; (3) Korean-type of System of Systems; (4) Structure, Budget and Human Resources of the Naval Forces Similar to the Advanced Countries; and (5) Strategic Maritime Alliance and Alignment System as well as Domestic Governance Network for the Naval Families.

  • PDF

The Emerging security initiatives and forecasting future social and natural environment changes (신흥안보 창발과 미래 사회 및 자연환경 변화예측)

  • Jung, Min-Sub;NamKung, Seung-Pil;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.327-331
    • /
    • 2020
  • In that this study is a subject and character of risk, emerging security covers non-military areas in addition to traditional military security: environmental security, human security, resource security, and cyber security. The rise of these risks is not only changing the phenomenon of the new expansion of security areas, but also the expansion of the number and scope of security entities and the aspect of security world politics. These risks are transnational security issues at the global level in terms of their nature and extent of the damage, as well as multi-layered ones that affect local and personal security issues at the regional and national levels. In addition to national actors, non-state actors such as international organizations, multinational corporations, and global civil society, and furthermore, technology and social systems themselves are causing risks. Therefore, to solve the new security problem, it is necessary to establish a middle-level and complex governance mechanism that is sought at the regional and global levels beyond the fragmented dimension of the occurrence of new security issues that have been overlooked in the existing frame of perception, and to predict and find ways to respond to new security paradigms that have been identified in a broader sense.

A Study on the Characteristic Analysis of Housing Complex planning by Regional Characteristic (지역성을 고려한 주거단지계획의 특성분석을 위한 사래연구 -대구광역시 'U 대회 선수촌 단지'를 중심으로 -)

  • Seo Ji-Eun;Park Eui-Jeong
    • Journal of the Korean housing association
    • /
    • v.17 no.3
    • /
    • pp.31-40
    • /
    • 2006
  • The purpose of this study is to grasp the present state of a outdoor space planning and to analysis plan characteristics in based on regional characteristics in Housing complex plan. The analysis result of this study is as follows : first, we know that the right of regional characteristics is appearing variously every research workers. also an analysis about regional characteristics that should be considered in housing complex plan was insufficient. Second, regional characteristics can be classified into 5 factors. These are classified as a context of location, city link, life atmosphere, needs of locals and creation of image. Third, it has originality against other housing complex to graft items connected with 'U contest' on outdoor space planning. Also, it has affirmatively effected on image of Buk-gu and recognition of Dong beyn-dong and Seo beyn-dong. It is get out of the uniform design by a planning based on land and surrounding environment in arrangement and forms. Also residents have the satisfaction and pride in arrangement considering the climate of a region and security of the green space.

Information Systems in Project Management of The Public Sphere

  • Mamatova, Tetiana;Chykarenko, Iryna;Chykarenko, Oleksii;Kravtsova, Тetiana;Kravtsov, Olеg
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.141-148
    • /
    • 2021
  • Project management is a current trend of management in the public sphere, based on different principles, methods and tools. The tools include information technologies providing control over time, cost, quality and planning process in order to ensure accountability to interested parties. The goal of the research was to examine the impact of the integration of information systems in project management of the public sphere on the quality of public governance and administration using the example of infrastructure projects involving the private sector in developing countries. The methodology of the research is based on the concepts of "digital-era governance" (DEG), "Information governance" and "project governance" to determine the effectiveness of information systems and technologies in the management of infrastructure projects in the public sphere. The data from the countries with Lower middle income (India, Indonesia, Philippines, Ukraine, Vietnam) and Upper middle income (Argentina, Brazil, China, Colombia, Mexico, Peru, Romania, Russian Federation, Thailand, Turkey) for 1996-2020 were used to study the effects of DEG. The results show two main trends in the countries with Lower middle income and Upper middle income. The first trend is the development of digital governance, the concept of "digital-era governance" through information systems and performance measurement of the governance system, forecasting of investment flows of infrastructure projects, measurement of payback and effectiveness parameters for investment management in the public sector, decision support. The second trend is the existence of systemic challenges related to corruption, social and institutional factors through the development of democracy in developing countries and the integration of NPM similar to developed countries. The confidence of interested parties, especially private investors, in public authorities is determined by other factors - the level of return on investment, risks and assignment of responsibility, probability of successful completion of the project. These data still remain limited for a wide range of project participants, including citizens.

A Study on Cause of Regional Conflict (지역분쟁의 원인 연구)

  • Kim, Sung-Woo
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.157-162
    • /
    • 2019
  • The nature of war includes the concept of war and the purpose of the war, as well as its nature, attributes and personality. The war that started with the history of mankind has started to achieve various purposes. There were also wars that took place to get territory or slaves and resources. There was a war to spread ideology and religion. The cause of war has diversified due to the purpose of various wars. In this study, we analyzed the causes of regional conflicts that have occurred on the earth since World War II. The regional and structural explanations reported in most papers attempting to define the causes of small regional conflicts and new forms of war in each region are not entirely credible. It is clear that the Cold War has intensified civil war. Most of the causes of these wars should be considered to be within the country.

An Implementation of Security Constrained Distributed Optimal Power Flow and Application to Korea Power System (상정사고 제약조건을 고려한 분산 최적조류계산 알고리즘의 구현 및 북상조류 문제에의 적용)

  • Kim, Jin-Ho;Hur, Don;Park, Jong-Keun;Kim, Balho-H.;Park, Jong-Bae
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.49 no.6
    • /
    • pp.298-304
    • /
    • 2000
  • In this paper, we propose that the SCOPF be solved in a decentralized framework, consisting of regions, using a price-based mechanism. We first solve the distributed OPF problem to determine the maximum secure simultaneous transfer capability of each tie-line between adjacent regions by taking only the security constraints imposed on the tie-lines into account. And then, the regional SCOPF is performed using the conventional LP approach. A description on the inclusion of security constraints with distributed OPF algorithm will be given, folowed by a case study for Korea power system.

  • PDF

Designing Mutual Cooperation Security Model for IP Spoofing Attacks about Medical Cluster Basis Big Data Environment (의료클러스터 기반의 빅 데이터 환경에 대한 IP Spoofing 공격 발생시 상호협력 보안 모델 설계)

  • An, Chang Ho;Baek, Hyun Chul;Seo, Yeong Geon;Jeong, Won Chang;Park, Jae Heung
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.21-29
    • /
    • 2016
  • Our society is currently exposed to environment of various information that is exchanged real time through networks. Especially regarding medical policy, the government rushes to practice remote medical treatment to improve the quality of medical services for citizens. The remote medical practice requires establishment of medical information based on big data for customized treatment regardless of where patients are. This study suggests establishment of regional medical cluster along with defense and protection cooperation models that in case service availability is harmed, and attacks occur, the attacks can be detected, and proper measures can be taken. For this, the study suggested forming networks with nationwide local government hospitals as regional virtual medical cluster bases by the same medical information system. The study also designed a mutual cooperation security model that can real time cope with IP Spoofing attack that can occur in the medical cluster and DDoS attacks accordingly, so that the limit that sole system and sole security policy have can be overcome.

A Study on the Distributed Security-Constrained Optimal Power Flow (상정사고를 고려한 분산처리 최적조류계산에 관한 연구)

  • Hur, Don;Kim, Jin-Ho;Park, Jong-Keun;Kim, Bal-Ho H.;Park, Jong-Bae
    • Proceedings of the KIEE Conference
    • /
    • 2000.07a
    • /
    • pp.279-281
    • /
    • 2000
  • In this paper, we propose that the security-constrined optimal power flow (SCOPF) be solved in a decentralized framework, consisting of regions, using a price-based mechanism. We first solve the distributed OPF problem to determine the maximum secure simultaneous transfer capability of each tie-line between adjacent regions by taking only the security constraints imposed on the tie-lines into account. And then, the regional SCOPF is performed using the conventional LP approach. A description on the inclusion of security constraints with distributed OPF algorithm will be given, followed by a case study for Korea power system.

  • PDF

Modern Technologies for Ensuring Economic Security in the Context of Achieving High Efficiency of Public Administration

  • Kryshtanovych, Myroslav;Akimova, Liudmyla;Gavkalova, Nataliia;Akimov, Oleksandr;Shulga, Anastasia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.362-368
    • /
    • 2022
  • The main purpose of the article is to study the key aspects of the use of modern technologies to ensure economic security in the context of achieving high efficiency of public administration.The economic security of the country is a multi-level system, the structure of which is determined by the peculiarities of the structure and key development priorities both in the regional aspect and nationally. The fundamental role of economic security is realized through a set of goals and objectives that are achieved in the process of ensuring it, among the main ones is the effective, dynamic and progressive development of the economy, which is impossible without the development of innovations. The essence of ensuring economic security from the standpoint of innovative development lies in the development of innovations that can increase the level of competitiveness of the state-level economic system, which necessitated an analysis of the conditions and dynamics of innovation development. As a result of the study, the basic aspects of the implementation of modern technologies were analyzed in the context of achieving high efficiency in public administration.