• Title/Summary/Keyword: military policy

Search Result 571, Processing Time 0.022 seconds

Determinants of Wage for Web-based Platform Workers: In perspective of evaluation by previous employers (웹 기반형(Web-based) 플랫폼 노동자의 임금 결정요인: 이전 고용주에 의한 평가의 관점에서)

  • Lim, Jisun
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.1-14
    • /
    • 2022
  • The purpose of this study was to find the wage determinants of web-based platform workers. For this purpose, a total of 3,575 web-based platform workers' information from Freelancer.com, a global platform labor market, in September 2018 were used and whether or not newly available indicators such as evaluations by previous employers had a significant effect on the wage increase of platform workers using OLS and QR methods. As an OLS estimation results, the number of reviews, as well as education and experience, affects the wages of platform workers. However, as a result of the QR estimation, experience rather than education, recommendation rather than a review has a more significant effect on the wage of web-based platform workers as the wage level rises.

A Study on Korea's Countermeasures Through the Analysis of Cyberattack Cases in the Russia-Ukraine War (러시아-우크라이나 전쟁에서의 사이버공격 사례 분석을 통한 한국의 대응 방안에 관한 연구)

  • Lee, Hyungdong;Yoon, Joonhee;Lee, Doeggyu;Shin, Yongtae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.353-362
    • /
    • 2022
  • The Russian-Ukraine war is accompanied by a military armed conflict and cyberattacks are in progress. As Russia designated Korea as an unfriendly country, there is an urgent need to prepare countermeasures as the risk of cyberattacks on Korea has also increased. Accordingly, impact of 19 cyberattack cases were analyzed by their type, and characteristics and implications were derived by examining them from five perspectives, including resource mobilization and technological progress. Through this, a total of seven measures were suggested as countermeasures for the Korean government, including strengthening multilateral cooperation with value-sharing countries, securing cyberattack capabilities and strengthening defense systems, and preparing plans to connect with foreign security companies. The results of this study can be used to establish the Korean government's cybersecurity policy.

International Legal Measures of Protection of Critical Infrastructure Facilities in Banking Sphere

  • Oleg, Batiuk;Oleg, Novikov;Oleksandr, Komisarov;Natalia, Benkovska;Nina, Anishchuk
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.145-154
    • /
    • 2022
  • Based on the obtained results of the study, the most problematic issues and legal conflicts are identified, which are related to the ratio of norms of domestic and foreign legislation, taking into account the requirements of the Constitution of Ukraine and the provisions of the Law of Ukraine "On international agreements". Along with this, it is stated in this scientific article that there are a number of provisions and examples of positive practice on the specified topic abroad and in international legal acts today, which should be used by Ukraine both in improving legislation on the issues of banking activity and in increasing the level of criminal legal protection of relevant critical infrastructure facilities, especially those that are substantively related to prevention and counteraction of activity, with regard to the legalization (laundering) of criminally obtained funds, financing of terrorism and the financing of the proliferation of weapons of mass destruction, which is quite relevant for our state, given the military conflict that is taking place on its territory in the Donbass. Again, in the same context, the need for more active cooperation between Ukraine and the FATF (international body developing a policy to combat money laundering) has been proven.

Reinforcement Learning-based Dynamic Weapon Assignment to Multi-Caliber Long-Range Artillery Attacks (다종 장사정포 공격에 대한 강화학습 기반의 동적 무기할당)

  • Hyeonho Kim;Jung Hun Kim;Joohoe Kong;Ji Hoon Kyung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.45 no.4
    • /
    • pp.42-52
    • /
    • 2022
  • North Korea continues to upgrade and display its long-range rocket launchers to emphasize its military strength. Recently Republic of Korea kicked off the development of anti-artillery interception system similar to Israel's "Iron Dome", designed to protect against North Korea's arsenal of long-range rockets. The system may not work smoothly without the function assigning interceptors to incoming various-caliber artillery rockets. We view the assignment task as a dynamic weapon target assignment (DWTA) problem. DWTA is a multistage decision process in which decision in a stage affects decision processes and its results in the subsequent stages. We represent the DWTA problem as a Markov decision process (MDP). Distance from Seoul to North Korea's multiple rocket launchers positioned near the border, limits the processing time of the model solver within only a few second. It is impossible to compute the exact optimal solution within the allowed time interval due to the curse of dimensionality inherently in MDP model of practical DWTA problem. We apply two reinforcement-based algorithms to get the approximate solution of the MDP model within the time limit. To check the quality of the approximate solution, we adopt Shoot-Shoot-Look(SSL) policy as a baseline. Simulation results showed that both algorithms provide better solution than the solution from the baseline strategy.

Development of Simulation Architecture Framework for Simulation Based Acquisition (모의기반획득을 위한 시뮬레이션 아키텍처 프레임워크 개발)

  • Cho, Kyu-Tae;Shim, Jun-Yong;Lee, Yong-Heon;Lee, Seung-Young;Kim, Sae-Hwan
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.3
    • /
    • pp.81-89
    • /
    • 2010
  • Recent modeling and simulation technology is being used in various fields. Especially in the field of military, Simulation-Based Acquisition (SBA) is recognized as a essential policy. To effectively carry out SBA, modeling and simulation techniques should be applied in the whole life-cycle for the weapon system development, and simulation architecture framework which provides easily reusable and interoperability is needed. Through reusability and interoperability, the costs of constructing the integrated collaborate environment for simulation based acquisition can be minimized. In this study, we define requirements, issues for enhancing reusability and interoperability, and propose simulation framework as a solution of the problem including structural design. Proposing simulation framework provides common functions for producing simulator as reusable units and easily changeable structure on user's purpose. In addition, we provide the result for applying simulation framework to our project.

Comparative Study of US-China Discourse on Cross-border Data Regulation and Cybersecurity: Focusing on ASEAN Development Assistance Cases (미·중 초국경 데이터 규제와 사이버안보 담론 비교: 아세안 개발원조 사례를 중심으로)

  • Kayeon Lee
    • Informatization Policy
    • /
    • v.30 no.1
    • /
    • pp.89-108
    • /
    • 2023
  • Science, technology and innovation (STI) has expanded the activity of actors from the traditional physical territory to the cyberspace. Data-driven platform services and markets advance new discussions on cross-border cooperation and cyber security, as well as discourse on sovereignty in cyberspace. These changes are also affecting the hegemony competition between the US and China. In particular, competition for aid to developing countries that are located along major resource transportation routes, such as natural gas and deep sea resources, is fierce. ASEAN is not only a geopolitical military and security point where the US and China powers collide, but its population of 600 million has great potential for the development of the digital economy due to its data resources. In this regard, this article aims to connect the discourse of liberalism and authoritarianism with data regulation and cybersecurity in international development cooperation, and derive implications for ASEAN integration through this. This study has significance as a convergence study that links international political issues related to big data in terms of global governance.

A Study on the Necessity of Psychological First Aid for Firefighters (소방공무원의 심리적 응급처치 필요성에 관한 연구)

  • Ju-Hyun Kim;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.385-390
    • /
    • 2023
  • The purpose of this study is to study the need for psychological first aid for stress of fire officials. a 1:1 in-depth interview with 10 paramedics to solve the research problem. Through interviews, the policy on the need for psychological first aid to improve the mental health of firefighters was proposed as follows by analyzing the working environment of paramedics, post-traumatic stress experience, and psychological first aid experience. First, fire officials need to be assigned to the site to educate in advance about post-traumatic stress and the resulting physical symptoms before being exposed to traumatic events. Second, fire officials should provide psychological first aid at an appropriate time after exposure to trauma cases. Third, it is necessary to supplement the manpower and institutional devices that will specialize in mental health work. Fourth, for customized professional medical services and psychological support suitable for fire officials, it is necessary to link fire-fighting complex healing centers and national firefighting hospitals.

A study on security requirements for Telecommuting in defense industry (방산업체 비대면(재택) 근무를 위한 보안 요구사항 연구)

  • Hwang Gue Sub;Yeon Seung Ryu
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.209-221
    • /
    • 2023
  • Due to the rapid spread of the COVID-19 virus in December 2019, the working environment was rapidly converted to telecommuting. However, since the defense industry is an organization that handles technology related to the military, the network separation policy is applied, so there are many restrictions on the application of telecommuting. Telecommuting is a global change and an urgent task considering the rapidly changing environment in the future. Currently, in order for defense companies to implement telecommuting, VPN, VDI, and network interlocking systems must be applied as essential elements. Eventually, some contact points will inevitably occur, which will increase security vulnerabilities, and strong security management is important. Therefore, in this paper, attack types are selected and threats are analyzed based on the attack tactics of the MITER ATT&CK Framework, which is periodically announced by MITER in the US to systematically detect and respond to cyber attacks. Then, by applying STRIDE threat modeling, security threats are classified and specific security requirements are presented.

The U.S. Government's Book Translation Program in Korea in the 1950s (1950년대 한국에서의 미국 도서번역 사업의 전개와 의미)

  • Cha, Jae Young
    • Korean journal of communication and information
    • /
    • v.78
    • /
    • pp.206-242
    • /
    • 2016
  • This study dealt with the U.S. government's book translation project as a part of its public diplomacy to gain the Korean people's 'minds and thoughts' in the midst of cultural Cold War from the end of World War II to the late 1950s. It was found that the U.S. book translation project was begun during the U.S. military occupation of South Korea, though with minimum efforts, and reached its peak in the late 1950s, In general, the purposes of the U.S. book translation project in South Korea was as follows: to emphasize the supremacy of American political and economic systems; to criticize the irrationality of communism and conflicts in the communist societies; to increase the Korean people's understanding of the U.S. foreign policies; to publicize the achievement of the U.S. people in the areas of arts, literature, and sciences. In the selection of books for translation, any ones were excluded which might contradict to U.S. foreign policy or impair U.S. images abroad. It must be noted that publications of a few Korean writers' books were supported by the project, if they were thought to be in service for its purposes. Even some Japanese books, which were produced by the U.S. book translation project in Japan, were utilized for the best effects of the project in South Korea. It may be conceded that the U.S. book translation project contributed a little bit to the compensation for the dearth of knowledge and information in South Korea at that time. However, the project may have distorted the Korean people's perspectives toward the U.S. and world, owing to the book selection in accordance with the U.S. government's policy guidance.

  • PDF

A Study on 2010 Beijing Convention for Antiterrorism of International Aviation - Compared Beijing Convention(2010) with Montreal Protocol - (국제항공테러방지 북경협약(2010)에 관한 연구 - 몬트리올협약과의 비교를 중심으로 -)

  • Hwang, Ho-Won
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.25 no.2
    • /
    • pp.79-112
    • /
    • 2010
  • The Beijing Convention of 2010 taken together effectively establishes a new broader and stronger civil aviation security framework. This adoption would significantly advance cooperation in prevent of the full range of unlawful acting relation to civil aviation and the prosecution and punishment of offenders. First, the Beijing Convention of 2010 will require parties to criminalize a number of new and emerging threats to the safety of civil aviation, including using aircraft as a weapon and organizing, directing and financing acts of terrorism. These new treaties reflect the international community's shared effort to prevent acts of terrorism against civil aviation and to prosecute and punish those who would commit them. Second, this convention will also require States to criminalize the transport of biological, chemical, nuclear weapons and related material. These provisions reflect the nexus between non-proliferation and terrorism and ensure that the international community will act to combat both. Third, this Convention shall not apply to aircraft used in military, customs or police services. As a substitute, International Humanitarian Law will be applied in a case. Moreover, the National Jurisdiction and the application of the law will be extended farther. The treaty promotes cooperation between States while emphasizing the human rights and fair treatment of terrorist suspects.

  • PDF