• Title/Summary/Keyword: u-Defense

Search Result 346, Processing Time 0.024 seconds

A Study on the Understanding of the Analysis of the Future Operational Environment for Smart Defense Innovation and the Application of the ROK MND (스마트 국방혁신을 위한 미래 작전환경 분석의 이해와 군 적용방안에 대한 고찰)

  • Kim, Se Yong;Kim, Yeek Hyun
    • Journal of Information Technology Services
    • /
    • v.20 no.1
    • /
    • pp.55-65
    • /
    • 2021
  • For smart defense innovation, the key is to apply state-of-the-art technologies of the Fourth Industrial Revolution to national defense. In order to apply state-of-the-art technology to the defense sector, we need to apply and develop technologies to analyze and respond to uncertain future operational environments. To this end, our military is investing a lot of time and effort. To understand future operational environment analysis and to apply and develop our military, we explored the perspectives of operational environment analysis in major countries and studied specific cases of U.S. troops with systematic analysis functions. The U.S. Army has established a cooperative system to analyze future operational environment under the leadership of the Education Command and operates the organization organically. It also utilizes the collective intelligence of expert groups in various fields by utilizing the MSC, and it is time for the Korean military to take the lead in keeping with the era of transformation. To that end, the organization of the U.S. Education Command should be benchmarked and the Korean Future Operation Environment Analysis Organization should be established and operated. Through this study, we have developed an understanding of the future operational environment analysis system of the U.S. Army and presented a plan to apply the ROK MND.

System Safety Application for the Weapon System (무기체계 시스템안전 적용방안)

  • Park, Suncheol;Kim, Jinsung;Jin, Jonghoon;Yoon, Donghwan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.4
    • /
    • pp.106-112
    • /
    • 2021
  • In the early 1960s, US Air Force lost missile launch bases during ICBM development by a defect in the missile design and operation plan. U.S. DoD realized the limitation of the existing accident prevention method. Therefore, the weapon development required system safety activity, and procurement projects of U.S. DoD applied MIL-STD-882(System Safety). Development projects of U.S. DoD more emphasized the importance of system safety after the space shuttle Challenger exploded in 1986. Currently, Airworthiness certification for military aircraft uses system safety to minimize accidents. The domestic defense aviation R&D projects also use the system safety for the airworthiness certification. However, non-aviation weapon R&D projects rarely applied system safety. This paper presents a system safety application method for domestic weapon R&D projects by studying the U.S. military standards/organizations and domestic defense aviation projects.

A Study on the Use of Ubiquitous Technologies in Military Sector

  • Ju Min-Seong;Kim Seok-Soo
    • International Journal of Contents
    • /
    • v.2 no.2
    • /
    • pp.6-9
    • /
    • 2006
  • The style of war in the $21^{st}$ century became digitalized cooperative union tactic, which relies heavily on the system providing real time information. Critical information is provided during the war from sensing to shooting. Therefore, epochal development in observation, reconnaissance (ISR), commanding (C4I) and precision strike (PGM) are necessary. Application of ubiquitous computing and network technologies in national defense is necessary for carrying out with various types of wars in the $21^{st}$ century. Therefore, the author wants to research core technology sector that can be developed and applied in preparation of ubiquitous national defense era. Also plans for applying recent u-Defense technology to the military sector had been suggested. Particularly, the author have suggested plans for utilizing combined future information technologies such as ad-hoc network, RFID for the logistic supply in construction of u-Defense system. By utilizing these information technologies, combat power and strategic capabilities of the military can be enhanced greatly.

  • PDF

A Leverage Strategy of the US-Korea Cost Sharing Program Based on Systems Thinking (시스템 사고를 이용한 주한미군 방위비 분담 정책 레버리지 전략)

  • Lee, Jung-Hwan;Cho, Yong-Gun;Moon, Seong-Am;Seo, Hyeok
    • Korean System Dynamics Review
    • /
    • v.11 no.3
    • /
    • pp.33-59
    • /
    • 2010
  • South Korea has the defense burdensharing agreement with the United States in reference to the U.S. troops stationed in Korea since 1991, based on Special Measure Agreement(SMA). Due to the growth of Korea's economic power and the U.S. provision of the security environment on Korean penninsula, the U.S. government steadily demanded the rise of contributions to common defense from South Korea and South Korea accepted most of the U.S. requests without proper principles of negotiation concerning the cost sharing. This paper analyzes the systems of the Korea-U.S. cost sharing program through a systems thinking, that yields desirable results with a little effort. The three policy leverages are: 1) the development of negotiation principles; 2) the policy making closely linked with National Defense Reform Basic Plan; 3) the policy making with responsibility burdensharing than cost burdensharing. This paper findings will contribute to the developing the Korea-U.S. cost sharing program by providing policy-makers and policy-practitioners with systematic understanding and insight into the dynamics of the program. Also, this will enable the program to execute more effectively with a concrete formula.

  • PDF

The direction of application of the RMF-based risk management system considering interoperability (상호운용성을 고려한 RMF 기반의 위험관리체계 적용 방향)

  • Kwon, Hyuk-Jin;Kim, Sung-Tae;Joo, Ye-na
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.83-89
    • /
    • 2021
  • The RMF (Cyber Security Risk Management Framework) is a more strengthened U.S. defense cybersecurity framework that is currently used throughout the U.S. federal government beyond the defense sector. In the past decade, the proportion of cyber warfare in non-regular warfare encountered by the United States, especially cyberattacks caused by China and North Korea, has been increasing. In the end, the U.S. is newly establishing an RMF system to prepare a more strengthened cybersecurity policy at the pan-government level, and the U.S. Department of Defense aims to expand the U.S. defense RMF evaluation policy beyond the federal government level. The South Korean military has already applied RMF at the request of the U.S. that notified the policy to apply RMF when obtaining F-35A. The application of RMF by the Korean military is no longer inevitable. Now is the time for the Korean military to seriously think about what to prepare for the early establishment of a successful Korean RMF system.

신년사

  • Ryu, Chan-U
    • Defense and Technology
    • /
    • no.1 s.61
    • /
    • pp.5-5
    • /
    • 1984
  • PDF

신년사

  • Yu, Chan-U
    • Defense and Technology
    • /
    • no.1 s.71
    • /
    • pp.5-5
    • /
    • 1985
  • PDF