RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
          펼치기
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        기업 보안 유형에 따른 보안사고 대응역량 : 사회기술시스템 이론 관점에서

        이정환(Jeonghwan Lee),정병호(Byungho Jung),김병초(Byungcho Kim) 한국IT서비스학회 2013 한국IT서비스학회지 Vol.12 No.1

        This study proceeded to examine the cause of the continuous secret information leakage in the firms. The purpose of this study is to find out what type of security among administrative, technological and physical security would have important influence on firm's security performance such as the security-incident response competence. We established the model that can empirically verify correlation between those three types of security and the security-incident response competence. In addition, We conducted another study to look at relation between developing department of security in the firms and reaction ability at the accidents. According to the study, the administrative security is more important about dealing with the security-incident response competence than the rest. Furthermore. a group with department of security has better the security-incident response competence and shows higher competence in fixing or rebui lding the damage. Therefore. this study demonstrates that investing in administrative security will be effective for the firm security.

      • Analysis on the Bidding System of the Private SECURITY Business through Improvement in Republic of KOREA

        Jeong Su-hong J-INSTITUTE 2017 Protection Convergence Vol.2 No.1

        The national police service in Korea became incapable to satisfy demand for crime prevention and security as the Korean society has become urbanized. Despite the expansion of role and function of police, the shortage in absolute number of policeman and budget, outdated police equipments, excessive over-working time and work load, as a limiting factors, prevent police service from effective crime prevention. These inability of police service, a parent body of national security, to satisfy the expectation of citizens in qualitative and quantitative aspects, led to the increase in importance of private security industry. Especially, the realization that the public agency is no more a mechanism to protect private possessions and social activities due to problems such as absence of institutional safety device and accordingly, the increase of perception that My Safety by Myself are contributing the creation of demands for private security. Most of private security companies, however, are struggling only for survival and profit instead of attempts to develop professional competence. In addition, the qualitative im-balance in security service due to the over-competition (lowest bid agreement, dumping agreement), absence of overall review for staff-related problems from supervision and coach to recruitment identity guarantee, and ben-efits due to lack of legal support, image depletion for private security companies because of various illegal acts, are all contributing to barrier to development of private safety industry and these factors may explain the quali-tative stationary state despite the quantitative expansion of this field. The purpose of this study was to provide fundamental data to develop directions to address bid-related prob-lems of private security fields such as bidding corruption, acquire fairness, transparency, and equality in order to propose an improvement measures ensuring qualitative efficiency by analyzing the current status of bidding sys-tem of domestic private security industry. The institutions that benefit whole stakeholders including users, companies, and security staffs, based on ad-ministrative transparency and fairness, need to be in place through improvement in bidding system in order to use effective private security service. The monogamous dominance of big private security company, in accord-ance with Security Industry Act may force small-medium companies that inferior in funds and man-power to be in poor performance, therefore, a measure should be sought to ensure both each specialization and whole growth of private security industry. For the qualitative development underpinning the quantitative growth of domestic private security industry, the bidding systems, based on improvement measures to mandate users to apply right-ful bidding system and ensure administrative transparency and equitable opportunity, need to be in place. In other words, the bidding system in private sector may have advantages of simplicity in administration and saving of expense in short-term, however may cause qualitative problems such as over-competition, lowest price bidding, lowest wage in long-term in private security industry, therefore the improvement of bidding system is essential to promise development of domestic private security industry.

      • Security technologies based on a home gateway for making smart homes secure

        Kim, Geon Woo,Lee, Deok Gyu,Han, Jong Wook,Lee, Seung Hyun,Kim, Sang Wook Emerald Group Publishing Limited 2009 INTERNET RESEARCH Vol.19 No.2

        <B>Purpose</B> - The purpose of this paper is to identify security technologies that are essential in making home network systems secure and to describe specialized security mechanisms for the home network and the relationships among them. <B>Design/methodology/approach</B> - The research model is designed to support three functions: authentication, authorization, and security policy. Authentication is tested in several methodologies such as id/pw, certificate, or bio; authorization is tested using RBAC methodologies; and security policy is specified using newly-designed script language, such as xHDL. <B>Findings</B> - The findings for "authentication" suggest that home network users can access services conveniently and securely. In addition, the findings for "security policy" suggest that security policy for home network requires specialized rather than general specification. <B>Practical implications</B> - The paper identifies three security functions essential for home network: authentication that supports most existing authentication mechanisms, so as to maximize user accessibility; authorization that is middleware-independent and beyond the physical transport layer; and security policy optimized for the home network environment. <B>Originality/value</B> - The paper focuses on an implementation-based security model for the home network. Though interest and research in home network security are increasing, only limited authentication applications have been adopted in real deployment up to now. This paper introduces an integrated security model and emphasizes safety and convenience so as to promote reliability in home network services.

      • A Study on SECURITY of Rational Human

        Park Su-hyeon J-INSTITUTE 2016 Protection Convergence Vol.1 No.2

        No other riddles make human beings as curious as human beings themselves. Among the riddles, security is taken as top priority. Security is directly associated with death which human beings fear the most and further-more represents the underlying principle behind the thoughts and ideas of human beings. Security is analogous to a double-edged sword that makes human lives more convenient and prosperous and at the same time im-perils human. Thus, it is of great importance to look into relationship between human beings and security based on questions with respect to human beings and security. However, human beings are not fully aware of security and have misconception towards security. The research issues in this study are related to the question, “Are human beings secure? In fact, we may al-ready know the answer to that question posed in this study. However, we can increase understanding of the relationship between human and security by ceaselessly asking the question “Are human beings secure?” and answering that question which needs to be resolved necessarily albeit difficult for human living in complicated world. The purpose of this study was to answer the question “Are human beings secure? while presenting new perspectives by making new assertions other than those made by scholars with regard to relationship between human and security. To answer the question, “Are human beings secure?, we should be aware of human, security, and risk. Hu-man beings tend to take secure course and avert risk or instability based on rational thinking driven by the de-sire for security. That represents rationality of human. Security generally refers to the situation or state free of concern about potential risks or accidents, and can be classified into real security and sensible security. Risks which encroach upon security tend to be universal, unpredictable, and infinite. Risk can be classified into three different categories, such as latent stage, perceptive stage, and behavioral stage, from the standpoint of epis-temology. First, the insecurity of human stems from the fact that every day’s life is biologically a step closer to death, the risk feared the most by human Second, human would be confronted with unlimited risk if all kinds of risks facing human can be quantified. The finite nature of time, money, and ability that can be leveraged to preclude such risks leads to presence of residual risks. As a result, the biological factor and presence of residual risks make human overshadowed by the feeling of insecurity. However, human pursues security all the time, driven by the desire for safety and rationality, although secu-rity is a tantalizing but remote possibility for human. It is an endless loop. This loop cannot be broken, unless the history of human ends. However, this researcher hopes that the results of this study would provide a useful basis for increasing understanding of human and security and subsequently delving into the long and endless exploration of human security which began in early part of human history.

      • KCI등재

        경호산업 전문인력 양성을 위한 대학 내 경호보안 전공계열 교육과정 개선 방안

        신미애,박영만 한국민간경비학회 2023 한국민간경비학회보 Vol.22 No.4

        The purpose of this study is a plan to improve the curriculum for security majors in universities to train security industry professionals, and the research method to achieve the research purpose was set as a systematic literature review. The identified problems consisted of three issues: first, deepening of the centralization of educational subjects, second, the curriculum not reflecting social changes and trends, and third, the inconsistency between the goals of the curriculum and industrial demands. The improvement measures for this were first, it was proposed to increase the proportion of public security subjects, second, to establish 4th Industrial Revolution technology convergence subject, and third, to establish a new subject that reflects the demands of the security industry. The meaning of the improvement plan presented above is that the curriculum of majors and departments related to security and security ultimately has a mutual influence with science of security and the security industry. In other words, as the decline of the curriculum can be seen as a decline of the science of security and the security industry, it can be seen that this suggests that intensive changes and efforts must be made in the current security and security-related majors and departments.

      • KCI우수등재

        미국 연방도산법상 장래채권 양도담보의 효력 - 미국 연방도산법 제552조 제(b)항의 해석론과 그 시사점 -

        최준규 한국민사법학회 2020 民事法學 Vol.90 No.-

        이 글에서 필자는 미국연방도산법상 장래채권 양도담보의 효력에 관하여 그간충분히 의식되어 오지 못한 내용을 소개하고, 이로부터 비교법적 시사점을 도출하고자 하였다. 미국법에 따르면 계약체결 후 그 계약으로부터 장차 발생하는 권리는 해당 계약의 수익(proceeds)이다. 여기서 계약은 기초자산, 그 계약으로부터 장차 발생하는권리는 기초자산으로부터 발생하는 현금흐름이라고 할 수 있다. 따라서 도산절차개시 전에 계약에 대하여 담보권을 취득한 자는 도산절차 개시 후 그 계약에 따라발생하는 채권에 대하여 담보권의 효력을 주장할 수 있다. 다만 ① 채무자가 자신의 노력과 시간을 투입하거나, 도산재단으로부터 비용을투입하여 해당 채권을 발생시킨 경우, ② 해당 채권이 채무자의 회생을 위해 필요한 경우에는, 법원이 형평을 고려하여 장래채권에 대한 담보권의 효력을 감축시킬수 있다. 그런데 이 과정에서 ① 장래채권에 대한 담보권의 효력을 아예 부정할 것인지, ② 장래채권의 가치 중 채무자가 기여한 ‘비율’만큼 담보권의 범위를 감축시킬 것인지, ③ 장래채권의 가치 중 채무자가 기여한 ‘액수’만큼을 담보권의 범위에서 공제할 것인지 불명확하다. 위와 같은 미국법의 태도는 우리법 해석론과 입법론에 관하여 다음과 같은 시사점을 준다. 첫째, 최근 우리법 해석론으로 “장래채권을 발생시키는 양도인의 계약상 지위가채무자의 재산으로부터 도산재단으로 이전된 것으로 볼 수 있는 경우에는 관리인하에서 그 계약이 이행되어 채권이 발생하는 때에도 그 채권에 대한 양도인의 사전처분은 효력이 있는 것이므로 그 채권은 양도담보목적물에 포함된다”는 견해가 주장되고 있다. 그런데 이러한 견해에 따르면 장래채권 발생에 채무자의 노력과 시간, 도산재단이 기여한 경우에도 그 대가를 특정 담보권자만 누리는 부당한 결과가 발생한다. 도산재단의 기여로 발생한 장래채권의 가치는 원칙적으로 도산재단에 귀속되어야 한다. 둘째, 도산재단의 기여로 발생한 장래채권의 가치는 도산재단에 귀속되어야 한다는 명제는 – 미국의 사례에서 확인되는 것처럼 - 그 적용과정에서 필연적으로 불명확성을 수반한다. 이러한 불명확성으로 인해 장래채권에 대한 담보거래가 ‘과도하게’ 위축될 수 있다. 이를 막기 위해서는 도산절차 개시 후 발생한 장래채권에 대하여 담보권 등의 효력이 미치는 요건을 미리 명확히 정해 둔 안전항(safe-harbor) 규정을 마련할 필요가 있다. 가령 ① 채무자의 영업재산 일체에 대하여 담보권을설정할 수 있도록 하고, 이러한 담보권자는 도산절차 개시 후 채무자의 장래의 매출채권에 대해서도 – 채무자의 시간, 노력, 도산재단 투입여부와 상관없이 - 원칙적으로 담보권의 효력을 주장할 수 있게 하는 입법을 고민할 필요가 있다. 또한 ② 양도인이 일정 규모 이상의 법인인 경우, 또는 양수인이 법이 정한 금융기관인 경우에 한정하여 장래채권 진정양도의 도산절차상 효력을 인정하는 입법을 고민할 필요가 있다. In this article, the author tried to analyze the section 552(postpetition effect of security interest) of the US Bankruptcy Code which has not received enough attention in korean comparative legal studies, and draw out implications for Korean law. Under the UCC system, the future rights arising from a contract can be the proceeds of current contract rights. The contract is the basic asset, and the future rights from the contract are the future income streams from the basic asset. Therefore according to the §552(b)(1) of the US Bankruptcy Code, the security rights in the contract which was concluded before the commencement of insolvency proceeding extend to the postpetition receivables from such contract. But under the §552(b)(1) of the US Bankruptcy Code, the court can cut off the security rights in the proceeds(=future receivables), when ① the debtor’s spending time, making efforts or the expenses from the bankruptcy estate contribute to increase the value of the proceeds or ② future receivables are necessary for the debtor’s rehabilitation. As to court’s cut-off, there exists flexibility or uncertainty.; ① The court may cut off all future receivables. On the other hand, ② the court can only reduce the security rights in the future receivables by the rate of the debtor’s or the bankruptcy estate’s contributions. ③ The court can also recognize the effect of the security rights in the future receivables up to the value of the total future receivables minus the amount of the debtor’s or the bankruptcy estate’s contributions. US Bankruptcy law’s basic position discussed above gives us the following implications regarding the interpretation of Korean law and Korean legislation. ① de lege lata : Recently, the following assertion is being made on the issue, the effect of security assignment of future claims in insolvency proceeding. “When the assignor’s contractual position that gives rise to future receivables was also transferred from the assignor's(=debtor’s) property to the bankruptcy estate, the future receivables that arose according to the trustees’s determination to assume such executory contract fall within the security interests.” But the author can not agree to this opinion, because according to this opinion the secured creditor can get the windfall gain at the expense of the bankruptcy estate, the time and efforts of the debtor. The bankruptcy estate should be used for all non-secured creditors, not for specific secured creditor. ② de lege ferenda : As we have already seen in the US cases, the proposition that the proceeds of the bankruptcy estate should be attributed to the bankruptcy estate may inevitably cause uncertainty in the application of such proposition. Whether to cut off the security interests, how much to reduce the security interests is entirely up to the discretion of the court. Such uncertainty may cause excessive chilling effect on the side of secured creditors. The bank may tend to undervalue unduly the future receivables, and may not make any loans secured by future receivables in fear of uncertainty. To prevent such negative effect, it is desirable to make a safe-harbor rule. (ⅰ) First, the author proposed the security-right system like that, the secured creditor can catch the debtor’s all operating assets under the one security right, and the debtor’s future account receivables arising after the commencement of the insolvency proceeding also fall within such security right in principle, irrespective of the debtor’s or the bankruptcy estate’s contribution to the value of future account receivables. (ⅱ) Second, the author proposed the legislation, that in case of true sale (not security assignment) of future receivables allows explicitly the effect of true sale of future claims in insolvency proceeding, if certain additional conditions are met (ex. the debtor is a corporation over certain size, or the assignee is the authorized financial...

      • 소프트웨어 보안산업밸리 조성 타당성 분석

        성영조,박병식 경기연구원 2010 위탁연구 Vol.2010 No.1

        우리나라 반도체ㆍ이동통신ㆍ자동차ㆍ조선ㆍ철강 등 주력산업의 첨단기술이 기술경쟁국의 표적이 됨에 따라 최근 첨단산업기술의 유출사고가 급증하고 있다. 정부는 「산업기술 유출방지 및 보호에 관한 법률」을 제정ㆍ시행하고, 제도적 보안장치를 마련하여 첨단산업기술 유출 예방에 주력하고 있다. 정부(지식경제부)는 보안산업 세계시장 규모가 1,800억 달러('07)에서 3,680억 달러('13)로 크게 성장할 것으로 전망하고 “Securing Knowledge Korea 2013”장 동력 산업 육성 전략(2008.12.15) 발표를 통하여 보안산업의 국제경쟁력 강화, 보안산업 기술보호 설비 구축, 보안산업기술개발 지원, 보안산업 전문인력 양성 등 추진 방안을 구체화하였다. 특히 경기도는 'u경기 비전'을 선포하고 기업하기 좋은 환경, 안전하고 편리한 생활공간을 만드는 것을 목표로 2010년까지 55개의 벤처집적단지 조성, 100억원 매출기업 1000개 육성계획을 추진하여 왔고, 권역별 특화산업 혁신거점을 구축하고 있다. 경기도가 『한국보안산업의 중심 메카』 역할을 수행할 수 있도록 판교-광교-흥덕을 잇는 수도권 남부 산업단지와 경기대-아주대-수원대-성균관대를 거점으로 한 산ㆍ학ㆍ연ㆍ관 협력 보안산업밸리 조성의 타당성을 조사하였다. 타당성조사를 위해 보안산업밸리의 중심적 역할을 수행할 집적센터의 위치를 광교, 판교, 동탄의 세 개 지역을 대상으로 종합적 입지선정기준을 가지고서 조사한 결과 광교 3.85, 판교 3.57, 동탄 3.025 순위로 나타난다. 보안산업집적센터의 구체적인 입지장소를 선정하기 위해 광교의 4개 지역과 판교의 2개 지역을 선정하여 분석한 결과 가장 적합한 입지는 광교테크노밸리 내 커뮤니티부지와 광교 첨단 R&D단지 내 장기바이오생산시설예정지인 것으로 분석되었다. 보안산업집적센터의 건립시 보안업체들의 입주수요를 조사한 결과 서울지역 대상업체들의 20%, 경기지역 대상업체들의 38.1%가 입주할 의사를 표명하여 서울과 경기지역에서 총 85개 업체가 입주할 것으로 조사되었다. 실제입주수요를 보수적으로 가정하여 35%로 잡을 때 실제 입주할 업체는 최소한 30개 업체로 파악되었다. 30개 업체를 수용할 수 있는 시설규모를 추정할 때 건축연면적 6,612㎡ (2000평)이 소요되며 광교지역의 건폐율 60%, 용적률 200%을 기준으로 할 때 확보할 부지는 3,306㎡(약 1000평)이다. 이 시설규모를 바탕으로 보안산업집적센터의 건립타당성을 분석한 결과 B/C Ratio가 1.2이상으로 타당성이 있는 것으로 나타났다. 경기도는 보안산업집적센터를 중심으로 경기대 산업보안특화센터, 성균관대 인터넷보안연구실, 아주대 차세대보안센터, 수원대 u-시티 보안관리 연구센터 등과 산학연기반을 구축하고, 차세대융합기술연구원, 나노소자특화팹센터, 경기바이오센터, 경기중소기업지원센터 등의 과학기술기반 혁신클러스터와 연계시켜 보안산업벨리를 조성해 나갈 수 있다. 이를 통해 기존의 첨단기술 제조업에 대한 물리/정보보안을 제고할 수 있을 뿐만 아니라, 더 나아가고부가가치의 융합보안으로 경쟁력을 강화시켜 나갈 수 있을 것이다. Korea's high-technologies become the target from techcompetitors of main industries in the field of semiconductor, mobile telecommunication, car, ship-building and the steel industry, etc. The government provides an institutional strategy on preventing the leaking accident of high-tech industry. Recently, the government put into enacting a law of Protection and Prevention for Industry Technology and is concentrating its energy on preventing the leaking accident of high-tech industry. The government (Ministry of Knowledge Economy) announced the promotional strategy of "Securing Knowledge Korea 2013" for preparing that global market size of security industry will increase from 180,000 million dollar in 2007 to 368,000 million dollar in 2013. On the report, the government built up the practical plan for a enforcement of international competitiveness, establishment for equipment of technology protection, R&D supporting, fostering of professional human power in Security Industry in detail. Meanwhile, Gyeonggi province made a plan to create specialized industry complexes in region and establish a number of 1000 companies. On the basis of this plan, Gyeonggi Province declares "u-Gyeonggi Vision" which makes in good entrepreneur environments and wholesome life space through achievement of the target. This research surveys the possibility of "Security Industry Valley (SIV)" in Gyeonggi province and analyzes the feasibility for constructing "Security Industry Complex (SIC)" in southern metropolitan area so as to take a role of the Mecca in Korean Security Industry. The results of SIC location analysis show that the best area of SIC is Kwangkyo town according to the score of specialist survey that Kwangkyo is 3.85, Pankyo is 3.57, Dongtan is 3.025, and that the best location of SIC is the Community Area or the alternative area of Bio-production in Kwangkyo Technology Valley. The demand survey of security firms shows that the 20% of security firms in Seoul Metropolitan area and the 38.1% of security firms in Gyeonggi province have an opinion to move into the SIC. But this research hypothesizes that about 30 security firms move be moved into SIC as conservative as possible. For holding the 30 security firms, the building size of SIC should be at least 6,612㎡, and its land size should be at least 3,306㎡. For analyzing the feasibility of SIC construction, this research analyzes the effect of the benefit of leakage prevention, the increase of local property tax, the money of allowance for repairs and maintenance, the construction cost, and land cost, etc, Analyzing the cost and benefit effects of SIC construction, this research finds that the B/C ratio of SIC construction is over 1.2 ratio. This research finds that the SIC construction project is desirable. For building SIV, Gyeonggi Province has to connect SIC with 'Industrial Security Center' in Gyeonggi University, 'Internet Security R&D Room' in SKK University, 'Advanced Security Center' in A-Ju University and 'U-City Security Management Research Center' in Suwon University for cooperating between security research centers and security firms. Also Gyeonggi province has to make that the innovation cluster on science technology such as Korea advanced Nano Fab Center, Gyeonggi Small and Medium Business Center, Gyeonggi Bio Center, and Advanced Institute of Convergence Technology can support the firms in the SIC. Gyeonggi province can strengthen the competitiveness of SIC and pass down the existing high-technology in 'physics/information security' field to 'convergence security' manufacturers.

      • KCI등재후보

        정보시스템 감리에서의 정보보호 감리모형 설계

        이지용,김동수,김희완 (사)디지털산업정보학회 2010 디지털산업정보학회논문지 Vol.6 No.2

        This paper proposes security architecture, security audit framework, and audit check item. These are based on the security requirement that has been researched in the information system audit. The proposed information security architecture is built in a way that it could defend a cyber attack. According to its life cycle, it considers a security service and security control that is required by the information system. It is mapped in a way that it can control the security technology and security environment. As a result,an audit framework of the information system is presented based on the security requirement and security architecture. The standard checkpoints of security audit are of the highest level. It was applied to the system introduction for the next generation of D stock and D life insurance company. Also, it was applied to the human resources information system of K institution and was verified. Before applying to institutions,system developers and administrators were educated about their awareness about security so that they can follow guidelines of a developer security. As a result, the systemic security problems were decreased by more than eighty percent.

      • KCI등재

        脫냉전 이후 비국가행위자의 안보위협과 국가정보 활동방향

        함중영 한국국가정보학회 2022 국가정보연구 Vol.15 No.1

        Factors that threaten national security have been constantly changed. The structure of the East-West Cold War has been broken down as a turning point in 1991, and the changes were clearly shown before and after the year of 1991, in terms of security threats and counter activities. When considering the timing, before the post-Cold War period is classified as traditional security, and after that is classified as non-traditional security. As a new security concept that emerges after the post-Cold War, "human security" introduced by the UNDP in 1994 was appeared, and the concept of "comprehensive security" was introduced by European scholars in 1998. Meanwhile, some scholars in Korea also use the concept of 'new security' mainly studying specific factors of non-traditional security concepts, which is not the same as the concept of ‘emerging security’. Threats dealt with in traditional security were war and physical conflicts between countries. Security threats in the non-traditional security period are the intersection of threats identified in the new security dimension and threats listed in the human security dimension, such as poverty, famine, infectious diseases, environmental problems, violence and crime. On the other hand, while the traditional security actor is a state-actor, the activities of non-state actors have emerged as a huge security threat since the introduction of the non-traditional security concept, as seen in the September 11 attacks in 2001. Among the threats derived from the intersection of new security and human security threats, the main threats posed by non-state actors appear as terrorism, transnational organized crime, terrorist-TOC combined groups, cyber attacks, and abuse of new technologies. Korea's national intelligence agencies have made efforts to appropriately respond to the security threats of non-state actors listed above while responding to changes in the international environment. In particular, it is encouraging to expand national espionage activities, enact anti-terrorism laws for efficient counter-terrorism activities, and international cooperation activities to respond to cyberattacks. However, non-systematic expansion and ambiguity of national counterintelligence activities, errors in anti-terrorism laws, and lack of a security response system for new technologies are pointed out as problems to be improved quickly. 국가안보를 위협하는 요인은 지속적으로 변화해왔으며, 동서 냉전의 구도가 와해되는 1991년을 분깃점으로 삼아, 전후로 구분하여 안보위협 환경 변화와 대응활동의 커다란 차이를 나누어 볼 수 있다. 시기적으로 고찰해 볼 때, 탈냉전 시기 이전을 전통적 안보, 이후를 비전통적 안보라고 구분한다. 이어 탈냉전 이후 출현하는 새로운 안보 개념으로, 1994년 UNDP에서 소개한 ‘인간안보’가 소개되었고, 1998년 유럽 학자들을 중심으로 ‘포괄적 안보’ 개념이 소개되면서 작금 국제관계학의 주류 용어로 자리잡고 있다. 한편, 국내 일부 학자들은 비전통적 안보개념의 구체적 요인들을 대상으로 연구하면서 ‘신안보’라는 개념도 활용하는데, 신흥안보 또는 Emerging Security 등 다양하게 소개되는 새로운 안보개념과의 비교 구분도 요구된다. 전통적 안보에서 다루어진 위협요인은 국가 간 전쟁과 갈등관계였다. 비전통적 안보 시기의 안보위협은 신안보 차원에서 파악한 위협의 요인과 인간안보 차원에서 열거된 위협들의 교집합이라고 할 수 있는데, 현재와 미래에서 다루어져야 할 위협으로서, 빈곤, 기근, 감염병, 환경문제, 폭력과 범죄 등이다. 한편, 전통적 안보의 행위자(actor)는 국가인데 비해, 2001년 9.11 테러에서 보듯이 비전통적 안보개념이 도입되는 시점부터 비국가행위자의 활동이 엄청난 안보위협으로 대두되고 있다. 신안보위협과 인간안보 위협들의 교집합에서 도출한 위협요인 중 비국가행위자에 의해 자행되는 대표적 위협은 테러리즘, 초국가적조직범죄, 테러조직과 조직범죄집단의 연계활동, 사이버공격, 신기술의 악용 등으로 나타난다. 우리나라 국가정보기관은 국제환경의 변화에 대응하면서 위에서 열거한 비국가행위자의 안보 위협요인에 적절히 대처하는 노력을 전개해왔다. 특히, 국가방첩활동의 확대와 효율적인 대테러 활동을 위한 테러방지법 제정, 사이버공격에 대응하기 위한 국제협력 활동 등이 고무적이다. 그러나, 국가방첩활동의 비체계적 확장과 모호성, 테러방지법의 오류, 신기술에 대한 안보 대응체계 미흡 등은 신속히 개선되어야 할 문제점으로 지적된다.

      • 중국의 국가 안보전략 평가 및 대(對) 한반도 영향

        조현규 ( Cho Hyeon-gyu ) 한국군사학회 2021 군사논단 Vol.107 No.-

        During the Cold War, Mao Zedong and Deng Xiaoping slicked to their traditional security concept, but with the emergence of various security elements during the post-Cold War, China has actively formed national security strategy by reflecting these changes. After the end of the Cold War, new forms of security agendas such as economic development, social governance and network information have emerged, and countries around the world have begun to value non-traditional security agendas in addition to traditional ones. China has also adjusted its traditional security-oriented national security concept and shifted to a new one that values both traditional and non-traditional security. Since the founding of China, Mao Zedong’s security concept has been ‘the war is inevitable’ theory(戰爭不可避論), and after the ‘reform and opening-up’(改革開放) in 1978, Deng Xiaoping pursued ‘the war may avoid, theory(戰爭可避論) and "hide capacities and bide time’(韜光養晦) strategies in March 1997, In 1995, Jiang Zemin emphasized comprehensive security by raising The new security concept, (新女全觀), and, Hu Jintao raised a ‘Harmonious world’ theory(和諧世界論) based on The new security concept’ in September 2005, and began to pay attention to non-traditional security, especially international terrorism and domestic security. In the Xi Jinping era, ‘A holistic approach to national security’(總體國家安全觀) focused on ‘joint security, comprehensive security, cooperative security, and sustainable security’ emerged. Starting with Xi jinping’s ‘A holistic approach to national security’, the scope of China’s national security has been expanded, its concepts have been systematized, and its internal security has become equally valued as foreign security. China’s ‘A holistic national security strategy’ is based on a strong nation and a strong army, so its presence will act as a potential threat to the Korean Peninsula, causing a ‘change of security balance’. The existence of China as a strong neighboring country, can increase the possibility of friction due to potential conflict between Korea and China.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼