It was observed from the Korean War ceasefire talks, China-Soviet border disputes, India-China border disputes, Hong Kong return negotiations, and South China Sea conflicts that China adopted distributed negotiation strategy. Furthermore, the purpose of this paper is to derive an effective approach by identifying the types of military negotiation strategies used by China in conflicts with neighboring countries. Such research can contribute to the expansion of research topics on security-political-military relations owing to recent changes in the regional security environment (North Korea, the United States, Japan, and China) surrounding the Republic of Korea. Through the literature of various case studies, it was observed that China’s negotiation strategy differed depending on the attitude or response demonstrated by the target country. Thus, it could be confirmed that China's hostile negotiations alter and reach an agreement if the negotiator acquires military victories, exercises tough measures that threaten the negotiations themselves, or exerts diplomatic all-out pressure. This cannot be achieved by military methods alone. For instance, in the case of the South China Sea dispute, strong diplomatic pressure transformed China's negotiation strategy into an integrated negotiation strategy.
{"title":"The characteristics of China’s military negotiation strategy","authors":"Y. Kang","doi":"10.37944/jams.v5i1.127","DOIUrl":"https://doi.org/10.37944/jams.v5i1.127","url":null,"abstract":"It was observed from the Korean War ceasefire talks, China-Soviet border disputes, India-China border disputes, Hong Kong return negotiations, and South China Sea conflicts that China adopted distributed negotiation strategy. Furthermore, the purpose of this paper is to derive an effective approach by identifying the types of military negotiation strategies used by China in conflicts with neighboring countries. Such research can contribute to the expansion of research topics on security-political-military relations owing to recent changes in the regional security environment (North Korea, the United States, Japan, and China) surrounding the Republic of Korea. Through the literature of various case studies, it was observed that China’s negotiation strategy differed depending on the attitude or response demonstrated by the target country. Thus, it could be confirmed that China's hostile negotiations alter and reach an agreement if the negotiator acquires military victories, exercises tough measures that threaten the negotiations themselves, or exerts diplomatic all-out pressure. This cannot be achieved by military methods alone. For instance, in the case of the South China Sea dispute, strong diplomatic pressure transformed China's negotiation strategy into an integrated negotiation strategy.","PeriodicalId":355992,"journal":{"name":"Journal of Advances in Military Studies","volume":"1182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kayode Sunday John Dada, J. Akila, U. Suleiman, Abdulrahman Akinbinu
Armed forces across the globe have been continuously modernizing through the deployment of hi-tech computers and nanotechnologies to perfect information acquisition and analysis and data transmission during missions and operations to make them more powerful and enhance their competitive advantage. This study presents an overview of the opportunities provided by twenty-first century military technologies and their advantages, specifically in terms of system integration, communications, and capability to shape modern warfare. The study concludes by recommending the importance of the Ministry of Defense through the provision of adequate funds and budgetary allocations for research, development, and procurement of high-tech equipment like TALOS, FIST, FELIN, IDZ-ZES, RATNIK-3 smart suits for tactical operations to support soldiers for an effective discharge of assigned combat missions during insurgencies and battlefield reconnaissance and domination.
{"title":"Adoption and deployment of 21st century technologies in armed forces operations","authors":"Kayode Sunday John Dada, J. Akila, U. Suleiman, Abdulrahman Akinbinu","doi":"10.37944/jams.v5i1.135","DOIUrl":"https://doi.org/10.37944/jams.v5i1.135","url":null,"abstract":"Armed forces across the globe have been continuously modernizing through the deployment of hi-tech computers and nanotechnologies to perfect information acquisition and analysis and data transmission during missions and operations to make them more powerful and enhance their competitive advantage. This study presents an overview of the opportunities provided by twenty-first century military technologies and their advantages, specifically in terms of system integration, communications, and capability to shape modern warfare. The study concludes by recommending the importance of the Ministry of Defense through the provision of adequate funds and budgetary allocations for research, development, and procurement of high-tech equipment like TALOS, FIST, FELIN, IDZ-ZES, RATNIK-3 smart suits for tactical operations to support soldiers for an effective discharge of assigned combat missions during insurgencies and battlefield reconnaissance and domination.","PeriodicalId":355992,"journal":{"name":"Journal of Advances in Military Studies","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126966490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The importance of reserve forces is increasing owing to changes in the security environment, such as the promotion of Defense Reform 2.0 and a sharp decrease in military service resources. Under these changes, we focus on combining EEG (ElectroEncephaloGraphy) with Brain-Computer Interface (BCI) for improving combat power and contributing to the future development of defense science and technology in 2050. In the study of EEG measurement technology, the alpha wave of calmness and beta wave representing the improvement of the concentration on individualized shooting skills, were measured with high accuracy in the theta wave-related research, and the value of their use was recognized. Using in the combat situations of personal firearms shooting, it can be applied in a small budget and a short period of time. Through our findings, when shooting the K-1 and K-2 rifles (the basic personal weapons in Korean military), it can contribute to improving the accuracy of existing individual’s shooting by increasing both concentration and calmness between breathing and firing control. Hence, our study show in the future warfare, the new direction of current defense science and technology and new concept of personal weapon usages in artificial intelligence based on hyper-intelligence, hyper-connectivity, and human-unmanned combat systems.
{"title":"Military application study of BCI technology using brain waves in Republic of Korea Army","authors":"Janggil Oh, Jongheon Kim","doi":"10.37944/jams.v5i1.115","DOIUrl":"https://doi.org/10.37944/jams.v5i1.115","url":null,"abstract":"The importance of reserve forces is increasing owing to changes in the security environment, such as the promotion of Defense Reform 2.0 and a sharp decrease in military service resources. Under these changes, we focus on combining EEG (ElectroEncephaloGraphy) with Brain-Computer Interface (BCI) for improving combat power and contributing to the future development of defense science and technology in 2050. In the study of EEG measurement technology, the alpha wave of calmness and beta wave representing the improvement of the concentration on individualized shooting skills, were measured with high accuracy in the theta wave-related research, and the value of their use was recognized. Using in the combat situations of personal firearms shooting, it can be applied in a small budget and a short period of time. Through our findings, when shooting the K-1 and K-2 rifles (the basic personal weapons in Korean military), it can contribute to improving the accuracy of existing individual’s shooting by increasing both concentration and calmness between breathing and firing control. Hence, our study show in the future warfare, the new direction of current defense science and technology and new concept of personal weapon usages in artificial intelligence based on hyper-intelligence, hyper-connectivity, and human-unmanned combat systems.","PeriodicalId":355992,"journal":{"name":"Journal of Advances in Military Studies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128823882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of this study is to analyze the factors that influence the information security compliance intention of Korean military officers. For this purpose, a research model was constructed focusing on information security compliance attitude and perceived control, which are the main variables of the theory of planned behavior. In addition, security sensitivity, organization trust, information security work impediment, and sanction, were selected as independent variables. The research model was analyzed through a survey targeting Korean army officers, and the results are as follows. First, security sensitivity, organization trust, and sanctions had a significant effect on information security compliance attitude. However, the effect of information security work impediment had not been identified. Second, it was analyzed that security sensitivity and organization trust had a positive effect on perceived information security compliance control, but the effect of information security work impediment and sanction had not been verified. Third, it was confirmed that the information security compliance attitude and perceived control affect the information security compliance intention, which reconfirmed the results of previous studies. This study is meaningful in that it can improve the information security level of the military organization by suggesting a way to manage these factors.
{"title":"Factors affecting information security compliance intention of military officer","authors":"Sangyoung Kim, Taebok Lee","doi":"10.37944/jams.v5i1.138","DOIUrl":"https://doi.org/10.37944/jams.v5i1.138","url":null,"abstract":"The purpose of this study is to analyze the factors that influence the information security compliance intention of Korean military officers. For this purpose, a research model was constructed focusing on information security compliance attitude and perceived control, which are the main variables of the theory of planned behavior. In addition, security sensitivity, organization trust, information security work impediment, and sanction, were selected as independent variables. The research model was analyzed through a survey targeting Korean army officers, and the results are as follows. First, security sensitivity, organization trust, and sanctions had a significant effect on information security compliance attitude. However, the effect of information security work impediment had not been identified. Second, it was analyzed that security sensitivity and organization trust had a positive effect on perceived information security compliance control, but the effect of information security work impediment and sanction had not been verified. Third, it was confirmed that the information security compliance attitude and perceived control affect the information security compliance intention, which reconfirmed the results of previous studies. This study is meaningful in that it can improve the information security level of the military organization by suggesting a way to manage these factors.","PeriodicalId":355992,"journal":{"name":"Journal of Advances in Military Studies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132991067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The importance of reserve forces is increasing owing to changes in the security environment, such as the promotion of Defense Reform 2.0 and a sharp decrease in military service resources, however, questions are raised as to whether the current system of reserve forces management civilian military employees has appropriate efficiency. As a result of the study, a plan to improve its efficiency was suggested that it is necessary to adjust reserve forces management civilian military employees in a series of multilevel class and to redesign the personnel management system. The measures proposed in the study are required to be promoted for the future trend of development of unit structure and manpower structure of reserve forces units, equity with general civilian military employees. In addition, it should be promoted by comprehensively considering the possibility of meeting the budget. In the follow-up study, if future research is conducted on the role of policy departments to optimize personnel management of reserve forces management civilian military employees and ways to form public consensus essential for system improvement, a comprehensive framework will be established.
{"title":"The enhancement of civilian military employees system for improving the reserve forces management efficiency in Korean military","authors":"Yong-joo Kang","doi":"10.37944/jams.v5i1.136","DOIUrl":"https://doi.org/10.37944/jams.v5i1.136","url":null,"abstract":"The importance of reserve forces is increasing owing to changes in the security environment, such as the promotion of Defense Reform 2.0 and a sharp decrease in military service resources, however, questions are raised as to whether the current system of reserve forces management civilian military employees has appropriate efficiency. As a result of the study, a plan to improve its efficiency was suggested that it is necessary to adjust reserve forces management civilian military employees in a series of multilevel class and to redesign the personnel management system. The measures proposed in the study are required to be promoted for the future trend of development of unit structure and manpower structure of reserve forces units, equity with general civilian military employees. In addition, it should be promoted by comprehensively considering the possibility of meeting the budget. In the follow-up study, if future research is conducted on the role of policy departments to optimize personnel management of reserve forces management civilian military employees and ways to form public consensus essential for system improvement, a comprehensive framework will be established.","PeriodicalId":355992,"journal":{"name":"Journal of Advances in Military Studies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114346710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the advent of the Fourth Revolution, military weapon systems are also being advanced. In particular, as the proportion of software embedded in these weapon systems increases, the cyber vulnerabilities of advanced weapon systems also gradually increase. If cutting-edge weapons stop abruptly or malfunction owing to software defects or cyberattacks, they will adversely affect defense security as well as combat power and economic losses. The U.S. DoD is implementing the risk management framework (RMF) to cope with cyber vulnerabilities and threats. RMF is a risk management (RM)-based framework that classifies the cyber vulnerabilities of weapon systems based on data and evaluates them according to confidentiality, integrity, and availability. The application of RMF to the Korean military's weapon-system acquisition procedure is still in its infancy. In this study, we studied the application of the RMF to weapon acquisition processors in the U.S. DoD and suggested that measures of availability, reliability, and safety that can affect weapon performance should be managed with security, and that security systems should be applied to reliability, availability, and maintenance (RAM).
{"title":"A study on the application of RMF for weapon systems in Korea","authors":"Seungmok Lee","doi":"10.37944/jams.v4i3.122","DOIUrl":"https://doi.org/10.37944/jams.v4i3.122","url":null,"abstract":"With the advent of the Fourth Revolution, military weapon systems are also being advanced. In particular, as the proportion of software embedded in these weapon systems increases, the cyber vulnerabilities of advanced weapon systems also gradually increase. If cutting-edge weapons stop abruptly or malfunction owing to software defects or cyberattacks, they will adversely affect defense security as well as combat power and economic losses. The U.S. DoD is implementing the risk management framework (RMF) to cope with cyber vulnerabilities and threats. RMF is a risk management (RM)-based framework that classifies the cyber vulnerabilities of weapon systems based on data and evaluates them according to confidentiality, integrity, and availability. The application of RMF to the Korean military's weapon-system acquisition procedure is still in its infancy. In this study, we studied the application of the RMF to weapon acquisition processors in the U.S. DoD and suggested that measures of availability, reliability, and safety that can affect weapon performance should be managed with security, and that security systems should be applied to reliability, availability, and maintenance (RAM).","PeriodicalId":355992,"journal":{"name":"Journal of Advances in Military Studies","volume":"34 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123361371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study aims to intuitively identify trends in public interest by performing visualization analysis on unification economic cooperation using social network user opinion big data. For the “Unification Economic Cooperation” big data, the related big data were extracted using the Textom analysis tool, and text mining was performed. The results were expressed as a visualization figure.The results showed that, first, social network users were interested in North Korea's regional agricultural planning and education by the US and the government. Additionally, North Korea's rural villages existed in connection with pastoral and missionary words. An interest in how North and South Korea cooperate in investment and development in rural areas was identified. Second, there was an issue of interest in housing exchange and cooperation in North Korean villages by the community of club members as words such as club members → housing, common → housing, village → community exchange → cooperation were connected. Third, users were interested in culture and art. It would be useful to find and implement economic cooperation, a link between culture and art connected with North Korea's economic cooperation. Fourth, words such as technology, research, development, and dissemination were drawn as issues of interest. From the perspective of an integrated process, it is of interest to the general public to identify ways to implement it so that it can be pursued with economic benefits for both South and North Korea. Fifth, social network users were interested in the content of dot-com sites. The importance of the promotion of unification economic cooperation through these dot-com sites was confirmed.
{"title":"Analysis of issues of interest in unification economic cooperation by visualizing big data on social networks","authors":"Ugsun Hwang","doi":"10.37944/jams.v4i3.133","DOIUrl":"https://doi.org/10.37944/jams.v4i3.133","url":null,"abstract":"This study aims to intuitively identify trends in public interest by performing visualization analysis on unification economic cooperation using social network user opinion big data. For the “Unification Economic Cooperation” big data, the related big data were extracted using the Textom analysis tool, and text mining was performed. The results were expressed as a visualization figure.The results showed that, first, social network users were interested in North Korea's regional agricultural planning and education by the US and the government. Additionally, North Korea's rural villages existed in connection with pastoral and missionary words. An interest in how North and South Korea cooperate in investment and development in rural areas was identified. Second, there was an issue of interest in housing exchange and cooperation in North Korean villages by the community of club members as words such as club members → housing, common → housing, village → community exchange → cooperation were connected. Third, users were interested in culture and art. It would be useful to find and implement economic cooperation, a link between culture and art connected with North Korea's economic cooperation. Fourth, words such as technology, research, development, and dissemination were drawn as issues of interest. From the perspective of an integrated process, it is of interest to the general public to identify ways to implement it so that it can be pursued with economic benefits for both South and North Korea. Fifth, social network users were interested in the content of dot-com sites. The importance of the promotion of unification economic cooperation through these dot-com sites was confirmed.","PeriodicalId":355992,"journal":{"name":"Journal of Advances in Military Studies","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123117287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study designs a reference model of the Defense REST API server based on the representational state transfer (REST) architecture style to present the most efficient, stable, and sustainable technical criteria for real-time service integration of defense information systems in Korea. The purpose of this component is to provide evidence to be stipulated as part of the Korean Defense Ministry's instructions and regulations, such as the Defense Interoperability Management Directive and the Interoperability Guide, and to support the development of the National Defense Interworking Technology and Interoperability. As the defense information system was subdivided and developed by the army, navy, air force, or business functions, interworking between information systems has become one of the most important factors. However, despite the need for advanced service integration and interworking, various interconnection service modules based on enterprise application integration (EAI), EAI hubs, and spokes were developed at a level that met local requirements (simple data transmission) without specific criteria for each network or information system. As a result, most of the interconnection modules currently in operation suffer from the absence of a technical spectrum, such as not meeting the military's demands for real-time interconnection and service integration, which increases with time. Therefore, this study seeks to identify the above problems by integrating the defense information system into one service and presenting a reference model of the defense REST API server to meet various real-time interworking requirements, analyze the technical basis, and pursue a model that fits military reality.
本研究设计了一个基于representational state transfer (REST)架构风格的国防REST API服务器参考模型,为韩国国防信息系统实时服务集成提供最高效、稳定和可持续的技术标准。该组件的目的是提供证据,作为韩国国防部指令和法规的一部分,如《国防互操作性管理指令》和《互操作性指南》,并支持国防互联技术和互操作性的发展。随着国防信息系统被陆军、海军、空军或业务部门细分和发展,信息系统之间的互通已成为最重要的因素之一。然而,尽管需要先进的业务集成和互联,但基于企业应用集成(EAI)、EAI集线器和辐条的各种互连服务模块的开发在满足本地需求(简单数据传输)的水平上,没有为每个网络或信息系统制定具体标准。因此,目前运行的大部分互联模块存在技术频谱缺失的问题,如不能满足军队对实时互联和业务集成的需求,这种需求随着时间的推移而增加。因此,本研究通过将国防信息系统集成为一种服务,提出国防REST API服务器的参考模型,以满足各种实时互通需求,从而识别上述问题,分析其技术基础,寻求符合军事实际的模型。
{"title":"Real-time service integration of defense information system","authors":"Yong-Mun Park, Doyoung Kim","doi":"10.37944/jams.v4i3.116","DOIUrl":"https://doi.org/10.37944/jams.v4i3.116","url":null,"abstract":"This study designs a reference model of the Defense REST API server based on the representational state transfer (REST) architecture style to present the most efficient, stable, and sustainable technical criteria for real-time service integration of defense information systems in Korea. The purpose of this component is to provide evidence to be stipulated as part of the Korean Defense Ministry's instructions and regulations, such as the Defense Interoperability Management Directive and the Interoperability Guide, and to support the development of the National Defense Interworking Technology and Interoperability. As the defense information system was subdivided and developed by the army, navy, air force, or business functions, interworking between information systems has become one of the most important factors. However, despite the need for advanced service integration and interworking, various interconnection service modules based on enterprise application integration (EAI), EAI hubs, and spokes were developed at a level that met local requirements (simple data transmission) without specific criteria for each network or information system. As a result, most of the interconnection modules currently in operation suffer from the absence of a technical spectrum, such as not meeting the military's demands for real-time interconnection and service integration, which increases with time. Therefore, this study seeks to identify the above problems by integrating the defense information system into one service and presenting a reference model of the defense REST API server to meet various real-time interworking requirements, analyze the technical basis, and pursue a model that fits military reality.","PeriodicalId":355992,"journal":{"name":"Journal of Advances in Military Studies","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132671230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study aims to suggest an improvement plan for the army branch system considering the development trend of weapon systems through a case analysis of the vision and major weapon systems for each army branch system in R.O.K army. In the future, with the development of science and technology, hyper-connected networks based on artificial satellites would be built, and mosaic warfare, which integrates multiple domains simultaneously, and weapon systems capable of performing all-weather multifunctional battles across land, sea, and air would emerge. As a result, the common areas of the Army, Navy, and Air Force would be expanded, and the division of each army or branch itself would become ambiguous. Hence, it will be inevitable to move away from the branch operation concepts that have been operational until now to seek the concept of jointness or integration. To study this phenomenon, based on the Korean Army Vision 2050 published by the Army, the transition process of the current Army branch system and the cases of vision and major weapon systems for each branch were analyzed. The results of the analysis confirmed that although new advanced complex weapon systems are being developed for each branch, relatively little change has been made to the system. In particular, with the advent of hybrid drones and intelligent autonomous combat robots that can simultaneously perform ‘Surveillance, Reconnaissance - Decision – Strike’, it is expected that the area of expansion and mutual redundancy of combat functions will be further deepened. Therefore, in connection with the development of the weapon system, we will seek a solution to improve the Army branch system in the future and clarify the implications for the Navy and Air Force in the future.
{"title":"A study on the improvement of the future branch system","authors":"Y. Park","doi":"10.37944/jams.v4i3.110","DOIUrl":"https://doi.org/10.37944/jams.v4i3.110","url":null,"abstract":"This study aims to suggest an improvement plan for the army branch system considering the development trend of weapon systems through a case analysis of the vision and major weapon systems for each army branch system in R.O.K army. In the future, with the development of science and technology, hyper-connected networks based on artificial satellites would be built, and mosaic warfare, which integrates multiple domains simultaneously, and weapon systems capable of performing all-weather multifunctional battles across land, sea, and air would emerge. As a result, the common areas of the Army, Navy, and Air Force would be expanded, and the division of each army or branch itself would become ambiguous. Hence, it will be inevitable to move away from the branch operation concepts that have been operational until now to seek the concept of jointness or integration. To study this phenomenon, based on the Korean Army Vision 2050 published by the Army, the transition process of the current Army branch system and the cases of vision and major weapon systems for each branch were analyzed. The results of the analysis confirmed that although new advanced complex weapon systems are being developed for each branch, relatively little change has been made to the system. In particular, with the advent of hybrid drones and intelligent autonomous combat robots that can simultaneously perform ‘Surveillance, Reconnaissance - Decision – Strike’, it is expected that the area of expansion and mutual redundancy of combat functions will be further deepened. Therefore, in connection with the development of the weapon system, we will seek a solution to improve the Army branch system in the future and clarify the implications for the Navy and Air Force in the future.","PeriodicalId":355992,"journal":{"name":"Journal of Advances in Military Studies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122382746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
China is challenging the hegemony of the United States through its economic power, creating the so-called New Cold War. The consequent conflict between the US and China can cause selective coercion in South Korea. South Korea is highly dependent on the United States militarily and on China economically. In a conflict, if Korea is asked for selective support, there will be a dilemma in policymaking. Accordingly, I studied the geopolitical dilemma in South Korea resulting from the US–China competition and six security issues . I was able to identify six conflict factors related to Korean security: the North Korean nuclear problem, the role of US forces in South Korea, friction due to protectionism, the battle for the semiconductor market, the formation of the Pacific Coast Council, and the discharge of contaminated water from nuclear power plants in Japan. I examined the flexible survival strategies that Korea could choose for each security issue. I expected policy utility by dividing it into military, economic, and diplomatic fields.
{"title":"A study of the United States of America and China’s new cold war conflicts and the flexible survival strategy for Korean security","authors":"Haesool Yang","doi":"10.37944/jams.v4i3.123","DOIUrl":"https://doi.org/10.37944/jams.v4i3.123","url":null,"abstract":"China is challenging the hegemony of the United States through its economic power, creating the so-called New Cold War. The consequent conflict between the US and China can cause selective coercion in South Korea. South Korea is highly dependent on the United States militarily and on China economically. In a conflict, if Korea is asked for selective support, there will be a dilemma in policymaking. Accordingly, I studied the geopolitical dilemma in South Korea resulting from the US–China competition and six security issues . I was able to identify six conflict factors related to Korean security: the North Korean nuclear problem, the role of US forces in South Korea, friction due to protectionism, the battle for the semiconductor market, the formation of the Pacific Coast Council, and the discharge of contaminated water from nuclear power plants in Japan. I examined the flexible survival strategies that Korea could choose for each security issue. I expected policy utility by dividing it into military, economic, and diplomatic fields.","PeriodicalId":355992,"journal":{"name":"Journal of Advances in Military Studies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131013289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}