14 research outputs found

    A Comparative Study on Cybersecurity Act Implemented in the United States and China

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ตญ์ œ๋Œ€ํ•™์› ๊ตญ์ œํ•™๊ณผ(๊ตญ์ œ์ง€์—ญํ•™์ „๊ณต), 2020. 8. ์‹ ์„ฑํ˜ธ.The past decade in cyberspace witnessed state-mediated attack in pursuance of accomplishing ones political end. Once limited to opportunistic private criminal groups, the concept of cyberattack transformed into a countrys important means to bolster national security and further propagate national stance in cyberspace. Henceforth, cyberspace emerges as compelling security realm. When compared to traditional security environment, judging the situation is convoluted on account of the unique characteristics of cyberspace. Under the amorphous nature of cyberspace, if anything, nations become more nationalized. The nature of cyber realm characterized by innate openness and hyper-connectivity will trigger structural change in cybersecurity landscape. Thus the thesis argues that although nations will actively interact and engage in collective initiatives fueled by the rising voice of forming global governance for cybersecurity, the overriding state sovereignty in the end would breed discord in the cyber era. Every move in cyberspace rests upon a nations political end thereby taking account of geopolitical interests assumes greater importance since invisible borderline matters. Given the nations inclination to utilize cyber capabilities for political ends, what happens in conventional security realm can also occur in cyberspace. The thesis chooses the US and China, allegedly Group of Two (G2), to study how both country take governmental measures vis-ร -vis cybersecurity. Two great powers, with no doubt, are the pioneers in this emerging security realm. Not only both actively engage in building up cyber capabilities but also actively engage in appealing for cooperation to its allies. By conducting a comparative study on Cybersecurity Act of 2015 in the US and Cybersecurity Law of the PRC in 2016, the thesis aims to demonstrate how G2 implement legal regulation to safeguard domestic information infrastructure amidst the rising cyber threats posed by both state and non-state actors. In doing so, the thesis will research how respective country exerts its national interests in cyberspace while cooperate with other countries to defend global security. The thesis will add a new dimension on current cybersecurity studies by filling the gaps in previous literature. The thesis will contribute in understanding Sino-US relation regarding hegemonic competition in cyberspace and further propose the prospects of nations in the cyber era.์ง€๋‚œ ์‹ญ ๋…„์˜ ์‚ฌ์ด๋ฒ„ํ™˜๊ฒฝ์€ ์ •์น˜์  ๋ชฉ์ ์„ ์ด๋ฃจ๊ธฐ ์œ„ํ•œ ์ˆ˜๋‹จ์œผ๋กœ์จ ๊ตญ๊ฐ€ ์ฃผ๋„์˜ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์ด ์ฃผ๋ฅผ ์ด๋ฃฌ๋‹ค. ํ•œ๋•Œ ๊ธฐํšŒ์ฃผ์˜์  ๋ฒ”์ฃ„์ง‘๋‹จ์— ๊ตญํ•œ๋œ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์€ ์ด์ œ ํ•œ ๊ตญ๊ฐ€์˜ ์ •์น˜์  ๋ชฉ์  ๋‹ฌ์„ฑ, ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์—์„œ์˜ ์ •์น˜์  ์„ ์ „์˜ ์ค‘์š”ํ•œ ์ˆ˜๋‹จ์œผ๋กœ ์ด์šฉ๋œ๋‹ค. ์ด์— ๋”ฐ๋ผ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์€ ๊ทธ ๊ท€์ถ”๊ฐ€ ์ฃผ๋ชฉ๋˜๋Š” ์‹ (ๆ–ฐ)์•ˆ๋ณด์˜์—ญ์œผ๋กœ ๊ธ‰๋ถ€์ƒํ•˜๊ณ  ์žˆ๋‹ค. ์ „ํ†ต์  ์•ˆ๋ณด ์˜์—ญ๊ณผ ๋น„๊ตํ–ˆ์„ ๋•Œ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์˜ ๋…ํŠนํ•œ ํŠน์„ฑ์œผ๋กœ ๋ง๋ฏธ์•”์•„ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ํ™˜๊ฒฝ์„ ๊ฐ€๋Š ํ•˜๋Š” ๊ฒƒ์€ ํ›จ์”ฌ ๋ณต์žกํ•˜๋‹ค. ๊ฐœ๋ฐฉ์„ฑ๊ณผ ์ดˆ์—ฐ๊ฒฐ์„ฑ์œผ๋กœ ํŠน์ง•๋˜๋Š” ๋ฌด์ •ํ˜•์˜ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์—์„œ ์—ญ์„ค์ ์ด๊ฒŒ๋„ ๊ตญ๊ฐ€๋Š” ๋”์šฑ ๊ตญ๊ฐ€์ฃผ์˜์ ์ธ ๊ฒฝํ–ฅ์„ ๋ณด์ธ๋‹ค. ์•ˆ์ „ํ•œ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ํ™˜๊ฒฝ ์ˆ˜๋ฆฝ์„ ์œ„ํ•ด ๊ธ€๋กœ๋ฒŒ๊ฑฐ๋ฒ„๋„Œ์Šค ๊ตฌ์ถ•์˜ ํ•„์š”์„ฑ์— ๋”ํ•ด ๊ฐ ๊ตญ๊ฐ€๋“ค์ด ๊ณต๋™์˜ ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ๋ฅผ ์œ„ํ•ด ํ˜‘๋ ฅํ•จ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ๋” ์šฐ์„ ์‹œ๋˜๋Š” ์ฃผ๊ถŒ๊ตญ๊ฐ€์˜ ์ด์ต์€ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์ด๋ผ๋Š” ์‹ (ๆ–ฐ)์•ˆ๋ณด ์˜์—ญ์—์„œ์˜ ๊ฐˆ๋“ฑ์„ ์ดˆ๋ž˜ํ•  ๊ฒƒ์ด๋‹ค. ์ด๋Š” ๊ถ๊ทน์ ์œผ๋กœ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ์ „๋ง์˜ ๊ตฌ์กฐ์  ๋ณ€ํ™”๋ฅผ ๋ถ€์ถ”๊ธด๋‹ค. ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„ ํ•˜์— ํ•œ ๊ตญ๊ฐ€์˜ ์ •์น˜์  ํ–‰์œ„๊ฐ€ ๊ฒฐ๊ตญ ํŠน์ˆ˜ํ•œ ๋ชฉ์ ์— ๋‹ฌ๋ ค์žˆ์Œ์— ๊ธฐ์ธํ•ด ์ด ์‹ (ๆ–ฐ)์•ˆ๋ณด ์˜์—ญ์˜ ์ดํ•ด์— ์•ž์„œ ์ง€์ •ํ•™์  ์ด์ต๊ด€๊ณ„์˜ ์ดํ•ด๊ฐ€ ์š”๊ตฌ๋œ๋‹ค. ์‚ฌ์ด๋ฒ„ ์—ญ๋Ÿ‰์„ ํ•œ ๊ตญ๊ฐ€์˜ ์ •์น˜์  ๋ชฉ์  ๋‹ฌ์„ฑ์˜ ์ˆ˜๋‹จ์œผ๋กœ ์ด์šฉํ•˜๋ ค๋Š” ์ง€๋‚œ ์‹ญ ๋…„์˜ ๊ฒฝํ–ฅ์€ ์ „ํ†ต์  ์•ˆ๋ณด์˜์—ญ ์ฐจ์›์—์„œ ๋ฐœ์ƒํ•˜๋˜ ์ผ์ด ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์— ๋˜ํ•œ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์Œ์„ ์‹œ์‚ฌํ•œ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์€ ๋ฏธ๊ตญ๊ณผ ์ค‘๊ตญ์ด ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ๊ด€๋ จ ์–ด๋– ํ•œ ์ •๋ถ€์ฐจ์›์˜ ์กฐ์น˜๋ฅผ ์ทจํ•˜๋Š” ์ง€ ์—ฐ๊ตฌํ•จ์— ๋ชฉ์ ์„ ๋‘”๋‹ค. ์–‘๊ตญ์€ ์‚ฌ์ด๋ฒ„ ์—ญ๋Ÿ‰ ๋ฐœ์ „์— ๊ตญ๊ฐ€์  ํˆฌ์ž๋ฅผ ์•„๋ผ์ง€ ์•Š์„ ๋ฟ ์•„๋‹ˆ๋ผ ๋™๋งน๊ตญ๋“ค์—๊ฒŒ๋„ ํ˜‘๋ ฅ์„ ์ด‰๊ตฌํ•˜๋ฉฐ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์ด๋ผ๋Š” ์‹ (ๆ–ฐ)์•ˆ๋ณด์˜์—ญ์— ๊ฐ€์žฅ ์ ๊ทน์„ฑ์„ ๋ ๋Š” ๊ตญ๊ฐ€์ด๋‹ค. ๋ฏธ๊ตญ์˜ 2015๋…„ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฒ•๊ณผ ์ค‘๊ตญ์˜ 2016๋…„ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ๋ฒ•์„ ๋น„๊ต ์—ฐ๊ตฌํ•ด ๋ณธ ๋…ผ๋ฌธ์€ ์–‘๊ตญ์ด ๊ตญ๋‚ด์˜ ์ •๋ณด ์ธํ”„๋ผ ๋ณดํ˜ธ๋ฅผ ์œ„ํ•ด ์–ด๋– ํ•œ ๋ฒ•์  ๊ทœ์ œ๋ฅผ ๋งˆ๋ จํ–ˆ๋Š”์ง€ ์‚ดํŽด๋ณด๊ณ ์ž ํ•œ๋‹ค. ๋˜ํ•œ ๊ฐ๊ตญ์ด ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์—์„œ ์–ด๋–ป๊ฒŒ ๊ตญ์ต์„ ํ–‰์‚ฌํ•˜๋ฉฐ ๋™์‹œ์— ๋ฒ”์ง€๊ตฌ์  ์ฐจ์›์˜ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฅผ ์œ„ํ•ด ์–ด๋– ํ•œ ํ˜‘๋ ฅ ๋งค์ปค๋‹ˆ์ฆ˜์„ ์ถ”๊ตฌํ•˜๋Š”์ง€ ์—ฐ๊ตฌํ•œ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์€ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฅผ ๋ฏธโˆ™์ค‘ ๊ฒฝ์Ÿ๊ตฌ๋„์˜ ๊ด€์ ์—์„œ ์žฌํ•ด์„ํ•˜๋ฉฐ ๋” ๋‚˜์•„๊ฐ€ ๊ฑฐ์‹œ์ ์œผ๋กœ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋ฅผ ์ „๋งํ•œ๋‹ค๋Š” ์ ์—์„œ ํ˜„์žฌ์˜ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ์—ฐ๊ตฌ์— ๊ธฐ์—ฌํ•œ๋‹ค.I. Introduction 1 1. Research Background 1 2. Argument Overview 3 3. Significance of the topic 5 4. Methodology 8 II. Literature Review 10 1. Sino-US relation and Cybersecurity 10 2. Previous studies on cybersecurity 16 3. Cybersecurity and relevant legal regulation 25 a. The United States 25 b. China 29 4. Limitations of prior research 32 III. The United States 34 1. An overview of national security and cyberspace 34 a. Cybersecurity environment 34 b. Cybersecurity strategy guideline 37 2. Information security and regulatory regime 41 a. Definition of Critical Information Infrastructure 41 b. The evolution of discussion on information security 45 3. Cybersecurity Act of 2015 48 IV. China 51 1. An overview of national security and network security 51 a. The development process of informatization 51 b. Cybersecurity strategy guideline 54 2. Network security and regulatory regime 57 a. Cybersecurity environment 57 b. Definition of Critical Information Infrastructure and regulatory regime 59 3. Cybersecurity Law of the PRC 62 V. Analysis 64 1. Thesis findings 64 a. The US model of protecting homeland cybersecurity 66 b. Chinese model of controlling mainland network security 68 2. Implications and prospects of nations in the cyber era 69 a. Cybersecurity as a shared problem 69 b. Race to cyber supremacy 72 VI. Conclusion 75 Bibliography 78 Abstract in Korean 91Maste

    Critical Information Infrastructure

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :๊ตญ์ œ๋Œ€ํ•™์› ๊ตญ์ œํ•™๊ณผ(๊ตญ์ œํ†ต์ƒ์ „๊ณต),2019. 8. ์‹ ์„ฑํ˜ธ.์šฐ๋ฆฌ๋‚˜๋ผ์˜ ๊ตญ๊ฐ€ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด๋Š” ๊ด€๋ฆฌ์ฒด๊ณ„๊ฐ€ ๋‹ค์–‘ํ•œ ์ •๋ถ€๋ถ€์ฒ˜๋“ค ๊ฐ„์— ๋ถ„์‚ฐ๋˜์–ด ์žˆ์Œ์€ ๋ฌผ๋ก , ๊ณต๊ณต, ๋ฏผ๊ฐ„, ๊ตฐ์‚ฌ ๋ถ€๋ฌธ๋“ค ๊ฐ„์—๋„ ์กฐ์ •๊ณผ ์—ฐ๊ณ„์ฒด๊ณ„ ๋งค์šฐ ๋ถ€์‹คํ•˜๋‹ค. ๋”ฐ๋ผ์„œ ๊ณ ๋„๋กœ ์ง€๋Šฅํ™”๋˜๊ณ  ๋ณต์žกํ•ด ์ง€๊ณ  ์žˆ๋Š” ๊ฐ์ข… ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์— ์ œ๋Œ€๋กœ ๋Œ€์ฒ˜ํ•˜๋Š” ๋ฐ ํ•œ๊ณ„๋ฅผ ๋…ธ์ถœํ•˜๊ณ  ์žˆ๋‹ค. ๊ทธ๋ฆฌ๊ณ  ์‚ฌ์ด๋ฒ„์•ˆ๋ณด์ฒด๊ณ„์˜ ์•ˆ์ •์„ฑ ๋ฉด์—์„œ๋„ ๋ฌธ์ œ๊ฐ€ ์ ์ง€ ์•Š๋‹ค. ๋”ฐ๋ผ์„œ ๊ตญ๊ฐ€ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด์ฒด๊ณ„ ์ „๋ฐ˜์— ๋Œ€ํ•œ ์ ๊ฒ€๊ณผ ์žฌ๊ตฌ์กฐํ™”๊ฐ€ ํ•„์š”ํ•œ ์‹œ์ ์ด๋‹ค. ์ด๋Ÿฌํ•œ ๋ฐฐ๊ฒฝ ํ•˜์—์„œ, ๋ณธ ๋…ผ๋ฌธ์˜ ๋ชฉ์ ์€ ๊ฑฐ๋ฒ„๋„Œ์Šค(governance) ๊ด€์ ์— ์ž…๊ฐํ•˜์—ฌ ํ•ต์‹ฌ์ •๋ณด์ธํ”„๋ผ ๋ถ„์•ผ์—์„œ์˜ ๊ตญ๊ฐ€ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด์ฒด๊ณ„์˜ ์‹คํƒœ์™€ ๋ฌธ์ œ์ ์„ ๋ถ„์„ํ•˜๊ณ  ๋˜ํ•œ ๋ฏธ๊ตญ์˜ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด์ฒด๊ณ„์— ๋Œ€ํ•œ ์‚ฌ๋ก€๋ถ„์„์„ ํ–‰ํ•˜๋ฉฐ, ์ด๋ฅผ ํ† ๋Œ€๋กœ ํ•ต์‹ฌ์ •๋ณด์ธํ”„๋ผ ๋ถ„์•ผ์—์„œ์˜ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด์ฒด๊ณ„ ๊ฐ•ํ™”๋ฐฉ์•ˆ์„ ์ œ์–ธํ•˜๊ณ ์ž ํ•˜๋Š” ๊ฒƒ์ด๋‹ค. ์ด๋Ÿฌํ•œ ์—ฐ๊ตฌ๋ชฉ์ ์„ ๋‹ฌ์„ฑํ•˜๊ธฐ ์œ„ํ•˜์—ฌ ๋ณธ ๋…ผ๋ฌธ์€ ์šฐ์„  ์‚ฌํšŒ๊ณผํ•™ ๋ถ„์•ผ์—์„œ ๋„๋ฆฌ ์‚ฌ์šฉ๋˜๊ณ  ์žˆ๋Š” ๊ฑฐ๋ฒ„๋„Œ์Šค ๊ด€์ ์˜ ๋“ฑ์žฅ๋ฐฐ๊ฒฝ, ์˜์˜, ๊ฑฐ๋ฒ„๋„Œ์Šค ๋Šฅ๋ ฅ ๋“ฑ์— ๊ด€ํ•œ ์ด๋ก ์  ๋…ผ์˜๋ฅผ ํ–‰ํ•˜์˜€๋‹ค. ๋‹ค์Œ์—๋Š” ์ด๋Ÿฌํ•œ ์ด๋ก ์  ๋…ผ์˜๋ฅผ ์ฐธ์กฐํ•˜์—ฌ ๊ฑฐ๋ฒ„๋„Œ์Šค์˜ ๊ตฌ์„ฑ์š”์†Œ, ๊ฑฐ๋ฒ„๋„Œ์Šค์˜ ์„ฑ๊ณต ์š”๊ฑด ๋“ฑ์„ ์ค‘์‹ฌ์œผ๋กœ ๋ถ„์„ํ‹€์„ ์„ค์ •ํ•˜์˜€๋‹ค. ์ด์–ด์„œ ์ผ์ข…์˜ ๋ฒค์น˜๋งˆํ‚น์„ ์œ„ํ•œ ์‹œ๋„๋กœ ๋ฏธ๊ตญ์˜ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด์ฒด๊ณ„์˜ ์‹คํƒœ๋ฅผ ๊ฑฐ๋ฒ„๋„Œ์Šค ๊ด€์ ์— ์ž…๊ฐํ•˜์—ฌ ์‚ฌ๋ก€๋ถ„์„์„ ํ–‰ํ•˜์˜€๋‹ค. ๋‹ค์Œ ์žฅ์—์„œ๋Š” ์•ž์—์„œ ์„ค์ •๋œ ๋ถ„์„ํ‹€์— ์ž…๊ฐํ•˜์—ฌ ์šฐ๋ฆฌ๋‚˜๋ผ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ๊ฑฐ๋ฒ„๋„Œ์Šค ์ฒด๊ณ„์˜ ์‹คํƒœ์™€ ๋ฌธ์ œ์ ์„ ์‹ค์ฆ์ ์œผ๋กœ ๋ถ„์„ํ•˜์˜€๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ๋Š” ๋ฏธ๊ตญ์˜ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ๊ฑฐ๋ฒ„๋„Œ์Šค ์ฒด๊ณ„์— ๋Œ€ํ•œ ์‚ฌ๋ก€ ๋ถ„์„๊ณผ ์šฐ๋ฆฌ๋‚˜๋ผ์˜ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด์ฒด๊ณ„์˜ ์‹คํƒœ ๋ฐ ๋ฌธ์ œ์ ์— ๋Œ€ํ•œ ๋ถ„์„์„ ํ† ๋Œ€๋กœ, ๋ณด๋‹ค ์•ˆ์ •์ ์ด๊ณ  ์ง€์†๊ฐ€๋Šฅํ•œ ์‚ฌ์ด๋ฒ„์•ˆ๋ณด ๊ฑฐ๋ฒ„๋„Œ์Šค ์ฒด๊ณ„๋ฅผ ๊ตฌ์ถ•ํ•˜๊ธฐ ์œ„ํ•œ ๊ตฌ์ฒด์ ์ธ ์ •์ฑ…๋ฐฉ์•ˆ๋“ค์„ ์ œ์‹œํ•˜์˜€๋‹ค.Koreas national cybersecurity governance system is characterized by high levels of fragmentation and instability, unable to form coherent national-level response to increasingly sophisticated and devastating cyber attacks, with the public, private and military sector each struggling to provide for its own cybersecurity. The purpose of this paper is to analyze the contemporary situation and underlying problems of South Koreas national cybersecurity in the area of critical information infrastructure from the governance perspective, then suggest relevant policy measures to bolster cybersecurity of critical information infrastructure. In order to fulfill the objective, this paper first examines the theories pertinent to the concept and emergence of the governance perspective in the disciplines of social science. Then, the components of governance and the requirements for successful governance are explored in order to establish the dimensions of analysis. Subsequently, the paper undertakes a case study of the U.S. cybersecurity governance system to draw relevant policy implications. The following chapter examines the contemporary situation and underlying problems of South Koreas cybersecurity governance, in accordance with the five dimensions of the governance system. This paper concludes with policy suggestions to consolidate a stable and sustainable cybersecurity governance system in Korea.CHAPTER I. Introduction 1.1 Research Background 1 1.2 Research Purpose and Research Questions 5 CHAPTER II. Theoretical Underpinning and Research Design 2.1 Theoretical Underpinning 8 1) Cybersecurity 8 2) Critical Infrastructure or Critical National Infrastructure 9 3) Critical Information Infrastructure 11 4) Emergence of Governance Perspective 12 5) Conceptualizing Governance 14 6) Governance Capacity and Good Governance 17 7) Conditions for Governance Formation 18 8) Requirements for Successful Governance 19 2.2. Literature Review 22 1) Literatures on Regional and Global Cybersecurity Governance 22 2) Literatures on Cybersecurity Governance in South Korea 24 3) Common Limitations of Precedent Studies 27 2.3 Research Method: Document Research and Case Study 28 2.4 Rationale for U.S. Cybersecurity Governance as Case Study 32 2.5 Dimensions of Analysis 33 CHAPTER III. The Cybersecurity Governance System of the United States 3.1 An Overview of Cybersecurity Legislation and Policies in the U.S. 35 3.2 Legal and Institutional Systems: Roles and Responsibilities 43 3.3 Federal Cybersecurity Budget 45 3.4 Public-Private Partnership: Critical Infrastructure Sector Partnership 47 3.5 Federal Cybersecurity Monitoring and Evaluation Systems 51 CHAPTER IV. An Analysis of South Koreas National Cybersecurity Governance System on Critical Information Infrastructure 4.1 An Overview of South Koreas National Cybersecurity Challenges 53 4.2 An Analysis of the Cybersecurity Governance System of South Korea 57 1) Legal and Institutional Systems 57 2) Administrative System for Critical Information Infrastructure 67 3) Finance and Budget Systems 76 4) Public-Private Partnership 79 5) Monitoring and Evaluation Systems 81 CHAPTER V. Policy Measures to Consolidate the National Cybersecurity Governance System in South Korea 5.1 Policy Suggestions to Consolidate the Cybersecurity Governance System 1) Legal and Institutional Systems 84 2) Administrative System 86 3) Finance and Budget Systems 90 4) Public-Private Partnership 92 5) Monitoring and Evaluation Systems 95 5.2 Engineering Cyber Resilient Governance 101 CHAPTER VI. Conclusion ย ย ย ย ย  ย 6.1 Conclusion and Implications 105 ย ย ย ย ย  ย 6.2. Future Avenues of Research 109 Bibliography 110Maste

    ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์˜ ๊ตญ์ œ๋ฒ•์  ๊ทœ์œจ์„ ์œ„ํ•œ ์ ๊ทน์  ๋ฐฉ์–ด๊ฐœ๋…์˜ ๋„์ž…

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๋ฒ•๊ณผ๋Œ€ํ•™ ๋ฒ•ํ•™๊ณผ, 2018. 2. ์ •์ธ์„ญ.๋ณธ ๋…ผ๋ฌธ์€ ์ดˆ๊ตญ๊ฒฝ์  ์„ฑ๊ฒฉ์„ ๊ฐ€์ง„ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์ด ๊ตญ๊ฐ€์•ˆ๋ณด์— ์œ„ํ˜‘์ด ๋˜๊ณ  ์žˆ๋Š” ํ˜„์‹ค์„ ์ง„๋‹จํ•˜๊ณ , ๊ตญ์ œ๋ฒ•์ ์œผ๋กœ ์ด๋ฅผ ํšจ๊ณผ์ ์œผ๋กœ ๊ทœ์œจํ•˜๊ธฐ ์œ„ํ•œ ๋ฐฉ์•ˆ์ด ๋ฌด์—‡์ธ์ง€์— ๋Œ€ํ•ด ์—ฐ๊ตฌํ•˜์˜€๋‹ค. ์ผ๋ จ์˜ ์‚ฌ๊ฑด์„ ํ†ตํ•ด ๊ตญ๊ฐ€๋“ค์ด ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์˜ ์œ„ํ—˜์„ฑ์„ ์ธ์ง€ํ•œ ์ด๋ž˜ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์˜ ๊ตญ์ œ๋ฒ•์  ๊ทœ์œจ์„ ์œ„ํ•œ ๊ตญ๊ฐ€๋“ค์˜ ๋…ผ์˜๋Š” ํ˜„์žฌ๊นŒ์ง€ ํ™œ๋ฐœํ•˜๊ฒŒ ์ง„ํ–‰๋˜๊ณ  ์žˆ๋‹ค. ์ด๋Š” ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์—์„œ ์ด๋ฃจ์–ด์ง€๋Š” ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์ด ๋ฌผ๋ฆฌ์  ๊ณต๊ฐ„์—์„œ์˜ ํ™œ๋™๊ณผ๋Š” ๊ตฌ๋ณ„๋˜๋Š” ํŠน์ง•์„ ๊ฐ€์ง€๊ณ  ์žˆ๊ธฐ ๋•Œ๋ฌธ์ผ ๊ฒƒ์ด๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ํ˜„์žฌ ๊ตญ๊ฐ€๋“ค์˜ ๋…ผ์˜๋Š” ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์˜ ํŠน์„ฑ์„ ๋ฐ˜์˜ํ•˜๊ธฐ ๋ณด๋‹ค๋Š” ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์˜ ๊ทœ์œจ์„ ์œ„ํ•ด ์ƒˆ๋กœ์šด ์ฒด์ œ ๋งˆ๋ จ์ด ํ•„์š”ํ•œ์ง€ ํ˜„ํ–‰ ๊ตญ์ œ๋ฒ•์„ ๊ทธ๋Œ€๋กœ ์ ์šฉํ•  ์ˆ˜ ์žˆ๋Š”์ง€ ์—ฌ๋ถ€์— ์ง‘์ค‘๋˜์–ด ์žˆ๋‹ค. ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์— ๋Œ€ํ•œ ๊ตญ์ œ๋ฒ•์  ๊ทœ์œจ์„ ์œ„ํ•ด ๋ฐ˜๋“œ์‹œ ๊ณ ๋ คํ•ด์•ผํ•  ํŠน์„ฑ์œผ๋กœ๋Š” ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์˜ ์ผ๋ฐ˜์  ํŠน์„ฑ์ธ ์ต๋ช…์„ฑ ๋ฐ ๊ณต๊ฐ„์— ๋Œ€ํ•œ ์ดˆ์›”์„ฑ ์™ธ์—๋„ ๊ณต๊ฒฉ์ž์™€ ๊ณต๊ฒฉ๊ฑฐ์ , ๊ณต๊ฒฉ๋ชฉํ‘œ ๊ฐ„์˜ ๋…ํŠนํ•œ ๊ด€๊ณ„๋ฅผ ๋“ค ์ˆ˜ ์žˆ๋‹ค. ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์€ ๋Œ€๋ถ€๋ถ„ ๊ณต๊ฒฉ์ž๊ฐ€ ๋ชฉํ‘œ๋Œ€์ƒ์„ ์ง์ ‘ ๊ณต๊ฒฉํ•˜์ง€ ์•Š๊ณ , ์‚ฌ์ „์— ๋งˆ๋ จ๋œ ๊ณต๊ฒฉ๊ฑฐ์ ์„ ๊ฑฐ์ณ ๊ณต๊ฒฉ์„ ์‹คํ–‰ํ•˜๋Š” ํŠน์„ฑ์„ ๊ฐ€์ง€๊ณ  ์žˆ๋‹ค. ๊ณต๊ฒฉ์ž๋Š” ์ด๋Ÿฌํ•œ ๊ณต๊ฒฉ๊ฑฐ์ ์„ ์—ฌ๋Ÿฌ ๊ฐœ ๋งˆ๋ จํ•  ์ˆ˜ ์žˆ๊ธฐ ๋•Œ๋ฌธ์— ๊ณต๊ฒฉ ๋˜ํ•œ ์—ฌ๋Ÿฌ ๋‹จ๊ณ„๋ฅผ ๊ฑฐ์ณ ์ง„ํ–‰๋  ์ˆ˜ ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์˜ ๊ฒฝ์šฐ ์‹ค์ œ ๊ณต๊ฒฉ์ž๋ฅผ ๋ฐํžˆ๋Š” ๊ท€์†์˜ ์ž…์ฆ์ด ๋”์šฑ ์–ด๋ ต๊ณ , ์ž…์ฆ์„ ํ•˜๋Š” ๋ฐ์—๋„ ์ ์ง€ ์•Š์€ ์‹œ๊ฐ„์ด ์†Œ์š”๋œ๋‹ค. ๋•Œ๋ฌธ์— ๊ณต๊ฒฉ์„ ์ฆ‰๊ฐ์ ์œผ๋กœ ์–ต์ง€ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ๊ท€์†์˜ ์ž…์ฆ๋ณด๋‹ค๋Š” ๊ณต๊ฒฉ๊ฑฐ์ ์— ๋Œ€ํ•œ ์กฐ์น˜๊ฐ€ ์šฐ์„ ์ ์œผ๋กœ ํ•„์š”ํ•˜๋‹ค. ํ˜„์žฌ ๋ฐœ์ƒํ•˜๊ณ  ์žˆ๋Š” ๊ณต๊ฒฉ์˜ ํ๋ฆ„์„ ์ฐจ๋‹จ์‹œํ‚ค๊ฑฐ๋‚˜ ๊ณต๊ฒฉ์˜ ๊ฑฐ์ ์ด ๋˜๋Š” ์„œ๋ฒ„ ๋˜๋Š” ์‹œ์Šคํ…œ์„ ์ง์ ‘ ์…ง๋‹ค์šด์‹œํ‚ค๋Š” ๋“ฑ์˜ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์ƒ์˜ ์กฐ์น˜๋ฅผ ์˜๋ฏธํ•˜๋Š” ์ ๊ทน์  ๋ฐฉ์–ด๋Š” ๋ฐ”๋กœ ์ด๋Ÿฌํ•œ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์˜ ํŠน์„ฑ์„ ๋ฐ˜์˜ํ•˜์—ฌ ๋งˆ๋ จ๋œ ๋Œ€์‘์ „๋žต์ด๋‹ค. ์ด๋Š” ๊ณต๊ฒฉ์„ ์‹ค์‹œ๊ฐ„์œผ๋กœ ์–ต์ง€ํ•˜๊ธฐ ์œ„ํ•ด ์ทจํ•˜๋Š” ์กฐ์น˜๋กœ ๊ท€์†์˜ ์ฆ๋ช…๋ณด๋‹ค๋Š” ์œ„ํ˜‘์„ ์‚ฌ์ „์— ํƒ์ง€ํ•˜๊ณ  ๊ณต๊ฒฉ ์ˆ˜๋‹จ์„ ์ฒ˜๋ฆฌํ•˜๋Š” ๋ฐ ๊ทธ ์ดˆ์ ์ด ๋งž์ถ”์–ด์ ธ ์žˆ๋‹ค. ๋ฌธ์ œ๋Š” ์ ๊ทน์  ๋ฐฉ์–ด์กฐ์น˜ ์‹œ ๊ทธ ๋Œ€์ƒ์ด ๋˜๋Š” ๊ณต๊ฒฉ๊ฑฐ์ ์ด ์‹ค์ œ ๊ณต๊ฒฉ์ž์™€๋Š” ๊ด€๋ จ์ด ์—†๋Š” ๊ณณ์— ์œ„์น˜ํ•  ๊ฐ€๋Šฅ์„ฑ์ด ๋†’๋‹ค๋Š” ์ ์ด๋‹ค. ์ฆ‰, ๊ณต๊ฒฉ๊ณผ๋Š” ์ง„์ •ํ•œ ๊ด€๋ จ์„ฑ์ด ์—†๋Š” ์ œ3๊ตญ์˜ ๊ธฐ๋ฐ˜์‹œ์„ค์ด๋‚˜ ๋ฏผ๊ฐ„ ์‹œ์Šคํ…œ์ด ๊ณต๊ฒฉ๊ฑฐ์ ์ธ ๊ฒฝ์šฐ๊ฐ€ ๋Œ€๋ถ€๋ถ„์ด๊ธฐ ๋•Œ๋ฌธ์— ์กฐ์น˜์˜ ๊ฐ•๋„ ๋ฐ ๊ฒฐ๊ณผ์— ๋”ฐ๋ผ ๊ตญ์ œ๋ฒ•์œ„๋ฐ˜์˜ ๋ฌธ์ œ๊ฐ€ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋Š” ๊ฒƒ์ด๋‹ค. ํŠนํžˆ ์ ๊ทน์  ๋ฐฉ์–ด๋Š” ์‚ฌ์ „์  ์กฐ์น˜์˜ ๊ฐœ๋…์„ ํฌํ•จํ•˜๊ณ  ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ ์œ„ํ˜‘์ด ๋ชฉํ‘œ์‹œ์Šคํ…œ ๋‚ด๋ถ€์— ์ ‘๊ทผํ•˜์ง€ ์•Š์€ ์™ธ๋ถ€ ๋„คํŠธ์›Œํฌ์—์„œ ํƒ์ง€๋œ ๋‹จ๊ณ„์—์„œ๋„ ํƒ€๊ตญ์— ์œ„์น˜ํ•œ ๋„คํŠธ์›Œํฌ์—๊นŒ์ง€ ์ถ”์ ํ•ด ๋“ค์–ด๊ฐ€ ์ฐพ์•„๋‚ธ ๋ด‡๋„ท์ด๋‚˜ C&C์„œ๋ฒ„๋ฅผ ์ œ์–ดํ•˜๊ฑฐ๋‚˜ ๋ฌด๋ ฅํ™”์‹œํ‚ค๋Š” ์กฐ์น˜๋ฅผ ์ทจํ•˜๊ฒŒ ๋˜๋Š” ๊ฒƒ์ด๋‹ค. ์ด๋Š” ์‹œ๊ธฐ์ƒ ๊ตญ์ œ๋ฒ•์ด ํ—ˆ์šฉํ•˜๋Š” ๊ฒƒ๋ณด๋‹ค ํ›จ์”ฌ ์•ž์„  ์‹œ์ ์—์„œ ์ด๋ฃจ์–ด์ง€๋Š” ์กฐ์น˜์ด๋ฉฐ, ์กฐ์น˜ ๊ทธ ์ž์ฒด๋กœ ๋Œ€์ƒ ์‹œ์Šคํ…œ์— ์†์ƒ์„ ์ดˆ๋ž˜ํ•  ์ˆ˜ ์žˆ๋‹ค๋Š” ์ ์—์„œ ๊ตญ์ œ๋ฒ•์œ„๋ฐ˜์˜ ๋ฌธ์ œ๊ฐ€ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋‹ค. ์ ๊ทน์  ๋ฐฉ์–ด์กฐ์น˜๊ฐ€ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์˜ ์–ต์ง€๋ฅผ ์œ„ํ•œ ํ˜„์‹ค์  ํ•„์š”์„ฑ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ์—„๊ฒฉํ•œ ๊ธฐ์ค€์„ ๋ฐ”ํƒ•์œผ๋กœ ๊ตญ์ œ๋ฒ•์— ์˜ํ•ด ๊ทœ์œจ๋˜์–ด์•ผ ํ•˜๋Š” ์ด์œ ๊ฐ€ ์—ฌ๊ธฐ์— ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ ๊ทน์  ๋ฐฉ์–ด๊ฐœ๋…์€ ๊ตญ๊ฐ€๋“ค์ด ๊ตญ๋‚ด์ ์œผ๋กœ ๋งˆ๋ จํ•˜๊ณ  ์žˆ๋Š” ์•ˆ๋ณด์ „๋žต์ฐจ์›์—์„œ ์–ธ๊ธ‰๋˜๊ณ  ์žˆ์„ ๋ฟ, ๊ตญ์ œ์‚ฌํšŒ ์ฐจ์›์—์„œ๋Š” ๋…ผ์˜๋œ ๋ฐ”๊ฐ€ ์—†๋‹ค. ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ๊ณผ ๊ด€๋ จํ•œ ๊ตญ์ œ๋ฒ• ์—ฐ๊ตฌ์—์„œ๋„ ๊ตญ๊ฐ€๋“ค์ด ๋งˆ๋ จํ•˜๊ณ  ์žˆ๋Š” ์ ๊ทน์  ๋ฐฉ์–ด ์ „๋žต์ด ๊ตญ์ œ๋ฒ• ์ฒด์ œ ์•ˆ์—์„œ ์–ด๋–ค ๋ฌธ์ œ์ ์„ ๊ฐ€์ง€๋Š” ์ง€ ๊ฒ€ํ† ๋œ ๋ฐ”๊ฐ€ ์—†๊ธฐ๋Š” ๋งˆ์ฐฌ๊ฐ€์ง€๋‹ค. ์ด์— ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ๊ตญ์ œ๋ฒ•์œ„๋ฐ˜์— ํ•ด๋‹นํ•˜๋Š” ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์ด ๋ฐœ์ƒํ•˜๊ธฐ ์ „์— ๋˜๋Š” ๊ณต๊ฒฉ์ž๊ฐ€ ๋ช…ํ™•ํ•˜๊ฒŒ ๋ฐํ˜€์ง€์ง€ ์•Š์€ ์ƒํ™ฉ์—์„œ ๊ณต๊ฒฉ๊ฑฐ์ ์— ์šฐ์„ ์ ์œผ๋กœ ์กฐ์น˜๋ฅผ ์ทจํ•˜๋Š” ์ ๊ทน์  ๋ฐฉ์–ด๊ฐœ๋…์ด ํ˜„ํ–‰ ๊ตญ์ œ๋ฒ•์ฒด์ œ ๋‚ด์—์„œ ํ—ˆ์šฉ๋  ์ˆ˜ ์žˆ๋Š”์ง€์— ๋Œ€ํ•ด์„œ ์‚ดํŽด๋ณด์•˜๋‹ค. ์ด๋ฅผ ์œ„ํ•ด์„œ ์ ๊ทน์  ๋ฐฉ์–ด์กฐ์น˜ ์‹œ ๊ทธ ์‹œ๊ธฐ ๋ฐ ๋Œ€์ƒ๊ณผ ๊ด€๋ จํ•˜์—ฌ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋Š” ์œ„๋ฒ•์„ฑ์˜ ๋ฌธ์ œ๊ฐ€ ์ž์œ„๊ถŒ, ๋Œ€์‘์กฐ์น˜, ๊ธด๊ธ‰ํ”ผ๋‚œ๊ณผ ๊ฐ™์€ ๊ตญ์ œ๋ฒ•์ƒ์˜ ์œ„๋ฒ•์„ฑ ์กฐ๊ฐ์‚ฌ์œ ์— ์˜ํ•ด ์ •๋‹นํ™”๋  ์ˆ˜ ์žˆ๋Š”์ง€์— ์ค‘์ ์„ ๋‘๊ณ  ๋ถ„์„ํ•˜์˜€๋‹ค. ๊ทธ ๊ฒฐ๊ณผ ๊ตญ์ œ๋ฒ•์ƒ์˜ ์œ„๋ฒ•์„ฑ ์กฐ๊ฐ์‚ฌ์œ ๋ฅผ ํ™•๋Œ€์ ์šฉํ•˜์—ฌ๋„ ์ ๊ทน์  ๋ฐฉ์–ด์กฐ์น˜๋ฅผ ์™„์ „ํžˆ ํฌ์„ญํ•  ์ˆ˜ ์—†๋‹ค๋Š” ์ ์„ ํ™•์ธํ•˜์˜€๊ณ , ์ด์— ๋‹ค์ž์กฐ์•ฝ์ฒด์ œ๋ฅผ ํ†ตํ•ด ์ ๊ทน์  ๋ฐฉ์–ด๊ฐœ๋…์„ ๋„์ž…ํ•˜๋Š” ๊ฒƒ์ด ํ•„์š”ํ•˜๋‹ค๋Š” ๊ฒฐ๋ก ์— ๋„๋‹ฌํ•˜์˜€๋‹ค. ์•„์šธ๋Ÿฌ ์‚ฌํ›„ ์ฑ…์ž„์ž ์ฒ˜๋ฒŒ ๋ฐ ์ œ์žฌ๊ฐ€ ๊ฐ€๋Šฅํ•  ๋•Œ, ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์— ๋Œ€ํ•œ ์™„์ „ํ•œ ๊ทœ์œจ์ด ์ด๋ฃจ์–ด์งˆ ์ˆ˜ ์žˆ๋‹ค๊ณ  ๋ณด๊ณ , ๊ท€์†์ž…์ฆ์„ ์œ„ํ•œ ์กฐ์‚ฌํ˜‘์กฐ์˜๋ฌด์˜ ํ™•๋ฆฝ์„ ๋‹ค์ž์กฐ์•ฝ์ฒด์ œ์— ํฌํ•จ์‹œํ‚ฌ ๊ฒƒ์„ ์ œ์•ˆํ•˜์˜€๋‹ค.์ œ 1 ์žฅ ์„œ๋ก  1 ์ œ 1 ์ ˆ ๋ฌธ์ œ์˜ ์ œ๊ธฐ 1 ์ œ 2 ์ ˆ ์—ฐ๊ตฌ์˜ ๋ชฉ์ ๊ณผ ๋ฒ”์œ„ 9 ์ œ 2 ์žฅ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์— ๋Œ€ํ•œ ๊ตญ์ œ๋ฒ•์  ๊ทœ์ œ์˜ ํ•„์š”์„ฑ 11 ์ œ 1 ์ ˆ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์˜ ๊ฐœ๋… 11 1. ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์˜ ์ •์˜ 11 2. ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์˜ ๋ฐœ์ƒ์‹œ์  18 ์ œ 2 ์ ˆ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์˜ ์ดˆ๊ตญ๊ฐ€์„ฑ๊ณผ ๊ตญ์ œ๋ฒ•์  ๊ทœ์ œ์˜ ํ•„์š”์„ฑ 26 1. ์ดˆ๊ตญ๊ฐ€์  ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์˜ ์œ„ํ—˜์„ฑ 26 2. ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ๊ณผ ๊ตญ๊ฐ€์•ˆ๋ณด 32 ์ œ 3 ์žฅ ๊ตญ์ œ๋ฒ•์ฒด์ œ์˜ ์ ์šฉ๊ณผ ํ•œ๊ณ„ 41 ์ œ 1 ์ ˆ ๊ตญ์ œ๋ฒ•์˜ ์ ์šฉ์„ ์œ„ํ•œ ๊ธฐ์ค€์„ค์ •๊ณผ ๋ฌธ์ œ์  41 1. ์ผ๋ฐ˜๊ตญ์ œ๋ฒ•์ƒ์˜ ์›์น™ 41 1) ๋ฌด๋ ฅ์‚ฌ์šฉ๊ธˆ์ง€์›์น™ 41 2) ์ž์œ„๊ถŒ 49 3) ์ฃผ๊ถŒํ‰๋“ฑ์›์น™ 58 (1) ์ฃผ๊ถŒํ‰๋“ฑ์›์น™์˜ ๊ธฐ๋ณธ๊ฐœ๋… 59 (2) ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์— ๋Œ€ํ•œ ๊ตญ๊ฐ€๊ด€ํ• ๊ถŒ 60 (3) ์˜ํ† ์ฃผ๊ถŒ์นจํ•ด๋ฅผ ๊ตฌ์„ฑํ•˜๋Š” ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ 63 4) ๊ตญ๋‚ด๋ฌธ์ œ๋ถˆ๊ฐ„์„ญ์›์น™ 70 (1) ๊ตญ๋‚ด๋ฌธ์ œ๋ถˆ๊ฐ„์„ญ์›์น™์˜ ๊ฐœ๋…๊ณผ ์š”๊ฑด 70 (2) ์ฃผ๊ถŒ๋ฌธ์ œ์— ๋Œ€ํ•œ ๊ฐ„์„ญ์— ํ•ด๋‹นํ•˜๋Š” ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ 72 (3) ๊ฐ•์ œ์  ๊ฐ„์„ญ์˜ ์˜๋ฏธ์™€ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์—์˜ ์ ์šฉ 75 (4) ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์˜ ๊ฐ•๋„์™€ ๊ฐ•์ œ์„ฑ ํŒ๋‹จ๊ธฐ์ค€ 85 5) ์ ์šฉ์ƒ์˜ ํ•œ๊ณ„ 89 2. ์กฐ์•ฝ 90 1) ํ•ญ๊ณต๋ถ„์•ผ ๊ด€๋ จ์กฐ์•ฝ 91 2) ํ•ด์ƒ๋ถ„์•ผ ๊ด€๋ จ์กฐ์•ฝ 92 3) ํ•ต ๊ด€๋ จ ์กฐ์•ฝ 93 4) ๊ธฐํƒ€ ๋‹ค์ž์กฐ์•ฝ 94 5) ์ ์šฉ์ƒ์˜ ํ•œ๊ณ„ 96 ์ œ 2 ์ ˆ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์˜ ํŠน์„ฑ๊ณผ ํ˜„ ์ฒด์ œ์˜ ํ•œ๊ณ„ 99 1. ๊ท€์†์„ฑ๊ธฐ์ค€ ์ค‘์‹ฌ ๋…ผ์˜์˜ ํ•œ๊ณ„ 99 1) ๊ตญ๊ฐ€๊ท€์†์„ฑ ๋ฒ•๋ฆฌ์ ์šฉ์˜ ํ•œ๊ณ„ 100 2) ํ–‰์œ„์žํ™•์ธ์›์น™์˜ ํ•„์š”์„ฑ 104 2. ๋น„๊ตญ๊ฐ€ํ–‰์œ„์ž ๊ทœ์œจ๋ฐฉ์•ˆ์˜ ๋ถ€์žฌ 108 1) ์ฃผ์š”ํ–‰์œ„์ž ๋˜๋Š” ๋Œ€๋ฆฌ์ž๋กœ์„œ์˜ ๋น„๊ตญ๊ฐ€ํ–‰์œ„์ž 108 2) ๋น„๊ตญ๊ฐ€ํ–‰์œ„์ž ๊ทœ์œจ์— ์žˆ์–ด์„œ์˜ ํ•œ๊ณ„ 112 3) ์ƒ๋‹นํ•œ ์ฃผ์˜ ์˜๋ฌด์˜ ์ ์šฉ๊ฐ€๋Šฅ์„ฑ 120 4) ์ƒˆ๋กœ์šด ๋Œ€์•ˆ์˜ ํ•„์š”์„ฑ 125 ์ œ 4 ์žฅ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ์˜ ๊ตญ์ œ๋ฒ•์  ๊ทœ์œจ์— ๊ด€ํ•œ ๋…ผ์˜์™€ ์‹คํ–‰ 127 ์ œ 1 ์ ˆ ๊ตญ์ œ๋ฒ• ์ฐจ์›์˜ ๋…ผ์˜ 127 1. ๋Ÿฌ์‹œ์•„ยท์ค‘๊ตญ์ง„์˜์˜ ์ž…์žฅ 128 2. ๋ฏธ๊ตญ ๋ฐ ์„œ๋ฐฉ์ง„์˜์˜ ์ž…์žฅ 137 3. ์†Œ๊ฒฐ 143 ์ œ 2 ์ ˆ ๊ฐ๊ตญ์˜ ๋Œ€์‘์ „๋žต 147 1. ๋ฏธ๊ตญ 147 2. ์˜๊ตญ 154 3. ์ค‘๊ตญ 159 4. ๋Ÿฌ์‹œ์•„ 162 5. ๊ธฐํƒ€ ๊ตญ๊ฐ€๋“ค 167 6. ์†Œ๊ฒฐ 173 ์ œ 5 ์žฅ ์ ๊ทน์  ๋ฐฉ์–ด๊ฐœ๋…์˜ ์ ์šฉ๊ณผ ์žฅ๊ธฐ์  ์–ต์ง€๋ฅผ ์œ„ํ•œ ๋‹ค์ž์ฒด์ œ ๊ตฌ์ถ• 175 ์ œ 1 ์ ˆ ์ ๊ทน์  ๋ฐฉ์–ด๊ฐœ๋… ์ ์šฉ์˜ ํ•„์š”์„ฑ 175 1. ์‹คํšจ์  ๊ทœ์œจ๋ฐฉ์•ˆ ๋„์ž…์˜ ํ•„์š”์„ฑ 175 1) ์ฆ‰๊ฐ์  ์–ต์ง€์™€ ์žฅ๊ธฐ์  ์–ต์ง€๊ฐœ๋…์˜ ๋ถ„๋ฆฌ 175 2) ํ˜„์žฌ ๋…ผ์˜์— ๋Œ€ํ•œ ๋น„ํŒ 178 3) ๋ฏผ๊ฐ„๊ธฐ์—…๋“ค์˜ ์ž๊ตฌ์กฐ์น˜ ๊ทœ์ œ 181 2. ์ ๊ทน์  ๋ฐฉ์–ด์˜ ๊ฐœ๋…๊ณผ ํŠน์„ฑ 186 1) ์ ๊ทน์  ๋ฐฉ์–ด์˜ ์ •์˜ 186 2) ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ ์–ต์ง€ํšจ๊ณผ 189 3) ๊ตญ์ œ๋ฒ•์  ๋ฌธ์ œ์  195 3. ๊ตญ์ œ๋ฒ• ๊ฐœ๋…๊ณผ์˜ ๋น„๊ต 200 1) ๊ณต๊ฒฉ๊ฑฐ์ ์˜ ์ถ”์ ๊ณผ ๊ท€์†์˜ ์ฐจ์ด 200 2) ๋Œ€์‘์‹œ๊ธฐ์™€ ์กฐ์น˜์‹คํ–‰ ํŒ๋‹จ๊ธฐ์ค€์˜ ์ฐจ์ด 202 3) ์ž์œ„๊ถŒ 204 4) ์˜ˆ๋ฐฉ์  ์ž์œ„๊ถŒ 208 5) ๋Œ€์‘์กฐ์น˜ 211 6) ๊ธด๊ธ‰ํ”ผ๋‚œ 214 7) ์ ๊ทน์  ๋ฐฉ์–ด๊ฐœ๋…์˜ ๊ตญ์ œ๋ฒ•์  ์ ์šฉ 217 (1) ์ž์œ„๊ถŒ๊ณผ ๋Œ€์‘์กฐ์น˜์˜ ํ™•๋Œ€์ ์šฉ๊ฐ€๋Šฅ์„ฑ 220 (2) ๊ธด๊ธ‰ํ”ผ๋‚œ์˜ ํ™•๋Œ€์ ์šฉ๊ฐ€๋Šฅ์„ฑ 224 (3) ์†Œ๊ฒฐ 228 ์ œ 2 ์ ˆ ์ƒˆ๋กœ์šด ์ฒด์ œ ๊ตฌ์ถ•์„ ํ†ตํ•œ ์‚ฌ์ด๋ฒ„๊ณต๊ฒฉ ์–ต์ง€ 230 1. ๋‹ค์ž์กฐ์•ฝ์ฒด์ œ๋ฅผ ํ†ตํ•œ ๊ทœ์œจ์˜ ํ•„์š”์„ฑ 230 2. ์ ๊ทน์  ๋ฐฉ์–ด์ฒด์ œ์˜ ๊ตฌ์ถ•: ์ฆ‰๊ฐ์  ์–ต์ง€์ „๋žต์˜ ์ˆ˜๋ฆฝ 232 3. ์‚ฌํ›„์ฑ…์ž„์ถ”๊ถ์ฒด์ œ๋ฅผ ํ†ตํ•œ ์žฅ๊ธฐ์  ๋Œ€์‘ 244 ์ œ 6 ์žฅ ๊ฒฐ๋ก  250 ์ฐธ๊ณ ๋ฌธํ—Œ 256 Abstract 284Docto

    ํ•˜์ดํ…Œํฌ ์ „์Ÿ: ์ค‘๊ตญ์˜ ๋ถ€์ƒ์— ๋Œ€์‘ํ•˜๋Š” ๋ฏธ๊ตญ์˜ ์‚ฌ์ด๋ฒ„ ์•ˆ๋ณด์— ๊ด€ํ•œ ์—ฐ๊ตฌ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๊ตญ์ œ๋Œ€ํ•™์› ๊ตญ์ œํ•™๊ณผ, 2017. 8. Jiyeoun Song.The United States hegemony is challenged by China. With Chinas economic and military rise, it is inevitable a power transition will take place. In this power transition from the United States to China, the use of cyberspace will be prevalent. This thesis proposes the United States public and private sector should form a partnership that uses a multifaceted approach in protecting its interests against China. The tenets of the multifaceted approach are: 1. Dialogue between the United States government and private sector which involves inviting private sector leaders to discuss pervasive issues in cyber security2. Create special commission on cyber security that passes legislation to update and protect cyber security of the public and private sector3. Reanalyze open source and consider block chain and create a comprehensive crisis management plan4. Honor the U.S.-China cyber agreement and discuss the importance of cyber security with Chinese stakeholders5. Punish Chinese citizens who engage in espionage and push for international law for cybersecurity. This multifaceted approach is a strategy that would enhance U.S. cyber defense and protect its vital interests against a rival China.1. Introduction 1 1. 1 Research Question 6 2. Background 8 2.1 Power Transition: United States and China 8 2.2 Cyberspace and Chinese Cyber Attacks 13 3. Previous Studies 20 4. Analysis 28 4.1 Statistics of Chinese cyber attacks 28 4.2 Titan Rain 33 4.3 Operation Aurora 37 5. U.S.- China Cyber agreement 42 6. Recommendations 46 6.1 Private and Public Sector Dialogue 46 6.2 United States Cybersecurity Special Committee and Cybersecurity Legislation 48 6.3 Block chain and a Crisis Management Plan 49 6.4 Honor the U.S.- China Cyber agreement and engage in dialogue 50 6.5 Punishment and International Law 52 7. Conclusion and Limitations 54 7.1. Limitations 54 7.2 Conclusion 55 References 57 Korean Abstract 63Maste

    ์ธ๋„-ํƒœํ‰์–‘ ์ง€์—ญ ๊ทœ์น™๊ธฐ๋ฐ˜ ์งˆ์„œ ์˜นํ˜ธ์ž๋กœ์„œ์˜ ์ดํ•ด๊ด€๊ณ„์™€ ์—ญํ• 

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์‚ฌํšŒ๊ณผํ•™๋Œ€ํ•™ ์ •์น˜์™ธ๊ตํ•™๋ถ€(์™ธ๊ตํ•™์ „๊ณต), 2021. 2. ๊น€์ƒ๋ฐฐ.This study aims to examine Australiaโ€™s foreign policy on cyber security in the Indo-Pacific and shed light on the structural factors and perceptions that existed behind Australiaโ€™s diplomatic behaviour. In 2016, amid the escalating U.S.-China strategic competition in cyberspace and the cyber attacks mounted by China, Australia declared the preservation of โ€˜an open, free and secure Internet in the Indo-Pacificโ€™ to be a national interest and has consistently strived to strengthen bilateral and multilateral cyber security cooperation with other like-minded countries in the region, including the member states of the Five-Eyes intelligence alliance, ASEAN, and the Pacific Islands Forum. The country, on the other hand, has condemned Chinaโ€™s unlawful activities in cyberspace and accused the Chinese Communist Party of committing cyber attacks and interference against Australia. There are three aspects of such behaviour that attract academic attention. First, Australia has articulated that its foreign policy on cyber security is a regional approach focusing on the Indo-Pacific region, rather than a global one. Secondly, in spite of its heavy economic dependency on China, the country has begun to keep a distance from China in the domain of cyber security, while strengthening its links to the United States. Lastly, in order to alleviate the threat of cyber attacks and interference originated from China, Australia has strived to strengthen cyber security cooperation with other like-minded countries in the Indo-Pacific rather than relying solely on its security ties with the United States. Considering these aspects, this study seeks to answer the following questions: Why has Australia formulated its foreign policy on cyber security within the Indo-Pacific geopolitical framework? Why has the country became inclined to be pitted against the Chinese government in the domain of cyber security, at the expense of putting its longstanding economic relationship with China at risk? Why and how has the country utilised its intelligence alliance and bilateral/multilateral relationships with other neighbouring countries to promote regional cooperation in the cyber security sector? The study argues that there are two major motivations behind Australiaโ€™s approach. First, Australia has aimed to promote regional cooperation to build a rules-based cyberspace order in the Indo-Pacific in order to alleviate the pressure of US-China strategic competition and the threat of Chinese cyber attacks and interference. Second, the country has attempted to use cyberspace as an area for niche diplomacy to consolidate its position as a strategic broker and maximise its leverage in the Indo-Pacific regionโ€™s geostrategic environment. In this regard, Australiaโ€™s approach has some distinctive characteristics of middle power diplomacy. In order to support the argument, the study uses network theories to analyse Australiaโ€™s foreign policy on cyber security while focusing on the structural position and role of middle powers in a relational structure, or network, constructed around specific issues. A few notions from three network theories are adopted in particular: 1) โ€˜structureโ€™ and โ€˜structural holeโ€™ from Social Network theory are adopted to analyse Australiaโ€™s position and role in a network constructed around the regional cyberspace; 2) Network Organisation theory is partially applied to examine how the Australian government has defined its national interests and induced other domestic actors to support its cyber security-related policies and regulations; 3) โ€˜transition strategyโ€™ from Actor-Network Theory is adopted to demonstrate how Australia has induced and attracted other like-minded countries to participate in and promote regional cooperation in the cyber security sector. A major implication of this study is that non-great power diplomacy, or more specifically middle power diplomacy, is not necessarily restrained by individual countriesโ€™ attributes and capabilities, and may not always be entirely subordinate to the international system based on power distribution. Middle powers can arguably overcome their limited national strength and further enhance their international influence if they understand the relational configuration of a network in which they interact with other actors, and bridge the cleavages within the network. It is therefore important for middle powers to grasp how other like-minded countries perceive certain issues, and to subjugate their own national interests to the interests of others.๋ณธ ์—ฐ๊ตฌ๋Š” ์ธ๋„-ํƒœํ‰์–‘ ์ง€์—ญ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์„ ์ค‘์‹ฌ์œผ๋กœ ๋ฏธ๊ตญ๊ณผ ์ค‘๊ตญ์ด ๋ฒŒ์ด๋Š” ์ „๋žต๊ฒฝ์Ÿ ์†์—์„œ ์ค‘๊ฒฌ๊ตญ ํ˜ธ์ฃผ๊ฐ€ ์ „๊ฐœํ•ด์˜จ ์™ธ๊ต์ „๋žต์˜ ์‚ฌ๋ก€๋ฅผ ๋ณตํ•ฉ ๋„คํŠธ์›Œํฌ ์ด๋ก ์˜ ์‹œ๊ฐ์—์„œ ๋ถ„์„ํ•จ์œผ๋กœ์จ ์‚ฌ์ด๋ฒ„ ์•ˆ๋ณด ๋ถ„์•ผ์—์„œ์˜ ํ˜ธ์ฃผ์˜ ์™ธ๊ต์  ํ–‰ํƒœ๋ฅผ ๋นš์–ด๋‚ธ ๊ตฌ์กฐ์  ์š”์ธ๊ณผ ํ–‰์œ„์ž์˜ ์ธ์‹ ๊ทธ๋ฆฌ๊ณ  ์‹ค์งˆ์ ์ธ ์ „๋žต ์ถ”์ง„๊ณผ์ •์ด ๋ฌด์—‡์ธ์ง€ ๋ฐํ˜€๋‚ด๋Š” ๊ฒƒ์„ ๋ชฉ์ ์œผ๋กœ ํ•œ๋‹ค. ์ธ๋„-ํƒœํ‰์–‘ ์ง€์—ญ์„ ์ค‘์‹ฌ์œผ๋กœ ํ•˜๋Š” ๋ฏธ์ค‘ ์ „๋žต๊ฒฝ์Ÿ์ด ์ง€์ •ํ•™์  ์ฐจ์›์„ ๋„˜์–ด ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์œผ๋กœ๊นŒ์ง€ ํ™•๋Œ€๋˜๋Š” ์ƒํ™ฉ์—์„œ ์ค‘๊ตญ์˜ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ๊ณผ ๋‚ด์ •๊ฐ„์„ญ ์œ„ํ˜‘์„ ๋ฐ›์•„์˜จ ํ˜ธ์ฃผ๋Š” 2016๋…„ ๋“ค์–ด ๋ณธ๊ฒฉ์ ์œผ๋กœ โ€˜์ธ๋„-ํƒœํ‰์–‘ ์ง€์—ญ์˜ ๊ฐœ๋ฐฉ์ ์ด๊ณ , ์ž์œ ๋กญ๊ณ , ์•ˆ์ „ํ•œ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„โ€™ ๊ตฌ์ถ•์„ ํ•ต์‹ฌ ๊ตญ์ต์œผ๋กœ ๊ณตํ‘œํ•˜๊ณ  ์—ญ๋‚ด ์œ ์‚ฌ์ž…์žฅ ๊ตญ๊ฐ€๋“ค, ํŠนํžˆ ๋ฏธ๊ตญ์ด ์ฃผ๋„ํ•˜๋Š” ํŒŒ์ด๋ธŒ ์•„์ด์ฆˆ ์ •๋ณด๋™๋งน, ์•„์„ธ์•ˆ, ํƒœํ‰์–‘๋„์„œ๊ตญํฌ๋Ÿผ ํšŒ์›๊ตญ๋“ค๊ณผ ์–‘์ž์ ยท๋‹ค์ž์  ์‚ฌ์ด๋ฒ„ ์•ˆ๋ณด ํ˜‘๋ ฅ๊ด€๊ณ„๋ฅผ ๊ฐ•ํ™”ํ•ด์™”๋‹ค. ๋ฐ˜๋ฉด์— ์ž๊ตญ์— ๋Œ€ํ•œ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ๊ณผ ๋‚ด์ •๊ฐœ์ž…์˜ ๊ฐ€ํ•ด๊ตญ์œผ๋กœ ์ง€๋ชฉ๋œ ์ค‘๊ตญ์„ ๋ฐ˜(ๅ)๊ทœ๋ฒ”์  ๊ตญ๊ฐ€๋กœ ๊ทœ์ •ํ•˜๊ณ  ๋Œ€๋ฆฝ๊ฐ์„ ์„ธ์šฐ๋Š” ๋ชจ์Šต์„ ๋ณด์˜€๋‹ค. ํ˜ธ์ฃผ์˜ ์ด๋Ÿฌํ•œ ์™ธ๊ต์  ํ–‰ํƒœ๋Š” ์„ธ ๊ฐ€์ง€ ์ธก๋ฉด์—์„œ ํฅ๋ฏธ๋กญ๋‹ค. ์ฒซ์งธ, ํ˜ธ์ฃผ๋Š” ์ž๊ตญ์ด ์ง€ํ–ฅํ•˜๋Š” ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„๊ณผ ํ™˜๊ฒฝ์„ ์ง€์ •ํ•™์  ๊ณต๊ฐ„์ธ ์ธ๋„-ํƒœํ‰์–‘ ์ง€์—ญ ๊ฐœ๋…๊ณผ ์—ฐ๊ฒฐ ์ง€์–ด ์ถ”๊ตฌํ•ด์™”๊ณ , ๋‘˜์งธ, ์‚ฌ์ด๋ฒ„ ์•ˆ๋ณด ๋ถ„์•ผ์—์„œ ์ฒ˜์Œ์œผ๋กœ ๋ฏธ๊ตญ๊ณผ์˜ ์—ฐ๋Œ€๋ฅผ ๊ฐ•ํ™”ํ•ด ์ค‘๊ตญ์„ ๋ฐ€์–ด๋‚ด๋Š” ์—ฐ๋ฏธ๊ธฐ์ค‘ ๊ธฐ์กฐ๋ฅผ ๋ณด์ด๊ธฐ ์‹œ์ž‘ํ•˜์˜€์œผ๋ฉฐ, ๋งˆ์ง€๋ง‰์œผ๋กœ, ์ž๊ตญ์— ๋Œ€ํ•œ ์ค‘๊ตญ์˜ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ๊ณผ ๋‚ด์ •๊ฐ„์„ญ ์œ„ํ˜‘์„ ์ฐจ๋‹จํ•˜๊ธฐ ์œ„ํ•ด ๋ฏธ๊ตญ ์ฃผ๋„์˜ ์ •๋ณด๋™๋งน์— ์ „์ ์œผ๋กœ ์˜์กดํ•˜๊ธฐ๋ณด๋‹ค๋Š” ์ง€์—ญ ์ฐจ์›์˜ ๋‹ค์žํ˜‘๋ ฅ์„ ์ถ”๋™ํ•˜๋Š” ์ „๋žต์„ ์ „๊ฐœํ•ด์™”๋‹ค. ๋”ฐ๋ผ์„œ ๋ณธ ์—ฐ๊ตฌ๋Š” ์™œ ํ˜ธ์ฃผ๊ฐ€ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์˜ ์งˆ์„œ๋ฅผ ์ง€์ •ํ•™์  ๊ณต๊ฐ„์ธ ์ธ๋„-ํƒœํ‰์–‘ ์ง€์—ญ ๊ฐœ๋…๊ณผ ์—ฐ๊ฒฐ ์ง€์–ด ์ถ”๊ตฌํ•ด์™”์œผ๋ฉฐ, ์™œ ๊ธฐ์กด์˜ ์ค‘๊ตญ ์ค‘์‹œ ์™ธ๊ต ๊ธฐ์กฐ๋ฅผ ๋”ฐ๋ฅด์ง€ ์•Š๊ณ  ์ค‘๊ตญ๊ณผ ๋Œ€๋ฆฝํ•˜๋Š” ๋ชจ์Šต์„ ๋ณด์˜€๋Š”์ง€, ๊ทธ๋ฆฌ๊ณ  ์–ด๋–ค ์ด์œ ์—์„œ ์ •๋ณด๋™๋งน๊ณผ ์–‘์žยท๋‹ค์žํ˜‘๋ ฅ์„ ๋ณตํ•ฉ์ ์œผ๋กœ ํ™œ์šฉํ•˜์—ฌ ์ง€์—ญ์  ๋‹ค์žํ˜‘๋ ฅ์„ ์ถ”๋™ํ•˜๋Š” ์™ธ๊ต์ „๋žต์„ ์ „๊ฐœํ•˜์˜€์œผ๋ฉฐ ์ด๋ฅผ ์–ด๋–ป๊ฒŒ ์ถ”์ง„ํ•˜์˜€๋Š”๊ฐ€ ํ•˜๋Š” ์—ฐ๊ตฌ ์งˆ๋ฌธ์„ ์ œ์‹œํ•œ๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋Š” ์‚ฌ์ด๋ฒ„ ์•ˆ๋ณด ๋ถ„์•ผ ํ˜ธ์ฃผ์˜ ์™ธ๊ต์ „๋žต์„ ๋‹จ์ˆœํžˆ ๊ท ํ˜• ๋…ผ๋ฆฌ์— ๋”ฐ๋ฅธ ๋ฐ˜์ค‘๊ตญ ์ „๋žต์œผ๋กœ ๋ณผ ์ˆ˜ ์—†๋‹ค๋Š” ๋ฌธ์ œ์˜์‹์„ ๋ฐ”ํƒ•์œผ๋กœ ํ˜ธ์ฃผ์˜ ์ „๋žต์ด ํฌ๊ฒŒ ๋‘ ๊ฐ€์ง€ ์˜๋„์—์„œ ๋น„๋กฏ๋˜์—ˆ๋‹ค๊ณ  ์ฃผ์žฅํ•œ๋‹ค. ์ฒซ์งธ, ํ˜ธ์ฃผ๋Š” ๋ฏธ์ค‘ ์ „๋žต๊ฒฝ์Ÿ์˜ ์••๋ฐ•์„ ์™„ํ™”ํ•˜๊ณ  ์ค‘๊ตญ์˜ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ ๋ฐ ๋‚ด์ •๊ฐ„์„ญ ์œ„ํ˜‘์—์„œ ๋ฒ—์–ด๋‚˜๊ณ ์ž ์ง€์—ญ ์ฐจ์›์˜ ๋‹ค์ž์  ์•ˆ๋ณดํ˜‘๋ ฅ์„ ์ถ”๋™ํ•˜์—ฌ ๊ทœ๋ฒ”, ๊ทœ์น™, ์ œ๋„์— ๊ธฐ์ดˆํ•œ ์‚ฌ์ด๋ฒ„ ์งˆ์„œ๋ฅผ ๋„๋ชจํ•˜๋Š” ์„ ์ œ์ , ๊ทœ๋ฒ”์  ์ค‘๊ฒฌ๊ตญ ์™ธ๊ต๋ฅผ ์ถ”๊ตฌํ•ด์™”๋‹ค. ๋‘˜์งธ, ํ˜ธ์ฃผ๋Š” ์ธ๋„-ํƒœํ‰์–‘ ์ง€์—ญ ์งˆ์„œ๊ฐ€ ์žฌํŽธ๋˜์–ด๊ฐ€๋Š” ๊ตญ์ œ๊ด€๊ณ„์˜ ๊ตฌ์กฐ ์†์—์„œ ํ•ต์‹ฌ์ ์ธ ์ค‘๊ฐœ์ž๋กœ์„œ ์ž๊ตญ์˜ ์˜ํ–ฅ๋ ฅ์„ ํ™•๋Œ€ํ•˜๊ธฐ ์œ„ํ•ด ์‚ฌ์ด๋ฒ„ ์•ˆ๋ณด ๋ถ„์•ผ๋ฅผ ํ‹ˆ์ƒˆ ์™ธ๊ต์˜ ์žฅ์œผ๋กœ ์„ ํƒํ•˜์—ฌ ์ค‘๊ฒฌ๊ตญ ์™ธ๊ต๋ฅผ ์ „๊ฐœํ•ด์™”๋‹ค. ์ด๋Ÿฌํ•œ ๋…ผ์ง€๋ฅผ ๋’ท๋ฐ›์นจํ•˜๊ธฐ ์œ„ํ•ด ๋ณธ ์—ฐ๊ตฌ๋Š” ํŠน์ • ์ด์Šˆ๋ฅผ ์ค‘์‹ฌ์œผ๋กœ ํ˜•์„ฑ๋œ ๊ตฌ์กฐ์—์„œ ์ค‘๊ฒฌ๊ตญ์ด ๊ฐ–๋Š” ๊ตฌ์กฐ์  ์œ„์น˜์™€ ์—ญํ• , ์ฆ‰ โ€˜๊ตฌ์กฐ์  ์œ„์น˜๋ก ์˜ ๋ณ€์ˆ˜โ€™์— ์ฃผ๋ชฉํ•˜๋Š” ๋ณตํ•ฉ ๋„คํŠธ์›Œํฌ ์ด๋ก ์„ ์›์šฉํ•˜๊ณ ์ž ํ•œ๋‹ค. ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์„ ์ค‘์‹ฌ์œผ๋กœ ํ˜•์„ฑ๋œ ์ง€์—ญ ์ฐจ์›์˜ ๊ตฌ์กฐ ์•ˆ์—์„œ ํ˜ธ์ฃผ์˜ ์œ„์น˜์™€ ์—ญํ• ์„ ํŒŒ์•…ํ•˜๊ธฐ ์œ„ํ•ด ์†Œ์…œ ๋„คํŠธ์›Œํฌ ์ด๋ก ์˜ โ€˜๊ตฌ์กฐโ€™์™€ โ€˜๊ตฌ์กฐ์  ๊ณต๋ฐฑโ€™์˜ ๊ฐœ๋…์„ ์›์šฉํ•˜๊ณ , ํ˜ธ์ฃผ ์—ฐ๋ฐฉ์ •๋ถ€๊ฐ€ ๊ตญ์ต์„ ์ƒˆ๋กญ๊ฒŒ ๊ทœ์ •ํ•ด๋‚˜๊ฐ„ ๊ณผ์ •๊ณผ ์—ฐ๋ฐฉ์ •๋ถ€์˜ ์‚ฌ์ด๋ฒ„ ์•ˆ๋ณด ๊ด€๋ จ ์ •์ฑ… ๋ฐ ๋ฒ•์•ˆ ์ถ”์ง„์— ๋Œ€ํ•œ ๊ตญ๋‚ด์  ํ•ฉ์˜์˜ ๊ณผ์ •์„ ์„ค๋ช…ํ•˜๊ธฐ ์œ„ํ•ด ๋„คํŠธ์›Œํฌ ์กฐ์ง์ด๋ก ์„ ๋ถ€๋ถ„์ ์œผ๋กœ ์›์šฉํ•  ๊ฒƒ์ด๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ ํ˜ธ์ฃผ๊ฐ€ ๊ฐœ๋ฐฉ์ ์ด๊ณ , ์ž์œ ๋กญ๊ณ , ์•ˆ์ „ํ•œ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„ ๊ตฌ์ถ•์„ ์œ„ํ•œ ์ง€์—ญ ์ฐจ์›์˜ ๋‹ค์žํ˜‘๋ ฅ์„ ์ถ”๋™ํ•ด์˜จ ๊ณผ์ •์„ ์ดํ•ดํ•˜๊ธฐ ์œ„ํ•ด ํ–‰์œ„์ž-๋„คํŠธ์›Œํฌ ์ด๋ก ์—์„œ ๋งํ•˜๋Š” โ€˜๋ฒˆ์—ญโ€™์˜ ํ‹€์„ ํ™œ์šฉํ•˜๊ณ ์ž ํ•œ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์˜ ํ•จ์˜๋Š” ๋น„(้ž)๊ฐ•๋Œ€๊ตญ, ํŠนํžˆ ์ค‘๊ฒฌ๊ตญ์˜ ์™ธ๊ต๊ฐ€ ๊ทธ ๊ตญ๊ฐ€์˜ ์ž์›์ด๋‚˜ ์†์„ฑ ๊ทธ๋ฆฌ๊ณ  ์„ธ๋ ฅ๋ถ„ํฌ์— ์˜ํ•œ ๊ตญ์ œ์ •์น˜ ๊ตฌ์กฐ์— ๋ฌด์กฐ๊ฑด ๊ตฌ์†๋˜๋Š” ๊ฒƒ์€ ์•„๋‹ˆ๋ผ๋Š” ์ ์„ ๋ฐํ˜€๋‚ธ ๋ฐ ์žˆ๋‹ค. ์ฆ‰, ๋ฌผ์งˆ์  ๊ตญ๋ ฅ๊ณผ ๊ตญ์ œ์  ์˜ํ–ฅ๋ ฅ์˜ ์ธก๋ฉด์—์„œ ๊ฐ•๋Œ€๊ตญ์— ๋น„ํ•ด ์ƒ๋Œ€์ ์œผ๋กœ ๋ถˆ๋ฆฌํ•  ์ˆ˜๋ฐ–์— ์—†๋Š” ๋น„๊ฐ•๋Œ€๊ตญ์ผ์ง€๋ผ๋„ ํŠน์ • ์ด์Šˆ๋ฅผ ์ค‘์‹ฌ์œผ๋กœ ์—ฌ๋Ÿฌ ํ–‰์œ„์ž๊ฐ€ ์ƒํ˜ธ์ž‘์šฉํ•˜๋ฉฐ ๋งŒ๋“ค์–ด๋‚ด๋Š” ๊ด€๊ณ„์  ๊ตฌ๋„๋ฅผ ์ „๋žต์ ์œผ๋กœ ํŒŒ์•…ํ•˜๊ณ , ๊ฑฐ๊ธฐ์„œ ๋ฐœ๊ฒฌ๋˜๋Š” ๊ณต๋ฐฑ์ด๋‚˜ ํ‹ˆ์ƒˆ ํ˜น์€ ๊ด€๊ณ„์˜ ๋‹จ์ ˆ์„ ๋ฉ”์šฐ๊ฑฐ๋‚˜ ์ž‡๋Š” ์ค‘๊ฐœ์ž๊ฐ€ ๋œ๋‹ค๋ฉด ๋ฌผ์งˆ์  ๊ตญ๋ ฅ์˜ ํ•œ๊ณ„๋ฅผ ๊ทน๋ณตํ•ด ์˜ํ–ฅ๋ ฅ์„ ํ‚ค์›Œ๋‚˜๊ฐˆ ์ˆ˜ ์žˆ์Œ์„ ๋ณด์ด๋Š” ๋ฐ ์žˆ๋‹ค. ๋”๋ถˆ์–ด ์ค‘๊ฒฌ๊ตญ์ด ์ž์‹ ๊ณผ ๋น„์Šทํ•œ ์ƒํ™ฉ์— ๋†“์—ฌ ์žˆ๋Š” ์œ ์‚ฌ์ž…์žฅ ๊ตญ๊ฐ€๋“ค์˜ ์œ„ํ˜‘์ธ์‹๊ณผ ์ดํ•ด๊ด€๊ณ„๋ฅผ ํŒŒ์•…ํ•˜๊ณ , ์ด๋“ค ๊ตญ๊ฐ€์™€ ๊ณต์œ ํ•  ์ˆ˜ ์žˆ๋Š” ์ƒํ˜ธ์ด์ต์— ์ž์‹ ์˜ ๋ฐฐํƒ€์  ๊ตญ์ต์„ ์ ‘๋ชฉ์‹œ์ผœ ํ•จ๊ป˜ ์ถ”๊ตฌํ•  ๋•Œ ์™ธ๊ต์  ์„ฑ๊ณผ๋ฅผ ๊ฑฐ๋‘˜ ์ˆ˜ ์žˆ์Œ์„ ๋ณด์ด๊ณ ์ž ํ•œ๋‹ค.์ œโ… ์žฅ. ์„œ๋ก  1 1. ๋ฌธ์ œ ์ œ๊ธฐ 1 2. ์„ ํ–‰์—ฐ๊ตฌ๊ฒ€ํ†  4 3. ๋ถ„์„ํ‹€ ๋ฐ ํ•ต์‹ฌ ์ฃผ์žฅ 7 1) ๊ตฌ์กฐ๋กœ์„œ์˜ ๋„คํŠธ์›Œํฌ์™€ ๊ตฌ์กฐ์  ๊ณต๋ฐฑ 11 2) ์กฐ์ง ์›๋ฆฌ๋กœ์„œ์˜ ๋„คํŠธ์›Œํฌ 12 3) ์˜ํ–ฅ๋ ฅ ํ™•์žฅ์˜ ๊ณผ์ •์œผ๋กœ์„œ์˜ ๋„คํŠธ์›Œํฌ 13 4. ์—ฐ๊ตฌ ๋ฐฉ๋ฒ• ๋ฐ ์ž๋ฃŒ 14 5. ๋…ผ๋ฌธ์˜ ๊ตฌ์„ฑ 16 ์ œโ…ก์žฅ. ์ธ๋„-ํƒœํ‰์–‘ ์ง€์—ญ์˜ ๋ถ€์ƒ๊ณผ ํ˜ธ์ฃผ์˜ ์™ธ๊ต 18 1. ์ธ๋„-ํƒœํ‰์–‘ ์ง€์—ญ์˜ ๋ถ€์ƒ 18 2. ํ˜ธ์ฃผ์˜ ์œ„ํ˜‘์ธ์‹๊ณผ ์ „๋žต์  ์ดํ•ด๊ด€๊ณ„ 23 1) ์ง€์ •ํ•™์  ์œ„ํ˜‘์ธ์‹ 23 2) ์ „๋žต์  ์ดํ•ด๊ด€๊ณ„ 27 3. ์ง€์ •ํ•™์  ๋ฌด๋Œ€์—์„œ์˜ ํ˜ธ์ฃผ์˜ ์ธ๋„-ํƒœํ‰์–‘ ์ „๋žต 34 1) ์ฟผ๋“œ ๊ตฌ์„ฑ๊ตญ๋“ค๊ณผ์˜ ์•ˆ๋ณดํ˜‘๋ ฅ 35 2) ์•„์„ธ์•ˆ ํšŒ์›๊ตญ๋“ค๊ณผ์˜ ์•ˆ๋ณดํ˜‘๋ ฅ 38 3) ํƒœํ‰์–‘๋„์„œ๊ตญํฌ๋Ÿผ ํšŒ์›๊ตญ๋“ค๊ณผ์˜ ์•ˆ๋ณดํ˜‘๋ ฅ 40 ์ œโ…ข์žฅ. ์ธ๋„-ํƒœํ‰์–‘ ์ง€์—ญ ์‚ฌ์ด๋ฒ„ ์งˆ์„œ ํ˜•์„ฑ๊ตฌ์กฐ 43 1. ์‚ฌ์ด๋ฒ„ ์•ˆ๋ณด ๋ถ„์•ผ์—์„œ์˜ ๋ฏธ์ค‘ ๊ฒฝ์Ÿ๊ณผ ์•ˆ๋ณด์œ„ํ˜‘ ์ฆ๊ฐ€ 43 2. ์‚ฌ์ด๋ฒ„ ์•ˆ๋ณด์˜ ์งˆ์„œ ํ˜•์„ฑ๊ตฌ์กฐ์™€ ๊ตฌ์กฐ์  ๊ณต๋ฐฑ 49 ์ œโ…ฃ์žฅ. ํ˜ธ์ฃผ์˜ ๊ตญ์ต ์„ค์ •๊ณผ ๊ตญ๋‚ด์  ํ•ฉ์˜ 53 1. ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์—์„œ์˜ ๊ตญ์ต ๋ฐ ์—ญํ•  ์„ค์ • 53 2. ๊ตญ๋‚ด์ •์น˜์  ์ง€์ง€ ํ™•๋ณด 57 ์ œโ…ค์žฅ. ์‚ฌ์ด๋ฒ„ ์•ˆ๋ณด ๋ถ„์•ผ ํ˜ธ์ฃผ์˜ ์ค‘๊ฒฌ๊ตญ ์™ธ๊ต์ „๋žต 67 1. ์—ญ๋‚ด ๊ตญ๊ฐ€๋“ค์˜ ์ดํ•ด๊ด€๊ณ„ ํŒŒ์•… ๊ณผ์ • 68 2. ๊ด€๊ณ„์˜ ์ˆ˜๋ฆฝ๊ณผ ๋‹จ์ ˆ 70 3. ์–‘์ž ๋ฐ ๋‹ค์ž์  ์‚ฌ์ด๋ฒ„ ์•ˆ๋ณด ํ˜‘๋ ฅ๊ด€๊ณ„ ๊ตฌ์ถ• 75 4. ์งˆ์„œ ํ˜•์„ฑ๊ตฌ์กฐ์—์„œ ์˜ํ–ฅ๋ ฅ ํ™•์žฅ์˜ ์„ฑ๊ณผ 79 ์ œโ…ฅ์žฅ. ๊ฒฐ๋ก  85 ์ฐธ ๊ณ  ๋ฌธ ํ—Œ 88 Abstract 108Maste

    The Current Situation and Future Prospects of North Koreaโ€™s Internet Development under Kim Jong-un

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ๊ตญ์ œ๋Œ€ํ•™์› ๊ตญ์ œํ•™๊ณผ(ํ•œ๊ตญํ•™์ „๊ณต), 2021.8. ๋ฐ•ํƒœ๊ท .๋ถํ•œ์˜ ์ธํ„ฐ๋„ท์˜ ๋ฐœ์ „์€ ๊ณก์ ˆํ•˜๊ณ  ๋ฏธ๋ฌ˜ํ•˜๋Š” ๊ณผ์ •์„ ๊ฑฐ์ณค๋‹ค. ์‚ฌ์‹ค์ƒ 1990๋…„๋Œ€ ์ดˆ๋ฐ˜๋ถ€ํ„ฐ ๋ถํ•œ์ด ์ด๋ฏธ ์ธํ„ฐ๋„ท ๊ฑด์„ค์„ ์‹œ์ง๋˜์—ˆ์œผ๋ฉฐ ์ดํ›„์—๋„ ๊ฒŒ์† ์ธํ„ฐ๋„ท ๊ธฐ์ˆ ์„ ์ด‰์ง„ํ•ด์™”๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๋ถํ•œ ์ธํ„ฐ๋„ท ๋ฐœ์ „์— ์žˆ์–ด ์ฃผ๋ชฉํ•  ๋งŒํ•œ ์ ์€ ๊ตญ๋‚ด ์ฃผ์š” ๊ตญ๊ฐ€๊ธฐ๊ด€์„ ์ค‘์‹ฌ์œผ๋กœ ๊ทผ๊ฑฐ๋ฆฌํ†ต์‹ ๋ง์„ ๊ตฌ์ถ•ํ•˜๊ณ  ๋„คํŠธ์›Œํฌ ๊ฐ„ ํ†ต์‹ ์„ ํ•˜๋Š” ์ธํŠธ๋‚˜๋„ท ํ˜•ํƒœ์˜ ๋„คํŠธ์›Œํฌ์™€ ๋Œ€์™ธ๊ต๋ฅ˜ ๊ฐ€๋Šฅ์ผ€ ํ•˜๋Š” ๊ตญ์ œ ์ธํ„ฐ๋„ท์ด ๋ณ‘ํ–‰ํ•˜๋Š” ๊ตฌ์กฐ์ด๋‹ค. ๋™์‹œ์— ๋ถํ•œ ๋‹น๊ตญ์€ ์ธํ„ฐ๋„ท์„ ๋น„๋กฏํ•œ ์ •๋ณดํ†ต์‹  ์‚ฌ์—…์€ ๊ฒฝ์ œ๋ฐœ์ „๊ณผ ์ •์น˜์„ ์ „์„ ์œ„ํ•ด์„œ๋Š” ํ•„์ˆ˜์ ์ธ ๋ถ€๋ฌธ์ด๋ผ๊ณ  ๊ฐ„์ฃผํ•˜์ง€๋งŒ, ์ฒด์ œ์•ˆ์ •๊ณผ ํ†ต์น˜์—ญ๋Ÿ‰์— ์œ„ํ˜‘์œผ๋กœ ๋ณด๊ธฐ ๋•Œ๋ฌธ์— ๊ฐ•๋ ฅํ•œ ์ธํ„ฐ๋„ท ํ†ต์ œ๋ฅผ ํ–‰ํ•ด์™”๋‹ค. ์ฆ‰, ๋ถํ•œ์€ ์ธํ„ฐ๋„ท์— ๋Œ€ํ•œ ํ†ต์ œ์™€ ํ™œ์šฉ ์ „๋žต์„ ๋ณ‘ํ–‰ํ•˜๊ณ  ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์˜ ๋ชฉ์ ์€ ์„ธ๊ณ„ํ™” ๋ฐœ์ „ ๊ณผ์ • ์ค‘์˜ โ€˜์ธํ„ฐ๋„ท ์‹œ๋Œ€โ€™๋ผ๋Š” ๋ฐฐ๊ฒฝ ํ•˜์˜ ์ธํ„ฐ๋„ท ๋ฐœ์ „์˜ ๋ถˆ๊ฐ€์—ญ์„ฑ์—์„œ ์ถœ๋ฐœํ•˜์—ฌ ๋ถํ•œ์˜ ์ธํ„ฐ๋„ท ๋ฐœ์ „์˜ ์—ฐํ˜๊ณผ ํ˜„ํ™ฉ์„ ํŒŒ์•…ํ•œ ํ›„ ๋ถํ•œ์ด ์ธํ„ฐ๋„ท์„ ๊ฐœ๋ฐฉํ•˜์ง€ ์•Š๊ณ  ์žˆ์€ ์›์ธ๊ณผ ์ผํ›„์˜ ๊ฐœ๋ฐฉ ๊ฐ€๋Šฅ์„ฑ์„ ๊ณ ์ฐฐํ•˜๋Š” ๊ฒƒ์ด๋‹ค. ๊น€์ •์ผ ์ •๊ถŒ๋ถ€ํ„ฐ ๋ถํ•œ์ด ์ด๋ฏธ ์ธํ„ฐ๋„ท์„ ๋น„๋กฏํ•œ ์ •๋ณดํ†ต์‹  ์‚ฐ์—…์„ ์ค‘์š”์‹œํ•˜๊ธฐ ์‹œ์ž‘ํ•˜๋ฉด์„œ ์ „๋ฐฉ์œ„์ ์œผ๋กœ ๊ด€๋ จ ์‚ฐ์—…์„ ๋ฐœ์ „์‹œ์ผœ์™”๋‹ค. ๊น€์ •์€์€ ๊น€์ •์ผ ์‹œ๋Œ€์˜ ๊ณผํ•™๊ธฐ์ˆ  ๋ฐœ์ „ ์ •์ฑ…์„ ๊ฒŒ์Šน๋˜์–ด ์ธํ„ฐ๋„ท ๊ฐ€์ˆ ์„ ๋น„๋กฏํ•œ ๊ณผํ•™๊ธฐ์ˆ ์˜ ์‹ฌ์ธต ๋ฐœ์ „์œผ๋กœ ๊ฒฝ์ œ์„ฑ์žฅ ๋ฐ ์ธ๋ฏผ ์ƒํ™œ ์ˆ˜์ค€ ์ œ๊ณ ์— ๋…ธ๋ ฅํ•˜๊ณ  ์žˆ๋‹ค. ํŠนํžˆ ์„ธ๊ณ„ํ™”์˜ ๋ฐฐ๊ฒฝ ํ•˜์—์„œ ๊น€์ •์€ ์ •๊ถŒ์€ SNS๋ฅผ ํ™œ์šฉํ•˜์—ฌ ๋Œ€์™ธ์„ ์ „์„ ์ง„ํ–‰ํ•˜๊ณ , ๋น„์ „ํ†ต์  ๊ตฐ์‚ฌ ์ˆ˜๋‹จ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ๋„ ํ™œ์šฉํ•˜๋Š” ๋™์‹œ์— ์ „์ž์ƒ๊ฑฐ๋ž˜๋„ ์ด‰์ง„์‹œ์ผœ์„œ ์ธ๋ฏผ์˜ ์ƒํ™œ ์ˆ˜์ค€ ์ œ๊ณ  ๋ฐ ๊ฒฝ์ œ ๋ฐœ์ „์„ ์ด‰์ง„ํ•˜๊ณ  ์žˆ๋‹ค. ์ค‘๊ตญ๋„ ๋ถํ•œ๊ณผ ๋งˆ์ฐฌ๊ฐ€์ง€๋กœ 1990๋…„๋Œ€๋ถ€ํ„ฐ ์ธํ„ฐ๋„ท์„ ๋ฐœ์ „ํ•˜๊ธฐ ์‹œ์ž‘ํ•˜์˜€์œผ๋‚˜ ์ธํ„ฐ๋„ท ๊ธฐ์ˆ  ๋ฐœ์ „์„ ์ค‘์‹œํ•˜๋Š” ์ •์ฑ…์„ ์ œ์ •ํ•˜์˜€๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๋ถํ•œ๊ณผ ๋‹ค๋ฅธ๊ฒŒ ์ค‘๊ตญ์€ ๋‹น์ดˆ๋ถ€ํ„ฐ ๊ตญ์ œ ์ธํ„ฐ๋„ท๊ณผ ์—ฐ๊ฒฐ๋˜์–ด์„œ ํ˜„์žฌ๋Š” ๊ตญ๋ฏผ ๊ฐ„ โ€˜๊ฐ•์—ฐ๊ฒฐโ€™ํ•˜๋Š” ์‚ฌํšŒ ์ƒํƒœ์ด๋‹ค. ๋˜ํ•œ ์ธํ„ฐ๋„ท์— ๋Œ€ํ•œ ์ผ๋ จ์˜ ๋ฒ•๋ฅ ์„ ๋ฐ˜ํฌํ•˜์—ฌ ์—„๊ฒฉํ•œ ํ†ต์ œ ํ•˜์˜ ์ธํ„ฐ๋„ท ๋ฐœ์ „์„ ์ง„ํ–‰ํ•ด์™”์œผ๋‚˜ ํ˜„์žฌ๋Š” โ€˜์ธํ„ฐ๋„ท ๋ฐœ๋‹ฌ๊ตญ๊ฐ€โ€™๊ฐ€ ๋˜์—ˆ๋‹ค. ๋ถํ•œ์€ ์ผํ›„ ๋น„ํ•ตํ™”๋‚˜ ์ •์‹์ ์œผ๋กœ ๊ฐœํ˜๊ฐœ๋ฐฉ์„ ๋˜๋ฉด ์ค‘๊ตญ ์ธํ„ฐ๋„ท ๋ฐœ์ „ ๋ชจ๋ธ์„ ์ฐธ๊ณ ํ•˜๋Š” ๊ฒƒ๋ณด๋‹ค, ํ•„์ž๋Š” ์ค‘๊ตญ๊ณผ ๋ถํ•œ์€ ๋‹ค ์‚ฌํšŒ์ฃผ์˜ ์ฒด์ œ๋ผ๋Š” ๊ฒƒ ์™ธ์— ์–‘๊ตญ์˜ ์ฐจ์ด์ ์ด ๊ต‰์žฅํžˆ ๋งŽ๊ธฐ ๋•Œ๋ฌธ์— ๋ถํ•œ์€ ์ผํ›„๋„ ์ด๋Ÿฌํ•œ ์ค‘๊ตญ ์ธํ„ฐ๋„ท ๋ฐœ์ „ ๋ชจ๋ธ์„ ๋”ฐ๋ผํ•˜์ง€ ์•Š๋Š”๋‹ค๊ณ  ๋ณธ๋‹ค. ๋ถํ•œ์ด ๊ฐ ์˜์—ญ์—์„œ ๋‹ค ๋ณ‘์ง„๋˜์–ด ํŠผํŠผํ•œ ๊ฒฝ์ œ์ , ์‚ฌํšŒ์ , ์ •์น˜์  ๊ธฐ์ดˆ๋ฅผ ๋งˆ๋ จํ•ด์•ผ ์ด๋Ÿฌํ•œ ์ด์ค‘์ ์ธ ์ธํ„ฐ๋„ท ๋ชจ๋ธ์„ ๊ฐœ๋ณ€ํ•  ๊ฐ€๋Šฅ์„ฑ์ด ์žˆ๋‹ค. ๋ถํ•œ์€ ์ด๋Ÿฌํ•œ ๋ฐฉ์–ด์ ์ธ ์ธํ„ฐ๋„ท ๋ฐœ์ „ ์ „๋žต์„ ๊ณ„์† ์ทจํ•œ๋‹ค๋ฉด ์ผํ›„ ๊ฐœ๋ฐฉ์„ ํ•˜๊ณ  ์‹ถ์–ด๋„ ๋” ์‹ฌํ•œ ์ถฉ๊ฒฉ์„ ๋ฐ›์„ ๊ฒƒ์ด๋‹ค.The development of the Internet in North Korea has gone through a tortuous and delicate process. In fact, North Korea has been building networks since the early 1990s and has continued to promote network technology since then. However, in the development of the Internet in North Korea, it is worth noting the parallel structure of "internal networks" for communication between networks and "international networks" for external communication, with the main domestic state institution as the center, and the construction of a proximity communication network. At the same time, the North Korean authorities have been exercising strong control over the Internet because it is considered a sector necessary for economic development and political propaganda, but it poses a threat to institutional stability and ruling power. That is, North Korea has simultaneously implemented a strategy of controlling and utilizing the Internet. This thesis aims to understand the history and current status of North Korea's Internet development in the context of the irreversibility of Internet development in the "Internet era" of globalization, and to examine the reasons why North Korea has not opened up its Internet and the possibility of opening it up in the future. Since Kim Jong-il's regime, North Korea has been focusing on the Internet and other information and communication industries, and has developed them in a comprehensive manner. Kim Jong-un inherited the science and technology development policy from the Kim Jong-il era, and the deep development of science and technology, led by network technology, has worked for economic growth and improvement of people's living standards. Especially in the context of globalization, Kim Jong-un's regime has used SNS for foreign propaganda and non-traditional military means of cyber attacks, as well as promoting e-commerce for the improvement of people's living standards and economic development. China, like North Korea, began to develop its network in the 1990s, but developed a policy of emphasizing the development of online technologies. Unlike North Korea, however, China has been connected to the international Internet from the beginning and is now a "strongly connected" society among its citizens. It has also enacted a series of laws on the Internet, which has allowed the Internet to develop under strict control, and is now a "developed Internet country. In the future, if North Korea achieves denuclearization or officially implements reform and opening up, there will be many differences with China's Internet development model. Therefore, it is still difficult to predict the future development of the Internet in North Korea. Only if North Korea advances simultaneously in all fields and builds a solid economic, social, and political foundation will it be possible to change this dual Internet model. If North Korea continues to adopt this defensive cyber development strategy, it will be hit harder even if it wants to open up in the future.1์„œ๋ก  3 1.1 ๋…ผ๋ฌธ์˜ ๋ชฉ์  . 4 1.2 ์„ ํ–‰์—ฐ๊ตฌ ๊ฒ€ํ†  ๋ฐ ๊ทธ์˜ ํ•œ๊ณ„ . 6 1.3 ์—ฐ๊ตฌ๋ฐฉ๋ฒ•๊ณผ ๋…ผ๋ฌธ์˜ ๊ตฌ์„ฑ . 11 2 ๊น€์ •์ผ ์‹œ๊ธฐ ์ธํ„ฐ๋„ท ์‚ฐ์—…์˜ ํƒœ๋™๊ณผ ๋ฐœ์ „ 14 2.1 ์ธํ„ฐ๋„ท ๋ฐœ์ „์˜ ์‹œ๋Œ€ ๋ฐฐ๊ฒฝ: ์„ธ๊ณ„ํ™” ์‹œ๋Œ€ ์ธํ„ฐ๋„ท ๋ฐœ์ „์˜ ๋ถˆ๊ฐ€์—ญ์„ฑ 14 2.2 ๊น€์ •์ผ ์‹œ๊ธฐ ์ธํ„ฐ๋„ท ์‚ฐ์—…์˜ ํƒœ๋™๊ณผ ๋ฐœ์ „ . 16 ๊ฐ€. ๋น„๊ธฐ์ˆ ์  ์ธก๋ฉด: ์ธํ„ฐ๋„ท ๋ฐœ์ „ ๊ด€๋ จ ์ •์ฑ… ๋ฐ ์ „๋žต . 16 ๋‚˜. ๊ตญ๋‚ด ํ†ต์‹ ๋ง ์ธํŠธ๋ผ๋„ท๊ณผ ๊ตญ์ œ ํ†ต์‹ ๋ง ์ธํ„ฐ๋„ท์˜ ๋ณ‘ํ–‰ . 19 ๋‹ค. ์›น์‚ฌ์ดํŠธ ๊ตฌ์ถ• ๋ฐ ๊ตญ๊ฐ€ ๋„๋ฉ”์ธ ์ธ์ฆ . 21 3 ๊น€์ •์€ ์‹œ๊ธฐ ์ธํ„ฐ๋„ท ์‚ฐ์—… ์ •์ฑ…๊ณผ ๊ทธ ๋™ํ–ฅ . 24 3.1 ์ธํ„ฐ๋„ท ๋ฐœ์ „ ๊ด€๋ จ ์ •์ฑ… ๋ฐ ์ „๋žต(๊ณผํ•™๊ธฐ์ˆ  ์ค‘์‹œ ๋ฐ ์ง€์‹๊ฒฝ์ œ ์ •์ฑ…). 24 3.2 ์ปดํ“จํ„ฐ ์‚ฌ์šฉ๋ฅ ๊ณผ ์ด๋™ํ†ต์‹ ๋ง ๊ตฌ์ถ• (๊ณ ๋ ค๋งํฌ, ๊ฐ•์„ฑ๋„คํŠธ, ์Šค๋งˆํŠธํฐ) 27 3.3 ๊น€์ •์€ ์‹œ๋Œ€ ๋ถํ•œ ์ธํ„ฐ๋„ท ๋ฐœ์ „์˜ ์ƒˆ๋กœ์šด ์ง„์ „ . 29 ๊ฐ€. SNS ์ƒ์˜ ๋Œ€์™ธ์„ ์ „ 29 ๋‚˜. ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ ๋Šฅ๋ ฅ ์ œ๊ณ  38 ๋‹ค. ์ „์ž์ƒ๊ฑฐ๋ž˜์˜ ๋ฐœ์ „ ๋ฐ ํ™•๋Œ€ . 47 4 ์ค‘๊ตญ ์ธํ„ฐ๋„ท ์ •์ฑ…์„ ํ†ตํ•ด ๋ณธ ํ–ฅํ›„ ๋ถํ•œ์˜ ์ •์ฑ…๊ณผ ๋ฐœ์ „ ๋ฐฉํ–ฅ . 54 4.1 ์ค‘๊ตญ์˜ ์ธํ„ฐ๋„ท ๋ฐœ์ „ ์—ฐํ˜ ๋ฐ ๊ทœ์ œ. 55 4.2 ํ–ฅํ›„ ๋ถํ•œ ๋ฐœ์ „ ๋™ํ–ฅ ๋ฐ ์ „๋ง 65 5 ๊ฒฐ๋ก  71 ์ฐธ๊ณ ๋ฌธํ—Œ. 74์„

    ๋Œ€ํ•œ๋ฏผ๊ตญ์˜ ๊ตญ์ œ๊ธฐ๊ตฌ ๋‚ด ๊ตญ์ œ์  ์—ญํ• ๊ณผ ๊ธฐ์—ฌ: ์ง€์—ญ ์ˆ˜ํ˜ธ์ž, ์ง€์—ญ ํ•˜๋ถ€์ฒด์ œ ํ˜‘๋ ฅ์ž, ๊ฐœ๋ฐœ์ž?

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ๊ตญ์ œ๋Œ€ํ•™์› ๊ตญ์ œํ•™๊ณผ(๊ตญ์ œํ˜‘๋ ฅ์ „๊ณต), 2023. 2. ํ•œ์ •ํ›ˆ.๋ณธ ์—ฐ๊ตฌ๋Š” ํ˜„์‹ค์ฃผ์˜์  ์™ธ๊ต์•ˆ๋ณด์— ๋Œ€ํ•œ ์‹œ๊ฐ์—์„œ ํŒŒ์ƒ๋œ ํ™€์Šคํ‹ฐ์˜ ์—ญํ• ์ด๋ก ์„ ํ™œ์šฉํ•˜์—ฌ ์œ ๋Ÿฝ์•ˆ๋ณดํ˜‘๋ ฅ๊ธฐ๊ตฌ์— ๋Œ€ํ•œ ๋Œ€ํ•œ๋ฏผ๊ตญ์˜ ์—ญํ• ๊ณผ ๊ธฐ์—ฌ๋„๋ฅผ ํ‰๊ฐ€ํ•œ๋‹ค. ์—ฌ๊ธฐ์„œ ์—ญํ•  ์ด๋ก ์€ 1970๋…„๋Œ€์— ์ฒ˜์Œ ๋“ฑ์žฅํ•˜์˜€์œผ๋ฉฐ ๊ตญ๊ฐ€์˜ ์—ญํ• ์— ๋Œ€ํ•ด์„œ ๊ตญ๊ฐ€์˜ ์™ธ๊ต์ •์ฑ… ๊ฒฐ์ •๊ณผ ํ–‰๋™์„ ์˜๋ฏธํ•œ๋‹ค๊ณ  ๋ณด๊ณ  ์žˆ์œผ๋ฉฐ, ์ •๋ถ€์˜ ํƒœ๋„, ๊ฒฐ์ • ๊ทธ๋ฆฌ๊ณ  ๊ธฐ๋Šฅ์„ ํฌํ•จํ•œ๋‹ค๊ณ  ๊ทœ์ •ํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ์ด๋ก ์˜ ์ ์šฉ์€ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์œ ์šฉ์„ฑ์„ ๊ฐ–๊ณ  ์žˆ๋‹ค. ์ฒซ์งธ๋กœ ์œ ๋Ÿฝ์•ˆ๋ณดํ˜‘๋ ฅ๊ธฐ๊ตฌ ๋‚ด ์ค€ ํšŒ์›๊ตญ ์ง€์œ„๋ฅผ ๊ฐ–๋Š” ํ˜ธ์ฃผ ๋ฐ ์ผ๋ณธ๊ณผ ๊ฐ™์€ ๊ตญ๊ฐ€๋“ค๊ณผ ํ•œ๊ตญ์„ ๋น„๊ตํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•œ๋‹ค. ์ด๋Š” ํ™€์Šคํ‹ฐ๊ฐ€ ์ œ์‹œํ•˜๊ณ  ์žˆ๋Š” 17๊ฐœ์˜ ์—ญํ• ๋“ค ์ค‘ ํ˜ธ์ฃผ์™€ ์ผ๋ณธ์ด ๋ณด์œ ํ•˜๊ณ  ์žˆ๋Š” ์ง€์—ญ ์ˆ˜ํ˜ธ์ž, ์ง€์—ญ ํ•˜๋ถ€์ฒด์ œ ํ˜‘๋ ฅ์ž, ๊ทธ๋ฆฌ๊ณ  ๊ฐœ๋ฐœ์ž๋ผ๋Š” ์—ญํ• ์„, ๊ฐ™์€ ์ค€ ํšŒ์›๊ตญ ์ž…์žฅ์—์„œ ๋น„๊ต ๋ฐ ํ‰๊ฐ€ํ•  ์ˆ˜ ์žˆ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ๋‘˜์งธ๋กœ ํ™€์Šคํ‹ฐ์˜ ์—ฐ๊ตฌ์—์„œ ๋Œ€ํ•œ๋ฏผ๊ตญ์— ๋Œ€ํ•œ ํ‰๊ฐ€๊ฐ€ ๋ณด๋ฅ˜๋˜์—ˆ๋‹ค๋Š” ์ ์—์„œ, 1970๋…„๋Œ€์™€ ๋‹ค๋ฅธ 2020๋…„๋Œ€์˜ ํ•œ๊ตญ ์™ธ๊ต์— ๋Œ€ํ•ด์„œ ๊ตญ๊ฐ€์—ญํ• ์„ ๋ถ€์—ฌํ•  ์ˆ˜ ์žˆ๋‹ค๋Š” ์˜์˜๋ฅผ ๊ฐ–๋Š”๋‹ค. ๊ทธ๋ฆฌ๊ณ  ๊ธฐ์—ฌ๋„ ์ธก๋ฉด์—์„œ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๋งฅ๋ฝ์—์„œ ํ•™๋ฌธ์  ์˜๋ฏธ๋ฅผ ์ „๋‹ฌํ•˜๊ณ  ์žˆ๋‹ค. ๊ตญ๋‚ด ํ•™๊ณ„์—์„œ ์œ ๋Ÿฝ์•ˆ๋ณดํ˜‘๋ ฅ๊ธฐ๊ตฌ๊ฐ€ ๋ถ๋Œ€์„œ์–‘์กฐ์•ฝ๊ธฐ๊ตฌ ๋ฐ ์œ ์—”ํ‰ํ™”์œ ์ง€๊ตฐ์— ๋น„ํ•ด์„œ ๋œ ์•Œ๋ ค์ ธ ์žˆ๋‹ค๋Š” ์ ์—์„œ ์œ ๋Ÿฝ์•ˆ๋ณดํ˜‘๋ ฅ๊ธฐ๊ตฌ์— ๋Œ€ํ•œ ์—ฐ๊ตฌ ํ•„์š”์„ฑ์„ ํ™˜๊ธฐํ•œ๋‹ค. ์šฐ์„  ์œ ๋Ÿฝ์•ˆ๋ณดํ˜‘๋ ฅ๊ธฐ๊ตฌ์— ๋Œ€ํ•œ ์‹ค์งˆ์ ์ธ ๊ธฐ์—ฌ๋„๋ฅผ ํ‰๊ฐ€ํ•จ์œผ๋กœ์จ ๊ธฐ์กด ๋ฌธํ—Œ์—์„œ ํฌ๊ฒŒ ๋‹ค๋ฃจ๊ณ  ์žˆ์ง€ ์•Š์€ ๋ถ„์•ผ๋ฅผ ์„ ์ •ํ•จ์œผ๋กœ์จ, ๋‹จ์ˆœํžˆ ์œ ๋Ÿฝ์•ˆ๋ณดํ˜‘๋ ฅ๊ธฐ๊ตฌ์™€ ๋Œ€ํ•œ๋ฏผ๊ตญ์˜ ์–‘์ž์  ๊ด€๊ณ„์— ๋Œ€ํ•œ ํƒ๊ตฌ์—์„œ ๋จธ๋ฌผ์ง€ ์•Š๊ณ  ์‹ค์งˆ์  ๊ธฐ์—ฌ๋„๋ฅผ ํŒŒ์•…ํ•˜๋Š” ์ค‘์š”์„ฑ์„ ๊ฐ–๋Š”๋‹ค. ์ด์™€ ๋”๋ถˆ์–ด ๊ธฐ์—ฌ๋„ ์ธก์ •์ด๋ผ๋Š” ์ ์—์„œ, ํ•œ๊ตญ์ด ์œ ๋Ÿฝ์•ˆ๋ณดํ˜‘๋ ฅ๊ธฐ๊ตฌ์— ์ž๋ฐœ์ ์œผ๋กœ ์ œ๊ณตํ•˜๊ณ  ์žˆ๋Š” ํŒŒํŠธ๋„ˆ์‹ญ ๊ธฐ๊ธˆ, ํŠน๋ณ„๊ธฐ๊ธˆ, ์ „๋ฌธ์ธ๋ ฅ ์ œ๊ณต ๋“ฑ์— ๋Œ€ํ•ด์„œ ๋ณด๋‹ค ์ž์„ธํ•œ ์—ฐ๊ตฌ๋ฅผ ์ „๊ฐœํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด์„œ ํ•œ๊ตญ์˜ ๋…์ž์  ๊ธˆ์ „์  ์ง€์›๊ณผ ์ธ์  ์ง€์›์„ ์—ด๊ฑฐํ•˜๊ณ , ์ด๋ฅผ ํƒ€ ์•„์‹œ์•„ ๋™๋ฐ˜ ํ˜‘๋ ฅ์ž ๊ตญ๊ฐ€์ธ ํ˜ธ์ฃผ์™€ ์ผ๋ณธ์˜ ๊ธฐ์—ฌ๋„์™€ ๋น„๊ตํ•˜์—ฌ ๊ณตํ†ต์ ๊ณผ ์ฐจ์ด์ ์„ ๋„์ถœํ•˜๊ณ  ์žˆ๋‹ค. ๊ทธ๋ฆฌํ•˜์—ฌ ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์€ ํ•™๋ฌธ์  ๋ฐœ๊ฒฌ์„ ํš๋“ํ•  ์ˆ˜ ์žˆ์—ˆ๋‹ค. ์šฐ์„  ์ง€์—ญ ์ˆ˜ํ˜ธ์ž ์—ญํ• ์—์„œ๋Š” ํŒŒํŠธ๋„ˆ์‹ญ ๊ธฐ๊ธˆ๊ณผ ์ •์ฑ…ํ˜‘๋ ฅ์ด๋ผ๋Š” ๋‘ ๊ฐ€์ง€ ๊ธฐ์—ฌ๋„ ์ธก๋ฉด์—์„œ ํ•œ๊ตญ๊ณผ ํ˜ธ์ฃผ๋ฅผ ๋น„๊ตํ•˜์˜€๋‹ค. ์ด๋ฅผ ํ†ตํ•ด์„œ ํŒŒํŠธ๋„ˆ์‹ญ ๊ธฐ๊ธˆ์— ๋Œ€ํ•œ ๊ธˆ์ „์  ์ง€์›์—์„œ๋Š” ํ˜ธ์ฃผ๊ฐ€ ํ•œ๊ตญ๋ณด๋‹ค ๊ทผ์†Œํ•˜๊ฒŒ ๋” ๊ธฐ์—ฌ๋„๊ฐ€ ํฌ๋ฉฐ, ์ •์ฑ…ํ˜‘๋ ฅ ๊ธฐ์—ฌ๋„์—์„œ๋Š” ํ•œ๊ตญ์ด ๊ธฐ์—ฌ๋„๊ฐ€ ํ›จ์”ฌ ๋” ํฌ๊ณ  ๋‹ค์–‘ํ•œ ๊ฒƒ์œผ๋กœ ๋ณด์—ฌ์ง„๋‹ค. ์ด๋ฅผ ํ†ตํ•ด์„œ ์•ฝํ•œ ๊ธˆ์ „์  ์ง€์›๊ณผ ๊ฐ•ํ•œ ์ •์ฑ…์  ์ง€์›์„ ๊ฐ€์ง„ ์ง€์—ญ ์ˆ˜ํ˜ธ์ž ์—ญํ• ์„ ๊ฐ–๋Š”๋‹ค๊ณ  ๋ณธ๋‹ค. ์ง€์—ญ ํ•˜๋ถ€์ฒด์ œ ํ˜‘๋ ฅ์ž ์—ญํ• ์—์„œ๋Š” ๋™์ผํ•œ ๊ธฐ์—ฌ๋„ ์ธก๋ฉด์—์„œ ์ผ๋ณธ๊ณผ ํ•œ๊ตญ์„ ๋น„๊ตํ•˜์˜€๋‹ค. ์—ฌ๊ธฐ์„œ ํŒŒํŠธ๋„ˆ์‹ญ ๊ธฐ๊ธˆ์— ๋Œ€ํ•œ ๊ธˆ์ „์  ์ง€์›์—์„œ๋Š” ์ผ๋ณธ์ด ํ•œ๊ตญ๋ณด๋‹ค ํ›จ์”ฌ ๊ธฐ์—ฌ๋„๊ฐ€ ํฌ๋ฉฐ, ์ •์ฑ…ํ˜‘์˜ ๊ธฐ์—ฌ๋„์—์„œ๋Š” ํ•œ๊ตญ์ด ๊ธฐ์—ฌ๋„๊ฐ€ ํ›จ์”ฌ ๋” ํฌ๊ณ  ๋‹ค์–‘ํ•œ ๊ฒƒ์œผ๋กœ ๋ณด์—ฌ์ง„๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ ๊ฐœ๋ฐœ์ž ์—ญํ• ์—์„œ๋Š” ํŠน๋ณ„ ๊ธฐ๊ธˆ๊ณผ ์ „๋ฌธ์ธ๋ ฅ์„ ๋น„๊ตํ•˜์˜€์œผ๋ฉฐ, ํŠน๋ณ„๊ธฐ๊ธˆ์˜ ๊ธฐ์—ฌ๋„์—์„œ ๋” ์˜ค๋žœ ๊ธฐ๊ฐ„์— ๊ฑธ์ณ์„œ ๋” ๋งŽ์€ ๊ธˆ์•ก๊ณผ ๋‹ค์–‘ํ•œ ์ „๋ฌธ์ธ๋ ฅ์„ ์ง€์›ํ•˜์˜€์Œ์„ ๋ฐœ๊ฒฌํ•  ์ˆ˜ ์žˆ์—ˆ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ํ•œ๊ตญ์€ ์•„์ง ์ผ๋ณธ๋ณด๋‹ค๋Š” ๋œ ์ ๊ทน์ ์ธ ์—ญํ• ์„ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ ์ „๋ฐ˜์ ์œผ๋กœ ๋ณผ ๋•Œ ๋Œ€ํ•œ๋ฏผ๊ตญ์˜ ์œ ๋Ÿฝ์•ˆ๋ณดํ˜‘๋ ฅ๊ธฐ๊ตฌ ๋‚ด ์—ญํ• ์€ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ํŠน์ง•์„ ๊ฐ–๋Š”๋‹ค๊ณ  ๊ฒฐ๋ก ์ง€์„ ์ˆ˜ ์žˆ์„ ๊ฒƒ์ด๋‹ค. ์ฒซ์งธ, ์ง€์—ญ ์ˆ˜ํ˜ธ์ž ์—ญํ• ์—์„œ ๋Œ€ํ•œ๋ฏผ๊ตญ์€ ์˜ค์ŠคํŠธ๋ ˆ์ผ๋ฆฌ์•„๋ณด๋‹ค ๊ทผ์†Œํ•˜๊ฒŒ ์ ์€ ํŒŒํŠธ๋„ˆ์‹ญ ๊ธฐ๊ธˆ ๊ธฐ์—ฌ์™€ ํฌ๊ณ  ๋‹ค์–‘ํ•œ ์ •์ฑ…์  ๊ธฐ์—ฌ๋ฅผ ๋ณด์ธ๋‹ค. ๋‘˜์งธ, ์ง€์—ญ ํ•˜๋ถ€ ์ฒด์ œ ํ˜‘๋ ฅ์ž ์—ญํ• ์—์„œ๋Š” ๋Œ€ํ•œ๋ฏผ๊ตญ์€ ์ผ๋ณธ๋ณด๋‹ค ํฌ๊ฒŒ ์ ์€ ํŒŒํŠธ๋„ˆ์‹ญ ๊ธฐ๊ธˆ ๊ธฐ์—ฌ์™€ ํฌ๊ณ  ๋‹ค์–‘ํ•œ ์ •์ฑ…์  ๊ธฐ์—ฌ๋ฅผ ๋ณด์ธ๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ ๊ฐœ๋ฐœ์ž ์—ญํ• ์—์„œ ๋Œ€ํ•œ๋ฏผ๊ตญ์€ ์ผ๋ณธ์— ๋น„ํ•ด ํฌ๊ฒŒ ์ ์€ ํŠน๋ณ„ ๊ธฐ๊ธˆ ๊ธฐ์—ฌ๋ฅผ ๋ณด์—ฌ์ฃผ๋ฉฐ, ์ „๋ฌธ์ธ๋ ฅ ๊ธฐ์—ฌ ์ธก๋ฉด์—์„œ๋Š” ์ƒ๋Œ€์ ์œผ๋กœ ์งง๊ณ  ์ ์€ ๊ธฐ์—ฌ๋„๋ฅผ ๋‚˜ํƒ€๋‚ด๊ณ  ์žˆ๋‹ค. ํ•œ๊ตญ์˜ ์—ญํ•  ํ‰๊ฐ€๋ฅผ ํ†ตํ•ด์„œ ์„ธ ๊ฐ€์ง€ ์—ญํ• ์—์„œ ํ•œ๊ตญ์ด ๊ฐ–๋Š” ๊ฐ•์ ๊ณผ ์•ฝ์ ์„ ํŒŒ์•…ํ•˜๋ฉฐ, ํ–ฅํ›„ ํ•œ๊ตญ ์™ธ๊ต์— ์žˆ์–ด์„œ ์–ด๋–ค ๋…ธ๋ ฅ์ด ํ•„์š”ํ•œ์ง€์— ๋Œ€ํ•ด์„œ ์•Œ ์ˆ˜ ์žˆ์—ˆ๋‹ค.This research applies Holstis role theory derived from realist perspective on foreign security policy to evaluate the Republic of Koreas role and contribution to the Organization of Security and Cooperation in Europe. The role theory was introduced in the 1970s and this theory understands the role of the state as its foreign policy decision-making and its actions, and include attitude of the government, decisions and functions that are set together to be defined as the role. The application of this perspective contains numerous advantages throughout this research. Firstly, this theory enables South Korea to be compared with other Asian partnership for cooperation states such as Australia and Japan, who are already entitled with specific national roles assigned by Holsti. This is particularly because of the fact that, Australia with the regional protector role and Japan with the regional subsystem collaborator and the developer role, are eligible be to compare with South Korea as all of them are Asian partner states among seventeen different roles. Secondly, since Holsti left South Korea without any national role due to incomplete and insufficient data on its foreign policy and actions, it would be incredibly significant to define what role the ROK takes on in the 2020s that is quite different from the 1970s. Moreover, in the contribution dimension, this research delivers academic achievements as follows. This research gives important necessities on further studies on the OSCE, as the current studies tend to focus more on the United Nations, the UN Peacekeeping operations, and other regional security organizations such as the NATO or the ASEAN. By assessing South Koreas actual contribution to the OSCE that is not commonly discussed in the current literature, this paper aims to understand Koreas tangible contribution rather than simply focusing on the ROK-OSCE bilateral relationship. As this research concentrates on the contribution evaluation, it will include detailed assessment on partnership fund, special contribution, and personnel contribution provision. By following these steps, this research reveals similarities and differences between South Korea and Australia and Japan, who are Asian partnership for cooperation states. Therefore, this research could provide several crucial findings. First of all, in the regional protector role, Australia and South Korea were compared based on the partnership fund and policy cooperation. The result shows Australia has a slightly larger partnership fund than South Korea, while South Korea shows wider, and more diverse policy cooperation and this implies South Korea takes on regional protector role with weaker financial contribution but stronger policy contribution. Secondly, Japan and South Korea were compared according to the same contribution measurements from the first comparison. The result shows that Japan plays much a stronger financial contribution, while South Korea plays a wider, more diverse policy contribution in the regional subsystem collaborator role. Lastly, in the developer role Japan gives much a stronger contribution in both special funding and personnel dimension while South Korea shows its weakness and limitations as a latecomer. Thus, the role of the ROK to the OSCE covers the following features. Firstly, in the regional protector role, the Republic of Korea shows a slightly smaller financial contribution in the partnership fund than Australia and a wider and much diverse policy contribution than that of Australia. Secondly, South Korea clearly shows a much smaller financial contribution in the partnership fund than that of Japan, with a wider and much diverse policy contribution than Japan. Finally, in the developer role, the Republic of Korea shows shorter and smaller financial contribution in both special funding contribution and personnel contribution. By conducting an assessment on Koreas role and contribution, this research finds advantages and disadvantages from the three different roles, and these findings show what South Korea needs to improve in Koreas diplomacy in the near future.Chapter 1. Introduction 1 1.1. Study of Background 1 1.2. Purpose of Research 3 Chapter 2. Literature Review 5 2.1. Realism and Middle Power 6 2.2. The OSCE, Northeast Asia, and South Korea 10 2.3. Roles, Motives, and Contributions 18 Chapter 3. Role Theory and Application 27 3.1. Holstis role theory 27 Chapter 4. OSCE 40 4.1. Overview 40 4.2. History and structure 42 4.3. Structure 50 4.4. Asian and Mediterranean Partners of the OSCE 56 4.5. South Korea-OSCE relations 63 Chapter 5. Korean Contribution: Three roles and analysis 67 5.1. Roles and States 67 5.2. Regional Protector 68 5.3. Regional Subsystem Collaborator 74 5.4. Developer 82 5.5. Role Evaluation 90 Chapter 6. Conclusion 92 Bibliography 95 Abstract in Korean 123์„

    ํ”„๋ž‘์Šค์™€ ๋…์ผ์˜ ์ „๋žต ๋น„๊ต์—ฐ๊ตฌ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ์‚ฌํšŒ๊ณผํ•™๋Œ€ํ•™ ์ •์น˜์™ธ๊ตํ•™๋ถ€(์™ธ๊ตํ•™์ „๊ณต), 2023. 2. ๊น€์ƒ๋ฐฐ.์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์˜ ํ™•์žฅ๊ณผ ์ผ์ƒํ™”์— ๋”ฐ๋ผ ๋ฐ์ดํ„ฐ๋Š” ์œ ์˜๋ฏธํ•œ ๊ตญ์ œ์ •์น˜์  ์š”์ธ์œผ๋กœ์„œ ๊ทธ ์ค‘์š”๋„๊ฐ€ ์ƒ์Šนํ•˜๊ณ  ์žˆ๋‹ค. ๋ฐ์ดํ„ฐ๊ฐ€ ์ด๋ฅธ๋ฐ” '21์„ธ๊ธฐ ์›์œ '๋ผ๋Š” ํ‰๊ฐ€๋ฅผ ๋ฐ›์œผ๋ฉฐ ๊ตญ์ œ์ •์น˜์˜ ์ƒˆ๋กœ์šด ํ๋ฆ„์„ ์ฐฝ์ถœํ•˜๋Š” ์ „๋žต ์ž์›์œผ๋กœ ์ธ์‹๋˜๊ณ  ์žˆ๋‹ค๋Š” ์ ์—์„œ ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ์ฃผ๊ถŒ์˜ ์ •์˜์™€ ์ ์šฉ, ๊ทธ๋ฆฌ๊ณ  ๊ทธ ์ˆ˜ํ–‰ ๋ฐฉ์‹์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๊ฐ€ ์ด‰๊ตฌ๋˜๊ณ  ์žˆ๋‹ค. ๊ฐœ์ธ์˜ ์‚ฌ์ƒํ™œ์—์„œ ๊ตญ๊ฐ€ ์•ˆ๋ณด์— ์ด๋ฅด๊ธฐ๊นŒ์ง€ ๋ฐ์ดํ„ฐ๋Š” ๊ด„๋ชฉํ• ๋งŒํ•œ ํŒŒ๊ธ‰๋ ฅ์„ ์ง€๋‹Œ๋‹ค. ๋”ฐ๋ผ์„œ ๋ฐ์ดํ„ฐ๊ฐ€ ์ •์น˜ยท๊ฒฝ์ œ์  ๋ฌธ์ œ๋ถ€ํ„ฐ ๊ธฐ์ˆ ์  ๋ฌธ์ œ์— ์ด๋ฅด๋Š” ์‹ ํฅ ์•ˆ๋ณด ์š”์ธ์„ ๋‚ด์žฌํ•˜๊ณ  ์žˆ์Œ์„ ์ธ์ง€ํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋Š” ์‹ ํฅ ์•ˆ๋ณด ์š”์ธ์œผ๋กœ ๋Œ€๋‘๋˜๊ณ  ์žˆ๋Š” ๋ฐ์ดํ„ฐ์˜ ์ฃผ๊ถŒ ๊ฐœ๋…์„ ์œ ๋Ÿฝ์—ฐํ•ฉ์ด ์ •์˜ํ•˜๊ณ  ์ „๋žตํ™”ํ•ด ์˜จ ๋ฐฉ์‹์— ์ฃผ๋ชฉํ•˜์—ฌ 2019๋…„ ๋ฐœ์กฑ๋œ ๊ฐ€์ด์•„-X ํ”„๋กœ์ ํŠธ(Gaia-X Project)์— ๋‚ด์žฌ๋œ ๊ฐ€์น˜-์ด์ต-๊ธฐ์ˆ ์˜ ์—ฐ๊ณ„๋ฅผ ๋„์ถœํ•˜๊ณ , ์ด๋ฅผ ํ†ตํ•ด ์œ ๋Ÿฝ์—ฐํ•ฉ์˜ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ๋ก ์ด ์ง€๋‹Œ ๋…ํŠนํ•˜๋ฉด์„œ๋„ ๋ณตํ•ฉ์ ์ธ ์ฃผ๊ถŒ์  ์„ฑ๊ฒฉ์„ ์ดํ•ดํ•˜๋Š” ๋ฐ ๋ชฉ์ ์„ ๋‘”๋‹ค. ๊ฐ€์ด์•„-X ํ”„๋กœ์ ํŠธ๋Š” ํ‘œ๋ฉด์ ์œผ๋กœ๋Š” ์œ ๋Ÿฝ์—ฐํ•ฉ ์ฐจ์›์˜ ์ •์ฑ…์ด์ง€๋งŒ, ๊ทธ ๊ธฐ์กฐ๋ฅผ ํ˜•์„ฑํ•˜๊ณ  ์ฃผ๋„ํ•ด์˜จ ๊ฒƒ์€ ํ”„๋ž‘์Šค์™€ ๋…์ผ์ด๋‹ค. ์ด๋Š” ๊ณง ๊ฐ€์ด์•„-X ํ”„๋กœ์ ํŠธ๊ฐ€ ์—ฐํ•ฉ ์ฐจ์›๊ณผ ๊ฐœ๋ณ„ ๊ตญ๊ฐ€ ์ฐจ์›์—์„œ ๊ฐœ์ง„๋˜์–ด ์˜จ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ์ „๋žต์„ ์ง‘์•ฝํ•œ ๊ฒฐ๊ณผ์ด์ž ๋ฐ์ดํ„ฐ์— ๊ด€ํ•œ ์ •์น˜์ ยท์•ˆ๋ณด์ ยท๊ธฐ์ˆ ์  ์ฃผ๊ถŒ์„ ์•„์šฐ๋ฅธ๋‹ค๋Š” ๊ฒƒ์„ ์˜๋ฏธํ•œ๋‹ค. ๋”ฐ๋ผ์„œ ๋ณธ ์—ฐ๊ตฌ๋Š” ํ”„๋ž‘์Šค์™€ ๋…์ผ์ด ์ถ”์ง„ํ•ด ์˜จ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ์ „๋žต์ด ์ง€๋‹Œ ํŠน์ง•์„ ํŒŒ์•…ํ•˜๊ณ , ๊ทธ ๊ณผ์ •์„ ์ถ”์ ํ•จ์œผ๋กœ์„œ ์œ ๋Ÿฝ์—ฐํ•ฉ์˜ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ์„ ์ •๋ฆฝํ•˜๋Š” ๋ฐ ๋‘ ๊ตญ๊ฐ€์˜ ์ „๋žต ๊ธฐ์กฐ๊ฐ€ ๊ตฌ์„ฑํ•˜๋Š” ๊ด€๊ณ„์„ฑ์„ ๋ถ„์„ํ•œ๋‹ค. ์—ฐํ•ฉ ๊ทธ๋ฆฌ๊ณ  ๊ฐœ๋ณ„ ๊ตญ๊ฐ€ ์ฐจ์›์—์„œ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ์ „๋žต์ด ๊ตฌ์ƒ ๋ฐ ์ดํ–‰๋˜๋Š” ๋ฐฉ์‹์— ๋Œ€ํ•œ ๋ถ„์„์„ ์ œ์‹œํ•˜๋Š” ๋ณธ ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•ด ๊ตญ์ œ์ •์น˜์—์„œ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ๊ฐœ๋…์ด ์ง€๋‹Œ ์‹ ํฅ ์•ˆ๋ณด์  ์„ฑ๊ฒฉ์„ ์ดํ•ดํ•˜๋Š” ๋ฐ ์œ ์˜๋ฏธํ•œ ํ•จ์˜๋ฅผ ์ œ๊ณตํ•˜๊ณ ์ž ํ•œ๋‹ค. ๊ฐ€์ด์•„-X ํ”„๋กœ์ ํŠธ๋Š” ๊ธฐ์กด ์œ ๋Ÿฝ์—ฐํ•ฉ ์ฐจ์›์—์„œ ์ „๊ฐœ๋˜์–ด ์˜จ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ์ „๋žต๊ณผ ๊ทธ ์ž‘๋™๋ฐฉ์‹์—์„œ ๋ˆˆ์— ๋„๋Š” ์ฐจ์ด๋ฅผ ๋ณด์ธ๋‹ค. ์ด์ „์˜ ์œ ๋Ÿฝ์—ฐํ•ฉ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ์ „๋žต์ด ๋ฐ์ดํ„ฐ ๊ฒฝ์ œ ์‹ ์žฅ์„ ์œ„ํ•œ ๊ทœ์ œ์˜ ์ œ๋„ํ™” ๋˜๋Š” ๊ธฐ์ˆ  ๋ถ€๋ฌธ์—์„œ์˜ ๊ฒฝ์Ÿ๋ ฅ ์ฆ๋Œ€๋ผ๋Š” ๋ช…ํ™•ํ•œ ์ „๋žต์  ์šฐ์„ ์ˆœ์œ„์— ์˜ํ•ด ๊ตฌ์„ฑ๋˜์—ˆ๋‹ค๋ฉด, ๊ฐ€์ด์•„-X ํ”„๋กœ์ ํŠธ๋Š” ์œ ๋Ÿฝ์—ฐํ•ฉ์ด ์ถ”๊ตฌํ•ด ์˜จ ๊ธฐ๋ณธ๊ถŒ์— ๋ถ€ํ•ฉํ•˜๋Š” ์ฃผ๊ถŒ์„ ๋ฐ์ดํ„ฐ์— ๊ฒฐ๋ถ€ํ•˜๋ฉด์„œ๋„ ์—ญ๋‚ด ๊ธฐ์ˆ  ๋ฐ ์‚ฐ์—… ์—ญ๋Ÿ‰์„ ๋†’์ด๊ณ , ํ†ตํ•ฉ๋œ ํด๋ผ์šฐ๋“œ ์ƒํƒœ๊ณ„๋ฅผ ์กฐ์„ฑํ•ด ์ผ์›์ ์œผ๋กœ ์ ์šฉ ๊ฐ€๋Šฅํ•œ ์œ ๋Ÿฝ์‹ ๊ทœ๋ฒ”์„ ์ œ์‹œํ•˜๋Š” ๋“ฑ ๋ณด๋‹ค ํ†ตํ•ฉ์ ์ธ ์ „๋žต์œผ๋กœ ๋ณด์™„๋๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ์ด๋Š” ๊ณง ๊ฐ€์ด์•„-X ํ”„๋กœ์ ํŠธ์— ๋‚ด์žฌ๋œ ๊ฐ€์น˜-์ด์ต-๊ธฐ์ˆ ์˜ ์—ฐ๊ณ„์„ฑ์„ ์‹œ์‚ฌํ•˜๋ฉฐ, ์œ ๋Ÿฝ์—ฐํ•ฉ์˜ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ๊ฐœ๋…๊ณผ ๊ทธ์— ๋”ฐ๋ฅธ ์ „๋žต์ด ๋ณตํ•ฉ์ ์œผ๋กœ ๋ฐœ์ „ํ–ˆ์Œ์„ ํ™•์ธ์‹œํ‚จ๋‹ค. ๊ฐ€์ด์•„-X ํ”„๋กœ์ ํŠธ์—์„œ ๊ฐ€์น˜-์ด์ต-๊ธฐ์ˆ ์˜ ์—ฐ๊ณ„๊ฐ€ ์ด๋ค„์ง„ ๋ฐฐ๊ฒฝ์œผ๋กœ ์ด ํ”„๋กœ์ ํŠธ๋ฅผ ์ฃผ๋„ํ•œ ํ”„๋ž‘์Šค์™€ ๋…์ผ์˜ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ์ „๋žต์„ ์‚ดํŽด ๋ณผ ํ•„์š”๊ฐ€ ์žˆ๋‹ค. ํ”„๋ž‘์Šค์™€ ๋…์ผ ๋ชจ๋‘ ๋ฏธ๊ตญ ๊ธฐ์ˆ  ๊ธฐ์—…์ด ์ง€๋ฐฐํ•˜๋Š” ์ž๊ตญ ๊ธฐ์ˆ  ์‚ฐ์—… ์ƒํƒœ๊ณ„์™€ ๊ธฐ์ˆ ์  ๋น„๋Œ€์นญ์„ฑ์ด ์•ผ๊ธฐํ•˜๋Š” ๊ตฌ์กฐ์  ์ทจ์•ฝ์„ฑ์— ์˜ํ•ด ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ๋…ผ์˜๊ฐ€ ์ด‰๋ฐœ๋๋‹ค๋Š” ์ ์—์„œ ๊ทธ ์ธ์‹์  ๋ฐฐ๊ฒฝ์„ ๊ฐ™์ด ํ•œ๋‹ค. ๋‚˜์•„๊ฐ€ ์ดˆ๊ธฐ ์ด๋“ค ๊ตญ๊ฐ€์˜ ๋Œ€์‘์ด ์ฃผ๊ถŒ์  ํด๋ผ์šฐ๋“œ์˜ ์ถ”์ง„์ด๋ผ๋Š” ์œ ์‚ฌํ•œ ๋ฐฉ์‹์œผ๋กœ ์ „๊ฐœ๋˜์—ˆ๋‹ค๋Š” ์ ์—์„œ, ๋ฌธ์ œ์˜์‹๊ณผ ๋”๋ถˆ์–ด ์ „๋žต์˜ ์ถ”์ง„์—์„œ๋„ ๋น„์Šทํ•œ ์–‘์ƒ์„ ๋ ์—ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ํ”„๋ž‘์Šค๊ฐ€ ์ถ”๊ตฌํ•ด ์˜จ ์ผ๋ จ์˜ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ์ „๋žต๊ณผ ์ด๋ฅผ ์ˆ˜๋ฐ˜ํ•˜๋Š” ์ œ๋„์˜ ์ •๋น„๋Š” ํ”„๋ž‘์Šค์˜ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ์—์„œ์˜ ํ•ต์‹ฌ์ด ๊ณง ๊ธฐ์ˆ  ๊ฒฝ์Ÿ๋ ฅ ํ™•๋ณด๋ผ๋Š” ์ด์ต์˜ ๋งฅ๋ฝ์— ๋‹ฟ์•„์žˆ์—ˆ๋‹ค. ํ”„๋ž‘์Šค๊ฐ€ ๊ฐ€์ด์•„-X ํ”„๋กœ์ ํŠธ์— ํˆฌ์˜ํ•ด ์–ป๊ณ ์ž ํ•˜๋Š” ์ „๋žต ๋ชฉํ‘œ๊ฐ€ ๊ธฐ์ˆ  ๊ฒฝ์Ÿ๋ ฅ ์‹ ์žฅ๊ณผ ์‹ ํฅ ๊ธฐ์ˆ  ์‚ฐ์—… ์ฃผ๋„๋ผ๋Š” ์ด์ต์˜ ์ถ”๊ตฌ์ž„์„ ์•Œ ์ˆ˜ ์žˆ๋‹ค. ๋ฐ˜๋ฉด ๋…์ผ์˜ ๊ฒฝ์šฐ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ์— ๊ด€ํ•œ ๊ทœ์น™ ์ œ์ •์„ ์ฃผ๋„ํ•˜๋Š” ๋“ฑ ์ œ๋„์—์„œ์˜ ํ‘œ์ค€ ๊ฒฝ์Ÿ์„ ์ถ”๊ตฌํ•˜๋Š” ๊ฒฝํ–ฅ์„ ๋ณด์ธ๋‹ค. ๋ฐ์ดํ„ฐ์™€ ๊ด€๋ จํ•˜์—ฌ ๋ณด๋‹ค ์—„๊ฒฉํ•œ ๊ทœ์น™์„ ์ˆ˜๋ฆฝํ•˜๊ณ  ์ด๋ฅผ ์ผ๊ด„์ ์œผ๋กœ ์ ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์—ญ๋‚ด ๋‹จ์ผ ์‹œ์žฅ์˜ ํ•„์š”์„ฑ์„ ์ œ๊ธฐํ•ด ์˜จ ๋…์ผ์˜ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ์ „๋žต์€ ์ œ๋„์˜ ํ‘œ์ค€ํ™”๋ฅผ ํ†ตํ•œ ๊ทœ๋ฒ” ์ˆ˜๋ฆฝ์— ๋ฐฉ์ ์„ ๋‘๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ๊ฐ€์ด์•„-X ํ”„๋กœ์ ํŠธ์˜ ๋‘ ์ฃผ์ถ•์ธ ํ”„๋ž‘์Šค์™€ ๋…์ผ์ด ๋ณด์ด๋Š” ์ด๋Ÿฌํ•œ ์ƒ์ดํ•œ ์ „๋žต์  ๊ถค์ ์€ ์ด ํ”„๋กœ์ ํŠธ์˜ ์›ํ™œํ•œ ์ˆ˜ํ–‰์— ์žˆ์–ด ๋งŽ์€ ์Ÿ์  ์š”์ธ์„ ์•ผ๊ธฐํ•˜์ง€๋งŒ, ์—ฐํ•ฉ-๊ฐœ๋ณ„ ๊ตญ๊ฐ€ ์ฐจ์›์˜ ํฌ๊ด„์  ์ „๋žต ๊ฒฝ๋กœ๋ฅผ ๋ณด์—ฌ์ค€๋‹ค๋Š” ์ ์—์„œ ์—ฐ๊ตฌ ์‚ฌ๋ก€๋กœ์„œ์˜ ์˜์˜๋ฅผ ์ง€๋‹Œ๋‹ค.This paper mainly focuses on the dynamics of data sovereignty on international scale, with a specific interest in the European Union. The notion of data sovereignty has risen due to the expansion of cyberspace, which has facilitated a great deal of academic researches in recent years. Data is considered as the new oil of the 21st Century, amplifying its significance as a game changer in the realm of international politics. From individual privacy to national security, data has come to play a role with plausible influence. However, recognizing the fact that data is yet a fluid term, defining data sovereignty and applying traditional notion of sovereignty to data are still in progress. To fill this gap and provide a more wholesome perspective on the recent prospects of data sovereignty, this paper specifically examines the GAIA-X Project proposed by the European Union in 2019, with emphasis on its embedded values, national interests, and technological ambitions aspects. By following the trajectory of how European Unions normative views on data sovereignty has been formed and evolved, this paper finds it clear that the GAIA-X Project was to set forth the new route for the EU in the following terms: echoing its core civil values, reinstating its international position as a norm entrepreneur, and bolstering its own capability on cloud computing technology. Although the project was ambitiously embarked, the main stakeholders behind the plan, France and Germany, pursue a different route in their foremost priorities: incorporating its national brand as a technological testbed and enhancing its capabilities for France, and becoming the leader of rule-making in data sovereignty for Germany. The strategic cleavage between two main countries of the project casts a doubt for the project to be carried out in a homogeneous way. Such an internal division is likely to deviate its original roadmap towards reinstating the notion of data sovereignty through an upscale cloud computing technology. Nonetheless, the GAIA-X project indeed represents a new direction of the EU in defining and operating its own notion of data sovereignty. Despite raised contentions and its ongoing status, the GAIA-X project is worth studied for in two main reasons: It not only declares a new vision for the EUs norm of data sovereignty, but also displays a different strategic pathways of how France and Germany are projecting its data sovereignty. This paper concludes that the GAIA-X Project has imprinted a declarative effect and placed the EU on a new path of data sovereignty strategies in the context of values, interests, and technology.์ œ1์žฅ ์„œ๋ก  1 1. ๋ฌธ์ œ ์ œ๊ธฐ 1 2. ์—ฐ๊ตฌ ์งˆ๋ฌธ 7 3. ์—ฐ๊ตฌ ๋ฐฉ๋ฒ• 9 4. ๊ธฐ์กด ์—ฐ๊ตฌ ๊ฒ€ํ†  ๋ฐ ์ด๋ก ์  ๋ถ„์„ํ‹€ 10 5. ๋…ผ๋ฌธ์˜ ๊ตฌ์„ฑ 13 ์ œ 2์žฅ ์œ ๋Ÿฝ์—ฐํ•ฉ์˜ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ์ „๋žต 15 1. ์ฃผ์š” ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ 21 1.1. ๋””์ง€ํ„ธ ์–ด์  ๋‹ค 21 1.2. ๋ฒˆ์˜ํ•˜๋Š” ๋ฐ์ดํ„ฐ ์ค‘์‹ฌ ๊ฒฝ์ œ๋ฅผ ์œ„ํ•œ ์ „๋žต 23 1.3. ์œ ๋Ÿฝ ๊ณตํ†ต ๋ฐ์ดํ„ฐ ๊ณต๊ฐ„์„ ํ–ฅํ•œ ์ „๋žต 27 2. ๊ฐ€์น˜-์ด์ต-๊ธฐ์ˆ ์˜ ์—ฐ๊ณ„์™€ ๊ฐ€์ด์•„-X ํ”„๋กœ์ ํŠธ 31 2.1. ๊ฐ€์น˜-์ด์ต-๊ธฐ์ˆ ์˜ ์—ฐ๊ณ„ 31 2.2. ๊ฐ€์ด์•„-X ํ”„๋กœ์ ํŠธ์˜ ๊ณ ์•ˆ ๋ฐ ์˜์˜ 44 ์ œ 3์žฅ ํ”„๋ž‘์Šค์˜ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ์ „๋žต 55 1. ์•ˆ๋“œ๋กœ๋ฉ”๋‹ค ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ 56 2. ๋งˆํฌ๋กฑ ๋Œ€ํ†ต๋ น์˜ ์Šคํƒ€ํŠธ์—… ๊ตญ๊ฐ€ ๋ชจ๋ธ 63 3. ๋””์ง€ํ„ธ์„œ๋น„์Šค๋ฒ•๊ณผ ๋””์ง€ํ„ธ์‹œ์žฅ๋ฒ• 70 ์ œ 4์žฅ ๋…์ผ์˜ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ์ „๋žต 77 1. ๋ถ„๋ฐ์Šค ํด๋ผ์šฐ๋“œ์™€ C5 ํ‘œ์ค€ ์ง€์นจ 78 2. ํด๋ผ์šฐ๋“œ ์‹œ์žฅ๊ณผ BDSG ๊ฐœ์ • 84 3. ์œ ๋Ÿฝ ์ด์‚ฌํšŒ ์˜์žฅ๊ตญ์œผ๋กœ์„œ ๋…์ผ 94 ์ œ 5์žฅ ๊ฒฐ๋ก  99 ์ฐธ๊ณ ๋ฌธํ—Œ 110 Abstract 123์„

    ๊ตญ์ œ๋ฒ•์ƒ ์ง‘ํ–‰๊ด€ํ• ๊ถŒ ํ–‰์‚ฌ์˜ ํ•œ๊ณ„ ๋ฐ ๊ทธ์— ๋Œ€ํ•œ ๋Œ€์‘๋ฐฉ์•ˆ

    Get PDF
    ๊ตญ์ œ๋ฒ•์ƒ ์ง‘ํ–‰๊ด€ํ• ๊ถŒ์˜ ํ–‰์‚ฌ๋Š” ํ•ด๋‹น ๊ตญ๊ฐ€์˜ ์˜ํ†  ๋‚ด์—์„œ ์ด๋ฃจ์–ด์ ธ์•ผ ํ•˜๋ฉฐ, ์–ด๋– ํ•œ ๊ตญ๊ฐ€๋„ ๋‹ค๋ฅธ ์ฃผ๊ถŒ๊ตญ๊ฐ€์˜ ์˜ํ†  ๋‚ด์—์„œ ํƒ€๊ตญ์˜ ๋™์˜ ์—†์ด ์ง‘ํ–‰๊ด€ํ• ๊ถŒ์„ ํ–‰์‚ฌํ•  ์ˆ˜ ์—†๋‹ค. ๊ณผ๊ฑฐ์— ๊ตญ๊ฐ€๋Š” ์ž์‹ ์˜ ์˜ํ†  ๋‚ด์—์„œ ํŠน๋ณ„ํ•œ ๋ฌธ์ œ ์—†์ด ์ง‘ํ–‰๊ด€ํ• ๊ถŒ์„ ํ–‰์‚ฌํ•˜์˜€๋‹ค. ํŠนํžˆ ๋ฒ•์ง‘ํ–‰๊ธฐ๊ด€์˜ ์ฆ๊ฑฐ์ˆ˜์ง‘, ๋ฒ”์ธ ์ฒดํฌ ๋“ฑ ์ˆ˜์‚ฌ ํ™œ๋™์€ ๋Œ€๋ถ€๋ถ„ ํ•ด๋‹น ๊ตญ๊ฐ€์˜ ์˜ํ†  ๋‚ด์—์„œ ์ด๋ฃจ์–ด์กŒ๋‹ค. ๋งŒ์•ฝ ๋ฒ”์ธ์ด ํ•ด์™ธ๋กœ ๋„์ฃผํ•˜๊ฑฐ๋‚˜ ํ•ด์™ธ์— ์žˆ๋Š” ์ฆ๊ฑฐ๋ฅผ ์ˆ˜์ง‘ํ•ด์•ผ ํ•  ํ•„์š”์„ฑ์ด ์žˆ๋Š” ๊ฒฝ์šฐ, ์ง‘ํ–‰๊ด€ํ• ๊ถŒ์˜ ์˜ํ† ์  ํ•œ๊ณ„๋ฅผ ๋ฉ”์šฐ๊ธฐ ์œ„ํ•˜์—ฌ ๋ฒ”์ฃ„์ธ์ธ๋„ ์ œ๋„๋‚˜ ๊ตญ์ œํ˜•์‚ฌ์‚ฌ๋ฒ•๊ณต์กฐ ์ œ๋„๊ฐ€ ํ™œ์šฉ๋˜์—ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ •๋ณดํ†ต์‹ ๊ธฐ์ˆ ์˜ ๋ฐœ๋‹ฌ์€ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์— ๊ธฐ์กด์˜ ๊ด€ํ• ๊ถŒ ํ–‰์‚ฌ์›์น™์„ ์ ์šฉํ•˜๊ธฐ ์–ด๋ ต๊ฒŒ ๋งŒ๋“ค๊ณ  ์žˆ๋‹ค. ํŠนํžˆ ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ… ์„œ๋น„์Šค๊ฐ€ ๋ณดํŽธํ™”๋˜๋ฉด์„œ ์‹ค์ œ ๋ฐ์ดํ„ฐ๊ฐ€ ์ €์žฅ๋˜์–ด ์žˆ๋Š” ์œ„์น˜๋ฅผ ์•Œ ์ˆ˜ ์—†๊ฒŒ ๋˜๋Š” โ€˜์œ„์น˜์˜ ์ƒ์‹คโ€™(loss of location) ๋ฌธ์ œ๊ฐ€ ๋ฐœ์ƒํ•˜๊ณ  ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ ์ˆ˜์‚ฌ๊ธฐ๊ด€์ด ํด๋ผ์šฐ๋“œ์— ์ €์žฅ๋˜์–ด ์žˆ๋Š” ๋ฐ์ดํ„ฐ๋ฅผ ์ˆ˜์ง‘ํ•˜๋Š” ๊ฒฝ์šฐ ๋ถ€์ง€๋ถˆ์‹๊ฐ„์— ๋ฐ์ดํ„ฐ๊ฐ€ ์ €์žฅ๋œ ํ•ด์™ธ ์„œ๋ฒ„์— ์ ‘์†ํ•˜๊ฒŒ ๋  ๊ฐ€๋Šฅ์„ฑ์ด ์žˆ๋‹ค. ์ˆ˜์‚ฌ๊ธฐ๊ด€์ด ์ผ๋ฐฉ์ ์œผ๋กœ ํ•ด์™ธ, ํŠนํžˆ ํด๋ผ์šฐ๋“œ์— ์ €์žฅ๋œ ๋ฐ์ดํ„ฐ๋ฅผ ์ˆ˜์ง‘ํ•˜๊ณ ์ž ํ•  ๋•Œ, ์ด๋Ÿฌํ•œ ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘์ด ์ง‘ํ–‰๊ด€ํ• ๊ถŒ ํ–‰์‚ฌ์˜ ์˜ํ† ์  ํ•œ๊ณ„๋ฅผ ๋ฒ—์–ด๋‚œ ์ง‘ํ–‰๊ด€ํ• ๊ถŒ์˜ ์—ญ์™ธ์  ํ–‰์‚ฌ์— ํ•ด๋‹นํ•˜๋Š”์ง€๊ฐ€ ๋ฌธ์ œ๋  ์ˆ˜ ์žˆ๋‹ค. ์›์น™์ ์œผ๋กœ ์ผ๊ตญ์˜ ์ˆ˜์‚ฌ๊ธฐ๊ด€์€ ๊ตญ์ œํ˜•์‚ฌ์‚ฌ๋ฒ•๊ณต์กฐ ์ ˆ์ฐจ๋ฅผ ํ†ตํ•ด ํƒ€๊ตญ์˜ ํ˜‘์กฐ๋ฅผ ์–ป์–ด ํ•ด์™ธ์— ์ €์žฅ๋œ ์ฆ๊ฑฐ๋ฅผ ์ˆ˜์ง‘ํ•˜์—ฌ์•ผ ํ•˜์ง€๋งŒ, ๊ตญ์ œํ˜•์‚ฌ์‚ฌ๋ฒ•๊ณต์กฐ ์ ˆ์ฐจ๊ฐ€ ๋ณต์žกํ•˜๊ณ  ์žฅ์‹œ๊ฐ„์ด ์†Œ์š”๋œ๋‹ค๋Š” ์ ์—์„œ ํ•œ๊ณ„๊ฐ€ ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์ˆ˜์‚ฌ๊ธฐ๊ด€์˜ ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘์— ๋Œ€ํ•œ ๊ตญ์ œ์  ๋…ผ์˜๋ฅผ ์‚ดํŽด๋ณด๊ธฐ ์œ„ํ•ด ์œ ๋Ÿฝํ‰์˜ํšŒ ์‚ฌ์ด๋ฒ„๋ฒ”์ฃ„ํ˜‘์•ฝ์˜ ์„ฑ์•ˆ ๋ฐฐ๊ฒฝ๊ณผ ์ฃผ์š” ๋‚ด์šฉ์„ ์‚ดํŽด๋ณด๊ณ  ์ตœ๊ทผ ์ดˆ๊ตญ๊ฒฝ์  ๋ฐ์ดํ„ฐ ์ ‘๊ทผ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ์ถ”๊ฐ€์˜์ •์„œ ์ดˆ์•ˆ์„ ๋ถ„์„ํ•˜์˜€๋‹ค. ๋˜ํ•œ, ์œ ๋Ÿฝ์—ฐํ•ฉ์—์„œ ์ œ์•ˆํ•œ ์ „์ž์ฆ๊ฑฐ ๊ทœ์ • ์ดˆ์•ˆ๊ณผ UN ์ฐจ์›์—์„œ ์ „๋ฌธ๊ฐ€๊ทธ๋ฃน์„ ์ค‘์‹ฌ์œผ๋กœ ๋…ผ์˜๋œ ์‚ฌํ•ญ์„ ๊ฒ€ํ† ํ•˜์˜€๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ๋ฏธ๊ตญ, ์˜๊ตญ, ๋ฒจ๊ธฐ์—, ์ผ๋ณธ, ์šฐ๋ฆฌ๋‚˜๋ผ ๋‹ค์„ฏ ๊ตญ๊ฐ€๋ฅผ ์„ ์ •ํ•˜์—ฌ ๊ฐ๊ตญ์˜ ๊ด€๋ จ ์ž…๋ฒ•๊ณผ ๋ฒ•์›์˜ ์‹คํ–‰์„ ๋ถ„์„ํ•˜์˜€๋‹ค. ์ˆ˜์‚ฌ๊ธฐ๊ด€์˜ ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘์— ๋Œ€ํ•˜์—ฌ ์ฃผ์š” ๊ตญ๊ฐ€๋“ค์€ ๊ณตํ†ต์ ์œผ๋กœ ํ•ด์™ธ์— ์ €์žฅ๋œ ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•˜์—ฌ ๊ตญ๊ฐ€๊ฐ€ ์ง‘ํ–‰๊ด€ํ• ๊ถŒ์„ ํ–‰์‚ฌํ•  ์ˆ˜ ์žˆ๋Š” ๊ทผ๊ฑฐ ๊ทœ์ •์„ ๋งˆ๋ จํ•˜์—ฌ ์ด๋ฅผ ์ž…๋ฒ•์ ์œผ๋กœ ํ•ด๊ฒฐํ•˜๊ฑฐ๋‚˜, ๋ฒ•์›์— ์˜ํ•œ ๋ฒ•๋ฅ ์˜ ํ•ด์„์„ ํ†ตํ•ด ํ•ด๊ฒฐํ•˜๊ณ  ์žˆ๋‹ค. ์ด์™€ ๊ฐ™์ด ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘์— ๋Œ€ํ•œ ๊ตญ์ œ๋ฒ•์  ๊ทœ์œจ์ด ๋ถ€์žฌํ•œ ์ƒํ™ฉ์—์„œ ๊ตญ๊ฐ€๋งˆ๋‹ค ์ž…๋ฒ•์ ์œผ๋กœ ๋˜๋Š” ์‹ค๋ฌด์ ์œผ๋กœ ์ผ๋ฐฉ์ ์ธ ํ•ด๊ฒฐ๋ฐฉ์‹์— ์˜์กดํ•˜๊ณ  ์žˆ๋Š”๋ฐ, ๋ฒ•์  ์•ˆ์ •์„ฑ์„ ์ œ๊ณ ํ•˜๊ณ  ๊ฐœ์ธ์˜ ์ž์œ ์™€ ์ธ๊ถŒ์„ ๋ณด์žฅํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ๊ถ๊ทน์ ์œผ๋กœ ์ง‘ํ–‰๊ด€ํ• ๊ถŒ ํ–‰์‚ฌ์˜ ๋ฒ”์œ„์™€ ๊ด€๋ จ๋œ ๊ตญ์ œ๋ฒ•์  ํ•œ๊ณ„๋ฅผ ๋ช…ํ™•ํ•˜๊ฒŒ ์„ค์ •ํ•˜๋Š” ๊ฒƒ์ด ํ•„์š”ํ•˜๋‹ค. ์ด๋Ÿฌํ•œ ๊ตญ์ œ๋ฒ•์  ํ•ด๊ฒฐ๋ฐฉ์•ˆ์„ ๋ชจ์ƒ‰ํ•˜๊ธฐ ์œ„ํ•œ ์„ ๊ฒฐ๊ณผ์ œ๋กœ์„œ, ๊ตญ์ œ๊ธฐ๊ตฌ์™€ ๊ตญ๊ฐ€์˜ ์‹คํ–‰์„ ๋ฐ”ํƒ•์œผ๋กœ ๋…ผ์˜์˜ ๋ฐฉํ–ฅ์„ ์˜ฌ๋ฐ”๋ฅด๊ฒŒ ์„ค์ •ํ•˜๋Š” ๊ฒƒ์ด ์ค‘์š”ํ•˜๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘์— ๋Œ€ํ•œ ๊ตญ์ œ์  ๋…ผ์˜์™€ ์ฃผ์š” ๊ตญ๊ฐ€์˜ ์‹คํ–‰์„ ๋ถ„์„ํ•˜์—ฌ ์ˆ˜์‚ฌ๊ธฐ๊ด€์˜ ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘์˜ ๋ฐฉ์‹์„ ํฌ๊ฒŒ ์ง์ ‘์ˆ˜์ง‘๋ฐฉ์‹๊ณผ ๊ฐ„์ ‘์ˆ˜์ง‘๋ฐฉ์‹์œผ๋กœ ์œ ํ˜•ํ™”ํ•˜์˜€๋‹ค. ์ด๋Ÿฌํ•œ ์œ ํ˜•ํ™”์— ๊ธฐ๋ฐ˜ํ•˜์—ฌ ์ง‘ํ–‰๊ด€ํ• ๊ถŒ ํ–‰์‚ฌ์˜ ๋ฌธ์ œ์— ๋Œ€ํ•œ ๊ตญ์ œ์  ํ•ด๊ฒฐ๋ฐฉ์•ˆ์„ ๋ชจ์ƒ‰ํ•จ์— ์žˆ์–ด์„œ ๊ณ ๋ คํ•˜์—ฌ์•ผ ํ•  ์š”์†Œ๋ฅผ ์ œ์‹œํ•œ ํ›„, ์šฐ๋ฆฌ๋‚˜๋ผ์˜ ๊ตญ๋‚ด ์ž…๋ฒ•๊ณผ ์‹ค๋ฌด์— ์žˆ์–ด์„œ ๋ฐ”๋žŒ์งํ•œ ์ •์ฑ… ๋ฐฉํ–ฅ์„ ์ œ์–ธํ•˜์˜€๋‹ค. ๊ตญ๊ฐ€ ๊ฐ„์˜ ๊ด€๊ณ„์—์„œ ๋ฒ•๋ฅ  ์œ„๋ฐ˜์˜ ์œ„ํ—˜์„ฑ์„ ์ตœ์†Œํ™”ํ•˜๊ณ  ๊ฐœ์ธ์˜ ๊ธฐ๋ณธ๊ถŒ์„ ๋ณด์žฅํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ์ ๋ฒ•ํ•œ ์ดˆ๊ตญ๊ฒฝ์  ๋ฐ์ดํ„ฐ ์ ‘๊ทผ์— ๋Œ€ํ•œ ๊ตญ์ œ์  ํ•ด๊ฒฐ๋ฐฉ์•ˆ์„ ๋ชจ์ƒ‰ํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹ค. ๊ตญ์ œ์  ํ•ด๊ฒฐ๋ฐฉ์•ˆ ๋…ผ์˜์— ์žˆ์–ด์„œ ๋ฐ”๋žŒ์งํ•œ ๋ฐฉํ–ฅ์„ ์„ค์ •ํ•˜๊ธฐ ์œ„ํ•ด์„œ ๊ตญ์ œ๊ธฐ๊ตฌ ๋ฐ ๊ตญ๊ฐ€์˜ ๋‹ค์–‘ํ•œ ์‹คํ–‰์˜ ๋น„๊ต๋ฒ•์  ๋ถ„์„์„ ํ† ๋Œ€๋กœ ํ•œ ์œ ํ˜•ํ™”๋ฅผ ์‹œ๋„ํ•˜์˜€๋Š”๋ฐ, ์ด๋Ÿฌํ•œ ์œ ํ˜•ํ™”๋ฅผ ํ†ตํ•ด์„œ ์—ฌ๋Ÿฌ ๊ฐ€์ง€ ๊ณ ๋ ค์š”์†Œ๋ฅผ ์ถ”์ถœํ•ด๋ณผ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ์šฐ๋ฆฌ๊ฐ€ ์•ž์œผ๋กœ ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘์— ๋Œ€ํ•œ ์ง‘ํ–‰๊ด€ํ• ๊ถŒ ํ–‰์‚ฌ์˜ ๋ฌธ์ œ๋ฅผ ๊ฒ€ํ† ํ•˜๊ณ  ํ•ด๊ฒฐ๋ฐฉ์•ˆ์„ ๋…ผ์˜ํ•จ์— ์žˆ์–ด์„œ๋Š” ๋‹ค์Œ์˜ ์‚ฌํ•ญ์„ ๊ณ ๋ คํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹ค. ์—ฌ๊ธฐ์—๋Š” ๋ฐ์ดํ„ฐ์˜ ์ €์žฅ ์œ„์น˜, ๋ฐ์ดํ„ฐ์˜ ์ ‘๊ทผ๊ถŒํ•œ์„ ๊ฐ€์ง„ ์ž์˜ ๋™์˜, ์ •๋ณด์ฃผ์ฒด ๋˜๋Š” ์„œ๋น„์Šค์ œ๊ณต์ž์˜ ๊ตญ์  ๋˜๋Š” ์œ„์น˜, ๋ฐ์ดํ„ฐ์˜ ์ˆ˜์ง‘ ๋ฐฉ๋ฒ•, ์ˆ˜์‚ฌ๋Œ€์ƒ ๋ฒ”์ฃ„์˜ ์ค‘๋Œ€์„ฑ ๋ฐ ๊ธด๊ธ‰์„ฑ, ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ๋ฒ•์ œ์™€์˜ ์ถฉ๋Œ ๊ฐ€๋Šฅ์„ฑ ๋“ฑ์ด ํฌํ•จ๋œ๋‹ค. ๊ตญ๋‚ด์—์„œ๋„ ์‹ค๋ฌด์ ์œผ๋กœ ์ˆ˜์‚ฌ๊ธฐ๊ด€์ด ์—ญ์™ธ ๋ฐ์ดํ„ฐ๋ฅผ ์ˆ˜์ง‘ํ•˜๋Š” ์‚ฌ๋ก€๊ฐ€ ๋ฐœ๊ฒฌ๋˜๊ณ  ์žˆ์œผ๋‚˜, ํ˜•์‚ฌ์†Œ์†ก๋ฒ• ๋“ฑ ๊ด€๋ จ ๋ฒ•๋ฅ ์— ์ด์— ๊ด€ํ•œ ๋ช…์‹œ์  ๊ทผ๊ฑฐ ๊ทœ์ •์ด ๋ฏธ๋น„ํ•œ ์‹ค์ •์ด๋‹ค. ์ˆ˜์‚ฌ๊ณผ์ •์—์„œ ์ง€๋“ํ•œ ์ ‘๊ทผ๊ถŒํ•œ์„ ์ด์šฉํ•˜์—ฌ ์ˆ˜์‚ฌ๊ธฐ๊ด€์ด ์—ญ์™ธ ๋ฐ์ดํ„ฐ๋ฅผ ์ˆ˜์ง‘ํ•˜๋Š” ๊ฒฝ์šฐ, ์ด๋ฅผ ํ˜•์‚ฌ์†Œ์†ก๋ฒ•์ƒ ์••์ˆ˜์ˆ˜์ƒ‰์˜ ๋ฐฉ๋ฒ•์œผ๋กœ ํ—ˆ์šฉ๋œ๋‹ค๊ณ  ํŒ๋‹จํ•œ ๋Œ€๋ฒ•์› ํŒ๋ก€๊ฐ€ ์กด์žฌํ•˜๋‚˜, ์›๊ฒฉ์ง€ ์••์ˆ˜์ˆ˜์ƒ‰์ด๋‚˜ ํ•ด์™ธ ์„œ๋น„์Šค์ œ๊ณต์ž์— ๋Œ€ํ•œ ๋ฐ์ดํ„ฐ ์ œ๊ณต์š”์ฒญ์— ๋Œ€ํ•˜์—ฌ๋Š” ๊ด€๋ จ๋œ ๋ฒ•์  ๊ทผ๊ฑฐ๊ฐ€ ์—†๋‹ค. ์•ž์œผ๋กœ ๊ตญ์ œ๋ฒ•์˜ ํ‹€ ๋‚ด์—์„œ ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘์„ ์œ„ํ•œ ์‹ ์†ํ•œ ๊ตญ์ œ๊ณต์กฐ๊ฐ€ ์ด๋ฃจ์–ด์ง€๊ธฐ ์œ„ํ•ด์„œ๋Š” ์šฐ๋ฆฌ๋‚˜๋ผ๋„ ์‚ฌ์ด๋ฒ„๋ฒ”์ฃ„ํ˜‘์•ฝ์— ๊ฐ€์ž…ํ•˜๊ณ , ๋ฏธ๊ตญ๊ณผ ํ–‰์ •ํ˜‘์ •์„ ์ฒด๊ฒฐํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹ค. ์ด๋ฅผ ์œ„ํ•ด์„œ ๊ตญ๋‚ด ์ ˆ์ฐจ๋ฒ•์„ ์ •๋น„ํ•  ํ•„์š”๊ฐ€ ์žˆ์œผ๋ฉฐ, ํŠนํžˆ ์›๊ฒฉ์ง€ ์••์ˆ˜์ˆ˜์ƒ‰, ์ ‘๊ทผ๊ถŒํ•œ์„ ํ†ตํ•œ ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘, ์™ธ๊ตญ ์„œ๋น„์Šค์ œ๊ณต์ž์— ๋Œ€ํ•œ ๋ฐ์ดํ„ฐ ์ œ๊ณต์š”์ฒญ, ์™ธ๊ตญ ์ˆ˜์‚ฌ๊ธฐ๊ด€์˜ ์š”์ฒญ์— ์˜ํ•œ ์šฐ๋ฆฌ๋‚˜๋ผ ๊ธฐ์—…์˜ ๋ฐ์ดํ„ฐ ์ œ๊ณต ๋“ฑ์— ๋Œ€ํ•˜์—ฌ ๋ฒ•์  ๊ทผ๊ฑฐ๋ฅผ ๋งˆ๋ จํ•˜์—ฌ์•ผ ํ•œ๋‹ค. ๊ฒฐ๊ตญ, ์ˆ˜์‚ฌ๊ธฐ๊ด€์˜ ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘ ๋ฌธ์ œ๋Š” ๊ตญ์ œ๋ฒ• ์ฐจ์›์—์„œ ๊ตญ๊ฐ€๋“ค์˜ ์‹คํ–‰์„ ๋ฐ˜์˜ํ•œ ๋ช…ํ™•ํ•œ ๊ธฐ์ค€์„ค์ •์„ ํ†ตํ•ด ๊ทœ์œจ๋˜์–ด์•ผ ํ•œ๋‹ค. ์ด๋Ÿฌํ•œ ๊ตญ์ œ๋ฒ•์  ๋…ธ๋ ฅ์„ ํ†ตํ•ด ๋ฒ•์  ๋ถˆํ™•์‹ค์„ฑ์˜ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ณ , ์ฃผ๊ถŒ ์นจํ•ด์˜ ์šฐ๋ ค๋ฅผ ๋ถˆ์‹์‹œํ‚ค๋Š” ๋™์‹œ์— ๋””์ง€ํ„ธ์ฆ๊ฑฐ์˜ ์ˆ˜์ง‘๊ณผ ์ดˆ๊ตญ๊ฐ€์ ์ธ ์‚ฌ์ด๋ฒ„๋ฒ”์ฃ„ ๋Œ€์‘์„ ์œ„ํ•œ ํšจ๊ณผ์ ์ธ ๊ตญ์ œํ˜‘๋ ฅ์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•  ๊ฒƒ์ด๋‹ค.์ œ1์žฅ ์„œ๋ก  1 ์ œ1์ ˆ ๋ฌธ์ œ์˜ ์ œ๊ธฐ 1 ์ œ2์ ˆ ์—ฐ๊ตฌ์˜ ๋ชฉ์ ๊ณผ ๋ฒ”์œ„ 7 ์ œ2์žฅ ๊ตญ์ œ๋ฒ•์ƒ ๊ด€ํ• ๊ถŒ ํ–‰์‚ฌ์˜ ๊ธฐ๋ณธ์›์น™๊ณผ ํ•œ๊ณ„ 10 ์ œ1์ ˆ ๊ด€ํ• ๊ถŒ ํ–‰์‚ฌ์˜ ๊ธฐ๋ณธ์›์น™ 10 1. ๊ด€ํ• ๊ถŒ์˜ ๊ฐœ๋…๊ณผ ์ฃผ๊ถŒ๊ณผ์˜ ๊ด€๊ณ„ 10 2. Lotusํ˜ธ ์‚ฌ๊ฑด 13 3. ํ˜•์‚ฌ๊ด€ํ• ๊ถŒ์— ๊ด€ํ•œ ํ•˜๋ฒ„๋“œ ํ˜‘์•ฝ ์ดˆ์•ˆ 17 ์ œ2์ ˆ ๊ตญ๊ฐ€๊ด€ํ• ๊ถŒ์˜ ์—ญ์™ธ์  ํ–‰์‚ฌ 20 1. ์—ญ์™ธ๊ด€ํ• ๊ถŒ์˜ ์˜์˜ 20 2. ๊ตญ๋‚ด๋ฒ•์˜ ์—ญ์™ธ์ ์šฉ 22 3. ์—ญ์™ธ๊ด€ํ• ๊ถŒ์˜ ํ™•๋Œ€ ํ–‰์‚ฌ 24 ์ œ3์ ˆ ์ง‘ํ–‰๊ด€ํ• ๊ถŒ ํ–‰์‚ฌ์˜ ์˜ํ† ์  ํ•œ๊ณ„ 26 1. ์ง‘ํ–‰๊ด€ํ• ๊ถŒ์˜ ์˜์˜ 26 2. ์ง‘ํ–‰๊ด€ํ• ๊ถŒ ํ–‰์‚ฌ์˜ ๋‚ด์šฉ 27 3. ํ•ด์™ธ์—์„œ์˜ ์ง‘ํ–‰๊ด€ํ• ๊ถŒ ํ–‰์‚ฌ์— ๋Œ€ํ•œ ๊ฐ๊ตญ ๋ฒ•์›์˜ ํƒœ๋„ 27 ์ œ3์žฅ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์—์„œ์˜ ๊ด€ํ• ๊ถŒ ํ–‰์‚ฌ์™€ ๊ด€๋ จ ๋ฌธ์ œ 31 ์ œ1์ ˆ ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์—์„œ์˜ ๊ด€ํ• ๊ถŒ ํ–‰์‚ฌ 31 1. ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์˜ ๊ทœ์ œ ๊ฐ€๋Šฅ์„ฑ 32 2. ์‚ฌ์ด๋ฒ„๊ณต๊ฐ„์—์„œ์˜ ์†์ง€์ฃผ์˜ ์ ์šฉ 34 3. ์†Œ๊ฒฐ 46 ์ œ2์ ˆ ํด๋ผ์šฐ๋“œ ๋ฐ์ดํ„ฐ์™€ ์œ ํ˜•๋ณ„ ํŠน์ง• 48 1. ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…์˜ ๊ฐœ๋… 48 2. ํด๋ผ์šฐ๋“œ ๋ฐ์ดํ„ฐ์˜ ํŠน์ง• 50 3. ํด๋ผ์šฐ๋“œ ์œ ํ˜•๋ณ„ ๋ฒ•์  ํšจ๊ณผ 57 ์ œ3์ ˆ ํด๋ผ์šฐ๋“œ ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ์ง‘ํ–‰๊ด€ํ• ๊ถŒ ํ–‰์‚ฌ์˜ ๋ฌธ์ œ 63 1. ์œ„์น˜์˜ ์ƒ์‹ค ๋ฌธ์ œ 63 2. ๊ตญ์ œ์‚ฌ๋ฒ•๊ณต์กฐ์ œ๋„์˜ ๋น„ํšจ์œจ์„ฑ 65 ์ œ4์žฅ ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘์— ๋Œ€ํ•œ ๊ตญ์ œ์  ๋…ผ์˜ 68 ์ œ1์ ˆ UN ์ฐจ์›์—์„œ์˜ ๋…ผ์˜ 68 1. UN ๋ฒ”์ฃ„์˜ˆ๋ฐฉ ๋ฐ ํ˜•์‚ฌ์‚ฌ๋ฒ•์œ„์›ํšŒ(CCPCJ) 68 2. ์‚ฌ์ด๋ฒ„๋ฒ”์ฃ„ ๋ฒ”์ •๋ถ€ ์ „๋ฌธ๊ฐ€๊ทธ๋ฃน ํšŒ์˜ 70 3. ์‚ฌํšŒ์ , ์ธ๋„์  ๋ฐ ๋ฌธํ™”์  ๋ฌธ์ œ์— ๋Œ€ํ•œ UN ์ œ3์œ„์›ํšŒ 74 ์ œ2์ ˆ ์œ ๋Ÿฝํ‰์˜ํšŒ์˜ ์‚ฌ์ด๋ฒ„๋ฒ”์ฃ„ํ˜‘์•ฝ 77 1. ํ˜‘์•ฝ์˜ ์„ฑ์•ˆ ๋ฐฐ๊ฒฝ 79 2. ํ˜‘์•ฝ์˜ ์ฃผ์š” ๋‚ด์šฉ 85 3. ์ฃผ์š” ์Ÿ์ ๊ณผ ๊ด€๋ จ ๋…ผ์˜ 97 4. ์ œ2์ถ”๊ฐ€์˜์ •์„œ ์ดˆ์•ˆ์˜ ์ฃผ์š” ๋‚ด์šฉ 110 ์ œ3์ ˆ ์œ ๋Ÿฝ์—ฐํ•ฉ(EU)์˜ ์ „์ž์ฆ๊ฑฐ ๊ทœ์ • ์ดˆ์•ˆ 122 1. ์ „ํ†ต์ ์ธ ํ˜•์‚ฌ์‚ฌ๋ฒ•๊ณต์กฐ ๋ฐ ์ƒํ˜ธ ์Šน์ธ(mutual recognition) 122 2. EU ์ „์ž์ฆ๊ฑฐ ๊ทœ์ • ์ดˆ์•ˆ 125 3. ์œ ๋Ÿฝ์ œ์ถœ๋ช…๋ น๊ณผ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ 131 ์ œ5์žฅ ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘์— ๊ด€ํ•œ ์ฃผ์š”๊ตญ์˜ ์ž…๋ฒ•๊ณผ ์‹คํ–‰ 137 ์ œ1์ ˆ ๋ฏธ๊ตญ 138 1. ์ฃผ์š” ์ž…๋ฒ• 138 2. ๊ด€๋ จ ํŒ๋ก€ 153 ์ œ2์ ˆ ์˜๊ตญ 183 1. ์ฃผ์š” ์ž…๋ฒ• 183 2. ๋ฏธ๊ตญ๊ณผ์˜ ํ–‰์ •ํ˜‘์ • ์ฒด๊ฒฐ 187 ์ œ3์ ˆ ๋ฒจ๊ธฐ์— 190 1. ์ฃผ์š” ์ž…๋ฒ• 190 2. ๊ด€๋ จ ํŒ๋ก€ 193 ์ œ4์ ˆ ์ผ๋ณธ 201 1. ์ฃผ์š” ์ž…๋ฒ• 201 2. ๊ด€๋ จ ํŒ๋ก€ 202 ์ œ5์ ˆ ์šฐ๋ฆฌ๋‚˜๋ผ 213 1. ์ฃผ์š” ์ž…๋ฒ• 213 2. ๊ด€๋ จ ํŒ๋ก€ 216 ์ œ6์ ˆ ์†Œ๊ฒฐ 221 ์ œ6์žฅ ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘์— ๋Œ€ํ•œ ๊ตญ์ œ๋ฒ•์  ๋Œ€์‘๋ฐฉ์•ˆ ๋…ผ์˜์˜ ๋ฐฉํ–ฅ 226 ์ œ1์ ˆ ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘์˜ ์œ ํ˜•ํ™” 228 1. ๊ธฐ์กด์˜ ์œ ํ˜•ํ™” ๋ฐฉ์‹ 229 2. ์ƒˆ๋กœ์šด ์œ ํ˜•ํ™” ๋ฐฉ์‹ ์ œ์•ˆ 234 3. ์†Œ๊ฒฐ 238 ์ œ2์ ˆ ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘์˜ ๊ตญ์ œ๋ฒ•์  ์ ๋ฒ•์„ฑ ํŒ๋‹จ ์‹œ ๊ณ ๋ ค์‚ฌํ•ญ 241 1. ๋ฐ์ดํ„ฐ์˜ ์ €์žฅ ์œ„์น˜ 243 2. ๋ฐ์ดํ„ฐ์˜ ์ ‘๊ทผ๊ถŒํ•œ์„ ๊ฐ€์ง„ ์ž์˜ ๋™์˜ 245 3. ์ •๋ณด์ฃผ์ฒด ๋˜๋Š” ์„œ๋น„์Šค์ œ๊ณต์ž์˜ ๊ตญ์  ๋˜๋Š” ์œ„์น˜ 246 4. ๋ฐ์ดํ„ฐ์˜ ์ˆ˜์ง‘ ๋ฐฉ๋ฒ• 247 5. ์ˆ˜์‚ฌ๋Œ€์ƒ ๋ฒ”์ฃ„์˜ ์ค‘๋Œ€์„ฑ ๋ฐ ๊ธด๊ธ‰์„ฑ 248 6. ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ๋ฒ•์ œ์™€์˜ ์ถฉ๋Œ ๊ฐ€๋Šฅ์„ฑ 250 ์ œ3์ ˆ ๊ตญ๋‚ด ์ž…๋ฒ• ๋ฐ ์‹ค๋ฌด์— ๋Œ€ํ•œ ๋ฒ•์ •์ฑ…์  ์ œ์–ธ 254 1. ์ˆ˜์‚ฌ์‹ค๋ฌด์—์„œ์˜ ์—ญ์™ธ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘์˜ ์‹ค์ œ 254 2. ๋‹ค์ž์กฐ์•ฝ ๊ฐ€์ž… ๋ฐ ์–‘์ž์กฐ์•ฝ ์ฒด๊ฒฐ์˜ ํ•„์š”์„ฑ 258 3. ๊ตญ๋‚ด๋ฒ•์ œ ์ •๋น„๋ฐฉ์•ˆ 261 ์ œ7์žฅ ๊ฒฐ๋ก  265 ์ฐธ๊ณ ๋ฌธํ—Œ 270 Abstract 290๋ฐ•
    corecore