6,276 research outputs found

    Military Procurement and Technology Development

    Get PDF
    The purpose of this paper is to demonstrate that military and defense related research and procurement have been a major source of commercial technology development across a broad spectrum of industries that account for an important share of United States industrial production. I discuss the development of five general purpose technologies: (1) military and commercial aircraft, (2) nuclear energy and electric power, (3) computers and semiconductors, (4) the Internet, and (5) the space industries. The defense industrial base has become a smaller share of the industrial sector which is itself a declining sector in the U.S. economy. It is doubtful that military and defense related procurement will again become an important source of new general purpose technologies. When the history of U.S. technology development for the next half century is eventually written it will almost certainly be written within the context of slower productivity growth than the relatively high rates that prevailed in the U.S through the 1960's and during the information technology bubble that began in the early 1990's.Research and Development/Tech Change/Emerging Technologies,

    Impact of the Smart City Industry on the Korean National Economy: Input-Output Analysis

    Get PDF
    The characteristics of the smart city industry and its effects on the national economy of Korea are investigated using input-output analysis. The definition and industrial classification of a smart city are established using the Delphi technique for experts in various fields, from information and communication technologies (ICT) to governmental policies for urban matters. The results of the analysis, including the production, value added and employment induction effects, show that the smart city industry has intermediate characteristics between ICT and urban construction industries, indicating that acquisition of the competitive edge of both the ICT and construction industries is the key to the success of the smart city industry. The crucial industries related to the smart city industry are identified based on an analysis of the forward and backward linkage effects, the results of which suggest the importance of the relevant service industries. The economic effects on the national economy induced by the governmental program for smart city demonstration are estimated using input-output analysis results. Overall, the results of this study indicate that facilitation of the smart city industry plays a key role not only in the sustainable city, but also in the growth of the national economy

    Software Development Team Dynamics: Control, Coordination, and Secure Software

    Get PDF
    In secure software has resulted of millions of dollars of company’s revenue as complex organizational systems are often software intensive. Researchers are still interested in the impact of the people involved, the process used and the project characteristics. This study looks at the security awareness and maturity level of those involved in the development process coupled with the management of the process to identify factors that lead to enhanced secure software development. Following a survey of prior literature, it is hypothesized that software development team members’ security awareness and maturity affect the design of software in a distributed context. Due to the nature of work of distributed team members, the relationship between team security awareness and maturity coordination on secure software design are also posited to be impacted by control types and coordination mechanisms. We contribute to literature by expanding the understanding of the process of creating secure software

    An Assessment of North Korean Threats and Vulnerabilities in Cyberspace

    Get PDF
    This thesis answers the fundamental questions of what North Korean capabilities and intent in cyberspace are and what North Korean threats and vulnerabilities are associated with these. It argues that although North Korea’s cyberspace resources and capabilities have increased and reached a level that represents an advanced persistent threat, its cyberspace operations have remained restrained and regional. It also argues that North Korea’s valuable assets include its ability to control cyberspace within North Korea and its ability to engage in cyberspace activities and operations from abroad. The thesis recommends that the United States government exploit these assets by denying and disrupting the use of cyberspace by covert cyber units outside of North Korea, as well as by enabling and ensuring the less monitored and less controlled use of cyberspace by civilians inside of North Korea

    Organizational leadership: a study on the affects of certification to international organization for standardization (ISO)

    Get PDF
    Compliance to requirements of ISO is an important leadership problem for the International Aerospace Quality Group (IAQG) and the Aviation, Space and Defense (AS&D) companies. Furthermore, the IAQG seeks to understand the valuation of ISO/AS9100 requirements (2009), audit practices, management functions, business performance, customer satisfaction, and potential future concepts for the standard to assure quality. Since the release of the AS9100C total certification growth surpassed 1,100,000 organizations in 2010 with ISO 9001 series adoption and implementation governing business operations (ASQ, 2012b; ISO, 2011; Bernardo, Llach, & Marimon, 2011). Historians such as Crosby, Juran, Deming, and others established the foundation for quality assurance. Several researchers explored the issues which complicate overall benefits of ISO certification (Iwaro & Mwasha, 2012; Karthi et al., 2012; Sampaio et al., 2009). This study examined the effects on AS&D industries from ISO compliance to identify the implications (of ever-changing requirements) through an online survey of 15,000 practitioners. The research illuminated how ISO affects AS&D industries with current and future requirements for certification. The data showed that 75% of survey respondents report implementation of the AS9100C requirements still has benefits that outweigh the cost. Findings suggest that AS&D industries perceive significant value in the AS9100C document as part of the overall ISO 9000 series. In general, the comments from the survey can provide insight into the affects of ISO certification. The study concludes by recommending continued research to learn of further impacts from ISO certification within AS&D industries to improve the AS9100 document requirements for quality management systems

    Maturing International Cooperation to Address the Cyberspace Attack Attribution Problem

    Get PDF
    One of the most significant challenges to deterring attacks in cyberspace is the difficulty of identifying and attributing attacks to specific state or non-state actors. The lack of technical detection capability moves the problem into the legal realm; however, the lack of domestic and international cyberspace legislation makes the problem one of international cooperation. Past assessments have led to collective paralysis pending improved technical and legal advancements. This paper demonstrates, however, that any plausible path to meaningful defense in cyberspace must include a significant element of international cooperation and regime formation. The analytical approach diverges from past utilitarian-based assessments to understand the emerging regime, or implicit and explicit principles, norms, rules, and decision-making procedures, around which actor expectations are beginning to converge in the area of cyberspace attack attribution. The analysis applies a social-practice perspective of regime formation to identify meaningful normative and political recommendations. Various hypotheses of regime formation further tailor the recommendations to the current maturity level of international cooperation in this issue area. Examining international cooperation in cyberspace and methods for maturing international cooperation to establish attribution in other domains inform political mitigations to the problem of cyberspace attack attribution. Potential solutions are analyzed with respect to four recent cyberspace attacks to illustrate how improved international cooperation might address the problem. Finally, a counterfactual analysis, or thought experiment, of how these recommendations might have been applied in the case of rampant Chinese cyber espionage inform specific current and future opportunities for implementation. Although timing is difficult to predict, the growing frequency and scope of cyber attacks indicate the window of opportunity to address the problem before some form of cataclysmic event is closing

    An Empirical study on the dynamic capabilities of public innovation cluster

    Get PDF
    Thesis(Master) -- KDI School: Master of Public Policy, 2021This study applies the dynamic capabilities concept introduced by Teece (2007) to examine the sustainable growth capability of the Daedeok Research Complex (DRC), a public innovation cluster in Korea. The thesis measures the three main components of dynamic capabilities - sensing, seizing, and transforming -as well as organizational cultural characteristics. This study conducted questionnaire surveys and semi-structured interviews with employees of public research institutions in DRC. The survey results were analyzed using a structural equation model (SEM), and the author conducted further interview about rejected hypothesis with three principal researchers and two directors who belong to the public IT institute. The findings indicated that the information searching and benchmarking capabilities of sensing had a significant effect on the internalization of knowledge of seizing, while networking relationships did not it. In turn, the organization’s internalization of knowledge had a significant effect on the resource adjustment or integration capability, but did not have a significant effect on the resource relocation or reconfiguration capability. In addition, organizational cultural characteristics had a positive mediating effect on the resource transformation capability. Through interviews with employees, the reason why networking relationship did not have significant effect on the organization’s internalization of knowledge was the culture of competition among members due to PBS. The reason why the internalization of knowledge did not have a significant effect on the resource relocation or reconfiguration was the complicated research project reporting structure and weak authority of the head of the institution. Overall, these findings suggest that the Korean government should focus on improving methods of evaluating public research and development (R&D) organizations, giving more authority to the heads of these institutions, and fostering an open organizational culture.1. Introduction 2. Literature Review 3. Research method and hypothesis 4. Data Analysis 5. ConclusionmasterpublishedJeongyun LE

    Time as an Independent Variable: A Tool to Drive Cost Out of and Efficiency Into Major Acquisition Programs

    Get PDF
    Tenth Annual Acquisition Research Symposium Acquisition ManagementExcerpt from the Proceedings of the Tenth Annual Acquisition Research Symposium Acquisition ManagementNaval Postgraduate School Acquisition Research ProgramPrepared for the Naval Postgraduate School, Monterey, CANaval Postgraduate School Acquisition Research ProgramApproved for public release; distribution is unlimited

    Cyber Security of Critical Infrastructures

    Get PDF
    Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods
    corecore