[학술논문] 굿 음악의 지역별 특징 연구
...the third is classifying by contents of music. First is divided by two types again; shaman-leading type and players-leading type. Second has melody-oriented type and rythmic music-oriented type. The last is divided by four different types; ritual-oriented, epic-oriented, lyric-oriented and complex form. Shaman music in Korea have something in common and difference, and they are still transmissed...
[학술논문] Threats, Alliance, and the Military Power Building of South Korea: With Focus on the Force Structure of the R.O.K. Military
...Keeping in mind the security conditions and future warfare, South Korea should prioritize a technology-intensive force structure in order to achieve self-reliance. Because the complex process of building a force structure of this type requires significant investment of time and resources, it must be initiated as early as possible. However, it is important to note that such improvement should not be accompanied...
[학술논문] The Microeconomics of North–South Korean Cross-border Integration
...entry, profitability, and sustainability of South Korean business activities in the North. In effect, the South Korean government has substituted relatively strong South Korean institutions for the relatively weak Northern ones in the KIC, thus socializing risk. As a result, the level and type of cross-border integration observed in the survey is very much a product of South Korean public policy.
[학술논문] 1. Theorization of Kim Dae Jung’s Pursuit of Inter-Korean Economic Exchanges: 2. Complex interdependence model
...confrontation still prevailed. As a preliminary analytical framework to explain the substantial changes in inter-Korean relations during the Kim Dae Jung presidency, this paper proposes complex interdependence model as an ideal type of relationship. The model reflects a key pattern of changes in international relations, typified by transnational interaction and asymmetrical reciprocity, and these notions also...
[학술논문] Jus ad Bellum and Cyber Warfare in Northeast Asia
...networks. From the perspective of the jus ad bellum, potential cyber attacks raise a number of difficult and complex issues. The following article examines which cyber operations amount to the use of force as stipulated in Article 2(4) of the UN Charter and discusses the conditions under which type of cyber attacks could trigger the right to self-defense. In addition, other available remedies outside the...