• Title/Summary/Keyword: 원격근무

Search Result 117, Processing Time 0.027 seconds

Improving Strategies for Public Office Management System through the Electronic Document Implementation (전자문서 활용을 통한 공공부문 사무관리체계 혁신 방안)

  • 양정은
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.4
    • /
    • pp.236-243
    • /
    • 1999
  • Information technologies have been wide spread in the public sector, especially government administrative of office. Most of the Korean internal government, IT influence focused on the hardware and input system, not so fast realized, and don't have fundamental development less of business dimension. And now, the electronic document implementation efficiently satisfies the government's process and management through the reduction of manned working steps. This study suggested the elimination of old ragged custom based on paper document. inner basis environment composing for the using of electronic document and the introduce of digitized network tele-working system etc, for the highly execution of future digital management system.

  • PDF

Remote Control System of Electric Power Supply Facilities (수배전반설비 원격감시제어 시스템 구축)

  • Kim, S.H.;Kim, I.N.
    • Proceedings of the KIEE Conference
    • /
    • 2003.07a
    • /
    • pp.354-356
    • /
    • 2003
  • 본 논문에서 제시한 전력감시 시스템은 원주권광역상수도에 적용된 개방형 SCADA 시스템으로 무인화 사업장에 널리 사용되는 설비로서 중앙제어실에서 CRT화면을 통하여 원거리에 위치한 현장설비를 감시할 수 있으며 필요시 제어 명령을 보내서 해당기기를 제어하도록 구성되어 있다. 전기설비를 감시하는 모든 계전기는 디지탈로 구성되어 있어 전압, 전류값을 추적하고 판독하도록 되어 있다. 특히 각 판넬 내부에 설치된 폐쇄배전반 절연열화 진단설비는 전력설비 열화 시 발생하는 부분방전 검출을 위해 30MHz대역의 협대역으로 선정되어 있으며, 1초 동안 펄스 크기와 펄스 수량을 측정하여 열화진행과정을 실시간으로 근무자에게 통보하고, 또한 화재감시센서를 이용하여 화재발생 시 배전반 상부에 설치된 개별형 자동소화기가 동작하여 사고 파급을 막도록 구성하였다.

  • PDF

A Study on Strategies for Applying Zero Trust (제로 트러스트 적용 전략에 관한 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.461-463
    • /
    • 2021
  • With the recent increase in remote access due to network expansion, cloud infrastructure expansion, and telecommuting, the need to be vigilant not only from external access but also from internal access is increasing. Because of this, a new network security model called zero trust is attracting attention. In this paper, we will briefly introduce the concept of zero trust and examine strategies for applying zero trust according to various business environments.

  • PDF

Remote Monitoring Panel and Control System for Chemical, Biological and Radiological Facilities (화생방 방호시설을 위한 원격감시 패널 및 제어시스템)

  • Park, Hyoung-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.1
    • /
    • pp.464-469
    • /
    • 2019
  • A remote monitoring panel and control system was developed to control various valves and access control chambers, including gas shutoff valves used in CBR(Chemical, Biological and Radiological) facilities. The remote monitoring panel consisted of a main panel installed in the NBC (Nuclear, Biological and Chemical) control room and auxiliary panel installed in the clean room, and the size was divided into pure control and control including CCTV. This system can be monitored and controlled remotely according to the situation where an explosion door and gas barrier door can occur during war and during normal times. This system is divided into normal mode and war mode. In particular, it periodically senses the operation status of various valves, sensors, and filters in the CBR facilities to determine if each apparatus and equipment is in normal operation, and remotely alerts situation workers when repair or replacement is necessary. Damage due to the abnormal operation of each device in the situation can be prevented. This enables control of the blower, supply and exhaust damper, emergency generator, and coolant pump according to the state of shutoff valve and positive pressure valve in the occurrence of NBC, and prevents damage caused by abrupt inflow of conventional weapons and nuclear explosions.

A Study on Factors Affecting Usage Intention of Metaverse Services in the Work Environment (업무환경에서의 메타버스 사용의도에 대한 영향요인 연구)

  • Wonsang Cho;Hyunchul Ahn
    • Knowledge Management Research
    • /
    • v.23 no.4
    • /
    • pp.251-273
    • /
    • 2022
  • Metaverse is one of the most frequently used words recently, with digitalization accelerated by the COVID-19 pandemic that started in 2019 and the development of information and communication technology. It is expected to bring a new revolution in our life as a whole in user experience. In particular, as telecommuting was adopted in the business area, interest in virtual office services such as digital video conferencing and remote offices, which are similar to the metaverse, has also increased. In this study, a study on the intention to use the metaverse service used in the work environment was applied to the Unified Theory of Acceptance and Use of Technology 2(UTAUT2). External variables for metaverse characteristics, such as self-presentation, telepresence, and technostress, were analyzed and discussed. In this study, PC-based Gather.town and VR-based Facebook Horizon, currently the most well-known and considered usable in work environments, were introduced to potential users and conducted a survey. This study has academic implications in that the research has examined the factors that affect the technology acceptance intention of users who want to apply the metaverse as a work environment based on the UTAUT2 model, unlike previous studies that have been mainly researched on the general metaverse. In practice, it may be helpful to suggest factors that should be considered when firms adopt the metaverse for business purposes.

Influence Analysis of Telecommunications Network in Electronic Government (전자정부에 정보통신망이 미치는 영향 분석)

  • 박민수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.2
    • /
    • pp.347-356
    • /
    • 2000
  • This paper was studied on influence analysis of Telecommunications Network in Electronic Government. Analysis method was studied of Policy Delphi. The five kinds of telecommunications network influence in Electronic Government is National Information Infrastructure Networt, Local Area Network, Integrated Services Digital Network Public Switched Telephone Network, and Cable TV Network. The five kinds of telecommunications network service influence in Electronic Government is Telecommuting Service, Internet Service, PC Telecommunications Networt Video Conference Service and Electronic Data Interchange Service. The five kinds of telecommunications influence in Electronic Government is as follow: First Telecommuting Service must be Constructed. Second, Public Administration Service must be improved. Third. citizen must be participated in decision making. Fourth, Public Administration duty service must be digitalizing. Fifth, Video Conference Service must be improved.

  • PDF

Design of HSE Management System in a Shipyard using object-oriented Component-Based Development Method (ooCBD방법론을 적용한 조선소의 HSE관리시스템 설계)

  • Oh, Hyun-Soo;Chang, Seong-Rok;Kim, Dong-Joon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.19 no.1
    • /
    • pp.71-77
    • /
    • 2013
  • Smart work has been gaining more popularity recently. Smart work means that employees perform their works anytime and anywhere as utilizing the information and communication technology. It can be divided into four categories; the mobile office, the home office, the work-at-center and the tele-cooperation. Among them, the mobile office based on tablet personal computers(PCs) or smart phones, employees can exchange information with tablet PCs or smart phones via mobile radio communication networks and portable terminals. Smart devices such as tablet PCs and smart phones help to access intranet system for requests, approvals, information search whenever employees need. This mobile office system for real-time HSE managing can contribute to improve the productivity and work efficiency in a shipyard. In this study, the main goal is to design the specialized mobile application for the HSE management system on the shipbuilding industry. The mobile application including 10 functions is designed based on ooCBD(object-oriented Component Based Development) methodology.

Study on Development of Remote Mental Health Care Program with VR for Seafarers

  • Lim, Sangseop;Tae, Hyo-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.195-200
    • /
    • 2021
  • Seafarers play an important role in shipping and logistics. However, seafarers are relatively vulnerable to mental illness because they have to board ships for a considerable period of time and work in isolation. In particular, in the pandemic situation caused by COVID-19, the crew change is delayed due to the closure of many ports around the world, increasing the mental burden on seafarers. The mental health management of the crew is important because these mental problems can lead to major accidents of lives and ships. This paper identified the necessity of mental health management of seafarers through a survey and identified problems with the currently operated mental health management program and curriculum. Especially, this study proposed VR-based programs to help crews receive mentally counseling treatment in a timely manner and to reduce the mental burden on them by preventing sensitive personal information exposure. Through this, it is expected to contribute to the stable development of the logistics industry by establishing a safe seafarers working environment.

Decision Support System to Detect Unauthorized Access in Smart Work Environment (스마트워크 환경에서 이상접속탐지를 위한 의사결정지원 시스템 연구)

  • Lee, Jae-Ho;Lee, Dong-Hoon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.797-808
    • /
    • 2012
  • In smart work environment, a company provides employees a flexible work environment for tele-working using mobile phone or portable devices. On the other hand, such environment are exposed to the risks which the attacker can intrude into computer systems or leak personal information of smart-workers' and gain a company's sensitive information. To reduce these risks, the security administrator needs to analyze the usage patterns of employees and detect abnormal behaviors by monitoring VPN(Virtual Private Network) access log. This paper proposes a decision support system that can notify the status by using visualization and similarity measure through clustering analysis. On average, 88.7% of abnormal event can be detected by this proposed method. With this proposed system, the security administrator can detect abnormal behaviors of the employees and prevent account theft.

Zero Trust-Based Security System Building Process (제로 트러스트 기반 보안체계 구축 프로세스)

  • Ko, Min-Hyuck;Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1898-1903
    • /
    • 2021
  • Recently, the need to be wary of internal access such as internal access as well as external attackers' access to work has increased due to network expansion, cloud infrastructure expansion, and changes in working patterns due to COVID-19 situations. For this reason, a new network security model called Zero Trust is drawing attention. Zero Trust has a key principle that a trusted network does not exist, and in order to be allowed access, it must be authenticated first, and data resources can only be accessed by authenticated users and authenticated devices. In this paper, we will explain these zero trust and zero trust architectures and examine new security application strategies applicable to various companies using zero trust and the process of building a new security system based on the zero trust architecture model.