• Title/Summary/Keyword: Non-face-to-face work environment

Search Result 28, Processing Time 0.026 seconds

Research on Security Threats for SMEs by Workplace in the COVID-19 Environment

  • Kim, Woo-Su;Lim, Heon-Wook
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.307-313
    • /
    • 2022
  • Although telecommuting of SMEs has been activated due to the COVID-19 phenomenon, the security model for this is insufficient. Accordingly, the study was divided into threats centered on smartphones and threats centered on smartphone users. As a result of the study, one-third of SMEs are working from home. At this company with 100 employees, more than 50% of them work from home.and In the metal, machinery and chemical industries with factories, 20% of them work from home. As a result of analyzing the correlation between telecommuting according to the presence or absence of a factory, the correlation coefficient (r=-.385) has a clear linear relationship. And, as a result of the regression analysis, the R-squared value was 0.148, so companies with factories are highly related to telecommuting. In other words, we found that SMEs with factories do not want to work from home. In addition, as a result of analyzing the level of security threats, there were great concerns about theft, hacking, and phone taking during remote work. As limitations of the study, there were difficulties in selecting SMEs from the population in a non-face-to-face work environment, and there were limitations in the questionnaire items for deriving a non-face-to-face work environment.

The Non-face-to-face Smart Mailbox System Based on ICT (ICT 기반 비대면 스마트 우편함 교부기)

  • Lee, Woo;Kwon, Jun-A;Kim, Won-Jung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1227-1234
    • /
    • 2019
  • With the change of times, the postal service environment and the customer's service needs are changing greatly. In this paper, we researched to improve inefficient service for registered mail by using ICT technology. ICT-based non-face-to-face smart mailbox system can deliver mail efficiently and improve customer satisfaction. In addition, it is expected that it will be able to reduce the work intensity of the mailman delivery of mail and greatly improve the working environment of the on-site deliverymen.

A Study on the Applicability of Non-Supporting System Forms for Single Face Walls in Underground Construction (지하층 합벽 무지주 시스템 거푸집의 적용성에 관한 연구)

  • Kim, Jae Yeob;An, Sung-Hoon;Sohn, Young-Jin
    • KIEAE Journal
    • /
    • v.8 no.2
    • /
    • pp.87-92
    • /
    • 2008
  • Underground building constructions are recently more important because the ratio of underground area is increasing in the huge and high-rise building construction projects. For reducing the total building construction periods, it is required to reduce not only the over-ground structural work periods but also the underground structural work periods. Therefore, this study is proposed the non-supporting system forms for single face walls in underground building construction by one of the methods for reducing the underground structural work periods and investigated the applicability of the non-supporting system forms by analyzing the case-study in civil construction project. In regard of construction duration, the results of analyzing the case-study showed that the non-supporting system forms are better than the euro forms with soldier system for single face walls in underground building construction. In addition, it is showed that the cost of these two forms is similar and usage the working space and safety in non-supporting system forms are better that those of the euro forms with soldier system, too.

Examining User Perception about Airline Untact Service Quality (항공사 비대면 서비스 품질에 대한 이용자 인식 연구)

  • Lee, Sojeong;An, Jaeyoung;Yun, Haejung
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.3
    • /
    • pp.545-570
    • /
    • 2022
  • Purpose: The purpose of this study was to explore dimensions to improve airline non-face-to-face(untact) service quality and identify shadow work dimensions in the digital environment among them. Methods: This study conducted mixed method. First of all, For finding out the dimensions of airline untact service quality, in-depth interviews were conducted from passengers. The collected data through the survey were analyzed using improved importance-performance analysis(IPA). Second, An online survey was conducted to quantitatively analyze user perception about airline untact service quality, and the importance performance of service quality at each dimension was identified through the revised IPA method. Results: The results of this study are as follows; Through in-depth interviews, 11 dimensions found out and 32 measurement items were developed. and then, through the revised IPA analysis, passengers were highly satisfied with "Cleanliness of in-flight service" and "Reliability of self check-in". Also, We found 3 shadow work dimensions such as "Ease of use of self check-in", "Usefulness of self check-in", and "Responsiveness of self check-in". Conclusion: Airline service providers have to keep high-satisfaction services and urgently improve less satisfied services. In particular, the dimensions related to shadow work have to be improved.

The Effect of VDI Technical Characteristics on Interaction and Work Performance (VDI 기술특성이 상호작용과 업무성과에 미치는 영향에 관한 실증적 연구)

  • Kwak, Young;Shin, Min Soo
    • Journal of Information Technology Services
    • /
    • v.20 no.4
    • /
    • pp.95-111
    • /
    • 2021
  • Recently, many organizations are actively adopting VDI (Virtual Desktop Infrastructure), an IT-based business system, to build a non-face-to-face business environment for smart-work. However, most of the existing research on VDI has focused on the satisfaction of system service quality or the use of IT resources and investment for VDI introduction. However, research on effective management and utilization of factors according to the characteristics of VDI technology is urgently required. This study is an empirical research study on how VDI technology characteristics affect interactions and work performance by identifying differences in utilization factors between general organization members and IT managers, presenting standards for business utilization and management. This study proposed a model and hypothesis that the system technology characteristics for VDI use are mediated by interactions in which users respond to functions appropriate to their work. In order to verify the hypothesis, a questionnaire survey was conducted on 188 people of companies and institutions that have adopted and used VDI through a questionnaire survey. Data analysis was performed with partial least squares (PLS), a structural equation modeling (SEM) technique that uses a component-based approach to estimation. As a result of the empirical analysis, the same environmental function for performing work, N-th security, and remote access function factors for non-face-to-face work have a significant effect on interactivity, and IT managers have an additional significant effect on the management technology characteristics of resource reallocation. Has been shown to affect. The results of this study aim to minimize trial and error due to new introduction by presenting considerations for future VDI introduction through case analysis.

Shoe Recommendation System by Measurement of Foot Shape Imag

  • Chang Bae Moon;Byeong Man Kim;Young-Jin Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.9
    • /
    • pp.93-104
    • /
    • 2023
  • In modern society, the service method is tended to prefer the non-face-to-face method rather than the face-to-face method. However, services that recommend products such as shoes will inevitably be face-to-face method. In this paper, for the purpose of non-face-to-face service, a system that a foot size is automatically measured and some shoes are recommended based on the measurement result is proposed. To analyze the performance of the proposed method, size measurement error rate and recommendation performance were analyzed. In the recommendation performance experiments, a total of 10 methods for similarity calculation were used and the recommendation method with the best performance among them was applied to the system. From the experiments, the error rate the foot size was small and the recommendation performance was possible to derive significant results. The proposed method is at the laboratory level and needs to be expanded and applied to the real environment. Also, the recommendation method considering design could be needed in the future work.

On the Development of Robot based Automation System for Loading Cargo in Small and Medium Sub Terminals

  • Park, Jae Min;Lee, Sang Min;Kim, Young Min
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.90-96
    • /
    • 2021
  • The logistics market is continuously growing due to the development of technology and the growth of the online market. In addition, the social atmosphere that emphasizes non-face-to-face due to the pandemic situation is accelerating the growth of logistics. Delivery of goods ordered online requires delivery process through courier worker. In order for the courier worker to ship the product, the work of loading the product on the truck must be preceded. The accident caused by such delivery and loading work is increasing and it is emerging as a social problem. This study proposes a robot-based automated loading system to efficiently handle the increasing volume of courier service and to construct a more efficient and safe working environment by replacing the physical labor that was overloaded to courier workers. The proposed system replaces the loading of the courier worker and proposes the optimal loading function through the automation system.

A Study on How to Build a Zero Trust Security Model (제로 트러스트 보안모델 구축 방안에 대한 연구)

  • Jin Yong Lee;Byoung Hoon Choi;Namhyun Koh;Samhyun Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.189-196
    • /
    • 2023
  • Today, in the era of the 4th industrial revolution based on the paradigm of hyper-connectivity, super-intelligence, and superconvergence, the remote work environment is becoming central based on technologies such as mobile, cloud, and big data. This remote work environment has been accelerated by the demand for non-face-to-face due to COVID-19. Since the remote work environment can perform various tasks by accessing services and resources anytime and anywhere, it has increased work efficiency, but has caused a problem of incapacitating the traditional boundary-based network security model by making the internal and external boundaries ambiguous. In this paper, we propse a method to improve the limitations of the traditional boundary-oriented security strategy by building a security model centered on core components and their relationships based on the zero trust idea that all actions that occur in the network beyond the concept of the boundary are not trusted.

A Study on Space Utilization according to Changes in Non-face-to-Face Consumer Use : Focused on bank offices

  • Hwang, Sungi;Ryu, Gihwan;Yun, Daiyeol;Kim, Heeyoung
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.271-278
    • /
    • 2020
  • Modern financial services go beyond the stage of internet banking, and new concepts of financial transactions such as Internet of Things, mobile banking, electronic payments, and fintech have emerged. As a result, banks are less influential in financial transactions, and changes are being demanded. In the present era, the basic business of banks has decreased, and it is transforming into a space where both consumer finance work and reside. The bank office stands for the brand image of the bank, and it is represented by trust with customers in the basic business of financial transactions, and the rise in real estate value is a natural social phenomenon due to the nature of the location and location of real estate owned by the bank. The business method and space of the bank office that meets the new paradigm of the modern society is an inefficient space only for the convenience and rest of consumers, but it must be used as a variety of spaces suitable for the region to increase the functional value of the bank office. Through this study, as a convenience space for consumers, various service facilities should be introduced to understand the characteristics of the region as a convenience space for consumers, and various service facilities should be introduced to meet the needs of consumers, and the bank office should be improved as a complex service space for local residents.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.