• Title/Summary/Keyword: 경계근무

Search Result 34, Processing Time 0.023 seconds

드론을 통해 보는 다목적 스마트 이동기기 산업의 미래

  • Lee, Gyeong-Jeon
    • The Optical Journal
    • /
    • s.158
    • /
    • pp.58-60
    • /
    • 2015
  • 드론이 인기다. 드론이 뜨고 있다. 드론은 왜 인기인가? 왜 드론이 인기인지를 인식해보아야 한다. 결론부터 이야기하면 드론이 인기인 이유는 드론이 MMM이기 때문이다. MMM은 필자가 2년 전 쯤에 만든 신조어로 Multipurpose Mobile Machine의 약자다. 다목적 이동 기계라는 말이다. 우리말로 줄이면 다이기(多移機)쯤 된다. 드론은 다목적 이동 기계, 즉 다이기이다. 인터넷이 군용으로 사용되다가 민간이 사용하게 된 것처럼 드론 역시 정찰, 감시, 폭격 등의 군사용으로 출발했지만, 민간이 사용하는 드론의 용도는 무척 다양하다. 사진 촬영, 영화 제작, 드라마 촬영, 음식 배달, 씨앗의 파종과 농약의 살포, 현장 탐사, 경계 근무 등 정말 다용도에 사용되고 있다. 중요한 것은 드론 각각이 다목적으로 사용될 수 있다는 것이다. 이는 드론이 단지 물리적 기계인 것이 아니라 스마트 기계로, 스마트폰과 같은 SW중심 기기와 드론에 내장된 OS와 SW에 의한 제어를 통해 비로소 실현된다. 즉, 드론은 MMM이기도 하지만, 정확히 SMM(Smart Mobile Machine)이기 때문에 그 잠재성이 인정받고 있는 것이다. 지금까지 스마트 폰, 스마트 워치, 스마트 TV 등은 모두 스마트 기기이기는 하지만 스마트 이동 기기는 아니다. 한편, 로봇 청소기 등 기존의 가정용 로봇이나 산업용 로봇은 대부분 단일목적 이동기기이거나 다목적 고정 기계이므로, 로봇이라 부르기가 민망한 기계들이었다. 필자는 드론이 이렇듯 새로운 스마트 기기 산업과 기존의 로봇 산업이 갈 길 또는 가고 있는 길을 보여주고 있다는 점에서 관심을 갖는다. 스마트 기기 산업의 관점에서는 이제 비로소 고정형(스마트TV), 부착형(스마트 워치), 휴대형(스마트 폰) 스마트 기기 산업에서 다목적 스마트 이동 기계라는 새로운 블루 오션 창출 산업이기에 의미가 있다.

  • PDF

A Study on Factors that Trigger Human Errors Related to Causes of Ship Collisions (선박충돌사고 원인과 관련된 인적과실 유발요인에 관한 연구)

  • Kim, Dae-Sik
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.7
    • /
    • pp.801-809
    • /
    • 2017
  • The purpose of this study is to contribute to the prevention of ship collisions by investigating real ship collision cases and statistically analyzing causes of human error for captains and Officers of the Watch (OOW). This study encompassed a total of 109 cases for 218 vessels, which were suitable for the analysis of ship accidents between merchant ships or merchant ships and fishing boats over the 7 years from 2010 to 2016. Data was collected while classifying vessels according to type, Give-way and Stand-on vessels, along with the cause of human error. Factors causing human error were identified after focusing on the cause of each collision given by the OOW ; frequency and cross tabulation analyses were conducted using SPSS, a statistical analysis tool. As a result, the main causes of human error by an OOW in a ship collision situation were that lookout was neglected in a Give-way vessel including radar surveillance (74.3 %) or continuous observation of an opponent vessel was carried out (17.4 %). A major factor for Stand-on vessels was failure to act to avoid collision with another vessel (63.3 %). In particular, most neglect for lookout type merchant ships occurred after the opponent ship was first observed, and a common cause of lookout neglect and neglect of duty was a focus on other tasks during navigational watch time.

The Contents of Emergency Treatment Practice Conducted by Emergency Medical Technician and Related Factors (일부 응급구조사들의 응급처치 시행내용과 관련 요인)

  • Jeong, Sang-Gil;Kim, Ki-Soon;Cho, Soo-Hyung;Kang, Myung-Geun;Han, Mi-Ah
    • Journal of agricultural medicine and community health
    • /
    • v.34 no.3
    • /
    • pp.346-358
    • /
    • 2009
  • Objectives: A study was conducted by analysing the contents and frequency of emergency treatment practiced by emergency medical technicians(EMTs) in emergency situations and contains related factors. Methods: The study subjects included 80 EMTs who participated in ongoing education classes during the period from June 25th to June 26th, 2008. the survey included 53 EMTs employed within 119 first aid teams in fire stations in both a metropolitan city and a medium-sized city. From the survey results relation between frequency of emergency treatment and subjects characteristics explored statistically including t-test, X2 test, Pearson correlation and finally stepwise multiple regression. Results: The most frequent procedure by EMTs checking vital signs. The statistically significant related factors overall of the 23 items of emergency treatment frequency was the working area and the grading of EMT certification. In contrast, significant related factors with frequency of IV linkage were found to be the subjects gender, institution employed and the importance of recognizing the item. The statistically significant related factors of that of ECG monitoring was the gender of respondents. Conclusions: To keep the appropriate frequency of emergency treatment by EMT, active efforts to promote their individual importance and confidence cognition are necessary, especially towards males and persons who have 2nd class certification. Moreover, EMTs who work in small cities must be supported.

Fun Space or workplace? The Role of Humor in Navigating Work-personal Space in South Korean Organizations (일탈적 행위, 유머: 한국 기업 구성원의 일과 개인 공간의 지각)

  • Kim, HeeSun;Woo, Sung Ho
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.666-683
    • /
    • 2021
  • Organizational humor is generally perceived as a phenomenon that helps to develop happy feelings and positive workspace. While humor may affect organizational members in diverse ways, the ambiguous nature of humor may create uncertainty and unexpected outcomes. In particular, humor used by and between organizational members in diverse organizational situations (including physical office context and work hours) may influence individual's perception of space. Findings suggest that humor interaction acts as a form of deviant behavior that diverts from work. This momentary non-work event (humor) may serve as a ritual to influence individual's perception of space, from work to personal domain, and vice versa. The quality of interpersonal relationships between the communicators may also be influenced by humor. This shift in the nature of interaction (from work to non-work) may lead to blurring boundaries of work and work experiences. Therefore, organizational humor may provide insights into how workers interact, perceive, and manage work and personal space within organizational contexts.

Cloud Security Scheme Based on Blockchain and Zero Trust (블록체인과 제로 트러스트 기반 클라우드 보안 기법)

  • In-Hye Na;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.55-60
    • /
    • 2023
  • Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.

A study on ways to strengthen the new security system through the stipulation of zero trust : legal improvement under the Electronic Financial Transactions Act (제로 트러스트 명문화를 통한 신 보안체계 강화 방안 연구 - 전자금융거래법상 법적 개선을 중심으로 -)

  • Min-won Lee;Hun-yeong Kwon
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.9-17
    • /
    • 2023
  • Due to COVID-19, the concept of Zero Trust, a safe security in a non-face-to-face environment due to telecomm uting, is drawing attention. U.S. President Biden emphasized the introduction of Zero Trust in an executive order to improve national cybersecurity in May 2021, and Zero Trust is a global trend. However, the most difficulty in introd ucing new technologies such as Zero Trust in Korea is excessive regulation of cloud and network separation, which is based on the boundary security model, but is limited to not reflecting all new information protection controls due to non-face-to-face environments. In particular, in order for the government's policy to ease network separation to b ecome an effective policy, the zero trust name culture is essential. Therefore, this paper aims to study legal improve ments that reflect the concept of zero trust under the Electronic Financial Transactions Act.

Enhancement of Enterprise Security System Using Zero Trust Security (제로 트러스트 보안을 활용한 기업보안시스템 강화 방안)

  • Lee, Seon-a;Kim, Beom Seok;Lee, Hye in;Park, Won hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.214-216
    • /
    • 2021
  • It proposes a plan to strengthen the limitations of existing corporate security systems based on Zero-Trust. With the advent of the era of the Fourth Industrial Revolution, the paradigm of security is also changing. As remote work becomes more active due to cloud computing and COVID-19, security issues arising from the changed IT environment are raised. At the same time, in the current situation where attack techniques are becoming intelligent and advanced, companies should further strengthen their current security systems by utilizing zero trust security. Zero-trust security increases security by monitoring all data communications based on the concept of doubting and trusting everything, and allowing strict authentication and minimal access to access requestors. Therefore, this paper introduces a zero trust security solution that strengthens the existing security system and presents the direction and validity that companies should introduce.

  • PDF

Research on the Zero Trust Trend Analysis and Enterprise Security Enhancement (제로트러스트 동향 분석 및 기업 보안 강화 연구)

  • Min Gyu Kim;Chanyoung Kang;Sokjoon Lee
    • Smart Media Journal
    • /
    • v.12 no.5
    • /
    • pp.46-57
    • /
    • 2023
  • As the COVID-19 pandemic and the development of IT technology have led to the gradual popularization of remote and telecommuting, cloud computing technology is advancing, and cyber attack techniques are becoming more sophisticated and advanced. In response to these trends, companies are increasingly moving away from traditional perimeter-based security and adopting Zero Trust to strengthen their security. Zero Trust, based on the core principle of doubting and not trusting everything, identifies all traffic and grants access permissions through a strict authentication process to enhance security. In this paper, we analyze the background of Zero Trust adoption and the adoption policies and trends of countries that are proactively promoting its implementation. Additionally, we propose necessary efforts from governments and organizations to strengthen corporate security and considerations for companies when applying Zero Trust.

A Study On Operation for DevOps Using Zero Trust in Network Separation Environment (망분리 환경에서 제로 트러스트를 활용한 DevOps 운영에 관한 연구)

  • Bong-Yong Han;Young-Kun Choi;Ga-Yeon So;Yong-Tae Shin
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.27-34
    • /
    • 2024
  • Network separation is an important policy that Cyber Incident prevent cyber and protect data. Recently, the IT environment is changing in software development, such as remote work, using the cloud, and using open sources. Due to these changes, fintech companies' development productivity and efficiency are lowering due to network separation regulations, and the demand for easing network separation continued. The government revised the regulations electronic financial supervision(hereafter EFS) in response to needs for mitigation of network separation in the IT environment and fintech companies. Some amendments to the EFS, which took effect on 01/01/2023, mitigate network separation only for research and development purposes in cloud environments. If software developed in a cloud development environment is applied to an operating system through a distribution system the existing perimeter-based security model will not satisfaction the network separation conditions. In this Study, we would like to propose a way to maintain the DevOps system in a network separation environment by Using the zero trust security system.

Concept Mapping Analyzing on Counselors' Vicarious Trauma Experience from Working with Victims of Sexual Violence (성폭력 상담자 대리외상 경험에 대한 개념도 연구)

  • Heo, Chan-hee;Lee, Jee-yon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.457-471
    • /
    • 2020
  • The purpose of this study is to explore the in-depth content of vicarious trauma experience of sexual violence counselors and to develop intervention strategy. To this end, depth interviews were conducted with twelve sexual violence counselors working at the sexual violence counseling site for more than three years. In addition, using the concept mapping method, the content exploration of the experience of vicarious trauma of sexual violence counselors was confirmed, and its conceptual structure was identified. As a result, 60 key sentences regarding the experience of vicarious trauma of sexual violence counselors were extracted. Then, multi-dimensional scale and cluster analysis were conducted after making nineteen appraisal participants who are under the same condition as depth interview participants to categorize and assess key sentences. As a result of analysis, the x-axis of negative perception, psychological and emotional dimension, and the y-axis of personal inner and behavioral dimension appeared, and five clusters emerged: immersion and skepticism about work, experience of emotional assimilation, hypersensitivity to sex, increased vigilance against men, and threat of safety. This provided basic data that could categorize and identify the contents of vicarious trauma of sexual violence counselors experience by sexual violence counselors.