• Title/Summary/Keyword: 원격 근무

Search Result 117, Processing Time 0.034 seconds

Work and Life Balance in teleworking Environment - Application of CLD, TP, and TRIZ - (원격근무환경에서 일과 삶의 균형방안: 인과지도, 사고프로세스와 트리즈의 적용)

  • Kang, Jae-Jung
    • The Journal of Information Systems
    • /
    • v.29 no.3
    • /
    • pp.179-195
    • /
    • 2020
  • Purpose & Design/methodology/approach Amidst the COVID-19 spread, interest in telework has been increasing as a way to respond to environmental changes and improve organizational performance. In this study, causal loop diagram, thinking process, and four principles of TRIZ were used to find various ways to achieve work-life balance for workers and firms in teleworking environment. Findings The result of the causal loop diagram shows that keeping work-life balance is needed to provide free extra time for workers and achieve the firm's performance through efficient coordination between departments in teleworking environment. Using thinking process of TOC, we proposed a evaporating cloud for work-life balance and reviewed assumptions and premises to maintain extra free time for workers and achieve firm's performance paradoxically, and suggested solutions through the breakdown of the assumptions and premises. Resolving the contradiction(RC) by spatial separation is to divide working spaces into home, smart center, and mobile work types, to find both ways to achieve the organizational performance, and to provide extra time for workers. RC by temporal separation is to divide working time into various unit time, and to find ways to achieve organizational performance through doing work at office or home periodically or shiftly according to a predetermined schedule and time setting. RC by situational separation is to give options of flexible methods of performing work according to the conditions of the company or the worker. RC by separation between part and a whole is to find ways to organize and do the work so that the entire work can be completed efficiently even if each work is performed separately in teleworking way. This study is meaningful in that it provides basic thinking framework for achieving work-life balance in teleworking environment and proposes ways to resolve conflict from various perspectives, but it is limited in that it has not been tested empirically.

천연기념물 제395호 진주 가진리 새발자국과 공룡발자국 화석산지의 새로운 해석

  • Im, Jong-Deok;Gong, Dal-Yong;Kim, Gyeong-Su;Kim, Tae-Hyeong
    • 한국지구과학회:학술대회논문집
    • /
    • 2010.04a
    • /
    • pp.21-21
    • /
    • 2010
  • 천연기념물 제395호 진주 가진리 새발자국과 공룡발자국 화석산지는 1997년 5월 20일, 경남과학교육원 신축 공사장에서 당시 경남과학고등학교 교사로 근무하던 백광석(현재 서상중고등학교 교장)에 의해 최초로 발견되어, 수 백 점의 새발자국 화석과 공룡발자국 화석들이 학계에 알려지게 되었다. 지금까지도 세계 여러나라의 중생대 새 발자국 중에서 가장 밀도가 높은 화석산지로 손꼽히고 있으며 많은 학자들의 관심을 받고 있다. 이곳의 지질은 백악기 하양층군 함안층 하부의 적색 이암 또는 셰일과 사암의 호층으로 구성되어 있고, 새발자국 화석들은 적색 이암에서 발견된다. 현재, 이 화석산지는 경남과학교육원 건물 내부에 위치하고 있으며, '화석문화재전시관'이라는 명칭으로 보호 및 관리되고 있기때문에 자연재해와 풍화에 의한 침식을 1차적으로 막고 있다. 이 화석산지는 우리나라에서는 천연기념물 제394호 해남 우항리 화석산지와 함께 현장을 그대로 보존하면서 화석의 보존과 관리를 동시에 할 수 있는 건물을 지어 자연사교육을 진행할 수 있는 곳으로 많은 학생들을 대상으로 우리나라의 소중한 화석을 직접 관찰하고 학습하는 체험교육이 가능하다. 원격조종카메라 시스템을 활용하여 관람객이 직접 자신이 원하는 발자국 화석을 세부적으로 관찰할 수 있게 장치한 interactive system은 과학교육 효과를 증진시킨다. 선행 연구에 의하면, 본 화석산지에서 익룡의 발자국 화석(KS 071)도 공룡이나 새발자국과 같은 층리면에서 서로 겹쳐서 나타난다고 보고되었으나, 본 연구에 의해 다시 조사된 결과 전형적인 익룡의 발자국 화석에서 보이는 분명한 특징들을 발견할 수 없었다. 물갈퀴를 가진 새발자국 가운데에서 Uhangrichnus chuni 와 Jindongornipes kimi 로 기재된 표본들에 대하여서도 새롭게 분석하였다. Uhangrichnus chuni로 기재된 많은 표본들은 II-IV번 발가락 사이의 각, 물갈퀴의 형태, 뚜렷한 hallux 등의 형태적 특징을 근거로 할 때, 대부분이 Ignotorinis yangi로 판단된다. Jindongornipes kimi로 기재된 표본들은 이미 기재된 표본보다 크기가 적어도 10%-25%가 작으며, II-IV번 발가락 사이의 각에서 차이를 보인다.

  • PDF

Analysis on the Current Virtual Workplace Design Trends, and a Proposal for the Design Directions of the Future Virtual Workplace - Based on 12 Current Virtual Workplace Platforms - (가상 업무 공간의 디자인 현황 분석 및 향후 디자인 방법에 관한 제언 - 12개의 현행 사례의 비교분석을 중심으로 -)

  • Cho, Kyung hyun;Eum, Yu jeung;Choi, Hyeok jin;Lee, Seung Hyun;Cha, Seung Hyun
    • Journal of KIBIM
    • /
    • v.12 no.4
    • /
    • pp.80-92
    • /
    • 2022
  • Recently, remote work has arisen due to the social atmosphere and advancement of digital technology. Although effective in premeditated communications such as conferences or meetings, the current technology such as messengers and video chats insufficiently supports impromptu communications like a chance encounter, daily conversation with colleagues, or brief instant meetings. This causes various problems such as a decrease in social belonging and an increase in social isolation. The virtual workplace, which emerged as an alternative to this technology, is merely replicating the workplace layouts in reality with an absence of the proper design guideline. Therefore, this paper aims to establish the foundation for the better design of the virtual workplace for remote-work employees. The research compared 12 current workplace cases with the analysis with 5 categories(Spatial Composition, Scale, Individual & Collaboration Workplace, Socializing Space), and discovered the following results: 1) some design principles of the real workplace can be applied on the virtual workplace design, 2) the architectural components of the virtual workplace can differ from them of the real. Based on the results, the research suggests both the appropriate design methodologies of the virtual workplace considering the design principles of the real office layouts, and the design direction for the future of the virtual workplace. This research will be the foundation for the future design of the virtual workplace.

Machine Learning-Based Malicious URL Detection Technique (머신러닝 기반 악성 URL 탐지 기법)

  • Han, Chae-rim;Yun, Su-hyun;Han, Myeong-jin;Lee, Il-Gu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.555-564
    • /
    • 2022
  • Recently, cyberattacks are using hacking techniques utilizing intelligent and advanced malicious codes for non-face-to-face environments such as telecommuting, telemedicine, and automatic industrial facilities, and the damage is increasing. Traditional information protection systems, such as anti-virus, are a method of detecting known malicious URLs based on signature patterns, so unknown malicious URLs cannot be detected. In addition, the conventional static analysis-based malicious URL detection method is vulnerable to dynamic loading and cryptographic attacks. This study proposes a technique for efficiently detecting malicious URLs by dynamically learning malicious URL data. In the proposed detection technique, malicious codes are classified using machine learning-based feature selection algorithms, and the accuracy is improved by removing obfuscation elements after preprocessing using Weighted Euclidean Distance(WED). According to the experimental results, the proposed machine learning-based malicious URL detection technique shows an accuracy of 89.17%, which is improved by 2.82% compared to the conventional method.

A Study on the Utilization of Metaverse Space in Local Governments from the Perspective of Public Design (공공디자인의 관점에서 본 지자체의 메타버스 공간 활용에 관한 연구)

  • Choi, Jae-won;Yeo, Joon-ki
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.705-712
    • /
    • 2022
  • The pandemic over the past three years has brought drastic changes in our lives, and those changes are now becoming a natural part of our daily lives. Daily life and economic activities based on online, such as video conferencing, remote classes, telecommuting, and online streaming services, have become daily routines after Corona. And the result of rapid development of communication and graphic technology is the metaverse. Therefore, the purpose of this study is to study the possibility from the perspective of public design for the correct use of the metaverse space of local governments. To this end, in this study, big data analysis was performed on 'local government', 'public design', and 'metaverse'. As a result of this study, we should actively use metaverse with high topic and potential as a space for local governments' promotion or discussion as a means to restore the reliability of local governments and overcome negative perceptions. In addition, it is necessary to actively reflect public design in order to increase the public reliability of local governments' metaverse.

Smart Safety Management System of Industrial Site using Zigbee Communication (Zigbee 통신을 활용한 산업현장의 스마트 안전관리 시스템)

  • Min, Ji-Hyeon;Jeong, Ga-Yeong;Ha, Hyun-Dong;Hwang, In-Tae;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.546-549
    • /
    • 2022
  • In recent years, to prevent the increase in accidents at industrial sites, various innovative technologies from the 4th industrial era have been incorporated into the construction administration to promote the advancement of safety management. As a result, smart safety management systems using intelligent monitoring that prevent and manage risks in industrial sites in real time are attracting attention. Smart safety management systems provide users with real-time, remote monitoring of factors such as noise, gas concentration fine dust concentration, building material quality, building tilt, and RFID-based worker access through sensors located everywhere. This paper presents a method for collecting and monitoring various data for smart safety management systems via Zigbee communication using Raspberry Pi.

  • PDF

Cloud Security Scheme Based on Blockchain and Zero Trust (블록체인과 제로 트러스트 기반 클라우드 보안 기법)

  • In-Hye Na;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.55-60
    • /
    • 2023
  • Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.

Enhancement of Enterprise Security System Using Zero Trust Security (제로 트러스트 보안을 활용한 기업보안시스템 강화 방안)

  • Lee, Seon-a;Kim, Beom Seok;Lee, Hye in;Park, Won hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.214-216
    • /
    • 2021
  • It proposes a plan to strengthen the limitations of existing corporate security systems based on Zero-Trust. With the advent of the era of the Fourth Industrial Revolution, the paradigm of security is also changing. As remote work becomes more active due to cloud computing and COVID-19, security issues arising from the changed IT environment are raised. At the same time, in the current situation where attack techniques are becoming intelligent and advanced, companies should further strengthen their current security systems by utilizing zero trust security. Zero-trust security increases security by monitoring all data communications based on the concept of doubting and trusting everything, and allowing strict authentication and minimal access to access requestors. Therefore, this paper introduces a zero trust security solution that strengthens the existing security system and presents the direction and validity that companies should introduce.

  • PDF

Research on the Zero Trust Trend Analysis and Enterprise Security Enhancement (제로트러스트 동향 분석 및 기업 보안 강화 연구)

  • Min Gyu Kim;Chanyoung Kang;Sokjoon Lee
    • Smart Media Journal
    • /
    • v.12 no.5
    • /
    • pp.46-57
    • /
    • 2023
  • As the COVID-19 pandemic and the development of IT technology have led to the gradual popularization of remote and telecommuting, cloud computing technology is advancing, and cyber attack techniques are becoming more sophisticated and advanced. In response to these trends, companies are increasingly moving away from traditional perimeter-based security and adopting Zero Trust to strengthen their security. Zero Trust, based on the core principle of doubting and not trusting everything, identifies all traffic and grants access permissions through a strict authentication process to enhance security. In this paper, we analyze the background of Zero Trust adoption and the adoption policies and trends of countries that are proactively promoting its implementation. Additionally, we propose necessary efforts from governments and organizations to strengthen corporate security and considerations for companies when applying Zero Trust.

Strengthening Enterprise Security through the Adoption of Zero Trust Architecture - A Focus on Micro-segmentation Approach - (제로 트러스트 아키텍처 도입을 통한 기업 보안 강화 방안 - 마이크로 세그먼테이션 접근법 중심으로 -)

  • Seung-Hyun Joo;Jin-Min Kim;Dae-Hyun Kwon;Yong-Tae Shin
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.3-11
    • /
    • 2023
  • Zero Trust, characterized by the principle of "Never Trust, Always Verify," represents a novel security paradigm. The proliferation of remote work and the widespread use of cloud services have led to the establishment of Work From Anywhere (WFA) environments, where access to corporate systems is possible from any location. In such environments, the boundaries between internal and external networks have become increasingly ambiguous, rendering traditional perimeter security models inadequate to address the complex and diverse nature of cyber threats and attacks. This research paper introduces the implementation principles of Zero Trust and focuses on the Micro Segmentation approach, highlighting its relevance in mitigating the limitations of perimeter security. By leveraging the risk management framework provided by the National Institute of Standards and Technology (NIST), this paper proposes a comprehensive procedure for the adoption of Zero Trust. The aim is to empower organizations to enhance their security strategies.