Научная статья на тему 'Research and analysis of systems for monitoring the behavior of employees on the computer'

Research and analysis of systems for monitoring the behavior of employees on the computer Текст научной статьи по специальности «Техника и технологии»

CC BY
16
3
i Надоели баннеры? Вы всегда можете отключить рекламу.
Журнал
Science and Education
Область наук
Ключевые слова
CrocoTime / monitoring / input devices / company structure / minimum and maximum working / progress indicator

Аннотация научной статьи по технике и технологии, автор научной работы — Bobur Ergashov

CrocoTime software is a necessary tool for monitoring the behavior of employees on their computers. CrocoTime program is a program installed on the computer of employees and serves to collect statistical information about the activity of this computer. CrocoTime Server is a program that receives employee statistics in CrocoTime and displays the data in graphic and text form through a web interface in an Internet browser. Statistical data is collected in the CrocoTime time tracking system by real-time monitoring that transmits data to the server via the corporate local network or the Internet.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «Research and analysis of systems for monitoring the behavior of employees on the computer»

Research and analysis of systems for monitoring the behavior

of employees on the computer

Bobur Ergashov Chirchik State Pedagogical University

Abstract: CrocoTime software is a necessary tool for monitoring the behavior of employees on their computers. CrocoTime program is a program installed on the computer of employees and serves to collect statistical information about the activity of this computer. CrocoTime Server is a program that receives employee statistics in CrocoTime and displays the data in graphic and text form through a web interface in an Internet browser. Statistical data is collected in the CrocoTime time tracking system by real-time monitoring that transmits data to the server via the corporate local network or the Internet.

Keywords: CrocoTime, monitoring, input devices, company structure, minimum and maximum working, progress indicator

Introduction

Digital tесhnоlоgiеs аrе sо dеерlу rооtеd in оur lives that tоdау wе саnnоt imаginе not оnlу оur dаilу асtivitiеs, but аlsо thе dеvеlорmеnt оf sосiо-есоnоmiс fiеlds withоut thеm. Of course, аs in оthеr аrеаs, the intrоduсtiоn оf аdvаnсеd tесhnоlоgу in the tах оffiсе will fundamentally change its operation. It not only refers to the relationship between the taxpayer and the tax authority, but brings innovations from reporting to ways of paying taxes and recording data.

First of all, a modern method of input, collection, formation and analysis of data was created by creating a unified electronic platform of the system. As a result, the process of submitting tax returns was reduced by 5-7 times. To date, an online portal has been created for one electronic classification of goods and services of the Republic of Uzbekistan, consisting of 112 groups and 1348 categories of goods and services. More than 900,000 electronic invoices were created with product and service ID codes.

Widespread adoption of electronic invoices has improved tax administration. In the second half of last year, the turnover included in the tax base through this electronic system was 798,400 billion, i.e. the indicator increased by 3.5 times compared to the first half of the year.

Today, digital technology is developing rapidly and requires staying up-to-date in all areas. For example, the adoption of artificial intelligence technology helps to detect tax evasion, prevent fraud, analyze data and automate processes and increase transparency. Big data - big data allows the tax authority to store and process large

amounts of data, better forecast revenues and improve document exchange between the taxpayer and the tax authority.

FYI, artificial intelligence is a separate field of informatics and a computer or machine must imitate the capabilities of the human mind. Simply put, AI is a technology that aims to make computers think like humans and come up with solutions. Big data is a term used for more than 100 gigabytes of data flow per day. Later, thanks to the rapid growth of knowledge, this concept took on a wider scope. The term is often used to refer to large amounts of data at the terabyte, exabyte, and petabyte scales.

Tax evasion, industrial fraud and the current state of data storage, processing and analysis are several national and international challenges today. For example, according to a 2020 report by the Tax Justice Network, tax evasion and tax evasion cost countries around the world $427 billion a year. The United States alone loses $188.8 billion annually to tax evasion, while China loses $66.8 billion and Japan $46.9 billion.

As the number of requests to the database through electronic government services and information systems increases every year in our country's tax system, improving the rapid analysis of data is on the agenda. The memory capacity of the Tax Board's existing server equipment is currently 90 percent in use. The equipment of the data processing center is outdated, and the existing servers cannot quickly process and analyze large volumes of data generated both by online billing and online checkout, as well as from external sources. In this regard, the adoption of smart and big data technologies is beneficial.

Main part:

It is also possible to track non-PC activities associated with clients using the automatic time tracking feature. The system takes into account the activity of peripheral input devices (keyboard, mouse) and calculates the time of working with an active program window or an active browser tab. If the computer mouse or keyboard is not used for 5 minutes, the system does not consider this time as the employee's working time.

The system replicates the company structure; reports are compiled by department and each employee (Fig. 1). The program calculates the total working time and also divides it into productive time and distraction time. Reports show all the programs and sites you've logged into, worked on, which allows you to quickly analyze how well your employees are spending their time. CrocoTime displays the activity chart: you can automatically monitor the minimum and maximum working hours of employees. Statistics are available by day within a week or month, as well as hourly within a day. You'll find out in detail what your employees did, when they did it, and what programs they used. This is very convenient for monitoring the work of remote specialists. The start and end of work, the working hours and breaks of employees are clearly indicated

and you can see the details for each individual period. The progress indicator shows at which time the employee worked on which task. In addition, you can display meetings and conferences in corporate calendars, as well as calls when integrated with IP

telephony systems.

Category Purpose Example

Prediction and flagging Used to identify or deter perceived rule-breaking or fraud. Downloading sensitive documents to personal computers Visiting sites with malicious codes

Biométrie and health data Collected through wearable technology such as fitness tracking apps and biometric timekeeping systems Fatigue monitoring systems are designed to decrease accidents and can be used to monitor things such as truck driver speed, driving behavior, pulse and heart rate and even general "state of mind" or alertness.

Remote monitoring/time (racking Used to manage workers and measure performance, especially of work done remotely • Tracking things such as number of keystrokes, time in an application (active vs. idle time), number of meetings/hours online • Delecting possible wage theft can potentially provide employers for what they think is justification to trim what counts as paid work time.

Management by algorithm Passive collection of data used to send workers automated "nudges"based on performance/productivity sometimes in real-time Can sometimes be used as a form of automated decisionmaking (e g , promotion, other types of mobility, continued employment)

Figure 1. Employee Monitoring Software

Conclusion

Using the Crocotime program to automatically control the behavior of employees on their computers, it is possible to automatically monitor the start and end times of employees' work, distraction time, non-computer activity, programs and sites used during work. Employees' working time, overtime, idle time and even work efficiency are shown as a percentage. In short, this program is convenient in every way and is preferable to other programs.

References

1. Christensen, R. Parallel Forms of Measuring Teachers" Attitudes toward computers / R. Christensen // Information Technology & Teacher Education (SITE)"s 9th International Conference,Washington, DC. 1998

2. Jay, T. B. Computerphobia: What to do about it? / T. B. Jay // Educational Technology. - 1981. - January. - P. 47-48.

3. Weil, M. M. The etiology of computerphobia /M. M. Weil, L. D. Rosen, S. E. Wugalter // Computers in Human Behavior. - 1990. - 6. - P. 361-379.

4. TapaHHHa, M. H. Цeннocтнo-мoтнвaцнoннвIe OTHomeHHA npenogaBaTe^en BHcmei mKona K нн$oрмaцнoннo - TexHO-roranecKOH geflTe.ntHOCTH /M. H rapaHHHa, M. E. ^MHTpneB, A. E. Cepè^KHHa // BecraHK Ka3aH. Tex- HOÏÏ. yH-Ta. -2010. - № 12. - C. 93-96.

5. Kabulov A. et al. Algorithmic method of security of the Internet of Things based on steganographic coding //2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS). - IEEE, 2021. - C. 1-5.

6. Kabulov A., Kalandarov I., Yarashov I. Problems of algorithmization of control of complex systems based on functioning tables in dynamic control systems //2021 International Conference on Information Science and Communications Technologies (ICISCT). - IEEE, 2021. - C. 1-4.

7. A. Kabulov, I. Saymanov, I. Yarashov and A. Karimov, "Using Algorithmic Modeling to Control User Access Based on Functioning Table," 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, 2022, pp. 1-5, doi: 10.1109/IEMTRONICS55184.2022.9795850.

8. Kabulov, I. Normatov, I. Kalandarov and I. Yarashov, "Development of An Algorithmic Model And Methods For Managing Production Systems Based On Algebra Over Functioning Tables," 2021 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2021, pp. 1-4, doi: 10.1109/ICISCT52966.2021.9670307.

9. Kabulov and I. Yarashov, "Mathematical model of Information Processing in the Ecological Monitoring Information System," 2021 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2021, pp. 1-4, doi: 10.1109/ICISCT52966.2021.9670192.

10. Kabulov, I. Yarashov and A. Otakhonov, "Algorithmic Analysis of the System Based on the Functioning Table and Information Security," 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, 2022, pp. 1-5, doi: 10.1109/IEMTRONICS55184.2022.9795746.

11. Kabulov A. V. et al. COMPUTER VIRUSES AND VIRUS PROTECTION PROBLEMS //Science and Education. - 2020. - T. 1. - №. 9. - C. 179-184.

12. Madrahimova D., Yarashov I. Limited in solving problems of computational mathematics the use of elements //Science and Education. - 2020. - T. 1. - №. 6. - C. 7-14.

13. Yarashov I. Algorithmic Formalization Of User Access To The Ecological Monitoring Information System //2021 International Conference on Information Science and Communications Technologies (ICISCT). - IEEE, 2021. - C. 1-3.

14. Kabulov A. et al. Algorithmic method of security of the Internet of Things based on steganographic coding. 2021 IEEE International IOT //Electronics and Mechatronics Conference, IEMTRONICS.-2021. - 2021.

15. Kabulov A., Muhammadiyev F., Yarashov I. Analysis of information system threats //Science and Education. - 2020. - T. 1. - №. 8. - C. 86-91.

16. Kabulov A., Yarashov I., Vasiyeva D. Security Threats and Challenges in Iot Technologies //Science and Education. - 2021. - T. 2. - №. 1. - C. 170-178.

17. Gaynazarov S. M. et al. Algorithm of mobile application for medicine search //Science and Education. - 2020. - T. 1. - №. 8. - C. 600-605.

18. Yarashov I., Normatov I., Mamatov A. The structure of the ecological information processing database and its organization //International Conference on Multidimensional Research and Innovative Technological Analyses. - 2022. - C. 114117.

19. Yarashov I., Normatov I., Mamatov A. Ecological information processing technologies and information security //International Conference on Multidimensional Research and Innovative Technological Analyses. - 2022. - C. 73-76.

20. Kabulov A., Yarashov I., Mirzataev S. Development of the implementation of IoT monitoring system based on Node-Red technology //Karakalpak Scientific Journal. - 2022. - T. 5. - №. 2. - C. 55-64.

21. Kaôy.oB A. B., Eo.TaeB ffl. T. AnropurnHHecKHe aBTOMaratie Moge.H H MeTogti co3gaHHfl pacnpege.eHHtix MHKponpo^ccopHtix CHCTeM ynpaB.eHHA h нн$oрмaцнoннoн 6e3onacHocra.

22. Yarashov, "Development of a reliable method for grouping users in user access control based on a Functioning table," 2022 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2022, pp. 1-5, doi: 10.1109/ICISCT55600.2022.10146787.

23. S. Toshmatov, I. Yarashov, A. Otakhonov and A. Ismatillayev, "Designing an algorithmic formalization of threat actions based on a Functioning table," 2022 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2022, pp. 1-5, doi: 10.1109/ICISCT55600.2022.10146987.

24. Normatov, I. Yarashov, A. Otakhonov and B. Ergashev, "Construction of reliable well distribution functions based on the principle of invariance for convenient user access control," 2022 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2022, pp. 1-5, doi: 10.1109/ICISCT55600.2022.10146952.

25. Eaôag^aHoB A. O. h gp. AnropmMHHecKHH aHa.H3 cncTeMti 3arn,HTBi нн$opмaцнн Ha ocHoBe Ta6.^ ^yH^HoHHpoBaHHA //International Journal of Contemporary Scientific and Technical Research. - 2022. - C. 216-219.

ISSN 2181-0842 / IMPACT FACTOR 4.182 74 [MJ^^^B]

26. Normatov I., Yarashov I., Boboqulov B. Development of models for describing the processing of environmental information in security problems of controlling a protection system based on Petri nets //Central Asian journal of mathematical theory and computer sciences. - 2022. - T. 3. - №. 12. - C. 229-239.

27. Kabulov A., Yarashov I., Daniyarov B. Systematic analysis of blockchain data storage and sharing technology //Central Asian journal of mathematical theory and computer sciences. - 2022. - T. 3. - №. 12. - C. 240-247.

28. Normatov, Ibrokhimali, Inomjon Yarashov, and Otabek Tangriberdiyev. "Application of intellectual analysis to protect information in corporate systems." Central Asian journal of mathematical theory and computer sciences 4.9 (2023): 5057.

29. Jumaniyozov Z. G. et al. Checking the condition of the shutter in the water distribution system using a laser sensor //Science and Education. - 2023. - T. 4. - №. 6. - C. 430-435.

30. Jumaboyeva A., Yarashov I. Maxsus maktabgacha ta'lim tashkilotlarida nutqida nuqsoni bo'lgan bolalarni axborot texnologiyalari asosida pedagogik metodlar orqali tahlil qilish// O'zbekistonda ilmiy - amaliy tadqiqotlar mavzusida Respublika 17-ko'p tarmoqli ilmiy masofaviy onlayn konferentsiya.-2020.-C.249-250.

31. Kabulov A.V., Yarashov I.K. Algorithmic model of synthesis and elimination of risks based on Functioning table. Modern problems of applied mathematics and information technologies al-Khwarizmi 2021: abstracts of the international scientific conference. - Fergana. 2021. p.205-206.

32. Kabulov A.V., Yarashov I.K. Algorithmic modeling user access control based on Functioning table. Modern problems of applied mathematics and information technologies al-Khwarizmi 2021: abstracts of the international scientific conference. -Fergana. 2021. p.206-207.

33. Kabulov A.V., Yarashov I.K., Kalandarov I.I., Otakhonov A.A. Algorithmic analysis of a system based on a Functioning table and importance for information security. Modern problems of applied mathematics and information technologies al-Khwarizmi 2021: abstracts of the international scientific conference. - Fergana. 2021. p.207-208.

34. Yarashov I, Normurodov D. "Parol bo'yicha autentifikasiyalashning asosiy tahdidlari va shaxsiy parolning zaiflik". Uzliksiz ma'naviy tarbiya kontsepsiyasini amalga oshirishdagi ommaviy axborot vositalarining roli mavzusida Respublika onlayn ilmiy-amaliy konferentsiya, 2020.pp 492-496.

35. Islambek Saymanov, Inomjon Yarashov. "IoT arxitekturasida funksional darajalari tahlili". Ijtimoiy sohalarni raqamlashtirishda innovasion texnologiyalarning o'rni va ahamiyati Respublika ilmiy-amaliy konferensiya. 2020. Karshi, pp 359-361.

36. Inomjon Yarashov, Normatov Dilmurod. "Kiber fizik tizimlar va lot tizimlarning qiyosiy tahlili". Axborot-kommunikasiya texnologiyalari va telekommunikasiyalarning zamonaviy muammolari va yechimlari Respublika ilmiy-texnik konferensiya, 2020. Fergana, pp 338-340.

37. Yarashov, I., Shukurov, D., & Xudoyqulov, K. (2023). REALIZATION OF ECONOMIC AND MATHEMATICAL MODELING OF INFORMATION SYSTEMS. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 4(10), 17-28.

38. Normatov I., Yarashov I., Tangriberdiyev O. ON THE CONCEPT OF CREATING INTELLIGENT INFORMATION SECURITY SYSTEMS BASED ON NEURAL NETWORK INTRUSION DETECTION SYSTEMS //Science and innovation in the education system. - 2023. - T. 2. - №. 11. - C. 68-74.

39. Normatov I., Yarashov I., Tangriberdiyev O. RESEARCH OF INTELLIGENT SYSTEMS FOR PROTECTION AGAINST NETWORK ATTACKs //Solution of social problems in management and economy. - 2023. - T. 2. - №. 11. -C. 128-136.

i Надоели баннеры? Вы всегда можете отключить рекламу.