• Title/Summary/Keyword: 정보기술 아웃소싱 성과

Search Result 58, Processing Time 0.028 seconds

An Exploratory Study on the Relationship between Outsourcing Performance Factors and IT Outsourcing Recontracts (정보기술 아웃소싱 성과요인과 재계약의 관계에 관한 탐색적 연구)

  • Yang, Kyung-Sik;Kim, Hyun-Soo
    • Journal of Information Technology Services
    • /
    • v.2 no.1
    • /
    • pp.157-172
    • /
    • 2003
  • Despite the continual growth of IT outsourcing market, the outsourcing contracts are mostly short-term contracts. Because these short-term contracts need continual recontracts, the research on the factors that influence the outsourcing recontracts is needed. This research has been done to find out the factors of making the outsourcing recontracts successfully by stating the relationship between outsourcing recontract and the outsourcing performance factors. As a result of this research, customer factors and innovation factors are found to be influential factors on whether you make a recontract or not. And also the research have showed customer factors are major decision criteria on outsourcing recontracts.

Case Study Plan for Information Security SLA Performance System in Public Sector (공공부문 정보보안 SLA 성과체계 사례연구)

  • Jeong, Jae Ho;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.763-777
    • /
    • 2021
  • Information security started as an IT operation process and is now recognized as an important issue of information technology, and each international organization is newly defining the concept. Information security itself is a new combination of IT technologies, a set of technologies and a technology area. As IT outsourcing becomes common in many public sectors, SLAs are introduced to evaluate the level of IT services. In the area of information security, many studies have been conducted on the derivation and selection of SLA performance indicators, but it is difficult to find a way to apply the performance indicators to service level evaluation and performance systems. This thesis conducted a study on the application of a service evaluation system for information security performance indicators based on the public sector and a performance system including compensation regulations. It presents standards and rewards(incentive and penalty) that define expectation and targets of performance indicators that take into account the environment and characteristics of a specific public sector, and defines appropriate SLA costs. It proposes a change plan for the organizational structure for practical SLA application and service level improvement.

A Study on the Evaluation of Vendors for Information Systems Projects Using Possibilistic Decision Making Model (가능성 분포모형을 이용한 정보시스템 프로젝트의 벤더 분석에 관한 연구)

  • 정희진
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.156-165
    • /
    • 2003
  • The purpose of this study is concerned with possibilistic decision making model (PDMM) that can be used to help CEO and information systems managers decide which information systems should be selected. The application of IT which has influence on rapidly changed environment of enterprise plays an important role in enterprise's activity. When enterprise outsource IT, it is very important to select vendors that reflect goals and constraints of organization. For this purpose, mathematical model in which possibilistic programming is applied is suggested in this study. Although many researches have conducted in conventional programming and stochastic programming. they are still limited in solving practical problems and imprecise/uncertain situations. Multiple decision making model in which impreciseness of input variable is considered can be constructed in PDMM.

  • PDF

Factors Affecting the Project Performance of Software Development Outsourcing (소프트웨어 개발 아웃소싱 프로젝트 성과에 영향을 미치는 요인)

  • Cho, Dong-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.3
    • /
    • pp.1077-1083
    • /
    • 2012
  • SDO(Software Development Outsourcing) projects have been consistently increasing and expanding but also have many failures. In order to improve SDO performance, the factors affecting SDO performance are investigated in this study. SDO has relational risk as well as performance risk in nature, and the factors affecting the SDO performance caused by these mixed risks are drawn from the prior studies. With field survey targeted client IS personnel who experienced SDO, 214 survey questionnaires are collected and analyzed. Research results show that vendor power, client requirements certainty, goal clarity and goal alignment affect the SDO performance. However, vendor knowledge and client knowledge do not have much effect on SDO performance. The results of this study can be effectively utilized to decrease the failures of SDO and increase the possibility of success.

Analysis of Homomorphic Authenticated Encryption (Encrypt with Authenticate Construction) (결합 준동형 인증 암호의 안전성 분석)

  • Kim, Jinsu
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.33-44
    • /
    • 2021
  • Data outsourcing utilizing the Cloud faces a problem of the third-party exposure, modulation, and reliability for the provided computational delegation results. In order to solve those problematic security issues, homomorphic encryption(HE) which executes calculation and analysis on encrypted data becomes popular. By extension, a new type of HE with a authentication functionality, homomorphic authenticated encryption(HAE) is suggested. However, a research on the HAE is on the initial stage. Furthermore, based on a message authenticated scheme with HE, the method and analysis to design is still absent. This paper aims to analyze an HAE, with a generic combination of a message authenticated scheme and a HE, known as "Encrypt with Authentication". Following a series of analysis, we show that by adopting a unforgeable message authenticated scheme, the generically constructed HAE demonstrated an unforgeability as well. Though, a strong unforgeability is not the case. This paper concludes that although indistinguishable HE can be applied to design the HAE, a security issue on the possibility of indistinguishability is still not satisfied.

Analytic Approach to e-Transformation of Intermediary (중개유통기업의 e-트랜스포메이션: 분석적 접근)

  • Han, Hyun-Soo
    • Information Systems Review
    • /
    • v.5 no.2
    • /
    • pp.1-21
    • /
    • 2003
  • In this paper, we investigate industrial product intermediary's transformation strategy by exploiting advantages afforded by web based information technologies. Our motivation for this research stems from exploring intermediary's responding strategy to cope with supplier's threatening to disintermediation. From transaction cost perspective, internet can induce both the vertical quasi-integration (electronic hierarchy) and outsourcing (electronic market). Our rationale on directing one of these bi-directional movements is specified on intermediary's value adding on the supply chain. As such, we investigated supply chain performance, IT effects on customer's requirement of channel functions, and channel power structure. Propositions to suggest contingent e-transforming strategic alternatives are logically derived from dyadic nature of supply chain characteristics such as efficiency versus customer services, and supplier dominant versus easy replaceability of suppliers. The contingent e-transformation framework developed from intermediary's perspective is reviewed through longitudinal industry case analysis. Implications from the industry case analysis give us insights for the effectiveness of the framework to combine supply chain characteristics with intermediary's e-transformation.

A Study on the Direction Future of Cataloging Education (차세대 목록 교육의 방향성에 관한 연구)

  • Cho, Jane
    • Journal of Korean Library and Information Science Society
    • /
    • v.41 no.2
    • /
    • pp.127-145
    • /
    • 2010
  • Outsourcing, importing of publishing metadata and revitalizing copy cataloging have reduced importance of traditional cataloging. Request of interoperability between other communities and business integration of related system also have changed the meaning of library catalog. Furthermore, newly declared principle and rules are totally different to existing AACR, MARC, measures to cataloging education for next generation seems to be urgently needed. In this study, firstly put together a series of discussion about future cataloging and new role of cataloging librarian, and secondly basis on it, suggest direction of cataloging education course which divided two sectors. One is for students who are undergraduated, and another is for current cataloger at working level. In basic training, it should contain principle of knowledge organization and diverse resources and its relationship, encoding scheme and its practice. The other hand, in re-education training, it should include that re-recognition about new concept of bibliographic world, changing vocabulary and encoding scheme, furthermore metadata scheme about diverse resources which library have accepted, and its integration.

  • PDF

How to Impact the Adoption of Managed Service on IT Governance of Enterprises? (매니지드 서비스 도입이 기업의 IT 거버넌스에 미치는 영향 분석)

  • Jang, Hyuk Soo;Jun, Eunsuk;Lee, Myung Jin;Oh, Jun-Tack;Lee, Bong Gyou
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.399-409
    • /
    • 2013
  • The development of IT has led to increase the business's dependence on IT and the interests of enterprises on IT governance. Also, more enterprises have adopted managed services to save operating costs in IT departments and to maximize their business efficiency. However, until recently, there are very few academic as well as practical researches regarding managed services, IT service effectiveness, IT governance and their interrelations. This study analyzes the effects of managed services on IT governance based on the IT-BSC (Balanced Scorecard) model. Using the expert FGI (Focus Group Interview) and survey, the research results present that managed services have the most significant effect on the user-oriented and the operational efficiency in enterprises. Also, managed services through the business process standardization can improve the IT governance more effectively. This study will be a relevant guideline for enterprises that will adopt managed services.

Practical Conjunctive Searchable Encryption Using Prime Table (소수테이블을 이용한 실용적인 다중 키워드 검색가능 암호시스템)

  • Yang, Yu-Jin;Kim, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.5-14
    • /
    • 2014
  • Searchable encryption systems provide search on encrypted data while preserving the privacy of the data and the search keywords used in queries. Recently, interest on data outsourcing has increased due to proliferation of cloud computing services. Many researches are on going to minimize the trust put on external servers and searchable encryption is one of them. However, most of previous searchable encryption schemes provide only a single keyword boolean search. Although, there have been proposals to provide conjunctive keyword search, most of these works use a fixed field which limit their application. In this paper, we propose a field-free conjunctive keyword searchable encryption that also provides rank information of search results. Our system uses prime tables and greatest common divisor operation, making our system very efficient. Moreover, our system is practical and can be implemented very easily since it does not require sophisticated cryptographic module.

A Dynamic Trust Framework for Sharing Identity Authentication (신원 인증 공유를 위한 동적 신뢰 프레임워크)

  • Park, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2199-2206
    • /
    • 2012
  • Identity authentication sharing technology which allows many service providers to share the result of identity authentication of an identity provider provides several important advantages including high usability achieved by avoiding repeated registration of identity information to service providers and single sign-on, cost effectiveness of service providers achieved by outsourcing identity authentication services from identity providers, and privacy protection achieved by exposing identity information only to a limited number of controlled identity providers. However, in order for the identity authentication sharing technologies to be widely deployed in global Internet scale, the trustworthiness issue among the participating identity providers, service providers, and users should be resolved in advance. This paper firstly analyzes existing trust frameworks for identity authentication sharing. And then, based on the result of analysis, this paper proposes a dynamic and open trust framework for identity authentication sharing.