• 제목/요약/키워드: Data outsourcing

검색결과 203건 처리시간 0.023초

IPO 관점에서의 정보기술 아웃소싱 위험요인에 관한 탐색적 연구 (An Exploratory Study on the Information Technology Outsourcing Risk Factors: An IPO Perspective)

  • 양경식;김현수
    • Journal of Information Technology Applications and Management
    • /
    • 제11권3호
    • /
    • pp.35-62
    • /
    • 2004
  • Recently, IT outsouricng has been one of the major concerns of many companies. This paper explores the relationship between information technology outsourcing risk factors and outsourcing performance. It is based upon a three-phase process utilizing IPO (Input-Process-Output) system. The first phase means the outsourcing planning risks t~at arise from overall environment of outsourcing, organizational refuse, and wrong contracts. The second phase implies outsourcing operational risks, which are occurred while out-sourcing perform and consist of organizational acceptances of outsourcing, partnership and hidden costs. The last phase is outsourcing performance based on four perspective of BSC(Blanced Scored Card). The survey was performed on the IT/IS firms, and the data was collected from 53 service receivers. The result of the analysis are as follows. First, Outsourcing planning risks positively affects the operational risks. Second, Outsourcing operational risks negatively affects the Outsourcing Performance.

  • PDF

데이터 센터 Outsourcing에 있어서 기기 운영비요의 산정 방법에 관한 연구 (A Study on the Estimation Method for the Equipment Operating Costs in the Data Center Outsourcing Environment)

  • 황경태;권오훈
    • 한국정보처리학회논문지
    • /
    • 제4권6호
    • /
    • pp.1401-1417
    • /
    • 1997
  • 본 연구는 데이터 센터 Outsourcing에 관련된 비용 중에서 가장 산정하기 복잡하고 곤란한 기기 운영 비용을 합리적으로 산정할 수 있는 방법을 제시한다. 이를 위해서 Outsourcing 관련 문헌 조사를 통해 Outsourcing 비용 산정의 기본적인 개념을 정립하고 실제적인 Outsourcing 사례를 분석하여 기기 운영 비용을 합리적으로 산출할 수 있는 새로운 방법을 제시한다. 그리고 제시된 비용 산정 방법은 기존 방법과의 정량적인 비교 분석을 통하여 타당성을 검증하고 고객사의 담당자들을 대상으로 설문조사를 실시하여 새로운 비용 산정 방법의 합리성과 유용성을 실증적으로 검증한다.

  • PDF

정보(情報)시스템 Outsourcing의 전략적(戰略的) 선택(選擇) 및 활용(活用)에 관한 연구(硏究) (An Investigation on Strategic Choice and Utilization of Information Systems Outsourcing)

  • 문태수;한경수
    • Asia pacific journal of information systems
    • /
    • 제7권3호
    • /
    • pp.39-59
    • /
    • 1997
  • This study presents the growth strategy of outsourcing service by finding out the differences of importance between user firms and system integration(SI) firms in Korean outsourcing business, The result of data analysis reveals that there are siginificant differences between user firms and SI firms in some components of information systems(IS) outsourcing services. User firms regarded integation of distributea data centers as the prominent issue of IS environment changes. Meanwhile, SI firms chose management of IS/VAN center, office automation(OA), and management of global network, as the more important issues in the application area of outsourcing. Among the merits of outsourcing, both of them considered cost reduction and IS flexibility as the most important factors, However, they chose the difficulty of management control and the lack of operation knowledge among the demerits of outsourcing, Also, they commonly selected overall IS consulting among the components of outsourcing diffusion. In the question of future outsourcing services, user firms chose the adoption of client/server architecture, while SI firms selected the application of multimedia. These results show that there are some differences of preference between user firms and SI firms. Most of user firms consider the outsourcing to maximize information utilization, while the service suppliers focus on new IT adoption and its application to organization. For the strategic use of outsourcing services, SI firms are required to establish the diffusion strategy to meet the outsourcing needs of user firms.

  • PDF

IT 아웃소싱에 대한 전략적 인식과 위험이 아웃소싱의 정도에 미치는 영향 (The Effect of Strategic Recognition and Risks of IT Outsourcing on the Degree of Outsourcing)

  • 문용은
    • 한국경영과학회지
    • /
    • 제27권3호
    • /
    • pp.21-40
    • /
    • 2002
  • Recently, IT outsourcing has become a very important management strategy which implements information systems in organizations. This paper investigates the risks and strategic recognition as a key factors affecting on the degree of IT outsourcing. Specifically the risks of IT outsourcing and its four components-risk of control, risk of economical, risk of technical, risk of relational - are examined to be a negative effect on the degree of outsourcing. And strategic recognition about outsourcing is examined how to affect en the risks and the degree of IT outsourcing. To empirically test these relationships, data ere gathered from senior IT managers in 86 corporations. Results of this study show that the degree of outsourcing is strongly influenced by risk of control, risk of economical, risk of relational. But risk of technical does not influence on the degree of outsourcing. And strategic recognition about outsourcing is found that is negative effect on the risks of IT outsourcing and positive effect on the degree of IT outsourcing. The results provide a good framework to minimize the risks for IT outsourcing success.

Offshore Outsourcing Success : An Integrated Framework

  • Kim, Jin Ki
    • Journal of Information Technology Applications and Management
    • /
    • 제24권4호
    • /
    • pp.153-170
    • /
    • 2017
  • As the digital economy goes global, firms are trying to find suppliers that can address their managerial goals and strategies. The alternatives are not confined to domestic firms. Firms have been trying to connect to foreign partners worldwide. Although offshore outsourcing grants firms various benefits, they present big cultural challenges. However, there is little research on the impact of cultural or country factors on outsourcing. The goal of this paper is to synthesize the outsourcing success literature and develop propositions for outsourcing success in the context of offshore outsourcing. This paper proposes that cultural effects should be included in evaluating the success of offshore outsourcing. Knowledge sharing and the scope of outsourcing are adopted in the base outsourcing success model from previous literature. In the extended model partnership quality is included as a mediator and organizational capability and outsourcing relationship type are also included as moderator. Finally, the integrated framework of offshore outsourcing success includes cultural factors as moderators of the relationships between outsourcing success antecedents and the success of offshore outsourcing. Reasoning for propositions, managerial implications, and future research directions are discussed.

기업의 핵심역량이 IT 아웃소싱 성과에 직접적인 관련이 있을 것인가? (Does the Understanding of Core Competencies Matter to IT Outsourcing Performance?)

  • 김용진;남기찬;구철모
    • 한국경영과학회지
    • /
    • 제32권3호
    • /
    • pp.97-114
    • /
    • 2007
  • IT outsourcing providers has been expanded from a single functional system to the entire IT service to gain sustainable competitiveness. This new trend of IT outsourcing need outsourcing management capability based on a firm's core capacity. Hiring external IT service providers to manage part or all of its information-related services helps a firm focus on its core business and provides better services to its clients, thus obtaining sustainable competitive advantage. This research investigates the major factors that determine the level of a particular firm's success at IT outsourcing. Based on process innovation and core-competency theories, we identify three significant components of a firm's IT outsourcing management method (ITOMM): level of core-competency-based management, maturity of outsourced tasks, and maturity of outsourcing management. Comprehensive data collection was conducted through an outsourcing association. The survey data were analyzed using a structural analysis method. Maturity of outsourced tasks and maturity of outsourcing management were found to affect project performance directly, while level of core-competency-based management only indirectly impacted project performance through its positive impact on the other two ITOMM components.

Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing

  • Guangwei Xu;Chen Wang;Shan Li;Xiujin Shi;Xin Luo;Yanglan Gan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권4호
    • /
    • pp.998-1019
    • /
    • 2024
  • Mobile cloud computing is a very attractive service paradigm that outsources users' data computing and storage from mobile devices to cloud data centers. To protect data privacy, users often encrypt their data to ensure data sharing securely before data outsourcing. However, the bilinear and power operations involved in the encryption and decryption computation make it impossible for mobile devices with weak computational power and network transmission capability to correctly obtain decryption results. To this end, this paper proposes an outsourcing decryption algorithm of verifiable transformed ciphertext. First, the algorithm uses the key blinding technique to divide the user's private key into two parts, i.e., the authorization key and the decryption secret key. Then, the cloud data center performs the outsourcing decryption operation of the encrypted data to achieve partial decryption of the encrypted data after obtaining the authorization key and the user's outsourced decryption request. The verifiable random function is used to prevent the semi-trusted cloud data center from not performing the outsourcing decryption operation as required so that the verifiability of the outsourcing decryption is satisfied. Finally, the algorithm uses the authorization period to control the final decryption of the authorized user. Theoretical and experimental analyses show that the proposed algorithm reduces the computational overhead of ciphertext decryption while ensuring the verifiability of outsourcing decryption.

핵심역량 지향성과 프로세스 관리역량이 IT 아웃소싱 성과에 미치는 연구 (An Empirical Investigation into the Role of Core-Competency Orientation and IT Outsourcing Process Management Capability)

  • 김용진;남기찬;송재기;구철모
    • Asia pacific journal of information systems
    • /
    • 제17권3호
    • /
    • pp.131-146
    • /
    • 2007
  • Recently, the role of IT service providers has been enlarged from managing a single function or system to reconstructing entire information management processes in new ways to contribute to shareholder value across the enterprise. This movement toward extensive and complex outsourcing agreements has been driven by the assumption that outsourcing information technology functions is a reliable approach to maximizing resource productivity. Hiring external IT service providers to manage part or all of its information-related services helps a firm focus on its core business and provides better services to its clients, thus obtaining sustainable competitive advantage. This practice of focusing on the strategic aspect of outsourcing is referred to as strategic sourcing where the focus is capability sourcing, not procurement. Given the importance of the strategic outsourcing, however, to our knowledge, there is little empirical research on the relationship between the strategic outsourcing orientation and outsourcing performance. Moreover, there is little research on the factor that makes the strategic outsourcing effective. This study is designed to investigate the relationship between strategic IT outsourcing orientation and IT outsourcing performance and the process through which strategic IT outsourcing orientation influences outsourcing performance, Based on the framework of strategic orientation-performance and core competence based management, this study first identifies core competency orientation as a proper strategic orientation pertinent to IT outsourcing and IT outsourcing process management capability as the mediator to affect IT outsourcing performance. The proposed research model is then tested with a sample of 200 firms. The findings of this study may contribute to the literature in two ways. First, it draws on the strategic orientation - performance framework in developing its research model so that it can provide a new perspective to the well studied phenomena. This perspective allows practitioners and researchers to look at outsourcing from an angle that emphasizes the strategic decision making to outsource its IT functions. Second, by separating the concept of strategic orientation and outsourcing process management capability, this study provides practices with insight into how the strategic orientation can work effectively to achieve an expected result. In addition, the current study provides a basis for future studies that examine the factors affecting IT outsourcing performance with more controllable factors such as IT outsourcing process management capability rather than external hard-to-control factors including trust and relationship management. This study investigates the major factors that determine IT outsourcing success. Based on strategic orientation and core competency theories, we develop the proposed research model to investigate the relationship between core competency orientation and IT outsourcing performance and the mediating role of IT outsourcing process management capability on IT outsourcing performance. The model consists of two independent variables (core-competency-orientation and IT outsourcing process management capability), and two dependent variables (outsourced task complexity and IT outsourcing performance). Comprehensive data collection was conducted through an outsourcing association. The survey data were analyzed using a structural analysis method. IT outsourcing process management capability was found to mediate the effect of core competency orientation on both outsourced task complexity and IT outsourcing performance. Further analysis and findings are discussed.

Multi-dimensional Query Authentication for On-line Stream Analytics

  • Chen, Xiangrui;Kim, Gyoung-Bae;Bae, Hae-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권2호
    • /
    • pp.154-173
    • /
    • 2010
  • Database outsourcing is unavoidable in the near future. In the scenario of data stream outsourcing, the data owner continuously publishes the latest data and associated authentication information through a service provider. Clients may register queries to the service provider and verify the result's correctness, utilizing the additional authentication information. Research on On-line Stream Analytics (OLSA) is motivated by extending the data cube technology for higher multi-level abstraction on the low-level-abstracted data streams. Existing work on OLSA fails to consider the issue of database outsourcing, while previous work on stream authentication does not support OLSA. To close this gap and solve the problem of OLSA query authentication while outsourcing data streams, we propose MDAHRB and MDAHB, two multi-dimensional authentication approaches. They are based on the general data model for OLSA, the stream cube. First, we improve the data structure of the H-tree, which is used to store the stream cube. Then, we design and implement two authentication schemes based on the improved H-trees, the HRB- and HB-trees, in accordance with the main stream query authentication framework for database outsourcing. Along with a cost models analysis, consistent with state-of-the-art cost metrics, an experimental evaluation is performed on a real data set. It exhibits that both MDAHRB and MDAHB are feasible for authenticating OLSA queries, while MDAHRB is more scalable.

IS 아웃소싱의 위험과 아웃소싱의 정도에 관한 연구 (The Effect of Risks and Strategic Recognition on the Degree of IT Outsourcing)

  • 문용은;박유진
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제11권1호
    • /
    • pp.1-28
    • /
    • 2002
  • Today, IT outsourcing has become a very important management strategy of implementing information systems in organizations. This paper investigates the risks and strategic recognition as a key factors effecting on the degree of outsourcing, Specifically the risks of outsourcing and its four components-control risk, economical risk, technical risk, relational risk-are examined to be a negative effect on the degree of outsourcing. And strategic recognition about outsourcing is examined to be a mediator factor between the risks and the degree of outsourcing. To empirically test these relationships, data are gathered from senior IT managers in 62 corporations. Results of this study show that the degree of outsourcing is strongly influenced by control risk, economical risk, relational risk. But technical risk does not influence on the degree of outsourcing. And strategic recognition about outsourcing is found that is mediator concern with the risks and the degree of outsourcing. The results indicate to provide a good framework to minimize the risks for IT outsourcing success.

  • PDF