• Title/Summary/Keyword: General Contractor Business

Search Result 18, Processing Time 0.02 seconds

Improvement Factors for Reinforced Concrete Firm against Removing the restriction of Construction Market Activation (겸업제한 폐지에 따른 철근콘크리트 전문건설업체의 발전요인)

  • Park, Jeong-Ho;Jun, Hun-Bai;Cho, Kyu-Man;Hong, Tae-Hoon;Koo, Kyo-Jin;Hyun, Chang-Taek
    • Korean Journal of Construction Engineering and Management
    • /
    • v.9 no.1
    • /
    • pp.118-125
    • /
    • 2008
  • Recently, the Ministry of Construction and Transportation announced a notice of the legislation related to remove the restriction of construction market activation in advance. he removement is an overwhelming change of the business structure in the Korean construction industry and has a far-reaching influence on general and trade contractors. The purpose of this research was to suggest improvement factors to survive an excessive competition in reinforced concrete market. This research did SWOT analysis to examine the strength, weakness, opportunity and threat of reinforced concrete firm, and established business strategies. The factor analysis was also applied with questionnaire survey to staff in charge of reinforced concrete company. It is expected that the suggested improvement factors can give effective business strategies to reinforced concrete firm. Furthermore, trade contractors having difficulty in a bottleneck in management can get help from the result of this research.

A Review of Customer Satisfaction Factors in Libyan Housing Projects

  • Shebob, Abdulhamid;Shah, Raj;Mhalas, Amit
    • Journal of Construction Engineering and Project Management
    • /
    • v.3 no.4
    • /
    • pp.26-34
    • /
    • 2013
  • Customer satisfaction and customer relationship are crucial aspect in any enterprises including housing construction projects. In general, the housing developers are facing a number of new challenges in different countries including Libya. The construction industries/housing developers need to continuously improve their products and services to meet customers' satisfaction desires and to remain in the current competitive market. This paper focuses on analysing the satisfaction factors of customers including qualityaspects of products and services in the construction projects. A framework was developed to evaluate the dynamics relationship between customer satisfaction and quality products or services, aiming to help companies' managers and policy makers to understand the needs and points of view of their customers. Apragmatic analysis was conducted to explore and analyse the customer satisfaction factors in construction industry considering different aspect of customer groups in Libya. Results indicate that there is a high demand of improvements in the contractor's performance in terms of cost, time and quality of products. It was also found that Libyan construction companies have been forced to transform their policies after on Libyan war 2011 to focus on client and customer satisfactory policies, or say centric for the purpose of improving client requirements and turn the business into more advantageous for any company.

A Case Study on Information Strategy Plan of the Web Based on Project Management Information System for Construction Company (전사 웹기반 사업관리시스템 구축을 위한 정보화전략계획에 관한 사례연구)

  • Park, Hyung-Keun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.2D
    • /
    • pp.259-267
    • /
    • 2008
  • Nowadays PMIS (Project Management Information System) based on web is widely applied to communication, collaboration and community in construction jobsite for various organization such as subcontractors, general contractor, engineering company, supervisors and client. However, individual PMIS in jobsite is prone to be troublesome issue for integration and exchange of information regarding project management in corporate and may result in conflict of data application. The main reason should be lack of information strategy plan such as company master plan for information. This research shows a critical success factor that a big construction company of Korea establishes procedure and method for information strategy plan. In addition, It is to suggest how to be implemented PMIS architecture and execute business process innovation in corporate level. This research expects contribution that many construction companies reduce mistakes to be implemented management information system and to optimize system in corporate level.

The Improvement on the current law about Mutual aid service and information use (상조서비스 및 정보 이용에 관한 현행법상의 개선점)

  • Kim, Ku-Jong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.185-191
    • /
    • 2012
  • The essence of Mutual aid service is looking into the general commerce about its goods and services that is a general viewpoint. Through the contract that the contractor related with the Mutual aid associations and Mutual aid companies. provide the goods and services to future member's demanding point. and members are pay out money, and pay for that on the installment plan. This Mutual aid business had been increased rapidly after 2005, it is expanded huge business, even its scale alone, the cost is estimated at over three trillion won. But because of Mutual aid business's prepayment installment plan, stipulated substance of the Law on hire-purchase systems were more actualized than in the past, but it leave much to be desired. for example, the obligation of explanation to Mutual aid associations and members of Mutual aid company, the consumer protection about the contract of advance received deposit, upward problem of capital, when establish the Mutual aid company etc. in this paper will review these problems and improvement about legal details that for the customers of Mutual aid service and development of Mutual aid industry, and claimed about Mutual aid law's singular legislation.

Development of a Materials Management System Considering Construction Supply Chain Management (건설공급사슬을 고려한 건설공사 자재관리시스템 개발)

  • Jang, Myung-Hoon
    • Journal of the Korea Institute of Building Construction
    • /
    • v.9 no.5
    • /
    • pp.87-93
    • /
    • 2009
  • A construction supply chain needs an integrated information system, as the general contractor and subcontractors must communicate regularly with one another and share a substantial amount of information in their cooperative work. In the construction industry, supply chain management is necessary in the management of a system, including business process improvement, participant-oriented management, and the supply chain. This research proposed a supporting system and developed the prototype focusing on materials that play an important role in the supply chain. Construction projects are managed mainly through schedule management. As such, supply chain management should be linked with schedule management. The research implemented a prototype of the supporting system for construction supply chain management. The prototype was implemented in Microsoft Project using VBA, including a simulation tool based on @Risk for Project.

Factors Influencing Cost Overruns in Construction Projects of International Contractors in Vietnam

  • VU, Thong Quoc;PHAM, Cuong Phu;NGUYEN, Thu Anh;NGUYEN, Phong Thanh;PHAN, Phuong Thanh;NGUYEN, Quyen Le Hoang Thuy To
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.9
    • /
    • pp.389-400
    • /
    • 2020
  • A construction project is a designed product made up of labors, materials, and installations in the project positioned on the ground and may include the underground and ground section, and the section in water or on the water surface. It is a civil, industrial, transport, agricultural and rural development, infrastructure, or some other. A key phase in the life cycle of these construction projects is the implementation when building products are made directly with workers, equipment, materials, and managers. If there is a lack of management experience, information, and problem-solving solutions to tackle the risks faced by contractors, especially foreign ones, will fail in controlling the project's cost. This study was conducted with investigations, discussions, and evaluation of the factors that lead to cost overruns in the construction projects of international contractors in Vietnam. The principal component analysis (PCA) showed that those factors that influence cost overruns these construction projects fall into five general groups, including factors related to (i) the owners, (ii) the foreign contractors, (iii) the subcontractors and suppliers, (iv) state management, and (v) the project itself. Besides, the study proposes solutions to limit cost overruns in construction projects and improve the profitability of international contractors in Vietnam.

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.