• Title/Summary/Keyword: Information Systems Outsourcing

Search Result 201, Processing Time 0.026 seconds

A Study on Effective Competitive Intelligence of Korean Firms (국내기업의 효과적 경쟁정보활동에 관한 연구)

  • Kim, Kwangsoo;Kim, Seungjin
    • Knowledge Management Research
    • /
    • v.9 no.2
    • /
    • pp.1-13
    • /
    • 2008
  • The purpose of this study is to investigate the use of elements related to the competitive intelligence(CI) process, methods, and infrastructure in accordance with the degree of CI effectiveness of domestic firms and to propose a guideline for designing and operating an effective CI program in Korean films. The results of this study reveal that, for the elevation of CI effectiveness of Korean firms, it is important to actively utilize the overall CI process, including undisclosed information through human networks, public information through various media, and quantitative and qualitative analyses, an independent CI unit, various CI support systems, such as information and reward systems, and organizational culture of CI openness within an organization. However, CI outsourcing, CI primary objectives, and CI scale do not seem to have a significant influence on CI effectiveness of Korean firms. Based on these results, this research presents some important implications for effective competitive intelligence for Korean firms.

  • PDF

A Study on the Analysis and Design of IT Cost Model Using an Ethnographic Research (Ethnographic Research를 이용한 IT Cost 모델 분석 및 설계)

  • Lee Jae-Beom;Jeong Seung-Ryul;Lee Hak-Seon
    • The Journal of Information Systems
    • /
    • v.15 no.3
    • /
    • pp.107-129
    • /
    • 2006
  • The purpose of this study is to provide and validate an IT cost model hi which we link among cost center, cost object and flexible cost driver. in order to accomplish this purpose, this study utilizes ethnographic research methodology. At first we develop the cost model where the flexible cost driver is the distribution basis of overhead cost. For each cost driver, unit cost management model is also proposed. Then we employ the structured design methodology to validate the model. Based on the IT Cost requirements of a case company, the IT cost system was designed and developed for its test. The result shows the model we developed in this study is appropriate for managing IT resources and further, can be used as a reference model for calculating chargeback rates of other departments and IT budget of IT department.

  • PDF

A Comparative Study of European and Japanese Multinational Firms' Global Sourcing Strategies (유럽과 일본 다국적기업들의 글로벌소싱 전략간의 유사점자 차이점에 대한 연구)

  • 이상식
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.4
    • /
    • pp.130-136
    • /
    • 1999
  • During the last decade global sourcing has been widely practiced by multinational firms. While the importance of global sourcing has grown rapidly, there have been ralatively few empirical studies on this issue Thus, this study empirically investigates the commonalities and differences between European and Japanese multinational firms sourcing patterns. Especially, this study focuses on two dimensions of global sourcing activities: inter-firm sourcing and intra-firm sourcing.

  • PDF

The Factors Affecting Outsourcing of Data Processing Services (자료처리서비스의 아웃소싱에 영향을 미치는 요인)

  • Lee Min Hwa
    • The Journal of Information Systems
    • /
    • v.6 no.2
    • /
    • pp.1-28
    • /
    • 1997
  • 정보시스템 기능이 아웃소싱이 정보시스템 효율과 효과성을 향상시킬 수 있는 전 략으로 고려됨에 따라 소싱유형의 결정요인을 식별하는 것은 중요하다고 할 수 있다. 본 연 구는 은행 산업에 있어서 데이터 처리 서비스의 소싱결정에 영향을 주는 요인을 조사하였 다. 아웃소싱을 관리적 혁신으로 볼 때, 혁신특성으로서 상대적 이점과 위험성이 소싱 유형 의 중요한 결정요인으로 제시된다. 미국의 1,000개 은행을 대상으로 한 현장연구(field survey)의 결과는 상대적 이점과 보안위험이 소싱유형 및 아웃소싱 선호도와 유의한 관계가 있다는 것을 보여주었다. 또한 대규모 은행이 소규모 은행보다 아웃소싱에 대해 더 큰 자율 성 위험을 가지고 있는 것으로 나타났다. 그러나 자율성 위험과 두 종속 변수와의 관계에 대해서는 비일관적인 결과가 나타났고, 정보시스템 기능의 중요성과 소싱유형 및 선호도와 의 관계, 조직규모와 상대적 이점과의 관계를 연구결과가 충분히 지지하지 못하고 있다.

  • PDF

Evaluating IT Outsourcing Contract Price by Using Total Cost of Ownership Analysis (TCO(Total Cost of Ownership) 분석을 이용한 IT 아웃소싱 계약가격 평가 연구)

  • Kim, Garp-C.;Choi, C.H.
    • Information Systems Review
    • /
    • v.3 no.1
    • /
    • pp.131-141
    • /
    • 2001
  • 그 동안 IT 아웃소싱에 관한 많은 연구성과에도 불구하고 아웃소싱 계약체결에 있어서 실무적으로 꼭 필요한 아웃소싱의 적정가격에 관한 연구는 매우 미진한 형편이다. 특히 아웃소싱 의뢰업체 입장에서의 적정가격결정 모형이나 사례를 찾아보기는 더욱 어려운 것이 현실이다. 아웃소싱 가격의 적정성은 공급업체 만이 아니 라 의뢰업체의 입장에서도 아웃소싱의 성패를 좌우하는 중요한 요건이다. 본 연구는 TCO 개념을 이용하여, IT 아웃소싱 의뢰업체의 입장에서, 적정 가격을 산정하는 모형을 실제 적용사례를 통해 제시한다. 본 연구는 아웃소싱을 하지 않을 경우의 총소요비용과 아웃소싱을 할 경우의 총소요비용을 비교하여 아웃소싱의 효과를 측정하고 계약가격의 적정성을 판단할 수 있도록 하고자 하였다. 본 연구를 통하여 제시한 TCO분석방법 및 결과는 아웃소싱을 준비하거나 계획중인 업체에게 자체적으로 아웃소싱 계약가격을 산출하고, 아웃소싱을 통한 비용절감항목을 판단하며, 계약가격을 비교할 수 있는 자료로 사용되어 지기를 기대한다.

  • PDF

Semantic Network Analysis on the MIS Research Keywords: APJIS and MIS Quarterly 2005~2009

  • Lee, Sung-Joon;Choi, Jun-Ho;Kim, Hee-Woong
    • Asia pacific journal of information systems
    • /
    • v.20 no.4
    • /
    • pp.25-51
    • /
    • 2010
  • This study compares and contrasts the intellectual development of the MIS field in Korea from 2005 to 2009 to that of international trends by using a keyword co-occurrence network analysis of the two flagship journals: APJIS and MIS Quarterly. From 316 research articles in these two journals, 132 unique and most frequently co-occurred keywords were put into analysis. The results of structural equivalence show a mild correlation between APJIS and MIS Quarterly. The e-commerce, trust, and technology adoption are the high frequency keywords in both journals. In Korea e-learning, purchasing, and recommendation systems turn out to be important keywords while outsourcing, research method, quantitative method, design research, information theory, and empirical research are in average international journals. This connotes that the Korean scholarship tends to focus more on practically oriented topics, but the clustering and relational mapping of research topics in each journal show a mild level of overlap with distinctive orientations due to intrinsic disparities depending on the concerned journals' geographical scopes, namely domestic or global.

A Study on the Selection of Information System Developer using AHP (AHP를 이용한 정보시스템 개발업체 선정에 관한 연구)

  • Jang, Yang-Cheol;Ahn, Byeong-Seok
    • Journal of Information Technology Services
    • /
    • v.5 no.3
    • /
    • pp.187-201
    • /
    • 2006
  • Nowadays, many organizations more increasingly show their interests in developing informations systems through not only in-house development but outsourcing. Selecting a proper information system developer, however, is not easy task partly due to the absence of evaluation criteria pertinent to explain the pros and cons of information system developers considered. Further, much care should be taken of choosing an appropriate decision method applicable to semi-structured or strategical decision making problems such as selection of information system developer even though evaluation criteria are well provided. The purpose of this paper is to provide for the selection process, ranging from identification of problem structure to solution method, of information system developer with the use of Analytic Hierarchy Process(AHP).

Towards efficient sharing of encrypted data in cloud-based mobile social network

  • Sun, Xin;Yao, Yiyang;Xia, Yingjie;Liu, Xuejiao;Chen, Jian;Wang, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1892-1903
    • /
    • 2016
  • Mobile social network is becoming more and more popular with respect to the development and popularity of mobile devices and interpersonal sociality. As the amount of social data increases in a great deal and cloud computing techniques become developed, the architecture of mobile social network is evolved into cloud-based that mobile clients send data to the cloud and make data accessible from clients. The data in the cloud should be stored in a secure fashion to protect user privacy and restrict data sharing defined by users. Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data. However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure. In order to reduce the computing overhead held by the mobile devices, in this paper we propose a new Outsourcing decryption and Match-then-decrypt CP-ABE algorithm (OM-CP-ABE) which firstly outsources the computation-intensive bilinear pairing operations to a proxy, and secondly performs the decryption test on the attributes set matching access policy in ciphertexts. The experimental performance assessments show the security strength and efficiency of the proposed solution in terms of computation, communication, and storage. Also, our construction is proven to be replayable choosen-ciphertext attacks (RCCA) secure based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model.

A Study on the Determinants of Information Systems Outsourcing Results for Securities Company (증권사의 정보시스템 아웃소싱 성과 영향요인에 관한 연구)

  • Chang, Han-Kyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1433-1436
    • /
    • 2011
  • 본 연구에서는 증권사 정보시스템의 아웃소싱 성과에 영향을 미치는 기업특성적 변인에 대해 파악하고자, 아웃소싱 수혜기업인 증권사의 조직 및 부문적 특성이 아웃소싱 정도의 매개효과를 통해 아웃소싱 성과(업무효용성, 업무능률성, 업무생산성, 예산감소율)에 어떠한 영향을 미치는지 실증적으로 검증하였다. 증권사의 조직적 특성(경쟁전략, 재무능력)이 아웃소싱 정도를 매개로 성과에 미치는 영향을 검증한 가설 1과 증권사의 부문적 특성(업무특수성, IT 자원, IT 역량)이 아웃소싱 정도를 매개로 성과에 미치는 영향을 검증한 가설 2를 실증분석한 결과, 경쟁전략, 재무능력, 업무특수성, IT 자원, IT 역량의 요인들이 아웃소싱 정도를 통해 업무효용성과 예산감소율에 영향을 주는 것을 확인할 수 있었다. 특히 재무능력, IT 역량 등이 업무효용성, 예산감소율과 같은 정보시스템 아웃소싱의 성과에 상대적으로 많은 영향력을 미치는 것으로 나타났으며, 정보시스템 아웃소싱 정도의 매개효과를 확인할 수 있었다.

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.