• Title/Summary/Keyword: Information Systems Outsourcing

Search Result 201, Processing Time 0.023 seconds

An Explorative Study on the Core Competency of Application Service Providers and its Influence on Business Performance (ASP(Application Service Providers)의 핵심 역량과 성과 탐색)

  • An Joon M.;Lee Jin Sun
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.3
    • /
    • pp.81-96
    • /
    • 2005
  • ASP (Application service provider) as a new type of information systems service has been popular recently and has taken a much attention of information systems professionals and researchers. One stream of the research on ASP performed by IS community dealt with utilization and benefits of ASP systems use. The other researchers argue the importance of ASP vendors' capability to provide users with appropriate services. Kern, Lacity and Willcock (2002) summarized the components of core competency of service providers based on their extensive case studies on application service providers. Also, Levina and Ross (2003) developed a value delivery process of application service Providers in their case study This study is developing Prepositions and an empirical model based on the theory of core competency from strategic management study. The dimension of core competency is composed of management competency, technical service competency and customer service competency. Each dimension is made up of competency items derived from previous studies and adapted by professionals in ASP industry. The validity of the dimensions and items in each dimension has been checked with factor analytic method for empirical test. The core competency dimensions are correlated with performance factors of application service providers including growth of revenue, asset and customer base.

  • PDF

An Exploratory Study on the Relationships of ASP Usage Pattern, Satisfaction, and Firm Performance: User Perspective in Korean Small Businesses (ASP 서비스 활용유형, 만족도, 기업성과의 관계에 대한 탐색적 연구: 국내 소기업 사용자 관점)

  • Kim, Sung-Hong;Kim, Jin-Han;Lee, Sang-Gun
    • Information Systems Review
    • /
    • v.7 no.1
    • /
    • pp.173-193
    • /
    • 2005
  • ASP service that is emerging as a new form of application outsourcing has the advantage of lower cost and risk. Therefore, ASP service may be attractive for small firms and even some new companies. However, studies about ASP service are rare in academic and professional journals, and most of the articles about outsourcing were considering mainly large enterprises. The purpose of this article is to analyze the effects of the some context variables of Korean small businesses on ASP service usage pattern, and the effect of ASP service usage pattern on user satisfaction and firm performance. The analysis results show that firm size has a positive impact on IT need of small businesses, and IT need of small businesses have a positive impact on training period and past usage period. Also, firm size, IT need, training period has an positive impact on ASP service usage pattern. However, ASP service usage period has no relationship on ASP service usage pattern. Finally, ASP service usage pattern has a positive impact on firm performance and user satisfaction, and user satisfaction has an impact on firm performance.

An Application of fuzzy TOPSIS in evaluating IT proposals (IT 제안서의 기술평가에서의 퍼지 TOPSIS 응용)

  • Jeong, Giho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.197-211
    • /
    • 2017
  • In recent years, it is natural that the development and the maintenance of information systems are strongly dependent on outside service providers for economic reasons, especially in public sector. There has been an unexpected growth in the number of selection activities for outsourcing related works. At this time, selection of the contractor generally considers the proposals received based on the RFP(requested for proposal) and determines the ranking by experts committee. However, it is difficult even for expert giving a specific numeric score in weighting criteria or rating alternatives. In this context, an extended fuzzy TOPSIS method is applied for selection problem of IT proposals. A numerical illustration is also provided to demonstrate the applicability of the approach. This approach is very practical to help decision makers in assessing proposals during the selection phase under uncertainties.

A Study on Systematic Certification Methodology for Application Service Provider (체계적인 ASP 인증 방법론에 관한 연구)

  • Seo, Kwang-Kyu
    • IE interfaces
    • /
    • v.19 no.1
    • /
    • pp.62-69
    • /
    • 2006
  • In these days companies are rapidly implementing the extended enterprise collaboration to provide enhanced management services and products based on the enterprise integration that human resources, technologies and the management process. In this corporate environment, ASP (Application Service Provider) which is the developed type of outsourcing in the area of information technology, is a good alternative for corporate information system management. ASP defines as a software leasing service which is supplied through networks instead of purchasing application software with high price. For successful implementation of ASP, it is necessary to develop the certification methodology to ensure safety and reliability of ASP. The paper provides the safe and reliable certification methodology for ASP. In order to develop it, the critical issues related to service quality and certification of ASP are identified and the systematic certification methodology of application and service provider(service environment) domains of ASP are provided. A evaluation method for the developed certification methodology is also proposed.

A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment

  • Yiran, Zhang;Huizheng, Geng;Yanyan, Xu;Li, Su;Fei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.450-470
    • /
    • 2023
  • Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency.

지각된 위험, 지각된 혜택, 신뢰가 비즈니스 프로세스 아웃소싱 수용에 미치는 영향에 관한 실증 연구

  • Kim, Jae-Jeon;Lee, Yun-Hui;Park, Deuk
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2008.10b
    • /
    • pp.589-594
    • /
    • 2008
  • 정보기술과 지식 사회의 발달로 인해 기업의 다양한 업무 프로세스를 대행해주는 비즈니스 프로세스 아웃소싱(Business Process Outsorucing: BPO)이 대표적 아웃소싱 형태로 자리잡아가고 있다. BPO의 수용에 대한 의사결정은 전략적 관점에서 매우 신중하게 이루어져야 함에도 불구하고, 국내 기업을 대상으로 한 BPO의 채택과 확산에 관한 실증적 연구는 거의 찾아보기 어려운 실정이다. 따라서 본 연구는 국내 기업의 BPO 수용 의사결정에 영향을 미치는 주요 요인들을 추출하고, 이러한 요인들이 수용의도에 어떠한 영향을 미치는지를 검증한다. 이를 위해 BPO 수용 관련 위험요인과 혜택요인을 추출하고, 이들 요인이 신뢰를 매개하여 수용의도에 미치는 영향 관계를 실증적으로 탐색해 향후 BPO연구를 위한 명제와 모델을 제시한다. 실무적으로는 BPO 수용요인에 관한 검토를 통하여 향후 BPO 추진 기업을 위한 성공적 추진 전략을 제시한다.

  • PDF

A Study on IT Outsourcing Model for Small and Medium Sized Firms (중소기업을 위한 정보시스템 아웃소싱모형 연구)

  • 정선필;김도형;김영렬
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2003.11a
    • /
    • pp.613-618
    • /
    • 2003
  • 많은 중소기업들은 정보시스템 적용과 운용에 있어서 정보기술의 전략적, 운영적 차원의 사용보다는 당면한 기업조직의 현문제와 기존의 시스템의 적절한 유지와 보수문제를 어떻게 해야 하는가 하는 문제에 더욱 집중되어 있다. 그러나 정보기술은 기업의 전략적 무기로 인식하여 경쟁우위를 점할 수 있는 가장 큰 수단으로 인식되어 져야 한다. 본 연구는 대기업중심의 아웃소싱관련 선행연구를 통해 우리나라 중소기업의 정보시스템 아웃소싱 상황에 맞는 모형연구가 필요하다는 것을 알게 되었다. 선행연구에서는 파트너십에 대한 문제와 기술적, 통제적, 경제적에 대한 성공요인에 대한 검토되었는데 한편 우리나라 중소기업 상황에서는 자금 회사규모 문제 40.3%, 시스템 운영인력 부족 24.1%, 임직원 활용능력 부족 8.9% 등이 문제로 나타났다 이처럼 대기업과 위험요인과 중소기업의 요인을 비교하였다 그리고 지금까지 나타난 대기업 아웃소싱 문제점과 함께 지난 2년간 정부주도하의 중소기업 정보화 지원사업을 연구하여 중소기업 정보화 아웃소싱 성공요인들을 도출하여 성공적인 중소기업 정보시스템 아웃소싱 모형 만들 수가 있을 것이다.

  • PDF

A Study on Threat Containment through VDI for Security Management of Partner Companies Operating at Industrial Control System Facility

  • Lee, Sangdo;Huh, Jun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.491-494
    • /
    • 2019
  • The results from the analysis of recent security breach cases of industrial control systems revealed that most of them were caused by the employees of a partner company who had been managing the control system. For this reason, the majority of the current company security management systems have been developed focusing on their performances. Despite such effort, many hacking attempts against a major company, public institution or financial institution are still attempted by the partner company or outsourced employees. Thus, the institutions or organizations that manage Industrial Control Systems (ICSs) associated with major national infrastructures involving traffic, water resources, energy, etc. are putting emphasis on their security management as the role of those partners is increasingly becoming important as outsourcing security task has become a common practice. However, in reality, it is also a fact that this is the point where security is most vulnerable and various security management plans have been continuously studied and proposed. A system that enhances the security level of a partner company with a Virtual Desktop Infrastructure (VDI) has been developed in this study through research on the past performances of partner companies stationed at various types of industrial control infrastructures and its performance outcomes were statistically compiled to propose an appropriate model for the current ICSs by comparing vulnerabilities, measures taken and their results before and after adopting the VDI.

A Survey of Homomorphic Encryption for Outsourced Big Data Computation

  • Fun, Tan Soo;Samsudin, Azman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3826-3851
    • /
    • 2016
  • With traditional data storage solutions becoming too expensive and cumbersome to support Big Data processing, enterprises are now starting to outsource their data requirements to third parties, such as cloud service providers. However, this outsourced initiative introduces a number of security and privacy concerns. In this paper, homomorphic encryption is suggested as a mechanism to protect the confidentiality and privacy of outsourced data, while at the same time allowing third parties to perform computation on encrypted data. This paper also discusses the challenges of Big Data processing protection and highlights its differences from traditional data protection. Existing works on homomorphic encryption are technically reviewed and compared in terms of their encryption scheme, homomorphism classification, algorithm design, noise management, and security assumption. Finally, this paper discusses the current implementation, challenges, and future direction towards a practical homomorphic encryption scheme for securing outsourced Big Data computation.

A Study on the Collaboration Development between the SSM and Traditional Markets in Korean Government Policies

  • Suh, Geun-Ha;Park, Seung-Je;Suh, Chang-Soo
    • Journal of Distribution Science
    • /
    • v.10 no.11
    • /
    • pp.55-60
    • /
    • 2012
  • Purpose - This study aims to suggest policy directions for small retail markets in Korea by statistical analysis, which would help small retailers who are facing various difficulties. Research design, data, methodology - This study diagnoses the problems faced by small retail industries in Korea based on government statistics. In addition, this study identifies three areas for successful collaboration between the SSMs and traditional markets-information distribution, products, and fair trade. Results - This study makes three recommendations-information distribution, products, and fair trade. This includes activation of the existing mutual collaboration efforts, channels, CSR report writing and publicity, ethical management cooperation seminars, contract systems of no return, establishment of staff outsourcing standards, and support for suppliers' organizations. Conclusions - Our suggestions for a collaborative system (based on the three suggestions) show that collaboration rather than confrontation between large and small markets can lead to a sales increase of 2,258.2 billion Won, which is equivalent to the sales loss in 11 traditional markets in one year in Busan.

  • PDF