• Title/Summary/Keyword: Information Systems Outsourcing

Search Result 201, Processing Time 0.028 seconds

A Study on the Success Factors of Architectural Information System(SEUMTER) in South Korea

  • Choong-Sik Chung;Minsang Yi;Hanbyul Choi
    • Journal of Platform Technology
    • /
    • v.11 no.1
    • /
    • pp.85-104
    • /
    • 2023
  • Since the late 1990s, the Korean government has attempted to develop the Architectural Information System (AIS, SEUMTER), led by the Ministry of Construction and Transportation, in order to improve civil complaint convenience and administrative efficiency in architectural administration. Since then, for nearly 30 years, the Korean government has been continuously upgrading the SEUMTER system. Based on these advancement projects, it is now possible to conduct civil affairs through the Internet, and civil petitioners can file complaints with government offices without visiting and without documents. In addition, statistical work and performance management became possible in real time for civil servants. And recently, by clouding the SEUMTER system, intelligent services have become possible. In this paper, the development process of the SEUMTER was divided into four stages and evaluated, and the main success factors were derived. The main success factors of SEUMTER are 1) Promotion as a National Agenda - Leadership of the President and Ministers, 2) Outsourcing of Information System Development and Dissemination, 3) Overcoming Selfishness between Ministries - Integrating Building Permits System and Building Ledger Systems, 4) Continue to Promote Information System Advancement. Subsequently, three global diffusion strategies for SEUMTER were presented: 1) the Need to Establish Globalization Strategy: Linkage with Smart City Business, 2) Small and Medium-sized System Model Needed for Globalization and ODA, and 3) System Success Needs to be Publicized Internationally.

  • PDF

Determination of Fleet Size for LTL Transportation With Dynamic Demand

  • Ko, Chang Seong;Chung, Ki-Ho;Shin, Jae-Yeong
    • Management Science and Financial Engineering
    • /
    • v.8 no.2
    • /
    • pp.33-45
    • /
    • 2002
  • This study suggests an approach for determining fleet size for LTL (less -than-truckload) transportation with dynamic demand for on-time supply of the parts between the assembly line in an automobile company and its part suppliers in Korea. The vehicles operated by the transportation trucking companies in Korea in general can be classified into three types depending on the ways how their expenses occur; company -owned truck, mandated truck which is owned by outsider who entrusts the company with its operation, and rented truck (outsourcing) . With the forecasted monthly production data a year, a heuristic algorithm is developed to determine the number of company-owned trucks, mandated trucks, and rented trucks in order to minimize the expected annual operating cost, which is based on the solution technologies used in the aggregate production planning and vehicle routing problem. Finally the algorithm is tested for the problem how the trucking company transports parts for the automobile company.

국내 IT 아웃소싱 이슈 및 연구 주제

  • An, Joon-M
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2002.06a
    • /
    • pp.29-35
    • /
    • 2002
  • 한국 IT아웃소싱서비스 산업이 안고있는 문제의 근원은 아웃소싱서비스 산업구조에서 그 원인을 찾을 수 있다. 이러한 산업구조의 문제가 서비스의 질적인 문제, 방법론의 정교화 문제, 계약의 문제 나아가서는 한국 소프트웨어 산업의 경쟁력 약화에 관한 모든 문제를 잉태하고 있다. 한국 IT아웃소싱 산업구조의 특이성을 무시한 IT아웃소싱의 문제나 문제의 증후군을 대상으로 한 연구나 정책적 해결책을 제시하는 것은 대증적 치료방법에 불과하며 한국 아웃소싱 산업의 경쟁력 확보 전략에 미미한 공헌을 할뿐이다. 우리가 미국이나 여타 국가의 아웃소싱 사례를 한국의 상황에 투영하여 이를 치유의 방안으로 제시하는 어리석음을 벗어나야 하는 이유가 여기에 있는 것이다. 본 논문의 목적은 이와 같은 한국 정보기술 아웃소싱 산업의 근원적 문제구조를 제시하고 이것이 의미하는 IT아웃소싱 연구 방향을 제시하는 데 있다.

  • PDF

An Exploratory Study on the Information Systems Outsourcing Risk Factors;A Model for Contractors (수주자 중심의 정보시스템 아웃소싱 위험요소에 관한 탐색적 연구)

  • Yang, Kyung-Sik;Kim, Hyun-Soo
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2002.11a
    • /
    • pp.106-113
    • /
    • 2002
  • 아웃소싱 시장의 지속적인 성장에도 불구하고 국내 아웃소싱 시장은 대규모의 계약이 이루어 지지 않고 있다. 아웃소싱의 위험요인이 아웃소싱의 활성화에 장애요인이 될 수 있다. 정보시스템 아웃소싱의 위험요인에 대한 연구는 아웃소싱 수준 및 성과에 영향을 미치는 요소를 중심으로 연구가 진행되어 왔다. 즉, 전략적 효과, 경제적 효과, 기술적 효과와 같은 이익에 대한 연구가 주류를 이루고 있다. 그러나 아웃소싱 위험요인에 대한 연구는 사례가 거의 없고, 성과에 미치는 영향에 대한 실증적인 연구는 진행되지 않고 있다. 또한 아웃소싱 위험요소의 경우 대체로 발주자 입장에서 연구를 수행하고 있어, 실제 수주하고 있는 수주자의 입장에서 위험요소를 분석한 연구는 없는 상황이다. 본 연구는 기존 연구에서 제시된 아웃소싱 위험요소와 국내 정보기술 아웃소싱 상황에 맞는 위험요소를 도출하고, 이들 위험요소가 유발되는 정도가 정보기술 아웃소싱 성과와 어떠한 관계를 가지는지에 대해 실증적으로 연구를 수행하였다.

  • PDF

An Improvement of Algorithms for Assembly-type Flowshop Scheduling Problem with Outsourcing (부품외주를 고려한 조립형 Flowshop 일정계획 해법 개선)

  • Yoon, Sang-Hum;Juhn, Jae-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.2
    • /
    • pp.80-93
    • /
    • 2008
  • This paper improves algorithms for an assembly-type flowshop scheduling problem in which each job is to assemble two types of components and makespan is the objective measure. For the assembly, one type of the components is outsourced with job-dependent lead time but the other type is fabricated in-house. When both components for a job are prepared, the assembly operation for the job can be started. This problem had been proved to be NP-Complete, so branch-and-bound (B&B) and heuristic algorithms have already been developed. In this paper, we suggest other dominance rules, lowerbound and heutistic algorithms. Also, we develop a new B&B algorithm using these improved bound and dominance rules. The suggested heuristics and B&B algorithm are compared with existing algorithms on randomly-generated test problems.

An Assembly-Type Flowshop Scheduling Problem with Outsourcing Allowed (부품외주를 고려한 조립형 Flowshop 일정계획문제 연구)

  • Juhn, Jae-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.29 no.4
    • /
    • pp.34-42
    • /
    • 2006
  • This paper considers an assembly-type flowshop scheduling problem in which each job is assembled with two types of components. One type of the components is outsourced with positive lead time but the other type is fabricated in-house at the first stage. The two types of the components should be prepared at the first stage before starting the assembly operation for each job at the second stage. The objective is to schedule the jobs so that the makespan is minimized. Some solution properties and lower bounds are derived and incorporated into a branch and bound algorithm. Also, an efficient heuristic is developed. The performances of the proposed branch and bound algorithm and heuristic are evaluated through computational experiments.

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid

  • Li, Hongwei;Liu, Dongxiao;Alharbi, Khalid;Zhang, Shenmin;Lin, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1404-1423
    • /
    • 2015
  • In smart grid, electricity consumption data may be handed over to a third party for various purposes. While government regulations and industry compliance prevent utility companies from improper or illegal sharing of their customers' electricity consumption data, there are some scenarios where it can be very useful. For example, it allows the consumers' data to be shared among various energy resources so the energy resources are able to analyze the data and adjust their operation to the actual power demand. However, it is crucial to protect sensitive electricity consumption data during the sharing process. In this paper, we propose a fine-grained access control scheme (FAC) with efficient attribute revocation and policy updating in smart grid. Specifically, by introducing the concept of Third-party Auditor (TPA), the proposed FAC achieves efficient attribute revocation. Also, we design an efficient policy updating algorithm by outsourcing the computational task to a cloud server. Moreover, we give security analysis and conduct experiments to demonstrate that the FAC is both secure and efficient compared with existing ABE-based approaches.

Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing

  • Zhu, Hong;Wu, Bin;Xie, Meiyi;Cui, Zongmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.5171-5189
    • /
    • 2016
  • With the popularity of cloud computing, many data owners outsource their graph data to the cloud for cost savings. The cloud server is not fully trusted and always wants to learn the owners' contents. To protect the information hiding, the graph data have to be encrypted before outsourcing to the cloud. The adjacent vertex search is a very common operation, many other operations can be built based on the adjacent vertex search. A boolean adjacent vertex search is an important basic operation, a query user can get the boolean search results. Due to the graph data being encrypted on the cloud server, a boolean adjacent vertex search is a quite difficult task. In this paper, we propose a solution to perform the boolean adjacent vertex search over encrypted graph data in cloud computing (BASG), which maintains the query tokens and search results privacy. We use the Gram-Schmidt algorithm and achieve the boolean expression search in our paper. We formally analyze the security of our scheme, and the query user can handily get the boolean search results by this scheme. The experiment results with a real graph data set demonstrate the efficiency of our scheme.

A Study on the Effect of Project Process Quality on Project Success : Focusing on SI(System Integration) Project (프로젝트 과정품질이 프로젝트 성과에 미치는 영향 : 시스템통합 프로젝트를 중심으로)

  • Ko, Deok-Seong;Park, So-Hyun;Kim, Seung-Chul
    • Journal of Information Technology Services
    • /
    • v.18 no.2
    • /
    • pp.75-96
    • /
    • 2019
  • These days, many companies use information systems as a basis for organizational management activities and as an important component of sustainable management. Thus, securing and operating a high-quality information system that can improve the efficiency of business processes is a large part of corporate competitiveness. In order to get such a critical information system, it is only possible to successfully carry out the project. Various attempts and studies have been undertaken to increase the success rate of the project. However, the reality is that the success rate is still not getting much better. In this study, the concept of quality of service, which has long been actively studied in marketing area, was applied as a new factor to enhance the project's success. In this study, project performance activities were defined as the act of providing services. A survey of 164 valid collection data was analyzed. The analysis used SPSS 23. Four process quality factors (customer participation, customer response, knowledge and skills, reliability) and 21 metrics were derived. Through this research, I hope to be the starting point of applying process quality concept as a new breakthrough to increase success rate of project.

Post-purchase Customer Choice Model for Subscription-based Information and Telecommunications Services (가입형 정보통신 서비스의 구매 후 고객선택모형)

  • Lee, Dong-Joo;Ryu, Ho-Chul;Ahn, Jae-Hyeon
    • Information Systems Review
    • /
    • v.8 no.1
    • /
    • pp.159-179
    • /
    • 2006
  • With the advances in information technologies and the wide acceptance of IT outsourcing practices, subscription-based information & telecommunications services(ITS) become more available. Convergence and intensified industry competition have made it an imperative for the ITS providers to keep their current customers and acquire new customers at the same time. In this study, we developed a framework for effective customer management based on the factors influencing the post-purchase customer choice: stay with the present provider or switch to another one. Specifically, we classified the factors into four categories: Holding factors, Defect factors, Inducement factors, and Hurdle factors depending on the characteristics of the influence and direction of the influence. Based on the classification, we developed a post-purchase customer choice model for the subscription-based ITS providers. Then, we illustrated a possible application of the model in the context of the broadband Internet access service. The model could be used to increase the competitive advantage of service providers through the effective customer management in the subscription-based ITS market.