• Title/Summary/Keyword: Outsourced

Search Result 134, Processing Time 0.021 seconds

A Study on the Pattern of Wholesale and Retail Consumer Behavior in Dongdaemoon Market about the Outsourced Products in Foreign Countries (동대문시장 도.소매소비자의 구매행동 - 해외 아웃소싱 상품을 중심으로 -)

  • Lee, Eun-Hyung;Kim, Mi-Young;Lee, Hyun-Jung
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.10 no.3
    • /
    • pp.27-36
    • /
    • 2008
  • This article aims to identify the current status of outsourced production of Dongdaemun brands and to discover the consumers' perception of those outsourced products, their degree of satisfaction, and preference in purchasing those products. Moreover, the strengths and weaknesses of the outsourced products, as perceived by the consmers, have been identified, and specific methods and directions for efficient overseas outsourcing of Dongdaemun brands are suggested. This study also contains experimental works, in which I have prepared questionnaires, and my advisor have collected data. This survey was conducted on corporation managers, who directly operated clothing stores in Dongdaemun Market in December 2007. The collected data have been analyzed using SPSS 12.0 with various techniques such as t-test, paired t-test, frequency analysis and $X^2$-test. The results are summarized as the following: a) Comparison of the current outsourcing status of Dongdaemun brands showed that only eight out of the total 42 investigated companies have actually been outsourcing the production of their clothes. The biggest advantage of outsourcing was the reduced unit production cost, while low quality of products, delayed production, difficulty of control and management were shown as its disadvantages; b) the reason for purchasing clothes in Dongdaemun Market was to buy various clothing products. Comparing these reasons among different groups showed that there was a significant discrepancy in terms of trend design and copy design, in which wholesale consumers had shown a higher degree than retail consumers; c) and the preference for outsourced products of Dongdaemun brands was negative in both wholesale consumers (71.05%) and retail consumers (83.54%), as they both prefer clothes manufactured in Korea. Both groups selected the expensive price as the biggest disadvantage of Korean products, and picked design as the biggest strength of the outsourced clothes. Furthennore, both wholesale consumers (63.16%) and retail consumers (74.68%) selected Italy as the most preferred country for outsourcing clothing production. in which their reason had been their expectation for good product quality. The least preferred country for both wholesale (47.37%) and retail (50.63%) consumers was China, a country which they expected poor product quality.

  • PDF

Trade Union and Employment: The Korean Experience (노동조합의 고용효과 분석)

  • Kim, Inkyung
    • KDI Journal of Economic Policy
    • /
    • v.35 no.4
    • /
    • pp.95-136
    • /
    • 2013
  • Using Workplace Panel Survey of 2005, 2007 and 2009 waves, this study estimates the effects of trade unions on employment and the proportion of irregular workers, short-term and part-time workers, and agent temporary and outsourced workers. While the estimation result shows that the percentage of hired workers increases under union presence, these results seem to be contaminated with bias because the differences between unionized firms before union establishment and non-unionized firms are not completely controlled even after adjusting for observed characteristics. Meanwhile, unionized firms and non-unionized firms with grievance procedures employ higher proportion of irregular workers. The proportion of short-term and part-time workers increases only when they are entitled to join trade unions. These imply that the rise in the percentage of irregular workers due to unions and grievance procedures is attributed to the increase in the percentage of agent temporary and outsourced workers. Also, when short-term and part-time workers are allowed to join the union, the firm replaces agent temporary and outsourced workers with short-term and part-time workers, so that the proportion of irregular workers do not change.

  • PDF

A Parallel Machine Scheduling Problem with Outsourcing Options (아웃소싱을 고려한 병렬기계 일정계획 연구)

  • Lee, Ik-Sun;Yoon, Sang-Hum
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.3
    • /
    • pp.101-109
    • /
    • 2008
  • This paper considers an integrated decision for scheduling and outsourcing(or, subcontracting) of a finite number of jobs(or, orders) in a time-sensitive make-to-order manufacturing environment. The jobs can be either processed in a parallel in-house facilities or outsourced to subcontractors. We should determine which jobs should be processed in-house and which jobs should be outsourced. And, we should determine the schedule for the jobs to be processed in-house. If a job is determined to be processed in-house, then the scheduling cost(the completion time of the Job) is imposed. Otherwise(if the job should be outsourced), then an additional outsourcing cost is imposed. The objective is to minimize the linear combination of scheduling and outsourcing costs under a budget constraint for the total available outsourcing cost. In the problem analysis, we first characterize some solution properties and then derive dynamic programming and branch-and- bound algorithms. An efficient heuristic is also developed. The performances of the proposed algorithms are evaluated through various numerical experiments.

Does the Understanding of Core Competencies Matter to IT Outsourcing Performance? (기업의 핵심역량이 IT 아웃소싱 성과에 직접적인 관련이 있을 것인가?)

  • Kim, Young-Jin;Nam, Ki-Chan;Koo, Chul-Mo
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.3
    • /
    • pp.97-114
    • /
    • 2007
  • IT outsourcing providers has been expanded from a single functional system to the entire IT service to gain sustainable competitiveness. This new trend of IT outsourcing need outsourcing management capability based on a firm's core capacity. Hiring external IT service providers to manage part or all of its information-related services helps a firm focus on its core business and provides better services to its clients, thus obtaining sustainable competitive advantage. This research investigates the major factors that determine the level of a particular firm's success at IT outsourcing. Based on process innovation and core-competency theories, we identify three significant components of a firm's IT outsourcing management method (ITOMM): level of core-competency-based management, maturity of outsourced tasks, and maturity of outsourcing management. Comprehensive data collection was conducted through an outsourcing association. The survey data were analyzed using a structural analysis method. Maturity of outsourced tasks and maturity of outsourcing management were found to affect project performance directly, while level of core-competency-based management only indirectly impacted project performance through its positive impact on the other two ITOMM components.

An Exploratory Study on the Utilization of Information Systems Outsourcing (정보시스템 아웃소싱의 활용에 관한 탐색적 연구)

  • 천면중;김영달
    • The Journal of Information Systems
    • /
    • v.8 no.1
    • /
    • pp.5-26
    • /
    • 1999
  • In recent years there has been an increasing amount of attention paid to outosourcing of information systems (IS) functions in organizations. The changing and more strategic role of outsourcing in business firms has been given much coverage in academic and trade publications. Trying to remain competitive and up-to-date in the rapidly developing world of computer technology is becoming a financial burden to many organizations in fields such as banking and financial services, health care, and manufacturing. Hiring outsiders to handle part or even all of its information services helps an organization provide better services and maintain a competitive advantage. This paper attempts to provide a benchmark of current IS outsourcing utilization in Korea. A detailed descriptive analysis of survey responses from 78 Korean companies indicates the usage, length of experience, expenditure of outsourcing, and kinds of IS functions being outsourced. The study also analyzes the effects (strategic, economic, and technological) of IS outsourcing with respect to the length of experience, expenditure of outsourcing, and kinds of IS functions being outsourced As a result of the analysis there are significant differences in the strategic, economic and technological effects of IS outsourcing with respect to the expenditure of outsourcing, kinds of IS functions being outsourced and firm size.

  • PDF

An Empirical Study on the Determinants of Information Systems Sourcing: Focus on Korean Financial Institutions (정보시스템의 소싱 결정에 영향을 미치는 주요 요인에 대한 실증 연구 - 국내 금융기관을 중심으로 -)

  • Won, Young-Nam;Lee, Moon-Bong;Suh, Kil-Soo
    • Asia pacific journal of information systems
    • /
    • v.10 no.3
    • /
    • pp.1-16
    • /
    • 2000
  • The purpose of this research is to validate the determinants of information systems(IS) sourcing strategy focusing on Korean financial institutions. Based on the factor analyses and discriminant analyses using data from 34 major Korean financial institutions, we observed that determinants of IS souring strategy are perceived risks, strategic expectations and organizational IS maturity. If the clients have clear objectives, can control the risks from IS sourcing, and have information systems in the less-matured stage, they frequently outsource their IS. In view of the IS maturity, previous studies suggest that more-matured IS are outsourced. But the results of this study show that more-matured IS are insourced. These phenomena can be explained by classifying IS by their functions. Transaction processing systems, which are mission-critical, are generally insourced, but decision support systems, which are in their mature state, are generally outsourced.

  • PDF

Provably-Secure Public Auditing with Deduplication

  • Kim, Dongmin;Jeong, Ik Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2219-2236
    • /
    • 2017
  • With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.

Secure and Efficient Conjunctive Keyword Search Scheme without Secure Channel

  • Wang, Jianhua;Zhao, Zhiyuan;Sun, Lei;Zhu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2718-2731
    • /
    • 2019
  • Conjunctive keyword search encryption is an important technique for protecting sensitive data that is outsourced to cloud servers. However, the process of searching outsourced data may facilitate the leakage of sensitive data. Thus, an efficient data search approach with high security is critical. To solve this problem, an efficient conjunctive keyword search scheme based on ciphertext-policy attribute-based encryption is proposed for cloud storage environment. This paper proposes an efficient mechanism for removing the secure channel and resisting off-line keyword-guessing attacks. The storage overhead and the computational complexity are regardless of the number of keywords. This scheme is proved adaptively secure based on the decisional bilinear Diffie-Hellman assumption in the standard model. Finally, the results of theoretical analysis and experimental simulation show that the proposed scheme has advantages in security, storage overhead and efficiency, and it is more suitable for practical applications.

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.