• Title/Summary/Keyword: Outsourced

Search Result 134, Processing Time 0.03 seconds

The activation plans of the third party logistics for e-Business (전자상거래시대의 제3자 물류 활성화 방안)

  • Lee, Shin-Kyuo
    • The Journal of Information Technology
    • /
    • v.7 no.3
    • /
    • pp.63-81
    • /
    • 2004
  • The third party logistics(3PL) is generally understood as the logistics activities providing a comprehensive logistics services, all or partly outsourced by the customers on a larger term contract basis, ranging from making logistics strategies to implementing information technology services. A lot of companies in advanced countries such as the U.S.A. or some of the European countries have actively outsourced to logistics service providers in efforts to increase the efficiencies in logistics operation rather than doing themselves. In light of these environments, outsourcing to third parties has become a strategic issue demanding greater attention in corporate boardrooms. First, after deciding their logistics outsourcing, the companies have to set up their aims of 3PL through the development of logistical strategies. Second, the companies must decide service provider that fits to their business environment and conditions. As it is reported that 3PL services will bring a high rate of return and its potential will be more signigicant, providers and users of 3PL services and government ministry should prepare the way of improvement of logistics institution and plan to activate 3PL services to reach the advanced foreign countries level.

  • PDF

A Study of the risk and reward structure in the copyright contract between terrestrial broadcasting and production company (방송사와 외주제작사간 저작권계약에 나타난 위험과 보상구조 연구)

  • Lee, Chi Hyung
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.71-77
    • /
    • 2013
  • Broadcaster and production studio inevitably take the risk in Korea because the outsourced drama is contracted before produced. However, it is important for both parties to share risk and reward. This study seeks to assess the fairness of the copyright contract between broadcaster and production studio by examining whether they both have the balanced risk and reward structure. For the study, revenue and cost elements with their amounts are identified, which come from TV commercials, oversea sales, the secondary windows, sponsorship, and product placement. Next, the revenue and COGS (Cost of goods sold) of broadcaster and studio are estimated for both cases of when drama becomes successful or not. The analysis reveals that the current copyright agreement allows broadcaster hold low risk but high reward whilst production studio takes high risk low reward. However, the result doesn't imply that government intervention is justified because demand and supply determine the negotiation power in a free economy.

Efficient Outsourced Multiparty Computations Based on Partially Homomorphic Encryption (부분동형암호와 외부서버를 이용한 효율적인 다자간 연산 기법)

  • Eun, Hasoo;Ubaidullah, Ubaidullah;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.477-487
    • /
    • 2017
  • Multiparty computation (MPC) is a computation technique where many participants provide their data and jointly compute operations to get a computation result. Earlier MPC protocols were mostly depended on communication between the users. Several schemes have been presented that mainly work by delegating operations to two non-colluding servers. Peter et al. propose a protocol that perfectly eliminates the need of users' participation during the whole computation process. However, the drawback of their scheme is the excessive dependence on the server communication. To cater this issue, we propose a protocol that reduce server communication overhead using the proxy re-encryption (PRE). Recently, some authors have put forward their efforts based on the PRE. However, these schemes do not achieve the desired goals and suffer from attacks that are based on the collusion between users and server. This paper, first presents a comprehensive analysis of the existing schemes and then proposes a secure and efficient MPC protocol. The proposed protocol completely eliminates the need of users' participation, incurs less communication overhead and does not need to solve the discrete logarithm problem (DLP) in order to get the computation results.

Web Services-based Integration Design of Model-Solver for a Distributed Decision Support System (분산 의사결정지원시스템 구축을 위한 웹서비스 기반 모델-솔버의 통합 설계)

  • Lee, Keun-Woo;Yang, Kun-Woo
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.1
    • /
    • pp.43-55
    • /
    • 2012
  • In recent years, outsourcing of information systems, including decision support systems has become a key method for managing the system portfolio of a corporation. Since the outsourced DSSs provide their own models and solvers, which may be created on the basis of different modeling practices and system platforms, the decision maker wishing to solve business problems using the outsourced DSSs frequently faces a difficulty in selecting and/or applying appropriate models and solvers to the problems on hand. This paper proposes a DSS outsourcing architecture that enables a user to discover and execute appropriate models and solvers, even though the user is not knowledgeable enough about all the details of the models and solvers. Specifically, this paper adopts a Web services approach to integrate the heterogeneous models and solvers by encapsulating individual models and solvers as Web services and hiding all system specific implementation details from the users.

A study on the current status and ways of activating 3PL (제3자물류의 실태분석 및 활성화 방안에 관한 연구)

  • 이충규;김준석
    • Journal of Korea Port Economic Association
    • /
    • v.18 no.2
    • /
    • pp.65-90
    • /
    • 2002
  • Despite the importance and necessity, the 3PL has not been activated to date. Among many views, customers claim that logistics service provider(LSP) are not prepared or capable of offering satisfactory 3PL services, while LSP emphasize the lack of mutual trust, closed corporate culture of the customer and excessive demand for reducing the costs. With this keeping in mind, it surveyed difference of perception between users and providers of 3PL services in terms of the actual status of using 3PL services, the degree of satisfaction and key factors for selecting 3PL provider through the questionnaire. As shown in this study, 43.3% of the respondents outsourced logistics services. However, Most company outsourced only inland transportation (49.5%) which is a simple and limited scope of 3PL services, but it also indicated that the percentage of users have ranged was less then 10% in outsourcing their whole logistics sector to 3PL provider and employing other logistics functions. Among respondents, a majority of the service provider stated that they offered satisfactory cost-saving to the customers, while users felt that the degree of satisfaction for using 3PL services was evaluated as at an average level and they more highly regarded the strong partnership of their 3PL provider rather than the saving of cost and improvement of customer's services. Moreover, in contrast to the 3PL providers which regard the most important factor for selecting 3PL service provider is the logistics cost quoted, users of 3PL services felt that the quality of services was more significant than the reduction of cost, and this tendency for selecting 3PL providers was shown in more advanced countries. While users of 3PL services indicated that the main reason for not using 3PL services was to avoid disclosing information of their business and it costs much for employing 3PL providers than doing themselves, 3PL providers thought it was due to reluctancy of opening information and resistance from the logistics division engaged in logistics activities concerned. Accordingly, providers and users of 3PL services should trust each other and prepare plan to activate 3PL services under the collaborative relationships as soon as possible.

  • PDF

Utilization of desktop 3D printer-fabricated "Cost-Effective" 3D models in orthognathic surgery

  • Narita, Masato;Takaki, Takashi;Shibahara, Takahiko;Iwamoto, Masashi;Yakushiji, Takashi;Kamio, Takashi
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.42
    • /
    • pp.24.1-24.7
    • /
    • 2020
  • Background: In daily practice, three-dimensional patient-specific jawbone models (3D models) are a useful tool in surgical planning and simulation, resident training, patient education, and communication between the physicians in charge. The progressive improvements of the hardware and software have made it easy to obtain 3D models. Recently, in the field of oral and maxillofacial surgery, there are many reports on the benefits of 3D models. We introduced a desktop 3D printer in our department, and after a prolonged struggle, we successfully constructed an environment for the "in-house" fabrication of the previously outsourced 3D models that were initially outsourced. Through various efforts, it is now possible to supply inexpensive 3D models stably, and thus ensure safety and precision in surgeries. We report the cases in which inexpensive 3D models were used for orthodontic surgical simulation and discuss the surgical outcomes. Review: We explained the specific CT scanning considerations for 3D printing, 3D printing failures, and how to deal with them. We also used 3D models fabricated in our system to determine the contribution to the surgery. Based on the surgical outcomes of the two operators, we compared the operating time and the amount of bleeding for 25 patients who underwent surgery using a 3D model in preoperative simulations and 20 patients without using a 3D model. There was a statistically significant difference in the operating time between the two groups. Conclusions: In this article, we present, with surgical examples, our in-house practice of 3D simulation at low costs, the reality of 3D model fabrication, problems to be resolved, and some future prospects.

Verification Algorithm for the Duplicate Verification Data with Multiple Verifiers and Multiple Verification Challenges

  • Xu, Guangwei;Lai, Miaolin;Feng, Xiangyang;Huang, Qiubo;Luo, Xin;Li, Li;Li, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.558-579
    • /
    • 2021
  • The cloud storage provides flexible data storage services for data owners to remotely outsource their data, and reduces data storage operations and management costs for data owners. These outsourced data bring data security concerns to the data owner due to malicious deletion or corruption by the cloud service provider. Data integrity verification is an important way to check outsourced data integrity. However, the existing data verification schemes only consider the case that a verifier launches multiple data verification challenges, and neglect the verification overhead of multiple data verification challenges launched by multiple verifiers at a similar time. In this case, the duplicate data in multiple challenges are verified repeatedly so that verification resources are consumed in vain. We propose a duplicate data verification algorithm based on multiple verifiers and multiple challenges to reduce the verification overhead. The algorithm dynamically schedules the multiple verifiers' challenges based on verification time and the frequent itemsets of duplicate verification data in challenge sets by applying FP-Growth algorithm, and computes the batch proofs of frequent itemsets. Then the challenges are split into two parts, i.e., duplicate data and unique data according to the results of data extraction. Finally, the proofs of duplicate data and unique data are computed and combined to generate a complete proof of every original challenge. Theoretical analysis and experiment evaluation show that the algorithm reduces the verification cost and ensures the correctness of the data integrity verification by flexible batch data verification.

Comparative Analysis on ICT Supply Chain Security Standards and Framework (ICT 공급망 보안기준 및 프레임워크 비교 분석)

  • Min, Seong-hyun;Son, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1189-1206
    • /
    • 2020
  • Recently, ICT companies do not directly design, develop, produce, operate, maintain, and dispose of products and services, but are outsourced or outsourced companies are increasingly in charge. Attacks arising from this are also increasing due to difficulties in managing vulnerabilities for products and services in the process of consignment and re-consignment. In order to respond to this, standards and systems for security risk management of ICT supply chain are being established and operated overseas, and various case studies are being conducted. In addition, research is being conducted to solve supply chain security problems such as Software Bill of Materials (SBOM). International standardization organizations such as ISO have also established standards and frameworks for security of ICT supply chain. In this paper, we presents ICT supply chain security management items suitable for domestic situation by comparing and analyzing ICT supply chain security standards and systems developed as international standards with major countries such as the United States and EU, and explains the necessity of cyber security framework for establishing ICT supply chain security system.

An Empirical Study on Effects of PMO Governance and Its Influencing Factors (PMO 수행체계 적절성의 효과와 영향 요인에 관한 실증연구)

  • Lee, Jin-Shil;Kim, Sung-Kun
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.1
    • /
    • pp.61-83
    • /
    • 2012
  • PMO has gained much interest as an approach to lowering project failure rates. PMO implementation is, however, not an easy endeavor. Many studies have reported that a significant number of PMOs were seen as contributing little to project performance. Local organizations are more likely to be exposed to the failure risk as they tend to heavily depend upon outsourced PMO services. We believe that it is essential for ordering organizations to collaborate with the PMO service firm to come up with a proper PMO governance prior to its implementation. This study is to empirically investigate the effects of PMO governance upon PMO performance and the effects of ordering organization's project readiness upon PMO governance. The study result shows that a proper organizational structure and a properly defined role and responsibility may enhance the PMO performance. And, a correct awareness about PMO and a project management capability were found to be contributing to the appropriateness of PMO governance.

A Study on Way of activating scheme and concentratin of the Third party logistics providers through internatinal comparison (국제비교를 통한 국내제3자 물류업의 활성화방안에 관한 연구)

  • Im, Gi-Heung;Choe, Gwang-Don;Jo, Jae-Wan
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2006.12a
    • /
    • pp.285-298
    • /
    • 2006
  • The third party logistics(3PL) is given a definition as logistics activaties providing a comprehensive logistics services, all or partly outsourced by the customer on longer term contract basis, ranging from making logistics strategies to implementing information technology services. The growth of the Third Party Logistics (TPL) business has caused many firms from different industries to enter the field. In this study, it is presented to describe a defintion and development precess of the third party logistics and shown to present strategic issues comparing to third party in foreign and domestic area. and apply some issues of importance when managing the continued TPL business strategy in domestic area.

  • PDF