• Title/Summary/Keyword: Outsourced services

Search Result 34, Processing Time 0.035 seconds

Current Status of Outsourced Food Service Operations According to the Type of Long-Term Care Institution and Plans for Improvement (장기요양기관 유형별 위탁급식 운영 실태 및 개선 방안)

  • Kwon, Jinhee;Lee, Heeseung;Jeong, Hyeonjin;Chang, Hyeja;Lee, Jungsuk
    • Journal of the Korean Dietetic Association
    • /
    • v.28 no.2
    • /
    • pp.67-84
    • /
    • 2022
  • This study aimed to explore the status of food service outsourcing behavior of long-term care institutions (LTCIs) through a cross-sectional survey using a questionnaire administered between July 16th and August 7th, 2020. The survey respondents were either dietitians or facility managers, who worked at 731 nursing homes, 477 group homes, and 673 day-care centers. Approximately 25.9% of nursing homes, 11.7% of group homes, and 33.1% of day-care centers used a managed-services company to operate their food service units. The main reason for outsourcing food service by nursing homes was related to the staffing of dietitians and cooks, whereas group homes and day-care centers outsourced food services due to factors relating to meal costs and the cooking process. Almost all the LTCIs entered into private contracts for outsourced food services. Only a few food service contracts included the types of meals, nutrition standards such as protein and calories per meal, and the parameter or ratio of food cost. Of the respondents, 84.5% from nursing homes, 87.5% from group homes, and 87.1% from day-care centers agreed that the quality of outsourced food services of the LTCIs should be regulated. Meals are essential for maintaining the health and functional status of LTCI users. As more LTCIs outsource their food services, we suggest the following: (1) Increasing the minimum dietitian staffing standards for LTCIs as per the Welfare of Senior Citizens Act and requiring at least one dietitian for every nursing home, (2) Making it mandatory to use a standard food service contract template when drafting food service contract, and (3) Developing realistic standards for food service operations considering the size and operation type of the LTCIs.

An Analysis of E-Commerce by Local Governments in Korea (한국 지방자치단체의 전자상거래 유형 분석)

  • Kim, Se Hun;Min, Daihwan
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.31-44
    • /
    • 2015
  • Local governments in Korea are involved in three types of online shopping sites : 'direct operation', 'outsourced operation', and 'sales agency.' They are different in terms of the site operator and the charging mechanism among a local government, the site operator, and local producers. This study analyzes their differences in site traffic, local producers' participation, promotion, and partnership. The results from the investigation of 72 shopping sites are the following. First, shopping sites of the 'direct operation' type and the 'outsourced operation' type show significantly higher participation of local producers. Second, the 'marketing agency' type has significantly higher number of promotional activities than the 'oursourced type' which has significantly higher number than the 'direct operation' type. Third, the number of partnerships in the 'marketing agency' type is the highest. The 'direct operation' type is the second and significantly higher than the 'outsourced type.' On the basis of the analysis results, this paper suggests an incubation ecosystem model as a better way of involvement by local governments in online shopping sites.

An Exploratory Study on the Utilization of Information Systems Outsourcing (정보시스템 아웃소싱의 활용에 관한 탐색적 연구)

  • 천면중;김영달
    • The Journal of Information Systems
    • /
    • v.8 no.1
    • /
    • pp.5-26
    • /
    • 1999
  • In recent years there has been an increasing amount of attention paid to outosourcing of information systems (IS) functions in organizations. The changing and more strategic role of outsourcing in business firms has been given much coverage in academic and trade publications. Trying to remain competitive and up-to-date in the rapidly developing world of computer technology is becoming a financial burden to many organizations in fields such as banking and financial services, health care, and manufacturing. Hiring outsiders to handle part or even all of its information services helps an organization provide better services and maintain a competitive advantage. This paper attempts to provide a benchmark of current IS outsourcing utilization in Korea. A detailed descriptive analysis of survey responses from 78 Korean companies indicates the usage, length of experience, expenditure of outsourcing, and kinds of IS functions being outsourced. The study also analyzes the effects (strategic, economic, and technological) of IS outsourcing with respect to the length of experience, expenditure of outsourcing, and kinds of IS functions being outsourced As a result of the analysis there are significant differences in the strategic, economic and technological effects of IS outsourcing with respect to the expenditure of outsourcing, kinds of IS functions being outsourced and firm size.

  • PDF

Does the Understanding of Core Competencies Matter to IT Outsourcing Performance? (기업의 핵심역량이 IT 아웃소싱 성과에 직접적인 관련이 있을 것인가?)

  • Kim, Young-Jin;Nam, Ki-Chan;Koo, Chul-Mo
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.3
    • /
    • pp.97-114
    • /
    • 2007
  • IT outsourcing providers has been expanded from a single functional system to the entire IT service to gain sustainable competitiveness. This new trend of IT outsourcing need outsourcing management capability based on a firm's core capacity. Hiring external IT service providers to manage part or all of its information-related services helps a firm focus on its core business and provides better services to its clients, thus obtaining sustainable competitive advantage. This research investigates the major factors that determine the level of a particular firm's success at IT outsourcing. Based on process innovation and core-competency theories, we identify three significant components of a firm's IT outsourcing management method (ITOMM): level of core-competency-based management, maturity of outsourced tasks, and maturity of outsourcing management. Comprehensive data collection was conducted through an outsourcing association. The survey data were analyzed using a structural analysis method. Maturity of outsourced tasks and maturity of outsourcing management were found to affect project performance directly, while level of core-competency-based management only indirectly impacted project performance through its positive impact on the other two ITOMM components.

A study on the current status and ways of activating 3PL (제3자물류의 실태분석 및 활성화 방안에 관한 연구)

  • 이충규;김준석
    • Journal of Korea Port Economic Association
    • /
    • v.18 no.2
    • /
    • pp.65-90
    • /
    • 2002
  • Despite the importance and necessity, the 3PL has not been activated to date. Among many views, customers claim that logistics service provider(LSP) are not prepared or capable of offering satisfactory 3PL services, while LSP emphasize the lack of mutual trust, closed corporate culture of the customer and excessive demand for reducing the costs. With this keeping in mind, it surveyed difference of perception between users and providers of 3PL services in terms of the actual status of using 3PL services, the degree of satisfaction and key factors for selecting 3PL provider through the questionnaire. As shown in this study, 43.3% of the respondents outsourced logistics services. However, Most company outsourced only inland transportation (49.5%) which is a simple and limited scope of 3PL services, but it also indicated that the percentage of users have ranged was less then 10% in outsourcing their whole logistics sector to 3PL provider and employing other logistics functions. Among respondents, a majority of the service provider stated that they offered satisfactory cost-saving to the customers, while users felt that the degree of satisfaction for using 3PL services was evaluated as at an average level and they more highly regarded the strong partnership of their 3PL provider rather than the saving of cost and improvement of customer's services. Moreover, in contrast to the 3PL providers which regard the most important factor for selecting 3PL service provider is the logistics cost quoted, users of 3PL services felt that the quality of services was more significant than the reduction of cost, and this tendency for selecting 3PL providers was shown in more advanced countries. While users of 3PL services indicated that the main reason for not using 3PL services was to avoid disclosing information of their business and it costs much for employing 3PL providers than doing themselves, 3PL providers thought it was due to reluctancy of opening information and resistance from the logistics division engaged in logistics activities concerned. Accordingly, providers and users of 3PL services should trust each other and prepare plan to activate 3PL services under the collaborative relationships as soon as possible.

  • PDF

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

Outsourcing Business to cloud computing with communication services

  • Chou, Nory;Lee, Minsoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.146-147
    • /
    • 2010
  • This paper describes business on cloud computing service and the development of solution in the business Architecture in outsourced services environment for communication. Cloud computing is so popular and make people life easier. Business process outsourcing has become attractive to both large and small businesses with the advent of service oriented and specifically web service technology.

The Web based Questionnaire Systems for IT Outsourcing Customer Satisfaction Survey : System Architecture and Process (정보시스템 아웃소싱 고객만족도 조사를 위한 웹 기반 설문 시스템 : 시스템 아키텍처 및 프로세스)

  • Jeong, Yoon-Seok;An, Joon-M.
    • Journal of Information Technology Services
    • /
    • v.4 no.1
    • /
    • pp.149-160
    • /
    • 2005
  • Information system outsourcing induces firms to concentrate on the core competence and to improve business value by utilizing specialized information systems outsourcing vendors. However, for those strategic effects, the outsourced information systems should guarantee a certain service level. Now companies are considering to adopt SLA(Service Level Agreement) as a method to check the service level of the outsourced information systems in quantitative terms. On the contrary, customer satisfaction survey supports qualitative analysis, and helps companies to understand the qualitative effects on information system more systematically. Recently, the growing use of the internet makes customer satisfaction survey to be carried out on the web. For that reason, lots of researches related to web survey have been performed. But these researches are just focused on finding out only items to be measured and the effect of web survey. In this paper, based on the service quality research model for information system outsourcing, we formalize and propose a web survey process, a system architecture, and a functional structure for information system outsourcing customer satisfaction survey. Additionally, we provide the implementation results for the web survey systems.

The activation plans of the third party logistics for e-Business (전자상거래시대의 제3자 물류 활성화 방안)

  • Lee, Shin-Kyuo
    • The Journal of Information Technology
    • /
    • v.7 no.3
    • /
    • pp.63-81
    • /
    • 2004
  • The third party logistics(3PL) is generally understood as the logistics activities providing a comprehensive logistics services, all or partly outsourced by the customers on a larger term contract basis, ranging from making logistics strategies to implementing information technology services. A lot of companies in advanced countries such as the U.S.A. or some of the European countries have actively outsourced to logistics service providers in efforts to increase the efficiencies in logistics operation rather than doing themselves. In light of these environments, outsourcing to third parties has become a strategic issue demanding greater attention in corporate boardrooms. First, after deciding their logistics outsourcing, the companies have to set up their aims of 3PL through the development of logistical strategies. Second, the companies must decide service provider that fits to their business environment and conditions. As it is reported that 3PL services will bring a high rate of return and its potential will be more signigicant, providers and users of 3PL services and government ministry should prepare the way of improvement of logistics institution and plan to activate 3PL services to reach the advanced foreign countries level.

  • PDF

Provably-Secure Public Auditing with Deduplication

  • Kim, Dongmin;Jeong, Ik Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2219-2236
    • /
    • 2017
  • With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.