• Title/Summary/Keyword: Outsourced services

Search Result 34, Processing Time 0.027 seconds

Web Services-based Integration Design of Model-Solver for a Distributed Decision Support System (분산 의사결정지원시스템 구축을 위한 웹서비스 기반 모델-솔버의 통합 설계)

  • Lee, Keun-Woo;Yang, Kun-Woo
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.1
    • /
    • pp.43-55
    • /
    • 2012
  • In recent years, outsourcing of information systems, including decision support systems has become a key method for managing the system portfolio of a corporation. Since the outsourced DSSs provide their own models and solvers, which may be created on the basis of different modeling practices and system platforms, the decision maker wishing to solve business problems using the outsourced DSSs frequently faces a difficulty in selecting and/or applying appropriate models and solvers to the problems on hand. This paper proposes a DSS outsourcing architecture that enables a user to discover and execute appropriate models and solvers, even though the user is not knowledgeable enough about all the details of the models and solvers. Specifically, this paper adopts a Web services approach to integrate the heterogeneous models and solvers by encapsulating individual models and solvers as Web services and hiding all system specific implementation details from the users.

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

A Study on Way of activating scheme and concentratin of the Third party logistics providers through internatinal comparison (국제비교를 통한 국내제3자 물류업의 활성화방안에 관한 연구)

  • Im, Gi-Heung;Choe, Gwang-Don;Jo, Jae-Wan
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2006.12a
    • /
    • pp.285-298
    • /
    • 2006
  • The third party logistics(3PL) is given a definition as logistics activaties providing a comprehensive logistics services, all or partly outsourced by the customer on longer term contract basis, ranging from making logistics strategies to implementing information technology services. The growth of the Third Party Logistics (TPL) business has caused many firms from different industries to enter the field. In this study, it is presented to describe a defintion and development precess of the third party logistics and shown to present strategic issues comparing to third party in foreign and domestic area. and apply some issues of importance when managing the continued TPL business strategy in domestic area.

  • PDF

A Study on way of activation and problem of the Third Party Logistics Providers in domestic country. (우리나라 제3자 물류업의 문제점과 활성화방안에 관한 연구)

  • Yim, Ki-Heung
    • International Commerce and Information Review
    • /
    • v.9 no.1
    • /
    • pp.213-233
    • /
    • 2007
  • The third party logistics(3PL) is given a definition as logistics activities providing a comprehensive logistics services, all or partly outsourced by the customer on long-term contract basis, ranging from making logistics strategies to implement information technology services. The growth of the Third Party Logistics (TPL) business has been caused many firms to penetrate into the field from different industries. In this study, it is presented to describe a definition and development process of the third party logistics and shown to present strategic issues comparing to third party logistics in foreign and domestic area. and apply to some issues of importance when managing the continued TPL business strategy in domestic area.

  • PDF

Comparative Analysis on ICT Supply Chain Security Standards and Framework (ICT 공급망 보안기준 및 프레임워크 비교 분석)

  • Min, Seong-hyun;Son, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1189-1206
    • /
    • 2020
  • Recently, ICT companies do not directly design, develop, produce, operate, maintain, and dispose of products and services, but are outsourced or outsourced companies are increasingly in charge. Attacks arising from this are also increasing due to difficulties in managing vulnerabilities for products and services in the process of consignment and re-consignment. In order to respond to this, standards and systems for security risk management of ICT supply chain are being established and operated overseas, and various case studies are being conducted. In addition, research is being conducted to solve supply chain security problems such as Software Bill of Materials (SBOM). International standardization organizations such as ISO have also established standards and frameworks for security of ICT supply chain. In this paper, we presents ICT supply chain security management items suitable for domestic situation by comparing and analyzing ICT supply chain security standards and systems developed as international standards with major countries such as the United States and EU, and explains the necessity of cyber security framework for establishing ICT supply chain security system.

An Empirical Investigation into the Role of Core-Competency Orientation and IT Outsourcing Process Management Capability (핵심역량 지향성과 프로세스 관리역량이 IT 아웃소싱 성과에 미치는 연구)

  • Kim, Yong-Jin;Nam, Ki-Chan;Song, Jae-Ki;Koo, Chul-Mo
    • Asia pacific journal of information systems
    • /
    • v.17 no.3
    • /
    • pp.131-146
    • /
    • 2007
  • Recently, the role of IT service providers has been enlarged from managing a single function or system to reconstructing entire information management processes in new ways to contribute to shareholder value across the enterprise. This movement toward extensive and complex outsourcing agreements has been driven by the assumption that outsourcing information technology functions is a reliable approach to maximizing resource productivity. Hiring external IT service providers to manage part or all of its information-related services helps a firm focus on its core business and provides better services to its clients, thus obtaining sustainable competitive advantage. This practice of focusing on the strategic aspect of outsourcing is referred to as strategic sourcing where the focus is capability sourcing, not procurement. Given the importance of the strategic outsourcing, however, to our knowledge, there is little empirical research on the relationship between the strategic outsourcing orientation and outsourcing performance. Moreover, there is little research on the factor that makes the strategic outsourcing effective. This study is designed to investigate the relationship between strategic IT outsourcing orientation and IT outsourcing performance and the process through which strategic IT outsourcing orientation influences outsourcing performance, Based on the framework of strategic orientation-performance and core competence based management, this study first identifies core competency orientation as a proper strategic orientation pertinent to IT outsourcing and IT outsourcing process management capability as the mediator to affect IT outsourcing performance. The proposed research model is then tested with a sample of 200 firms. The findings of this study may contribute to the literature in two ways. First, it draws on the strategic orientation - performance framework in developing its research model so that it can provide a new perspective to the well studied phenomena. This perspective allows practitioners and researchers to look at outsourcing from an angle that emphasizes the strategic decision making to outsource its IT functions. Second, by separating the concept of strategic orientation and outsourcing process management capability, this study provides practices with insight into how the strategic orientation can work effectively to achieve an expected result. In addition, the current study provides a basis for future studies that examine the factors affecting IT outsourcing performance with more controllable factors such as IT outsourcing process management capability rather than external hard-to-control factors including trust and relationship management. This study investigates the major factors that determine IT outsourcing success. Based on strategic orientation and core competency theories, we develop the proposed research model to investigate the relationship between core competency orientation and IT outsourcing performance and the mediating role of IT outsourcing process management capability on IT outsourcing performance. The model consists of two independent variables (core-competency-orientation and IT outsourcing process management capability), and two dependent variables (outsourced task complexity and IT outsourcing performance). Comprehensive data collection was conducted through an outsourcing association. The survey data were analyzed using a structural analysis method. IT outsourcing process management capability was found to mediate the effect of core competency orientation on both outsourced task complexity and IT outsourcing performance. Further analysis and findings are discussed.

A Study on Quality Control of Technical Services Outsourcing in Academic Libraries (대학도서관에서의 정리업무 아웃소싱 품질관리에 관한 연구)

  • Lee, You-Jeong
    • Journal of Korean Library and Information Science Society
    • /
    • v.40 no.2
    • /
    • pp.69-86
    • /
    • 2009
  • This study was intended to investigate the quality control in technical services outsourcing in academic libraries. For this purpose, investigated related papers and the experience of outsourced technical services in three academic libraries. Data from senior librarians charged with revision of catalogs are gathered. Issues of catalogs production and quality control are explored and statistics of outsourcing is analysed. Quality control is a major factor of the success of technical services outsourcing operation. The some suggestions in order to enhance quality of vendor-supplied cataloging are presented.

  • PDF

Verification Algorithm for the Duplicate Verification Data with Multiple Verifiers and Multiple Verification Challenges

  • Xu, Guangwei;Lai, Miaolin;Feng, Xiangyang;Huang, Qiubo;Luo, Xin;Li, Li;Li, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.558-579
    • /
    • 2021
  • The cloud storage provides flexible data storage services for data owners to remotely outsource their data, and reduces data storage operations and management costs for data owners. These outsourced data bring data security concerns to the data owner due to malicious deletion or corruption by the cloud service provider. Data integrity verification is an important way to check outsourced data integrity. However, the existing data verification schemes only consider the case that a verifier launches multiple data verification challenges, and neglect the verification overhead of multiple data verification challenges launched by multiple verifiers at a similar time. In this case, the duplicate data in multiple challenges are verified repeatedly so that verification resources are consumed in vain. We propose a duplicate data verification algorithm based on multiple verifiers and multiple challenges to reduce the verification overhead. The algorithm dynamically schedules the multiple verifiers' challenges based on verification time and the frequent itemsets of duplicate verification data in challenge sets by applying FP-Growth algorithm, and computes the batch proofs of frequent itemsets. Then the challenges are split into two parts, i.e., duplicate data and unique data according to the results of data extraction. Finally, the proofs of duplicate data and unique data are computed and combined to generate a complete proof of every original challenge. Theoretical analysis and experiment evaluation show that the algorithm reduces the verification cost and ensures the correctness of the data integrity verification by flexible batch data verification.

kNN Query Processing Algorithm based on the Encrypted Index for Hiding Data Access Patterns (데이터 접근 패턴 은닉을 지원하는 암호화 인덱스 기반 kNN 질의처리 알고리즘)

  • Kim, Hyeong-Il;Kim, Hyeong-Jin;Shin, Youngsung;Chang, Jae-woo
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1437-1457
    • /
    • 2016
  • In outsourced databases, the cloud provides an authorized user with querying services on the outsourced database. However, sensitive data, such as financial or medical records, should be encrypted before being outsourced to the cloud. Meanwhile, k-Nearest Neighbor (kNN) query is the typical query type which is widely used in many fields and the result of the kNN query is closely related to the interest and preference of the user. Therefore, studies on secure kNN query processing algorithms that preserve both the data privacy and the query privacy have been proposed. However, existing algorithms either suffer from high computation cost or leak data access patterns because retrieved index nodes and query results are disclosed. To solve these problems, in this paper we propose a new kNN query processing algorithm on the encrypted database. Our algorithm preserves both data privacy and query privacy. It also hides data access patterns while supporting efficient query processing. To achieve this, we devise an encrypted index search scheme which can perform data filtering without revealing data access patterns. Through the performance analysis, we verify that our proposed algorithm shows better performance than the existing algorithms in terms of query processing times.

A Study on the Impact of Project Performance According to the Implementation type of PMO Function : Focus on Information and Communication Technology Industry (PMO 기능 도입유형에 따른 프로젝트 성과의 영향 연구 : ICT 산업을 중심으로)

  • Lee, Mu-Geon;Kim, Seung-Chul;Boo, Je-Man
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.61-83
    • /
    • 2017
  • It is well known that PMO (Project Management Office)s are effective for successful project performance. Since it takes a long time to develop PMO capability, many public organizations and companies that do not have internal PMOs are increasingly relying on outsourcing of PMO functions in order to introduce mature PMO capabilities in a short period of time. However, it is not verified yet whether outsourced PMO is more effective than internal PMO or not. The objective of this study is to verify the effectiveness of PMO outsourcing. There are many different definitions about PMO function, and even the same PMO function may have different effectiveness depending on the Industry. Thus, this study redefined the PMO functions and Project Performance based on the past studies, and conducted research by focusing on the ICT (Information and Communication Technology) industry. The ICT industry is an important industry economically and has been attracting global attention recently. This study is the first attempt to prove the effectiveness of outsourcing of PMO function in Korea. We found that PMO function outsourcing is effective for certain aspects of project performance, particularly technical support and infrastructure management. Overall, PMO outsourcing is usually more effective than internal PMO for improving project performance. The results of this study are expected to contribute to the development of PMO theories and practices.