• Title/Summary/Keyword: Outsourcing Performance

Search Result 164, Processing Time 0.022 seconds

A Study on the Analysis of Results on 'Contracting Out' of Public Library Services in Korea (우리나라 공공도서관 민간위탁의 성과 분석에 관한 연구)

  • Kwack, Dong-Chul
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.38 no.1
    • /
    • pp.51-75
    • /
    • 2004
  • The purpose of this study is to analyze the performance of contracting out public libraries. in order to contribute to the promotion of their effective operation in Korea. Three public libraries which are currently operated by 'contracting out' are selected to be reviewed for this study. Their performance are analyzed by means of literature search, questionnaires, and on-the-spot-survey. Investigated in detail are the following issues: First, the need for and background of 'contracting out' public library services, and their present state in Korea: Second. the pros and cons of 'contracting out' public library services; Third, the outcomes of public library services which have been currently contracted out. Finally, based on the aforementioned findings, a future model of 'contracting out' public library services is proposed, Also suggested are the strategies for furthering the effective management of public libraries.

An Explorative Study on the Core Competency of Application Service Providers and its Influence on Business Performance (ASP(Application Service Providers)의 핵심 역량과 성과 탐색)

  • An Joon M.;Lee Jin Sun
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.3
    • /
    • pp.81-96
    • /
    • 2005
  • ASP (Application service provider) as a new type of information systems service has been popular recently and has taken a much attention of information systems professionals and researchers. One stream of the research on ASP performed by IS community dealt with utilization and benefits of ASP systems use. The other researchers argue the importance of ASP vendors' capability to provide users with appropriate services. Kern, Lacity and Willcock (2002) summarized the components of core competency of service providers based on their extensive case studies on application service providers. Also, Levina and Ross (2003) developed a value delivery process of application service Providers in their case study This study is developing Prepositions and an empirical model based on the theory of core competency from strategic management study. The dimension of core competency is composed of management competency, technical service competency and customer service competency. Each dimension is made up of competency items derived from previous studies and adapted by professionals in ASP industry. The validity of the dimensions and items in each dimension has been checked with factor analytic method for empirical test. The core competency dimensions are correlated with performance factors of application service providers including growth of revenue, asset and customer base.

  • PDF

Wage Gap and Determinants of Large and Small Enterprises (대기업과 중소기업 임금격차 및 결정요인)

  • Moo, Young-man
    • Journal of Labour Economics
    • /
    • v.42 no.1
    • /
    • pp.43-72
    • /
    • 2019
  • As a result of decomposing the wage gap between large enterprises and SMEs using Oaxaca's wage gap decomposition method, the total wage gap of supply side factors was 44.2%, and the service years and educational background were the biggest influences. and As a result of decomposing the wage gap by firm size based on demand side factors such as business performance, total wage gap was 44.9%, and the influence on wage gap was in the order of labor productivity, union and outsourcing ratio. The results of this analysis suggest that it is necessary to consider the demand side factors such as business performance and capital structure of supply side companies such as differences in human capital in order to solve wage gap by firm size.

  • PDF

An Analysis of the Effects of Knowledge Complementarities on the Performance of Information System Audit : A Perspective of the Resident Audit in the Project Office (지식상호보완성이 정보시스템 감리 성과에 미치는 영향 : 상주감리 관점에서)

  • Jang, Ji Yeon;Kim, Choong Nyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.1
    • /
    • pp.113-129
    • /
    • 2016
  • Recently, as Information System projects tend to be more complex, the importance of Information System Audit increases. In the same context, the need for the resident IS Audit also increases, which is supposed to deal with the possible risks and urgent issues by providing the appropriate support and timely coordination during IS project. Basically, for the effective IS Audit, the IS audit team members should be able to understand such a business context as work characteristics, business knowledge, goals, and culture of the organization. The audit team members should also be able to share the various knowledge of Information Technology and audit procedure with the owner of the project. Especially, for the resident audit, it is more important to fill the gaps in expertise between project owner and audit team. However, any studies on the need of common knowledge base (knowledge complementarities) in the IS audit have not been done so far. The purpose of this study is to analyze whether the knowledge complementarity based on inter-organizational communication between the project owner and audit team members makes an effect on the fidelity and performance of IS audit. In order to do this, the relationship among inter-organizational communication and knowledge complementarity, the fidelity of IS audit service, and performance of IS audit has been analyzed, using Structural Equation Model. The result shows that all the relationship is significant, which means that knowledge complementarity between the two different interest groups should be an effective factor on the fidelity and performance of IS audit. This result implies that, for better quality of IS Audit service, how to acquire the knowledge complementarity between the project owner and Audit team should be considered seriously as well as systematically in the process of IS Audit.

Logistic Performance Impact on FDI Inflow in Developing Countries (물류성과가 개발도상국가의 외국인직접투자에 미치는 영향 분석)

  • Jun, Sung-Hee
    • Korea Trade Review
    • /
    • v.43 no.2
    • /
    • pp.23-45
    • /
    • 2018
  • Logistic costs refer to trade costs, but it could influence FDI as well as global trade. Multinational corporations choose the geographic organization to produce their products. Therefore, it involves many countries to produce one product. International trade between countries more frequently involves the trade of raw materials, components, and unfinished goods. This implies that countries with better logistic performance are attractive for investment because of low transaction costs. Using the logistic performance index provided from the World Bank, this paper investigates the impacts of logistic performance on FDI inflow to developing countries. Results show that infrastructure and timeliness have a positive effects on FDI inflow to low income countries. In the case of middle income countries, timeliness has a negative effect on FDI inflow. This discrepancy between the low- and middle- income countries comes from the different motivation. FDI for low income countries primarily attempts to minimize labor costs. However, FDI for middle-income countries seems to be motivated to reduce labor costs and expand sales markets. FDI inflow in low-income countries serves as part of the offshoring or global outsourcing of multinational corporation.

  • PDF

The effect of auction frequency and transaction volume on auction performance in internet auction (인터넷 경매에서 경매빈도와 거래규모가 경매 성과에 미치는 영향)

  • Park, Jong-Han;Kim, Hyun-Woo
    • Journal of Internet Computing and Services
    • /
    • v.12 no.5
    • /
    • pp.159-170
    • /
    • 2011
  • In procurement auctions, auction frequency and transaction volume per auction have been analyzed as important factors in determining auction performance. However, there is no empirical study on the effect of auction frequency and transaction volume in procurement auction. Current studies mainly focus on bidder behavior analysis and new system design in procurement auction. In the study, we analyze the effect of two factors on relative winning price empirically by using real auction data from MRO procurement outsourcing company in Korea. From the results, we find the winning price is lower when the frequency of auction with same item category is lower. The low frequency of auctions means participating bidders have limited information of previous auctions and they bid their best price to win the current auction due to less opportunity of reopening the auction in near future. The larger purchase amounts of MRO items didn’t results in lower winning price, contrary to our hypothesis. The possible reason is that the price of MRO items already reflects the economy of scales and the increased volume per auction do not cause the further discount of MRO items from the auction.

Suggestions on the Campus FM Services by Establishing Framework in the form of Performance Indicator(Pi) Based on FM_KS (KS 시설관리 표준규격을 바탕으로 한 대학시설 FM 서비스 발전방향)

  • Shin, Eun-Young;Kim, Yu-Jin;Kim, Jun-Ha
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.22 no.1
    • /
    • pp.37-45
    • /
    • 2015
  • Over the years, great attention has been shown to the function of the campus facilities that should be well-equipped, operated and maintained to better support university's two main goals: providing education and supporting research. Properly managing campus facilities is the initial step to be prepared to meet the rapidly changing global educational standard. However, so far, no definitive answer has been given to the question of what service level/scope is appropriate for the effective campus facility management (FM) in Korea. Therefore, at the outset, it is imperative to establish the framework for the standardized campus FM services. The main focus of this research is to provide comprehensive understanding on the campus FM by establishing the framework in the form of FM performance indicator (PI). As the first step, FM standards set by Korean Agency for Technology and Standards (KATS) has been thoroughly reviewed and analyzed to establish the framework for FM standards applicable to campus facility management. Secondly, extensive literature review on the development of performance indicator (PI) for the educational facilities has been conducted to classify PI types and complement FM_KS. Finally, specific guideline and PIs developed by APPA which is globally well-known association in the field of FM for higher education facilities has been added to the combined PI which is the mixed form of FM_KS and PIs from the previous literature. This research provides campus facility managers and FM outsourcing service providers with framework in the form of PI to support future directions of effective campus FM services.

A Study on Influence of Corporate Factor and ITO Range Factor on Outsourcing Performance -Moderating Effect of Supplier Suitability

  • YI, Seon-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.111-117
    • /
    • 2017
  • This study analyzes the relative importance of the introducing factors for the critical success factors in the implementation stage of the lifecycle of ERP system using Delphi technique and Analytic Hierarchy Process(AHP). In the 1st layer of the hierarchy, technical factor is evaluated as the most important factor among organizational, technical, and supplier factors. In the 2nd layer, choosing a proper ERP package is evaluated as the most important factor within 15 factors followed by process-oriented approach, technical suitability, minimized customization, integration and association of system with trading parter, association with legacy systems, and support and involvement of top management. As a result of this analysis enterprise should choose an ERP package that is suitable to its business environment, and make the best use of(take full advantage of) best practice that ERP package provides to optimize the existing business procedure or process(to approach the existing business procedure or process). This study also shows the range of customization of the features provided by the ERP package should be minimized.

IT거버넌스와 IT서비스 관리 프로세스 성숙도가 IT아웃소싱 성과에 미치는 영향에 대한 연구

  • An, Jun-Mo;Kim, Gyeong-Mi
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.129-135
    • /
    • 2007
  • IT에 대한 의존도와 그에 따른 투자 비용이 증가함에 따라 IT거버넌스에 대한 관심이 높아지고 있는 추세이다. 또한 IT아웃소싱 시장의 확대, 계약 규모의 증가로 인해 IT 아웃소싱의 효과적인 운영에 대한 관심도 또한 높아지게 되면서 IT 서비스 제공을 위한 표준 등 프로세스를 기반으로 한 IT 서비스 관리가 주요 이슈로 떠올랐다. 본 연구는 국내 SI업체 V공급사와 그의 4개의 고객사를 대상으로 고객사와 공급사의 IT거버넌스 및 IT 서비스 관리에 대한 인식에 따른 IT아웃소싱 성공을 평가하였다. 자료의 수집은 IT거버넌스와 IT서비스 관리 프로세스 부문에 대해서는 관련 전문가(key informant)들을 대상으로 인터뷰와 설문을 통해 이루어졌고, IT아웃소싱 성공 평가는 고객사의 사용자(end user)를 대상으로 설문하여 약 200개의 데이터를 확보하였다. 그 결과 IT거버넌스와 IT 서비스 관리 성숙도가 IT아웃소싱 성과에 영향을 끼치는 것으로 나타났으며, IT 아웃소싱 성과를 평가하는 차원들끼리도 전체 만족도에 대해 영향을 미치는 것으로 조사되었다. 본 연구는 IT거버넌스와 IT서비스 관리 프로세스 성숙도가 IT아웃소싱 성과에 미치는 영향을 제시함으로써 IT거버넌스의 중요성을 인식시키고 IT서비스 관리 프로세스 시스템 도입을 고려하는 기업에 지침을 제공하고자 한다.

  • PDF

How to retrieve the encrypted data on the blockchain

  • Li, Huige;Zhang, Fangguo;Luo, Peiran;Tian, Haibo;He, Jiejie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5560-5579
    • /
    • 2019
  • Searchable symmetric encryption (SSE) scheme can perform search on encrypted data directly without revealing the plain data and keywords. At present, many constructive SSE schemes were proposed. However, they cannot really resist the malicious adversary, because it (i.e., the cloud server) may delete some important data. As a result, it is very likely that the returned search results are incorrect. In order to better guarantee the integrity of outsourcing data, and ensure the correction of returned search results at the same time, in this paper, we combine SSE with blockchain (BC), and propose a SSE-on-BC framework model. We then construct two concrete schemes based on the size of the data, which can better provide privacy protection and integrity verification for data. Lastly, we present their security and performance analyses, which show that they are secure and feasible.