• Title/Summary/Keyword: The Second Party

Search Result 260, Processing Time 0.024 seconds

Value of Information Technology Outsourcing: An Empirical Analysis of Korean Industries (IT 아웃소싱의 가치에 관한 연구: 한국 산업에 대한 실증분석)

  • Han, Kun-Soo;Lee, Kang-Bae
    • Asia pacific journal of information systems
    • /
    • v.20 no.3
    • /
    • pp.115-137
    • /
    • 2010
  • Information technology (IT) outsourcing, the use of a third-party vendor to provide IT services, started in the late 1980s and early 1990s in Korea, and has increased rapidly since 2000. Recently, firms have increased their efforts to capture greater value from IT outsourcing. To date, there have been a large number of studies on IT outsourcing. Most prior studies on IT outsourcing have focused on outsourcing practices and decisions, and little attention has been paid to objectively measuring the value of IT outsourcing. In addition, studies that examined the performance of IT outsourcing have mainly relied on anecdotal evidence or practitioners' perceptions. Our study examines the contribution of IT outsourcing to economic growth in Korean industries over the 1990 to 2007 period, using a production function framework and a panel data set for 54 industries constructed from input-output tables, fixed-capital formation tables, and employment tables. Based on the framework and estimation procedures that Han, Kauffman and Nault (2010) used to examine the economic impact of IT outsourcing in U.S. industries, we evaluate the impact of IT outsourcing on output and productivity in Korean industries. Because IT outsourcing started to grow at a significantly more rapid pace in 2000, we compare the impact of IT outsourcing in pre- and post-2000 periods. Our industry-level panel data cover a large proportion of Korean economy-54 out of 58 Korean industries. This allows us greater opportunity to assess the impacts of IT outsourcing on objective performance measures, such as output and productivity. Using IT outsourcing and IT capital as our primary independent variables, we employ an extended Cobb-Douglas production function in which both variables are treated as factor inputs. We also derive and estimate a labor productivity equation to assess the impact of our IT variables on labor productivity. We use data from seven years (1990, 1993, 2000, 2003, 2005, 2006, and 2007) for which both input-output tables and fixed-capital formation tables are available. Combining the input-output tables and fixed-capital formation tables resulted in 54 industries. IT outsourcing is measured as the value of computer-related services purchased by each industry in a given year. All the variables have been converted to 2000 Korean Won using GDP deflators. To calculate labor hours, we use the average work hours for each sector provided by the OECD. To effectively control for heteroskedasticity and autocorrelation present in our dataset, we use the feasible generalized least squares (FGLS) procedures. Because the AR1 process may be industry-specific (i.e., panel-specific), we consider both common AR1 and panel-specific AR1 (PSAR1) processes in our estimations. We also include year dummies to control for year-specific effects common across industries, and sector dummies (as defined in the GDP deflator) to control for time-invariant sector-specific effects. Based on the full sample of 378 observations, we find that a 1% increase in IT outsourcing is associated with a 0.012~0.014% increase in gross output and a 1% increase in IT capital is associated with a 0.024~0.027% increase in gross output. To compare the contribution of IT outsourcing relative to that of IT capital, we examined gross marginal product (GMP). The average GMP of IT outsourcing was 6.423, which is substantially greater than that of IT capital at 2.093. This indicates that on average if an industry invests KRW 1 millon, it can increase its output by KRW 6.4 million. In terms of the contribution to labor productivity, we find that a 1% increase in IT outsourcing is associated with a 0.009~0.01% increase in labor productivity while a 1% increase in IT capital is associated with a 0.024~0.025% increase in labor productivity. Overall, our results indicate that IT outsourcing has made positive and economically meaningful contributions to output and productivity in Korean industries over the 1990 to 2007 period. The average GMP of IT outsourcing we report about Korean industries is 1.44 times greater than that in U.S. industries reported in Han et al. (2010). Further, we find that the contribution of IT outsourcing has been significantly greater in the 2000~2007 period during which the growth of IT outsourcing accelerated. Our study provides implication for policymakers and managers. First, our results suggest that Korean industries can capture further benefits by increasing investments in IT outsourcing. Second, our analyses and results provide a basis for managers to assess the impact of investments in IT outsourcing and IT capital in an objective and quantitative manner. Building on our study, future research should examine the impact of IT outsourcing at a more detailed industry level and the firm level.

Research on an aristocratic officer's travels in the mid Chosun Korea by analysing Yu Hee-chun's diary (일기(日記)를 이용한 조선중기 양반관료의 여행 연구)

  • Jung, Chi-Young
    • Journal of Korean Historical Folklife
    • /
    • no.26
    • /
    • pp.71-106
    • /
    • 2008
  • The objective of this research is to reconstruct an aristocratic officer's travels by analysing Yu, hee-chun's diary, Miamilgi. Yu had kept his diary for eighty three months, from October 1567 to May 1577, and there were twenty six times of travel logs which are analysed in this research. As a result of the analysis, his travels can be divided into official travels and private travels. Sixteen times of official travels were comprised of inspection tours for parishes as a superintendent of Jeonra province, trips to supervise maintenance works of royal tombs and to worship the tombs, to carry out the sanjae (rituals in the mountains) as a second minister of the ministry of rites. It was difficult for him to have private travels as he continually served as a royal officer. He had got only 10 times of private travels during the eighty three months for maintaining the ancestor's tomb and worshiping the ancestors, for recuperating himself and his wife, and for constructing his new house. All of these travels were long-distance ones. In terms of his travel routes, he frequently used royal main trunks, e.g. 'Haenamro' (from Seoul to Damyang), which were maintained by the royal government. The main reason of his frequent using of trunk lines was that convenience facilities such as the royal post stations (Yeok) and royal inns (Won) were equipped well in these roads so it was easy to get horse change services and lodging and boarding. The fact that main trunks were chiefly straight lines and the shortest way was rather secondary reason. On the other hand, when he was a superintendent of Junra province, he had four times of round inspection on all parishes of Junra province, following the tour routs covering all over the province. As he was incumbent royal officer, he started his travel by getting a permission from the king. Simultaneously, he made ready some travel items. Among the items, horse was most important one for the journey. After finishing all the preparing processes before the departure, he had special farewell ceremony for the King, Sookbae, and had a small party with his friends called Jeonbeul. Main transportation means for his travel was horse, and many kinds of horses such as royal government's horse, Yeokma, local government's horse, Swema, as well as his private one were used. Additionally, he used a palanquin while he was doing inspection trip as a superintendent of Junra province. Yu was incumbent officer so he mostly lodged in local government guest houses. If he could not find out any local guest house, he was lodged in royal inn, and in his relatives houses or irregularly in buddhist temples. Most meals were supplied by local royal governments. The activities in his journeys were varied on his travel objectives. In his private journey, it was the main activities that maintaining ancestor's tombs and having a memorial service. During the trip, he visited his relatives. His official trips, on the other hand, had a regularity. Main activities were dealing with public works, and visiting Hyanggyo (country public school). However in the midway, he visited his relatives and had a journey to scenic places.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.

Vietnam in 2017: The Situations and Prospects of Economics, Politics, and International Relations (베트남 2017: 경제, 정치, 대외관계의 현황과 전망)

  • CHAE, Su Hong;LEE, Han Woo
    • The Southeast Asian review
    • /
    • v.28 no.1
    • /
    • pp.21-51
    • /
    • 2018
  • This article takes several approaches in explaining recent developments in Vietnam. First, it draws upon an array of sources that idealize Vietnam's embrace of capitalism and integration into the global market in order to sketch out its economy's progress in 2017. Second, it observes, evaluates, and diagnoses recent changes in the Vietnamese economy in the medium to long term by incorporating conflicting perspectives on Vietnam's performance as a capitalist country. Third, this article traces the power shifts that have risen from internal struggles in the Communist Party over political and social issues. Fourth, it elaborates on the aforementioned impact that foreign relations have had on socio-political developments in Vietnam, as well as the government's response. In so doing, it also attempts to evaluate, however briefly, the significance of the 25th anniversary of South Korea-Vietnam relations. Finally, it examines the public's reaction to the post-reform transitions in light of recent sociocultural changes. 2017 was a memorable year for Vietnam: a continuous march toward capitalism; the resulting expansion of the Vietnamese people's demands; political controversies and government control; the looming instability of United States-China relations and various attempts to address the situation. These events will inevitably replicate themselves in the future as the ostensibly socialist Vietnam adopts a capitalist model. The problem is that it is unclear whether these experiences will continue with the consent of the people of socialist Vietnam or engender resistance. It is difficult to achieve meaningful consent in the status quo of worsening inequalities, widespread corruption, monopoly on power, and sustained use of unskilled low-wage workers. In other words, when concerns such as welfare, public health, and the environment are set aside in favor of economic development and commercialization as they have been, discontent, rather than consent, will prevail. It is thus important to keep a watchful eye on the viability of the nominal economic growth, surface-level political stability, and strategic responses to foreign relations that took place in 2017.

An origin and development, the thought and understanding of actual world of Noron (노론의 연원과 전개, 철학사상과 현실인식)

  • Kim, Moon Joon
    • The Journal of Korean Philosophical History
    • /
    • no.32
    • /
    • pp.79-112
    • /
    • 2011
  • Since Noron(老論) had organized in the period of Sookjong(肅宗), it constantly had led the political situation of Choson until Choson(朝鮮) perished as the grasping political power. Studies and thoughts development of Noron can be devided into four periods. First, the term of politics of faction of the period of Sookjong. Second, a period of Youngjo(英祖) and Joungjo(正祖). Third, a period of politics of power(勢道政治). Fourth, the latter term of 19century. We can look into an origin and development aspect in outline by dividing like this. The general character of Noron can be summarized by the respect of Song Si-yeol(宋時烈, 1607-1689), the theory of a party of a man of virtue(君子黨論) based on the theory of moral civilization of Choson(朝鮮中華論), the succession of Lee i(李珥; 1636-1684)'s neo-confucianism, rejecting all teaching that does not conform to neoconfucianism and protecting right studies, and oppression of Roman Catholic. The noticeable scholars of Noron were Kwon sang Ha(權尙夏; 1641~1721), Kim chang hyup(金昌協; 1651~1708), Lee jea(李縡; 1680~1746) etc. These scholars of Noron following Song Si-yeol had tried to raise "Learning of the Way"(正明道) by respecting Zushi and removing injustice(尊朱子攘夷狄), also believed people should embody moral values in their society and country. and possessed an will guiding to stabilize the country by rejecting uncivilization(尊王攘夷). Above all, they insisted, the King of Choson should rule with 'lighting heavenly reason'(明天理). Also they insisted the King and countrymen should together strive to recover civilization of moral humanity and destroy uncivilzation. But gradually they lost the motive and purpose of moral politics in the seventeenth century. Finally Noron Byeokpa(?派) take over the reins of government. It resulted in the bad effect of politics of autocrat(勢道政治) having their own way to use power of authority after death of Jungjo(正祖). The peculiar character of Noron politics can valued as the extreme aspect of 'according of politics and scholarship'(政學一致).

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

A Study on Space Insurance of Foreign nation's Law (외국의 우주보험 관련법 연구)

  • Cho, Hong-Je
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.1
    • /
    • pp.271-297
    • /
    • 2011
  • Recently, risk of space accident possibility increased in according to commercial space activity and space debris. It failed launch satellite second times in South Korea. Therefore was discussed on liability and insurance issue. Generally, discuss of space insurance be divided two type. Firstly, space insurance relevant to launching satellite and in-orbit. Satellite Launch Insurance and In-Orbit Insurance by the Satellite Operator Secondly, space insurance relevant to Third Party Liability. The former is to protect owner of satellite and operator. The latter is to liable and indemnify owner of satellite and operator's liability. US, UK, France, Russia, South Korea forced to buy space insurance following to domestic law. This is a brief overview of risk allocation and insurance practices in the commercial space transportation industry today. We begin with traditional space transportation, i.e., commercial satellite launches. This is a mature industry with known players. Industry practices have developed and legislation has been adopted in the U.S. and other countries over the past decades to address liability and insurance issues. The primary focus here is on U.S. law, but the discussion of industry practice applies more generally. We then move on to a more exotic form of space transportation: Commercial human space flight. Several private companies are now signing up space tourists for commercial suborbital human space flight, advertised to become available in the near future. The United States amended its launch legislation in 2004 to promote commercial human space flight. But questions remain as to how this new industry will respond to the risk allocation regime established by the U.S. legislation, which leaves both the space flight operator and space tourist exposed to risk and potential liability. As a general proposition, state statutes and contractual waivers alone cannot be relied upon to provide adequate liability protection, and insurance will be required. Federally mandated contractual waivers by space flight participants or liability caps would be helpful to complement insurance solutions. Eventually, as the industry matures, such practices could be extended to an international legal regime. For all the issues mentioned above, I have studied the existing international treaties and several country's domestic law to the space by referring U.S's Commercial Space Launch Amendment Act of 2004 and concluded that uniform legal regime to govern these insurance issues should be established domestically and internationally in the future.

  • PDF

Implementing RPA for Digital to Intelligent(D2I) (디지털에서 인텔리전트(D2I)달성을 위한 RPA의 구현)

  • Dong-Jin Choi
    • Information Systems Review
    • /
    • v.21 no.4
    • /
    • pp.143-156
    • /
    • 2019
  • Types of innovation can be categorized into simplification, information, automation, and intelligence. Intelligence is the highest level of innovation, and RPA can be seen as one of intelligence. Robotic Process Automation(RPA), a software robot with artificial intelligence, is an example of intelligence that is suited for simple, repetitive, large-scale transaction processing tasks. The RPA, which is already in operation in many companies in Korea, shows what needs to be done to naturally focus on the core tasks in a situation where the need for a strong organizational culture is increasing and the emphasis is on voluntary leadership, strong teamwork and execution, and a professional working culture. The introduction was considered naturally according to the need to find. Robotic Process Automation, or RPA, is a technology that replaces human tasks with the goal of quickly and efficiently handling structural tasks. RPA is implemented through software robots that mimic humans using software such as ERP systems or productivity tools. RPA robots are software installed on a computer and are called robots by the principle of operation. RPA is integrated throughout the IT system through the front end, unlike traditional software that communicates with other IT systems through the back end. In practice, this means that software robots use IT systems in the same way as humans, repeat the correct steps, and respond to events on the computer screen instead of communicating with the system's application programming interface(API). Designing software that mimics humans to communicate with other software can be less intuitive, but there are many advantages to this approach. First, you can integrate RPA with virtually any software you use, regardless of your openness to third-party applications. Many enterprise IT systems are proprietary because they do not have many common APIs, and their ability to communicate with other systems is severely limited, but RPA solves this problem. Second, RPA can be implemented in a very short time. Traditional software development methods, such as enterprise software integration, are relatively time consuming, but RPAs can be implemented in a relatively short period of two to four weeks. Third, automated processes through software robots can be easily modified by system users. While traditional approaches require advanced coding techniques to drastically modify how they work, RPA can be instructed by modifying relatively simple logical statements, or by modifying screen captures or graphical process charts of human-run processes. This makes RPA very versatile and flexible. This RPA is a good example of the application of digital to intelligence(D2I).

The Policy of Park Asset Transfers in England: A Move toward Community Ownership and Park Management (커뮤니티의 공원 소유와 관리·운영 방안으로서 영국의 공원 커뮤니티자산이전 정책)

  • Kim, Yeun-Kum
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.43 no.1
    • /
    • pp.108-119
    • /
    • 2015
  • Recently, the ways in which individual communities own and manage parks have been both discussed and realized in America and England. Some benefits of these asset transfers are that local governments can reduce the financial cost of management as well as improve the service of the parks. In addition, communities can develop these parks as unique assets. Ultimately, this is a new understanding of parks as community commons. This study examines the policy of park asset transfers to communities in England. These transfers, which involve reallocating land and building management and/or ownership from the public sector to a community group, are part of a policy agenda known as "Big Society", which aims to create a "small government" within a "big society". The agenda is pursued by both the English Conservative and Unionist Party governments. Eight case studies of community park asset transfers in England were examined in this study, under three categories-transfer process, partnership among stakeholders, and financial structure-and synthesized along three issues-financial contribution, level of public transparency, and closeness of the relationship between park and community. In some cases, new community groups were created specifically to receive park assets, while in other communities, existing groups became the park trustees. For most parks, community groups raise park maintenance funding through diverse methods; however, these groups are often not entirely financially independent from local government. Thus, many park trustees have already created, or are planning to create, other assets from which parks can benefit. Second, some efforts for public transparency include trusts that are registered as charities, of which their public nature is admitted officially. These trusts resolve important decisions through boards of trustees, in an effort to promote income-generating business while not excluding users. Ultimately, a close relationship between park and community empowers the community to participate in managing and maintaining the park; in turn, the park's capacities are improved. Current struggles include the many limits involved in communities accepting ownership and management of a park, and a lack of local government experience regarding public-private management and maintenance of a public asset. This study, however, details interesting policy implications for Korean community involvement as well as diverse financial methods to facilitate park management.

An Exploratory Study on the Business Failure Recovery Factors of Serial Entrepreneurs: Focusing on Small Business (연속 기업가의 사업 실패 회복요인에 관한 탐색적 연구: 소상공인을 중심으로)

  • Lee, Kyung Suk;Park, Joo Yeon;Sung, Chang Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.6
    • /
    • pp.17-29
    • /
    • 2021
  • Recently, as social distancing have been raised due to the re-spread of COVID-19, the number of serial entrepreneurs who are closing their business is rapidly increasing. Learning from failure is a source of success, but business failure can result in psychological and economic losses and negative emotions of the serial entrepreneur. At this point, it is very important to find a way to recover the negative emotions caused by business failures of serial entrepreneurs. Recently, a strategic model has emerged to deal with the negative emotions of grief caused by business failures of serial entrepreneurs. This study identified the recovery factors from the grief of business failures of serial entrepreneurs and analyzed Shepherd's(2003) three areas: loss orientation, restoration orientation, and dual process. To this end, individual in-depth interviews were conducted with 12 small business serial entrepreneurs who challenged re-startup to identify the attributes of recovery factors that were not identified with quantitative data. As a result of the study, first, recovery factors were investigated in three areas: individual orientation, family orientation, and network orientation. It was found to help improve recovery in nine categories: self-esteem, persistence, personal competence, hobbies, self-confidence, family support, networks, religion, and social support. Second, recovery obstacle factors were investigated in three areas: psychological, economic, and environmental factors. Nine categories including family, health, social network, business partner, competitor, partner, fund, external environment, and government policy were found to persist negative emotions. Third, the emotional processing process for grief was investigated in three areas: loss orientation, restoration orientation, and dual process. Ten categories such as family, partner support, social member support, government support, hobbies, networks, change of business field, moving, third-party perspective, and meditation were confirmed to enhance rapid recovery in the emotional processing process for grief. The implications of this study are as follows. The process of recovering from the grief caused by business failures of serial entrepreneurs was attempted by a qualitative study. By extending the theory of Shepherd(2003), This study can be applied to help with recovery research. In addition, conceptual models and propositions for future empirical research were presented, which can be discussed in carious academic ways.