• Title/Summary/Keyword: Vendor Risk

Search Result 25, Processing Time 0.026 seconds

An Empirical Study on the Determinant Factors and Success Factors of Accounting Information Systems Outsourcing (회계정보시스템 아웃소싱의 결정요인과 성공요인에 관한 실증연구)

  • Chung, Jun-Soo;Song, Sin-Geun;Cheon, Myun-Joong
    • Asia pacific journal of information systems
    • /
    • v.11 no.1
    • /
    • pp.91-115
    • /
    • 2001
  • Faced with tougher competition in global, organizations are pressured to improve organizational productivity, including information systems(IS) departments. Especially related to IS, trying to remain competitive and up-to-date in rapidly changing world is becoming a financial burden to many organizations. Through outsourcing, organizations can provide better services and acquire and maintain a competitive advantage. In recent years IS outsourcing related researches have appeared in trade and academic literature. However the research on accounting information systems(AIS) outsourcing is very little or limited. This study attempts to empirically test the relationship between determinant factors and the degree of accounting information systems outsourcing as well as the relationship between success factors and the interactions between the degree of accounting information systems outsourcing and outsourcing success. Based on the previous studies on IS outsourcing and its related theories, determinant factors(transaction characteristic, resource performance, and risk dependence) and success factors(monitor, participation, and vendor capability) were identified and their measures were developed. Empirical results demonstrate that the change in the degree of AIS outsourcing is determined by the specificity of accounting information asset, uncertainty, the effect of internal AIS, AIS cost-effectiveness, and cost increase risks, and that monitor and vendor capability are implementation factors determining the degree of outsourcing success.

  • PDF

Factors Affecting the Project Performance of Software Development Outsourcing (소프트웨어 개발 아웃소싱 프로젝트 성과에 영향을 미치는 요인)

  • Cho, Dong-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.3
    • /
    • pp.1077-1083
    • /
    • 2012
  • SDO(Software Development Outsourcing) projects have been consistently increasing and expanding but also have many failures. In order to improve SDO performance, the factors affecting SDO performance are investigated in this study. SDO has relational risk as well as performance risk in nature, and the factors affecting the SDO performance caused by these mixed risks are drawn from the prior studies. With field survey targeted client IS personnel who experienced SDO, 214 survey questionnaires are collected and analyzed. Research results show that vendor power, client requirements certainty, goal clarity and goal alignment affect the SDO performance. However, vendor knowledge and client knowledge do not have much effect on SDO performance. The results of this study can be effectively utilized to decrease the failures of SDO and increase the possibility of success.

An Empirical Analysis on the Compromised Delivery Model of Traditional Market Using Delivery Application (배달앱을 활용한 전통시장 배송 모형에 관한 실증분석)

  • YOO, Chang-Kwon;KIM, Gi-Pyoung
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.10
    • /
    • pp.45-51
    • /
    • 2019
  • Purpose - The purpose of this study was to propose a win-win development plan for not only suppliers of delivery applications but also traditional market vendor companies and delivery riders by analyzing existing delivery models and presenting a new delivery model to enhance competitiveness of the traditional market using delivery apps. Research desgin, data, and methodology - Specifically, small retailers, such as traditional markets and supermarkets, presented a compromised delivery model that utilizes the platform of specialized delivery app service providers for order reception, and that the delivery is delivered by delivery systems jointly hired by Vendor companies, such as franchising companies. To validate the significance of the trade-off delivery model, a cost-benefit analysis was conducted by those involved in the delivery application. Results - From the perspective of suppliers of specialized delivery applications, it is analyzed that the use of specialized delivery applications in traditional markets will be a new market opportunity for service providers to achieve increased sales. It is expected that consumer choice and satisfaction will be increased as convenience and accessibility of traditional market businesses that were available only through direct visit from the user side of the delivery application will be expanded. From the standpoint of delivery application franchises, it is analyzed that they can seek to increase sales and increase customer service as well as ease labor cost burden due to joint employment of delivery riders. The delivery rider will be able to seek to improve customer service due to job security, wage stability, risk reduction and overheated competition due to direct employment. Conclusion - In conclusion, the compromised delivery model solved the problems raised in the preceding study conducted on delivery application suppliers, users, franchises, and riders to establish that it could be a strategic alternative to increasing sales and expanding detailed rights for the self-employed in the traditional market, which are experiencing difficulties in management. However, the adoption of a compromise delivery model requires social consensus from those involved in the delivery application and requires legal, institutional and policy support, which will require continued follow-up research on the delivery model in the future.

A Study on the Web Service based ASP e-Business Model for QR(Quick Response) System in Textiles and Clothing Industry (섬유$\cdot$의류산업에서의 QR(Quick Response) 시스템 구현을 위한 웹서비스 기반 ASP e-비즈니스 모델 개발에 대한 연구)

  • Shin, Sang-Moo
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.1
    • /
    • pp.127-144
    • /
    • 2006
  • This paper presents Web service based ASP (WS-ASP) model for QR(Quick Response) system, supply chain management system in the textiles and clothing industry. The Korean textiles and clothing industry is mostly composed of medium and small-sized companies, which are not capable of recruiting If specialists and making a large scale investment in IT. ASP model not only let them obtain QR system at relatively low usage cost, but also take higher vendor risk due to high dependency. This paper argue that WS-ASP model is appropriate for QR systems by complimenting ASP model with lower vender risk, which results from re-integrating software-on-demand services distributed to several QR specialized WS-ASP vendors.

  • PDF

Factors for the Intra-organizational Diffusion of Big Data Systems (조직 내 빅데이터 시스템 확산에 영향을 주는 요인에 대한 연구)

  • Park, Seungkwan;Kim, Cheong
    • Journal of Information Technology Services
    • /
    • v.18 no.2
    • /
    • pp.97-121
    • /
    • 2019
  • In this paper, factors affecting intra-organizational diffusion of Big Data systems from the perspective of the Big Data system vendors have been analyzed. In particular, the theory of resistance against innovation that exists in some form before the adoption or rejection of innovation has been focused on. In order to do that, the resistance has been divided into three categories : postponement, rejection and opposition. The variables affecting each type are also divided into four independent variables : perceived risk, innovation characteristics, user attributes, and organizational attributes. As a result of the survey, it was confirmed that the influences of each variable are different according to the type of resistance. As the strength of the resistance was increased, the influence of the trialability was increased as well. As the strength of the resistance was decreased, the satisfaction with the existing system became more influential on the resistance. The time risk and the satisfaction with the existing system were found to affect all types of resistance. From the vendor's point of view, strategic implications are presented in terms of marketing or system development for diffusion, depending on the degree of resistance of the adopter.

A Study on Implementation of Automobile Control Software Testing Process Based on TMMi (TMMi 기반 자동차 제어 SW 테스팅 프로세스 구축에 관한 연구)

  • Jang, Jin-Wook
    • Journal of Information Technology Services
    • /
    • v.8 no.3
    • /
    • pp.159-169
    • /
    • 2009
  • The issue of method of software testing process implementation has recently been in the spotlight in korea and some vendor make every effort to improve the software testing process through the evaluation of TMMi. The level of software process is at initial level, nevertheless, so the high quality of software is not guaranteed. This paper apply to the TMMi Level2 Assessment criteria of Automobile control software testing process. The test policy and strategy, test planning, test monitoring and control, test design and execution, test environment goal. The result need to emerge development process connection on the test policy and strategy process, test planning process etc. Also, the study analyzed the infra structure to reach the repeated level via key process area. As the result the process implementation in organization suggests the policy development and the implementation activity. Finally, the practical can refer to this paper in order to implementation the software testing process.

The Effects of Psychological Contract Violation on OS User's Betrayal Behaviors: Window XP Technical Support Ending Case (심리적 계약 위반이 OS이용자의 배신 행동에 미치는 영향: 윈도우 XP 기술적 지원서비스 중단 사례)

  • Lee, Un-Kon
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.325-344
    • /
    • 2014
  • Technical support of Window XP ended in March, 8, 2014, and it makes OS(Operating System) users fall in a state of confusion. Sudden decision making of OS upgrade and replacement is not a simple problem. Firms need to change the long term capacity plan in enterprise IS management, but they are pressed for time and cost to complete it. Individuals can not help selecting the second best plan, because the following OSs of Window XP are below expectations in performances, new PC sales as the opportunities of OS upgrade decrease, and the potential risk of OS technical support ending had not announced to OS users at the point of purchase. Microsoft as the OS vendors had not presented precaution or remedy for this confusion. Rather, Microsoft announced that the technical support of the other following OSs of Wndow XP such as Window 7 would ended in two years. This conflict between OS vendor and OS users could not happen in one time, but could recur in recent future. Although studies on the ways of OS user protection policy would be needed to escape from this conflict, few prior studies had conducted this issue. This study had challenge to cautiously investigate in such OS user's reactions as the confirmation with OS user's expectation in the point of purchase, three types of justice perception on the treatment of OS vendor, psychological contract violation, satisfaction and the other betrayal behavioral intention in the case of Window XP technical support ending. By adopting the justice perception on this research, and by empirically validating the impact on OS user's reactions, I could suggest the direction of establishing OS user protection policy of OS vendor. Based on the expectation-confirmation theory, the theory of justice, literatures about psychological contract violation, and studies about consumer betrayal behaviors in the perspective of Herzberg(1968)'s dual factor theory, I developed the research model and hypothesis. Expectation-confirmation theory explain that consumers had expectation on the performance of product in the point of sale, and they could satisfied with their purchase behaviors, when the expectation could have confirmed in the point of consumption. The theory of justice in social exchange argues that treatee could be willing to accept the treatment by treater when the three types of justice as distributive, procedural, and interactional justice could be established in treatment. Literatures about psychological contract violation in human behaviors explains that contracter in a side could have the implied contract (also called 'psychological contract') which the contracter in the other side would sincerely execute the contract, and that they are willing to do vengeance behaviors when their contract had unfairly been broken. When the psychological contract of consumers had been broken, consumers feel distrust with the vendors and are willing to decrease such beneficial attitude and behavior as satisfaction, loyalty and repurchase intention. At the same time, consumers feel betrayal and are willing to increase such retributive attitude and behavior as negative word-of-mouth, complain to the vendors, complain to the third parties for consumer protection. We conducted a scenario survey in order to validate our research model at March, 2013, when is the point of news released firstly and when is the point of one year before the acture Window XP technical support ending. We collected the valid data from 238 voluntary participants who are the OS users but had not yet exposed the news of Window OSs technical support ending schedule. The subject had been allocated into two groups and one of two groups had been exposed this news. The data had been analyzed by the MANOVA and PLS. MANOVA results indicate that the OSs technical support ending could significantly decrease all three types of justice perception. PLS results indicated that it could significantly increase psychological contract violation and that this increased psychological contract violation could significantly reduce the trust and increase the perceived betrayal. Then, it could significantly reduce satisfaction, loyalty, and repurchase intention, and it also could significantly increase negative word-of-month intention, complain to the vendor intention, and complain to the third party intention. All hypothesis had been significantly approved. Consequently, OS users feel that the OSs technical support ending is not natural value added service ending, but the violation of the core OS purchase contract, that it could be the posteriori prohibition of OS user's OS usage right, and that it could induce the psychological contract violation of OS users. This study would contributions to introduce the psychological contract violation of the OS users from the OSs technical support ending in IS field, to introduce three types of justice as the antecedents of psychological contract violation, and to empirically validate the impact of psychological contract violation both on the beneficial and retributive behavioral intentions of OS users. For practice, the results of this study could contribute to make more comprehensive OS user protection policy and consumer relationship management practices of OS vendor.

The Effect of Trust on the Usage of Internet Shopping Mall (신뢰형성이 인터넷쇼핑몰의 이용에 미치는 영향)

  • Son Dal-Ho;Cha Yeong-Han
    • The Journal of Information Systems
    • /
    • v.15 no.3
    • /
    • pp.131-157
    • /
    • 2006
  • A lack of trust in the technical and institutional environments surrounding the web can hinder e-commerce adoption, because Internet social cues are minimal and trust is difficult th establish. Web vendors must act purposefully to overcome consumer perceptions of uncertainty and risk by building trust-both in their own web sites and in the broader Internet environments. Trust makes consumers comfortable by sharing personal information making purchases, and acting on web vendor advice-behaviors essential to wide-spread adoption of e-commerce. Understanding the nature and antecedents of trust is, therefore, a major issue for both Internet researchers and practitioners. Prior research on e-commerce trust has used diverse, incomplete, and inconsistent definitions of trust therefore, making it difficult to compare results across studies. This study tried to and the empirical relationships among the trust-related factors on the usage of Internet shooing mall. The model includes five high-level constructs-disposition to trust institution-based trust trusting beliefs, trusting intention and environmental factors. The results showed that the disposition to trust and the environmental factors had a significant effect on the web site trust however, their effect was not consistent Moreover, the model suggested in this study need to be extended including with the more sociological factors and results in this study required to be verified with those extended model.

  • PDF

Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation

  • Nithya, S. Mary V.;Rhymend Uthariaraj, V.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3322-3347
    • /
    • 2021
  • Cloud Storage is the primary component of many businesses on cloud. Majority of the enterprises today are adopting a multicloud strategy to keep away from vendor lock-in and to optimize cost. Auditing schemes are used to ascertain the integrity of cloud data. Of these schemes, only the Provable Data Possession schemes (PDP) are resilient to key-exposure. These PDP schemes are devised using Public Key Infrastructure (PKI-) based cryptography, Identity-based cryptography, etc. PKI-based systems suffer from certificate-related communication/computational complexities. The Identity-based schemes deal with the exposure of only the auditing secret key (audit key). But with the exposure of both the audit key and the secret key used to update the audit key, the auditing process itself becomes a complete failure. So, an Identity-based PDP scheme with Parallel Key-Insulation is proposed for multiple cloud storage. It reduces the risk of exposure of both the audit key and the secret key used to update the audit key. It preserves the data privacy from the Third Party Auditor, secure against malicious Cloud Service Providers and facilitates batch auditing. The resilience to key-exposure is proved using the CDH assumption. Compared to the existing Identity-based multicloud schemes, it is efficient in integrity verification.

Developing an interface strength technique using the laser shock method

  • James A. Smith;Bradley C. Benefiel;Clark L. Scott
    • Nuclear Engineering and Technology
    • /
    • v.55 no.2
    • /
    • pp.432-442
    • /
    • 2023
  • Characterizing the behavior of nuclear reactor plate fuels is vital to the progression of advanced fuel systems. The states of pre- and post-irradiation plates need to be determined effectively and efficiently prior to and following irradiation. Due to the hostile post-irradiation environment, characterization must be completed remotely. Laser-based characterization techniques enable the ability to make robust measurements inside a hot-cell environment. The Laser Shock (LS) technique generates high energy shockwaves that propagate through the plate and mechanically characterizes cladding-cladding interfaces. During an irradiation campaign, two Idaho National Laboratory (INL) fabricated MP-1 plates had a fuel breach in the cladding-cladding interface and trace amounts of fission products were released. The objective of this report is to characterize the cladding-cladding interface strengths in three plates fabricated using different fabrication processes. The goal is to assess the risk in irradiating future developmental and production fuel plates. Prior LS testing has shown weaker and more variability in bond strengths within INL MP-1 reference plates than in commercially produced vendor plates. Three fuel plates fabricated with different fabrication processes will be used to bound the bond strength threshold for plate irradiation insertion and assess the confidence of this threshold value.