• Title/Summary/Keyword: data outsourcing

Search Result 203, Processing Time 0.023 seconds

A Study on the Role of Third Party in Import and Export Management

  • Jin-Hwan KIM
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.11 no.2
    • /
    • pp.39-57
    • /
    • 2023
  • Purpose - This paper is to examine the work of a third party in the process of import and export management. In other words, the purpose of this paper is investigate the status and functional role of a third party in relation to each terms of the trade contract. Research design, data, methodology - This study consists of 5 chapters through literature survey. It will examine the involvement of the third party through each terms. Chapter 1 introduction, Chapter 2 deals with trade contracts, Chapter 3 investigates the shipping terms, payment terms, and insurance terms, and Chapter 4 reviews with commercial arbitration. And in Chapter 5, it looks at the conclusion and implications. Results - The relevant party in the import and export management process may be a third party through outsourcing, not the principal. At this time, in fulfilling each condition of trade, it can be seen that the implementation of tasks through the participation of a third party with high expertise can more smoothly and productively implement the overall import and export management. Therefore, it can be seen that the implementation of the trade business in which the third party participated can be interpreted in terms of derivative effects and at the same time can be a way to improve the principal's competitiveness procedurally. Conclusions -Through this study, in the import and export management, the performance of the work through the agent makes the entire process more smooth and efficient. Outsourcing of roles using the expertise of a third party, a subcontractor rather than a principal, is desirable and important.

The Rated Self: Credit Rating and the Outsoursing of Human Judgment (평가된 자아: 신용평가와 도덕적, 경제적 가치 평가의 외주화)

  • Yi, Doogab
    • Journal of Science and Technology Studies
    • /
    • v.19 no.1
    • /
    • pp.91-135
    • /
    • 2019
  • As we live a life increasingly mediated by computers, we often outsource our critical judgments to artificial intelligence(AI)-based algorithms. Most of us have become quite dependent upon algorithms: computers are now recommending what we see, what we buy, and who we befriend with. What happens to our lives and identities when we use statistical models, algorithms, AI, to make a decision for us? This paper is a preliminary attempt to chronicle a historical trajectory of judging people's economic and moral worth, namely the history of credit-rating within the context of the history of capitalism. More importantly this paper will critically review the history of credit-rating from its earlier conception to the age of big data and algorithmic evaluation, in order to ask questions about what the political implications of outsourcing our judgments to computer models and artificial intelligence would be. Some of the questions I would like to ask in this paper are: by whom and for what purposes is the computer and artificial intelligence encroached into the area of judging people's economic and moral worth? In what ways does the evolution of capitalism constitute a new mode of judging people's financial and personal identity, namely the rated self? What happens in our self-conception and identity when we are increasingly classified, evaluated, and judged by computer models and artificial intelligence? This paper ends with a brief discussion on the political implications of the outsourcing of human judgment to artificial intelligence, and some of the analytic frameworks for further political actions.

A Study on The Evaluation of DBMS Outsourcing (DBMS 아웃소싱 평가에 관한 연구모형)

  • Jung Hee-Jin
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.67-88
    • /
    • 2000
  • The purpose of this study is to present models for evaluation and selection of DataBase Management Systems(DBMS) suppliers. The major concern of management is that most decision problems have multiple, usually conflicting, criteria. The fuzzified multiple-objective programming models are given to accomodate the aspiration level and satisfaction level of decision makers. The proposed models are classified into two types, that is, pre-emptive priority and interpolated non-membership function model. Numerical examples illustrating each type of model are presented and the implications of these models are discussed.

  • PDF

Partnership : A Critical Factor of Outsourcing (파트너쉽: 아웃소싱의 핵심 요인)

  • 정승렬;신영철
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.297-308
    • /
    • 2000
  • 오늘날 아웃소싱의 사상과 전략은 여러 형태의 새로운 정보전략 및 비즈니스 전략을 창출해 내고 있으며 그 적용 영역에 있어서도 특정 정보시스템 분야에서 일반 경영 측면으로까지 확장되어 가는 추세이다. 본 논문은 이와 같은 다양한 범위의 아웃소싱 스펙트럼 모두에 적용되는 성공 요인으로 파트너쉽을 도출하고 이것과 아웃소싱 성공과의 관계를 살펴본다. 특히 파트너쉽의 다섯가지 속성인 신뢰도, 협력도, 의사소통, 계약조건의 명확도, 갈등정도 등이 아웃소싱 성공의 여러 차원인 전략적 이익, 경제적 이익, 업무 만족도 등에 어떻게 영향을 미치는 지를 살펴보았다.

  • PDF

Comparison of Occupational Danger and Physical Health Problems of Workers according to the Form of Employment (고용형태에 따른 근로자의 위험 및 건강에 대한 비교)

  • Oh, Changseok;Jeon, Hui Won
    • The Korean Journal of Health Service Management
    • /
    • v.14 no.1
    • /
    • pp.111-122
    • /
    • 2020
  • Objectives: The study aims to compare indirect form of employment with direct form of employment on the variables of occupational danger and physical health. Methods: I studied based on the data of 5th Korean Working Conditions Survey (KWCS) which was performed by Occupational Safety & Health Research Institute of Korea Occupational Safety and Health Agency in 2017. SAS 9.4 was used for statistical analysis of the final data. Results: Based on the verification result, the hazard is higher for direct employment than for dispatch or subcontract in case of exposure to risks in the health and social welfare industry. Based on cross tabulation, significant differences were found in the proportions of harmful and safe tasks in direct employment and those in outsourcing in the physical health industry. It was found that the risk of hazard is 2.18 times higher in outsourcing jobs than in direct employment. Conclusions: It is necessary to consider a dispatch and subcontract partner as a strategic partner and not simply hand over dangerous or hard tasks to them. Active and aggressive cooperation along with support from the employer enterprise built in the contract is necessary for the safety and health of dispatch or subcontract laborers.

An Empirical Study on Pricing Model for Software Operation (소프트웨어 운영 대가산정 방식에 대한 실증적 연구)

  • Kim, Heungshik;Kim, Choong Nyoung;Seo, Yongwon
    • Journal of Information Technology Services
    • /
    • v.18 no.4
    • /
    • pp.67-82
    • /
    • 2019
  • The purpose of this study is to improve the calculation method of the software operation pricing proposed by the software business price calculation guide from 'input manpower method' to 'rate calculation method'. The software operation pricing of the input manpower method is not objectively calculated in the domestic IT outsourcing situation where the statistical data based on the activity based estimating is insufficient and it is decided by agreement between the owner and the client. In addition, there was no standard for adjusting the productivity according to the characteristics of the operation service. In order to improve this, an operational correction factor item that can affect the software operation productivity was selected based on foreign and domestic standards, and it was confirmed through the first questionnaire to IT operation managers. In order to determine the level of difficulty of the fixed operational correction factors, the operational correction factor using AHP technique was confirmed through a second questionnaire for pairwise comparison. The operational difficulty calculation table was developed with reference to COCOMO and ITIL standards. Finally, we propose a new pricing scheme that reflects the operating rate. Regression analysis was carried out by collecting the data of the domestic public institutions on the estimated cost and the actual cost calculated from the new rate method software operation pricing. The results of the regression analysis show that the estimated cost and the actual cost are related to each other. Mean magnitude of relative error(MMRE) and PRED[25] analysis were added for accuracy analysis. MMRE and PRED also showed satisfactory results, confirming the possibility of replacing the rate method software operation pricing.

An Practical Study on the Effect of ERP System Introduction Type on the Enterprise's IT·SW Utilization (ERP 시스템 도입유형이 기업의 IT·SW 활용에 미치는 영향에 관한 실증연구)

  • Yang, Heejung;Sung, Wookjoon
    • Journal of Information Technology Services
    • /
    • v.20 no.2
    • /
    • pp.57-76
    • /
    • 2021
  • Today's ERP system has become a core system of IT·SW that not only supports and manages enterprise resources efficiently, but also encompasses major business tasks. In other words, the ERP system is an essential strategic element for the survival of a company as a powerful means to innovate the management of an organization. This study analyzed the impact on the utilization of IT·SW from the perspective of the entire organization's process without limiting the performance evaluation of the ERP system itself, which is a core system of a company. The measurement data for evaluating the performance of the ERP system was the 2018 domestic company IT·SW utilization survey result report (subject to survey : 3,017 domestic companies with 10 or more employees). Based on this data, this study analyzed the impact of the ERP system on the entire enterprise's IT·SW utilization. In particular, attention was paid to whether there would be a difference in the use of IT·SW if the type of ERP system introduction was changed through the improvement of the business process of the company. Multiple regression analysis was performed using the statistical package SPSS 25. As a result, among the ERP system introduction types, the greatest degree of (+)influence on the company's IT·SW utilization is when the ERP package SW or ASP service is used as it is. Although the difference is insignificant, the second case was to build an ERP system through self-development or outsourcing, followed by customizing the package SW or system through self-development or outsourcing. Through the results of this study, it is expected that the organization will improve the business process and use the standard ERP package SW as it is without modification, thereby effectively enhancing the use of IT·SW of the company and leading to management performance.

A CAD Model Healing System with Rule-based Expert System (전문가시스템을 이용한 CAD 모델 수정 시스템)

  • Han Soon-Hung;Cheon Sang-Uk;Yang Jeong-Sam
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.30 no.3 s.246
    • /
    • pp.219-230
    • /
    • 2006
  • Digital CAD models are one of the most important assets the manufacturer holds. The trend toward concurrent engineering and outsourcing in the distributed development and manufacturing environment has elevated the importance of high quality CAD model and its efficient exchange. But designers have spent a great deal of their time repairing CAD model errors. Most of those poor quality models may be due to designer errors caused by poor or incorrect CAD data generation practices. In this paper, we propose a rule-based approach for healing CAD model errors. The proposed approach focuses on the design history data representation from a commercial CAD model, and the procedural method for building knowledge base to heal CAD model. Through the use of rule-based approach, a CAD model healing system can be implemented, and experiments are carried out on automobile part models.

Content-search in Distributed Environment Using Standard Product Model (STEP) (분산환경에서 표준제품모델(STEP)을 이용한 내용검색)

  • 손정모;유상봉;김영호;이수홍
    • Korean Journal of Computational Design and Engineering
    • /
    • v.4 no.4
    • /
    • pp.285-294
    • /
    • 1999
  • This paper presents a content-search system built on distributed environments using the open product model of STEP, The content-search system searches design data for given product descriptions such as part name and features. Distribute object interfaces has been defined by IDL and distributed product data are searched through CORBA protocols. Web interfaces are also provided for interactive user interfaces. Given a user request, a mediator interacts with distributed search servers and sends collected results back to the user. The mediator has such metadata as location, program name, and other information about product data stored on distributed system. The search servers use SDAI interfaces to search STEP files or databases. The content-search system promotes the reuse of previous design within a company and the outsourcing of part designs.

  • PDF

A Study on Data Sharing Scheme using ECP-ABSC that Provides Data User Traceability in the Cloud

  • Hwang, Yong-Woon;Kim, Taehoon;Seo, Daehee;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4042-4061
    • /
    • 2022
  • Recently, various security threats such as data leakage and data forgery have been possible in the communication and storage of data shared in the cloud environment. This paper conducted a study on the CP-ABSC scheme to solve these security threats. In the existing CP-ABSC scheme, if the data is obtained by the unsigncryption of the data user incorrectly, the identity of the data owner who uploaded the ciphertext cannot be known. Also, when verifying the leaked secret key, the identity information of the data user who leaked the secret key cannot be known. In terms of efficiency, the number of attributes can affect the ciphertext. In addition, a large amount of computation is required for the user to unsigncrypt the ciphertext. In this paper, we propose ECP-ABSC that provides data user traceability, and use it in a cloud environment to provide an efficient and secure data sharing scheme. The proposed ECP-ABSC scheme can trace and verify the identity of the data owner who uploaded the ciphertext incorrectly and the data user who leaked the secret key for the first time. In addition, the ciphertext of a constant size is output and the efficiency of the user's unsigncryption computation were improved.