• Title/Summary/Keyword: data outsourcing

Search Result 203, Processing Time 0.026 seconds

A Study on The Effect of Justice of Transaction on Customer Performance in manufacturing Outsourcing. ; The Mediation Effect of Partnership (제조 아웃소싱에서 거래공정성이 고객사의 경영성과에 미치는 영향에 관한 연구 ; 파트너십의 매개효과)

  • Park, Sang-Moon;Kim, Gi-Joong;Hyun, Byung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.228-238
    • /
    • 2019
  • The purpose of this study is to investigate the relationship between transaction justice and customer performance. In this study, data were gathered from questionnaires from customers and suppliers of manufacturing outsourcing service, and reliability, validity, and confirmatory factor analysis (CFA) were conducted and the hypothesis was verified through the structural equation modeling (SEM) analysis. The results of this study are as follows: 1)Transaction justice has a significant positive effect on customer's business performance. Distribution and Interactional justice have a small effect on business performance, but Procedural justice has a significant positive effect. 2)Transaction justice has a positive effect on partnerships. 3)The partnership between the customer and the supplier has a positive effect on the customer's business performance. 4)Partnership has positive effect on customer's management performance through mediating justice. This study is based on the fact that justice acts as a independent variable in the transactional relationship between the customer and the supplier in the manufacturing outsourcing and this is the first case that empirically investigated the effect of the justice on the customer's management performance. In order to effectively cope with a rapidly changing business environment and effectively improve management performance, it is necessary to make efforts to improve justice, especially procedural justice, by utilizing outsourcing effectively in a global competition. In this respect, this study provides important implications for the both academically and practically.

A Spatial Transformation Scheme Supporting Data Privacy and Query Integrity for Outsourced Databases (아웃소싱 데이터베이스에서 데이터 프라이버시 및 질의 무결성을 지원하는 공간 변환 기법)

  • Kim, Hyeong-Il;Song, Young-Ho;Chang, Jaewoo
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.652-663
    • /
    • 2015
  • Due to the popularity of location-based services, the amount of generated spatial data in daily life has been dramatically increasing. Therefore, spatial database outsourcing has become popular for data owners to reduce the spatial database management cost. The most important consideration in database outsourcing is meeting the privacy requirements and guarantying the integrity of the query result. However, most of existing database transformation techniques do not support both of the data privacy and integrity of the query result. To solve this problem, we propose a spatial data transformation scheme that utilizes the shearing transformation with rotation shifting. In addition, we described the attack models to measure the data privacy of database transformation schemes. Finally, we demonstrated through the experimental evaluations that our scheme provides high level of data protection against different kinds of attack models, compared to the existing schemes, while guaranteeing the integrity of the query result sets.

A Case Study on the Application of Security Policy for Outsourcing Personnel in case of Large-Scale Financial IT Projects (금융회사 대형 IT프로젝트 추진 시 외주직원에 대한 보안정책 적용 사례 연구)

  • Son, Byoung-jun;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.193-201
    • /
    • 2017
  • Financial firms strengthen to protect personal information from the leakage, introducing various security solutions such as print output security, internet network Isolation system, isolationg strorage of customer information, encrypting personal information, personal information detecting system, data loss prevention, personal information monitoring system, and so on. Financial companies are also entering the era of cutthroat competition due to accept of the new channels and the paradigm shift of financial instruments. Accordingly, The needs for security for customer information held by financial firms are keep growing. The large security accidents from the three card companies on January 2014 were happened, the case in which one of the outsourcing personnel seized customer personal information from the system of the thress card companies and sold them illegally to a loan publisher and lender. Three years after the large security accidents had been passed, nevertheless the security threat of the IT outsourcing workforce still exists. The governments including the regulatory agency realted to the financail firms are conducting a review efforts to prevent the leakage of personal information as well as strengthening the extent of the sanction. Through the analysis on the application of security policy for outsourcing personnel in case of large-scale Financial IT projects and the case study of appropriate security policies for security compliance, the theis is proposing a solution for both successfully completing large-scale financial IT Project and so far as possible minizing the risk from the security accidents by the outsouring personnel.

Towards efficient sharing of encrypted data in cloud-based mobile social network

  • Sun, Xin;Yao, Yiyang;Xia, Yingjie;Liu, Xuejiao;Chen, Jian;Wang, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1892-1903
    • /
    • 2016
  • Mobile social network is becoming more and more popular with respect to the development and popularity of mobile devices and interpersonal sociality. As the amount of social data increases in a great deal and cloud computing techniques become developed, the architecture of mobile social network is evolved into cloud-based that mobile clients send data to the cloud and make data accessible from clients. The data in the cloud should be stored in a secure fashion to protect user privacy and restrict data sharing defined by users. Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data. However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure. In order to reduce the computing overhead held by the mobile devices, in this paper we propose a new Outsourcing decryption and Match-then-decrypt CP-ABE algorithm (OM-CP-ABE) which firstly outsources the computation-intensive bilinear pairing operations to a proxy, and secondly performs the decryption test on the attributes set matching access policy in ciphertexts. The experimental performance assessments show the security strength and efficiency of the proposed solution in terms of computation, communication, and storage. Also, our construction is proven to be replayable choosen-ciphertext attacks (RCCA) secure based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model.

Efficient Top-K Queries Computation for Encrypted Data in the Cloud (클라우드 환경에서의 암호화 데이터에 대한 효율적인 Top-K 질의 수행 기법)

  • Kim, Jong Wook
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.8
    • /
    • pp.915-924
    • /
    • 2015
  • With growing popularity of cloud computing services, users can more easily manage massive amount of data by outsourcing them to the cloud, or more efficiently analyse large amount of data by leveraging IT infrastructure provided by the cloud. This, however, brings the security concerns of sensitive data. To provide data security, it is essential to encrypt sensitive data before uploading it to cloud computing services. Although data encryption helps provide data security, it negatively affects the performance of massive data analytics because it forbids the use of index and mathematical operation on encrypted data. Thus, in this paper, we propose a novel algorithm which enables to efficiently process a large amount of encrypted data. In particular, we propose a novel top-k processing algorithm on the massive amount of encrypted data in the cloud computing environments, and verify the performance of the proposed approach with real data experiments.

A Survey of Homomorphic Encryption for Outsourced Big Data Computation

  • Fun, Tan Soo;Samsudin, Azman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3826-3851
    • /
    • 2016
  • With traditional data storage solutions becoming too expensive and cumbersome to support Big Data processing, enterprises are now starting to outsource their data requirements to third parties, such as cloud service providers. However, this outsourced initiative introduces a number of security and privacy concerns. In this paper, homomorphic encryption is suggested as a mechanism to protect the confidentiality and privacy of outsourced data, while at the same time allowing third parties to perform computation on encrypted data. This paper also discusses the challenges of Big Data processing protection and highlights its differences from traditional data protection. Existing works on homomorphic encryption are technically reviewed and compared in terms of their encryption scheme, homomorphism classification, algorithm design, noise management, and security assumption. Finally, this paper discusses the current implementation, challenges, and future direction towards a practical homomorphic encryption scheme for securing outsourced Big Data computation.

The Effect of IT Human Capability and Absorptive Capacity on Knowledge Transfer

  • Park, Joo-Yeon
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.3
    • /
    • pp.209-225
    • /
    • 2008
  • The purpose of this study is to examine the relationship between IT human capability and knowledge transfer and the role of absorptive capacity between them. From the test of both measurement and structural model using Partial Least Squares (PLS), IT human capability is found to be significant to absorptive capacity and knowledge transfer. Absorptive capacity is also significantly related to knowledge transfer. The interesting result found in this study is that the path of absorptive capacity drawn from IT human capability to knowledge transfer is stronger than the direct relationship between IT human capability and knowledge transfer, indicating that absorptive capacity plays an important role in knowledge transfer. This result indicates that IT personnel with stronger technical skill, interpersonal skill and management capability are more likely to acquire and learn knowledge effectively from outside expertise. Moreover, this study shows that absorptive capacity, the individual’s ability to utilize external knowledge is derived from IT human capability and strongly effects on transferring knowledge from outsourcing vendors. This study suggests IT related managers that the development of IT human capability and absorptive capacity should be recognized for a successful exploitation of outside knowledge within a firm. It is also a necessary condition for a successful IT implementation and maintenance independently and economically from outside vendors.

  • PDF

Relationship between International Sourcing Partnership and Sourcing Performance in Korean Apparel Firms (의류기업의 해외소싱 파트너쉽과 소싱성과와의 관계 연구)

  • 육심현;고애란;고은주
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.27 no.9_10
    • /
    • pp.1124-1133
    • /
    • 2003
  • The purpose of this study was to investigate relationships among partnership variables and sourcing performance. Partnership variables were included as: contract conditions, information sharing, communication, conflict, job understanding, monitoring, culture understanding, trust and commitment. Sourcing performance included perceived benefits and sourcing satisfaction. The survey research design was employed with the structured questionnaire. A sample of 104 Korean apparel firms' managers participated in this survey. Apparel firms selected for this study were casual, sports, children's wear firms doing actively international sourcing. For the data analysis, descriptive statistics (i.e., frequency, percent), factor analysis, correlation, and multiple regression analysis were used. Information sharing and job understanding were positively related with trust. That is to say, the better information sharing and the better job understanding apparel firms had higher scores of trust than others. Contract conditions, communication, conflict, and culture understanding were known as predictions of commitment to international outsourcing. The more trust firms had with their vendors, the more commitment the firms had in the international sourcing. This result showed that trust is the essential factor of commitment. Trust and commitment were significantly related with outsourcing performance (i.e., perceived benefits, satisfaction of the international sourcing). Partnership information of international sourcing assembled in the review of literature and the results from this empirical study may assist the domestic apparel firms to make better decision in the adoption process of international sourcing.

A Hilbert Curve-based Query Integrity Auditing Method for Encrypted Data in Database Outsourcing (데이터베이스 아웃소싱 환경에서 암호화된 데이터를 위한 힐버트 커브 기반 질의 결과 무결성 검증 기법)

  • Youn, Deulnyeok;Jang, Miyoung;Chang, Jae-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.804-807
    • /
    • 2013
  • 최근 클라우드 컴퓨팅에 대한 관심이 고조됨에 따라, 이를 활용한 데이터베이스 아웃소싱(Outsourcing)에 대한 연구가 활발히 진행되고 있다. 그러나 아웃소싱 된 데이터베이스는 사용자 개인 정보, 증권, 또는 의료 정보 등 민감한 정보를 포함하기 때문에 서비스 제공자로부터 수행한 질의 결과 데이터가 데이터 소유자로부터 생성된 데이터이며, 정확한 질의 결과를 포함하는지 확인하기 위한 질의 결과 무결성 검증 기법의 필요성이 대두되었다. 기존 질의 결과 무결성 검증 기법은 질의 결과에 포함되는 무결성 검증 데이터의 크기가 증가하여 검증 데이터 전송 오버헤드 증가 및 데이터 노출 위험 증가 문제를 지닌다. 따라서, 본 논문에서는 데이터 보호를 지원하는 암호화 데이터 기반 질의 결과 무결성 검증 기법을 제안한다. 제안하는 질의 결과 무결성 검증 기법은 암호화된 데이터 그룹을 주기 함수를 이용하여 재분할하고, 최종 데이터 그룹 id를 힐버트 커브를 통해 변환한다. 따라서, 검증 데이터 오버헤드를 감소시켜 효율적인 질의 처리를 지원하며, 그룹 id 변경을 통해 검증 데이터 유출 위험을 방지한다. 성능평가를 통해, 제안하는 기법이 기존 기법에 비해 질의 처리 시간 측면에서 평균 2배, 검증 데이터 오버헤드 측면에서 최대 20배의 성능을 개선함을 보인다.

APPRAISAL OF MAINTENANCE MANAGEMENT STRATEGIES USED IN PUBLIC HOSPITAL BUILDINGS IN LAGOS STATE, NIGERIA

  • Adenuga, O.A;Iyagba, R.O.;Ogunsanmi, E.O
    • International conference on construction engineering and project management
    • /
    • 2007.03a
    • /
    • pp.837-847
    • /
    • 2007
  • The study focused on the evaluation of maintenance management strategies used in public hospital buildings in Lagos state. It also assessed the labour composition for maintenance operations. In achieving these objectives, opinions of maintenance officers of ten (10) different hospitals in different local government areas of the state were sampled through well structured questionnaires. The data collected were analyzed using descriptive and inferential statistics. From the analysis, the study revealed that majority of those public hospitals do not have specific budget for maintenance programmes, maintenance policies, maintenance log book and maintenance manual to guide the operatives. About 98% of them do not understand the type of maintenance strategy being used for their maintenance operations. 78% of the maintenance work are only executed when there is a breakdown or in response to user's request. For labour composition, the cleaning of interior and exterior of the building, inspection of building elements, repairs and replacements of building elements are mainly carried out by in-house staff, while the repair and replacement of equipment is by outsourcing. The study also revealed that using in- house staff, reduces costs and provides a higher security while outsourcing provides more flexibility in staffing reduces equipment expenditures and provide better access to special skills. The study recommended proactive measures to provide necessary training and support for maintenance staff and users of these facilities and a means of securing sufficient funds for maintenance programmes.

  • PDF