• Title/Summary/Keyword: 정보기술 아웃소싱

Search Result 93, Processing Time 0.026 seconds

Case Study Plan for Information Security SLA Performance System in Public Sector (공공부문 정보보안 SLA 성과체계 사례연구)

  • Jeong, Jae Ho;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.763-777
    • /
    • 2021
  • Information security started as an IT operation process and is now recognized as an important issue of information technology, and each international organization is newly defining the concept. Information security itself is a new combination of IT technologies, a set of technologies and a technology area. As IT outsourcing becomes common in many public sectors, SLAs are introduced to evaluate the level of IT services. In the area of information security, many studies have been conducted on the derivation and selection of SLA performance indicators, but it is difficult to find a way to apply the performance indicators to service level evaluation and performance systems. This thesis conducted a study on the application of a service evaluation system for information security performance indicators based on the public sector and a performance system including compensation regulations. It presents standards and rewards(incentive and penalty) that define expectation and targets of performance indicators that take into account the environment and characteristics of a specific public sector, and defines appropriate SLA costs. It proposes a change plan for the organizational structure for practical SLA application and service level improvement.

Clients' Strategic Choices to Mitigate Their Dependence on Vendors in IT Outsourcing : Resource Dependence and Opportunism Prospects (정보기술 아웃소싱에서 고객이 전문업체에 대한 의존도를 줄이기 위한 전략적 선택에 관한 연구 : 자원의존 및 기회주의 이론 관점에서)

  • Lee, Jae-Nam
    • Journal of Information Technology Services
    • /
    • v.7 no.1
    • /
    • pp.167-193
    • /
    • 2008
  • Clients' outsourcing strategies noted in the IT outsourcing literature generate varying levels of client dependence on vendors. This study investigates clients' efforts to mitigate such dependence by utilizing multiple vendors. We use the theoretical lenses of resource dependency and opportunism to study this phenomenon. Specifically. we consider degree of outsourcing, duration of contract, and externalization of control as strategic choices that engender vulnerabilities that clients seek to offset by using multiple vendors. This study then considers the basis of the outsourcing relationships, clients' satisfaction with the relationships. and clients' IT workforce size as conditions that induce clients' concerns about vendor opportunism. This study argues that these conditions can exacerbate clients' experience of vulnerability. further encouraging clients' use of multiple vendors. The research model developed is tested in a survey of firms in South Korea. Results suggest a strong impact of outsourcing strategic choices on the number of vendors used by clients. The anticipated moderating effects of opportunism were only weakly supported by the data though. Theoretical and practical implications of the results are considered and suggestions for future research are offered.

Post-purchase Customer Choice Model for Subscription-based Information and Telecommunications Services (가입형 정보통신 서비스의 구매 후 고객선택모형)

  • Lee, Dong-Joo;Ryu, Ho-Chul;Ahn, Jae-Hyeon
    • Information Systems Review
    • /
    • v.8 no.1
    • /
    • pp.159-179
    • /
    • 2006
  • With the advances in information technologies and the wide acceptance of IT outsourcing practices, subscription-based information & telecommunications services(ITS) become more available. Convergence and intensified industry competition have made it an imperative for the ITS providers to keep their current customers and acquire new customers at the same time. In this study, we developed a framework for effective customer management based on the factors influencing the post-purchase customer choice: stay with the present provider or switch to another one. Specifically, we classified the factors into four categories: Holding factors, Defect factors, Inducement factors, and Hurdle factors depending on the characteristics of the influence and direction of the influence. Based on the classification, we developed a post-purchase customer choice model for the subscription-based ITS providers. Then, we illustrated a possible application of the model in the context of the broadband Internet access service. The model could be used to increase the competitive advantage of service providers through the effective customer management in the subscription-based ITS market.

A Study on E-trade Securities and Strategic Solutions (전자무역보안과 전략적 대응방안에 대한 소고)

  • Jung, Jo-Nam;Lee, Chun-Su;Kang, Jang-Mook
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.577-584
    • /
    • 2004
  • Recently many company has been cracked by crackers information security and everyday new computer virus come out. so e-trade partners should prevent the disasters. A few studies researched e-trade securities broadly but the new trend in information security division especially focused on electronic payment, EDI, Transportation, Contracts, Insurances and that of subjects have been researched through interdisciplinary evolution. Our research e-trade security on three part, First system attack, second is data attack and third is business attack. the attacks have theirs own solution, so e-trade company use this solution timely and powerfully. It is the most important thing to prepare the cracking with securities system. also manager should catch recent hacking technologies. The research results propose that e-trade firms should use information security policies and securities systems that including H/W and S/W. therefore manager's security mind is very important and also using electronic commerce securities device and should be considered exploiting solutions by each special usage according to e-trade company' environments.

The activation plans of the third party logistics for e-Business (전자상거래시대의 제3자 물류 활성화 방안)

  • Lee, Shin-Kyuo
    • The Journal of Information Technology
    • /
    • v.7 no.3
    • /
    • pp.63-81
    • /
    • 2004
  • The third party logistics(3PL) is generally understood as the logistics activities providing a comprehensive logistics services, all or partly outsourced by the customers on a larger term contract basis, ranging from making logistics strategies to implementing information technology services. A lot of companies in advanced countries such as the U.S.A. or some of the European countries have actively outsourced to logistics service providers in efforts to increase the efficiencies in logistics operation rather than doing themselves. In light of these environments, outsourcing to third parties has become a strategic issue demanding greater attention in corporate boardrooms. First, after deciding their logistics outsourcing, the companies have to set up their aims of 3PL through the development of logistical strategies. Second, the companies must decide service provider that fits to their business environment and conditions. As it is reported that 3PL services will bring a high rate of return and its potential will be more signigicant, providers and users of 3PL services and government ministry should prepare the way of improvement of logistics institution and plan to activate 3PL services to reach the advanced foreign countries level.

  • PDF

Analytic Approach to e-Transformation of Intermediary (중개유통기업의 e-트랜스포메이션: 분석적 접근)

  • Han, Hyun-Soo
    • Information Systems Review
    • /
    • v.5 no.2
    • /
    • pp.1-21
    • /
    • 2003
  • In this paper, we investigate industrial product intermediary's transformation strategy by exploiting advantages afforded by web based information technologies. Our motivation for this research stems from exploring intermediary's responding strategy to cope with supplier's threatening to disintermediation. From transaction cost perspective, internet can induce both the vertical quasi-integration (electronic hierarchy) and outsourcing (electronic market). Our rationale on directing one of these bi-directional movements is specified on intermediary's value adding on the supply chain. As such, we investigated supply chain performance, IT effects on customer's requirement of channel functions, and channel power structure. Propositions to suggest contingent e-transforming strategic alternatives are logically derived from dyadic nature of supply chain characteristics such as efficiency versus customer services, and supplier dominant versus easy replaceability of suppliers. The contingent e-transformation framework developed from intermediary's perspective is reviewed through longitudinal industry case analysis. Implications from the industry case analysis give us insights for the effectiveness of the framework to combine supply chain characteristics with intermediary's e-transformation.

Practical Conjunctive Searchable Encryption Using Prime Table (소수테이블을 이용한 실용적인 다중 키워드 검색가능 암호시스템)

  • Yang, Yu-Jin;Kim, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.5-14
    • /
    • 2014
  • Searchable encryption systems provide search on encrypted data while preserving the privacy of the data and the search keywords used in queries. Recently, interest on data outsourcing has increased due to proliferation of cloud computing services. Many researches are on going to minimize the trust put on external servers and searchable encryption is one of them. However, most of previous searchable encryption schemes provide only a single keyword boolean search. Although, there have been proposals to provide conjunctive keyword search, most of these works use a fixed field which limit their application. In this paper, we propose a field-free conjunctive keyword searchable encryption that also provides rank information of search results. Our system uses prime tables and greatest common divisor operation, making our system very efficient. Moreover, our system is practical and can be implemented very easily since it does not require sophisticated cryptographic module.

A Study on the Direction Future of Cataloging Education (차세대 목록 교육의 방향성에 관한 연구)

  • Cho, Jane
    • Journal of Korean Library and Information Science Society
    • /
    • v.41 no.2
    • /
    • pp.127-145
    • /
    • 2010
  • Outsourcing, importing of publishing metadata and revitalizing copy cataloging have reduced importance of traditional cataloging. Request of interoperability between other communities and business integration of related system also have changed the meaning of library catalog. Furthermore, newly declared principle and rules are totally different to existing AACR, MARC, measures to cataloging education for next generation seems to be urgently needed. In this study, firstly put together a series of discussion about future cataloging and new role of cataloging librarian, and secondly basis on it, suggest direction of cataloging education course which divided two sectors. One is for students who are undergraduated, and another is for current cataloger at working level. In basic training, it should contain principle of knowledge organization and diverse resources and its relationship, encoding scheme and its practice. The other hand, in re-education training, it should include that re-recognition about new concept of bibliographic world, changing vocabulary and encoding scheme, furthermore metadata scheme about diverse resources which library have accepted, and its integration.

  • PDF

A Dynamic Trust Framework for Sharing Identity Authentication (신원 인증 공유를 위한 동적 신뢰 프레임워크)

  • Park, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2199-2206
    • /
    • 2012
  • Identity authentication sharing technology which allows many service providers to share the result of identity authentication of an identity provider provides several important advantages including high usability achieved by avoiding repeated registration of identity information to service providers and single sign-on, cost effectiveness of service providers achieved by outsourcing identity authentication services from identity providers, and privacy protection achieved by exposing identity information only to a limited number of controlled identity providers. However, in order for the identity authentication sharing technologies to be widely deployed in global Internet scale, the trustworthiness issue among the participating identity providers, service providers, and users should be resolved in advance. This paper firstly analyzes existing trust frameworks for identity authentication sharing. And then, based on the result of analysis, this paper proposes a dynamic and open trust framework for identity authentication sharing.

Factors Affecting the Project Performance of Software Development Outsourcing (소프트웨어 개발 아웃소싱 프로젝트 성과에 영향을 미치는 요인)

  • Cho, Dong-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.3
    • /
    • pp.1077-1083
    • /
    • 2012
  • SDO(Software Development Outsourcing) projects have been consistently increasing and expanding but also have many failures. In order to improve SDO performance, the factors affecting SDO performance are investigated in this study. SDO has relational risk as well as performance risk in nature, and the factors affecting the SDO performance caused by these mixed risks are drawn from the prior studies. With field survey targeted client IS personnel who experienced SDO, 214 survey questionnaires are collected and analyzed. Research results show that vendor power, client requirements certainty, goal clarity and goal alignment affect the SDO performance. However, vendor knowledge and client knowledge do not have much effect on SDO performance. The results of this study can be effectively utilized to decrease the failures of SDO and increase the possibility of success.