• Title/Summary/Keyword: IT-Outsourcing

Search Result 443, Processing Time 0.025 seconds

A Study on the Audit Model of Outsourcing Operation based on Availability Metrics in perspective of Service Level Agreenment (서비스 수준협약 관점에서 가용성 지표 중심의 아웃소싱 운영감리 모델에 관한 연구)

  • Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.183-196
    • /
    • 2015
  • In order to perform a successful outsourcing, we needs the SLA through improving the quality of IT services. In particular SLA metrics and evaluation criteria is an important factor as to substitute the IT viability of the company to promote IT Outsourcing. SLA metrics consist of technical, managerial, user perspective items, and has been managed to aim to provide reliable and continuous quality improvement of IT services. This study focuses on the HW availability metrics of SLA indicators of IT outsourcing. We propose the Infra availability criteria for the HW configuration level to meet the SLA contract and evaluation. We offer the Infra configuration standards of SLA contract, and propose criteria to determine the suitability of the target levels in IT operations audit environment. The proposed model was verified the necessity and effectiveness of the Infra configuration standards and operation audit check items through the surveys of experts and users.

Building Competitive Advantages through Information Systems(IS) Outsourcing: A Resource-Based View(RBV) Approach (정보시스템 아웃소싱을 통한 경쟁력 제고: Resource-Based View(RBV) 접근)

  • Goo, Ja-Hyun
    • Asia pacific journal of information systems
    • /
    • v.13 no.3
    • /
    • pp.213-242
    • /
    • 2003
  • This paper employs the lens of the resource-based view(RBV) to investigate how firms create competitive advantages through IS outsourcing arrangements. The RBV framework is used to explore how a firm adds value and reaps benefits from IS outsourcing arrangements. The primary finding is that in the process of value creation, the 'absorption' of the managerial and technical capabilities of external vendors is critical. When the client firm is able to absorb and integrate the IT capabilities of outsourcing vendors, these absorbed capabilities in turn become the source of IT competence and competitive advantages $vis-\grave{a}-vis$ the competition.

Differences Between Client's and Supplier's receptions of IT Outsourcing Risks (IT아웃소싱 위험에 대한 고객과 공급업체와의 인식 차이)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.237-242
    • /
    • 2018
  • Researchers have suggested successful risk management as a key factor in successful IT outsourcing projects implementation. The documented investigations, however, have mainly addressed risk management only from a single perspective of either clients or IT vendors. This study explored the potential perception inconsistency regarding the risks between the client and the vendor for IT outsourcing projects by using a quasi-Delphi approach. The analysis results indicated some inconsistencies in the risks perceived by the two parties: (1) the clients regarded (a) lack of vendor commitment to the project and (b) poor vendor selection criteria and process as top critical risks but the vendors didn't; and (2) on the other hand, the vendors perceived (a) unclear requirements and (b) lack of experience and expertise with project activities as significant risks but the clients didn't. Insights into how the client and the vendor perceive risks may help both parties determine how to partner and manage project risks collaboratively to succeed in outsourcing.

A Study on the Effect of Outsourced to Management Performance (아웃소싱이 기업성과에 미치는 영향)

  • Bae, Ha Jin;Kwak, Soon Jin;Kim, Kwang Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.5
    • /
    • pp.83-94
    • /
    • 2014
  • Before economical crisis in 1997, domestic company focused on increasing the size of outward experience which including organization. The result of increasing outward experience without substance was economical crisis, so after that time, many companies have been changing their focus from insourcing to strengthen the core competence to secure global market. This is becoming a cause of following that companies are reducing their outward experience. Especially, to process tasks more effectively and to cope with rapid change of business environment, such as incoming raw material from overseas/high raising of salary/rising property prices, many companies decided outsourcing method. At most of hypothesis, the result was that outsourcing can affect positively to the business. First, introducing of outsourcing during focusing on core competence can be positive effect for company performance such as business management /productivity /procurement /administration /product competitiveness /technology. Second, the result that analyzed based on a point of view of population statics after outsourcing was positive effect at the most of research. Third, result of effectiveness for every outsourcing type classified by 4M was also can be positive at the most of research. Fourth, the characteristic of population statics can be positive effect at the most of category when select outsourcing companies. Research result of outsourcing was various based on the goal of outsourcing. It is revealed by investigation of domestic/overseas treatise that there are opposite two opinions. In this research, there is no consistent result that the outsourcing can give effects on business performance, but most of hypothesis indicates that outsourcing can give positive effect on the business performance.In this research, based on the outsourcing intensity, mutual relation was analyzed. The assumption of the reason of outsourcing is economical and organizational. First, sampling numbers of research was too small so it is too difficult to get significant business performance result. (Sampling : 150, Replied : 106, Rate of Reply : 71%) Second, tried to compare significant differences of outsourcing methods which were divided based on 4M, but the there is gaps between the number of Cell and too difficult to make replier understand. Third, it is tried to find the degrees of effect that the point of view of popular statics can effect on business performances and selection of outsourced companies.

  • PDF

Multi-dimensional Query Authentication for On-line Stream Analytics

  • Chen, Xiangrui;Kim, Gyoung-Bae;Bae, Hae-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.2
    • /
    • pp.154-173
    • /
    • 2010
  • Database outsourcing is unavoidable in the near future. In the scenario of data stream outsourcing, the data owner continuously publishes the latest data and associated authentication information through a service provider. Clients may register queries to the service provider and verify the result's correctness, utilizing the additional authentication information. Research on On-line Stream Analytics (OLSA) is motivated by extending the data cube technology for higher multi-level abstraction on the low-level-abstracted data streams. Existing work on OLSA fails to consider the issue of database outsourcing, while previous work on stream authentication does not support OLSA. To close this gap and solve the problem of OLSA query authentication while outsourcing data streams, we propose MDAHRB and MDAHB, two multi-dimensional authentication approaches. They are based on the general data model for OLSA, the stream cube. First, we improve the data structure of the H-tree, which is used to store the stream cube. Then, we design and implement two authentication schemes based on the improved H-trees, the HRB- and HB-trees, in accordance with the main stream query authentication framework for database outsourcing. Along with a cost models analysis, consistent with state-of-the-art cost metrics, an experimental evaluation is performed on a real data set. It exhibits that both MDAHRB and MDAHB are feasible for authenticating OLSA queries, while MDAHRB is more scalable.

The Recent Trends and Controversy over Outsourcing of Cataloging in Academic Libraries (대학도서관 편목 업무 외주의 동향과 논쟁)

  • Yoon, Cheong-Ok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.38 no.2
    • /
    • pp.119-136
    • /
    • 2004
  • The purpose of this study is to analyze cases of several academic libraries, both in Korea and other countries, which have outsourced part or all of cataloging operations and examine current trends and controversy over outsourcing. Contrary to expectations of reduced expenses and increased efficiency in cataloging, outsourcing often results in bibliographic records of low quality which require additional costs to correct errors and maintain consistency and accuracy of records, and therefore, fails to reach the goal. Due to the absence of high quality bibliographic utilities, union catalogs, and authority databases, and lack of expertise in cataloging among outsourcing service providers, it seems that outsourcing is not currently an appropriate tactic for cataloging in academic libraries in Korea.

An Evaluation Model of Transition PMO Competencies Using RGT and AHP (RGT와 AHP을 활용한 이행 PMO 역량평가 모형)

  • Cha, Hwanju;Kim, Ja-Hee
    • Journal of Information Technology Services
    • /
    • v.14 no.2
    • /
    • pp.87-109
    • /
    • 2015
  • The IT outsourcing industry has been widespread for decades since the growth of the system integration industry stagnates and companies need to curtail expenses and improve the quality of IT services. According to previous studies on the success factors of the IT outsourcing, its transition phase is significant because of continuity of business and the handover of knowledge. Since a transition phase consists of several projects, but its goal is different from general projects, it needs special and professional management. Therefore, recent IT outsourcing business starts to introduce PMO (project management offices), of which success strongly depends on the competencies of the PMO. However, there are only few studies on which competencies of the PMO are important. In this paper, we suggest an evaluation model of transition PMO competencies derived using the repertory grid technique and the analytic hierarchy process. Additionally, we compare the differences between the views of several stakeholders on the importance of the competencies.

A Study on Differences of Job Satisfaction and Involvement According to the Job Status between Outsourcing Staff and Permanent Staff (병원 아웃소싱직원과 정규직원의 직무만족 및 직무몰입, 이직의도에 대한 차이분석)

  • Jang, Hyo Kang;Ryu, Hwang Gun;Bae, Sung Kwon
    • The Korean Journal of Health Service Management
    • /
    • v.1 no.1
    • /
    • pp.16-30
    • /
    • 2007
  • The point of this study is to analyze the difference between the outsourcing staff and the permanent staff. Also, to do a comparative analysis of the degree of understanding of the two groups with regards to elements of the major organization culture. The subjects of the study carne from 9 Catholic hospitals, the outsourcing staff being 198 and the permanent staff being 206. A survey was conducted with them, using SPSS 12.0 and carrying out t-test and ANOVA. A summary of the actual results of this analysis are as follows: Among the elements of organization culture (principles of understanding, practice, education, values, work environ) there appeared a high level of understanding among the permanent staff. As for satisfaction about the facilities, the outsourcing staffs' satisfaction level was higher. Second, the results of analyzing the effectiveness of the factors in job satisfaction and involvement - show that as the elements of education, values, work environ etc. were rated higher, job satisfaction came out higher. Contrary to that, job satisfaction was lower as the work hours lengthened. Through the results of the above study, education program for the outsourcing staff are helped to understand the hospital's special characteristics, unique philosophy and values. Therefore, it is needed the development of new techniques of management for the outsourcing staff; through setting up a department whose whole responsibility is the education and administration of the outsourcing staff, their job satisfaction and involvement will improve.

  • PDF

Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing

  • Guangwei Xu;Chen Wang;Shan Li;Xiujin Shi;Xin Luo;Yanglan Gan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.998-1019
    • /
    • 2024
  • Mobile cloud computing is a very attractive service paradigm that outsources users' data computing and storage from mobile devices to cloud data centers. To protect data privacy, users often encrypt their data to ensure data sharing securely before data outsourcing. However, the bilinear and power operations involved in the encryption and decryption computation make it impossible for mobile devices with weak computational power and network transmission capability to correctly obtain decryption results. To this end, this paper proposes an outsourcing decryption algorithm of verifiable transformed ciphertext. First, the algorithm uses the key blinding technique to divide the user's private key into two parts, i.e., the authorization key and the decryption secret key. Then, the cloud data center performs the outsourcing decryption operation of the encrypted data to achieve partial decryption of the encrypted data after obtaining the authorization key and the user's outsourced decryption request. The verifiable random function is used to prevent the semi-trusted cloud data center from not performing the outsourcing decryption operation as required so that the verifiability of the outsourcing decryption is satisfied. Finally, the algorithm uses the authorization period to control the final decryption of the authorized user. Theoretical and experimental analyses show that the proposed algorithm reduces the computational overhead of ciphertext decryption while ensuring the verifiability of outsourcing decryption.

A Research for Effective SLA Index Application : 3 application cases with main focus on Corporate W. (SLA지표 개선 및 적용의 타당성 확보를 위한 연구 : SLA 도입기업 사례를 중심으로)

  • 이영희;천정락;이순철
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.1
    • /
    • pp.101-115
    • /
    • 2004
  • The goal of this research is to improve SLA index that measures service performance level as a result of outsourcing Information system, and also to identify the best application method. This research identifies SLA applied cases and improving points based on the evidence collected from three major financial institutions that utilized outsourcing. First this study analyzes SLA applied cases of two different companies and discusses SLA application improvement possibilities. It then introduces a successful case of a third company that adopted SLA index.

  • PDF