• 제목/요약/키워드: Outsourced services

검색결과 34건 처리시간 0.021초

장기요양기관 유형별 위탁급식 운영 실태 및 개선 방안 (Current Status of Outsourced Food Service Operations According to the Type of Long-Term Care Institution and Plans for Improvement)

  • 권진희;이희승;정현진;장혜자;이정석
    • 대한영양사협회학술지
    • /
    • 제28권2호
    • /
    • pp.67-84
    • /
    • 2022
  • This study aimed to explore the status of food service outsourcing behavior of long-term care institutions (LTCIs) through a cross-sectional survey using a questionnaire administered between July 16th and August 7th, 2020. The survey respondents were either dietitians or facility managers, who worked at 731 nursing homes, 477 group homes, and 673 day-care centers. Approximately 25.9% of nursing homes, 11.7% of group homes, and 33.1% of day-care centers used a managed-services company to operate their food service units. The main reason for outsourcing food service by nursing homes was related to the staffing of dietitians and cooks, whereas group homes and day-care centers outsourced food services due to factors relating to meal costs and the cooking process. Almost all the LTCIs entered into private contracts for outsourced food services. Only a few food service contracts included the types of meals, nutrition standards such as protein and calories per meal, and the parameter or ratio of food cost. Of the respondents, 84.5% from nursing homes, 87.5% from group homes, and 87.1% from day-care centers agreed that the quality of outsourced food services of the LTCIs should be regulated. Meals are essential for maintaining the health and functional status of LTCI users. As more LTCIs outsource their food services, we suggest the following: (1) Increasing the minimum dietitian staffing standards for LTCIs as per the Welfare of Senior Citizens Act and requiring at least one dietitian for every nursing home, (2) Making it mandatory to use a standard food service contract template when drafting food service contract, and (3) Developing realistic standards for food service operations considering the size and operation type of the LTCIs.

한국 지방자치단체의 전자상거래 유형 분석 (An Analysis of E-Commerce by Local Governments in Korea)

  • 김세훈;민대환
    • 한국IT서비스학회지
    • /
    • 제14권4호
    • /
    • pp.31-44
    • /
    • 2015
  • Local governments in Korea are involved in three types of online shopping sites : 'direct operation', 'outsourced operation', and 'sales agency.' They are different in terms of the site operator and the charging mechanism among a local government, the site operator, and local producers. This study analyzes their differences in site traffic, local producers' participation, promotion, and partnership. The results from the investigation of 72 shopping sites are the following. First, shopping sites of the 'direct operation' type and the 'outsourced operation' type show significantly higher participation of local producers. Second, the 'marketing agency' type has significantly higher number of promotional activities than the 'oursourced type' which has significantly higher number than the 'direct operation' type. Third, the number of partnerships in the 'marketing agency' type is the highest. The 'direct operation' type is the second and significantly higher than the 'outsourced type.' On the basis of the analysis results, this paper suggests an incubation ecosystem model as a better way of involvement by local governments in online shopping sites.

정보시스템 아웃소싱의 활용에 관한 탐색적 연구 (An Exploratory Study on the Utilization of Information Systems Outsourcing)

  • 천면중;김영달
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제8권1호
    • /
    • pp.5-26
    • /
    • 1999
  • In recent years there has been an increasing amount of attention paid to outosourcing of information systems (IS) functions in organizations. The changing and more strategic role of outsourcing in business firms has been given much coverage in academic and trade publications. Trying to remain competitive and up-to-date in the rapidly developing world of computer technology is becoming a financial burden to many organizations in fields such as banking and financial services, health care, and manufacturing. Hiring outsiders to handle part or even all of its information services helps an organization provide better services and maintain a competitive advantage. This paper attempts to provide a benchmark of current IS outsourcing utilization in Korea. A detailed descriptive analysis of survey responses from 78 Korean companies indicates the usage, length of experience, expenditure of outsourcing, and kinds of IS functions being outsourced. The study also analyzes the effects (strategic, economic, and technological) of IS outsourcing with respect to the length of experience, expenditure of outsourcing, and kinds of IS functions being outsourced As a result of the analysis there are significant differences in the strategic, economic and technological effects of IS outsourcing with respect to the expenditure of outsourcing, kinds of IS functions being outsourced and firm size.

  • PDF

기업의 핵심역량이 IT 아웃소싱 성과에 직접적인 관련이 있을 것인가? (Does the Understanding of Core Competencies Matter to IT Outsourcing Performance?)

  • 김용진;남기찬;구철모
    • 한국경영과학회지
    • /
    • 제32권3호
    • /
    • pp.97-114
    • /
    • 2007
  • IT outsourcing providers has been expanded from a single functional system to the entire IT service to gain sustainable competitiveness. This new trend of IT outsourcing need outsourcing management capability based on a firm's core capacity. Hiring external IT service providers to manage part or all of its information-related services helps a firm focus on its core business and provides better services to its clients, thus obtaining sustainable competitive advantage. This research investigates the major factors that determine the level of a particular firm's success at IT outsourcing. Based on process innovation and core-competency theories, we identify three significant components of a firm's IT outsourcing management method (ITOMM): level of core-competency-based management, maturity of outsourced tasks, and maturity of outsourcing management. Comprehensive data collection was conducted through an outsourcing association. The survey data were analyzed using a structural analysis method. Maturity of outsourced tasks and maturity of outsourcing management were found to affect project performance directly, while level of core-competency-based management only indirectly impacted project performance through its positive impact on the other two ITOMM components.

제3자물류의 실태분석 및 활성화 방안에 관한 연구 (A study on the current status and ways of activating 3PL)

  • 이충규;김준석
    • 한국항만경제학회지
    • /
    • 제18권2호
    • /
    • pp.65-90
    • /
    • 2002
  • Despite the importance and necessity, the 3PL has not been activated to date. Among many views, customers claim that logistics service provider(LSP) are not prepared or capable of offering satisfactory 3PL services, while LSP emphasize the lack of mutual trust, closed corporate culture of the customer and excessive demand for reducing the costs. With this keeping in mind, it surveyed difference of perception between users and providers of 3PL services in terms of the actual status of using 3PL services, the degree of satisfaction and key factors for selecting 3PL provider through the questionnaire. As shown in this study, 43.3% of the respondents outsourced logistics services. However, Most company outsourced only inland transportation (49.5%) which is a simple and limited scope of 3PL services, but it also indicated that the percentage of users have ranged was less then 10% in outsourcing their whole logistics sector to 3PL provider and employing other logistics functions. Among respondents, a majority of the service provider stated that they offered satisfactory cost-saving to the customers, while users felt that the degree of satisfaction for using 3PL services was evaluated as at an average level and they more highly regarded the strong partnership of their 3PL provider rather than the saving of cost and improvement of customer's services. Moreover, in contrast to the 3PL providers which regard the most important factor for selecting 3PL service provider is the logistics cost quoted, users of 3PL services felt that the quality of services was more significant than the reduction of cost, and this tendency for selecting 3PL providers was shown in more advanced countries. While users of 3PL services indicated that the main reason for not using 3PL services was to avoid disclosing information of their business and it costs much for employing 3PL providers than doing themselves, 3PL providers thought it was due to reluctancy of opening information and resistance from the logistics division engaged in logistics activities concerned. Accordingly, providers and users of 3PL services should trust each other and prepare plan to activate 3PL services under the collaborative relationships as soon as possible.

  • PDF

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권2호
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

Outsourcing Business to cloud computing with communication services

  • Chou, Nory;Lee, Minsoo
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2010년도 추계학술발표대회
    • /
    • pp.146-147
    • /
    • 2010
  • This paper describes business on cloud computing service and the development of solution in the business Architecture in outsourced services environment for communication. Cloud computing is so popular and make people life easier. Business process outsourcing has become attractive to both large and small businesses with the advent of service oriented and specifically web service technology.

정보시스템 아웃소싱 고객만족도 조사를 위한 웹 기반 설문 시스템 : 시스템 아키텍처 및 프로세스 (The Web based Questionnaire Systems for IT Outsourcing Customer Satisfaction Survey : System Architecture and Process)

  • 정윤석;안준모
    • 한국IT서비스학회지
    • /
    • 제4권1호
    • /
    • pp.149-160
    • /
    • 2005
  • Information system outsourcing induces firms to concentrate on the core competence and to improve business value by utilizing specialized information systems outsourcing vendors. However, for those strategic effects, the outsourced information systems should guarantee a certain service level. Now companies are considering to adopt SLA(Service Level Agreement) as a method to check the service level of the outsourced information systems in quantitative terms. On the contrary, customer satisfaction survey supports qualitative analysis, and helps companies to understand the qualitative effects on information system more systematically. Recently, the growing use of the internet makes customer satisfaction survey to be carried out on the web. For that reason, lots of researches related to web survey have been performed. But these researches are just focused on finding out only items to be measured and the effect of web survey. In this paper, based on the service quality research model for information system outsourcing, we formalize and propose a web survey process, a system architecture, and a functional structure for information system outsourcing customer satisfaction survey. Additionally, we provide the implementation results for the web survey systems.

전자상거래시대의 제3자 물류 활성화 방안 (The activation plans of the third party logistics for e-Business)

  • 이신규
    • 정보학연구
    • /
    • 제7권3호
    • /
    • pp.63-81
    • /
    • 2004
  • 전자상거래가 활성화되어가고 있는 상황하에서 우리나라는 물류의 아웃소싱에 대한 관심이 높아지고 있음에도 불구하고 국내 물류서비스를 담당하고 있는 제3자 물류업체는 규모가 영세하고 전문화된 활동영역이 미미하고, 화주기업의 경우에도 기업 내부정보의 유출과 통제력 약화 등을 우려하여 상호간 유기적 연계가 이루어지고 있지 않은 실정이다. 이에 따라 제3자 물류가 정착되기 위해서는 정부측면에서 불필요한 행정규제를 철폐하고 물류산업 활성활ㄹ 위한 특별법의 제정이 필요하고, 기업측면에서는 효율적인 물류전략 추진, 물류서비스 기반요소 확충, 물류업체 컨설팅 능력 확보, 정보기술에의 투자 등의 다각적인 전략이 요청된다.

  • PDF

Provably-Secure Public Auditing with Deduplication

  • Kim, Dongmin;Jeong, Ik Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권4호
    • /
    • pp.2219-2236
    • /
    • 2017
  • With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.