• Title/Summary/Keyword: Outsourced services

Search Result 34, Processing Time 0.018 seconds

Beyond SARS-CoV-2: Lessons That African Governments Can Apply in Preparation for Possible Future Epidemics

  • Oboh, Mary Aigbiremo;Omoleke, Semeeh Akinwale;Imafidon, Christian Eseigbe;Ajibola, Olumide;Oriero, Eniyou Cheryll;Amambua-Ngwa, Alfred
    • Journal of Preventive Medicine and Public Health
    • /
    • v.53 no.5
    • /
    • pp.307-310
    • /
    • 2020
  • Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) has placed unprecedented pressure on healthcare systems, even in advanced economies. While the number of cases of SARS-CoV-2 in Africa compared to other continents has so far been low, there are concerns about under-reporting, inadequate diagnostic tools, and insufficient treatment facilities. Moreover, proactiveness on the part of African governments has been under scrutiny. For instance, issues have emerged regarding the responsiveness of African countries in closing international borders to limit trans-continental transmission of the virus. Overdependence on imported products and outsourced services could have contributed to African governments' hesitation to shut down international air and seaports. In this era of emerging and re-emerging pathogens, we recommend that African nations should consider self-sufficiency in the health sector as an urgent priority, as this will not be the last outbreak to occur. In addition to the Regional Disease Surveillance Systems Enhancement fund (US$600 million) provided by the World Bank for strengthening health systems and disease surveillance, each country should further establish an epidemic emergency fund for epidemic preparedness and response. We also recommend that epidemic surveillance units should create a secure database of previous and ongoing pandemics in terms of aetiology, spread, and treatment, as well as financial management records. Strategic collection and analysis of data should also be a central focus of these units to facilitate studies of disease trends and to estimate the scale of requirements in preparation and response to any future pandemic or epidemic.

Activation plans for e-logistics of information era (정보화시대의 e-물류 효율화방안)

  • Lee, Shin-Kyuo
    • The Journal of Information Technology
    • /
    • v.7 no.1
    • /
    • pp.87-104
    • /
    • 2004
  • This study is to understand basic knowledge on e-logistics through the analysis of third party logistics(3PL) as well as fourth party logistics(4PL) and to suggest some activation plans of e-logistics of information era to get competition in the field of international logistics. Compared with advanced countries, Korean companies has not activated 3PL logistics as Korean companies are not inclined to open their business information to others and they didn't recognize the importance of logistics. As the business environments are worsening little by little, there has been greater concerns for e-logistics as a way of focusing on the core-business. Most of Korean companies has outsourced simple and limited scope of 3PL and 4PL services with 1st level of logistics outsourcing. To activate e-logistics, Korean government and private enterprises have to pursue the following strategies. First, Korean government should change the present laws preventing the enterprises specialized in 3PL from doing business and should pursue logistics information and standardization. Also the government needs to support 3PL companies. Second, private companies do their best to retain and develope factors of logistics resources professional and to develope the latest technology. 3PL providers have pursue effective logistics strategies and to invest capitals for the information technology.

  • PDF

A Spatial Transformation Scheme Supporting Data Privacy and Query Integrity for Outsourced Databases (아웃소싱 데이터베이스에서 데이터 프라이버시 및 질의 무결성을 지원하는 공간 변환 기법)

  • Kim, Hyeong-Il;Song, Young-Ho;Chang, Jaewoo
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.652-663
    • /
    • 2015
  • Due to the popularity of location-based services, the amount of generated spatial data in daily life has been dramatically increasing. Therefore, spatial database outsourcing has become popular for data owners to reduce the spatial database management cost. The most important consideration in database outsourcing is meeting the privacy requirements and guarantying the integrity of the query result. However, most of existing database transformation techniques do not support both of the data privacy and integrity of the query result. To solve this problem, we propose a spatial data transformation scheme that utilizes the shearing transformation with rotation shifting. In addition, we described the attack models to measure the data privacy of database transformation schemes. Finally, we demonstrated through the experimental evaluations that our scheme provides high level of data protection against different kinds of attack models, compared to the existing schemes, while guaranteeing the integrity of the query result sets.

Improving Efficiency of Encrypted Data Deduplication with SGX (SGX를 활용한 암호화된 데이터 중복제거의 효율성 개선)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.8
    • /
    • pp.259-268
    • /
    • 2022
  • With prosperous usage of cloud services to improve management efficiency due to the explosive increase in data volume, various cryptographic techniques are being applied in order to preserve data privacy. In spite of the vast computing resources of cloud systems, decrease in storage efficiency caused by redundancy of data outsourced from multiple users acts as a factor that significantly reduces service efficiency. Among several approaches on privacy-preserving data deduplication over encrypted data, in this paper, the research results for improving efficiency of encrypted data deduplication using trusted execution environment (TEE) published in the recent USENIX ATC are analysed in terms of security and efficiency of the participating entities. We present a way to improve the stability of a key-managing server by integrating it with individual clients, resulting in secure deduplication without independent key servers. The experimental results show that the communication efficiency of the proposed approach can be improved by about 30% with the effect of a distributed key server while providing robust security guarantees as the same level of the previous research.