• Title/Summary/Keyword: outsourced-service

Search Result 46, Processing Time 0.022 seconds

Current Status of Outsourced Food Service Operations According to the Type of Long-Term Care Institution and Plans for Improvement (장기요양기관 유형별 위탁급식 운영 실태 및 개선 방안)

  • Kwon, Jinhee;Lee, Heeseung;Jeong, Hyeonjin;Chang, Hyeja;Lee, Jungsuk
    • Journal of the Korean Dietetic Association
    • /
    • v.28 no.2
    • /
    • pp.67-84
    • /
    • 2022
  • This study aimed to explore the status of food service outsourcing behavior of long-term care institutions (LTCIs) through a cross-sectional survey using a questionnaire administered between July 16th and August 7th, 2020. The survey respondents were either dietitians or facility managers, who worked at 731 nursing homes, 477 group homes, and 673 day-care centers. Approximately 25.9% of nursing homes, 11.7% of group homes, and 33.1% of day-care centers used a managed-services company to operate their food service units. The main reason for outsourcing food service by nursing homes was related to the staffing of dietitians and cooks, whereas group homes and day-care centers outsourced food services due to factors relating to meal costs and the cooking process. Almost all the LTCIs entered into private contracts for outsourced food services. Only a few food service contracts included the types of meals, nutrition standards such as protein and calories per meal, and the parameter or ratio of food cost. Of the respondents, 84.5% from nursing homes, 87.5% from group homes, and 87.1% from day-care centers agreed that the quality of outsourced food services of the LTCIs should be regulated. Meals are essential for maintaining the health and functional status of LTCI users. As more LTCIs outsource their food services, we suggest the following: (1) Increasing the minimum dietitian staffing standards for LTCIs as per the Welfare of Senior Citizens Act and requiring at least one dietitian for every nursing home, (2) Making it mandatory to use a standard food service contract template when drafting food service contract, and (3) Developing realistic standards for food service operations considering the size and operation type of the LTCIs.

Dual Commitment and Job Performance of Outsourced Employees Working at Hospitals (의료기관 아웃소싱업체 도급직 직원의 이중몰입과 업무성과)

  • Choi, Jin-Hee;Ji, Jae-Hoon;Kim, Won-Joong
    • The Korean Journal of Health Service Management
    • /
    • v.9 no.3
    • /
    • pp.81-93
    • /
    • 2015
  • Objectives : The objective of this study was to examine preceding variables that affect the dual commitment of outsourced employees working at hospitals and to analyze the influence of these variables on job performance. Methods : Data were collected from 461 outsourced employees, working at 7 general hospitals, which had introduced the outsourcing system, using a structured, self-administered questionnaires. Frequency, validity/reliability, correlation and path analyses were done for data analysis. Results : The results of the path analyses showed that both commitment to the hiring company and commitment to the client company (hospital) had statistically significant positive effects on job performance. Additionally, when the 'single measurement' approach was used, dual commitment had a larger positive effect, compared with the 'parallel approach.' Among the preceding variables, 'satisfaction for the job itself' was found to be the most important variable affecting dual commitment and job performance. Conclusions : In conclusion, to enhance the job performance of outsourced employees, it is important for management to examine and improve the various factors related to job satisfaction. Additonally, for outsourced employees to have organizational commitments to the hiring and client companies simultaneously, management should emphasize a sense of unity and share organizational values.

A Survey of Homomorphic Encryption for Outsourced Big Data Computation

  • Fun, Tan Soo;Samsudin, Azman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3826-3851
    • /
    • 2016
  • With traditional data storage solutions becoming too expensive and cumbersome to support Big Data processing, enterprises are now starting to outsource their data requirements to third parties, such as cloud service providers. However, this outsourced initiative introduces a number of security and privacy concerns. In this paper, homomorphic encryption is suggested as a mechanism to protect the confidentiality and privacy of outsourced data, while at the same time allowing third parties to perform computation on encrypted data. This paper also discusses the challenges of Big Data processing protection and highlights its differences from traditional data protection. Existing works on homomorphic encryption are technically reviewed and compared in terms of their encryption scheme, homomorphism classification, algorithm design, noise management, and security assumption. Finally, this paper discusses the current implementation, challenges, and future direction towards a practical homomorphic encryption scheme for securing outsourced Big Data computation.

Does the Understanding of Core Competencies Matter to IT Outsourcing Performance? (기업의 핵심역량이 IT 아웃소싱 성과에 직접적인 관련이 있을 것인가?)

  • Kim, Young-Jin;Nam, Ki-Chan;Koo, Chul-Mo
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.3
    • /
    • pp.97-114
    • /
    • 2007
  • IT outsourcing providers has been expanded from a single functional system to the entire IT service to gain sustainable competitiveness. This new trend of IT outsourcing need outsourcing management capability based on a firm's core capacity. Hiring external IT service providers to manage part or all of its information-related services helps a firm focus on its core business and provides better services to its clients, thus obtaining sustainable competitive advantage. This research investigates the major factors that determine the level of a particular firm's success at IT outsourcing. Based on process innovation and core-competency theories, we identify three significant components of a firm's IT outsourcing management method (ITOMM): level of core-competency-based management, maturity of outsourced tasks, and maturity of outsourcing management. Comprehensive data collection was conducted through an outsourcing association. The survey data were analyzed using a structural analysis method. Maturity of outsourced tasks and maturity of outsourcing management were found to affect project performance directly, while level of core-competency-based management only indirectly impacted project performance through its positive impact on the other two ITOMM components.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

A Study for the Perception of Job Identity, Public Service Motivation and Organizational Committment focusing on Airport Security Agents (고용형태에 따른 직무정체성, 공직봉사동기 및 조직충성도에 대한 연구 : 공항 특수경비원들의 인식을 중심으로)

  • Park, Sung-Sik;Cho, Sung-Hwan;Kim, Kwang-Ok;Jung, Ju-Yong
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.4
    • /
    • pp.31-43
    • /
    • 2017
  • Airport security staff are outsourced workers, whose status is a special security agent under the security service law in Republic of Korea, who are subject to persuing both profitability and public concern at the same time. This paper has chosen the sample of security staff working at Incheon airport. This is because airport security staff is being outsourced, this paper had made an empirical research such areas as the perception of job identity, public service motivation and organizational commitment through job satisfaction. According to statistical research, it was found the perception on job identity by airport security staff had a significant negative effect on both job satisfaction and organizational commitment. The more they have perceived their status as non-permanent status, the less they had job satisfaction and commitment at the same time as a special security agent at airport. Their perception of job identity had a significant effect on such public service motivation factors as 'absorbing public concern' and 'a solicitude'. Lastly, their motivation factors had also significant positive effect on job satisfaction and organizational commitment.

The Web based Questionnaire Systems for IT Outsourcing Customer Satisfaction Survey : System Architecture and Process (정보시스템 아웃소싱 고객만족도 조사를 위한 웹 기반 설문 시스템 : 시스템 아키텍처 및 프로세스)

  • Jeong, Yoon-Seok;An, Joon-M.
    • Journal of Information Technology Services
    • /
    • v.4 no.1
    • /
    • pp.149-160
    • /
    • 2005
  • Information system outsourcing induces firms to concentrate on the core competence and to improve business value by utilizing specialized information systems outsourcing vendors. However, for those strategic effects, the outsourced information systems should guarantee a certain service level. Now companies are considering to adopt SLA(Service Level Agreement) as a method to check the service level of the outsourced information systems in quantitative terms. On the contrary, customer satisfaction survey supports qualitative analysis, and helps companies to understand the qualitative effects on information system more systematically. Recently, the growing use of the internet makes customer satisfaction survey to be carried out on the web. For that reason, lots of researches related to web survey have been performed. But these researches are just focused on finding out only items to be measured and the effect of web survey. In this paper, based on the service quality research model for information system outsourcing, we formalize and propose a web survey process, a system architecture, and a functional structure for information system outsourcing customer satisfaction survey. Additionally, we provide the implementation results for the web survey systems.

Assessment of Microbiological Quality of Outsourced School Meals (외부 운반 학교급식의 미생물학적 품질 평가)

  • Jeong, Hyun-Suk;Ryu, Kyung
    • Journal of the Korean Dietetic Association
    • /
    • v.18 no.4
    • /
    • pp.372-384
    • /
    • 2012
  • The purpose of this study was to provide a basic resource for establishment of hygienic management standards for meal delivery from the central kitchen to schools. Flow diagrams for delivery of food were analyzed, and time-temperature conditions of the food and environment were measured. Four different foods samples including Mexican salad, radish salad, stir-fried pork and vegetables, and stir-fried chicken and vegetables were collected after production and before service. Microbiological analysis was performed for aerobic plate counts (APC), Enterobacteriaceae, coliforms, E. coli, Salmonella spp., S. aureus, B. cereus, C. perfringens, and L. monocytogenes. After completion of production of cooked foods 2~3 hours were taken for the cooked foods to reach the temperature danger zone. Food temperatures at the meal service did not meet the recommended temperatures ($10/57^{\circ}C$) for conventional school food service systems. The highest APC counts were observed in radish salad (5.70 log CFU/g), followed by Mexican salad (5.18 log CFU/g). Enterobacteriaceae and coliform counts were within acceptable levels of those recommended by the UK Public Health Laboratory Service. No E. coli or pathogens were found. These results provide useful information for determination of microbiological hazards in school food service systems, and suggest that time-temperature control during delivery is necessary for the safety of cooked foods.

Outsourced Storage Auditing Scheme using Coefficient Matrix (계수행렬을 이용한 외부 스토리지 무결성 검증 기법)

  • Eun, Hasoo;Oh, Heekuck;Kim, Sangjin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.483-488
    • /
    • 2013
  • Users can access their data anywhere, at any time by using outsourced storage. But they cannot know how service provider manage the data. Even user cannot know when data damaged. To solve these problems, the outsourced storage auditing schemes has been proposed. Most proposed schemes are based on Homomorphic Verifiable Tags. But it has computational efficiency limitation because data used to exponent. In this paper, we propose a novel approach to outsourced storage auditing scheme using coefficient matrix. In the proposed scheme, data used to auditing by coefficient matrix form. Auditing procedures are proceed as solving the linear simultaneous equation. The auditor can audit easily by solving the equation using solution vector. The auditor can audit the n size data using sqrt(n) size data through out proposed scheme.

Effect of Consulting on Microcredit Repayment in Korea

  • OH, YOONHAE
    • KDI Journal of Economic Policy
    • /
    • v.37 no.3
    • /
    • pp.55-74
    • /
    • 2015
  • This study examines the effect of a one-on-one outsourced pre-lending consulting service on the repayment behavior of microcredit borrowers in Korea with administrative data from the Smile Microcredit Bank. A random change in the cut-off loan amount for mandatory consulting is utilized as an identification strategy. This three-day pre-lending business consulting service is effective in encouraging repayment behavior of existing businesses but it has no significant effect on start-up loans. The effectiveness of the consulting service in deterring delinquency with regard to existing loans is greater among male borrowers than among females.

  • PDF