The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmu...The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades.展开更多
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th...With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations.展开更多
Objective To explore the current situation of human resource management outsourcing in China’s pharmaceutical enterprises,and to put forward some suggestions for enterprises and the government.Methods The current sit...Objective To explore the current situation of human resource management outsourcing in China’s pharmaceutical enterprises,and to put forward some suggestions for enterprises and the government.Methods The current situation of human resource management outsourcing in China’s pharmaceutical enterprises was analyzed through the method of literature research.Results and Conclusion At present,the status of human resource management outsourcing in China’s pharmaceutical companies is that the level of human resource outsourcing companies is not high,and there are no relevant industry norms and laws.The information asymmetry between pharmaceutical enterprises and outsourcing companies results in adverse selection and moral hazard.Besides,the different culture of pharmaceutical enterprises and outsourcing companies leads to inefficient communication between enterprises and employee.To solve these problems,the government should promote and improve industry norms and laws to regulate the market.In addition,enterprises should clarify the motivation for outsourcing and make good decision on the outsourcing content.Meanwhile,enterprises should strengthen communication with employees to eliminate employees’concerns.展开更多
In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote clien...In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote client enterprises to complete outsourcing service actively. The incentive mechanism model of information security outsourcing is designed based on the principal-agent theory. Through analyzing the factors such as enterprise information assets value, invasion probability, information security environment, the agent cost coefficient and agency risk preference degree how to impact on the incentive mechanism, conclusions show that an enterprise information assets value and invasion probability have a positive influence on the fixed fee and the compensation coefficient; while information security environment, the agent cost coefficient and agency risk preference degree have a negative influence on the compensation coefficient. Therefore, the principal enterprises should reasonably design the fixed fee and the compensation coefficient to encourage information security outsourcing agency enterprises to the full extent.展开更多
For a clear understanding of how to foster necessary attributes of partnerships that promote a closer relationship for achieving outsourcing success,this paper tries to explore the role of interaction.Based on empiric...For a clear understanding of how to foster necessary attributes of partnerships that promote a closer relationship for achieving outsourcing success,this paper tries to explore the role of interaction.Based on empirical data from a logistics and procurement flat system outsourcing case and earlier research,the industrial network approach and the international marketing and purchasing interaction model are used to analyze the nature of interaction in a three-phased outsourcing life cycle,particularly,characteristics and activities of the transition phase are identified.The findings reveal that developing a relationship between partners requires an industrial network perspective.Improving the key aspects of interaction,information and knowledge sharing,communication and collaborative participation,involved in the important events of three phases would contribute to enhance the relationships performance.The key aspects of interaction should take place among the network actors and not just between buyers and vendors.展开更多
The purpose of this study is to quantify the rice harvest losses in China and to evaluate the impacts of machinery and harvest outsourcing services on these losses,given the background of high-speed mechanization and ...The purpose of this study is to quantify the rice harvest losses in China and to evaluate the impacts of machinery and harvest outsourcing services on these losses,given the background of high-speed mechanization and outsourcing services.Data were collected from a national survey conducted in 2016 by the research team in conjunction with the Research Center for the Rural Economy of the Ministry of Agriculture and Rural Affairs of China.A non-parametric method was used to test whether combine harvesting and outsourcing services could significantly reduce harvest losses.Next,quantile regression was used to estimate the real effects of machinery and outsourcing services on harvest losses.The analysis yielded four main study outcomes.First,the harvest loss rate of rice in China was 3.65%.Second,mechanical reaping and winnowing caused greater losses than manual methods,while the opposite was true of field transportation.Third,combine harvesting increased the losses.Fourth,the effects of an outsourcing service on losses differed among the different harvesting methods.Outsourcing services increased losses in segmented harvesting but they reduced losses in combine harvesting.展开更多
Certain outsourcing services for agricultural management in China,such as pest control in grain production,have experienced prolonged sluggishness,contrasting with the relatively high level of outsourcing services obs...Certain outsourcing services for agricultural management in China,such as pest control in grain production,have experienced prolonged sluggishness,contrasting with the relatively high level of outsourcing services observed in harvesting,land preparation,and sowing.This study examines the feasibility of implementing whole-step outsourcing in grain production by conducting a case study of rice and maize production in Jiangsu,Jilin,and Sichuan provinces in China.The provision of outsourcing services hinges on two essential conditions:technological advancements fostering specialized production and economies of scale,coupled with a market size sufficient to realize the aforementioned potential economies of scale.The results showed that outsourcing pest control or harvesting services had varying economies of scale.The outsourcing services in pest control were less common than in harvesting services,and their marginal growth space of the economies of scale with technological change was also smaller.Determined by the operational characteristics of pest control itself,the market scale of its professional services is small.Therefore,achieving the whole-step outsourcing of grain production necessitates not only technological innovation but also effective policy interventions to overcome the constraints of market scale.Such interventions include(1)optimizing crop layouts between planning regions and reducing land fragmentation and(2)supplying timely and effective inter-regional agricultural information for service providers aided by information technology.展开更多
To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on...To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on watermarking protocols.In an outsourcing scenario,existing schemes face two severe challenges:1)when data leakage occurs,there exists a probability that data provenance results can be repudiated,in which case data provenance tracking fails;and 2)when outsourced data are shared,data encryption transfer causes key management burden outside the schemes,and privacy leakage threatens users.In this paper,we propose a novel data provenance scheme with an improved LUT-based fingerprinting protocol,which integrates an asymmetric watermarking protocol,robust watermark algorithm and homomorphic encryption and digital signatures to achieve full non-repudiation provenance.We build an in-scheme stream cipher to protect outsourced multimedia data from privacy leakage and complicated key management.Our scheme is also lightweight and easy to deploy.Extensive security and performance analysis compares our scheme with the state of the art.The results show that our scheme has not only better provenance security and data confidentiality but also higher efficiency for multimedia outsourcing,sharing and provenance.展开更多
Outsnurcing computing allows users with resource-constrained devices tn outsnurce their complex computation wnrkloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the...Outsnurcing computing allows users with resource-constrained devices tn outsnurce their complex computation wnrkloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the outsourcing of composite modnlar exponentiation, which is one of the most complex computing tasks in discrete- log based cryptographic protocols. Unlike algorithms based on two untrusted servers, we outsnurce modular expnnentiation operation to only a single server, which eliminates the potential for a cnllusinn attack when using two servers. Moreover, our proposed algorithm can hide the base and exponent of the outsourced data, which prevents the exposure of sensitive information to clnud servers. In addition, compared with the state-of-the-art algorithms, our scheme has remarkably better checkability, The user could detect any misbehavior with a probability of one if the server returns a fault result.展开更多
This paper develops a conceptual model to assess effect of outsourcing by integrating the theories of industrial upgrading and global value chain (GVC) governance. Contrary to the widely accepted perception that outso...This paper develops a conceptual model to assess effect of outsourcing by integrating the theories of industrial upgrading and global value chain (GVC) governance. Contrary to the widely accepted perception that outsourcing is expected to generate positive spillover in particular, the findings indicate that outsourcing has different effects in different GVC governance modes. Excess outsourcing could structurally inhibit technology and management spillovers to subcontractors within the emerging economy context. Based on a case study of the Chinese textile and apparel (T & A) industry, it is found that the Chinese T & A industry has been trapped in the captive governance relationship with foreign buyers, and at the same time is capped below the function upgrading level. Consequences of the situation and implication are then discussed.展开更多
文摘The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades.
文摘With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations.
基金Graduate Education and Teaching Reform Project of Shenyang Pharmaceutical University(2020)(No.YJSJG200301).
文摘Objective To explore the current situation of human resource management outsourcing in China’s pharmaceutical enterprises,and to put forward some suggestions for enterprises and the government.Methods The current situation of human resource management outsourcing in China’s pharmaceutical enterprises was analyzed through the method of literature research.Results and Conclusion At present,the status of human resource management outsourcing in China’s pharmaceutical companies is that the level of human resource outsourcing companies is not high,and there are no relevant industry norms and laws.The information asymmetry between pharmaceutical enterprises and outsourcing companies results in adverse selection and moral hazard.Besides,the different culture of pharmaceutical enterprises and outsourcing companies leads to inefficient communication between enterprises and employee.To solve these problems,the government should promote and improve industry norms and laws to regulate the market.In addition,enterprises should clarify the motivation for outsourcing and make good decision on the outsourcing content.Meanwhile,enterprises should strengthen communication with employees to eliminate employees’concerns.
基金The National Natural Science Foundation of China(No.71071033)the Youth Foundation of Humanity and Social Scienceof Ministry of Education of China(No.11YJC630234)
文摘In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote client enterprises to complete outsourcing service actively. The incentive mechanism model of information security outsourcing is designed based on the principal-agent theory. Through analyzing the factors such as enterprise information assets value, invasion probability, information security environment, the agent cost coefficient and agency risk preference degree how to impact on the incentive mechanism, conclusions show that an enterprise information assets value and invasion probability have a positive influence on the fixed fee and the compensation coefficient; while information security environment, the agent cost coefficient and agency risk preference degree have a negative influence on the compensation coefficient. Therefore, the principal enterprises should reasonably design the fixed fee and the compensation coefficient to encourage information security outsourcing agency enterprises to the full extent.
文摘For a clear understanding of how to foster necessary attributes of partnerships that promote a closer relationship for achieving outsourcing success,this paper tries to explore the role of interaction.Based on empirical data from a logistics and procurement flat system outsourcing case and earlier research,the industrial network approach and the international marketing and purchasing interaction model are used to analyze the nature of interaction in a three-phased outsourcing life cycle,particularly,characteristics and activities of the transition phase are identified.The findings reveal that developing a relationship between partners requires an industrial network perspective.Improving the key aspects of interaction,information and knowledge sharing,communication and collaborative participation,involved in the important events of three phases would contribute to enhance the relationships performance.The key aspects of interaction should take place among the network actors and not just between buyers and vendors.
基金the 2015 Special Scientific Research Project of Grain Public Welfare Industry,China(201513004-2)the research grant from the Murata Science Foundation,JSPS KAKENHI,Japan(JP19H03063)the scholarship from China Scholarship Council(CSC201906350150)。
文摘The purpose of this study is to quantify the rice harvest losses in China and to evaluate the impacts of machinery and harvest outsourcing services on these losses,given the background of high-speed mechanization and outsourcing services.Data were collected from a national survey conducted in 2016 by the research team in conjunction with the Research Center for the Rural Economy of the Ministry of Agriculture and Rural Affairs of China.A non-parametric method was used to test whether combine harvesting and outsourcing services could significantly reduce harvest losses.Next,quantile regression was used to estimate the real effects of machinery and outsourcing services on harvest losses.The analysis yielded four main study outcomes.First,the harvest loss rate of rice in China was 3.65%.Second,mechanical reaping and winnowing caused greater losses than manual methods,while the opposite was true of field transportation.Third,combine harvesting increased the losses.Fourth,the effects of an outsourcing service on losses differed among the different harvesting methods.Outsourcing services increased losses in segmented harvesting but they reduced losses in combine harvesting.
基金supported by the National Natural Science Foundation of China(72103088)the National Social Science Fund of China(20&ZD094 and 21&ZD101).
文摘Certain outsourcing services for agricultural management in China,such as pest control in grain production,have experienced prolonged sluggishness,contrasting with the relatively high level of outsourcing services observed in harvesting,land preparation,and sowing.This study examines the feasibility of implementing whole-step outsourcing in grain production by conducting a case study of rice and maize production in Jiangsu,Jilin,and Sichuan provinces in China.The provision of outsourcing services hinges on two essential conditions:technological advancements fostering specialized production and economies of scale,coupled with a market size sufficient to realize the aforementioned potential economies of scale.The results showed that outsourcing pest control or harvesting services had varying economies of scale.The outsourcing services in pest control were less common than in harvesting services,and their marginal growth space of the economies of scale with technological change was also smaller.Determined by the operational characteristics of pest control itself,the market scale of its professional services is small.Therefore,achieving the whole-step outsourcing of grain production necessitates not only technological innovation but also effective policy interventions to overcome the constraints of market scale.Such interventions include(1)optimizing crop layouts between planning regions and reducing land fragmentation and(2)supplying timely and effective inter-regional agricultural information for service providers aided by information technology.
基金The authors would like to thank the anonymous referees for their valuable comments and helpful suggestions.The work is supported by the National Key Research and Development Program of China(No.2016YFB0800402)the National Natural Science Foundation of China(No.U1405254,No.U1536207).
文摘To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on watermarking protocols.In an outsourcing scenario,existing schemes face two severe challenges:1)when data leakage occurs,there exists a probability that data provenance results can be repudiated,in which case data provenance tracking fails;and 2)when outsourced data are shared,data encryption transfer causes key management burden outside the schemes,and privacy leakage threatens users.In this paper,we propose a novel data provenance scheme with an improved LUT-based fingerprinting protocol,which integrates an asymmetric watermarking protocol,robust watermark algorithm and homomorphic encryption and digital signatures to achieve full non-repudiation provenance.We build an in-scheme stream cipher to protect outsourced multimedia data from privacy leakage and complicated key management.Our scheme is also lightweight and easy to deploy.Extensive security and performance analysis compares our scheme with the state of the art.The results show that our scheme has not only better provenance security and data confidentiality but also higher efficiency for multimedia outsourcing,sharing and provenance.
文摘Outsnurcing computing allows users with resource-constrained devices tn outsnurce their complex computation wnrkloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the outsourcing of composite modnlar exponentiation, which is one of the most complex computing tasks in discrete- log based cryptographic protocols. Unlike algorithms based on two untrusted servers, we outsnurce modular expnnentiation operation to only a single server, which eliminates the potential for a cnllusinn attack when using two servers. Moreover, our proposed algorithm can hide the base and exponent of the outsourced data, which prevents the exposure of sensitive information to clnud servers. In addition, compared with the state-of-the-art algorithms, our scheme has remarkably better checkability, The user could detect any misbehavior with a probability of one if the server returns a fault result.
基金National Social Science Foundation of China(No.09CGJ011)the Fundamental Research Funds for the Central Universities,China
文摘This paper develops a conceptual model to assess effect of outsourcing by integrating the theories of industrial upgrading and global value chain (GVC) governance. Contrary to the widely accepted perception that outsourcing is expected to generate positive spillover in particular, the findings indicate that outsourcing has different effects in different GVC governance modes. Excess outsourcing could structurally inhibit technology and management spillovers to subcontractors within the emerging economy context. Based on a case study of the Chinese textile and apparel (T & A) industry, it is found that the Chinese T & A industry has been trapped in the captive governance relationship with foreign buyers, and at the same time is capped below the function upgrading level. Consequences of the situation and implication are then discussed.