Ok-Ran Jeong
Gachon University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ok-Ran Jeong.
Information Systems | 2011
Won Ho Kim; Ok-Ran Jeong; Chulyun Kim; Jungmin So
The Internet and Web technologies have originally been developed assuming an ideal world where all users are honorable. However, the dark side has emerged and bedeviled the world. This includes spam, malware, hacking, phishing, denial of service attacks, click fraud, invasion of privacy, defamation, frauds, violation of digital property rights, etc. The responses to the dark side of the Internet have included technologies, legislation, law enforcement, litigation, public awareness efforts, etc. In this paper, we explore and provide taxonomies of the causes and costs of the attacks, and types of responses to the attacks.
international conference on ubiquitous information management and communication | 2008
Dongjoo Lee; Ok-Ran Jeong; Sang-goo Lee
As people leave on the Web their opinions on products and services they have used, it has become important to develop methods of (semi-)automatically classifying and gauging them. The task of analyzing such data, collectively called customer feedback data, is known as opinion mining. Opinion mining consists of several steps, and multiple techniques have been proposed for each step. In this paper, we survey and analyze various techniques that have been developed for the key tasks of opinion mining. On the basis of our survey and analysis of the techniques, we provide an overall picture of what is involved in developing a software system for opinion mining.
international conference on ubiquitous information management and communication | 2008
Chul-ki Lee; Sungchan Park; Dongjoo Lee; Jaewon Lee; Ok-Ran Jeong; Sang-goo Lee
A number of ontology reasoning systems have been developed for reasoning and querying the semantic web. Since they implement different reasoning algorithms and optimization techniques, they differ in a number of ways. Previous attempts at comparing performance of ontology reasoning systems have mainly considered performances of individual query requests. In this paper, we present the results of testing four of the most popular ontology reasoning systems on query sequences that reflect real world use cases. We believe that using query sequences is a more effective way to evaluate ontology reasoning systems.
International Journal of Web Information Systems | 2011
Ok-Ran Jeong; Chulyun Kim; Won Ho Kim; Jungmin So
Purpose – A botnet is a network of computers on the internet infected with software robots (or bots). There are numerous botnets, and some of them control millions of computers. Cyber criminals use botnets to launch spam e‐mails and denial of service attacks; and commit click fraud and data theft. Governments use botnets for political purposes or to wage cyber warfare. The purpose of this paper is to review the botnet threats and the responses to the botnet threats.Design/methodology/approach – The paper describes how botnets are created and operated. Then, the paper discusses botnets in terms of architecture, attacking behaviors, communication protocols, observable botnet activities, rally mechanisms, and evasion techniques. Finally, the paper reviews state‐of‐the‐art techniques for detecting and counteracting botnets, and also legal responses to botnet threats.Findings – Botnets have become the platform for many online threats such as spam, denial of service attacks, phishing, data thefts, and online fr...
international conference on web based learning | 2009
Won Ho Kim; Ok-Ran Jeong
Social Web sites include social networking sites and social media sites. They make it possible for people to share user-created contents online and to interact and stay connected with their online people networks. The social features of social Web sites, appropriately adapted, can help turn e-learning into social e-learning and make e-learning significantly more effective. In this paper, we develop requirements for social e-learning systems. They include incorporating the many of the social features of social Web sites, accounting for all key stakeholders and learning subjects, and curbing various types of misuses by people. We also examine the capabilities of representative social e-learning Web sites that are available today.
database systems for advanced applications | 2012
Ok-Ran Jeong; Jehwan Oh
This study proposes a blog search framework which enables a more in-depth search on a given topic by extracting the collective intelligence features in social community sites and through the query extension using these features. The characteristics of blog contents is that it has a lot of information made up of user experience and trusted more by most users than the contents gained by general search. The proposed framework extends the query using the answer information related to the query which the user wishes to search and gets applied to the blog search on this basis. The information gained from various types of social community sites could be considered as one form of collective intelligence while this has been applied to the blog search. The framework proposed in this paper utilizes the important Q&A information of social community to let the user gain more reliable and useful search results.
International Journal of Data Warehousing and Mining | 2014
Won Kim; Ok-Ran Jeong; Chulyun Kim
Today there is much hype about big data. The discussions seem to revolve around data mining technology, social Web data, and the open source platform of NoSQL and Hadoop. However, database, data warehouse and OLAP technologies are also integral parts of big data. Big data involves data from all sources, not just social Web data. Further, big data requires not only technology, but also a painstaking process for identifying, collecting, and preparing sufficient amounts of relevant data. This paper provides a holistic view of big data.
Expert Systems With Applications | 2014
Ok-Ran Jeong; Jehwan Oh; Dong-Jin Kim; Heetae Lyu; Won Kim
Determining the titles of Web pages is an important element in characterizing and categorizing the vast number of Web pages. There are a few approaches to automatically determining the titles of Web pages. As an R&D project for Naver, the operator of Naver (Koreas largest portal site), we developed a new method that makes use of anchor texts and analysis of links among Web pages. In this paper, we describe our method and show experiment results of its performance.
international conference on data engineering | 2006
Dongjoo Lee; Taehee Lee; Suekyung Lee; Ok-Ran Jeong; Hyeonsang Eom; Sang-goo Lee
A growing number of companies are outsourcing their purchasing processes to independent purchasing agencies. These agencies now have to process an ever increasing number of purchase requests each day. The conventional methods of selecting the right suppliers for the purchase requests incur heavy human and time costs. We have designed and implemented BestChoice, a decision support system for supplier selection. It allows the evaluator to create rules for supplier evaluation based on the Multi Attribute Utility Theory, a theory for evaluating the utility of alternatives. BestChoice provides rule structures that can be saved and reused for similar selection cases. The architecture and selection rules of BestChoice are presented. Performance of BestChoice at one of the largest procurement agencies is analyzed.
information integration and web-based applications & services | 2010
Won Ho Kim; Ok-Ran Jeong; Chulyun Kim; Jungmin So
A botnet is a network of computers on the Internet infected with software robots, bots. There are numerous botnets. Some of them control millions of computers. Botnets have become the platform for the scourge of the Internet, namely, spam e-mails, launch denial of service attacks, click fraud, theft of sensitive information, cyber sabotage, cyber warfare, etc. In this paper, we review the status of the botnets, how they work, and how they may be defeated.