Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ok-Ran Jeong is active.

Publication


Featured researches published by Ok-Ran Jeong.


Information Systems | 2011

The dark side of the Internet: Attacks, costs and responses

Won Ho Kim; Ok-Ran Jeong; Chulyun Kim; Jungmin So

The Internet and Web technologies have originally been developed assuming an ideal world where all users are honorable. However, the dark side has emerged and bedeviled the world. This includes spam, malware, hacking, phishing, denial of service attacks, click fraud, invasion of privacy, defamation, frauds, violation of digital property rights, etc. The responses to the dark side of the Internet have included technologies, legislation, law enforcement, litigation, public awareness efforts, etc. In this paper, we explore and provide taxonomies of the causes and costs of the attacks, and types of responses to the attacks.


international conference on ubiquitous information management and communication | 2008

Opinion mining of customer feedback data on the web

Dongjoo Lee; Ok-Ran Jeong; Sang-goo Lee

As people leave on the Web their opinions on products and services they have used, it has become important to develop methods of (semi-)automatically classifying and gauging them. The task of analyzing such data, collectively called customer feedback data, is known as opinion mining. Opinion mining consists of several steps, and multiple techniques have been proposed for each step. In this paper, we survey and analyze various techniques that have been developed for the key tasks of opinion mining. On the basis of our survey and analysis of the techniques, we provide an overall picture of what is involved in developing a software system for opinion mining.


international conference on ubiquitous information management and communication | 2008

A comparison of ontology reasoning systems using query sequences

Chul-ki Lee; Sungchan Park; Dongjoo Lee; Jaewon Lee; Ok-Ran Jeong; Sang-goo Lee

A number of ontology reasoning systems have been developed for reasoning and querying the semantic web. Since they implement different reasoning algorithms and optimization techniques, they differ in a number of ways. Previous attempts at comparing performance of ontology reasoning systems have mainly considered performances of individual query requests. In this paper, we present the results of testing four of the most popular ontology reasoning systems on query sequences that reflect real world use cases. We believe that using query sequences is a more effective way to evaluate ontology reasoning systems.


International Journal of Web Information Systems | 2011

Botnets: threats and responses

Ok-Ran Jeong; Chulyun Kim; Won Ho Kim; Jungmin So

Purpose – A botnet is a network of computers on the internet infected with software robots (or bots). There are numerous botnets, and some of them control millions of computers. Cyber criminals use botnets to launch spam e‐mails and denial of service attacks; and commit click fraud and data theft. Governments use botnets for political purposes or to wage cyber warfare. The purpose of this paper is to review the botnet threats and the responses to the botnet threats.Design/methodology/approach – The paper describes how botnets are created and operated. Then, the paper discusses botnets in terms of architecture, attacking behaviors, communication protocols, observable botnet activities, rally mechanisms, and evasion techniques. Finally, the paper reviews state‐of‐the‐art techniques for detecting and counteracting botnets, and also legal responses to botnet threats.Findings – Botnets have become the platform for many online threats such as spam, denial of service attacks, phishing, data thefts, and online fr...


international conference on web based learning | 2009

On Social e-Learning

Won Ho Kim; Ok-Ran Jeong

Social Web sites include social networking sites and social media sites. They make it possible for people to share user-created contents online and to interact and stay connected with their online people networks. The social features of social Web sites, appropriately adapted, can help turn e-learning into social e-learning and make e-learning significantly more effective. In this paper, we develop requirements for social e-learning systems. They include incorporating the many of the social features of social Web sites, accounting for all key stakeholders and learning subjects, and curbing various types of misuses by people. We also examine the capabilities of representative social e-learning Web sites that are available today.


database systems for advanced applications | 2012

Social community based blog search framework

Ok-Ran Jeong; Jehwan Oh

This study proposes a blog search framework which enables a more in-depth search on a given topic by extracting the collective intelligence features in social community sites and through the query extension using these features. The characteristics of blog contents is that it has a lot of information made up of user experience and trusted more by most users than the contents gained by general search. The proposed framework extends the query using the answer information related to the query which the user wishes to search and gets applied to the blog search on this basis. The information gained from various types of social community sites could be considered as one form of collective intelligence while this has been applied to the blog search. The framework proposed in this paper utilizes the important Q&A information of social community to let the user gain more reliable and useful search results.


International Journal of Data Warehousing and Mining | 2014

A Holistic View of Big Data

Won Kim; Ok-Ran Jeong; Chulyun Kim

Today there is much hype about big data. The discussions seem to revolve around data mining technology, social Web data, and the open source platform of NoSQL and Hadoop. However, database, data warehouse and OLAP technologies are also integral parts of big data. Big data involves data from all sources, not just social Web data. Further, big data requires not only technology, but also a painstaking process for identifying, collecting, and preparing sufficient amounts of relevant data. This paper provides a holistic view of big data.


Expert Systems With Applications | 2014

Determining the titles of Web pages using anchor text and link analysis

Ok-Ran Jeong; Jehwan Oh; Dong-Jin Kim; Heetae Lyu; Won Kim

Determining the titles of Web pages is an important element in characterizing and categorizing the vast number of Web pages. There are a few approaches to automatically determining the titles of Web pages. As an R&D project for Naver, the operator of Naver (Koreas largest portal site), we developed a new method that makes use of anchor texts and analysis of links among Web pages. In this paper, we describe our method and show experiment results of its performance.


international conference on data engineering | 2006

BestChoice: a decision support system for supplier selection in e-marketplaces

Dongjoo Lee; Taehee Lee; Suekyung Lee; Ok-Ran Jeong; Hyeonsang Eom; Sang-goo Lee

A growing number of companies are outsourcing their purchasing processes to independent purchasing agencies. These agencies now have to process an ever increasing number of purchase requests each day. The conventional methods of selecting the right suppliers for the purchase requests incur heavy human and time costs. We have designed and implemented BestChoice, a decision support system for supplier selection. It allows the evaluator to create rules for supplier evaluation based on the Multi Attribute Utility Theory, a theory for evaluating the utility of alternatives. BestChoice provides rule structures that can be saved and reused for similar selection cases. The architecture and selection rules of BestChoice are presented. Performance of BestChoice at one of the largest procurement agencies is analyzed.


information integration and web-based applications & services | 2010

On botnets

Won Ho Kim; Ok-Ran Jeong; Chulyun Kim; Jungmin So

A botnet is a network of computers on the Internet infected with software robots, bots. There are numerous botnets. Some of them control millions of computers. Botnets have become the platform for the scourge of the Internet, namely, spam e-mails, launch denial of service attacks, click fraud, theft of sensitive information, cyber sabotage, cyber warfare, etc. In this paper, we review the status of the botnets, how they work, and how they may be defeated.

Collaboration


Dive into the Ok-Ran Jeong's collaboration.

Top Co-Authors

Avatar

Won Ho Kim

Seoul National University Hospital

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eunseok Lee

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sang-goo Lee

Seoul National University

View shared research outputs
Top Co-Authors

Avatar

Dongjoo Lee

Seoul National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sang-Won Lee

Sungkyunkwan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge