Seung Ryul Jeong

Seung Ryul Jeong
Kookmin University · Graduate School of Business Information Technology (GSBIT)

About

109
Publications
81,557
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,893
Citations

Publications

Publications (109)
Conference Paper
Full-text available
As children begin to use the internet more frequently and freely, they are more likely to find inappropriate content while searching. In order to prevent this, some researchers have proposed safe search approaches that have safe modes to allow no inappropriate content to the children. However, there is research exploring the properties of ontologic...
Conference Paper
An effective business and information technology (IT) strategy has a significant impact on organizational performance. This study examines the impact of Nepal Telecom’s business and IT strategy on organizational performance. The study is based on primary data and employs descriptive and analytical research design to examine the impact of independen...
Conference Paper
Full-text available
Blockchain as a disruptive technology has gained great deal of attention from scholars. Blockchain technology is now widely used in several fields, such as social media networks, financial transactions, healthcare etc. However, users of social media networks are still concerned about the information security and privacy regarding blockchain technol...
Article
Full-text available
Recent advancements in the Internet of Things and Machine Learning techniques have allowed the deployment of sensors on a large scale to monitor the environment and model and predict individual thermal comfort. The existing techniques have a greater focus on occupancy detection, estimations, and localization to balance energy usage and thermal comf...
Article
Full-text available
Forecasting on success or failure of software has become an interesting and, in fact, an essential task in the software development industry. In order to explore the latest data on successes and failures, this research focused on certain questions such as is early phase of the software development life cycle better than later phases in predicting s...
Chapter
This work presents preliminary analysis and design of the tourism recom-mender system. The work considers Pokhara city of Nepal as the domain of study as it is the second-largest city and tourism capital of Nepal. The work is built on data from travel websites, published and unpublished reports, literature, and a pilot study conducted in the same c...
Article
Full-text available
Smart building technology incorporates efficient and automated controls and applications that use smart energy products, networked sensors, and data analytics software to monitor environmental data and occupants’ energy consumption habits to improve buildings’ operation and energy performance. Smart technologies and controls are becoming increasing...
Article
Full-text available
This work assesses the degree of satisfaction tourists receive as final recipients in a tourism destination based on the fact that satisfied tourists can make a significant contribution to the growth and continuous improvement of a tourism business. The work considers Pokhara, the tourism capital of Nepal as a prefecture of study. A stratified samp...
Chapter
Full-text available
TripAdvisor is a famous social and travel site that helps people to arrange for different products and services in a destination. This work is an attempt to analyze the TripAdvisor data for the years 2018 to 2020 to find out interesting features, reviews, and aspects embedded in it. The work employs an unsupervised machine learning approach to disc...
Chapter
Full-text available
This work presents preliminary analysis and design of the tourism recommender system. The work considers Pokhara city of Nepal as the domain of study as it is the second-largest city and tourism capital of Nepal. The work is built on data from travel websites, published and unpublished reports, literature, and a pilot study conducted in the same ci...
Article
Full-text available
A well-designed website is mandatory for good marketing and proper tourism business. This research considers Nepal as a domain of study and specifically explores welcomenepal.com, the official tourism portal as a reference for the study. The work is based on the study of the existing literature, user-survey, and technical testing of the website usi...
Article
Full-text available
Digitalization and the inter-connectedness of business systems have increased the dependency between business entities. The ever-changing environment and business demands have increased competition and collaboration among diverse entities, which have forced the concept of ecosystems models. This work highlights the need for a digital tourism busine...
Article
Full-text available
This paper presents a review of the ensemble learning models proposed for web services classification, selection, and composition. Web service is an evolutionary research area, and ensemble learning has become a hot spot to assess web services' earlier mentioned aspects. The proposed research aims to review the state of art approaches performed on...
Article
Full-text available
Regression testing, as an important part of the software life cycle, ensures the validity of modified software. Researchers’ focus of this research is on functional requirement-based ‘Test Case Prioritization’ (TCP) because requirement specifications help keep the software correctness on customers’ perceived priorities. This research study is aimed...
Article
Full-text available
PurposeThe coronavirus 2019 (COVID-19) pandemic has rapidly spread worldwide, with an ever-increasing number of confirmed positive cases and mortality rate. Moreover, frontline medical staff fighting with the COVID-19 infection have been infected and show psychological effects of the pandemic. This study presents an overview of the emerging literat...
Conference Paper
Religion is a very sensitive issue and it can lead to chaos and turmoil that may cause serious risk and social disturbance for tourist if they are not aware of religious norms and sensitivity in a religious destination. Further, the issues of panhandling, selling fake items, charging excessive amounts and abusing females and children's in meditatio...
Article
Full-text available
This work analyses the impact of social network sites on the life of a university student in terms of intensity of use, personal life satisfaction, social trust, social expression and physical health. Study is based on close end survey design and consists of one hundred and fifty-four (154) respondents of four constituent campuses of Pokhara Univer...
Chapter
Full-text available
Tourism websites are the face of the tourism industry and tourism websites must be well designed to meet user expectations. This work evaluates and analyzes the user requirements to propose design solutions and recommendations for the tourism website of Nepal. The study is drawn on the basis closed-end survey and technical testing of the official t...
Article
Full-text available
The dynamic behavior of web services is critical for researchers to determine their performance at different times. Many existing studies present the static information of web services that are not so effective for estimating web services' future performance. This research article reveals the acquisition of throughput metric dataset for thirty time...
Conference Paper
Religion is a very sensitive issue and it can lead to chaos and turmoil that may cause serious risk and social disturbance for tourist if they are not aware of religious norms and sensitivity in a religious destination. Further, the issues of panhandling, selling fake items, charging excessive amounts and abusing females and children's in meditatio...
Conference Paper
Full-text available
Religious tourism is a special category of tourism that holds a special place in the tourism business of Nepal. This work proposes the analysis and design of the religious tourism recommender system for Nepal. The work is built by analyzing the core requirements of tourist and religious tourism destinations through tourist interviews and literature...
Conference Paper
Full-text available
Agriculture is the main industry of Nepal which is challenged at current times due rate of farmer's dissatisfaction leading to ageing problem, workforce migration and lack of interest of the current generation in this sector. Farmers till date get very less return on their product and services compared to the market price. Lack of proper informatio...
Chapter
Full-text available
ICT tools and technologies are important components of business today. Tourism industry finds massive application of these technologies in the promotion, management, planning and execution of tourism business. The recent studies have shown that more and more tourist around the world use social applications, tourism applications, emails, web sites t...
Article
Full-text available
Nepal is a sensitive and disaster-prone country where safety and security risk are of high concern for travelers. Digital technologies can play a vital role in addressing safety and security issues in the country. This research work proposes a Digital tourism security system design for addressing the safety and security issues in tourism industry o...
Article
Full-text available
Regression testing is a widely studied research area, with the aim of meeting the quality challenges of software systems. To achieve a software system of good quality, we face high consumption of resources during testing. To overcome this challenge, test case prioritization (TCP) as a sub-type of regression testing is continuously investigated to a...
Article
Full-text available
The application of Internet technology has created enormous impact on banking sector with the implementation of many techno-oriented services like Internet banking, EFT, branchless banking, Automated Clearing House (ACH) transactions etc. Study of customer's attitude in terms of trust, perceived risk and ease of use of a particular technology is as...
Chapter
Full-text available
Tourism security has become a matter of great concern over the years for tourist around the world and this attribute plays an important role in the selection of a destination. The application of technology can greatly enhance safety and security environment of a tourist in a particular destination. This work proposes the analysis and design of a mo...
Conference Paper
Full-text available
Tourism web sites and web portals are the most important tools for growth and development of tourism business. This paper present the analysis, design and development of tourism web portal for Nepal based on UML approach. The web portal requirements were gathered from three different entities that included inbound and outbound tourist, tourism gove...
Article
Full-text available
Test Case Prioritization (TCP) involves the rearrangement of test cases on a prioritized basis for various services. This research work focuses on TCP in web services, as it has been a growing challenge for researchers. Web services continuously evolve and hence require reforming and re-execution of test cases to ensure the accurate working of web...
Article
Full-text available
Performance anomaly detection is the process of identifying occurrences that do not conform to expected behavior or correlate with other incidents or events in time series data. Anomaly detection has been applied to areas such as fraud detection, intrusion detection systems, and network systems. In this paper, we propose an anomaly detection framew...
Conference Paper
Full-text available
Tourism is the second biggest industry of Nepal and it serves as the primary source of business and employment in the country. The ICT boom around the globe has a poor state in Nepal and the country lacks behind in digital service implementations. The global pressure has forced Nepalese tourism industry and Government organizations to implement ICT...
Conference Paper
ICT has played a vital role in the business development and has brought profound changes in the business practices around the world. The huge potential and unmatched power of ICT allows business houses to grow their business sphere beyond their capabilities. Many industries have witnessed a big transition due to application of ICT. Tourism is one s...
Article
Recommender systems face cold start problem at the time of inception which researchers have addressed by transferring rating knowledge from auxiliary to target domain, hence laying the foundation of cross domain recommender systems (CDRS). Recently social media has been utilized as a potential auxiliary domain for recommender systems because they p...
Article
Full-text available
Information and Communication Technology (ICT) has revolutionized the world and has profound impact on the social and economic development of a country. Implementation, practice and accessibility of ICT is viewed as an integral part of any countries’ strategy today. These new technologies are becoming popular due to their ability to produce, distri...
Article
Recently IT service projects have increased to introduce new technology as like data analytics, IoT (Internet of Things), cloud and mobile computing and to change or improve business process of finance, manufacturing, service, and government and public organizations, but lots of projects were failed due to cost-overrun, schedule delay, and fail to...
Article
Company A, an embedded system manufacturer, has been managing multiple development projects. Executives need to understand the risk level of every project and prioritize resource distribution. Traditional project monitoring tools or excel sheets are too complex for calculating the risk factors across a functional organization. Two new charts, "Spea...
Article
Like natural climate change on the planet earth, the climate in software development environments is also changing (fast). Like the natural weather, the software environment is also disruptive. As the climate experts alert and suggest taking necessary measures to overcome certain challenges to make this earth a safer and comfortable living place, l...
Article
Full-text available
SOA has been adopted by enormous number of organizations world-wide. This study has investigated significant factors which affect SOA adoption in positive and negative manner. Unlike the previous similar studies, where they focused on qualitative analysis for SOA adoption, this study conducted a quantitative analysis to investigate the relationship...
Article
Full-text available
Social media is most prominent internet transition for this decade and Facebook holds its largest share. Facebook has been utilized by researchers from different perspectives e.g. opinion mining, user mood swing pattern, influential person identification etc. whereas recently Facebook’s social interactions were used for recommendation purposes. Alt...
Article
Recently, converging Big Data and IoT(Internet of Things)has become mainstream, and public sector is no exception. In particular, this combinationis applicable to crime prevention in Korea. Crime prevention has evolved from CPTED (Crime Prevention through Environmental Design) to ubiquitous crime prevention;however, such a physical engineering meth...
Article
Full-text available
Recently researchers have used “conversation prism” and “social media prisma”, to consolidate social medias with respect to their use. Although both identified 25 types, having average five examples each, they did not identify contribution of each type in academic research. Moreover some of mentioned social services had been suspended or changed. I...
Article
Full-text available
Testing is always important for Software Quality Assurance (SQA) activities and key cost multiplier in software development. The decision to automate or not to automate a test case is critical. In this paper we discuss the possibility of test automation and in relation to the trade-off between manual and automated test cases. We purpose a Productio...
Article
Full-text available
Purpose – The purpose of this paper is to mine competitive intelligence in social media to find the market insight by comparing consumer opinions and sales performance of a business and one of its competitors by analyzing the public social media data. Design/methodology/approach – An exploratory test using a multiple case study approach was used t...
Chapter
Full-text available
Nowadays, since business environment is highly dynamic, software necessities are continuously being improved in order to meet the needs of modern industrialized world. Therefore, IT organizations seek for a quick way of software delivery and for adapting to the necessary technological changes. From this ideal viewpoint, traditional plan-driven deve...
Article
Full-text available
Testing is always important for Software Quality Assurance (SQA) activities and key cost multiplier in software development. The decision to automate or not to automate a test case is critical. In this paper we discuss the possibility of test automation and in relation to the trade-off between manual and automated test cases. We purpose a Productio...
Conference Paper
Full-text available
The increased use of Information and Communication Technology (ICT) is playing a vital role in the development of a nation. ICT has revolutionized the world and has brought profound impact on the social and economic development of a country. Implementation, practice and accessibility of ICT is viewed as an integral part of any countries' strategy t...
Article
Full-text available
21st century has seen a tremendous advancement in the field of Information and Communication Technology. The commercial utilization of Internet tools and technologies has brought change in the traditional working environment. The functioning in an electronic environment is far more complicated than working in traditional environment and this brings...
Article
With the increasing influence of online media, company websites have become important communication channels between companies and customers. Companies use their websites as a marketing tool for a variety of purposes, including enhancing their image and selling products or services. Many researchers have examined the criteria, methods, and tools fo...
Article
Nowadays, online word-of-mouth has become a powerful influencer to marketing and sales in business. Opinion mining and sentiment analysis is frequently adopted at market research and business analytics field for analyzing word-of-mouth content. However, there still remain several challengeable areas for 1) sentiment analysis aiming for Korean word-...
Article
Full-text available
Delays in the user acceptance of information technology (IT) service projects in Korea have occurred frequently due to various risk factors. User acceptance delays may hinder the achievement of the client's project objectives and cause schedule delays or cost overruns. Furthermore, the client may impose a delay charge and claim for additional damag...
Article
Full-text available
In web searching, trustable and precise results are greatly affected by the inherent uncertainty in the input queries. Queries submitted to search engines are by nature ambiguous and constitute a significant proportion of the instances given to web search engines. Ambiguous queries pose real challenges for the web search engines due to versatility...
Article
Social media have emerged as new communication channels between consumers and companies that generate a large volume of unstructured text data. This social media content, which contains consumers’ opinions and interests, is recognized as valuable material from which businesses can mine useful information; consequently, many researchers have reporte...
Article
Full-text available
Building secure software is about taking security into account during all phases of software development. However, the major problem in agile methods is the lack of basic security elements in their phases and practices. One of such method is Dynamic System Development Method (DSDM).Based on this study, we have observed that the original/traditional...
Article
After emergence of Internet, social media with highly interactive Web 2.0 applications has provided very user friendly means for consumers and companies to communicate with each other. Users have routinely published contents involving their opinions and interests in social media such as blogs, forums, chatting rooms, and discussion boards, and the...
Conference Paper
This paper proposes a workflow instance classification framework that classifies a huge amount of workflow instances into a set of temporal ordered process control-paths in a corresponding workflow model. The proposed framework consists of two-phases: control-path analyzing phase and control-path filtering phase. The analyzing phase is to automatic...
Conference Paper
As the increasing influence of online media, companies' websites became important communication channels between companies and customer. Company utilizes it as a marketing tool for a variety of purposes including promoting its brand or selling products or services and can gain a competitive advantage. Many researchers have reported criteria, method...
Conference Paper
The commercial utilization of internet tools and technologies has brought change in the traditional working environment. The functioning in the electronic environment is far more complicated then working in traditional environment and brings many challenges, threats and potential problems. This paper is an attempt to analyze these challenges, threa...
Conference Paper
This paper proposes a workflow instance classification framework that classifies a huge amount of workflow instances into a set of temporal ordered process control-paths in a corresponding workflow model. The proposed framework consists of two phases—control-path analyzing phase and control-path filtering phase. The analyzing phase is to automatica...
Article
Full-text available
Risk factors are the reason behind cost overruns and delays in long-term large-scale IT service projects. Major risks originate from the integration of complex IT system components, including software, hardware, and solutions; the competitive bidding process; the turnkey and firm-fixed price nature of contracts; and the project execution environmen...
Article
Risks are involved in all phases of the software life cycle, and due to these risks, software can face various problems that can cause different negative outcomes and sometimes, in extreme cases, the failure of the software. Most of these risks lie in the legacy software migration process. These risks can create many problems, and in the worst case...
Article
The term "big data" has recently gained widespread attention in the field of information technology (IT). One of the key challenges in making use of big data lies in finding ways to uncover relevant and valuable information. The high volume, velocity, and variety of big data hinder the use of solutions that are available for smaller datasets, which...
Article
Full-text available
In collaborative filtering (CF) recommender systems, existing techniques frequently focus on determining similarities among users’ historical interests. This generally refers to situations in which each user normally plays a single role and his/her taste remains consistent over the long term. However, we note that existing techniques have not been...
Article
Full-text available
This paper introduces an enhanced Feature Driven Development (FDD) model for secure software development. In fact, the enhanced model is based on our previous study and its findings which concluded that existing FDD poses limitations to develop secure software. Thus, an enhanced FDD that supports secure software development is proposed. We have imp...
Article
This study was conducted to empirically examine the impact of fit between project radicalness and innovativeness of the supply chain on the degree of supply chain integration. In order to test the research hypotheses, a survey was employed. The results show that the degree of supply chain integration varies on the fit between project radicalness an...
Article
Full-text available
Agile methodologies have gained recognition as efficient development processes through their quick delivery of software, even under time constraints. However, like other agile methods such as Scrum, Extreme Programming (XP) and The Dynamic Systems Development Method (DSDM), Feature Driven Development (FDD) has been criticized due to the unavailabil...
Article
Scrum is one of the most popular and efficient agile development methods. However, like other agile methods such as Extreme Programming (XP), Feature Driven Development (FDD), and the Dynamic Systems Development Method (DSDM), Scrum has been criticized because of lack of support to develop secure software. Thus, in 2011, we published research propo...
Article
Today, the amount of data stored in applications and large data warehouse increases exponentially every year. Thus, organizations face numerous related problems, such as rapid increases in management load, service deterioration, increasing storage costs, shorter server upgrade cycles, and so on. To solve these problems, this paper presents the info...
Article
Agile methodologies have gained recognition in recent years as being efficient development processes through their quick delivery of software, even under time constraints. Agile methodologies consist of a few process models that have their own criteria in helping different types of projects. However, agile methods such as Scrum, Feature-Driven Deve...
Chapter
In light of recent research that has begun to examine the link between textual "big data" and social phenomena such as stock price increases, this chapter takes a novel approach to treating news as big data by proposing the intelligent investment decision-making support model based on opinion mining. In an initial prototype experiment, the research...