default search action
Choon Seong Leem
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j21]Seung Hyun Lee, Choon Seong Leem, Dae Jung Bae:
The impact of technology capability, human resources, internationalization, market resources, and customer satisfaction on annual sales growth rates of Korean software firms. Inf. Technol. Manag. 19(3): 171-184 (2018) - 2013
- [j20]Choon Seong Leem, Byoung Gun Kim:
Taxonomy of ubiquitous computing service for city development. Pers. Ubiquitous Comput. 17(7): 1475-1483 (2013)
2000 – 2009
- 2008
- [j19]Choon Seong Leem, Byeong Wan Kim, Eun Jung Yu, Min Ho Paek:
Information technology maturity stages and enterprise benchmarking: an empirical study. Ind. Manag. Data Syst. 108(9): 1200-1218 (2008) - [c23]Byeong Ryul Lee, Seung Hyun Lee, Choon Seong Leem:
A Competitive-Perspective Evaluation Framework of Software Firms. NCM (2) 2008: 13-20 - [c22]Bae Soon Hark, Jong Hwa Choi, Choon Seong Leem:
A Database Design of RFID Document Management System with e-Ink technology. NCM (1) 2008: 14-17 - 2007
- [j18]Nam Joo Jeon, Choon Seong Leem, Min Hyung Kim, Hyoun Gyu Shin:
A taxonomy of ubiquitous computing applications. Wirel. Pers. Commun. 43(4): 1229-1239 (2007) - [c21]Yongju Cho, Changho Lee, Choon Seong Leem, Honzong Choi:
Development of Evaluation System for Management of Collaborative Information System in Mould Company. CSCWD 2007: 315-320 - [c20]Eun Jung Yu, Youngjoon Choi, Choon Seong Leem:
A User-Oriented Assessment of Enterprise Information Systems. HCI (4) 2007: 825-834 - 2006
- [j17]Yun Ji Na, Choon Seong Leem, Il Seok Ko:
ACASH: an adaptive web caching method based on the heterogeneity of web object and reference characteristics. Inf. Sci. 176(12): 1695-1711 (2006) - [c19]Hong Joo Lee, Choon Seong Leem, Sangkyun Kim:
A Study on the Development of Usability Evaluation Framework (Focusing on Digital TV). ICCSA (4) 2006: 716-725 - [c18]Hong Joo Lee, Choon Seong Leem, Sangkyun Kim:
A Study on Development of Business Factor in Ubiquitous Technology. KES (1) 2006: 1259-1266 - 2005
- [j16]Sangkyun Kim, Choon Seong Leem:
Enterprise security architecture in business convergence environments. Ind. Manag. Data Syst. 105(7): 919-936 (2005) - [j15]Sangkyun Kim, Choon Seong Leem:
Security of the internet-based instant messenger: Risks and safeguards. Internet Res. 15(1): 88-98 (2005) - [j14]Il Seok Ko, Choon Seong Leem, Yun Ji Na, Chui Young Yoon:
Distribution of digital contents based on public key considering execution speed and security. Inf. Sci. 174(3-4): 237-250 (2005) - [c17]Yongju Cho, Kwangyeol Ryu, Jongduk Kim, Sunghee Lee, Choon Seong Leem:
Business template generation for supporting collaborative design works in mould companies. CSCWD (2) 2005: 932-937 - [c16]Sang-ho Kim, Choon Seong Leem:
Security Threats and Their Countermeasures of Mobile Portable Computing Devices in Ubiquitous Computing Environments. ICCSA (4) 2005: 79-85 - [c15]Choon Seong Leem, Nam Joo Jeon, Jong Hwa Choi, Hyoun Gyu Shin:
A Business Model (BM) Development Methodology in Ubiquitous Computing Environments. ICCSA (4) 2005: 86-95 - [c14]Hong Joo Lee, Choon Seong Leem:
A Study on Value Chain in a Ubiquitous Computing Environment. ICCSA (4) 2005: 113-121 - [c13]Hakjoo Lee, Choon Seong Leem, Kyungyup Cha:
An Information System Approach and Methodology for Enterprise Credit Rating. ICCSA (3) 2005: 1269-1278 - [c12]Yongju Cho, Wooju Kim, Choon Seong Leem, Honzong Choi:
Development of a BSC-Based Evaluation Framework for e-Manufacturing Project. ICCSA (3) 2005: 1289-1296 - [c11]Eun Jung Yu, Choon Seong Leem, Seung-Kyu Park, Byung Wan Kim:
An Integrated Evaluation System for Personal Informatization Levels and Their Maturity Measuement: Korean Motors Company Case. ICCSA (3) 2005: 1306-1315 - [c10]Choon Seong Leem, Sangkyun Kim, Hong Joo Lee:
Assessment Methodology on Maturity Level of ISMS. KES (3) 2005: 609-615 - [c9]Hong Joo Lee, Sangkyun Kim, Choon Seong Leem:
CSFs for HCI in Ubiquitous Computing Environments. KES (3) 2005: 616-620 - 2004
- [j13]Chui Young Yoon, Choon Seong Leem:
Development of an evaluation system of personal e-business competency and maturity levels. Int. J. Electron. Bus. 2(4): 404-437 (2004) - [j12]Choon Seong Leem, Hyung Sik Suh, Dae Seong Kim:
A classification of mobile business models and its applications. Ind. Manag. Data Syst. 104(1): 78-87 (2004) - [j11]Choon Seong Leem, Injoo Kim:
An integrated evaluation system based on the continuous improvement model of IS performance. Ind. Manag. Data Syst. 104(2): 115-128 (2004) - [j10]Choon Seong Leem, YongKi Yoon:
A maturity model and an evaluation system of software customer satisfaction: the case of software companies in Korea. Ind. Manag. Data Syst. 104(4): 347-354 (2004) - [j9]Choon Seong Leem, Matthew K. O. Lee, Sungwan Hong:
Guest Editorial. Inf. Syst. Frontiers 6(4): 295-295 (2004) - [j8]Il Seok Ko, Choon Seong Leem:
An Improvement of Response Speed for Electronic Commerce Systems. Inf. Syst. Frontiers 6(4): 313-323 (2004) - [j7]Choon Seong Leem, Chui Young Yoon, Seung-Kyu Park:
A Process-Centered IT ROI Analysis with a Case Study. Inf. Syst. Frontiers 6(4): 369-383 (2004) - [c8]Sangkyun Kim, Choon Seong Leem:
Implementation of the Security System for Instant Messengers. CIS 2004: 739-744 - [c7]Sangkyun Kim, Choon Seong Leem:
A Case Study on the Real-Time Click Stream Analysis System. CIS 2004: 788-793 - [c6]Sangkyun Kim, Choon Seong Leem:
An Information Engineering Methodology for the Security Strategy Planning. ICCSA (1) 2004: 597-607 - [c5]Sang-ho Kim, Choon Seong Leem:
A Case Study in Applying Common Criteria to Development Process of Virtual Private Network. ICCSA (1) 2004: 608-616 - [c4]Sang-ho Kim, Choon Seong Leem:
A Case Study in Applying Common Criteria to Development Process to Improve Security of Software Products. ICCSA (1) 2004: 1069-1077 - [c3]Sangkyun Kim, Hong Joo Lee, Choon Seong Leem:
Architecture of Authentication Mechanism for Emerging T-commerce Environments. PCM (1) 2004: 540-547 - 2003
- [c2]Sang-ho Kim, Eun-ser Kim, Choon Seong Leem, Ho-jun Shin, Tai-Hoon Kim:
SSE-CMM BPs to Meet the Requirements of ALC_DVS.1 Component in CC. ISCIS 2003: 1069-1075 - [c1]Sang-ho Kim, Choon Seong Leem, Tai-Hoon Kim, Jae-Sung Kim:
Supplement of Security-Related Parts of ISO/IEC TR 15504. ISCIS 2003: 1084-1089 - 2002
- [j6]Choon Seong Leem, Cho-Li Wang:
Special section on Industrial information systems: progresses and perspectives in Pacific Rim. J. Syst. Softw. 60(3): 183- (2002) - [j5]Kitae Shin, Choon Seong Leem:
A reference system for internet based inter-enterprise electronic commerce. J. Syst. Softw. 60(3): 195-209 (2002) - [j4]Choon Seong Leem, Sangkyun Kim:
Introduction to an integrated methodology for development and implementation of enterprise information systems. J. Syst. Softw. 60(3): 249-261 (2002) - [p1]Choon Seong Leem:
Service Industries, Electronic Commerce for. Encyclopedia of Information Systems 2002: 71-87 - 2001
- [j3]Choon Seong Leem, Kitae Shin:
Guest Editorial. J. Syst. Integr. 10(3): 187 (2001) - [j2]Choon Seong Leem, Bumyong Oh:
Evaluating Information Strategic Planning: An Evaluation System and Its Application. J. Syst. Integr. 10(3): 207-222 (2001) - [j1]Jae Geun Ahn, Choon Seong Leem, Jung Hwan Yang:
A Framework for Certification and Audit of Application Service Provider - ASP. J. Syst. Integr. 10(3): 239-252 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint