Follow
Jongkil Jay Jeong
Jongkil Jay Jeong
Other namesJongkil Jeong, Jong Kil Jeong, Jay Jeong
Senior Research Fellow, University of Melbourne
Verified email at unimelb.edu.au - Homepage
Title
Cited by
Cited by
Year
Towards an improved understanding of human factors in cybersecurity
J Jeong, J Mihelcic, G Oliver, C Rudolph
2019 IEEE 5th International Conference on Collaboration and Internet …, 2019
832019
The Importance of Social Identity on Password Formulations
M Grobler, MAP Chamikara, J Abbott, JJ Jeong, S Nepal, C Paris
Personal and Ubiquitous Computing 25 (5), 813-827, 2020
162020
Psychological Contract in IT Outsourcing: A Systematic Literature Review
J Jeong, S Kurnia, D Samson, S Cullen
Hawaii International Conference on System Sciences (HICSS) 2018, 2018
122018
Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis
JJ Jeong, Y Zolotavkin, R Doss
ACM Computing Surveys 55 (6), 1-31, 2023
92023
Exploring the current status of call centre offshoring research: a research agenda and future directions
J Jeong, S Kurnia, N Bekmamedova
Australasian Conference on Information Systems (ACIS) 2012, 2012
72012
Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials
N Lalchandani, F Jiang, JJ Jeong, Y Zolotavkin, R Doss
2021 18th International Conference on Privacy, Security and Trust (PST), 1-7, 2021
42021
The current state of research on people, culture and cybersecurity
JJ Jeong, G Oliver, E Kang, S Creese, P Thomas
Personal and Ubiquitous Computing 25 (5), 809-812, 2021
42021
Enhancing the Application and Measurement of Relationship Quality in Future IT Outsourcing studies.
JJ Jeong, S Kurnia, D Samson, S Cullen
European Conference on Information Systems (ECIS) 2018, 2018
42018
How hackers can use message mirroring apps to see all your SMS texts — and bypass 2FA security
S Shah, J Jeong, R Doss
https://theconversation.com/how-hackers-can-use-message-mirroring-apps-to …, 2021
32021
Fuzzy logic application to link national culture and cybersecurity maturity
J Jeong, M Grobler, MAP Chamikara, C Rudolph
2019 IEEE 5th International Conference on Collaboration and Internet …, 2019
22019
Horizon Scan Report: Development of next generation authentication technologies
JJ Jeong, Y Zolotavkin, M Warren
Cyber Security Cooperative Research Centre, 2019
22019
Towards quantum‐secure software defined networks
MR Nosouhi, K Sood, V Chamola, JJ Jeong, A Gaddam
IET Quantum Communication 5 (1), 66-71, 2024
12024
Towards Higher Levels of Assurance in Remote Identity Proofing
A Nanda, SWA Shah, JJ Jeong, R Doss, J Webb
IEEE Consumer Electronics Magazine, 2023
12023
Improving Unlinkability of Attribute-based Authentication through Game Theory
Y Zolotavkin, JJ Jeong, V Kuchta, M Slavnenko, R Doss
ACM Transactions on Privacy and Security 25 (2), 1-36, 2022
12022
The Critical Success Factors of Managing Insourced Chinese IT Teams in Cross-cultural Environments
P Sinclair, JJ Jeong
Pacific Asia Conference on Information Systems (PACIS), 2022
12022
Enhancing Privacy through DMMA: Decision-Making Model for Authentication
M Slavnenko, V Kuchta, J Jeong, Y Zolotavkin, R Doss
IEEE International Conference on Trust, Security and Privacy in Computing …, 2021
1*2021
Examining usable security features and user perceptions of Physical Authentication Devices
A Nanda, JJ Jeong, SWA Shah, M Nosouhi, R Doss
Computers & Security 139, 103664, 2024
2024
Horizon Scan Report: Privacy Respecting and Compliant Digital Credential Wallet
JJ Jeong, R Doss, M Abdelrazek, L Yang, A Dinh, P Gauravaram
Cyber Security Cooperative Research Centre, 2023
2023
New directions in convergence computing
J Yoo, JJ Jeong, S Jo
Personal and Ubiquitous Computing 27 (3), 1051-1053, 2023
2023
Crypto scams will increase over the holidays – here’s what you need to know to not fall victim
A Nanda, J Webb, J Jeong, MR Noushi, S Shah
https://theconversation.com/crypto-scams-will-increase-over-the-holidays …, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20