Jongkil Jay Jeong
Jongkil Jay Jeong
Ostala imenaJongkil Jeong, Jong Kil Jeong, Jay Jeong
Senior Research Fellow, University of Melbourne
Potvrđena adresa e-pošte na - Početna stranica
Towards an improved understanding of human factors in cybersecurity
J Jeong, J Mihelcic, G Oliver, C Rudolph
2019 IEEE 5th International Conference on Collaboration and Internet …, 2019
The Importance of Social Identity on Password Formulations
M Grobler, MAP Chamikara, J Abbott, JJ Jeong, S Nepal, C Paris
Personal and Ubiquitous Computing 25 (5), 813-827, 2020
Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis
JJ Jeong, Y Zolotavkin, R Doss
ACM Computing Surveys 55 (6), 1-31, 2023
Psychological Contract in IT Outsourcing: A Systematic Literature Review
J Jeong, S Kurnia, D Samson, S Cullen
Hawaii International Conference on System Sciences (HICSS) 2018, 2018
Exploring the current status of call centre offshoring research: a research agenda and future directions
J Jeong, S Kurnia, N Bekmamedova
Australasian Conference on Information Systems (ACIS) 2012, 2012
Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials
N Lalchandani, F Jiang, JJ Jeong, Y Zolotavkin, R Doss
2021 18th International Conference on Privacy, Security and Trust (PST), 1-7, 2021
Improving Unlinkability of Attribute-based Authentication through Game Theory
Y Zolotavkin, JJ Jeong, V Kuchta, M Slavnenko, R Doss
ACM Transactions on Privacy and Security 25 (2), 1-36, 2022
The current state of research on people, culture and cybersecurity
JJ Jeong, G Oliver, E Kang, S Creese, P Thomas
Personal and Ubiquitous Computing 25 (5), 809-812, 2021
Enhancing the Application and Measurement of Relationship Quality in Future IT Outsourcing studies.
JJ Jeong, S Kurnia, D Samson, S Cullen
European Conference on Information Systems (ECIS) 2018, 2018
Examining usable security features and user perceptions of Physical Authentication Devices
A Nanda, JJ Jeong, SWA Shah, M Nosouhi, R Doss
Computers & Security 139, 103664, 2024
How hackers can use message mirroring apps to see all your SMS texts — and bypass 2FA security
S Shah, J Jeong, R Doss …, 2021
Toward Higher Levels of Assurance in Remote Identity Proofing
A Nanda, SWA Shah, JJ Jeong, R Doss, J Webb
IEEE Consumer Electronics Magazine 13 (1), 62-71, 2023
Fuzzy logic application to link national culture and cybersecurity maturity
J Jeong, M Grobler, MAP Chamikara, C Rudolph
2019 IEEE 5th International Conference on Collaboration and Internet …, 2019
Horizon Scan Report: Development of next generation authentication technologies
JJ Jeong, Y Zolotavkin, M Warren
Cyber Security Cooperative Research Centre, 2019
Towards quantum‐secure software defined networks
MR Nosouhi, K Sood, V Chamola, JJ Jeong, A Gaddam
IET Quantum Communication 5 (1), 66-71, 2024
The Critical Success Factors of Managing Insourced Chinese IT Teams in Cross-cultural Environments
P Sinclair, JJ Jeong
Pacific Asia Conference on Information Systems (PACIS), 2022
Enhancing Privacy through DMMA: Decision-Making Model for Authentication
M Slavnenko, V Kuchta, J Jeong, Y Zolotavkin, R Doss
IEEE International Conference on Trust, Security and Privacy in Computing …, 2021
User Characteristics and Their Impact on the Perceived Usable Security of Physical Authentication Devices
JJ Jeong, SWA Shah, A Nanda, R Doss, M Nosouhi, J Webb
IEEE Transactions on Human-Machine Systems, 2024
Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets
JJ Jeong, R Doss, L Yang, M Abdelrazek, Z Wang, A Nanda, ...
ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security, 2024
Cyber Situational Awareness in Security Operation Centres
B Hawash, UA Mokhtar, JJ Jeong, SB Maynard, Z Shukur, ...
Pacific Asia Conference on Information Systems (PACIS), 2024
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20