Dr Jay Jeong

STAFF PROFILE

Position

Senior Research Fellow, Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Publications

Filter by

2024

Towards Higher Levels of Assurance in Remote Identity Proofing

Ashish Nanda, Syed Shah, Jongkil Jeong, Robin Doss, Jeb Webb

(2024), Vol. 13, pp. 62-71, IEEE Consumer Electronics Magazine, Piscataway, N.J., C1

journal article

Examining usable security features and user perceptions of Physical Authentication Devices

A Nanda, J Jeong, S Shah, M Nosouhi, R Doss

(2024), Vol. 139, pp. 103664-103664, Computers and Security, C1

journal article
2023

New directions in convergence computing

J Yoo, J Jeong, S Jo

(2023), Vol. 27, pp. 1051-1053, Personal and Ubiquitous Computing, Berlin, Germany, C1

journal article

Towards quantum-secure software defined networks

M Nosouhi, K Sood, V Chamola, J Jeong, A Gaddam

(2023), pp. 1-6, IET Quantum Communication, London, Eng., C1

journal article
2022

Improving Unlinkability of Attribute-based Authentication through Game Theory

Yevhen Zolotavkin, Jongkil Jeong, Veronika Kuchta, Maksym Slavnenko, Robin Doss

(2022), Vol. 25, pp. 1-36, ACM Transactions on Privacy and Security, New York, N.Y., C1

journal article

Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis

Jongkil Jeong, Yevhen Zolotavkin, Robin Doss

(2022), pp. 1-30, ACM Computing Surveys, New York, N.Y., C1

journal article

Simplifying Cyber Security Maturity Models through National Culture: A Fuzzy Logic Approach

Jongkil Jeong, Marthie Grobler, Chamikara M.A.P.

(2022), Proceedings of the 55th Annual Hawaii International Conference on System Sciences, Online, E1

conference
2021

Enhancing Privacy Through DMMA: Decision-Making Method for Authentication

Maksym Slavnenko, Maksym Slavnenko, Yevhen Zolotavkin, Yevhen Zolotavkin, Jong Jeong, Jong Jeong, Veronika Kuchta, Veronika Kuchta, Robin Doss, Robin Doss

(2021), pp. 1-12, TRUSTCOM21 : Proceedings of the 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Shenyang, China, E1

conference

Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials

N Lalchandani, F Jiang, J Jeong, Y Zolotavkin, R Doss

(2021), pp. 1-11, PST 2021: Proceedings of the 18th Privacy, Security and Trusts 2021 International Conference, Auckland, N.Z., E1

conference
2020

The importance of social identity on password formulations

Marthie Grobler, M Chamikara, Jacob Abbott, Jongkil Jeong, Surya Nepal, Cecile Paris

(2020), Vol. 25, pp. 813-827, PERSONAL AND UBIQUITOUS COMPUTING, C1-1

journal article
2019

Fuzzy logic application to link national culture and cybersecurity maturity

Jongkil Jeong, Marthie Grobler, M Chamikara, Carsten Rudolph

(2019), pp. 330-337, IEEE 2019 : Proceedings of the 1st International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS) & the 5th International Conference on Collaboration and Internet Computing (CIC), Los Angeles, California, E1-1

conference

Towards an improved understanding of human factors in cybersecurity

Jongkil Jeong, Joanne Mihelcic, Gillian Oliver, Carsten Rudolph

(2019), pp. 338-345, IEEE 2019 : Proceedings of the 1st International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS) & the 5th International Conference on Collaboration and Internet Computing (CIC), Los Angeles, California, E1-1

conference
2018

Psychological contract in IT outsourcing: A systematic literature review

J Jeong, J Jeong, S Kurnia, S Kurnia, D Samson, D Samson, S Cullen, S Cullen

(2018), pp. 1-10, HICSS 2018 : Proceedings of the 51st Hawaii International Conference on System Sciences, Waikoloa Village, Hawaii, E1-1

conference

Enhancing the application and measurement of relationship quality in future IT outsourcing studies

J Jeong, S Kurnia, D Samson, S Cullen

(2018), pp. 1-10, ECIS2018 : Proceedings of the Twenty-Sixth European Conference on Information Systems, Portsmouth, England, E1-1

conference
2012

Exploring the current status of call centre offshoring research: A research agenda and future directions

J Jeong, N Bekmamedova, S Kurnia

(2012), ACIS 2012 : Proceedings of the 23rd Australasian Conference on Information Systems, Geelong, Vic., E1-1

conference

Funded Projects at Deakin

Other Public Sector Funding

Cyber Harm Prevention

Prof Robin Ram Mohan Doss, Dr Jay Jeong, Prof Chad Whelan, Prof Judy Currey, A/Prof William Yeoh, Prof Gang Li, Dr Adnan Anwar, Dr Paul Cooper, Mr Damien Manuel

VIC Managed Insurance Authority

  • 2023: $175,280
  • 2022: $50,763

Useability Framework for Verifiable Credentials.

Prof Robin Ram Mohan Doss, Dr Jay Jeong, Dr Graeme Pye

CSIRO Scholarship - Commonwealth Scientific and Industrial Research Organisation

  • 2024: $47,155
  • 2023: $46,000

Industry and Other Funding

Useability Framework for Verifiable Credentials.

Prof Robin Ram Mohan Doss, Dr Jay Jeong, Dr Graeme Pye

BUPA HI Pty Ltd

  • 2023: $12,000

Other Funding Sources

Privacy Respecting and Compliant Digital Credential wAlleT (PRCDCATT)

Prof Robin Ram Mohan Doss, Dr Jay Jeong, Dr Luxing Yang, Dr Anh Dinh, A/Prof Mohamed Abdelrazek, Dr Yanjun Zhang

Cyber Security Research Centre Limited

  • 2024: $81,250
  • 2023: $81,250

Supervisions

No completed student supervisions to report