Jongkil Jay Jeong

ORCID: 0000-0003-3491-687X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • Information and Cyber Security
  • Outsourcing and Supply Chain Management
  • User Authentication and Security Systems
  • Customer Service Quality and Loyalty
  • Service-Oriented Architecture and Web Services
  • Privacy-Preserving Technologies in Data
  • Innovative Human-Technology Interaction
  • Network Security and Intrusion Detection
  • Cybersecurity and Cyber Warfare Studies
  • Advanced Malware Detection Techniques
  • Collaboration in agile enterprises
  • Advanced Software Engineering Methodologies
  • Evolutionary Algorithms and Applications
  • Innovation in Digital Healthcare Systems
  • Security and Verification in Computing
  • Personal Information Management and User Behavior
  • Emotional Labor in Professions
  • Blockchain Technology Applications and Security
  • Cybercrime and Law Enforcement Studies
  • Internet Traffic Analysis and Secure E-voting
  • Cryptography and Data Security
  • Open Source Software Innovations
  • Access Control and Trust
  • Quality and Supply Management

Deakin University
2021-2024

Monash University
2019

Australian Regenerative Medicine Institute
2019

The University of Melbourne
2017-2018

Cybersecurity cannot be addressed by technology alone; the most intractable aspects are in fact sociotechnical. As a result, 'human factor' has been recognised as being weakest and obscure link creating safe secure digital environments. This study examines subjective often complex nature of human factors cybersecurity context through systematic literature review 27 articles which span across technical, behavior social sciences perspectives. Results from our suggest that there is still...

10.1109/cic48465.2019.00047 article EN 2019-12-01

Abstract The evolution of quantum computers is considered a serious threat to public‐key cryptosystems (e.g. RSA, ECDSA, ECDH, etc.). This indeed big concern for security the Internet and other data communication storage systems. reason that schemes are basis in generation shared symmetric keys used perform encryption/decryption transfer protocols. One possible approach address this issue use Quantum Key Distribution (QKD) (instead schemes) ultra‐secure keys. QKD physical layer technology...

10.1049/qtc2.12073 article EN cc-by-nc-nd IET Quantum Communication 2023-09-14

Despite the enhanced security benefits offered by Physical Authentication Devices (PADs) compared to other forms of Multi-Factor (MFA), adoption and retention PADs remain relatively low in comparison MFA methods. Evidence indicates that limited widespread usage are primarily due negative user perceptions concerning their usability features. Moreover, there's a understanding how users from diverse backgrounds perceive with varying standards To bridge this knowledge gap, we undertook multiple...

10.1016/j.cose.2023.103664 article EN cc-by Computers & Security 2023-12-22

Recent IT Outsourcing (ITO) studies have highlighted the importance of a construct known as Psychological Contract (PC) and its impact over outcome ITO agreements. However, there is still lack consolidated view on subject matter. To address this matter, we conducted systematic review analysis PC within by examining main themes, topics methodologies that been used in research to date. Our findings suggest despite being well recognised, it an under explored concept with only 12 identified...

10.24251/hicss.2018.019 article EN cc-by-nc-nd Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2018-01-01

National culture and cybersecurity maturity (CM) both play defining roles in the identity security of a nation. This study examines relationship that these two constructs determining whether certain cultural dimensions nation leads to riskier behaviours. Based on confirmed affirmation between national CM, we develop research model based fuzzy logic predict level influence has country's Cybersecurity Maturity Level (CML). The was generated three semantic steps: (1) conducting statistical...

10.1109/cic48465.2019.00046 article EN 2019-12-01

This article first formalizes the problem of unlinkable attribute-based authentication in system where each user possesses multiple assertions and uses them interchangeably. Currently, there are no recommendations for optimal usage such systems. To mitigate this issue, we use conditional entropy to measure uncertainty a Relying Party who attempts link observed with labels. Conditional is function statistics all system. Personal decisions made by users about contribute these statistics....

10.1145/3501260 article EN ACM Transactions on Privacy and Security 2022-03-04

Identity proofing is often a prerequisite for accessing important services (e.g., opening bank account). The current pandemic has highlighted the need Remote Proofing (RIDP) that can enable applicants to prove their identity from anywhere, without special facility. However, requirements set out by National Institute of Standards and Technology (NIST) highest level assurance in RIDP systems currently rule fully automated remote solutions, as they are not yet foolproof. This article aims...

10.1109/mce.2023.3256640 article EN IEEE Consumer Electronics Magazine 2023-03-14

One of the challenges to adoption decentralised approach digital ID is a lack consensus and standardisation how different stakeholders within ecosystem can inter-operate. As means address this issue, we examine use standard application programming interfaces (API) integrate identification systems preexisting ones. We first current literature solutions (a) assess attributes necessary compare contrast APIs, (b) create list API providers marketplace, (c) against established. Based on an...

10.1109/pst52912.2021.9647805 article EN 2021-12-13

Different assessment models exist to measure a country's cyber security maturity levels.These levels serve as benchmark for indicating how well prepared nation is against attack and resilient it would be in recovering from such an attack.However, results these assessments are either too general, overly complex, or resource intensive apply guide important national strategies frameworks.To address this we propose model link culture with through fuzzy logic mapping ensure that more uniform...

10.24251/hicss.2022.662 article EN Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2022-01-01

10.1007/s00779-023-01728-x article EN Personal and Ubiquitous Computing 2023-05-05

Many companies are now looking towards offshore vendors to fulfill their outsourcing requirements. With this growth, we have seen particular countries such as India dominate the offshoring market, and paper will examine what type of role reputation a country has on decision making process firms offshore.

10.48550/arxiv.2108.03559 preprint EN cc-by-nc-nd arXiv (Cornell University) 2021-01-01

Attribute-Based Authentication (ABA) is becoming more prevalent in everyday interactions. In this paper, we propose the Decision-Making Method for (DMMA) to address privacy concerns ABA. The need DMMA supported through multiple observations. First, practice, indistinguishability of crypto-proof-based assertions (that are posessed by different users) fails with non-zero probability. This explains why cryptographic means alone insufficient provide a substantial level unlinkability ABA systems...

10.1109/trustcom53373.2021.00055 article EN 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2021-10-01

The purpose of this study is to find whether the choice correct analytic process effective derive a meaningful and conclusion from vast amount information. For purpose, I designed an framework investigate importance communication on success IT business. Through detailed analysis chat conversations between outsource service provider client, found evidence suggest that language used in instant messaging environments clients & offshore providers was highly fragmented broken, but both client did...

10.48550/arxiv.2108.03560 preprint EN cc-by-nc-nd arXiv (Cornell University) 2021-01-01
Coming Soon ...