Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Cloud Technology Endowed Professorship

San Antonio, TX 78249

United States

http://https://sites.google.com/site/raymondchooau/

SCHOLARLY PAPERS

30

DOWNLOADS
Rank 5,385

SSRN RANKINGS

Top 5,385

in Total Papers Downloads

15,980

TOTAL CITATIONS
Rank 33,304

SSRN RANKINGS

Top 33,304

in Total Papers Citations

20

Scholarly Papers (30)

1.

Forensic Analysis of Windows Thumbcache Files

Quick D, Tassone C and Choo K-K R 2014. Forensic Analysis of Windows Thumbcache files. In 20th Americas Conference on Information Systems (AMCIS 2014), 7-10 August 2014, Association for Information Systems (Forthcoming)
Number of pages: 13 Posted: 02 May 2014
Darren Quick, Christopher Tassone and Kim-Kwang Raymond Choo
Government of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 2,229 (14,496)

Abstract:

Loading...

Digital Forensic Analysis, Thumbcache, Microsoft Windows, Computer Forensics

2.

Cyber Crime

Oxford Handbook of Organized Crime, L. Paoli, Oxford University Press, 2013, DOI: 10.1093/oxfordhb/9780199730445.013.003
Number of pages: 31 Posted: 17 Oct 2013
Kim-Kwang Raymond Choo and Peter Grabosky
The University of Texas at San Antonio and School of Regulation & Global Governance (RegNet)
Downloads 1,954 (17,968)

Abstract:

Loading...

Cybercrime, cybersecurity, organized cybercriminal groups, organized criminal groups

3.

Digital Forensics: Challenges and Future Research Directions

Simon M and Choo K-K R 2014. Digital forensics: Challenges and future research directions. In Il-Su Kim and Jianhong Liu (editors), Contemporary Trends in Asian Criminal Justice: Paving the Way for the Future, pp. 105-146, Seoul: South Korea, Korean Institute of Criminology
Number of pages: 62 Posted: 08 Apr 2014
Matthew Simon and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 1,902 (18,739)

Abstract:

Loading...

Cloud forensics; Computer forensics; Digital evidence; Digital forensics; Online child exploitation

4.

Google Drive: Forensic Analysis of Cloud Storage Data Remnants

Journal of Network and Computer Applications, Forthcoming
Number of pages: 31 Posted: 15 Oct 2013
Darren Quick and Kim-Kwang Raymond Choo
Government of South Australia and The University of Texas at San Antonio
Downloads 1,479 (27,498)

Abstract:

Loading...

Cloud Storage, Cloud Storage Forensics, Cloud Forensics, Digital Forensic Analysis, Google Drive

5.

The Cyber Threat Landscape: Challenges and Future Research Directions

Computers and Security, 30(8): 719–731, 2011
Number of pages: 39 Posted: 14 Oct 2013
Kim-Kwang Raymond Choo
The University of Texas at San Antonio
Downloads 1,166 (39,045)
Citation 2

Abstract:

Loading...

Culture of security, cyber crime, cyber exploitation, policing and preventative strategy, public private partnership, routine activity theory

6.

Data Reduction and Data Mining Framework for Digital Forensic Evidence: Storage, Intelligence, Review and Archive

Trends & Issues in Crime and Criminal Justice 480: 1-11, 2014
Number of pages: 11 Posted: 19 Sep 2014 Last Revised: 23 Sep 2014
Darren Quick and Kim-Kwang Raymond Choo
Government of South Australia and The University of Texas at San Antonio
Downloads 868 (58,982)

Abstract:

Loading...

Criminal Intelligence, Data Reduction, Data Mining, Digital Forensics, Digital Evidence

7.

IOS Anti-Forensics: How Can We Securely Conceal, Delete and Insert Data?

47th Hawaii International Conference on System Sciences (HICSS 2014)
Number of pages: 10 Posted: 14 Oct 2013
Christian D’Orazio, Aswami Ariffin and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 584 (98,771)
Citation 1

Abstract:

Loading...

Anti-forensics, digital forensics, iOS anti-forensics, iOS forensics, mobile anti-forensics, mobile forensics

8.

Cloud Computing and Digital Forensics

Martini B, Quick D and Choo K-K R 2013. Cloud Computing and Digital Forensics. In Kim, I-S, editor, Information Society and Cybercrime: Challenges for Criminology and Criminal Justice, Research Report Series 13-B-01: 111–125, Korean Institute of Criminology
Number of pages: 21 Posted: 11 Dec 2013
Ben Martini, Darren Quick and Kim-Kwang Raymond Choo
University of South Australia, Government of South Australia and The University of Texas at San Antonio
Downloads 543 (108,206)

Abstract:

Loading...

Computer Forensics, Cloud Computing, Cloud Forensics, Digital Forensics

9.

Bridging the Air Gap: Inaudible Data Exfiltration by Insiders

20th Americas Conference on Information Systems (AMCIS 2014), 7-10 August 2014, Association for Information Systems, Forthcoming
Number of pages: 12 Posted: 03 May 2014
Samuel O’Malley and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 537 (109,716)

Abstract:

Loading...

Cybercrime, Data exfiltration, Insider threats, Inaudible sound

10.

Building the Next Generation of Cyber Security Professionals

Martini B and Choo K-K R 2014. Building the next generation of cyber security professionals. In 22nd European Conference on Information Systems (ECIS 2014), Tel Aviv, Israel, 9-11 June 2014 (Forthcoming)
Number of pages: 13 Posted: 02 May 2014
Ben Martini and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 534 (110,760)

Abstract:

Loading...

Cyber Security Skills, Cyber Security Exercise, National Initiative for Cybersecurity Education (NICE), National Cybersecurity Workforce Framework, Situational Crime Prevention Theory

11.

Cloud Computing and Its Implications for Cybercrime Investigations in Australia

Computer Law and Security Review 29(2): 152-163, 2013
Number of pages: 21 Posted: 17 Oct 2013
Christopher Hooper, Ben Martini and Kim-Kwang Raymond Choo
Monash University, University of South Australia and The University of Texas at San Antonio
Downloads 495 (121,394)
Citation 1

Abstract:

Loading...

Cloud computing, Cybercrime, Digital forensics, Law enforcement investigations, Mutual legal assistance, Australian Law, Council of Europe Convention on Cybercrime, Jurisdictional issues

12.

Should There Be a New Body of Law for Cyber Space?

Jones D and Choo K-K R 2014. Should there be a new body of law for cyber space?. In 22nd European Conference on Information Systems (ECIS 2014), Tel Aviv, Israel, 9-11 June 2014 (Forthcoming)
Number of pages: 7 Posted: 02 May 2014
Doone Jones and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 470 (128,926)

Abstract:

Loading...

Cyber crime, Cyber space, Extra-territorial jurisdiction, International law of cyber space

13.

Cybercrime and On-Line Safety in Cyberspace

INTERNATIONAL HANDBOOK OF CRIMINOLOGY, pp. 153-165, C. Smith, S. Zhang, R. Barbaret, eds., Routledge: New York, 2011
Number of pages: 12 Posted: 07 Nov 2012
Roderic Broadhurst and Kim-Kwang Raymond Choo
School of Regulation & Global Governance (RegNet) and The University of Texas at San Antonio
Downloads 410 (151,481)
Citation 1

Abstract:

Loading...

cybercrime, internet, organised crime, Budapest Convention

14.

Exfiltrating Data from Android Devices

Computers & Security, 2014, DOI: 10.1016/j.cose.2014.10.016
Number of pages: 28 Posted: 31 Oct 2014 Last Revised: 15 Nov 2014
Quang Do, Ben Martini and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 364 (172,981)

Abstract:

Loading...

Android, code injection, covert exfiltration, data exfiltration, inaudible transmission, mobile adversary model, reverse engineering, SMALI, SMS transmission

15.

Always Connected, but are Smart Mobile Users Getting More Security Savvy? A Survey of Smart Mobile Device Users

Imgraben J, Engelbrecht A and Choo K-K R. Always Connected, but are Smart Mobile Users Getting More Security Savvy? A Survey of Smart Mobile Device Users. Behaviour & Information Technology, Forthcoming
Number of pages: 37 Posted: 10 Jun 2014
James Imgraben, Alewyn Engelbrecht and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 300 (213,064)
Citation 1

Abstract:

Loading...

Cyber crime, Smart mobile devices, Security survey, Mobile security, Phishing, Malware, Unauthorised access

16.

Understanding the Information Security Awareness Process in Real Estate Organizations Using the Seci Model

20th Americas Conference on Information Systems (AMCIS 2014), 7-10 August 2014, Association for Information Systems, Forthcoming
Number of pages: 11 Posted: 03 May 2014
Deepa Mani, Sameera Mubarak and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 269 (238,543)

Abstract:

Loading...

Information security awareness, Information security policies, Real estate organizations, SECI model

17.

The Role of Digital Technologies in the Resilience of Healthcare Supply Chain

Number of pages: 23 Posted: 07 Jan 2022
Federal University of Rio Grande do Sul (UFRGS/PPGA) - Department of Industrial Engineering, University College London, Federal University of Rio Grande do Sul, University of Vale do Rio dos Sinos (UNISINOS) - Unisinos Business School, The University of Texas at San Antonio and Federal University of Rio Grande do Sul (UFRGS/PPGA) - Department of Industrial Engineering
Downloads 268 (239,448)
Citation 2

Abstract:

Loading...

healthcare digitalization, smart supply chain, resilience, healthcare supply chain, digital technologies

18.

The Future of Technology in Customer Identification & Relationship Risk

Thomson Reuters Accelus, pp. 1-13, November 2013
Number of pages: 13 Posted: 03 May 2014
Angela Irwin and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 268 (239,448)

Abstract:

Loading...

Anti-Money Laundering, Counter Terrorism Financing (AML/CTF), Know Your Customer (KYC), Customer Due Diligence (CDD), Customer Identification Program (CIP)

19.

New Payment Methods: A Review of 2010-2012 FATF Mutual Evaluation Reports

Computers & Security 36 (2013): 12-26
Number of pages: 29 Posted: 17 Oct 2013
Kim-Kwang Raymond Choo
The University of Texas at San Antonio
Downloads 179 (352,080)
Citation 3

Abstract:

Loading...

Anti-money laundering, counter terrorism financing (AML/CTF), Mobile money transfer systems, Money laundering, New payment methods, Stored value prepaid cards, Terrorism financing

20.

Remote Programmatic vCloud Forensics

Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014), September 2014, Forthcoming
Number of pages: 8 Posted: 22 Jul 2014
Ben Martini and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 138 (437,824)

Abstract:

Loading...

Cloud forensics, Remote cloud forensic process, Remote evidence preservation, Remote evidence collection, vCloud

21.

Enhancing User Privacy on Android Mobile Devices via Permissions Removal

47th Annual Hawaii International Conference on System Sciences (HICSS), 2014
Number of pages: 10 Posted: 15 Oct 2013
Quang Do, Ben Martini and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 138 (437,824)
Citation 7

Abstract:

Loading...

Android mobile devices, Android privacy, mobile privacy, permissions removal

22.

A Conceptual Interdisciplinary Plug-and-Play Cyber Security Framework

Choo K-K R 2014. A conceptual interdisciplinary plug-and-play cyber security framework. In Kaur H & Tao X, editors, ICTs and the Millennium Development Goals – A United Nations Perspective, pp. 81–99, New York, USA: Springer
Number of pages: 25 Posted: 12 Jun 2014
Kim-Kwang Raymond Choo
The University of Texas at San Antonio
Downloads 128 (464,803)

Abstract:

Loading...

Cyber crime, Cyber threats, Cyber security, Cyber security framework, Interdisciplinary cyber security framework, Malicious cyber activities, National security

23.

A Study of Ten Popular Android Mobile Voip Applications: Are the Communications Encrypted?

47th Annual Hawaii International Conference on System Sciences (HICSS), 2014
Number of pages: 10 Posted: 15 Oct 2013 Last Revised: 01 May 2014
Abdullah Azfar, Kim-Kwang Raymond Choo and Lin Liu
University of South Australia, The University of Texas at San Antonio and University of South Australia
Downloads 124 (476,502)
Citation 2

Abstract:

Loading...

Android mobile applications, Mobile Voice over Internet (VoIP), mobile interception

24.

Information Security in the South Australian Real Estate Industry: A Study of 40 Real Estate Organisations

Information Management & Computer Security, Forthcoming
Number of pages: 22 Posted: 15 Oct 2013
Deepa Mani, Kim-Kwang Raymond Choo and Sameera Mubarak
University of South Australia, The University of Texas at San Antonio and University of South Australia
Downloads 111 (518,224)

Abstract:

Loading...

Computer security, Information Security, Information security risk management, Real estate sector

25.

A Generic Process to Identify Vulnerabilities and Design Weaknesses in iOS Healthcare Apps

D’Orazio C and Choo KKR 2015. A generic process to identify vulnerabilities and design weaknesses in iOS healthcare apps. In Proceedings of 48th Annual Hawaii International Conference on System Sciences (HICSS 2015), pp. 5175–5184, 5–8 January 2015, IEEE Computer Society Press
Number of pages: 10 Posted: 07 Jan 2015
Christian D’Orazio and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 109 (525,121)

Abstract:

Loading...

iOS healthcare apps, mpbile app security, mpbile security, mobile vulnerabilities and design weaknesses

26.

Enforcing File System Permissions on Android External Storage

Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, September 2014, IEEE Computer Society Press, Forthcoming
Number of pages: 6 Posted: 22 Jul 2014
Quang Do, Ben Martini and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 102 (551,115)

Abstract:

Loading...

Android, external storage, file system, file system permissions, mobile device, mobile security, privacy, SD card

27.

Cyber Security Readiness in the South Australian Government

B. Borgman, S. Mubarak and K.-K. R.Choo, Cyber security readiness in the South Australian Government, Computer Standards & Interfaces [In press, DOI: 10.1016/j.csi.2014.06.002]
Number of pages: 17 Posted: 15 Aug 2014
Brenton Borgman, Sameera Mubarak and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 98 (566,404)

Abstract:

Loading...

Cyber security, Information security management framework (ISMF), Information security management system (ISMS), South Australian Government, Whole of government approach

28.

IT Standards and Guides Do Not Adequately Prepare it Practitioners to Appear as Expert Witnesses: An Australian Perspective

Security Journal, August 2013, DOI: dx.doi.org/10.1057/sj.2013.29
Number of pages: 23 Posted: 15 Oct 2013
Andrew Butler and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 92 (589,575)

Abstract:

Loading...

Digital forensics, Digital evidence, Expert evidence, Expert witness, Information technology (IT), IT practitioners

29.

Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts

Number of pages: 11 Posted: 17 Nov 2023
zeli wang, Weiqi Dai, Ming Li, Kim-Kwang Raymond Choo and Deqing Zou
Chongqing University of Posts and Telecommunications, Huazhong University of Science and Technology, Huazhong University of Science and Technology, The University of Texas at San Antonio and Huazhong University of Science and Technology
Downloads 68 (699,960)

Abstract:

Loading...

Blockchain, Smart contract, Vulnerability Detection, Fuzzing

30.

Live Migration in Emerging Cloud Paradigms

Cloud Computing, IEEE, vol. 3, no. 2, pp.12-19, March-April 2016, University of Hong Kong Faculty of Law Research Paper No. 2016/013
Number of pages: 11 Posted: 24 May 2016 Last Revised: 08 Jun 2016
Massimo Ficco, Christian Esposito, Henry Chang and Kim-Kwang Raymond Choo
Second University of Naples, CSEF - University of Naples Federico II, The University of Hong Kong - Law and Technology Centre and The University of Texas at San Antonio
Downloads 53 (790,974)

Abstract:

Loading...

cloud, transborder, data, flow, optimization