Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Cloud Technology Endowed Professorship

San Antonio, TX 78249

United States

http://https://sites.google.com/site/raymondchooau/

SCHOLARLY PAPERS

28

DOWNLOADS
Rank 5,018

SSRN RANKINGS

Top 5,018

in Total Papers Downloads

6,948

CITATIONS
Rank 36,274

SSRN RANKINGS

Top 36,274

in Total Papers Citations

5

Scholarly Papers (28)

1.

Google Drive: Forensic Analysis of Cloud Storage Data Remnants

Journal of Network and Computer Applications, Forthcoming
Number of pages: 31 Posted: 15 Oct 2013
Darren Quick and Kim-Kwang Raymond Choo
Government of South Australia and The University of Texas at San Antonio
Downloads 692 (17,431)

Abstract:

Cloud Storage, Cloud Storage Forensics, Cloud Forensics, Digital Forensic Analysis, Google Drive

2.

Digital Forensics: Challenges and Future Research Directions

Simon M and Choo K-K R 2014. Digital forensics: Challenges and future research directions. In Il-Su Kim and Jianhong Liu (editors), Contemporary Trends in Asian Criminal Justice: Paving the Way for the Future, pp. 105-146, Seoul: South Korea, Korean Institute of Criminology
Number of pages: 62 Posted: 08 Apr 2014
Matthew Simon and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 680 (13,721)

Abstract:

Cloud forensics; Computer forensics; Digital evidence; Digital forensics; Online child exploitation

3.

IOS Anti-Forensics: How Can We Securely Conceal, Delete and Insert Data?

47th Hawaii International Conference on System Sciences (HICSS 2014)
Number of pages: 10 Posted: 14 Oct 2013
Christian D’Orazio, Aswami Ariffin and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 311 (64,570)

Abstract:

Anti-forensics, digital forensics, iOS anti-forensics, iOS forensics, mobile anti-forensics, mobile forensics

4.

Forensic Analysis of Windows Thumbcache Files

Quick D, Tassone C and Choo K-K R 2014. Forensic Analysis of Windows Thumbcache files. In 20th Americas Conference on Information Systems (AMCIS 2014), 7-10 August 2014, Association for Information Systems (Forthcoming)
Number of pages: 13 Posted: 02 May 2014
Darren Quick, Christopher Tassone and Kim-Kwang Raymond Choo
Government of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 294 (40,508)

Abstract:

Digital Forensic Analysis, Thumbcache, Microsoft Windows, Computer Forensics

5.

Cyber Crime

Oxford Handbook of Organized Crime, L. Paoli, Oxford University Press, 2013, DOI: 10.1093/oxfordhb/9780199730445.013.003
Number of pages: 31 Posted: 17 Oct 2013
Kim-Kwang Raymond Choo and Peter Grabosky
The University of Texas at San Antonio and Australian National University (ANU) - Research School of Social Sciences (RSSS)
Downloads 261 (47,155)
Citation 1

Abstract:

Cybercrime, cybersecurity, organized cybercriminal groups, organized criminal groups

6.

Cloud Computing and Digital Forensics

Martini B, Quick D and Choo K-K R 2013. Cloud Computing and Digital Forensics. In Kim, I-S, editor, Information Society and Cybercrime: Challenges for Criminology and Criminal Justice, Research Report Series 13-B-01: 111–125, Korean Institute of Criminology,
Number of pages: 21 Posted: 11 Dec 2013
Ben Martini, Darren Quick and Kim-Kwang Raymond Choo
University of South Australia, Government of South Australia and The University of Texas at San Antonio
Downloads 239 (75,870)

Abstract:

Computer Forensics, Cloud Computing, Cloud Forensics, Digital Forensics

7.

Cloud Computing and Its Implications for Cybercrime Investigations in Australia

Computer Law and Security Review 29(2): 152-163, 2013
Number of pages: 21 Posted: 17 Oct 2013
Christopher Hooper, Ben Martini and Kim-Kwang Raymond Choo
Monash University, University of South Australia and The University of Texas at San Antonio
Downloads 168 (90,712)
Citation 1

Abstract:

Cloud computing, Cybercrime, Digital forensics, Law enforcement investigations, Mutual legal assistance, Australian Law, Council of Europe Convention on Cybercrime, Jurisdictional issues

8.

Cybercrime and On-Line Safety in Cyberspace

INTERNATIONAL HANDBOOK OF CRIMINOLOGY, pp. 153-165, C. Smith, S. Zhang, R. Barbaret, eds., Routledge: New York, 2011
Number of pages: 12 Posted: 07 Nov 2012
Roderic Broadhurst and Kim-Kwang Raymond Choo
Australian National University (ANU) and The University of Texas at San Antonio
Downloads 167 (87,249)

Abstract:

cybercrime, internet, organised crime, Budapest Convention

9.

The Cyber Threat Landscape: Challenges and Future Research Directions

Computers and Security, 30(8): 719–731, 2011,
Number of pages: 39 Posted: 14 Oct 2013
Kim-Kwang Raymond Choo
The University of Texas at San Antonio
Downloads 165 (60,203)
Citation 1

Abstract:

Culture of security, cyber crime, cyber exploitation, policing and preventative strategy, public private partnership, routine activity theory

10.

Exfiltrating Data from Android Devices

Computers & Security, 2014, DOI: 10.1016/j.cose.2014.10.016
Number of pages: 28 Posted: 31 Oct 2014 Last Revised: 15 Nov 2014
Quang Do, Ben Martini and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 138 (130,908)

Abstract:

Android, code injection, covert exfiltration, data exfiltration, inaudible transmission, mobile adversary model, reverse engineering, SMALI, SMS transmission

11.

Bridging the Air Gap: Inaudible Data Exfiltration by Insiders

20th Americas Conference on Information Systems (AMCIS 2014), 7-10 August 2014, Association for Information Systems, Forthcoming
Number of pages: 12 Posted: 03 May 2014
Samuel Joseph O’Malley and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 127 (108,786)

Abstract:

Cybercrime, Data exfiltration, Insider threats, Inaudible sound

12.

Should There Be a New Body of Law for Cyber Space?

Jones D and Choo K-K R 2014. Should there be a new body of law for cyber space?. In 22nd European Conference on Information Systems (ECIS 2014), Tel Aviv, Israel, 9-11 June 2014 (Forthcoming)
Number of pages: 7 Posted: 02 May 2014
Doone Jones and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 110 (123,801)

Abstract:

Cyber crime, Cyber space, Extra-territorial jurisdiction, International law of cyber space

13.

Data Reduction and Data Mining Framework for Digital Forensic Evidence: Storage, Intelligence, Review and Archive

Trends & Issues in Crime and Criminal Justice 480: 1-11, 2014
Number of pages: 11 Posted: 19 Sep 2014 Last Revised: 23 Sep 2014
Darren Quick and Kim-Kwang Raymond Choo
Government of South Australia and The University of Texas at San Antonio
Downloads 97 (93,663)

Abstract:

Criminal Intelligence, Data Reduction, Data Mining, Digital Forensics, Digital Evidence

14.

A Study of Ten Popular Android Mobile Voip Applications: Are the Communications Encrypted?

47th Annual Hawaii International Conference on System Sciences (HICSS), 2014
Number of pages: 10 Posted: 15 Oct 2013 Last Revised: 01 May 2014
Abdullah Azfar, Kim-Kwang Raymond Choo and Lin Liu
University of South Australia, The University of Texas at San Antonio and University of South Australia
Downloads 74 (262,877)

Abstract:

Android mobile applications, Mobile Voice over Internet (VoIP), mobile interception

15.

Enhancing User Privacy on Android Mobile Devices via Permissions Removal

47th Annual Hawaii International Conference on System Sciences (HICSS), 2014
Number of pages: 10 Posted: 15 Oct 2013
Quang Do, Ben Martini and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 69 (259,027)

Abstract:

Android mobile devices, Android privacy, mobile privacy, permissions removal

16.

The Future of Technology in Customer Identification & Relationship Risk

Thomson Reuters Accelus, pp. 1-13, November 2013
Number of pages: 13 Posted: 03 May 2014
Angela Irwin and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 62 (183,728)

Abstract:

Anti-Money Laundering, Counter Terrorism Financing (AML/CTF), Know Your Customer (KYC), Customer Due Diligence (CDD), Customer Identification Program (CIP)

17.

Remote Programmatic vCloud Forensics

Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014), September 2014, Forthcoming
Number of pages: 8 Posted: 22 Jul 2014
Ben Martini and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 61 (251,313)

Abstract:

Cloud forensics, Remote cloud forensic process, Remote evidence preservation, Remote evidence collection, vCloud

18.

Understanding the Information Security Awareness Process in Real Estate Organizations Using the Seci Model

20th Americas Conference on Information Systems (AMCIS 2014), 7-10 August 2014, Association for Information Systems, Forthcoming
Number of pages: 11 Posted: 03 May 2014
Deepa Mani, Sameera Mubarak and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 61 (215,495)

Abstract:

Information security awareness, Information security policies, Real estate organizations, SECI model

19.

Building the Next Generation of Cyber Security Professionals

Martini B and Choo K-K R 2014. Building the next generation of cyber security professionals. In 22nd European Conference on Information Systems (ECIS 2014), Tel Aviv, Israel, 9-11 June 2014 (Forthcoming)
Number of pages: 13 Posted: 02 May 2014
Ben Martini and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 61 (165,687)

Abstract:

Cyber Security Skills, Cyber Security Exercise, National Initiative for Cybersecurity Education (NICE), National Cybersecurity Workforce Framework, Situational Crime Prevention Theory

20.

Always Connected, but are Smart Mobile Users Getting More Security Savvy? A Survey of Smart Mobile Device Users

Imgraben J, Engelbrecht A and Choo K-K R. Always Connected, but are Smart Mobile Users Getting More Security Savvy? A Survey of Smart Mobile Device Users. Behaviour & Information Technology, Forthcoming
Number of pages: 37 Posted: 10 Jun 2014
James Imgraben, Alewyn Engelbrecht and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 58 (175,269)

Abstract:

Cyber crime, Smart mobile devices, Security survey, Mobile security, Phishing, Malware, Unauthorised access

21.

New Payment Methods: A Review of 2010-2012 FATF Mutual Evaluation Reports

Computers & Security 36 (2013): 12-26
Number of pages: 29 Posted: 17 Oct 2013
Kim-Kwang Raymond Choo
The University of Texas at San Antonio
Downloads 58 (253,216)

Abstract:

Anti-money laundering, counter terrorism financing (AML/CTF), Mobile money transfer systems, Money laundering, New payment methods, Stored value prepaid cards, Terrorism financing

22.

Enforcing File System Permissions on Android External Storage

Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, September 2014, IEEE Computer Society Press, Forthcoming
Number of pages: 6 Posted: 22 Jul 2014
Quang Do, Ben Martini and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 46 (311,082)

Abstract:

Android, external storage, file system, file system permissions, mobile device, mobile security, privacy, SD card

23.

Information Security in the South Australian Real Estate Industry: A Study of 40 Real Estate Organisations

Information Management & Computer Security, Forthcoming
Number of pages: 22 Posted: 15 Oct 2013
Deepa Mani, Kim-Kwang Raymond Choo and Sameera Mubarak
University of South Australia, The University of Texas at San Antonio and University of South Australia
Downloads 41 (300,815)
Citation 1

Abstract:

Computer security, Information Security, Information security risk management, Real estate sector

24.

A Generic Process to Identify Vulnerabilities and Design Weaknesses in iOS Healthcare Apps

D’Orazio C and Choo KKR 2015. A generic process to identify vulnerabilities and design weaknesses in iOS healthcare apps. In Proceedings of 48th Annual Hawaii International Conference on System Sciences (HICSS 2015), pp. 5175–5184, 5–8 January 2015, IEEE Computer Society Press,
Number of pages: 10 Posted: 07 Jan 2015
Christian D’Orazio and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 37 (330,959)

Abstract:

iOS healthcare apps, mpbile app security, mpbile security, mobile vulnerabilities and design weaknesses

25.

A Conceptual Interdisciplinary Plug-and-Play Cyber Security Framework

Choo K-K R 2014. A conceptual interdisciplinary plug-and-play cyber security framework. In Kaur H & Tao X, editors, ICTs and the Millennium Development Goals – A United Nations Perspective, pp. 81–99, New York, USA: Springer,
Number of pages: 25 Posted: 12 Jun 2014
Kim-Kwang Raymond Choo
The University of Texas at San Antonio
Downloads 33 (319,321)
Citation 1

Abstract:

Cyber crime, Cyber threats, Cyber security, Cyber security framework, Interdisciplinary cyber security framework, Malicious cyber activities, National security

26.

Cyber Security Readiness in the South Australian Government

B. Borgman, S. Mubarak and K.-K. R.Choo, Cyber security readiness in the South Australian Government, Computer Standards & Interfaces [In press, DOI: 10.1016/j.csi.2014.06.002]
Number of pages: 17 Posted: 15 Aug 2014
Brenton Borgman, Sameera Mubarak and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 22 (362,363)

Abstract:

Cyber security, Information security management framework (ISMF), Information security management system (ISMS), South Australian Government, Whole of government approach

27.

IT Standards and Guides Do Not Adequately Prepare it Practitioners to Appear as Expert Witnesses: An Australian Perspective

Security Journal, August 2013, DOI: dx.doi.org/10.1057/sj.2013.29
Number of pages: 23 Posted: 15 Oct 2013
Andrew Butler and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 12 (384,201)

Abstract:

Digital forensics, Digital evidence, Expert evidence, Expert witness, Information technology (IT), IT practitioners

28.

Live Migration in Emerging Cloud Paradigms

Cloud Computing, IEEE, vol. 3, no. 2, pp.12-19, March-April 2016, University of Hong Kong Faculty of Law Research Paper No. 2016/013
Number of pages: 11 Posted: 24 May 2016 Last Revised: 08 Jun 2016
Massimo Ficco, Christian Esposito, Henry Chang and Kim-Kwang Raymond Choo
Second University of Naples, University of Salerno, The University of Hong Kong - Law and Technology Centre and The University of Texas at San Antonio
Downloads 0 (433,477)

Abstract:

cloud, transborder, data, flow, optimization