Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Cloud Technology Endowed Professorship

San Antonio, TX 78249

United States

http://https://sites.google.com/site/raymondchooau/

SCHOLARLY PAPERS

28

DOWNLOADS
Rank 4,650

SSRN RANKINGS

Top 4,650

in Total Papers Downloads

8,607

SSRN RANKINGS

Top 36,076

in Total Papers Citations

5

!

Under construction: SSRN citations while be offline until July when we will launch a brand new and improved citations service, check here for more details.

For more information

Scholarly Papers (28)

1.

Digital Forensics: Challenges and Future Research Directions

Simon M and Choo K-K R 2014. Digital forensics: Challenges and future research directions. In Il-Su Kim and Jianhong Liu (editors), Contemporary Trends in Asian Criminal Justice: Paving the Way for the Future, pp. 105-146, Seoul: South Korea, Korean Institute of Criminology
Number of pages: 62 Posted: 08 Apr 2014
Matthew Simon and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 1,322 (13,864)

Abstract:

Loading...

Cloud forensics; Computer forensics; Digital evidence; Digital forensics; Online child exploitation

2.

Google Drive: Forensic Analysis of Cloud Storage Data Remnants

Journal of Network and Computer Applications, Forthcoming
Number of pages: 31 Posted: 15 Oct 2013
Darren Quick and Kim-Kwang Raymond Choo
Government of South Australia and The University of Texas at San Antonio
Downloads 1,159 (16,963)

Abstract:

Loading...

Cloud Storage, Cloud Storage Forensics, Cloud Forensics, Digital Forensic Analysis, Google Drive

3.

Forensic Analysis of Windows Thumbcache Files

Quick D, Tassone C and Choo K-K R 2014. Forensic Analysis of Windows Thumbcache files. In 20th Americas Conference on Information Systems (AMCIS 2014), 7-10 August 2014, Association for Information Systems (Forthcoming)
Number of pages: 13 Posted: 02 May 2014
Darren Quick, Christopher Tassone and Kim-Kwang Raymond Choo
Government of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 686 (36,007)

Abstract:

Loading...

Digital Forensic Analysis, Thumbcache, Microsoft Windows, Computer Forensics

4.

Cyber Crime

Oxford Handbook of Organized Crime, L. Paoli, Oxford University Press, 2013, DOI: 10.1093/oxfordhb/9780199730445.013.003
Number of pages: 31 Posted: 17 Oct 2013
Kim-Kwang Raymond Choo and Peter Grabosky
The University of Texas at San Antonio and Australian National University (ANU) - Research School of Social Sciences (RSSS)
Downloads 655 (38,272)

Abstract:

Loading...

Cybercrime, cybersecurity, organized cybercriminal groups, organized criminal groups

5.

The Cyber Threat Landscape: Challenges and Future Research Directions

Computers and Security, 30(8): 719–731, 2011
Number of pages: 39 Posted: 14 Oct 2013
Kim-Kwang Raymond Choo
The University of Texas at San Antonio
Downloads 564 (46,644)

Abstract:

Loading...

Culture of security, cyber crime, cyber exploitation, policing and preventative strategy, public private partnership, routine activity theory

6.

Data Reduction and Data Mining Framework for Digital Forensic Evidence: Storage, Intelligence, Review and Archive

Trends & Issues in Crime and Criminal Justice 480: 1-11, 2014
Number of pages: 11 Posted: 19 Sep 2014 Last Revised: 23 Sep 2014
Darren Quick and Kim-Kwang Raymond Choo
Government of South Australia and The University of Texas at San Antonio
Downloads 501 (54,306)

Abstract:

Loading...

Criminal Intelligence, Data Reduction, Data Mining, Digital Forensics, Digital Evidence

7.

Cloud Computing and Digital Forensics

Martini B, Quick D and Choo K-K R 2013. Cloud Computing and Digital Forensics. In Kim, I-S, editor, Information Society and Cybercrime: Challenges for Criminology and Criminal Justice, Research Report Series 13-B-01: 111–125, Korean Institute of Criminology
Number of pages: 21 Posted: 11 Dec 2013
Ben Martini, Darren Quick and Kim-Kwang Raymond Choo
University of South Australia, Government of South Australia and The University of Texas at San Antonio
Downloads 412 (68,902)

Abstract:

Loading...

Computer Forensics, Cloud Computing, Cloud Forensics, Digital Forensics

8.

IOS Anti-Forensics: How Can We Securely Conceal, Delete and Insert Data?

47th Hawaii International Conference on System Sciences (HICSS 2014)
Number of pages: 10 Posted: 14 Oct 2013
Christian D’Orazio, Aswami Ariffin and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 402 (71,002)

Abstract:

Loading...

Anti-forensics, digital forensics, iOS anti-forensics, iOS forensics, mobile anti-forensics, mobile forensics

9.

Cloud Computing and Its Implications for Cybercrime Investigations in Australia

Computer Law and Security Review 29(2): 152-163, 2013
Number of pages: 21 Posted: 17 Oct 2013
Christopher Hooper, Ben Martini and Kim-Kwang Raymond Choo
Monash University, University of South Australia and The University of Texas at San Antonio
Downloads 350 (83,385)

Abstract:

Loading...

Cloud computing, Cybercrime, Digital forensics, Law enforcement investigations, Mutual legal assistance, Australian Law, Council of Europe Convention on Cybercrime, Jurisdictional issues

10.

Cybercrime and On-Line Safety in Cyberspace

INTERNATIONAL HANDBOOK OF CRIMINOLOGY, pp. 153-165, C. Smith, S. Zhang, R. Barbaret, eds., Routledge: New York, 2011
Number of pages: 12 Posted: 07 Nov 2012
Roderic Broadhurst and Kim-Kwang Raymond Choo
Australian National University (ANU) and The University of Texas at San Antonio
Downloads 325 (90,713)

Abstract:

Loading...

cybercrime, internet, organised crime, Budapest Convention

11.

Bridging the Air Gap: Inaudible Data Exfiltration by Insiders

20th Americas Conference on Information Systems (AMCIS 2014), 7-10 August 2014, Association for Information Systems, Forthcoming
Number of pages: 12 Posted: 03 May 2014
Samuel O’Malley and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 317 (93,209)

Abstract:

Loading...

Cybercrime, Data exfiltration, Insider threats, Inaudible sound

12.

Should There Be a New Body of Law for Cyber Space?

Jones D and Choo K-K R 2014. Should there be a new body of law for cyber space?. In 22nd European Conference on Information Systems (ECIS 2014), Tel Aviv, Israel, 9-11 June 2014 (Forthcoming)
Number of pages: 7 Posted: 02 May 2014
Doone Jones and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 231 (129,975)

Abstract:

Loading...

Cyber crime, Cyber space, Extra-territorial jurisdiction, International law of cyber space

13.

Building the Next Generation of Cyber Security Professionals

Martini B and Choo K-K R 2014. Building the next generation of cyber security professionals. In 22nd European Conference on Information Systems (ECIS 2014), Tel Aviv, Israel, 9-11 June 2014 (Forthcoming)
Number of pages: 13 Posted: 02 May 2014
Ben Martini and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 224 (133,957)

Abstract:

Loading...

Cyber Security Skills, Cyber Security Exercise, National Initiative for Cybersecurity Education (NICE), National Cybersecurity Workforce Framework, Situational Crime Prevention Theory

14.

Exfiltrating Data from Android Devices

Computers & Security, 2014, DOI: 10.1016/j.cose.2014.10.016
Number of pages: 28 Posted: 31 Oct 2014 Last Revised: 15 Nov 2014
Quang Do, Ben Martini and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 220 (136,286)

Abstract:

Loading...

Android, code injection, covert exfiltration, data exfiltration, inaudible transmission, mobile adversary model, reverse engineering, SMALI, SMS transmission

15.

Always Connected, but are Smart Mobile Users Getting More Security Savvy? A Survey of Smart Mobile Device Users

Imgraben J, Engelbrecht A and Choo K-K R. Always Connected, but are Smart Mobile Users Getting More Security Savvy? A Survey of Smart Mobile Device Users. Behaviour & Information Technology, Forthcoming
Number of pages: 37 Posted: 10 Jun 2014
James Imgraben, Alewyn Engelbrecht and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 183 (161,710)

Abstract:

Loading...

Cyber crime, Smart mobile devices, Security survey, Mobile security, Phishing, Malware, Unauthorised access

16.

The Future of Technology in Customer Identification & Relationship Risk

Thomson Reuters Accelus, pp. 1-13, November 2013
Number of pages: 13 Posted: 03 May 2014
Angela Irwin and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 162 (179,976)

Abstract:

Loading...

Anti-Money Laundering, Counter Terrorism Financing (AML/CTF), Know Your Customer (KYC), Customer Due Diligence (CDD), Customer Identification Program (CIP)

17.

Understanding the Information Security Awareness Process in Real Estate Organizations Using the Seci Model

20th Americas Conference on Information Systems (AMCIS 2014), 7-10 August 2014, Association for Information Systems, Forthcoming
Number of pages: 11 Posted: 03 May 2014
Deepa Mani, Sameera Mubarak and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 131 (214,277)

Abstract:

Loading...

Information security awareness, Information security policies, Real estate organizations, SECI model

18.

New Payment Methods: A Review of 2010-2012 FATF Mutual Evaluation Reports

Computers & Security 36 (2013): 12-26
Number of pages: 29 Posted: 17 Oct 2013
Kim-Kwang Raymond Choo
The University of Texas at San Antonio
Downloads 104 (253,656)

Abstract:

Loading...

Anti-money laundering, counter terrorism financing (AML/CTF), Mobile money transfer systems, Money laundering, New payment methods, Stored value prepaid cards, Terrorism financing

19.

Enhancing User Privacy on Android Mobile Devices via Permissions Removal

47th Annual Hawaii International Conference on System Sciences (HICSS), 2014
Number of pages: 10 Posted: 15 Oct 2013
Quang Do, Ben Martini and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 97 (265,770)

Abstract:

Loading...

Android mobile devices, Android privacy, mobile privacy, permissions removal

20.

Remote Programmatic vCloud Forensics

Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014), September 2014, Forthcoming
Number of pages: 8 Posted: 22 Jul 2014
Ben Martini and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 89 (280,819)

Abstract:

Loading...

Cloud forensics, Remote cloud forensic process, Remote evidence preservation, Remote evidence collection, vCloud

21.

A Study of Ten Popular Android Mobile Voip Applications: Are the Communications Encrypted?

47th Annual Hawaii International Conference on System Sciences (HICSS), 2014
Number of pages: 10 Posted: 15 Oct 2013 Last Revised: 01 May 2014
Abdullah Azfar, Kim-Kwang Raymond Choo and Lin Liu
University of South Australia, The University of Texas at San Antonio and University of South Australia
Downloads 89 (280,819)

Abstract:

Loading...

Android mobile applications, Mobile Voice over Internet (VoIP), mobile interception

22.

A Conceptual Interdisciplinary Plug-and-Play Cyber Security Framework

Choo K-K R 2014. A conceptual interdisciplinary plug-and-play cyber security framework. In Kaur H & Tao X, editors, ICTs and the Millennium Development Goals – A United Nations Perspective, pp. 81–99, New York, USA: Springer
Number of pages: 25 Posted: 12 Jun 2014
Kim-Kwang Raymond Choo
The University of Texas at San Antonio
Downloads 76 (308,898)

Abstract:

Loading...

Cyber crime, Cyber threats, Cyber security, Cyber security framework, Interdisciplinary cyber security framework, Malicious cyber activities, National security

23.

Information Security in the South Australian Real Estate Industry: A Study of 40 Real Estate Organisations

Information Management & Computer Security, Forthcoming
Number of pages: 22 Posted: 15 Oct 2013
Deepa Mani, Kim-Kwang Raymond Choo and Sameera Mubarak
University of South Australia, The University of Texas at San Antonio and University of South Australia
Downloads 67 (331,203)

Abstract:

Loading...

Computer security, Information Security, Information security risk management, Real estate sector

24.

A Generic Process to Identify Vulnerabilities and Design Weaknesses in iOS Healthcare Apps

D’Orazio C and Choo KKR 2015. A generic process to identify vulnerabilities and design weaknesses in iOS healthcare apps. In Proceedings of 48th Annual Hawaii International Conference on System Sciences (HICSS 2015), pp. 5175–5184, 5–8 January 2015, IEEE Computer Society Press
Number of pages: 10 Posted: 07 Jan 2015
Christian D’Orazio and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 62 (344,664)

Abstract:

Loading...

iOS healthcare apps, mpbile app security, mpbile security, mobile vulnerabilities and design weaknesses

25.

Enforcing File System Permissions on Android External Storage

Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, September 2014, IEEE Computer Society Press, Forthcoming
Number of pages: 6 Posted: 22 Jul 2014
Quang Do, Ben Martini and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 61 (347,473)

Abstract:

Loading...

Android, external storage, file system, file system permissions, mobile device, mobile security, privacy, SD card

26.

Cyber Security Readiness in the South Australian Government

B. Borgman, S. Mubarak and K.-K. R.Choo, Cyber security readiness in the South Australian Government, Computer Standards & Interfaces [In press, DOI: 10.1016/j.csi.2014.06.002]
Number of pages: 17 Posted: 15 Aug 2014
Brenton Borgman, Sameera Mubarak and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 51 (377,976)

Abstract:

Loading...

Cyber security, Information security management framework (ISMF), Information security management system (ISMS), South Australian Government, Whole of government approach

27.

IT Standards and Guides Do Not Adequately Prepare it Practitioners to Appear as Expert Witnesses: An Australian Perspective

Security Journal, August 2013, DOI: dx.doi.org/10.1057/sj.2013.29
Number of pages: 23 Posted: 15 Oct 2013
Andrew Butler and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 39 (420,532)

Abstract:

Loading...

Digital forensics, Digital evidence, Expert evidence, Expert witness, Information technology (IT), IT practitioners

28.

Live Migration in Emerging Cloud Paradigms

Cloud Computing, IEEE, vol. 3, no. 2, pp.12-19, March-April 2016, University of Hong Kong Faculty of Law Research Paper No. 2016/013
Number of pages: 11 Posted: 24 May 2016 Last Revised: 08 Jun 2016
Massimo Ficco, Christian Esposito, Henry Chang and Kim-Kwang Raymond Choo
Second University of Naples, University of Salerno, The University of Hong Kong - Law and Technology Centre and The University of Texas at San Antonio
Downloads 28 (468,424)

Abstract:

Loading...

cloud, transborder, data, flow, optimization