Kim-Kwang Raymond Choo

First Name: Kim-Kwang Raymond
Last Name: Choo
Permanent URL to this author page: 

Dr Raymond Choo has made a significant contribution to academic knowledge and to public policy in the area of information security and cyber safety. Before returning to academia in 2011 Raymond spent almost five years with the Australian Institute of Criminology (AIC), Australia's national research and knowledge centre on crime and justice. He has been a Visiting Fellow at the ARC Centre of Excellence in Policing and Security Regulatory Institutions Network at ANU since 2009. Raymond is a member of Australian Computer Society Specialism Advisory Internet Security Group and a Fellow at the African Center for Cyberlaw and Cybercrime Prevention. He is a Justice of the Peace in South Australia.

5 December 2016

This paper looks at the legal and technical issues inherent in collecting electronic evidence from online and cloud services.

17 September 2014

With the volume of digital forensic evidence rapidly increasing, this paper proposes a data reduction and data mining framework that incorporates a process of reducing data volume by focusing on a...

9 December 2013

This paper outlines a cloud forensic framework that can be used to guide digital forensic investigations involving cloud computing services.

Journal article
14 October 2013

Abstract: Cloud storage is an emerging challenge to digital forensic examiners. The services are increasingly used by consumers, business, and government, and can potentially store large amounts...

13 October 2013

Abstract: With increasing popularity of smart mobile devices such as iOS devices, security and privacy concerns have emerged as a salient area of inquiry. A relatively under-studied area is...

8 August 2013

In the increasingly dynamic environment of mobile forensics, this paper provides an overview of the capabilities of three popular mobile forensic tools on three mobile phones based on Apple’s iOS...

22 February 2011

Opportunities for criminals to engage in transnational activities have expanded with globalisation and advancements in information and communications technologies. This paper contributes to a...

4 November 2010

Cloud computing is now firmly established in the information technology landscape and its security risks need to be mapped and addressed at this critical stage in its development....

26 February 2010

This paper outlines some of the key challenges and policy implications related to dealing with prominent people and risks when entering into financial transactions and business relationships with...

6 July 2009

The grooming of children for sexual purposes has been facilitated by online technologies, particularly social networking...