Media: In the news

12 opinion pieces

129 media articles

Opinion Pieces

1.      Kim-Kwang Raymond Choo 2014. Big forensic data challenges in law enforcement and criminal intelligence investigations. Data to Decisions CRC, December 2014. http://www.d2dcrc.com.au/news/rcunisa/

2.      Kim-Kwang Raymond Choo 2014. Sound advice – a new way to eavesdrop on Nexus phones. The Conversation 24 November 2014. http://theconversation.com/sound-advice-a-new-way-to-eavesdrop-on-nexus-phones-33641

3.      Kim-Kwang Raymond Choo 2013. Securing our critical information infrastructure. University of South Australia Innovator’s Blog, 19 June 2013. http://www.unisa.edu.au/IT-Engineering-and-the-Environment/Blog/Securing-our-critical-information-infrastructure/

4.      Kim-Kwang Raymond Choo 2013. Kaspersky Lab’s “Cyber Security for the Next Generation: Asia-Pacific & MEA Round 2013” Conference: Post-Conference Report. Asia Pacific Security Magazine Issue 48: 4–5, 2013

5.      Darren Quick and Kim-Kwang Raymond Choo 2013. Dropbox Analysis: Data remnants on User machines. Virtual Forum Against Cybercrime Monthly Newsletter Issue 22: 6–11, April 2013

6.      Darren Quick and Kim-Kwang Raymond Choo 2013. Cloud Storage Forensics. Asia Pacific Security Magazine Issue 47: 30–31, 2013

7.      Kim-Kwang Raymond Choo 2013. Cyber security is a team sport. Sydney Morning Herald, ITPro, 3 April. http://www.smh.com.au/it-pro/government-it/cyber-security-is-a-team-sport-20130403-2h666.html

8.      Kim-Kwang Raymond Choo 2012. International public-private-research partnerships required to secure our cyber space. Asia Pacific Security Magazine October: 36–39, 2012

9.      Raymond Choo 2012. New partnerships required. SC Magazine (US), August issue: 50 (also available on http://www.scmagazine.com/new-partnerships-required/article/250427/)

10.    Raymond Choo 2012. Opinion Piece: 'We need investment to secure our cyber future': researcher. Sydney Morning Herald: 5 April. http://www.smh.com.au/it-pro/security-it/we-need-investment-to-secure-our-cyber-future-researcher-20120405-1weri.html?rand=1333604647888

11.    Kim-Kwang Raymond Choo 2011. Cybercrime: The new front line. Security Solutions December/January issue: 79–82

12.    Kim-Kwang Raymond Choo 2011. Asia-Pacific Regional Workshop on Fighting Cybercrime. Australian Security Magazine October/November issue: 56–57

In the News

1.      Danielle Throneberry 2016. UTSA professor studies CPU user behavior and online dishonesty. The Paisano 9 November. http://www.paisano-online.com/news-articles/utsa-professor-studies-cpu-user-behavior-online-dishonesty/

2.      Kristen Mosbrucker 2016. UTSA cyber researcher building tools to weed out dishonesty online. San Antonio Business Journal 7 November. http://www.bizjournals.com/sanantonio/news/2016/11/07/utsa-cyber-researcher-building-tools-to-weed-out.html

3.      Iris Gonzalez 2016. Online Dishonesty: New UTSA Study Describes Way to Detect ‘Astroturfing’. The Rivard Report 28 October. http://therivardreport.com/online-dishonesty-new-utsa-study-describes-way-to-detect-astroturfing/

4.      Dyllan Furness 2016. Fraud alert! Researchers discover new method to spot phony posts online. Digital Trends 25 October. http://www.digitaltrends.com/social-media/ut-san-antonio-astroturfing/

5.      Tereza Pultarova 2016. Algorithm targets fake reviews and online trolls. Institution of Engineering and Technology (IET) 24 October. https://eandt.theiet.org/content/articles/2016/10/algorithm-targets-fake-reviews-and-internet-trolls/2

6.      Joanna E. Carver 2016. New UTSA study describes method to detect dishonesty online. Scienmag 24 October.  http://scienmag.com/new-utsa-study-describes-method-to-detect-dishonesty-online/

7.      Cybersecurity breaches continue to pose major threats to organizations and individual users around the globe. EFM Capital September 29, 2016. http://efmcapital.com/en/new/weekly-trending-topic/cybersecurity-breaches-continue-to-pose-major-threats-to-organizations-and-individual-users-around-the-globe

8.      Emma Manser 2016. ‘We love to cause mayhem’: the hacker group targeting our schools. The New Daily 3 February. http://thenewdaily.com.au/life/2016/02/03/love-cause-mayhem-hacker-group-targeting-schools/

9.      Andrew Spence 2016. Computer hacking game aimed at schools. News Leads 11 January. http://newsleads.com.au/education/2016/01/11/computer-hacking-game-aimed-at-schools/

10.    Simon Edmunds 2015. Personal data at risk on apps like Tinder and Grindr says research. Global Dating Insights 20 May. http://globaldatinginsights.com/20052014-personal-data-at-risk-on-apps-like-tinder-and-grindr-says-security-research/

11.    Tony Crammond 2015. Grindr and Tinder could be ripe to backdoor intrusion. Recombu 19 May. https://recombu.com/mobile/article/grindr-and-tinder-are-ripe-to-backdoor-intrusion

12.    Aviva Rutkin 2015. Pics and chat data are hackable on apps like Tinder and Grindr. New Scientist 18 May. http://www.newscientist.com/article/dn27540-pics-and-chat-data-are-hackable-on-apps-like-tinder-and-grindr.html 

13.    Ana Gaona 2015. No te confíes... Es fácil hackear tus fotos e información privada en Tinder. Media Telecom 18 May.http://www.mediatelecom.com.mx/index.php/tecnologia/apps/item/86572-no-te-conf%C3%ADes-es-f%C3%A1cil-hackear-tus-fotos-e-informaci%C3%B3n-privada-en-tinder

14.    华南城网2014. 2014世界互联网大会名人语. 13.             华南城网November. http://cncms.csc86.com/special/dianzi/2014/hlwdh/

15.    Cao Yin 2014. Authorities clean up terrorism info online. China Daily 21 November. http://europe.chinadaily.com.cn/china/2014-11/21/content_18953091.htm

16.    Catherine Wong Tsoi-lai 2014. Conference calls for global effort to combat cyber terror. Global Times 21 November. http://www.globaltimes.cn/content/892929.shtml

17.    董碧水 2014. 首届世界互联网大会:打击网络恐怖需国际合作. 搜狐 20 November. http://news.sohu.com/20141121/n406232957.shtml

18.    中国日报 2014. 互联网大会:外国专家关注网络安全问题,盼走进中国市场. 中国日报 20 November. http://cnews.chinadaily.com.cn/sjhlw/2014-11/20/content_18948912.htm

19.    中工网 2014. 雷蒙德·朱:比特币是一个非常出名的虚拟货币. 中工网 20 November. http://news.workercn.cn/28966/201411/20/141120095258573.shtml

20.    新浪科技 2014. 澳大利亚专家雷蒙德:通过云技术等手段反恐. 新浪科技  20 November http://tech.sina.com.cn/i/2014-11-20/detail-iavxeafr4930910.shtml

21.    魏方超 2014. 外国安全专家论网络恐怖活动 倡议共同合作. 中国网  20 November.

22.    Rosanna Galvin 2014. The fight against cybercrime. UniSA News September. http://w3.unisa.edu.au/unisanews/2014/September/story4.asp

23.    Shahida Sweeney 2014. Mobile forensics the next frontier: University of South Australia. CIO.com.au 29 August. http://www.cio.com.au/article/553644/mobile_forensics_next_frontier_university_south_australia/ 

24.    Clive Williams 2014. The future of police technology. Security Solutions Magazine 15 August. http://www.securitysolutionsmagazine.biz/2014/08/15/the-future-of-police-technology/ 

25.    Beverley Head 2014. Virtual. Volatile. Viable? Why Bitcoin is a nightmare for accountants. Public Accountant: The Official Journal of the Institute of Public Accountants. June/July issue: 31–32, 35. (Also available on http://pubacct.org.au/why-bitcoin-is-a-nightmare/)

26.    Jennifer Foreshew 2014. Fears tech cuts will hinder technological innovation. The Australia, IT Today: 9, 27 May. (Also available on http://www.theaustralian.com.au/technology/fears-tech-cuts-will-hinder-technological-innovation/story-e6frgakx-1226932245369)

27.    John Hilvert 2014. Most Android VOIP apps easy to crack. IT News 17 March. http://www.itnews.com.au/News/375270,most-android-voip-apps-easy-to-crack.aspx

28.    Nathan Lynch 2014. Mining the blockchain: Regulatory surveillance, Bitcoin and the dangers of digital currencies, Thomson Reuters Accelus, Regulatory Intelligence, 11 March. (Also available on http://clmr.unsw.edu.au/article/compliance/market-conduct-regulation/mining-blockchain-regulatory-surveillance-bitcoin-and-dangers-digital-currencies)

29.    Nathan Lynch 2014. Senate inquiry to probe ASIC's role in unsolicited card campaigns. Thomson Reuters Accelus, Regulatory Intelligence, 6 April. (Also available on http://www.senatormarkbishop.com.au/articles/view/senate-inquiry-to-probe-asics-role-in-unsolicited.html)

30.    Drew Turney 2014. New Icepol malware found as hacking 'industry' florishes. Sydney Morning Herald, ITPro, 3 February. http://www.theage.com.au/it-pro/security-it/new-icepol-malware-found-as-hacking-industry-florishes-20140203-hvb0o.html

31.    Paul Smith 2013. Allies are all eyes. Australian Financial Review, Technology section: 23, 24 November. (Also available on http://www.afr.com/p/technology/protecting_your_tech_in_world_where_Z5y1OjDE6SqMHRYcwTHMQI)

32.    Miles Kemp 2013. Aussie passports stolen in terror-zone security threat. The Advertiser: 6, 18 October (Also available on http://www.theaustralian.com.au/news/australian-passports-stolen-in-terrorzone-security-threat/story-e6frg6n6-1226742028353)

33.    Alison 2013. 专家:澳护照非常值钱 勿落入中东人之手残害世界. 今日悉尼 18 October. http://www.sydneytoday.com/n/bencandy.php?fid=20&id=129891 

34.    Alan Osborn and Jens Kastner 2013. Artistic endeavour. Money Laundering Bulletin, Issue 204: 6–7, June

35.    Ruth Liew 2013. Beazley to offer cyber risk insurance. Australian Financial Review, Technology section: 23, 9 April. (Also available on http://www.afr.com/p/technology/beazley_to_offer_cyber_risk_insurance_oqoceByv6N2KnEYDz8C8QP)

36.    Sue Marquette Poremba 2013. Network Security Requires a Team Effort. IT Business Edge, 3 April. http://www.itbusinessedge.com/blogs/data-security/network-security-requires-a-team-effort.html

37.    Paul Smith 2013. Attacks ‘highlight need for data breach notification law’. Australian Financial Review, Technology section: 24, 19 March. (Also available on http://www.afr.com/p/technology/attacks_highlight_need_for_data_8jX6zzDBaImxs7zUoqUU8O)

38.    Simon Fuller 2012. The rise of mobile malware. E-Finance & Payments Law & Policy September issue: 2

39.    Staff Correspondent 2012. Strong rules needed to curb cyber crimes: Expert. The Daily Star 15 August. http://archive.thedailystar.net/newDesign/print_news.php?nid=246197

40.    Rita Emanuele 2012. A day on the job of a cyber security expert. SA Defence Magazine May/June issue: 38

41.    Hariati Azizan 2012. Do you know who your kids are talking to?. The Star 29 April. http://thestar.com.my/news/story.asp?file=/2012/4/29/nation/11153177&sec=nation

42.    Luke Gilkerson 2012. Caught By a Predator: Woman Speaks Out 10 Years After Her Abduction. Issue 16, January. http://www.covenanteyes.com/pureminds-articles/caught-by-a-predator-10-years-after-her-abduction/ 

43.    Luke Eliot 2011. Cloud computing 'a security worry'. The West Australian, Business: 9, 9 November

44.    Melissa Norris 2011. Fighting cybercrime requires network approach. UniSA News November issue. http://www.unisa.edu.au/unisanews/2011/november/story10.asp

45.    Daniel Hoy 2011. To infinity and beyond. The advertiser, Career: 2–3, 3 September. http://www.couriermail.com.au/ipad/to-infinity-and-beyond/story-fn6ck8la-1226128366176

46.    Australian Security Magazine 2011. Cybercriminals and organised crime choose their targets well. Australian Security Magazine May/June issue: 18–19

47.    Anthony Wong 2011. Action needed on social media security. The Australian: 30, 30 May. http://www.theaustralian.com.au/australian-it/government-action-needed-on-social-media-security/story-e6frgakx-1226065965846 

48.    Emma Brown 2011. Visa consumer targeting under the privacy microscope. Direct Magazine 5 May. http://directmag.net.au/2011/05/05/visa-consumer-targeting-under-the-privacy-microscope/ 

49.    Hafizah Osman 2011. Computer expert warns Facebook and LinkedIn ripe for attack. Arnnet.com.au 3 May. http://www.arnnet.com.au/article/385121/computer_expert_warns_facebook_linkedin_ripe_attack/

50.    Hamish Barwick 2011. Treat cyber crime as an act of war: IT lecturer. CIO.com.au 2 May. http://www.cio.com.au/article/384922/treat_cyber_crime_an_act_war_it_lecturer/

51.    Michiel Willems 2011. Fight against fraud drives global Chip and PIN uptake. E-finance & Payments Law & Policy 5(4), April 2011

52.    Miles Kemp 2011. Australia is 'at war' with hackers. The Advertiser 30 March: 13. (Also available online http://www.adelaidenow.com.au/australia-is-at-war-with-hackers/story-e6frea6u-1226030408430)

53.    Staff Writer 2011. Insurance a target of choice for cyber criminals. Insurance news 7 March. http://insurancenews.com.au/local/insurance-a-target-of-choice-for-cyber-criminals

54.    Staff Writer 2011. Financial industry 'target of choice' for cybercrims. SC magazine 21 February. http://www.securecomputing.net.au/News/248818,financial-industry-target-of-choice-for-cybercrims.aspx

55.    Darren Pauli 2011. Crime institute says govt tenders too soft. ZDNet 15 February. http://www.zdnet.com.au/crime-institute-says-govt-tenders-too-soft-339309197.htm

56.    Lia Timson 2011. Your money or your life. My Business magazine February 2011 issue: 58–60. (Also Available online http://www.mybusiness.com.au/index.php?category=My-Business-Technology&article=Your-money-or-your-life&&show=1)

57.    PS News 2011. Call to toughen tender terms. PS News issue 253, 22 February. http://www.psnews.com.au/Page_psn2531.html

58.    Hariati Azizan 2010. Guarding the gates. The star 19 December. http://thestar.com.my/news/story.asp?file=/2010/12/19/nation/7515691&sec=nation

59.    Simon Sharwood 2010. Head full of clouds. My Business magazine December 2010/January 2011 issue: 58-60. (Also available online http://www.mybusiness.com.au/articles/My-Business-Technology/Head-full-of-clouds)

60.    Australian Institute of Criminology 2010. Pearcey award for AIC cybercrime expert. Brief December 2010 Issue: 4

61.    University of South Australia 2010. ICT award for Choo. University of South Australia magazine Summer 2010: 4

62.    University of South Australia 2010. November 2010 Alumni Profiles: Dr Raymond Choo. Graduate Update November 2010 Issue. http://www.unisa.edu.au/alumni/profiles/Nov10profiles.asp

63.    Pearcey award – Canberra’s highest ICT honour. Business and Industry Development eNewsletter Issue 20: 25 November 2010. http://www.business.act.gov.au/doing_business_in_canberra/eNewsletters_issued_monthly/november_2010_enewsletter/act_pearcey_award_-_highest_ict_honour  

64.    Xinghui Guo 2010. Internet safety to be taught in UAE schools. FutureGov 15 November. http://www.futuregov.asia/articles/2010/nov/15/internet-safety-be-taught-uae-schools/

65.    Fulbright Alumnus Receives Multiple IT Awards in Australia. State Alumni, 6 November 2010. https://alumni.state.gov/news2/alumni-news/fulbright-alumnus-receives-multiple-it-awards-in-australia

66.    Eleri Harris 2010. Dr Choo's prize for life in crime. CityNews, 4-10 November: 4

67.    Mahesh Sharma 2010. Data privacy legislation hampering cyber crime prevention: ACC. Computerworld.com.au 21 October. http://www.computerworld.com.au/article/365077/data_privacy_legislation_hampering_cyber_crime_prevention_acc/

68.    Mahesh Sharma 2010. Cloud floats through cybercrime legislation: Crime Commission. Computerworld.com.au 19 October. http://www.computerworld.com.au/article/364787/cloud_floats_through_cybercrime_legislation_crime_commission/?fp=4&fpid=5

69.    Andrew Colvin 2010. International Serious and Organised Crime Conference: Closing Address by Deputy Commissioner Andrew Colvin. Media release 19 October. http://www.afp.gov.au/media-centre/speeches/2010/international-serious-and-organised-crime-conference.aspx

70.    Branko Miletic 2010. Aussie Internet Users Victims of Fraud. Cyber shack 9 September. http://www.cybershack.com/news/aussie-internet-users-victims-fraud

71.    Norton from Symantec 2010. Consumers warned about the rise of online “armed robbery”. Media alert 9 September

72.    Mark Dapin 2010. 10 Myths of Australian Crime. Sydney Morning Herald, Good Weekend Magazine, 14 August: 25

73.    Markus Jakobsson 2010. Are Nigerian Scams From Nigeria?. Security week 10 June. http://www.securityweek.com/are-nigerian-scams-nigeria

74.    Paul Millar 2010. Internet risk to children on rise. The age, 21 May: 5. http://www.theage.com.au/victoria/internet-risk-to-children-on-rise-20100520-vowh.html

75.    Singapore Polytechnic 2010. InSPire 2010 magazine: 4. http://www.sp.edu.sg/resources/docs/publications/inspire2010/SPInspire2010.pdf

76.    Australian and New Zealand Society of Criminology (ANZSOC) 2010. Newsletter 7(1):10, May issue

77.    Amy Simmons 2010. Facebook probes password hackings. ABC News, 30 April. http://www.abc.net.au/news/stories/2010/04/30/2887235.htm?section=justin

78.    Lia Timson 2010. Webmail all locked up. Sydney Morning Herald, News: 10, 20 April. http://www.smh.com.au/technology/technology-news/webmail-all-locked-up-20100419-sp9c.html

79.    ARC Centre of Excellence in Policing and Security (CEPS) 2010. CEPS ANU eBulletin 1 April

80.    Sally Neighbour 2010. Terror moves into the digital age. The Australian, APlus: 13, 17 March

81.    Sarah Condie 2010. Facebook and behaviour of "friends". State library of New South Wales, 9 March. http://blog.sl.nsw.gov.au/hsc_legal_studies/index.cfm/2010/3/9/facebook-and-behaviour-of-friends

82.    企業遭黑客入侵的風險上升 2010. New Zealand Chinese Herald, 25 February. http://www.chnet.co.nz/index.asp?nodeid=12832&newsid=61226&ly=content

83.    Chris Zappone 2010. Hack attack - rising risk for business.  Sydney Morning Herald 23 February. http://www.smh.com.au/business/hack-attack--rising-risk-for-business-20100223-ouoy.html

84.    Cyber crime threat against businesses on the rise, report warns. British Computer Society, 23 February 2010. http://www.bcs.org/server.php?show=conWebDoc.34518

85.    University of Queensland 2010. 2005: Fullbright scholarship for business graduate. Graduate Contact Centenary Edition 2010: 44

86.    Queensland University of Technology 2010. Cyber superman: Research aims to save home. Solutions: QUT research highlights: 38

87.    National Security Australia 2010. Speakers Interviews: Exclusive Interview with Raymond Choo. Sydney

88.    McAfee 2009. Virtual Criminology Report 2009: Virtually Here: The Age of Cyber Warfare. Santa Clara, CA: McAfee 2009, Inc

89.    Karen Dearne  2009. Cyber warfare on the horizon. Australian IT, 19 November. http://www.theaustralian.com.au/australian-it/cyber-warfare-on-the-horizon/story-e6frgakx-1225799731672

90.    Ren Yingying 2009. Cyber warfare is coming. Global Times, 19 November. http://world.globaltimes.cn/editor-picks/2009-11/486464.html

91.    Australian Institute of Criminology 2009. Annual report 2008/09. Canberra: Australian Institute of Criminology, October. http://www.aic.gov.au/en/publications/current%20series/annualreport/11-20/2009.aspx

92.    Liew Hanqing 2009. Booked through facebook?.  The New Paper (Singapore), News: 6-7, 28 October

93.    Simon Grose 2009. Attack of the zombies. About the House September issue: 24 – 27

94.    George Gordon 2009. Member profile. IEEE GOLDRush newsletter September issue: 7

95.    Amelia Mulcahy 2009. Cybercrime knows no limits. UniSA news September issue: 9

96.    Niki Widdowson 2009. Cyber superman. QUT Links August issue: 19

97.    Peggy Giakoumelos 2009. Giakoumelos says Austns are at a growing risk of being targeted by internet. SBS Ethnic Radio Melbourne World View, 27 August

98.    David Stockman2009. Psst! Wanna buy an identity? That'll be 80c. Canberra Times, News: 4, 20 August

99.    Belinda Neal 2009. Australian Institute of Criminology experts at cyber crime hearing. Media release House of Representatives Standing Committee on Communications, 18 August. http://www.aph.gov.au/house/committee/coms/cybercrime/media/media02.pdf

100. Stuart Corner 2009. Cyber crime experts to front House of Reps enquiry. IT wire, 18 August. http://www.itwire.com/content/view/27039/127/

101. Zaihan Mohamed Yusof 2009. Trap them or ... scare them?. The New Paper (Singapore), News: 4–5, 2 August

102. Hanqing Liew 2009. PARENTS, do you know who your kids are chatting with?. The New Paper (Singapore), News: 8–9, 12 July

103. Cheryl Critchley 2009. Sexual deviants trawl social networking sites. Herald Sun, General news: 28, 8 July. http://www.news.com.au/heraldsun/story/0,21985,25748856-662,00.html

104. Louis Andrews 2009. Call for action against online sex grooming. Canberra Times, News: 5, 7 July. http://www.canberratimes.com.au/news/national/national/general/call-for-action-against-online-sex-grooming/1560795.aspx

105. Peter Gregory 2009. Parents warned of online dangers. The Age 7 July. http://www.theage.com.au/national/parents-warned-of-online-dangers-20090706-dajt.html

106. Neil Mitchell 2009. Parents urged to learn 'online speak'. 3AW Mornings, 7 July. http://www.3aw.com.au/blogs/3aw-generic-blog/parents-urged-to-learn-online-speak/20090707-dazv.html

107. Chris Zappone 2009. CBA's NetBank woes blamed on cyber attack.  Sydney Morning Herald, Business Day 2 July

108. UniSIM Alumnus Awarded Prestigious Fulbright Scholarship 2009. SIM University newsletter issue 6:3, June issue

109. Geraldine Soh 2009. Humans - the Best Anti-Virus Software. 938 Live Singapore 19 June

110. Yuko Narushima 2009. Faceless ID thefts. Sydney Morning Herald, News: 4, 19 May. http://www.smh.com.au/articles/2009/05/18/1242498698917.html

111. Fiona Sutton 2009. Fulbright scholarship for UQ Business School graduate.  University of Queensland news online, 1 May. http://www.uq.edu.au/news/index.html?article=18133

112. Simon Grose 2009. Cybercrime Sherlock. Canberra Times, Computing: 14, 6 April. http://www.canberratimes.com.au/news/national/national/general/cybercrime-sherlock/1479110.aspx

113. Victoria Simos 2009. Chasing the big phish. Herald Sun, Career One: 55, 4 April

114. Dahna McConnachie 2009. Fullbright scholar: cyber-crime has multi dimensions and needs co-operative responses. Technology & Business, 2 April. http://www.technologyandbusiness.com.au/server-hardware-software/Interviews/Fullbright-scholar--cyber-crime-has-multi-dimensio.aspx

115. The Fulbrighter 22(1), Canberra: Australian–American Fulbright Commission, April 2009

116. Graduate destination: Dr Kim Kwang (Raymond) Choo. Newsletter April 2009: 4, Brisbane: Information Security Institute, Queensland University of Technology

117. Scholarship for AIC analyst.  Security Management, 3 April 2009

118. AIC analyst wins Fulbright Scholarship. Australian Institute of Criminology Brief No 1: 2, Canberra: Australian Institute of Criminology, April 2009

119. Scholarship for AIC analyst 2009.  Australian Security Management headlines: 4, 27 March

120. Swag of Fulbrights head to US 2009.  The Australian, 19 March

121. Dr Ray shines for Fulbright award 2009.  PS News, 17 March. http://www.psnews.com.au/Page_psn16015.html

122. Aussie analyst to research future cybercrime threats in the US 2009.  Technology & Business, 16 March. http://www.technologyandbusiness.com.au/security/News/Aussie-analyst-to-research-future-cybercrime-threa.aspx

123. Hansard: Joint Committee on the Australian Crime Commission 2009. Legislative arrangements to outlaw serious and organised crime groups. Commonwealth of Australia: Parliament of Australia, 4 March 2009. http://www.aph.gov.au/hansard/joint/commttee/J11670.pdf

124. News Release: Homeland Security to Take Centre Stage with Global Security Asia 2009. Media release 2 March. http://www.prweb.com/releases/security/GSA2009/prweb2192314.htm

125. 保護兒少上網安全策略之國外經驗分享: 兒少上網安全國際研討會.  End Children Prostitution, Child Pornography & trafficking of Children for Sexual Purposes (ECPAT) Taiwan, 5 January 2009. http://www.ecpat.org.tw/dnews/knowledge.asp?qbid=131

126. Carolyn Quek 2008. When bad times strike, so do more criminals. The Sunday Times, Think section: 33, 30 November

127. Adam Saytanides 2008. Prepaid Money-Laundering Concerns Grow. Prepaid Trends 3(23): 1, 7 & 11, 23 October

128. Singapore Polytechnic 2007. Alumnus turns high-tech crime sleuth. SPAN News Magazine issue 29, July. http://www.sp.edu.sg/resources/docs/span/SPANNewsIssue29.pdf

129. Maria Lewis 2006. LIFE: STRANGE OBSESSIONS Boffins fascinated by wacky and weird. The Gold Coast Bulletin: 47, 26 August