- Job title of nominated professional: Associate Professor of Cyber Security and Forensics
- Company (where nominated professional or team is working): University of South Australia
- Website: http://people.unisa.edu.au/raymond.choo
- Company size (employees): 7000
- Country: Australia
In 3 bullets, summarize why this professional or team deserves recognition:
1. Dr Choo is recognised nationally and internationally as a research leader and expert in cyber security and forensics, as evidenced by numerous national and international appointments, awards and invitations as keynote/plenary speaker and invitations to provide expert opinion on policy developments.
2. The fundamental strength of Dr Choo’s teaching leadership in cyber security and forensics is purposefully teaching research interactions, where he integrates scholarship, research and professional learning activities, educating the next generation of cyber warriors within a research rich and intellectually stimulating environment. For example, since he joined academia in March 2011, he has supervised to completion five Doctoral, ten Masters and nine Honours (eight 1st Class and one 2nd upper Honours) students. He is currently supervising 16 PhD (8 as principal supervisor, and 6 as co supervisor at UniSA, 1 as co supervisor at ANU, and 1 as associate supervisor at RMIT), four Masters, and one Honours students.
3. Dr Choo is an active member of society, and holds honorary positions with a number of national and global professional bodies.
In less than 300 words, summarize the achievements of the professional or team in the nominated category
Dr Choo has made a distinguished contribution to cyber security and forensics. He has co-edited “Cloud Security Ecosystem” (Elsevier, 2015), (co)authored a number of publications including a book published by Springer, a book published by Elsevier (Forewords written by Australia’s Chief Defence Scientist and Chair of the Electronic Evidence Specialist Advisory Group), seven Australian Government Institute of Criminology refereed monographs, 15 refereed book chapters, 97 refereed journal articles, 62 refereed conference articles and six parliamentary submissions. He is the co-inventor of two PCT and one provisional patent applications filed in 2015. His research has been widely cited, including in key government reports such as the Australian Government, UNODC, ITU, UK Home Office. One of his published cryptographic protocols was included in two independent submissions to the IEEE 802.11 by computer scientists from Fujitsu Labs; and the IETF/Network Working Group by a team of computer scientists from Tropos Networks (US), Toshiba, Huawei, and University of Murcia. His published design principle about how session keys should be constructed in cryptographic (key establishment) protocols that result in significant benefits for their security was cited in a special publication (SP 800-56A) by US National Institute of Standards and Technology.
His opinions are regularly published in the media and he holds honorary positions with a number of national and global professional bodies. He is regularly invited to speak (e.g. 2014 World Internet Conference, organized by the Cyberspace Administration of China). He was a Keynote/Plenary Speaker at conferences such as IEEE International Conference on Data Science and Data Intensive Systems 2015, and those organised by Infocomm Development Authority of Singapore (2015), Cloud Security Alliance NZ (2015), CSO Australia and Trend Micro (2015), Anti-Phishing Working Group (2014), National Taiwan University of Science and Technology (2014), etc. He was also an Invited Expert of UNAFEI and