Preliminary program

 

The preliminary program is now available below. You can also download a copy by clicking on the button below.

Please note this is subject to change.


  • Streams
  • Catering/Networking
  • Plenary
  • Cyber intelligence and security
  • International cybercrime trends
  • Financial cybercrime
  • Practice and technology
  • Identity crime
  • Online sexual exploitation
  • Technologies of prevention
  • Community session
  • Forensic analysis
  • Cyber laws and cyber cases
  • Policing in cybercrime
  • Collaborative responses to cybercrime
  • Threats to organisations
  • Emerging cyber risks
Time
Session
Duration
Cost
6:00 PM
  • Welcome reception

    The welcome reception is a great chance to network with other delegates while enjoying refreshments and canapes.

    The welcome reception is complimentary for conference delegates. If you would like to bring a guest who is not attending the conference you may purchase extra tickets.

    2 hours
Time
Session
Duration
Cost
8:00 AM
  • Registration
    30 mins
8:30 AM
  • Conference opening

    Rick Brown

    Dr Rick Brown is Deputy Director with the Australian Institute of Criminology (AIC). Since... More

    5 mins
8:35 AM
  • Opening speech
    The Hon Michael Keenan MP

    Minister for Justice

    25 mins
9:00 AM
  • Welcome speech
    Paul Williams

    Acting Deptuy CEO, Australian Criminal Intelligence Commission

    15 mins
9:15 AM
  • Cybercrime: Focusing on the fundamentals
    Dr Tobias Feakin

    Dr Tobias Feakin is Australia’s inaugural Ambassador for Cyber Affairs. He leads... More

    45 mins
10:00 AM
  • Morning tea
    15 mins
10:15 AM
  • The next wave of technology and its use in fighting crime
    Professor Hugh Bradlow

    Hugh S. Bradlow is President of the Australian Academy of Technology and Engineering, and Chief... More

    45 mins
11:00 AM
  • Cyber threat intelligence information sharing
    Edilson Arenas

    CQUniversity

    20 mins
  • Cybercrime and cyber security in ASEAN
    Lennon Y.C. Chang

    Monash University

    20 mins
  • Virtual currency and cybercrime
    Tala Stevens

    Australian Criminal Intelligence Commission Tala Stevens manages the ACIC Cybercrime Strategic... More

    20 mins
11:20 AM
  • Measuring information security readiness in a distributed cloud environment
    Champake Mendis

    Charles Sturt University

    20 mins
  • Situations of cybercrime and the corresponding social responses in modern China: learning from western experiences
    Hua Zhong

    The Chinese University of Hong Kong

    20 mins
  • Information technologies and fraud risks for the Commonwealth
    Penelope Jorna

    Australian Institute of Criminology

    20 mins
11:40 AM
  • Text thermal alert model: an analysis of Twitter lingo for privacy leaks and tweet regrets
    Karthika Subbaraj

    SSN College of Engineering

    20 mins
  • Cybercrime: Awareness and mitigation policies in Ghana
    Kolog Solomon Polpiem

    Nanjing University of Science and Technology

    20 mins
  • The knowing-doing gap: is knowledge enough to prevent cyber-fraud victimisation?
    Jacqueline Drew

    Griffith University

    20 mins
12:00 PM
  • Integrating 'self-efficacy' into a gamified approach to thwart phishing attacks
    Nalin Asanka Gamagedara Arachchilage

    Australian Centre for Cyber Security

    20 mins
  • A research study concerning applicability of law on cyber bullying among law students: The case of Indonesia
    Antonius Wibowo

    Atma Jaya Catholic University of Indonesia

    20 mins
  • The future of information security in the digital economy
    Ivano Bongiovanni

    Queensland University of Technology

    20 mins
12:30 PM
  • Lunch
    45 mins
1:15 PM
  • Big data analytics for cyber security
    Professor Janet Chan

    Janet Chan, PhD, FASSA, is Professor at UNSW Law. Internationally recognised for her... More

    45 mins
2:00 PM
  • Localization of automobiles in urban environment using machine intelligence techniques for prevention of car hacking
    Ashwani Kumar

    SLIET

    30 mins
  • The double-edged sword of identity misuse in cyberspace
    Dr Russell G Smith

    Australian Institute of Criminology

    30 mins
  • Behind the screen: online child exploitation in Australia
    Indika Chandrasekera

    Anti-Slavery Australia

    Elizabeth Sheridan

    Anti-Slavery Australia

    30 mins
2:30 PM
  • Bring Your Own Awareness through Practising Educational Mobile Gaming
    Khulood AlZaabi

    30 mins
  • Identity theft and mobile phone portability: A failure of regulatory responses
    Terry Goldsworthy

    Bond University

    30 mins
  • Not just 'revenge': The nature and correlates of image-based sexual abuse perpetration by Australian adults
    Anastasia Powell

    RMIT University

    30 mins
3:00 PM
  • Development of ICS Honeynet for cyber tagout in critical infrastructure
    Shoya Kojima

    Nagoya Institute of Technology

    30 mins
  • Young adults' perceptions of, and engagement with, online pornographic material in Australia
    Sarah Brown

    30 mins
  • Identity, blockchain and cybercrime
    Greg Adamson

    University of Melbourne

    30 mins
3:30 PM
  • Afternoon tea
    15 mins
3:45 PM
  • Combating malicious cyber activity
    Dr Ewan Ward

    Dr Ewan Ward is the Director of CERT Australia’s Brisbane office, a position he has held... More

    45 mins
4:30 PM
  • Community panel session and closing remarks

    Members of the public are welcome to attend this community panel free of charge.

    Topic 1: Achieving collaboration between researchers, policy makers and technologists

    Topic 2: Coordinating reporting

    Topic 3: Targeting hardening for prevention through software and hardware design

    Topic 4: Preventing re-victimisation and support victims of cybercrime

    Closing remarks for Day One

    Professor David Wall

    David S. Wall, PhD is Professor of Criminology in the Centre for Criminal Justice studies,... More

    Professor Jonathan Clough

    Dr Jonathan Clough is a Professor and Director (Higher Degrees by Research) in the Faculty of... More

    Dr Russell G Smith

    Australian Institute of Criminology

    Michelle Price

    Australian Cyber Security Growth Network. Australia's Cyber Security Strategy, launched in... More

    Dr Christy Chiang

    National Taipei University of Technology

    Professor Roderic Broadhurst

    Australian National University

    Tala Stevens

    Australian Criminal Intelligence Commission Tala Stevens manages the ACIC Cybercrime Strategic... More

    1.5 hours
6:30 PM
  • Conference dinner

    The ICCCF conference dinner will be held on Monday 17 July in the Broadbeach Room at Sofitel Gold Coast Broadbeach. The audience will enjoy a three course meal and hear from our guest speaker, Professor Roger Bradbury from the National Security College.

    Tickets are $110 per head and if you would like to bring a guest who is not attending the conference you may purchase extra tickets.

    Professor Roger Bradbury

    Professor Roger Bradbury leads the Strategy and Statecraft in Cyberspace research program for... More

    3.5 hours
    $110.00
Time
Session
Duration
Cost
8:30 AM
  • Opening remarks
    Dr Laurie Lau

    Dr Laurie Lau has a Doctor of Philosophy from the Faculty of Humanities, Law and Social... More

    15 mins
8:45 AM
  • Detecting and preventing mass-marketing fraud: An interdisciplinary approach
    Professor Monica Whitty

    Monica Whitty is Professor of Human Factors in Cyber Security in the Cyber Security Centre at... More

    45 mins
9:30 AM
  • The art of the possible: What can we learn from successful cybercrime prosecutions?
    Professor Jonathan Clough

    Dr Jonathan Clough is a Professor and Director (Higher Degrees by Research) in the Faculty of... More

    45 mins
10:15 AM
  • Morning tea
    15 mins
10:30 AM
  • Deep sea phishing: malicious URLs detection using deep learning
    Mamoun Alazab

    30 mins
  • The future of intellectual property in the world of artificial intelligence and robots
    Hedi Nasheri

    Kent State Unviersity

    30 mins
  • Australian police and the fight against cybercrime
    Rick Sarre

    University of South Australia

    30 mins
11:00 AM
  • Android mobile forensics for files system
    Aiman Al-Sabaawi

    Queensland University of Technology

    30 mins
  • Characteristics of cyber-crimes: Evidence from Chinese judgment documents
    Tianji Cai

    University of Macau

    30 mins
  • The development of specialist police cybercrime units: What is best practice for combatting cybercrime?
    Chad Whelan

    Deakin University

    30 mins
11:30 AM
  • Recurrent Neural Network (RNN) base computational model for cyber attack detection
    Teik-Toe Teoh

    Singapore University of Technology and Design

    30 mins
  • From the cyber to the 3D printer: Darknet design files and 3D printed firearms
    Angela Daly

    Queensland University of Technology

    30 mins
  • The Playpen cases: Computer network operations and extraterritorial criminal law enforcement
    Ian Warren

    Deakin University

    30 mins
12:00 PM
  • Lunch
    45 mins
12:45 PM
  • Conceptualising cybercrime today: Happy birthday internet, you are 25
    Professor David Wall

    David S. Wall, PhD is Professor of Criminology in the Centre for Criminal Justice studies,... More

    45 mins
1:30 PM
  • The motivations and challenges of reporting online fraud to the 'fraud justice network'
    Cassandra Cross

    Senior Lecturer, Queensland University of Technology

    30 mins
  • Artificial intelligences and robotics in 2030s social technologies: A possible scenario and the challenges to society
    Laurie Lau

    Asia Pacific Association of Technology and Society

    30 mins
  • The dangers to data protection insider triggered - an empirical study
    Ravi Thodla

    School of Management, S.R.M. University, Chennai

    30 mins
2:00 PM
  • Cyberterrorism: a review of risks
    Professor Roderic Broadhurst

    Australian National University

    30 mins
  • Malware in the WA State Government
    Peter Bouhlas

    Office of the Auditor General

    30 mins
  • Profiling security and privacy threats for smart-home IoT devices
    Hassan Habibi Gharakheili

    University of New South Wales

    30 mins
2:30 PM
  • Investigation of cyber security practices in academic institutions
    Anurag Jain

    Guru Gobind Singh Indraprastha University, India

    30 mins
  • Transnational online crime, extradition and human rights: An analysis of US-UK cases for cyber offending
    Monique Mann

    30 mins
  • Integrity oriented clustering of IoT system
    Hideyuki Shintani

    Nagoya Institute of Technology

    30 mins
3:00 PM
  • Afternoon tea
    15 mins
3:15 PM
  • Covert policing in the digital age
    Professor Peter Grabosky

    Peter Grabosky is Professor Emeritus in the School of Regulation and Global Governance (RegNet)... More

    30 mins
3:45 PM
  • Closing remarks
    15 mins