Preliminary program

 

The preliminary program is now available below. You can also download a copy by clicking on the button below.

Please note this is subject to change.


  • Streams
  • Catering/Networking
  • Plenary
  • Cyber intelligence and security
  • International cybercrime trends
  • Financial cybercrime
  • Technologies of prevention
  • Identity crime
  • Online sexual exploitation
  • Practice and technology
  • Community session
  • Forensic analysis
  • Cyber laws and cyber cases
  • Policing in cybercrime
  • Collaborative responses to cybercrime
  • Internet of Things
  • Data protection and privacy
Time
Session
Duration
Cost
6:00 PM
  • Welcome reception

    The welcome reception is a great chance to network with other delegates while enjoying refreshments and canapes.

    The welcome reception is complimentary for conference delegates. If you would like to bring a guest who is not attending the conference you may purchase extra tickets.

    2 hours
Time
Session
Duration
Cost
8:00 AM
  • Registration
    30 mins
8:30 AM
  • Conference opening
    45 mins
9:15 AM
  • Cybercrime: focusing on the fundamentals
    Dr Tobias Feakin

    Dr Tobias Feakin is Australia’s inaugural Ambassador for Cyber Affairs. He leads... More

    45 mins
10:00 AM
  • Morning tea
    15 mins
10:15 AM
  • The next wave of technology and its use in fighting crime
    Professor Hugh Bradlow

    Hugh S. Bradlow is President of the Australian Academy of Technology and Engineering, and Chief... More

    45 mins
11:00 AM
  • Cyber threat intelligence information sharing
    Edilson Arenas

    CQUniversity

    20 mins
  • Cybercrime and cyber security in ASEAN
    Lennon Y.C. Chang

    Monash University

    20 mins
  • Virtual currency and cybercrime
    Tala Stevens

    Australian Criminal Intelligence Commission

    30 mins
11:20 AM
  • Measuring information security readiness in a distributed cloud environment
    Champake Mendis

    Charles Sturt University

    20 mins
  • Situations of cybercrime and the corresponding social responses in modern China: learning from western experiences
    Hua Zhong

    The Chinese University of Hong Kong

    20 mins
11:30 AM
  • Information technologies and fraud risks for the Commonwealth
    Penelope Jorna

    Australian Institute of Criminology

    30 mins
11:40 AM
  • Text thermal alert model: an analysis of Twitter lingo for privacy leaks and tweet regrets
    Karthika Subbaraj

    SSN College of Engineering

    20 mins
  • Cybercrime: awareness and mitigation policies in Ghana
    Kolog Solomon Polpiem

    Nanjing University of Science and Technology

    20 mins
12:00 PM
  • Integrating 'self-efficacy' into a gamified approach to thwart phishing attacks
    Nalin Asanka Gamagedara Arachchilage

    Australian Centre for Cyber Security

    20 mins
  • A research study concerning applicability of law on cyber bullying among law students: the case of Indonesia
    Antonius Wibowo

    Atma Jaya Catholic University of Indonesia

    20 mins
  • The knowing-doing gap: is knowledge enough to prevent cyber-fraud victimisation?
    Jacqueline Drew

    Griffith University

    30 mins
12:30 PM
  • Lunch
    45 mins
1:15 PM
  • Big data analytics for cyber security
    Professor Janet Chan

    Janet Chan, PhD, FASSA, is Professor at UNSW Law. Internationally recognised for her... More

    45 mins
2:00 PM
  • Development of ICS Honeynet for cyber tagout in critical infrastructure
    Shoya Kojima

    Nagoya Institute of Technology

    30 mins
  • The double-edged sword of identity misuse in cyberspace
    Russell Smith

    Australian Institute of Criminology

    30 mins
  • Behind the screen: online child exploitation in Australia
    Indika Chandrasekera

    Anti-Slavery Australia

    Elizabeth Sheridan

    Anti-Slavery Australia

    30 mins
2:30 PM
  • Localization of automobiles in urban environment using machine intelligence techniques for prevention of car hacking
    Ashwani Kumar

    SLIET

    30 mins
  • Not just 'revenge': The nature and correlates of image-based sexual abuse perpetration by Australian adults
    Anastasia Powell

    RMIT University

    30 mins
  • Identity, blockchain and cybercrime
    Greg Adamson

    University of Melbourne

    30 mins
3:00 PM
  • Artificial intelligences and robotics in 2030s 'Social Technologies': a possible scenario and the challenges to society
    Laurie Lau

    Asia Pacific Association of Technology and Society

    30 mins
  • Identity theft and mobile phone portability: a failure of regulatory responses
    Terry Goldsworthy

    Bond University

    30 mins
  • Young adults' perceptions of, and engagement with, online pornographic material in Australia
    Nadine McKillop

    USC Australia

    Sarah Brown

    30 mins
3:30 PM
  • Afternoon tea
    15 mins
3:45 PM
  • Community panel session

    Members of the public are welcome to attend this community panel free of charge.

    3.45pm Topic 1: Achieving collaboration between researchers, policy makers and technologists

    4.10pm Topic 2: Coordinating reporting

    4.35pm Topic 3: Targeting hardening for prevention through software and hardware design

    5.00pm Topic 4: Preventing re-victimisation and support victims of cybercrime

    5.25pm Closing remarks for Day One

    Professor David Wall

    David S. Wall, PhD is Professor of Criminology in the Centre for Criminal Justice studies,... More

    Professor Jonathan Clough

    Dr Jonathan Clough is a Professor and Director (Higher Degrees by Research) in the Faculty of... More

    Russell Smith

    Australian Institute of Criminology

    Michelle Price

    Australian Cyber Security Growth Network

    Dr Chisty Chiang

    National Taipei University of Technology

    Professor Roderic Broadhurst

    Australian National University

    Tala Stevens

    Australian Criminal Intelligence Commission

    1.75 hours
6:30 PM
  • Conference dinner

    The ICCCF conference dinner will be held on Monday 17 July in the Broadbeach Room at Sofitel Gold Coast Broadbeach. The audience will enjoy a 3 course meal and hear from our guest speaker, Professor Roger Bradbury from the National Security College.

    Tickets are $110 per head and if you would like to bring a guest who is not attending the conference you may purchase extra tickets.

    Professor Roger Bradbury

    Professor Roger Bradbury leads the Strategy and Statecraft in Cyberspace research program for... More

    3.5 hours
    $110.00
Time
Session
Duration
Cost
8:30 AM
  • Opening remarks
    Rick Brown

    Dr Rick Brown is Deputy Director with the Australian Institute of Criminology (AIC). Since... More

    15 mins
8:45 AM
  • Detecting and preventing mass-marketing fraud: an interdisciplinary approach
    Professor Monica Whitty

    Monica Whitty is Professor of Human Factors in Cyber Security in the Cyber Security Centre at... More

    45 mins
9:30 AM
  • The art of the possible. What can we learn from successful cybercrime prosecutions?
    Professor Jonathan Clough

    Dr Jonathan Clough is a Professor and Director (Higher Degrees by Research) in the Faculty of... More

    45 mins
10:15 AM
  • Morning tea
    15 mins
10:30 AM
  • Recurrent Neural Network (RNN) base computational model for cyber attack detection
    Teik-Toe Teoh

    Singapore University of Technology and Design

    30 mins
  • The future of intellectual property in the world of artificial intelligence and robots
    Hedi Nasheri

    Kent State Unviersity

    30 mins
  • Australian police and the fight against cybercrime
    Rick Sarre

    University of South Australia

    30 mins
11:00 AM
  • Android mobile forensics for files system
    Aiman Al-Sabaawi

    Queensland University of Technology

    30 mins
  • Characteristics of cyber-crimes: evidence from Chinese judgment documents
    Tianji Cai

    University of Macau

    30 mins
  • The development of specialist police cyber-crime units: what is best practice for combatting cyber-crime?
    Diarmaid Harkin

    Deakin University

    30 mins
11:30 AM
  • Integrity oriented clustering of IoT system
    Hideyuki Shintani

    Nagoya Institute of Technology

    30 mins
  • From the cyber to the 3D printer: Darknet design files and 3D printed firearms
    Angela Daly

    Queensland University of Technology

    30 mins
  • The Playpen Cases: Computer network operations and extraterritorial criminal law enforcement
    Ian Warren

    Deakin University

    30 mins
12:00 PM
  • Lunch
    45 mins
12:45 PM
  • Conceptualising cybercrime today: Happy birthday internet, you are 25
    Professor David Wall

    David S. Wall, PhD is Professor of Criminology in the Centre for Criminal Justice studies,... More

    45 mins
1:30 PM
  • The motivations and challenges of reporting online fraud to the 'fraud justice network'
    Cassandra Cross

    Senior Lecturer, Queensland University of Technology

    30 mins
  • Internet of Things and Cybercrime
    Gonçalo S. de Melo Bandeira

    Polythecnic (Public) Institute of Cavado and Ave, Management School, Portugal

    30 mins
  • The dangers to data protection insider triggered - an empirical study
    Ravi Thodla

    School of Management, S.R.M. University, Chennai

    30 mins
2:00 PM
  • Self-adaptive privacy engine for Internet of Things
    Mohannad Alhanahnah

    University of Nebraska-Lincoln

    Mamoun Alazab

    30 mins
  • The need for a collaborative approach to address online fraud victimisation
    Catherine Emami

    Australian Institute of Criminology

    30 mins
  • Profiling security and privacy threats for smart-home IoT devices
    Hassan Habibi Gharakheili

    University of New South Wales

    30 mins
2:30 PM
  • Investigation of cyber security practices in academic institutions
    Anurag Jain

    Guru Gobind Singh Indraprastha University, India

    30 mins
  • Transnational online crime, extradition and human rights: an analysis of US-UK cases for cyber offending
    Monique Mann

    30 mins
3:00 PM
  • Afternoon tea
    15 mins
3:15 PM
  • Covert policing in the digital age
    Professor Peter Grabosky

    Peter Grabosky is Professor Emeritus in the School of Regulation and Global Governance (RegNet)... More

    30 mins
4:15 PM
  • Closing remarks
    15 mins