Digital advancements over the past decade provide police with multiple opportunities to modernise their processes and assist with their daily duties. The advances in computer and robotic systems can facilitate in predicting, preventing, and detecting crime, along with more efficient and accurate recording, and storing, of information relating to the NSWPF workforce and criminal matters.

NSWPF is particularly interested in research into:

13.1 The identification of opportunities for using digital communication platforms for operational policing and an evaluation of any risks and benefits.

13.2 What opportunities are there for using augmented reality software in police training? What are the benefits of this approach and is it more effective than traditional training methods?

13.3 What role does technology have in crime prevention or detection?

13.4 What IT tools can be used to predict police behaviours – sick leave, misconduct?

13.5 In addition to current uses, what else can body worn data and imagery be used for (e.g., AI integration, real time operational response and/or training)?

13.6 The NSWPF has commenced big data analytics utilising software that is currently best served with mobile phone data. NSWPF is interested in research evaluating the efficacy and usability of the different software available to process and analyse evidence from large and complex datasets.

13.7 What opportunities are there for using the following developing and emerging technologies in policing, and what risks do they pose?

  • Data Science/Artificial Intelligence/Machine Learning – to inform predictive crime, human behaviour, natural language processing, large language models, video analytics, facial recognition, voice to text recognition etc.
  • Data Lakes – development of centralised repositories to store and process unstructured information into to structured format to allow for information analysis.

13.8 How will future technology impact upon intelligence analytics in policing into the future?

13.9 Examine the benefits of a central ‘register’ of missing persons including the type of information that should be collected and the identification of any potential privacy and legislation issues associated with this.

13.10 Research examining Network Convergence to enhance communication in rural and remote areas of Australia. Specific areas of interest include:

  • What are the current Modern Network trends and emerging technologies globally?
  • What challenges and opportunities exist for geographically distributed network design?

13.12 What are the critical network design success factors for mobile users’ enterprise cloud consumption?

13.13 What is the impact of user experience design on the effectiveness and adoption of new IT platforms?

13.14 Research on large enterprise and government agency hosting solutions recommended by vendors, hyperscalers, and industry experts detailing the best way to meet Secret iRAP certification in a cost-effective manner.

13.15 Research on how cloud and software as service applications have fundamentally changed the way organisations approach business continuity and resiliency.  Historically, applications automatically “failed over” from one data centre to another, this capability is now front ended by the Hyperscaler and SaaS providers – what does this mean for organisational Business Continuity Planning?

13.16 Research large enterprise and government agency cloud economics methodologies to determine the best forecasting techniques for public cloud consumption. Identify the success criteria for meeting financial and user experience targets.

13.17 Research on how large enterprises most effectively balance network security and complex landscapes to achieve optimal protection of NSWPF systems and data. For example:

  1. What are the current trends, best practice, and emerging technologies?
  2. What are the most effective security controls in multi-layer network design?
  3. How do control frameworks most effectively balance costs and user experience? Research on emerging trends and methodologies large enterprises are using to resolve the exponential rate of data and storage growth.  How do organisations balance cost with secure ubiquitous access?