Skip to main content
    • by  and +1
As most software used by government agencies and companies is proprietary, malicious computer activity targeting breaches in that software can be likened to a pandemic of an infectious disease in the cyber world. When a breach occurs, the... more
    • by 
    •   3  
      Information Security ManagementIncident ResponseResponsive Regulation
    • by 
    •   4  
      GlobalizationCyber WarfareInformation Technology and SecurityResearch in Technology
    • by 
    •   3  
      Taiwan StudiesInternational Police CooperationMutual Legal Assistance
    • by 
    •   6  
      Information SecurityCyber ConflictComputer SecurityCybersecurity
The core concept of restorative justice has long existed and been practiced in Taiwan's criminal justice system. It has however, been marginalised for a very long period of time. That was until 2003 when Taiwan began pursuing a polarised... more
    • by 
    • Restorative Justice
    • by 
    • Restorative Justice
    • by 
    •   4  
      CriminologyCriminal LawTaiwan StudiesSafety Indicator
This paper aims to evaluate four restorative justice programs in Taiwan: (1) a mediation system; (2) deferred prosecution and conditional suspended sentence; (3) a youth justice system; and (4) the Taiwan Restorative Justice Initiative.... more
    • by 
    • Restorative Justice
    • by 
    •   3  
      Supply Chian ManagementCybercrime LegislationMutual Legal Assistance
China’s well-documented rapid socio-economic changes, including largely unmanaged rural to urban migration, forms an important pressure on development of an adequate juvenile justice system. This chapter identifies and describes key... more
    • by  and +1
This chapter will discuss the nature of cybercrime. It will examine the limitations of laws and regulations and constraints to cybercrime investigation. It will then discuss the formation of strategies aimed at cybercrime prevention.... more
    • by 
    •   2  
      Cyber Laws and Cyber CrimeConvention on Cybercrime
This chapter provides an insight into cyber crowdsourcing in the Greater China region. It will, firstly, define and then describe the origins of cyber crowdsourcing. Based on archival studies conducted in 2012, it will categorize cyber... more
    • by 
    • Contemporary China
With the development of the internet, internet vigilantism (netilantism) has emerged as a new phenomenon in recent years. While there are several qualitative studies explaining netilantism, there is little empirical research on public... more
    • by 
    •   2  
      Police and PolicingCybersecurity policy
Given the limited resources and capabilities of states to maintain cyber security, a variety of co-production efforts have been made by individuals, or by collectives of varying degrees of organization and coordination. This article... more
    • by  and +1
    • Online Child Sexual Exploitation and Abuse
This letter is in response to the call for submissions on Australia's approach to International Cyber Engagement. I would like to thank you for the opportunity to comment on this timely issue. My comments are based on my experience... more
    • by 
    • Cyber Security Incident Response
Cybercrime has become a world concern. According to unofficial statistics, the projected loss of cybercrime will reach USD 2 trillions by 2019 (Forbes 2016). It affects not only individual but also corporates and states as a whole. Its... more
    • by 
    •   2  
      Cyber security / cyber warfareConvention on Cybercrime