Skip to main content

Analysis of Computer Crime Characteristics in Taiwan

  • Conference paper
Intelligence and Security Informatics (WISI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3917))

Included in the following conference series:

Abstract

This study is intended to uncover the characteristics of computer crimes happening in Taiwan. Applying frequency distribution analysis to the 165 cases collected from the authorities concerned, we find some interesting facts with respect to the crimes’ properties. First, regarding the crimes’ features, a majority of the crimes were related to transmission of pornography and unauthorized copying of proprietary works. Most of them took place at residences. The illegal acts, mainly for profit, usually continued until they were detected. As to the criminals, most of them were male, young, unemployed and college-educated. They tended to commit the crime alone, possessed no prior records and mostly resided in urban areas. Some of them were disabled people, which could be attributed to their difficulties of being employed. The number of cases reported and investigated was increasing, yet, due to certain practical problems, such as the police agency’s limited capability over the offenses or judicial systems’ huge workload, a Funnel Effect emerged in the meantime, resulting in the loss of some cases in each processing phase. In addition, there was a propensity for the judicial system to impose lenient punishment on the violators, e.g. probation and financial penalty instead of imprisonment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bawden, B.: International symposium on the prevention and prosecution of computer crime. Computer Law and Security Report, 7-11 (May-June 1992)

    Google Scholar 

  2. Chen, W.D.: A study of cyber crime pattern analysis and its prevention and investigation. Thesis of Information Management Graduate Institute of Central Police University (2000)

    Google Scholar 

  3. Cheu, C.D.: An automatic system for crime information filtering on Internet. Thesis of Information Management Graduate Institute of Central Police University (1999)

    Google Scholar 

  4. Hollinger, R.C. (ed.): Crime, deviance and the computer. Dartmouth, England (1997)

    Google Scholar 

  5. Japanese Police Administration: Police white paper (1994)

    Google Scholar 

  6. Li, B.H., Liao, Y.L.: The problems and tactics of computer crime. Police Science Quarterly 26(6), 141–154 (1996)

    Google Scholar 

  7. Lin, W.X.: A study on computer crime pattern analysis. Thesis of Police Science Graduate Institute of Central Police University (1998)

    Google Scholar 

  8. Liu, S.Y.: Cyber hacker- Security practice of e-commerce. Yatai, Taipei (1998)

    Google Scholar 

  9. President’s Working Group on Unlawful Conduct on the Internet: The Challenge of Unlawful Conduct Involving the Use of Internet ( March 2000) (Retrieved August 14, 2001), from http://www.usdoj.gov/criminal/cybercrime/unlawful.htm

  10. Sterling, B.: Good cop, bad hacker. Wired 3, 122–129 (1995)

    Google Scholar 

  11. Tipton, H.: Computer crime- Investigating inside the corporation. Computer Fraud & Security Bulletin 4 (February 1993)

    Google Scholar 

  12. Tseng, Y.K.: The study of SYN flooding defense- Based on traffic control. Thesis of Information Management Graduate Institute of Central Police University (1999)

    Google Scholar 

  13. Wang, J.H., et al.: A study of automated search system on cyber crimes. Telecommunication Bureau of Ministry of Traffic and Communication (1999)

    Google Scholar 

  14. Wu, K.C.: A survey of police computer crime and prevention measures. In: The Fourth Conference on Information Management and Its Applications on Law Enforcement, pp. 201–215 (2000)

    Google Scholar 

  15. Zou, Z.O.: Criminological sociology. Liming Book Store, Taipei (1993)

    Google Scholar 

  16. Zung, Z.J.: A study of the investigation and enactment of computer crime. Unpublished paper (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liao, Yl., Tsai, C. (2006). Analysis of Computer Crime Characteristics in Taiwan. In: Chen, H., Wang, FY., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds) Intelligence and Security Informatics. WISI 2006. Lecture Notes in Computer Science, vol 3917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734628_6

Download citation

  • DOI: https://doi.org/10.1007/11734628_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33361-6

  • Online ISBN: 978-3-540-33362-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics