Analysis of Computer Crime Characteristics in Taiwan

  • You-lu Liao
  • Cynthia Tsai
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3917)


This study is intended to uncover the characteristics of computer crimes happening in Taiwan. Applying frequency distribution analysis to the 165 cases collected from the authorities concerned, we find some interesting facts with respect to the crimes’ properties. First, regarding the crimes’ features, a majority of the crimes were related to transmission of pornography and unauthorized copying of proprietary works. Most of them took place at residences. The illegal acts, mainly for profit, usually continued until they were detected. As to the criminals, most of them were male, young, unemployed and college-educated. They tended to commit the crime alone, possessed no prior records and mostly resided in urban areas. Some of them were disabled people, which could be attributed to their difficulties of being employed. The number of cases reported and investigated was increasing, yet, due to certain practical problems, such as the police agency’s limited capability over the offenses or judicial systems’ huge workload, a Funnel Effect emerged in the meantime, resulting in the loss of some cases in each processing phase. In addition, there was a propensity for the judicial system to impose lenient punishment on the violators, e.g. probation and financial penalty instead of imprisonment.


Disable People Crime Scene Judicial System Computer Crime Misuse Case 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bawden, B.: International symposium on the prevention and prosecution of computer crime. Computer Law and Security Report, 7-11 (May-June 1992) Google Scholar
  2. 2.
    Chen, W.D.: A study of cyber crime pattern analysis and its prevention and investigation. Thesis of Information Management Graduate Institute of Central Police University (2000)Google Scholar
  3. 3.
    Cheu, C.D.: An automatic system for crime information filtering on Internet. Thesis of Information Management Graduate Institute of Central Police University (1999)Google Scholar
  4. 4.
    Hollinger, R.C. (ed.): Crime, deviance and the computer. Dartmouth, England (1997)Google Scholar
  5. 5.
    Japanese Police Administration: Police white paper (1994)Google Scholar
  6. 6.
    Li, B.H., Liao, Y.L.: The problems and tactics of computer crime. Police Science Quarterly 26(6), 141–154 (1996)Google Scholar
  7. 7.
    Lin, W.X.: A study on computer crime pattern analysis. Thesis of Police Science Graduate Institute of Central Police University (1998)Google Scholar
  8. 8.
    Liu, S.Y.: Cyber hacker- Security practice of e-commerce. Yatai, Taipei (1998)Google Scholar
  9. 9.
    President’s Working Group on Unlawful Conduct on the Internet: The Challenge of Unlawful Conduct Involving the Use of Internet ( March 2000) (Retrieved August 14, 2001), from
  10. 10.
    Sterling, B.: Good cop, bad hacker. Wired 3, 122–129 (1995)Google Scholar
  11. 11.
    Tipton, H.: Computer crime- Investigating inside the corporation. Computer Fraud & Security Bulletin 4 (February 1993)Google Scholar
  12. 12.
    Tseng, Y.K.: The study of SYN flooding defense- Based on traffic control. Thesis of Information Management Graduate Institute of Central Police University (1999)Google Scholar
  13. 13.
    Wang, J.H., et al.: A study of automated search system on cyber crimes. Telecommunication Bureau of Ministry of Traffic and Communication (1999)Google Scholar
  14. 14.
    Wu, K.C.: A survey of police computer crime and prevention measures. In: The Fourth Conference on Information Management and Its Applications on Law Enforcement, pp. 201–215 (2000)Google Scholar
  15. 15.
    Zou, Z.O.: Criminological sociology. Liming Book Store, Taipei (1993)Google Scholar
  16. 16.
    Zung, Z.J.: A study of the investigation and enactment of computer crime. Unpublished paper (1994)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • You-lu Liao
    • 1
  • Cynthia Tsai
    • 2
  1. 1.Associate professor of Criminal Investigation DepartmentCentral Police UniversityTaoyuanTaiwan, R.O.C.
  2. 2.Lecturer of Center for General EducationCentral Police UniversityTaoyuanTaiwan, R.O.C.

Personalised recommendations