Skip to main content

Cybercrime in Taiwan – An Analysis of Suspect Records

  • Conference paper
Intelligence and Security Informatics (WISI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3917))

Included in the following conference series:

Abstract

This paper explores the increasing number of cybercrime cases in Taiwan and examines the demographic characteristics of the criminals responsible for the criminal activity. The report is based upon data taken from the Criminal Investigation Bureau of Taiwan cybercrime database over the interval of 1999 through 2004. The paper defines cybercrime, addresses cybercrime case statistics and examines profiles of the suspects’ characteristics. The findings show that the top five categories of crime committed over the past six years are sex trading or sex trading on the Internet, Internet fraud, larceny, cyber piracy and cyber pornography. As for the suspects’ characteristics, the findings show that 81.1% were male; 45.5% had some senior high school education exposure; 63.1% acted independently; 23.7% were currently enrolled students; and 29.1% were in the 18-23 age bracket which was the majority group. Finally, this paper proposes four recommendations to governments, society, schools, and researchers to reduce cycbercrime.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cordy, E.D.: The Legal Regulation of E-Commerce Transactions. Journal of American Academy of Business 2(2), 400–407 (2003)

    Google Scholar 

  2. Chang, W., Chung, W., Chen, H., Chou, S.: An International Perspective on Fighting Cybercrime. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 379–384. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. DS-MOI, Department Statistics, Ministrey of the Interior (2005, January). Annual population census (Retrieved October 5, 2005), from http://www.moi.gov.tw/stat/index.asp

  4. FIND, Focus on Internet News and Data. The statistics report of Taiwan Internet Users (2005, June) (Retrieved October 5, 2005), from http://www.find.org.tw/0105/howmany/usage_1.asp

  5. Geer, D.: Security Technologies Go Phishing. Computer 38(6), 618–621 (2005)

    Article  Google Scholar 

  6. Goodman, M.: Making Computer Crime Count. FBI Law Enforcement Bulletin 70(8), 10–17 (2001)

    Google Scholar 

  7. IIPA.: Special 301 Report on Global Copyright Protection and Enforcement, pp. 303–322. International Intellectual Property Alliance, Washington, DC

    Google Scholar 

  8. McCrohan, K.F.: Facing the Threats to Electronic Commerce. The Journal of Business & Industrial Marketing 18(2/3), 133–145 (2003)

    Article  Google Scholar 

  9. MacInnes, I., Musgrave, D., Laska, J.: Electronic Commerce Fraud: Towards An Understanding of the Phenomenon. In: 2005 Proceedings of the 38th Annual Hawaii International Conference (2005)

    Google Scholar 

  10. McCusker, R.: E-Commerce, Business and Crime: Inextricably Linked, Diametrically Opposed. The Company Lawyer 23(1), 3–8 (2002)

    MathSciNet  Google Scholar 

  11. Ministry of the Interior. The statistics report of National Police Agency (2005, October) (Retrieved October 5, 2005), from http://www.npa.gov.tw/stats.php

  12. Parker, D.B.: Fighting Computer Crime: A New Framework for Protecting Information. Wiley Computer Publishing, Chichester (1998)

    Google Scholar 

  13. Philippsohn, S.: Trends in Cybercrime - An Overview of Current Financial Crimes on the Internet. Computers & Security 20(1), 53–69 (2001)

    Article  Google Scholar 

  14. Saban, K.A., McGivern, E., Saykiewicz, J.N.: A Critical Look at the Impact of Cyber Crime on Consumer Internet Behavior. Journal of Marketing Theory and Practice 10(2), 29–37 (2002)

    Article  Google Scholar 

  15. Smith, A.D.: Cyberciminal Impacts on Online Business and Consumer Confidence. Online Information Review 28(3), 224–234 (2004)

    Article  Google Scholar 

  16. Smith, A.D., Rupp, W.T.: Issues In Cybersecurity: Understanding the Potential Risks Associated with Hackers/Crackers. Information Management and Computer Security 10(4), 178–183 (2002)

    Article  Google Scholar 

  17. Thomas, D., Loader, B.D.: Introduction - Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. In: Cybercrime: Law Enforcement, Security and Surveillance in the Information Age, Taylor & Francis Group, New York (2000)

    Google Scholar 

  18. Whitman, M.E., Mattord, H.J.: Management of Information Security, Boston (2004)

    Google Scholar 

  19. Wilson, C.: Holding Management Accountable: A New Policy for Protection Against Computer Crime. In: National Aerospace and Electronics Conference, Proceedings of the IEEE 2000, pp. 272–281 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jen, W., Chang, W., Chou, S. (2006). Cybercrime in Taiwan – An Analysis of Suspect Records. In: Chen, H., Wang, FY., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds) Intelligence and Security Informatics. WISI 2006. Lecture Notes in Computer Science, vol 3917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734628_5

Download citation

  • DOI: https://doi.org/10.1007/11734628_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33361-6

  • Online ISBN: 978-3-540-33362-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics