Abstract
This study is intended to uncover the characteristics of computer crimes happening in Taiwan. Applying frequency distribution analysis to the 165 cases collected from the authorities concerned, we find some interesting facts with respect to the crimes’ properties. First, regarding the crimes’ features, a majority of the crimes were related to transmission of pornography and unauthorized copying of proprietary works. Most of them took place at residences. The illegal acts, mainly for profit, usually continued until they were detected. As to the criminals, most of them were male, young, unemployed and college-educated. They tended to commit the crime alone, possessed no prior records and mostly resided in urban areas. Some of them were disabled people, which could be attributed to their difficulties of being employed. The number of cases reported and investigated was increasing, yet, due to certain practical problems, such as the police agency’s limited capability over the offenses or judicial systems’ huge workload, a Funnel Effect emerged in the meantime, resulting in the loss of some cases in each processing phase. In addition, there was a propensity for the judicial system to impose lenient punishment on the violators, e.g. probation and financial penalty instead of imprisonment.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bawden, B.: International symposium on the prevention and prosecution of computer crime. Computer Law and Security Report, 7-11 (May-June 1992)
Chen, W.D.: A study of cyber crime pattern analysis and its prevention and investigation. Thesis of Information Management Graduate Institute of Central Police University (2000)
Cheu, C.D.: An automatic system for crime information filtering on Internet. Thesis of Information Management Graduate Institute of Central Police University (1999)
Hollinger, R.C. (ed.): Crime, deviance and the computer. Dartmouth, England (1997)
Japanese Police Administration: Police white paper (1994)
Li, B.H., Liao, Y.L.: The problems and tactics of computer crime. Police Science Quarterly 26(6), 141–154 (1996)
Lin, W.X.: A study on computer crime pattern analysis. Thesis of Police Science Graduate Institute of Central Police University (1998)
Liu, S.Y.: Cyber hacker- Security practice of e-commerce. Yatai, Taipei (1998)
President’s Working Group on Unlawful Conduct on the Internet: The Challenge of Unlawful Conduct Involving the Use of Internet ( March 2000) (Retrieved August 14, 2001), from http://www.usdoj.gov/criminal/cybercrime/unlawful.htm
Sterling, B.: Good cop, bad hacker. Wired 3, 122–129 (1995)
Tipton, H.: Computer crime- Investigating inside the corporation. Computer Fraud & Security Bulletin 4 (February 1993)
Tseng, Y.K.: The study of SYN flooding defense- Based on traffic control. Thesis of Information Management Graduate Institute of Central Police University (1999)
Wang, J.H., et al.: A study of automated search system on cyber crimes. Telecommunication Bureau of Ministry of Traffic and Communication (1999)
Wu, K.C.: A survey of police computer crime and prevention measures. In: The Fourth Conference on Information Management and Its Applications on Law Enforcement, pp. 201–215 (2000)
Zou, Z.O.: Criminological sociology. Liming Book Store, Taipei (1993)
Zung, Z.J.: A study of the investigation and enactment of computer crime. Unpublished paper (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liao, Yl., Tsai, C. (2006). Analysis of Computer Crime Characteristics in Taiwan. In: Chen, H., Wang, FY., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds) Intelligence and Security Informatics. WISI 2006. Lecture Notes in Computer Science, vol 3917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734628_6
Download citation
DOI: https://doi.org/10.1007/11734628_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33361-6
Online ISBN: 978-3-540-33362-3
eBook Packages: Computer ScienceComputer Science (R0)