메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Cybercrime in the greater China region: Regulatory responses and crime prevention across the Taiwan strait

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84881738140     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4337/9780857936684     Document Type: Book
Times cited : (9)

References (272)
  • 2
    • 84881815071 scopus 로고    scopus 로고
    • 'The ASRS celebrates its 30th anniversary'
    • ASRS. 19 February, 2010
    • ASRS (2006), 'The ASRS celebrates its 30th anniversary', Callback From NASA's Aviation Safety Reporting System, retrieved 19 February, 2010, from http://asrs.arc.nasa.gov/publications/callback/cb_317.htm
    • (2006) Callback From NASA's Aviation Safety Reporting System
  • 3
    • 84881775356 scopus 로고    scopus 로고
    • ASRS, ASRS Program Briefing, retrieved 19 February, 2010
    • ASRS (2008), ASRS Program Briefing, retrieved 19 February, 2010, from http://asrs.arc.nasa.gov/overview/summary.html
    • (2008)
  • 6
    • 84881736601 scopus 로고    scopus 로고
    • Oxford: Oxford University Press
    • Ayto, J. (2007), A Century of NewWords, Oxford: Oxford University Press.
    • (2007) A Century of NewWords
    • Ayto, J.1
  • 8
    • 84881828283 scopus 로고    scopus 로고
    • 'China denies Pentagon cyber-raid'
    • BBC, 4 September, retrieved 26 September 2007
    • BBC (2007a, 4 September), 'China denies Pentagon cyber-raid', BBC News Online, retrieved 26 September 2007, from http://news.bbc.co.uk/2/hi/americas/6977533.stm
    • (2007) BBC News Online
  • 9
    • 84881813615 scopus 로고    scopus 로고
    • 'Estonia hit by Moscow cyber war'
    • BBC, 17 May, retrieved 31 October 2008
    • BBC (2007b, 17 May), 'Estonia hit by "Moscow cyber war"', BBC News Online, retrieved 31 October 2008, from http://news.bbc.co.uk/2/hi/europe/6665145.stm
    • (2007) BBC News Online
  • 10
    • 85039853648 scopus 로고    scopus 로고
    • 'Estonia fines man for "cyber war"'
    • BBC, 25 January, retrieved 25 March 2010
    • BBC (2008, 25 January), 'Estonia fines man for "cyber war"', BBC News Online, retrieved 25 March 2010, from http://news.bbc.co.uk/2/hi/technology/7208511.stm
    • (2008) BBC News Online
  • 11
    • 85039853529 scopus 로고    scopus 로고
    • 'Taiwan city to screen Kadeer film'
    • BBC, 20 September, retrieved 18 September 2010
    • BBC (2009, 20 September), 'Taiwan city to screen Kadeer film', BBC News Online, retrieved 18 September 2010, from http://news.bbc.co.uk/2/hi/8265259.stm
    • (2009) BBC News Online
  • 12
    • 84881814772 scopus 로고    scopus 로고
    • 'Microsoft admits Explorer used in Google China hack'
    • BBC, 15 January, retrieved 18 January 2010
    • BBC (2010, 15 January), 'Microsoft admits Explorer used in Google China hack', BBC News Online, retrieved 18 January 2010, from http:// news.bbc.co.uk/2/hi/technology/8460819.stm
    • (2010) BBC News Online
  • 14
    • 21444445390 scopus 로고    scopus 로고
    • 'The politics of police co-operation in the European Union'
    • Benyon, J. (1996), 'The politics of police co-operation in the European Union', Journal of the Sociology of Law, 24, 353-379.
    • (1996) Journal of the Sociology of Law , vol.24 , pp. 353-379
    • Benyon, J.1
  • 16
    • 84891988264 scopus 로고    scopus 로고
    • 'Attack of the killer bots'
    • 6 July, retrieved 21 March 2010
    • Bort, J. (2007, 6 July), 'Attack of the killer bots', NetworkWorld, retrieved 21 March 2010, from http://www.networkworld.com/research/2007/070607-botnets.html
    • (2007) NetworkWorld
    • Bort, J.1
  • 19
    • 33846298538 scopus 로고    scopus 로고
    • 'Responsive regulation and taxation: Introduction'
    • Braithwaite, V. (2007), 'Responsive regulation and taxation: Introduction', Law and Policy, 29(1), 3-10.
    • (2007) Law and Policy , vol.29 , Issue.1 , pp. 3-10
    • Braithwaite, V.1
  • 20
    • 84863685701 scopus 로고    scopus 로고
    • 'Distributed security: A new model of law enforcement'
    • Brenner, S. (2004), 'Distributed security: A new model of law enforcement', Journal of International Law, 8(5), 7-25.
    • (2004) Journal of International Law , vol.8 , Issue.5 , pp. 7-25
    • Brenner, S.1
  • 21
  • 27
    • 0035532916 scopus 로고    scopus 로고
    • 'Not such neat net: some comments on virtual criminality'
    • Capeller, W. (2001), 'Not such neat net: some comments on virtual criminality', Social and Legal Studies, 10, 229-242.
    • (2001) Social and Legal Studies , vol.10 , pp. 229-242
    • Capeller, W.1
  • 28
    • 0003845462 scopus 로고    scopus 로고
    • Central Intelligence Agency. retrieved 19 March, 2010
    • Central Intelligence Agency. (2010), The World Factbook, retrieved 19 March, 2010, from https://www.cia.gov/library/publications/the-worldfactbook/ index.html
    • (2010) The World Factbook
  • 29
    • 84881814835 scopus 로고    scopus 로고
    • Paper presented at the FOSE 2010: Technology Solutions for the Business of Government, retrieved 20 March 2010
    • Chabinsky, S. R. (2010), The cyber threat: Who's doing what to whom?, Paper presented at the FOSE 2010: Technology Solutions for the Business of Government, retrieved 20 March 2010, from http://fose.com/ events/fose-2010/sessions/wednesday/chabinsky.aspx
    • (2010) The cyber threat: Who's doing what to whom?
    • Chabinsky, S.R.1
  • 30
    • 21344433201 scopus 로고    scopus 로고
    • 'The changing definition and image of hacker in popular disclosure'
    • Chandler, A. (1996), 'The changing definition and image of hacker in popular disclosure', International Journal of the Sociology of Law, 24, 229-251.
    • (1996) International Journal of the Sociology of Law , vol.24 , pp. 229-251
    • Chandler, A.1
  • 31
    • 84886408799 scopus 로고    scopus 로고
    • 'Mutual assistance between Taiwan and China: It is still difficult to repatriate criminals'
    • retrieved 3 January, 2010
    • Chang, G. L. (2010), 'Mutual assistance between Taiwan and China: It is still difficult to repatriate criminals', Chinatimes, retrieved 3 January, 2010, from http://news.chinatimes.com/CMoney/News/News-Pagecontent/ 0,4993,11050701+122010010300163,00.html
    • (2010) Chinatimes
    • Chang, G.L.1
  • 32
    • 85039844102 scopus 로고    scopus 로고
    • '32 companies signed the selfregulation against malicious software'
    • 29 December, retrieved 28 February 2010, from
    • Chang, K. F. (2006, 29 December), '32 companies signed the selfregulation against malicious software', CBINews, retrieved 28 February 2010, from http://www.cbinews.com/inc/showcontent.jsp?articleid=48377
    • (2006) CBINews
    • Chang, K.F.1
  • 33
    • 84881758937 scopus 로고    scopus 로고
    • 'Anti-Chen Shiu-bing: Chinese hackers hack into Taiwanese systems'
    • 25 August, retrieved 15 March 2010, from
    • Chang, S. Y. and G. M. Zhao (2006, 25 August), 'Anti-Chen Shiu-bing: Chinese hackers hack into Taiwanese systems', Chinatimes, retrieved 15 March 2010, from http://forum.icst.org.tw/phpbb/viewtopic.php?t=10765
    • (2006) Chinatimes
    • Chang, S.Y.1    Zhao, G.M.2
  • 34
    • 85039861221 scopus 로고    scopus 로고
    • 'The support from China and the legislative Yuan is important in combating telecommunication fraud'
    • 5 August, retrieved 21 January 2010, from
    • Chang,Y. C. (2009a, 5 August), 'The support from China and the legislative Yuan is important in combating telecommunication fraud', UDN, retrieved 21 January 2010, from http://www.coolloud.org.tw/node/44183
    • (2009) UDN
    • Chang, Y.C.1
  • 35
    • 84881791178 scopus 로고    scopus 로고
    • 'Wiki' crime prevention - What Routine Activity Theory teaches us about cybercrime prevention
    • Chang, Y. C. (2009b), 'Wiki' crime prevention - What Routine Activity Theory teaches us about cybercrime prevention, Journal of Criminology, 12(2), 87-116.
    • (2009) Journal of Criminology , vol.12 , Issue.2 , pp. 87-116
    • Chang, Y.C.1
  • 36
    • 84881704058 scopus 로고    scopus 로고
    • 'Cyber-conflict between Taiwan and China'
    • Chang,Y. C. (2011), 'Cyber-conflict between Taiwan and China', Strategic Insight, 10(1), 26-35, available at http://www.nps.edu/Academics/Centers/CCC/Research-Publications/StrategicInsights/2011/Apr/SI-v10-i1-_Chang.pdf
    • (2011) Strategic Insight , vol.10 , Issue.1 , pp. 26-35
    • Chang, Y.C.1
  • 37
    • 84863179147 scopus 로고    scopus 로고
    • 'Combating cybercrime across the Taiwan Strait: Investigation and prosecution issues'
    • Chang, Y. C. (2012a), 'Combating cybercrime across the Taiwan Strait: Investigation and prosecution issues', Australian Journal of Forensic Sciences, 44(1), 5-14.
    • (2012) Australian Journal of Forensic Sciences , vol.44 , Issue.1 , pp. 5-14
    • Chang, Y.C.1
  • 38
    • 84863652088 scopus 로고    scopus 로고
    • 'Responsive regulation and the reporting of information security incidents'
    • Chang, L. Y. C. (2012b), 'Responsive regulation and the reporting of information security incidents', Issues & Studies, 48(1), 93-127.
    • (2012) Issues & Studies , vol.48 , Issue.1 , pp. 93-127
    • Chang, L.Y.C.1
  • 39
    • 84881779387 scopus 로고    scopus 로고
    • 'A comparative research on cybercrime laws: The experience of International Organizations and Taiwan'
    • Chang, Y. C. and S. Jou (2007), 'A comparative research on cybercrime laws: The experience of International Organizations and Taiwan', Essays on Criminal Justice Policy and Research, 10, 139-158.
    • (2007) Essays on Criminal Justice Policy and Research , vol.10 , pp. 139-158
    • Chang, Y.C.1    Jou, S.2
  • 40
    • 84863682261 scopus 로고    scopus 로고
    • 'Study on information security incidents reporting and information sharing mechanism in Taiwan - From the viewpoints of the U.S. experience'
    • Chang, Y. C. and J. Wu (2008), 'Study on information security incidents reporting and information sharing mechanism in Taiwan - From the viewpoints of the U.S. experience', Science and Technology Law Review, 20(8), 39-61.
    • (2008) Science and Technology Law Review , vol.20 , Issue.8 , pp. 39-61
    • Chang, Y.C.1    Wu, J.2
  • 41
    • 84886392588 scopus 로고    scopus 로고
    • 'Google attacks used addresses based in Taiwan'
    • (16 January), retrieved 15 March 2010, from
    • Chao, Y. (2010, 16 January), 'Google attacks used addresses based in Taiwan', Taipei Times, retrieved 15 March 2010, from http://www. taipeitimes.com/News/front/archives/2010/01/16/2003463643
    • (2010) Taipei Times
    • Chao, Y.1
  • 42
    • 13244298648 scopus 로고    scopus 로고
    • 'Secret society and organized crime in contemporary China'
    • Chen, A. (2005), 'Secret society and organized crime in contemporary China', Modern Asian Studies, 39(1), 77-107.
    • (2005) Modern Asian Studies , vol.39 , Issue.1 , pp. 77-107
    • Chen, A.1
  • 43
    • 85039863963 scopus 로고    scopus 로고
    • 'War on 322 - Chinese hackers shut down the website of DPP's presidential candidate'
    • 22 March, retrieved 22 April 2009, from
    • Chen, L. Q. (2008, 22 March), 'War on 322 - Chinese hackers shut down the website of DPP's presidential candidate', NowNews, retrieved 22 April 2009, from http://www.nownews.com/2008/03/22/11480-2249184.htm
    • (2008) NowNews
    • Chen, L.Q.1
  • 44
    • 84881757528 scopus 로고    scopus 로고
    • 'From the "Kinmen Agreement" to the "Agreement on Cross-Strait Mutual Assistance in Crime Matters"'
    • Chen, R. and J. S. Wang (2009), 'From the "Kinmen Agreement" to the "Agreement on Cross-Strait Mutual Assistance in Crime Matters"', Fu-Jen Law Journal, 99, 51-55.
    • (2009) Fu-Jen Law Journal , vol.99 , pp. 51-55
    • Chen, R.1    Wang, J.S.2
  • 45
    • 84881697287 scopus 로고    scopus 로고
    • 'Taiwan Tea Party website attacked by DDoS'
    • 13 June, from
    • Chen, T. Z. (2002, 13 June), 'Taiwan Tea Party website attacked by DDoS', PCzone, from http://www.pczone.com.tw/vbb3/archive/t-47652.html
    • (2002) PCzone
    • Chen, T.Z.1
  • 46
    • 84881705546 scopus 로고    scopus 로고
    • 'Credit card websites are suffering DDoS attack'
    • ChinaByte., 23 September, retrieved 20 September 2008, from
    • ChinaByte. (2004, 23 September), 'Credit card websites are suffering DDoS attack', ChinaByte Online, retrieved 20 September 2008, from http://www.yesky.com/busnews/216485043416072192/20040923/1857545.shtml
    • (2004) ChinaByte Online
  • 48
    • 84881722592 scopus 로고    scopus 로고
    • Cisco, San Jose, CA: Cisco Systems Inc
    • Cisco (2009), Infiltrating a Botnet, San Jose, CA: Cisco Systems Inc
    • (2009) Infiltrating a Botnet
  • 52
    • 77951629030 scopus 로고    scopus 로고
    • retrieved 21 January, 2010, from
    • Clinton, H. R. (2010), Remarks on Internet Freedom, retrieved 21 January, 2010, from http://www.state.gov/secretary/rm/2010/01/135519.htm
    • (2010) Remarks on Internet Freedom
    • Clinton, H.R.1
  • 53
    • 84881762469 scopus 로고    scopus 로고
    • CNCERT/CC Beijing: CNCERT/CC
    • CNCERT/CC (2008), CECERT/CC Annual Report 2007, Beijing: CNCERT/CC
    • (2008) CECERT/CC Annual Report 2007
  • 55
    • 0000204509 scopus 로고
    • 'Social change and crime rate trends: A routine activity approach'
    • Cohen, L. and M. Felson (1979), 'Social change and crime rate trends: A routine activity approach', American Sociological Review, 44, 588-607.
    • (1979) American Sociological Review , vol.44 , pp. 588-607
    • Cohen, L.1    Felson, M.2
  • 57
    • 84881773854 scopus 로고    scopus 로고
    • Council of Europe, retrieved 17 November 2009, from
    • Council of Europe (2001a), Convention on Cybercrime, retrieved 17 November 2009, from http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm.
    • (2001) Convention on Cybercrime
  • 58
    • 84881829889 scopus 로고    scopus 로고
    • Council of Europe, retrieved 10 November 2009, from
    • Council of Europe (2001b), Convention on Cybercrime: Explanatory Report, retrieved 10 November 2009, from http://conventions.coe.int/ Treaty/en/Reports/Html/185.htm
    • (2001) Convention on Cybercrime: Explanatory Report
  • 59
    • 84881707456 scopus 로고    scopus 로고
    • (11 November) Council of Europe, retrieved 11 November, 2009, from
    • Council of Europe (2009, 11 November), Convention on Cybercrime, retrieved 11 November, 2009, from http://conventions.coe.int/Treaty/ Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG
    • (2009) Convention on Cybercrime
  • 62
    • 84873184022 scopus 로고    scopus 로고
    • DFAT, retrieved 10 October, 2010, from
    • DFAT (2010a), People's Republic of China country brief, retrieved 10 October, 2010, from http://www.dfat.gov.au/geo/china/china_brief.html
    • (2010) People's Republic of China country brief
  • 63
    • 84864089194 scopus 로고    scopus 로고
    • DFAT, retrieved 10 October, 2010, from
    • DFAT (2010b), Taiwan brief, retrieved 10 October, 2010, from http://www.dfat.gov.au/geo/taiwan/taiwan_brief.html
    • (2010) Taiwan brief
  • 64
    • 0000953669 scopus 로고
    • 'The iron cage revisited: institutional isomorphism and collective rationality in organizational fields'
    • DiMaggio, P. J. and W. W. Powell (1983), 'The iron cage revisited: institutional isomorphism and collective rationality in organizational fields', American Sociological Review, 48, 147-160.
    • (1983) American Sociological Review , vol.48 , pp. 147-160
    • DiMaggio, P.J.1    Powell, W.W.2
  • 65
    • 84881687034 scopus 로고    scopus 로고
    • 'Counting badness'
    • 24 July, retrieved 30 August 2009, from
    • Dirro, T. (2009, 24 July), 'Counting badness', McAfee Avert Labs Blog, retrieved 30 August 2009, from http://www.avertlabs.com/research/blog/ index.php/2009/07/24/counting-badness
    • (2009) McAfee Avert Labs Blog
    • Dirro, T.1
  • 66
    • 0036570326 scopus 로고    scopus 로고
    • 'Completeness of notifiable infectious disease reporting in the United States: An analytical literature review'
    • Doyle, T. J. M. K. Glynn and S. L. Groseclose (2002), 'Completeness of notifiable infectious disease reporting in the United States: An analytical literature review', American Journal of Epidemology, 155(9), 866-874.
    • (2002) American Journal of Epidemology , vol.155 , Issue.9 , pp. 866-874
    • Doyle, T.J.1    Glynn, M.K.2    Groseclose, S.L.3
  • 67
    • 21344451327 scopus 로고    scopus 로고
    • 'Computer crime in the global village: Strategies for control and regulation'
    • Duff, L. and S. Gardiner (1996), 'Computer crime in the global village: Strategies for control and regulation', International Journal of the Sociology of Law, 24, 211-228.
    • (1996) International Journal of the Sociology of Law , vol.24 , pp. 211-228
    • Duff, L.1    Gardiner, S.2
  • 68
    • 85039847985 scopus 로고    scopus 로고
    • 'Botnet PCs stay infected for year: Trend Micro analysis finds "hidden continent" of zombies'
    • 22 September, retrieved 21 March 2010, from
    • Dunn, J. E. (2009, 22 September), 'Botnet PCs stay infected for year: Trend Micro analysis finds "hidden continent" of zombies', Network World, retrieved 21 March 2010, from http://www.networkworld.com/news/ 2009/092209-botnet-pcs-stay-infected-for.html
    • (2009) Network World
    • Dunn, J.E.1
  • 69
    • 85039851191 scopus 로고    scopus 로고
    • 'Storm botnet storms the Net'
    • 24 September, retrieved 15 August 2009 from
    • Dvorsky, G. (2007, 24 September), 'Storm botnet storms the Net', IEET Newsletter. retrieved 15 August 2009 from http://ieet.org/index.php/ IEET/more/dvorsky20070927/
    • (2007) IEET Newsletter
    • Dvorsky, G.1
  • 70
    • 84881753281 scopus 로고    scopus 로고
    • ENISA, Heraklion, Greece: European Network and Information Security Agency
    • ENISA (2009), ENISA Inventory of CERT activities in Europe, Heraklion, Greece: European Network and Information Security Agency
    • (2009) ENISA Inventory of CERT activities in Europe
  • 72
    • 84881769363 scopus 로고    scopus 로고
    • ERIUM, Paper presented at the Tackling Crime and Achieving Confidence in the On-Line World Parliament and the Internet Conference. Retrieved 27 January 2010, from
    • ERIUM (2007), Cyber-crime reporting and intelligence: How do we know what is happening?, Paper presented at the Tackling Crime and Achieving Confidence in the On-Line World Parliament and the Internet Conference. Retrieved 27 January 2010, from http://www.eurim.org.uk/ activities/ecrime/PIC07_techapp_reporting.pdf
    • (2007) Cyber-crime reporting and intelligence: How do we know what is happening?
  • 73
    • 84881707955 scopus 로고    scopus 로고
    • 'China "tops list" of cyber-hackers seeking UK government secrets'
    • retrieved 26, Sept, 2007, from
    • Evans, M. (2007), 'China "tops list" of cyber-hackers seeking UK government secrets', retrieved 26, Sept, 2007, from http://www.timesonline. co.uk/tol/news/world/asia/article2393979.ece
    • (2007)
    • Evans, M.1
  • 74
    • 84881745709 scopus 로고    scopus 로고
    • 'F-Secure Virus Descriptions: CIH'
    • F-Secure, retrieved 10 March, 2010, from
    • F-Secure (2002), 'F-Secure Virus Descriptions: CIH', retrieved 10 March, 2010, from http://www.f-secure.com/v-descs/cih.shtml
    • (2002)
  • 75
    • 0004570773 scopus 로고    scopus 로고
    • FAA, retrieved 19 February 2010, from
    • FAA (1997), Aviation Safety reporting Program, retrieved 19 February 2010, from http://rgl.faa.gov/REGULATORY_AND_GUIDANCE_LIBRARY/RGADVISORYCIRCULAR.NSF/0/64358057433fe192862569e7006da716/$FILE/AC00-46D.pdf
    • (1997) Aviation Safety reporting Program
  • 77
    • 84984351869 scopus 로고
    • The new penology: Notes on the emerging strategy of corrections and its implications
    • Feeley, M. M. and J. Simon (1992), The new penology: Notes on the emerging strategy of corrections and its implications, Criminology, 30(4), 449-474.
    • (1992) Criminology , vol.30 , Issue.4 , pp. 449-474
    • Feeley, M.M.1    Simon, J.2
  • 78
    • 0002553344 scopus 로고
    • 'Actuarial justice: The emerging new criminal law' in D. Nelkin (ed.)
    • Thousand Oaks, CA: Sage
    • Feeley, M. M. and J. Simon (1994), 'Actuarial justice: The emerging new criminal law' in D. Nelkin (ed.), The Future of Criminology, Thousand Oaks, CA: Sage, pp. 173-201.
    • (1994) The Future of Criminology , pp. 173-201
    • Feeley, M.M.1    Simon, J.2
  • 79
    • 0004053845 scopus 로고
    • (G. Hamilton andW. Zheng, trans.), Berkeley, CA: University of California Press
    • Fei, H. T. (1947/2002), From the Soil: The Foundation of Chinese Society (G. Hamilton andW. Zheng, trans.), Berkeley, CA: University of California Press.
    • (1947) From the Soil: The Foundation of Chinese Society
    • Fei, H.T.1
  • 80
    • 0003845892 scopus 로고
    • ([1939]) London: Routledge & Kegan Paul
    • Fei, H. T. (1980 [1939]), Peasant Life in China, London: Routledge & Kegan Paul.
    • (1980) Peasant Life in China
    • Fei, H.T.1
  • 82
    • 34248387461 scopus 로고    scopus 로고
    • 'The routine activity approach: A very versatile theory of crime'
    • R. Paternoster and R. Bachman (eds), Thousand Oaks, CA: Sage
    • Felson, M. (2000), 'The routine activity approach: A very versatile theory of crime', in R. Paternoster and R. Bachman (eds), Explaining Criminals and Crime, Thousand Oaks, CA: Sage, pp. 43-46.
    • (2000) Explaining Criminals and Crime , pp. 43-46
    • Felson, M.1
  • 84
    • 26644457019 scopus 로고    scopus 로고
    • 'The rise of the risk commonwealth and the challenge for administrative law'
    • Autumn
    • Fisher, L. (2003), 'The rise of the risk commonwealth and the challenge for administrative law', Public Law, Autumn, 455-478.
    • (2003) Public Law , pp. 455-478
    • Fisher, L.1
  • 85
    • 84881796660 scopus 로고    scopus 로고
    • 'Aviation safety action program'
    • Flight Safety Information
    • Flight Safety Information (2003), 'Aviation safety action program', Flight Safety Information, Q3, 5-6
    • (2003) Flight Safety Information, Q3 , pp. 5-6
  • 86
    • 85039862728 scopus 로고    scopus 로고
    • 'Crash of the transportation monitoring system lasts 1.5 hours - Suspiciously caused by cyber attack'
    • 24 August, retrieved 24 August 2009, from
    • Fong, J. (2009, 24 August), 'Crash of the transportation monitoring system lasts 1.5 hours - Suspiciously caused by cyber attack', UDN, retrieved 24 August 2009, from http://udn.com/NEWS/NATIONAL/BREAKINGNEWS1/5096528.shtml
    • (2009) UDN
    • Fong, J.1
  • 87
    • 84881719561 scopus 로고    scopus 로고
    • 'Cybercrime and Convention on Cybercrime (I)'
    • Fong, J. G. (2003), 'Cybercrime and Convention on Cybercrime (I)', Taiwan Jurist, 4, 124-136.
    • (2003) Taiwan Jurist , vol.4 , pp. 124-136
    • Fong, J.G.1
  • 88
    • 0001797456 scopus 로고    scopus 로고
    • 'The interview: From structured questions to negotiated text'
    • N. K. Denzin and Y. S. Lincoln (eds), Thousand Oaks, CA: Sage 645-
    • Fontana, A. and J. H. Frey (2000), 'The interview: From structured questions to negotiated text' in N. K. Denzin and Y. S. Lincoln (eds), Handbook of Qualitative Research, Thousand Oaks, CA: Sage, pp. 645-672.
    • (2000) Handbook of Qualitative Research , pp. 672
    • Fontana, A.1    Frey, J.H.2
  • 89
    • 84881692201 scopus 로고    scopus 로고
    • Paper presented at the IMF Conference on Second Generation Reforms, retrieved 3 March 2010, from
    • Fukuyama, F. (1999), Social capital and civil society, Paper presented at the IMF Conference on Second Generation Reforms, retrieved 3 March 2010, from http://www.imf.org/external/pubs/ft/seminar/1999/reforms/fukuyama.htm#I
    • (1999) Social capital and civil society
    • Fukuyama, F.1
  • 95
    • 0346175130 scopus 로고    scopus 로고
    • 'The punitive society: Penology, criminology and the history of the present'
    • Garland, D. (1997), 'The punitive society: Penology, criminology and the history of the present', The Edinburgh Law Review, 1, 180-199.
    • (1997) The Edinburgh Law Review , vol.1 , pp. 180-199
    • Garland, D.1
  • 96
    • 39449092216 scopus 로고    scopus 로고
    • 'The history of international police cooperation: a 150-year evolution in trends and approaches'
    • Gerspacher, N. (2008), 'The history of international police cooperation: a 150-year evolution in trends and approaches', Global Crime, 9(1), 169-184.
    • (2008) Global Crime , vol.9 , Issue.1 , pp. 169-184
    • Gerspacher, N.1
  • 97
    • 0345321757 scopus 로고
    • retrieved 15 March, 2010, from
    • Gibson, W. (1982), Burning Chrome, retrieved 15 March, 2010, from http://project.cyberpunk.ru/lib/burning_chrome/
    • (1982) Burning Chrome
    • Gibson, W.1
  • 98
    • 0003954001 scopus 로고
    • London: Harper Collins
    • Gibson,W. (1984), Neuromancer, London: Harper Collins.
    • (1984) Neuromancer
    • Gibson, W.1
  • 102
    • 33748930465 scopus 로고    scopus 로고
    • 'On the definition and classification of cybercrime'
    • Gordon, S. and R. Ford (2006), 'On the definition and classification of cybercrime', Journal in Computer Virology, 2(1), 13-20.
    • (2006) Journal in Computer Virology , vol.2 , Issue.1 , pp. 13-20
    • Gordon, S.1    Ford, R.2
  • 103
    • 84881771601 scopus 로고    scopus 로고
    • Government Information Office, Taipei: Government Information Office
    • Government Information Office (2009), The Republic of China Year Book 2009, Taipei: Government Information Office
    • (2009) The Republic of China Year Book 2009
  • 104
    • 84994952907 scopus 로고
    • 'Regulation by reward: On the use of incentives as regulatory instruments'
    • Grabosky, P. (1995), 'Regulation by reward: On the use of incentives as regulatory instruments', Law and Policy, 17(3), 257-282.
    • (1995) Law and Policy , vol.17 , Issue.3 , pp. 257-282
    • Grabosky, P.1
  • 105
    • 34247160604 scopus 로고    scopus 로고
    • Upper Saddle River, NJ: Pearson
    • Grabosky, P. (2007), Electronic Crime, Upper Saddle River, NJ: Pearson.
    • (2007) Electronic Crime
    • Grabosky, P.1
  • 107
    • 84881802556 scopus 로고    scopus 로고
    • 'FAQ: The Kneber botnet revealed
    • 18 January, retrieved 21 January 2010, from
    • Greene, T. (2010, 18 January), 'FAQ: The Kneber botnet revealed', Networkworld, retrieved 21 January 2010, from http://www.networkworld.com/news/2010/021810-kneber-botnet-faq.html
    • (2010) Networkworld
    • Greene, T.1
  • 109
  • 110
    • 84881727660 scopus 로고    scopus 로고
    • 'No sorry from Love Bug author'
    • 11 May, retrieved 8 February 2010, from
    • Hayes, P. (2005, 11 May), 'No "sorry" from Love Bug author', The Register, retrieved 8 February 2010, from http://www.theregister.co.uk/2005/05/11/love_bug_author/
    • (2005) The Register
    • Hayes, P.1
  • 111
    • 84881831650 scopus 로고    scopus 로고
    • 'Beijing's rising hacker stars How does mother China react?
    • Fall
    • Henderson, S. (2008)' 'Beijing's rising hacker stars ? How does mother China react?, IO Sphere, Fall, 25-30.
    • (2008) IO Sphere , pp. 25-30
    • Henderson, S.1
  • 112
    • 84881733683 scopus 로고    scopus 로고
    • 'Botmaster: It's all about infecting, selling big batches of bots'
    • 20 August, retrieved 24 August 2009, from
    • Higgins, K. J. (2009a, 20 August), 'Botmaster: It's all about infecting, selling big batches of bots', InformationWeek, retrieved 24 August 2009, from http://www.darkreading.com/security/client/showArticle.jhtml? articleID=219400902&cid=RSSfeed
    • (2009) InformationWeek
    • Higgins, K.J.1
  • 113
    • 85039872692 scopus 로고    scopus 로고
    • 'Storm botnet makes a comeback: Researchers confirm "Waledac" is the work of new and improved Storm'
    • 14 January, retrieved 24 Aug 2009, from
    • Higgins, K. J. (2009b, 14 January), 'Storm botnet makes a comeback: Researchers confirm "Waledac" is the work of new and improved Storm', InformationWeek, retrieved 24 Aug 2009, from http://www.darkreading.com/security/vulnerabilities/showArticle.jhtml?articleID=212900543
    • (2009) InformationWeek
    • Higgins, K.J.1
  • 114
    • 0005208953 scopus 로고    scopus 로고
    • 'Sociology without social structure: Neoinstitutional theory meets brave new world'
    • Hirsch, P. (1997), 'Sociology without social structure: Neoinstitutional theory meets brave new world', American Journal of Sociology, 102, 1702-1723.
    • (1997) American Journal of Sociology , vol.102 , pp. 1702-1723
    • Hirsch, P.1
  • 115
    • 0033246727 scopus 로고    scopus 로고
    • 'Institutional evolution and change: Environmentalism and the U.S Chemical Industry'
    • Hoffman, A. J. (1999), 'Institutional evolution and change: Environmentalism and the U.S Chemical Industry', The Academy of Management Journal, 42(4), 351-371.
    • (1999) The Academy of Management Journal , vol.42 , Issue.4 , pp. 351-371
    • Hoffman, A.J.1
  • 117
    • 84881725314 scopus 로고    scopus 로고
    • 'An engineer sells hacking program'
    • 25 August 2007, retrieved 18 September 2010, from
    • Huang, D. S. (2007, 25 August 2007), 'An engineer sells hacking program', Libertytimes, retrieved 18 September 2010, from http://www.liberty times.com.tw/2007/new/aug/25/today-life6.htm
    • (2007) Libertytimes
    • Huang, D.S.1
  • 118
    • 85039846896 scopus 로고    scopus 로고
    • 'False reports hurt farmers'
    • 11 January, retrieved 2 January 2009, from
    • Huang, J. L. (2007, 11 January), 'False reports hurt farmers', Liberty Times, retrieved 2 January 2009, from http://www.libertytimes.com.tw/2007/ new/jan/11/today-life12.htm
    • (2007) Liberty Times
    • Huang, J.L.1
  • 119
    • 84936628470 scopus 로고
    • 'Face and favor: The Chinese power game'
    • Huang, K. (1987), 'Face and favor: The Chinese power game', American Journal of Sociology, 92(4), 944-974.
    • (1987) American Journal of Sociology , vol.92 , Issue.4 , pp. 944-974
    • Huang, K.1
  • 120
    • 84881695017 scopus 로고    scopus 로고
    • 'The KinmenAgreement is becoming an important foundation for sending back the stowaway'
    • Huaxia, 23 August, retrieved 15 January 2010, from
    • Huaxia (2007, 23 August), 'The KinmenAgreement is becoming an important foundation for sending back the stowaway', Huaxia, retrieved 15 January 2010, from http://hk.huaxia.com/thpl/wzzdlj/2007/08/34796.html
    • (2007) Huaxia
  • 122
    • 85039841916 scopus 로고    scopus 로고
    • 'Betting websites blackmailed with child pornography'
    • 27 October, retrieved 13 July 2009, from
    • Ilett, D. (2004, 27 October), 'Betting websites blackmailed with child pornography', Silicon.com, retrieved 13 July 2009, from http:// software.silicon.com/malware/0,3800003100,39125346,00.htm
    • (2004) Silicon.com
    • Ilett, D.1
  • 124
    • 84881745559 scopus 로고    scopus 로고
    • ITU, Geneva: International Telecommunication Union
    • ITU (2009), ITU Toolkit for Cybercrime Legislation, Geneva: International Telecommunication Union
    • (2009) ITU Toolkit for Cybercrime Legislation
  • 125
    • 84972273745 scopus 로고
    • 'A preliminary model of particularistic tie in Chinese political alliance: Kan-ch'ing and kuan-hsi in a rural Taiwanese township'
    • Jacobs, J. B. (1979), 'A preliminary model of particularistic tie in Chinese political alliance: Kan-ch'ing and kuan-hsi in a rural Taiwanese township', The China Quarterly, 78, 237-273.
    • (1979) The China Quarterly , vol.78 , pp. 237-273
    • Jacobs, J.B.1
  • 126
    • 0037453078 scopus 로고    scopus 로고
    • 'Mandatory reporting of HIV infection and opt-out prenatal screening for HIV infection: effect on testing rates'
    • Jayaraman, G. C., J. K. Preiksaitis and B. Larke (2003), 'Mandatory reporting of HIV infection and opt-out prenatal screening for HIV infection: effect on testing rates', Canadian Medical Association Journal, 168(6), 679-682.
    • (2003) Canadian Medical Association Journal , vol.168 , Issue.6 , pp. 679-682
    • Jayaraman, G.C.1    Preiksaitis, J.K.2    Larke, B.3
  • 127
    • 84970417659 scopus 로고
    • 'Obstacles to the development of research in crime and delinquency'
    • Jeffery, C. R. (1993), 'Obstacles to the development of research in crime and delinquency', Journal of Research in Crime and Delinquency, 30(4), 491-497.
    • (1993) Journal of Research in Crime and Delinquency , vol.30 , Issue.4 , pp. 491-497
    • Jeffery, C.R.1
  • 128
    • 84881836234 scopus 로고    scopus 로고
    • 'Mutual assistance between Taiwan and China. C.I.B.: Institutionalised the collaboration of combating crime'
    • 26 April, retrieved 18 January 2010, from
    • Jen, M. H. (2009, 26 April), 'Mutual assistance between Taiwan and China. C.I.B.: Institutionalised the collaboration of combating crime', Central News Agency, retrieved 18 January 2010, from http://www.rti.com.tw/big5/topic/2009/0426/news_090426-07.aspx
    • (2009) Central News Agency
    • Jen, M.H.1
  • 130
    • 84886405916 scopus 로고    scopus 로고
    • 'Issues of Hacking and Extradition will all be included in the Jiang-Chen Meeting'
    • 31 March, retrieved 17 January 2010, from
    • Jiang, J.Y. (2009, 31 March), 'Issues of Hacking and Extradition will all be included in the Jiang-Chen Meeting', Haixiainfo, retrieved 17 January 2010, from http://www.haixiainfo.com.tw/44565.html
    • (2009) Haixiainfo
    • Jiang, J.Y.1
  • 131
    • 84881697262 scopus 로고    scopus 로고
    • 'Book Review: Richard Ericson's Crime in an Insecure World'
    • Jou, S. (2008), 'Book Review: Richard Ericson's Crime in an Insecure World', Taiwanese Journal of Sociology, 40, 141-149.
    • (2008) Taiwanese Journal of Sociology , vol.40 , pp. 141-149
    • Jou, S.1
  • 132
    • 84881798914 scopus 로고    scopus 로고
    • 'Google hack leaked to Internet; security experts urge vigilance
    • 18 January, retrieved 18 January 2010, from
    • Kaplan, J. A. (2010, 18 January), 'Google hack leaked to Internet; security experts urge vigilance', FOXNews, retrieved 18 January 2010, from http://www.foxnews.com/scitech/2010/01/18/google-exploit-leakedinternet-security-experts-urge-vigilance/
    • (2010) FOXNews
    • Kaplan, J.A.1
  • 133
    • 0742311431 scopus 로고    scopus 로고
    • 'Digital architecture as crime control'
    • Katyal, N. K. (2003), 'Digital architecture as crime control', Yale Law Journal, 112(8), 2261-2289.
    • (2003) Yale Law Journal , vol.112 , Issue.8 , pp. 2261-2289
    • Katyal, N.K.1
  • 135
    • 84934563463 scopus 로고
    • 'Kuan-hsi and network building: A sociological interpretation'
    • King, A. Y.-C. (1991), 'Kuan-hsi and network building: A sociological interpretation', Daedalus, 120(2), 63-84.
    • (1991) Daedalus , vol.120 , Issue.2 , pp. 63-84
    • King, A.-C.1
  • 136
    • 84881767167 scopus 로고    scopus 로고
    • 'China denies any role in "GhostNet" computer hacking'
    • 31 March, retrieved 20 August 2009, from
    • Klayman, A. (2009, 31 March), 'China denies any role in "GhostNet" computer hacking', VOANews.com, retrieved 20 August 2009, from http://www1.voanews.com/english/news/a-13-2009-03-31-voa12-68812997.html
    • (2009) VOANews.com
    • Klayman, A.1
  • 137
    • 0021350045 scopus 로고
    • 'The underreporting of disease and physicians' knowledge of reporting requirements'
    • Konowitz, P. M., G. A. Petrossian and D. N. Rose (1984), 'The underreporting of disease and physicians' knowledge of reporting requirements', Public Health Report, 99, 91-35.
    • (1984) Public Health Report , vol.99 , pp. 35-91
    • Konowitz, P.M.1    Petrossian, G.A.2    Rose, D.N.3
  • 138
    • 52649121965 scopus 로고    scopus 로고
    • 'No There there: Why cyberspace isn't'
    • Koppell, J. G. S. (2000), 'No "There" there: Why cyberspace isn't', The Atlantic Monthly, 286, 16-18.
    • (2000) The Atlantic Monthly , vol.286 , pp. 16-18
    • Koppell, J.G.S.1
  • 139
    • 84881744731 scopus 로고    scopus 로고
    • 'Bringing botnets out of the shadows: Online volunteers monitor illegal computer networks'
    • 21 March, retrieved 22 August 2009, from
    • Krebs, B. (2006, 21 March), 'Bringing botnets out of the shadows: Online volunteers monitor illegal computer networks', The Washington Post, retrieved 22 August 2009, from http://www.washingtonpost.com/wpdyn/content/article/2006/03/21/AR2006032100279.html
    • (2006) The Washington Post
    • Krebs, B.1
  • 141
    • 85039864888 scopus 로고    scopus 로고
    • 'New attacking methods - DNS recursive'
    • 13 April, retrieved 10 May 2009, from
    • Lan, S. L. (2006, 13 April), 'New attacking methods - DNS recursive', lslnet.com, retrieved 10 May 2009, from http://www.lslnet.com/linux/f/docs/linux-4795.htm
    • (2006) lslnet.com
    • Lan, S.L.1
  • 142
    • 0039903416 scopus 로고    scopus 로고
    • 'Digital fears emerge after data siege in Estonia'
    • 29 May, retrieved 15 February 2008, from
    • Landler,M. and J. Markoff (2007, 29 May), 'Digital fears emerge after data siege in Estonia', New York Times, retrieved 15 February 2008, from http://www.nytimes.com/2007/05/29/technology/29estonia.html
    • (2007) New York Times
    • Landler, M.1    Markoff, J.2
  • 144
    • 84886432690 scopus 로고    scopus 로고
    • 'Judicial mutual assistance safeguards the rights and interests of citizens in both sides'
    • 29 December, retrieved 22 January 2010, from
    • Lee, H. F. and J. H. Wu (2009, 29 December), 'Judicial mutual assistance safeguards the rights and interests of citizens in both sides', Xinhuanet, retrieved 22 January 2010, from http://news.xinhuanet.com/tw/2009-12/30/content_12728447.htm
    • (2009) Xinhuanet
    • Lee, H.F.1    Wu, J.H.2
  • 145
    • 85039867601 scopus 로고    scopus 로고
    • 'China is suffering serious cyber attack'
    • 22 May, retrieved 10 June 2009, from
    • Lee, J. (2009, 22 May), 'China is suffering serious cyber attack', Xinhuanet, retrieved 10 June 2009, from http://news.xinhuanet.com/zgjx/2009-05/ 22/content_11416880.htm
    • (2009) Xinhuanet
    • Lee, J.1
  • 146
    • 84881696209 scopus 로고    scopus 로고
    • 'Hackers attack KMT's websites'
    • 13 December, retrieved 23 April 2008, from
    • Lee, M. S. and L. J. Feng (2007, 13 December), 'Hackers attack KMT's websites', UDN, retrieved 23 April 2008, from http://www.itis.tw/node/1323
    • (2007) UDN
    • Lee, M.S.1    Feng, L.J.2
  • 147
    • 34948866915 scopus 로고    scopus 로고
    • 'Air carrier safety and culture: An investigation of Taiwan's adaption to western incident reporting programs'
    • Lee, P. I. and T. R. Weitzel (2005), 'Air carrier safety and culture: An investigation of Taiwan's adaption to western incident reporting programs', Journal of Air Transportation, 10(1), 20-37.
    • (2005) Journal of Air Transportation , vol.10 , Issue.1 , pp. 20-37
    • Lee, P.I.1    Weitzel, T.R.2
  • 148
    • 84881710044 scopus 로고    scopus 로고
    • 'Partial amendment on the Criminal Law'
    • Legislative Yuan
    • Legislative Yuan (1997), 'Partial amendment on the Criminal Law', Gazette of the Legislative Yuan, 86(31), 298-305
    • (1997) Gazette of the Legislative Yuan , vol.86 , Issue.31 , pp. 298-305
  • 149
    • 84881805259 scopus 로고    scopus 로고
    • 'Partial amendment of the Criminal Law'
    • Legislative Yuan
    • Legislative Yuan (1999), 'Partial amendment of the Criminal Law', Gazette of the Legislative Yuan, 88(13), 77-219
    • (1999) Gazette of the Legislative Yuan , vol.88 , Issue.13 , pp. 77-219
  • 150
    • 84881770978 scopus 로고    scopus 로고
    • 'Offences relating to the abuse of computers'
    • Legislative Yuan
    • Legislative Yuan (2003), 'Offences relating to the abuse of computers', Gazette of the Legislative Yuan, 92(29), 137-152
    • (2003) Gazette of the Legislative Yuan , vol.92 , Issue.29 , pp. 137-152
  • 151
    • 85039840291 scopus 로고    scopus 로고
    • 'In less than six hours Thursday, Love spread worldwide'
    • 5 May, retrieved 8 February 2010, from
    • Lemos, R. (2000, 5 May), 'In less than six hours Thursday, Love spread worldwide', ZDNet, retrieved 8 February 2010, from http://news. zdnet.com/2100-9595_22-107344.html
    • (2000) ZDNet
    • Lemos, R.1
  • 153
    • 33645653056 scopus 로고    scopus 로고
    • 'Conducting fieldwork in China: observations on collecting primary data regarding crime, law, and criminal justice system'
    • Liang, B. and H. Lu, H. (2006), 'Conducting fieldwork in China: observations on collecting primary data regarding crime, law, and criminal justice system', Journal of Contemporary Criminal Justice, 22(2), 157-172.
    • (2006) Journal of Contemporary Criminal Justice , vol.22 , Issue.2 , pp. 157-172
    • Liang, B.1    Lu, H.H.2
  • 155
    • 33745799873 scopus 로고    scopus 로고
    • 'Analysis of computer crime characteristics in Taiwan'
    • H. Chen, F.-Y. Wang, C. C. Yang, D. Zeng, M. Chau and K.Chang (eds), Proceedings, Heidelberg: Springer
    • Liao,Y. and C. Tsai (2006), 'Analysis of computer crime characteristics in Taiwan', in H. Chen, F.-Y. Wang, C. C. Yang, D. Zeng, M. Chau and K.Chang (eds), Intelligence and Security Informatics: International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedings, Heidelberg: Springer, pp. 49-57.
    • (2006) Intelligence and Security Informatics: International Workshop, WISI 2006, Singapore, April 9, 2006 , pp. 49-57
    • Liao, Y.1    Tsai, C.2
  • 156
    • 84881809542 scopus 로고    scopus 로고
    • 'Neo-Nazi forum hacked'
    • 1 September, retrieved 10 April 2010, from
    • Libbenga, J. (2008, 1 September), 'Neo-Nazi forum hacked', The Register, retrieved 10 April 2010, from http://www.theregister.co.uk/2008/09/01/ neo_nazi_forum_hacked/
    • (2008) The Register
    • Libbenga, J.1
  • 159
    • 84881756242 scopus 로고    scopus 로고
    • 'Spam: made in Taiwan?'
    • 9 June, retrieved 31 August 2009, from
    • Lombardi, C. (2006, 9 June), 'Spam: made in Taiwan?', CNET, retrieved 31 August 2009, from http://news.cnet.com/2100-7349_3-6082377.html
    • (2006) CNET
    • Lombardi, C.1
  • 161
    • 84881815348 scopus 로고    scopus 로고
    • 'Money or hacking'
    • 12 June, retrieved 10 May 2008, from
    • Lui, J. P. (2006, 12 June), 'Money or hacking', Xinhuanews, retrieved 10 May 2008, from http://big5.xinhuanet.com/gate/big5/news.xinhuanet.com/politics/2006-06/12/content_4685002.htm
    • (2006) Xinhuanews
    • Lui, J.P.1
  • 163
    • 85039856166 scopus 로고    scopus 로고
    • 'Malicious software infects computers'
    • 18 February, retrieved 19 February 2010, from
    • Markoff, J. (2010, 18 February), 'Malicious software infects computers', New York Times, retrieved 19 February 2010, from http://www.nytimes. com/2010/02/19/technology/19cyber.html?emc=eta1
    • (2010) New York Times
    • Markoff, J.1
  • 164
    • 84881794558 scopus 로고    scopus 로고
    • 'Viruses, phishing, and Trojans for profit'
    • 24 June, retrieved 10 July 2009, from
    • Martin, K. (2006, 24 June), 'Viruses, phishing, and Trojans for profit', SecurityFocus, retrieved 10 July 2009, from http://www.securityfocus.com/columnists/419
    • (2006) SecurityFocus
    • Martin, K.1
  • 166
    • 84881756528 scopus 로고    scopus 로고
    • 'Global cybercrime treaty rejected'
    • 23 April, retrieved 21 September 2010 from
    • Masters, G. (2010, 23 April), 'Global cybercrime treaty rejected', SC Magazine, retrieved 21 September 2010, from http://www.scmagazineus.com/global-cybercrime-treaty-rejected-at-un/article/168630/
    • (2010) SC Magazine
    • Masters, G.1
  • 167
    • 84881730230 scopus 로고    scopus 로고
    • 'The art of (cyber) war'
    • retrieved 18 September, 2010, from
    • Mazanec, B. M. (2009), 'The art of (cyber) war', retrieved 18 September, 2010, from http://www.securityaffairs.org/issues/2009/16/index16.php
    • (2009)
    • Mazanec, B.M.1
  • 169
    • 0012751814 scopus 로고
    • 'Understanding theories of criminal victimization'
    • Meier, R. F. and T. D. Miethe (1993), 'Understanding theories of criminal victimization', Crime and Justice, 17, 459-499.
    • (1993) Crime and Justice , vol.17 , pp. 459-499
    • Meier, R.F.1    Miethe, T.D.2
  • 171
    • 84881699485 scopus 로고    scopus 로고
    • Ministry of Justice, retrieved 12 December, 2009, from
    • Ministry of Justice (2000), Ministry of Justice Bulletin, retrieved 12 December, 2009, from http://gaz.ncl.edu.tw/detail.jsp?sysid=E0006245
    • (2000) Ministry of Justice Bulletin
  • 172
    • 84970763122 scopus 로고
    • 'The significance of saturation'
    • Morse, J. M. (1995), 'The significance of saturation', Qualitative Health Research, 5, 147-149.
    • (1995) Qualitative Health Research , vol.5 , pp. 147-149
    • Morse, J.M.1
  • 173
    • 84894833818 scopus 로고    scopus 로고
    • 'Estonia computers blitzed, possibly by the Russians'
    • 19 May, retrieved 15 February 2008, from
    • Myers, S. L. (2007, 19 May), 'Estonia computers blitzed, possibly by the Russians', New York Times, retrieved 15 February 2008, from http:// www.nytimes.com/2007/05/19/world/europe/19russia.html
    • (2007) New York Times
    • Myers, S.L.1
  • 174
    • 0344559509 scopus 로고    scopus 로고
    • National Infrastructure Advisory Council, Washington, DC: White House
    • National Infrastructure Advisory Council (2003), The National Strategy to Secure Cyberspace,Washington, DC: White House
    • (2003) The National Strategy to Secure Cyberspace
  • 175
    • 84881692029 scopus 로고
    • National Transportation Safety Board, Washington, DC: National Transportation Safety Board
    • National Transportation Safety Board (1974), Aircraft Incident Report, Washington, DC: National Transportation Safety Board
    • (1974) Aircraft Incident Report
  • 178
    • 84933486345 scopus 로고
    • 'Risk, power and crime prevention'
    • O'Malley, P. (1992), 'Risk, power and crime prevention', Economy and Society, 21(3), 252-275.
    • (1992) Economy and Society , vol.21 , Issue.3 , pp. 252-275
    • O'Malley, P.1
  • 179
    • 43649092900 scopus 로고    scopus 로고
    • 'Reinventing prevention: why did "crime prevention" develop so late?'
    • O'Malley, P. and S. Hutchinson (2007), 'Reinventing prevention: why did "crime prevention" develop so late?', British Journal of Criminology, 47, 373-389.
    • (2007) British Journal of Criminology , vol.47 , pp. 373-389
    • O'Malley, P.1    Hutchinson, S.2
  • 182
    • 85039854257 scopus 로고    scopus 로고
    • 'China tightens Internet controls: Content under scrutiny in run-up to sensitive Communist Party Congress'
    • 14 October, retrieved 23 March 2009, from
    • Olesen, A. (2007, 14 October), 'China tightens Internet controls: Content under scrutiny in run-up to sensitive Communist Party Congress', Associated Press, retrieved 23 March 2009, from http://www.msnbc.msn.com/id/21268635
    • (2007) Associated Press
    • Olesen, A.1
  • 183
    • 84881730410 scopus 로고    scopus 로고
    • '1H 2009: Malware threat grows ever larger'
    • 14 August, retrieved 31 August 2009, from
    • Osena, M. (2009, 14 August), '1H 2009: Malware threat grows ever larger', TrendLabs Malware Blog, retrieved 31 August 2009, from http:// blog.trendmicro.com/wp-content/uploads/2009/08/2009-08-07-blog1.jpg
    • (2009) TrendLabs Malware Blog
    • Osena, M.1
  • 186
    • 84881827907 scopus 로고    scopus 로고
    • 'On the measures of ordering to offer electronic evidence in criminal investigation'
    • Pi, Y. (2005), 'On the measures of ordering to offer electronic evidence in criminal investigation', Journal of Shangdong Police College, 80, 53-58.
    • (2005) Journal of Shangdong Police College , vol.80 , pp. 53-58
    • Pi, Y.1
  • 187
    • 84881818845 scopus 로고    scopus 로고
    • Beijing: Chinese People's Public Security University
    • Pi, Y. (2008), Research on Cyber-Security law, Beijing: Chinese People's Public Security University.
    • (2008) Research on Cyber-Security law
    • Pi, Y.1
  • 189
    • 84881805931 scopus 로고    scopus 로고
    • 'On Cybercrime legislation in China - And on Cybercrime legislation in amendment 7th of China Penal Code'
    • Pi, Y. (2009b), 'On Cybercrime legislation in China - And on Cybercrime legislation in amendment 7th of China Penal Code', Hebei Law Science, 27(6), 49-57.
    • (2009) Hebei Law Science , vol.27 , Issue.6 , pp. 49-57
    • Pi, Y.1
  • 190
    • 84881681666 scopus 로고    scopus 로고
    • 'On the legislation of Cybercrime in amendment VII to the Criminal Law of the People's Republic of China'
    • Pi, Y. (2009c), 'On the legislation of Cybercrime in amendment VII to the Criminal Law of the People's Republic of China', Journal of Shangdong Police College, 104, 15-20.
    • (2009) Journal of Shangdong Police College , vol.104 , pp. 15-20
    • Pi, Y.1
  • 192
    • 84881831542 scopus 로고    scopus 로고
    • 'North Korea blamed for DDoS attacks on United States and South Korea'
    • retrieved 18 September, 2010, from
    • Raywood, D. (2009), 'North Korea blamed for DDoS attacks on United States and South Korea', retrieved 18 September, 2010, from http:// www.scmagazineuk.com/north-korea-blamed-for-ddos-attacks-onunited-states-and-south-korea/article/139764/
    • (2009)
    • Raywood, D.1
  • 194
    • 84881733081 scopus 로고    scopus 로고
    • 'France blames China for hack attacks'
    • retrieved 26, Sept, 2007, from
    • Register, T. (2007), 'France blames China for hack attacks', retrieved 26, Sept, 2007, from http://www.theregister.co.uk/2007/09/12/french_cyberattacks/
    • (2007)
    • Register, T.1
  • 197
    • 0033242857 scopus 로고    scopus 로고
    • 'Risk society and actuarial criminology: Perspective for a critical disclosure'
    • Rigakos, G. (1999), 'Risk society and actuarial criminology: Perspective for a critical disclosure', Canadian Journal of Criminology, 41(2), 137-150.
    • (1999) Canadian Journal of Criminology , vol.41 , Issue.2 , pp. 137-150
    • Rigakos, G.1
  • 200
    • 84881778964 scopus 로고    scopus 로고
    • (2010, 18 January), 'New computer virus will create a backdoor'
    • RTI, retrieved 8 February 2010, from
    • RTI (2010, 18 January), 'New computer virus will create a backdoor', SinaNews, retrieved 8 February 2010, from http://news.sina.com.tw/ article/20100118/2696582.html
    • SinaNews
  • 202
    • 85039857248 scopus 로고    scopus 로고
    • 'Virus poses as nude Jennifer Lopez photos'
    • 31 May, retrieved 10 March 2010, from
    • Sandoval, G. (2001, 31 May), 'Virus poses as nude Jennifer Lopez photos', CNET, retrieved 10 March 2010, from http://news.cnet.com/2100-1001-267644.html
    • (2001) CNET
    • Sandoval, G.1
  • 204
    • 84881833055 scopus 로고    scopus 로고
    • retrieved 18 September, 2010, from
    • Schneier, B. (2008), The Truth About Chinese Hackers, retrieved 18 September, 2010, from http://dsc.discovery.com/technology/my-take/computer-hackers-china.html
    • (2008) The Truth About Chinese Hackers
    • Schneier, B.1
  • 205
    • 0025978823 scopus 로고
    • 'The surveillance of communicable disease in Vermont: who reports?'
    • Schramm, M., R. L. Vogt and M. Mamolen (1991), 'The surveillance of communicable disease in Vermont: who reports?', Public Health Report, 106, 95-97.
    • (1991) Public Health Report , vol.106 , pp. 95-97
    • Schramm, M.1    Vogt, R.L.2    Mamolen, M.3
  • 208
    • 85039845188 scopus 로고    scopus 로고
    • 'Taipei becomes the headquarters of bots in the Asia and Pacific Region'
    • 20 April, retrieved 25 August 2009, from
    • Shi,W.B. (2009, 20 April), 'Taipei becomes the headquarters of bots in the Asia and Pacific Region', IThome Online, retrieved 25 August 2009, from http://www.ithome.com.tw/itadm/article.php?c=54571
    • (2009) IThome Online
    • Shi, W.B.1
  • 210
    • 84881673897 scopus 로고    scopus 로고
    • '38,936 persons have been repatriated under the Kinmen Agreement'
    • SinaNews, 10 Februrary, retrieved 18 January 2010, from
    • SinaNews (2009, 10 Februrary), '38,936 persons have been repatriated under the Kinmen Agreement', SinaNews, retrieved 18 January 2010, from http://news.sina.com/c/2009-02-11/111617192947.shtml
    • (2009) SinaNews
  • 211
    • 85167861900 scopus 로고
    • Berkeley, CA: University of California Press
    • Sklar, L. (1977), Space, Time, and Spacetime, Berkeley, CA: University of California Press.
    • (1977) Space, Time, and Spacetime
    • Sklar, L.1
  • 212
    • 21144465983 scopus 로고
    • 'Gift, bribes, and guanxi:A reconsideration of Bourdieu's social capital'
    • Smart, A. (1993), 'Gift, bribes, and guanxi:A reconsideration of Bourdieu's social capital', Cultural Anthropology, 8(3), 388-408.
    • (1993) Cultural Anthropology , vol.8 , Issue.3 , pp. 388-408
    • Smart, A.1
  • 217
    • 84881717599 scopus 로고    scopus 로고
    • 'Asia enterprises more vulnerable to cybercrime'
    • 23 September, retrieved 24 September 2009, from
    • Storey, R. O. (2009, 23 September), 'Asia enterprises more vulnerable to cybercrime', Network World, retrieved 24 September 2009, from http:// www.networkworld.com/news/2009/092309-asia-enterprises-morevulnerable-to.html
    • (2009) Network World
    • Storey, R.O.1
  • 218
    • 85039843165 scopus 로고    scopus 로고
    • 'Golden Shield Project - Everyone in China is under the surveillance'
    • 9 December, retrieved 15 March 2009, from
    • Su, J. Y. (2008, 9 December), 'Golden Shield Project - Everyone in China is under the surveillance', Liberty Times, retrieved 15 March 2009, from http://www.libertytimes.com.tw/2008/new/dec/9/today-fo5.htm
    • (2008) Liberty Times
    • Su, J.Y.1
  • 231
    • 27644477777 scopus 로고    scopus 로고
    • 'From hackers to hacktivists: Speed bumps on the global superhighway'
    • Taylor, P. A. (2005), 'From hackers to hacktivists: Speed bumps on the global superhighway', New Media Society, 7(5), 625-646.
    • (2005) New Media Society , vol.7 , Issue.5 , pp. 625-646
    • Taylor, P.A.1
  • 232
    • 84881726377 scopus 로고    scopus 로고
    • 'Cyberattacks are "existential threat" to U.S., FBI says
    • 24 March, retrieved 25 March 2010 from
    • Thibodeau, P. (2010, 24 March), 'Cyberattacks are "existential threat" to U.S., FBI says, Computerworld, retrieved 25 March 2010 from http://www.networkworld.com/news/2010/032410-cyberattacks-areexistential-threat-to.html?source=NWWNLE_nlt_compliance_2010-03-26
    • (2010) Computerworld
    • Thibodeau, P.1
  • 234
    • 39749156010 scopus 로고    scopus 로고
    • 'The invasion of the Chinese cyberspies'
    • retrieved 15 March, 2010, from
    • Thornburgh, N. (2005), 'The invasion of the Chinese cyberspies', retrieved 15 March, 2010, from http://www.time.com/time/magazine/article/0,9171,1098961,00.html
    • (2005)
    • Thornburgh, N.1
  • 235
    • 84886439219 scopus 로고    scopus 로고
    • 'An analysis on the judicial agreement between Taiwan and China'
    • 3 May, retrieved 21 January 2010, from
    • Tong,W. S. (2009, 3 May), 'An analysis on the judicial agreement between Taiwan and China', EpochTimes, retrieved 21 January 2010, from http://www.dajiyuan.com/b5/9/5/3/n2514809.htm
    • (2009) EpochTimes
    • Tong, W.S.1
  • 237
    • 84881735251 scopus 로고    scopus 로고
    • 'Chinese hack into film festival site'
    • 26 July 2009, retrieved 18 September 2010, from
    • Toy, M.-A. (2009, 26 July 2009), 'Chinese hack into film festival site', The Age, retrieved 18 September 2010, from http://www.theage.com.au/national/chinese-hack-into-film-festival-site-20090725-dwvx.html
    • (2009) The Age
    • Toy, M.-A.1
  • 238
    • 39749115454 scopus 로고    scopus 로고
    • 'Russia accused of unleashing cyberwar to disable Estonia'
    • 17 May, retrieved 23 September 2009, from
    • Traynor, I. (2007, 17 May), 'Russia accused of unleashing cyberwar to disable Estonia', Guardian, retrieved 23 September 2009, from http://www.guardian.co.uk/russia/article/0,2081438,00.html
    • (2007) Guardian
    • Traynor, I.1
  • 240
    • 57649135065 scopus 로고    scopus 로고
    • 'An intervention to improve notifiable disease reporting using ambulatory clinics'
    • Trepka, M. J., G. Zhang and F. Leguen (2009), 'An intervention to improve notifiable disease reporting using ambulatory clinics', Epidemiology and Infection, 137, 22-29.
    • (2009) Epidemiology and Infection , vol.137 , pp. 22-29
    • Trepka, M.J.1    Zhang, G.2    Leguen, F.3
  • 248
    • 84881823140 scopus 로고    scopus 로고
    • 'Online service foils ransom plot'
    • retrieved 6 April 2009, from
    • Wakefield, J. (2005), 'Online service foils ransom plot', BBC News Online, retrieved 6 April 2009, from http://news.bbc.co.uk/1/hi/technology/ 4579623.stm
    • (2005) BBC News Online
    • Wakefield, J.1
  • 249
    • 84972217835 scopus 로고
    • 'Organized dependency and cultures of authority in Chinese industry'
    • Walder, A. G. (1983), 'Organized dependency and cultures of authority in Chinese industry', Journal of Asian Studies, 63(1), 51-75.
    • (1983) Journal of Asian Studies , vol.63 , Issue.1 , pp. 51-75
    • Walder, A.G.1
  • 251
    • 84949564522 scopus 로고    scopus 로고
    • 'The Internet as a conduit for criminal activity'
    • A. Pattavian (ed.), Thousand Oaks, CA: Sage
    • Wall, D. S. (2005), 'The Internet as a conduit for criminal activity' in A. Pattavian (ed.), Information Technology and the Criminal Justice System, Thousand Oaks, CA: Sage, pp. 77-98.
    • (2005) Information Technology and the Criminal Justice System , pp. 77-98
    • Wall, D.S.1
  • 252
    • 24144472881 scopus 로고    scopus 로고
    • Cambridge: Polity Press
    • Wall, D. S. (2007), Cybercrime, Cambridge: Polity Press.
    • (2007) Cybercrime
    • Wall, D.S.1
  • 253
    • 51949085108 scopus 로고    scopus 로고
    • 'Cybercrime, Media and Insecurity: the shaping of public perceptions of cybercrime'
    • Wall, D. S. (2008), 'Cybercrime, Media and Insecurity: the shaping of public perceptions of cybercrime', International Review of Law, Computers and Technology, 22, 45-63.
    • (2008) International Review of Law, Computers and Technology , vol.22 , pp. 45-63
    • Wall, D.S.1
  • 254
    • 51949117093 scopus 로고    scopus 로고
    • (2008/2010), 'Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about Cybercrime' (revised May 2010)
    • Wall, D. S. (2008/2010), 'Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about Cybercrime' (revised May 2010), Information, Communication & Society, 11(6), 861-884.
    • Information, Communication & Society , vol.11 , Issue.6 , pp. 861-884
    • Wall, D.S.1
  • 255
    • 84881811124 scopus 로고    scopus 로고
    • Paper presented at the First Workshop on Hot Topics in Understanding Botnets, retrieved 20 July 2009, from
    • Wang, P., S. Sparks and C. C. Zou (2007), An advanced hybrid peer-to-peer botnet, Paper presented at the First Workshop on Hot Topics in Understanding Botnets, retrieved 20 July 2009, from http://www.usenix.org/event/hotbots07/tech/full_papers/wang/wang.pdf
    • (2007) An advanced hybrid peer-to-peer botnet
    • Wang, P.1    Sparks, S.2    Zou, C.C.3
  • 256
    • 84881778084 scopus 로고    scopus 로고
    • 'PayEasy were hacked with a leaking of 5,400 personal information'
    • 12 December, retrieved 3 March 2010, from
    • Wang, P. L. (2007, 12 December), 'PayEasy were hacked with a leaking of 5,400 personal information', Liberty Times, retrieved 3 March 2010, from http://www.itis.tw/node/1313
    • (2007) Liberty Times
    • Wang, P.L.1
  • 257
    • 84881689770 scopus 로고    scopus 로고
    • 'The Panda with burning incense: profit-oriented virus'
    • 14 February, retrieved 20 March 2009, from
    • Wang, S. R. (2007, 14 February), 'The Panda with burning incense: profit-oriented virus', China's First Financial Daily, retrieved 20 March 2009, from http://hacker.cn/News/aqwh/2007-2/14/0721409031215205_2.shtml
    • (2007) China's First Financial Daily
    • Wang, S.R.1
  • 261
    • 84881825180 scopus 로고    scopus 로고
    • 'Nearly 600 arrested in Asian Swindling Ring'
    • 10 June, retrieved 26 September 2011, from
    • Wines, M. (2011, 10 June), 'Nearly 600 arrested in Asian Swindling Ring', New York Times, retrieved 26 September 2011, from http://www.nytimes.com/2011/06/11/world/asia/11taiwan.html
    • (2011) New York Times
    • Wines, M.1
  • 263
    • 33749596400 scopus 로고    scopus 로고
    • World Health Organization, retrieved 4 February, 2010, from
    • World Health Organization (2005), Avian influenza frequently asked questions, retrieved 4 February, 2010, from http://www.who.int/csr/disease/ avian_influenza/avian_faqs/en/
    • (2005) Avian influenza frequently asked questions
  • 264
    • 84881775835 scopus 로고    scopus 로고
    • 'Mainland's Taiwan affairs chief says economic co-op priority for cross-straits relations'
    • Xinhua, 26 April, retrieved 19 January 2010, from
    • Xinhua (2009, 26 April), 'Mainland's Taiwan affairs chief says economic co-op priority for cross-straits relations', Xinhuanews, retrieved 19 January 2010, from http://www.gwytb.gov.cn:8088/detail.asp?table=headlines&title=Headlines&offset=75&m_id=1001
    • (2009) Xinhuanews
  • 265
    • 84886446431 scopus 로고    scopus 로고
    • 'Over 3,100 cyber attacks towards Taiwanese Government System were originated by Chinese cyber army'
    • 24 March, retrieved 21 September 2010, from
    • Xu, S. C. (2009, 24 March), 'Over 3,100 cyber attacks towards Taiwanese Government System were originated by Chinese cyber army', Liberty Times, retrieved 21 September 2010, from http://www.libertytimes.com.tw/2009/new/mar/24/today-fo2.htm
    • (2009) Liberty Times
    • Xu, S.C.1
  • 266
    • 85005345968 scopus 로고
    • 'The modernity of power in the Chinese socialist order'
    • Yang, M. M. (1988), 'The modernity of power in the Chinese socialist order', Cultural Anthopology, 3(4), 408-427.
    • (1988) Cultural Anthopology , vol.3 , Issue.4 , pp. 408-427
    • Yang, M.M.1
  • 267
    • 84881821816 scopus 로고    scopus 로고
    • 'Online gaming companies suffer DDoS attacks from Chinese hackers'
    • 30 April, retrieved 25 August 2009, from
    • Yang, Y. Z. (2008, 30 April), 'Online gaming companies suffer DDoS attacks from Chinese hackers', UDN, retrieved 25 August 2009, from http://mag.udn.com/mag/digital/storypage.jsp?f_MAIN_ID=319&f_SUB_ID=2941&f_ART_ID=123192
    • (2008) UDN
    • Yang, Y.Z.1
  • 268
    • 34247657469 scopus 로고    scopus 로고
    • 'The novelty of "Cybercrime": An assessment in light of routine activity theory'
    • Yar, M. (2005), 'The novelty of "Cybercrime": An assessment in light of routine activity theory', European Journal of Criminology, 2(4), 407-427.
    • (2005) European Journal of Criminology , vol.2 , Issue.4 , pp. 407-427
    • Yar, M.1
  • 269
    • 84881806428 scopus 로고    scopus 로고
    • 'Specific modelling model found which is targeting Taiwan only'
    • 5 September, retrieved 27 August 2009, from
    • Yau,Y. S. (2006, 5 September), 'Specific modelling model found which is targeting Taiwan only', IThome Online, retrieved 27 August 2009, from http://www.ithome.com.tw/itadm/article.php?c=39235
    • (2006) IThome Online
    • Yau, Y.S.1
  • 270
    • 79961077465 scopus 로고    scopus 로고
    • 'Google hack attack was ultra sophisticated, new details show'
    • 14 January, retrieved 18 January 2010, from
    • Zetter, K. (2010, 14 January), 'Google hack attack was ultra sophisticated, new details show', Wired News, retrieved 18 January 2010, from http://www.wired.com/threatlevel/2010/01/operation-aurora
    • (2010) Wired News
    • Zetter, K.1
  • 271
    • 84886401545 scopus 로고    scopus 로고
    • 'Taiwanese net-armies are targeting China'
    • 1 November, from
    • Zhang, H. Y. (2007, 1 November), 'Taiwanese net-armies are targeting China', People, from http://tw.people.com.cn/BIG5/88649/6468348.html
    • (2007) People
    • Zhang, H.Y.1
  • 272
    • 0002086749 scopus 로고
    • 'Organisation as institutions'
    • S. B. Bacharach (ed.), Greenwich, CT: JAI Press
    • Zucker, L. G. (1983), 'Organisation as institutions', in S. B. Bacharach (ed.), Research in the Sociology of Organizations (Vol. 2), Greenwich, CT: JAI Press.
    • (1983) Research in the Sociology of Organizations , vol.2
    • Zucker, L.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.