Frank Fu-Yuan Huang
Central Police University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Frank Fu-Yuan Huang.
Crime Law and Social Change | 1994
Furjen Denq; Michael S. Vaughn; Frank Fu-Yuan Huang
Taiwan is known for rapid economic growth, but in 1988, the government ended 40 years of martial law, resulting in greater political and social freedoms. This paper explores the influence of economic, social, and political structures on crime in the Republic of China on Taiwan. A time series analysis examines the structural correlates of crime in Taiwan from 1964 to 1990. Both total crime and burglary/larceny rates are regressed on seven independent variables derived from various theoretical perspectives. The results support Hagans power-control and Christies crime-industry perspectives for total crime, while measures assessing lack of economic means and the economic deprivation were significant for burglary/larceny.
asia-pacific services computing conference | 2008
Da-Yu Kao; Shiuh-Jeng Wang; Kush Mathur; Saransh Jain; Frank Fu-Yuan Huang
Cyber world is developing with substantial advancement to enter into glorious future, but cybercrime has always been a disaster to this dream. Recent advancement in internet technologies has lead stalking to become cyber. Cyberstalking offenses have become diversified and technological advance. It creates social and mental disorders among victims. In order to improve the privacy of internet users against cyberstalking, a novel examination of action research is evaluated from a former event. With the guidance of this case study, we can discriminate normal social networking friends from the possible offenders. The initial results show that our approach is highly helpful. Curbing cyberstalking is a baffling task because of its newness and technological furtherance. It is believed that this study will clarify the obscure technological and social aspects of cyberstalking. In this paper, the proposed solutions can prohibit users from the risk of getting hurts, facilitate to cut down its roots and remove its foundation.
Computer Standards & Interfaces | 2009
Shiuh-Jeng Wang; Da-Yu Kao; Frank Fu-Yuan Huang
Digital technology for transferring and controlling data has made substantial advances in recent years. It is important to protect innovations and to curb the copyright infringements in computer-based systems. Copyright is a legal framework of basic rights, allowing the owner to control or permit someone else to reproduce copyrighted works with commercial value. In recent decades, copyright violations have been moving into the criminal realm. This paper focuses on the procedure guidance of a fictitious P2P model, and discusses whether it contributes to the crime of copyright infringement in dealing with the distribution of digital content. From the perspective of internet forensics, the action research and the whole control mechanism, it is shown that a commercial server has full control over the P2P model.
International Criminal Justice Review | 1992
Frank Fu-Yuan Huang; Michael S. Vaughn
Even though Japan has modernized at an unprecedented rate, its crime rate is relatively low in comparison to that of Western industrialized democracies. Japanese society is not crime-free, how-ever. Organized criminal syndicates known as the boryokudan commit much of the serious crime in Japan. This article traces the development of the boryokudan in postwar Japan, dividing the era into five periods. The boryokudan are characterized by violence, organizational structure, camaraderie, discipline, and illegitimate activities. Modern boryokudan trends of monopolizing, internationalizing, warring. racketeering, and solidifying are explored within the context of Japanese heritage and culture. In addition, this article examines the level and degree to which the government and the Nlational Police Agency are combating organized crime. The article concludes by focusing on the acceptance of crime syndicates in Japanese culture and the way in which the societal infrastructure facilitates their existence and demands their services.
computer science and its applications | 2009
Da-Yu Kao; Shiuh-Jeng Wang; Aneesh Sharma; Frank Fu-Yuan Huang
As everything has its pros and cons, so does the technology enhancement. The advent in internet technology has witnessed a steep rise in infected zombie computers. Those computers can be used to conduct cyber attack, which refers to the orchestrated flooding of target websites by armies of malicious programs. This paper discusses the digital forensic processing of a zombie computer from three challenges: Little Time, Actionable Intelligence and Examination Tools. The case study shows that the proposed procedure of case-oriented model is efficient in figuring out the criminal behind cyber attack. The initial results show that the action research cycle approach is helpful in the clarifying cyber-crime abuse from digital forensics viewpoints.
intelligence and security informatics | 2008
Da-Yu Kao; Shiuh-Jeng Wang; Frank Fu-Yuan Huang; Sajal Bhatia; Saurabh Gupta
The exponential growth of Internet has brought a monolithic change in the level of malicious attacks, leading to the emergence proxy servers, which indeed have proven to apotheosis hiding place for the Internet intruders. The collected logs of these proxy servers contain portentous information, and its dissection can help in analyzing the deviation of abnormal activities form the normal ones. How to figure out their network of networks, identify possible offenders, and strike the heartland of their safe haven has become an upcoming challenge for universal law enforcement agents. This paper considers exactly what kind of elements should be explored once an offensive behavior has been noticed in proxy logs. It scrutinizes (i) the Time Stamp gap of sequential records (ii) the parameters of digital action (iii) the appearance of special parameters (iv) the patterns in the log files.
International journal of comparative and applied criminal justice | 1992
Michael S. Vaughn; Frank Fu-Yuan Huang
This paper assesses Japanese juvenile delinquency from 1936 to 1988. This period encompasses some of the most important events in the history of Japan, including her only military defeat, occupation by a foreign power, and economic ascendance to superpower status. The paper also discusses the impact of modernization and affluence on the Japanese school and family, and attempts to explain selected juvenile property offenses with a theoretical framework of social control, anomie, strain, and reintegrative shaming. The paper concludes that increased individualism, egoism, and materialism in Japanese society may contribute to rising levels of juvenile embezzlement and theft.
Archive | 2014
Da-Yu Kao; Cheng-Yu Peng; Frank Fu-Yuan Huang; Shiuh-Jeng Wang
The proliferation of big data is developing with substantial advancement to enter into glorious future, but the vulnerability of personal data has always been a disaster to this dream. In order to foster confidence in information systems, a novel examination of incident response approach is evaluated from a Taiwan hacking ring case. With the guidance of this case study, we can discriminate normal information sharing from internet privacy violation. Enhancing data privacy is a baffling task because of its newness and technological furtherance. It is believed that this study will clarify the obscure technological and social aspects of data privacy enhancement. The proposed security measures can prohibit individuals or organizations from the risk of getting hurts, facilitate to cut down its roots and remove its foundation.
intelligence and security informatics | 2006
Da-Yu Kao; Shiuh-Jeng Wang; Frank Fu-Yuan Huang
In recent decades, copyright violations have been moving into the criminal realm. This paper focuses on one fictitious P2P model, and discusses whether it contributes to the crime of copyright infringement for being involved in dealing with the distribution of digital content. After the perspective of digitized forensic investigation in the action research and the whole control mechanism, the facts show that a commercial server has full control over the P2P model.
British Journal of Criminology | 1995
Michael S. Vaughn; Frank Fu-Yuan Huang; Christine Rose Ramirez