Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Frank Fu-Yuan Huang is active.

Publication


Featured researches published by Frank Fu-Yuan Huang.


Crime Law and Social Change | 1994

Correlates of crime in Taiwan

Furjen Denq; Michael S. Vaughn; Frank Fu-Yuan Huang

Taiwan is known for rapid economic growth, but in 1988, the government ended 40 years of martial law, resulting in greater political and social freedoms. This paper explores the influence of economic, social, and political structures on crime in the Republic of China on Taiwan. A time series analysis examines the structural correlates of crime in Taiwan from 1964 to 1990. Both total crime and burglary/larceny rates are regressed on seven independent variables derived from various theoretical perspectives. The results support Hagans power-control and Christies crime-industry perspectives for total crime, while measures assessing lack of economic means and the economic deprivation were significant for burglary/larceny.


asia-pacific services computing conference | 2008

Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet

Da-Yu Kao; Shiuh-Jeng Wang; Kush Mathur; Saransh Jain; Frank Fu-Yuan Huang

Cyber world is developing with substantial advancement to enter into glorious future, but cybercrime has always been a disaster to this dream. Recent advancement in internet technologies has lead stalking to become cyber. Cyberstalking offenses have become diversified and technological advance. It creates social and mental disorders among victims. In order to improve the privacy of internet users against cyberstalking, a novel examination of action research is evaluated from a former event. With the guidance of this case study, we can discriminate normal social networking friends from the possible offenders. The initial results show that our approach is highly helpful. Curbing cyberstalking is a baffling task because of its newness and technological furtherance. It is believed that this study will clarify the obscure technological and social aspects of cyberstalking. In this paper, the proposed solutions can prohibit users from the risk of getting hurts, facilitate to cut down its roots and remove its foundation.


Computer Standards & Interfaces | 2009

Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models

Shiuh-Jeng Wang; Da-Yu Kao; Frank Fu-Yuan Huang

Digital technology for transferring and controlling data has made substantial advances in recent years. It is important to protect innovations and to curb the copyright infringements in computer-based systems. Copyright is a legal framework of basic rights, allowing the owner to control or permit someone else to reproduce copyrighted works with commercial value. In recent decades, copyright violations have been moving into the criminal realm. This paper focuses on the procedure guidance of a fictitious P2P model, and discusses whether it contributes to the crime of copyright infringement in dealing with the distribution of digital content. From the perspective of internet forensics, the action research and the whole control mechanism, it is shown that a commercial server has full control over the P2P model.


International Criminal Justice Review | 1992

A Descriptive Analysis of Japanese Organized Crime: The Boryokudan from 1945 to 1988:

Frank Fu-Yuan Huang; Michael S. Vaughn

Even though Japan has modernized at an unprecedented rate, its crime rate is relatively low in comparison to that of Western industrialized democracies. Japanese society is not crime-free, how-ever. Organized criminal syndicates known as the boryokudan commit much of the serious crime in Japan. This article traces the development of the boryokudan in postwar Japan, dividing the era into five periods. The boryokudan are characterized by violence, organizational structure, camaraderie, discipline, and illegitimate activities. Modern boryokudan trends of monopolizing, internationalizing, warring. racketeering, and solidifying are explored within the context of Japanese heritage and culture. In addition, this article examines the level and degree to which the government and the Nlational Police Agency are combating organized crime. The article concludes by focusing on the acceptance of crime syndicates in Japanese culture and the way in which the societal infrastructure facilitates their existence and demands their services.


computer science and its applications | 2009

A Case-Oriented Model of Digital Forensics on Infected Zombie Computers

Da-Yu Kao; Shiuh-Jeng Wang; Aneesh Sharma; Frank Fu-Yuan Huang

As everything has its pros and cons, so does the technology enhancement. The advent in internet technology has witnessed a steep rise in infected zombie computers. Those computers can be used to conduct cyber attack, which refers to the orchestrated flooding of target websites by armies of malicious programs. This paper discusses the digital forensic processing of a zombie computer from three challenges: Little Time, Actionable Intelligence and Examination Tools. The case study shows that the proposed procedure of case-oriented model is efficient in figuring out the criminal behind cyber attack. The initial results show that the action research cycle approach is helpful in the clarifying cyber-crime abuse from digital forensics viewpoints.


intelligence and security informatics | 2008

Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks

Da-Yu Kao; Shiuh-Jeng Wang; Frank Fu-Yuan Huang; Sajal Bhatia; Saurabh Gupta

The exponential growth of Internet has brought a monolithic change in the level of malicious attacks, leading to the emergence proxy servers, which indeed have proven to apotheosis hiding place for the Internet intruders. The collected logs of these proxy servers contain portentous information, and its dissection can help in analyzing the deviation of abnormal activities form the normal ones. How to figure out their network of networks, identify possible offenders, and strike the heartland of their safe haven has become an upcoming challenge for universal law enforcement agents. This paper considers exactly what kind of elements should be explored once an offensive behavior has been noticed in proxy logs. It scrutinizes (i) the Time Stamp gap of sequential records (ii) the parameters of digital action (iii) the appearance of special parameters (iv) the patterns in the log files.


International journal of comparative and applied criminal justice | 1992

Delinquency in the Land of the Rising Sun: An Analysis of Juvenile Property Crimes in Japan During the Showa Era

Michael S. Vaughn; Frank Fu-Yuan Huang

This paper assesses Japanese juvenile delinquency from 1936 to 1988. This period encompasses some of the most important events in the history of Japan, including her only military defeat, occupation by a foreign power, and economic ascendance to superpower status. The paper also discusses the impact of modernization and affluence on the Japanese school and family, and attempts to explain selected juvenile property offenses with a theoretical framework of social control, anomie, strain, and reintegrative shaming. The paper concludes that increased individualism, egoism, and materialism in Japanese society may contribute to rising levels of juvenile embezzlement and theft.


Archive | 2014

Privacy Breach Investigations of Incident Response to Personal Information Protection Act

Da-Yu Kao; Cheng-Yu Peng; Frank Fu-Yuan Huang; Shiuh-Jeng Wang

The proliferation of big data is developing with substantial advancement to enter into glorious future, but the vulnerability of personal data has always been a disaster to this dream. In order to foster confidence in information systems, a novel examination of incident response approach is evaluated from a Taiwan hacking ring case. With the guidance of this case study, we can discriminate normal information sharing from internet privacy violation. Enhancing data privacy is a baffling task because of its newness and technological furtherance. It is believed that this study will clarify the obscure technological and social aspects of data privacy enhancement. The proposed security measures can prohibit individuals or organizations from the risk of getting hurts, facilitate to cut down its roots and remove its foundation.


intelligence and security informatics | 2006

Digitized forensic investigation at p2p copyright controversy, infringement

Da-Yu Kao; Shiuh-Jeng Wang; Frank Fu-Yuan Huang

In recent decades, copyright violations have been moving into the criminal realm. This paper focuses on one fictitious P2P model, and discusses whether it contributes to the crime of copyright infringement for being involved in dealing with the distribution of digital content. After the perspective of digitized forensic investigation in the action research and the whole control mechanism, the facts show that a commercial server has full control over the P2P model.


British Journal of Criminology | 1995

DRUG ABUSE AND ANTI–DRUG POLICY IN JAPAN Past History and Future Directions

Michael S. Vaughn; Frank Fu-Yuan Huang; Christine Rose Ramirez

Collaboration


Dive into the Frank Fu-Yuan Huang's collaboration.

Top Co-Authors

Avatar

Da-Yu Kao

Central Police University

View shared research outputs
Top Co-Authors

Avatar

Shiuh-Jeng Wang

Central Police University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Cheng-Yu Peng

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Aneesh Sharma

LNM Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Kush Mathur

LNM Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Sajal Bhatia

LNM Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Saransh Jain

LNM Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Saurabh Gupta

LNM Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Furjen Denq

Sam Houston State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge