:::

詳目顯示

回上一頁
題名:明恥整合理論在臺灣少年駭客的實證應用與其意涵
作者:高大宇
作者(外文):Da-Yu Kao
校院名稱:中央警察大學
系所名稱:犯罪防治研究所
指導教授:黃富源
廖有祿
學位類別:博士
出版日期:2009
主題關鍵詞:網路犯罪少年偏差行為網路犯罪學明恥整合理論網路鑑識學數位證據Cyber-crimeJuvenile DelinquencyCyber CriminologyReintegrative Shaming TheoryCyber ForensicsDigital Evidence
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:429
網路活動已成大眾日常生活的一部分,隨著網際網路通訊服務的日益普遍,網路犯罪的入侵威脅變地更加複雜。本文重點在網路犯罪的少年駭客議題,為能獲取複雜入侵事件的事實真相,本研究嘗試從明恥整合理論,觀察台灣地區的少年駭客。
為能確認網路犯罪的最終調查結果,本論文提出三種解決工具。第一、提倡理想稽核記錄,提醒相關人員追蹤用途的基本要件,避免紀錄內容不詳盡,未能適時反應原始事件真相,該要件也是後續M-N 模式的必備要求。 第二、提倡M-N模式,利用相關網路主機之前後紀錄的連貫性比對機制,作為收集、分析犯罪相關電腦稽核紀錄的驗證方法。第三、提倡MDFA策略,嘗試使用新的調查步驟程序,結合多樣證據的基礎資料,瞭解網路犯罪事件的來龍去脈。本研究提倡的這三種分析工具,在解決複雜入侵事件時,被證明是有用且有效的。若能順利解析入侵事件之迷團,事件分析者將更容易與攻擊者、被害者或相關人員溝通。本研究希望能解釋台灣少年駭客的再犯原因,提供未來處理該議題的參考指引。本文說明羞恥心與駭客道德感間的情緒關係,認為在處理少年駭客入侵事件議題時,沒有適當考慮駭客個人的道德感是不夠的。研究者也考慮入侵行為如何影響駭客道德,以及入侵行為如何影響執法人員的處理方式。
本研究認為:假如少年駭客能放棄他們對駭客道德的誤解,「明辨是非」的「明恥」方法,對偏差行為的修復與整合是有效。本研究亦嘗試提供一個思考少年司法體系轉向處遇之理論鞏固基礎,透過教育、執法與工程的三E策略觀察網路犯罪,並進一步透過犯罪學、偵查與鑑識等領域進行深入分析。這些領域於處理不同議題時,涵蓋不同重點的主題,例如:6W1H問題的政策、多面向數位鑑識分析的策略、理想稽核記錄與M-N模式的程序。
研究發現,少年駭客可能不再犯,但使他們「明辨是非」的過程,十分辛苦。明恥整合理論對導正習慣與羞恥感是有效的,相關入侵行為有可能被鼓勵或阻止。此外,本研究也提供研究結論、具體建議與未來挑戰,期對抗網路犯罪。
Cyber activity has become an essential part of the general public’s everyday life. The hacking threats of Cyber-crime are becoming more sophisticated as internet communication services are more popular. The main focus of this study is to focus on Taiwanese juvenile hacker of Cyber-crime. To obtain the facts behind hacking puzzles, this study has tried to observe Taiwanese juvenile hackers from the viewpoint of the Reintegrative Shaming Theory (RST).
To further confirm the final finding of Cyber-crime, this study proposes three analytic tools to clarify the Cyber-crime issues: (1) Ideal Log is identified as a traceable element of digital evidence and a basic requirement of M-N model; (2) M-N model applies a formal method for collating and analyzing data sets of investigation-relevant logs; (3) MDFA strategy attempts to outline the basic elements of Cyber-crime using new procedural investigative steps, and combining universal types of evidential information. It is believed that these proposed analytic tools in this research framework are workable and useful in solving the confusing hacking activities. After researchers figure out what has happened in Cyber-crime events, it will be easier to communicate with offenders, victims or related people. It is hoped to account for recidivism and provide a guide for dealing with this juvenile hacker issue. This research mainly demonstrates that the states of shame are associated with compounded affective processes of hacker ethics. A reintegrative shaming approach, without appropriate consideration for the personal code of hacker ethics, is insufficient when handling juvenile hacking offenses. The researcher also considers how hacks affect hacker ethics as well as the way hacking affects law enforcement agents’ attempts to deal with hackers.
The principle argument of this study is that such a Reintegrative Shaming Theory approach of knowing right from wrong may be particularly suitable for rehabilitation and reintegration if one abandons the misconception of hacker ethics. This study provides an opportunity to rethink the theoretical underpinnings of diversion in the juvenile justice system. A Triple-E approach is also discussed to observe Cyber-crime from the viewpoints of Education, Enforcement and Engineering. That approach is further analyzed from the fields of criminology, investigation and forensics. Each field has its different focus in dealing with diverse topics, such as: the policy of 6W1H questions, the procedure of MDFA strategy, the process of ideal Logs and M-N model.
It is found that a juvenile hacker is possible to prohibit him from re-offending. But it takes a great pain in teaching him right from wrong. Reintegrative Shaming Theory is still workable in directing his habit and the feeling of shaming. There is much potential and possibility in stopping hacking activities. In addition, the research results, proposed suggestion, and future challenges of this study are presented to counter Cyber-crime.
Bibliography
Acar, E., Camtepe, S.A., & Yener, B. (2006, May). Collective Sampling and Analysis of High Order Tensors for Chatroom Communications. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006: 213-214. CA: Springer Press.
Acohido, B. & Swartz, J. (2006). Cybercrime Flourishes in Online Hacker Forums. Retrieved September 20, 2008, from http://www.usatoday.com/tech/news/computersecurity/infotheft/ 2006-10-11- cybercrime-hacker-forums_x.htm
Adamski, A. (1998). Crimes Related to the Computer Network. Threats and Opportunities: A Criminological Perspective. Helsinki, Finland: European Institute for Crime Prevention and Control, affiliated with the United Nations (HEUNI). Retrieved on December 15 2006, from http://www.ulapland.fi/ home/oiffi/enlist/resources/HeuniWeb.htm
Agnew, R. (2001). Juvenile Delinquency: Causes and Control. CA: Roxbury Publishing.
Akers, R. L. (1999). Criminological Theories. IL: Fitzroy Dearborn Publishing.
Ashcroft, J., Daniels, D. J., & Hart, S. V. (2004, April). Forensic Examination of Digital Evidence: A Guide for Law Enforcement. National Institute of Justice, USA.
Awad, E. M. & Ghaziri, H. M. (2003, February). Knowledge Management. Prentice Hall Publisher.
Babbie, E. (1989). The Practice of Social Research (5th Ed.). CA: Wadsworth.
Barak, G. (1998). Integrating Criminologies. Boston: Allyn and Bacon.
Beebe, N. & Clark, J. (2005). Dealing with terabyte data sets in digital investigations. In Pollitt, M. & Shenoi, S. (Ed.), Advances in Digital Forensics. 3-16. NY: Springer.
Ben-Ze’ev, A. (2000). The subtlety of emotions. Cambridge, MA: MIT Press.
Best, C., Pouliquen, B., Steinberger, R., Goot, E. V., Blackler, K., Fuart, F., Oellinger, T., & Ignat, C. (2006, May). Towards Automatic Event Tracking. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006: 26-34. CA: Springer Press.
Best, J. & Luckenbill, D. F. (1994). Organizing Deviance, 2nd edition. New Jersey: Prentice Hall.
Binder, A., Geis, G., & Bruce, D. D. (2001). Juvenile Delinquency: Hist, Culture and Legal Perspectives. (3rd ed.). OH: Anderson Publishing.
Birchwood, M., Trower, P., Brunet, K., Gilbert, P., Iqbal, Z., & Jackson, C. (2007). Social Anxiety and the Shame of Psychosis: A Study in First Episode Psychosis. Behaviour Research and Therapy, 45(5): 1025-1037. Amsterdam: Elsevier Science Publisher.
Bocij & Paul. (2004). Cyberstalking: Harassment in the Internet Age and How to Protect Your Family. MN: Praeger Press.
Bogdan, R. C. & Biklen, S. K. (1992). Qualitative Research in Education: An Introduction to Theory and Methods (2nd ed.). Boston, MA: Allyn and Bacon.
Botchkovar, E. V., & Tittle, C. R. (2005). Crime, Shame and Reintegration in Russia. Theoretical Criminology, 9(4): 401 - 442. CA: Sage Publications.
Bott, E. & Sciechert, C. (2003). Windows Security for Windows XP and Windows 2000. Microsoft Press.
Boyd, C. & Forster, P. (2004, January). Time and Date Issues in Forensic Computing: A Case Study. Digital Investigation Journal, 1(1): 18-33. Singapore: Elsevier Ltd.
Braithwaite, J. (1989). Crime, Shame, and Reintegration. Cambridge: Cambridge University Press.
Braithwaite, J. (2007). Standards for Restorative Justice. Retrieved November 10, 2007, from http://www.restorativejustice.org/resources/docs/braithwaite
Brian, C. & Eugene, H. S.. (2003). Getting Physical with the Investigative Process. International Journal of Digital Evidence, 2(2): 1-20.
Brenner, S. W., Carrier, B., & Henninger, J. (2005). CERIAS Tech Report: The Trojan Horse Defense In Cybercrime Cases. Purdue University, West Lafayette.
Brenner, S. (2006). Trojan Horse Defense. Retrieved September 22, 2008, from http://cyb3rcrim3.blogspot.com/2006/06/trojan-horse-defense.html
Brown, C. L.T. (2006). Computer Evidence: Collection & Preservation. MA: Charles River Media, INC.
Brown, M. F. (2001). Criminal Investigation: Law and Practice (2nd ed.). MA: Butterworth-Heinemann.
Brown, R. H. (1989). Textuality, Social Science, and Society. Issues in Integrative Studies, 7: 1-19.
Bruce, S. (1999). The Trojan Horse Race. Communications of the ACM, 42(9).
Buennemeyer, T., Brooker, J., Sabri, A. & North, C. (2006). Intelligence Analysis Using High Resolution Displays. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006: 652-653. CA: Springer Press.
Buure, J. V. (2001, August). Internet Brigade gets fit for fighting Cyber Crime, Heise Online, Retrieved September 20, 2008, from http://www.heise.de/tp/r4/ artikel/9/9399/1.html
Caloyannides, M. A. (2003). Digital Eevidence and Reasonable Doubt. IEEE Security and Privacy, 1(6): 89-91.
Caloyannides, M. A. (2003, December). Digital Evidence and Reasonable Doubt. IEEE Security and Privacy: 89-91.
Cameron, A. (2009). Law, Justice and Ethics. Retrieved on January 3 2009, from http://www.freewebs.com/alancameron/Signposts 98.pdf
Capeller, W. (2001). Not Such a Neat Net: Some Comments on Virtual Criminality. Social & Legal Studies, 10(229): 229-242.
Carlson, E.R. & Havelock-Coleman, C.E. (1997). Experimental and Motivational Determinants of the Richness of an Induced Sexual Fantasy. Journal of Personality. 45: 528-541.
Carney, M. & Rogers, M. (2004, Spring). The Trojan Made Me Do It: A First Step in Statistical Based Digital forensics Event Reconstruction. International Journal of Digital Evidence, 2(4). Purdue University.
Carrier, B. D. (2008). Basic Digital Forensic Investigation Concepts. Retrieved March 10, 2008, from http://www.digital-evidence.org/di_basics.html
Carrier, B. & Spafford, E. H. (2003) Getting Physical with the Investigative Process. International Journal of Digital Evidence, 2(2).
Casey, E. (2005, December). Case Study: Network Intrusion Investigation – Lessons in Forensic Preparation. Digital Investigation Journal, 2(4): 254-260. Singapore: Elsevier Ltd.
Cheung, C. K. & Liu, S. C. (2005). Factors Underlying Junior High School Students' Seeking Help from Social Services. Childhood, 12(1): 55 - 69. CA: Sage Publications.
Chisum, W.J. & Turvey, B. (2002, January). Evidence Dynamics: Locard's Exchange Principle & Crime Reconstruction. Journal of Behavioral Profiling, 1(1).
Clandos, R. (2003, August). Eye on Cyber-crime. IEEE Security and Privacy: 10-11.
Clement, M. (1997). The Juvenile Justice System: Law and Process. MA: Butterworth-Heinemann.
Cloward, R. A. & Ohlin, L. E. (1960). Delinquency and Opportunity: A Theory of Delinquent Gangs. In Jacoby J. E. (Ed.), Classics of Criminology: 283-287. IL: Waveland Press.
Cohen, A. K. (1955). Delinquent Boys: The Culture of the Gang. Glencoe, IL: Free Press.
Cohen, L., & Manion, L. (1986). Research Methods in Education. London: Croom Helm.
Cole, E. & Newfield,M. (2002). Security Essentials Toolkit. IN: Sans.
Coleman, J. (2000, March). Internet Police Patrol Cyberspace for Child-Sex Stalkers. Associated Press Online. Retrieved September 20, 2008, from http://www.lubbockonline.com/stories/ 031500/
Crawford, R.J. (2001). The Expert Witness – A Manual for Expert. La: 1st Book Library.
David, M., Croall, H., & Tyrer, J. (1999). Criminal Justice: An Introduction to the Criminal Justice System in England and Wales (2nd ed.). London: Longman.
Dennison, S. M., & Stewart, A. (2006). Facing Rejection: New Relationships, Broken Relationships, Shame, and Stalking. International Journal of Offender Therapy and Comparative Criminology, 50(3): 324-337. Australia: Sage Publications.
Denzin, N. (1978) Sociological Methods: A Sourcebook. NY: McGraw Hill, 2nd ed.
Desmond, M. (2005). Attack of the PC Zombies. Retrieved March 9, 2008, from http://pcworld.about.com/news/Oct192004id118208.htm
DFRWS. (2008). DFRWS 2008 Forensics Challenge Overview. Retrieved March 10, 2008, from http://www.dfrws.org/2008/challenge/submission.shtml
Dictionary.com, LLC. (2008). Online. Retrieved September 29, 2008, from http://dictionary.reference.com/
Digital Forensics Research Workshop. (2001). A Road Map for Digital Forensics Research. Retrieved March 9, 2008, from http://www.ijde.org/archives/ 02_fall_art2.html
Ellison, L. & Akdeniz, Y. (1998). Cyber-Stalking: the Regulation of Harassment on the Internet. Criminal Law Review, December Special Edition: Crime, Criminal Justice and the Internet: 29-48.
Farlex, Inc. (2005). Online Dictionary, Encyclopedia and Thesaurus. Retrieved September 22, 2005, from http://encyclopedia.thefreedictionary.com/
Farrant, F. (2006). Knowledge Production and the Punishment Ethic: The Demise of the Probation Service. Probation Journal, 53(4): 317-333 CA: Sage Publications.
Fei, B., Eloff, J., Olivier, M., & Venter, H. (2006, February). Analysis of Web Proxy Logs. IFIP International Conference on Digital Forensics: 247-258. FL: Springer Press.
Felson, M. (2006). Crime and Nature. Sage Publications, 125-137.
Ferdico, J. N. (1999). Criminal Procedure for the Criminal Justice Professional (7th ed.). CA: Wadsworth Publishing Company.
Fujiwara, B. (2006, November). Cyber Security: Threats and Countermeasures. Global Business Dialog on Electronic Commerce (GBDe) 2006 Issue Group. Retrieved December 26, 2008, from http://www.gbd-e.org/pubs/Taipei_ Recommendationl_Nov2006.pdf
Fuller, C., Biros, D.P., Adkins, M., Burgoon, J.K., Nunamaker, J.F., & Coulon, S. (2006, May). Detecting Deception in Person-of-Interest Statements. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006: 504-509. CA: Springer Press.
Furnell, S. (2002). Cybercrime: Vandalizing the Information Society. Boston, MA: Addison-Wesley.
Fu, T. & Chen, H., (2008). Analysis of Cyberactivism: A Case Study of Online Free Tibet Activities. ISI 2008 Proceedings of the 2008 IEEE International Conference on Intelligence and Security Informatics: 1-6. Taiwan: Taipei.
Garfinkel, S. (2007, March). Anti-Forensics: Techniques, Detection and Countermeasures, The 2nd International Conference on i-Warfare and Security (ICIW). CA : Naval Postgraduate School, Monterey.
Gary, L. P. (2001). A Road Map for Digital Forensic Research. Technical Report. Report for the First Digital Forensic Research Workshop (DFRWS). Retrieved April 24, 2005, from http://www.ijde.org/archives/02_fall_art2.html
Ghavalas, B. & Philips, A. (2005, June). Trojan Defense: A Forensic View Part II. Digital Investigation Journal, 2(2): 133-136. Singapore: Elsevier Ltd.
Giordano, J. & Maciag, C. (2002). Cyber Forensics: A Military Operations Perspective. International Journal of Digital Evidence, 1(2): 1-13.
Goodsell, D. (2007). Seeding Art in Science - and Vice Versa. Retrieved March 29, 2008, from http://bioephemera.com/2007/11/28/seeding-art-in-science-and- vice- versa/
Goth, G. (2003). Questions About Strategy To Secure Cyberspace. IEEE Security and Privacy, 1(3): 8-11.
Grabosky, P. (2007). Masters Series in Criminology: Electronic Crime. NJ: Pearson.
Grimes, R. A. (2001). Malicious Mobile Code. CA: O’Reilly.
Grodzinsky, F.S. & Tavani, H.T. (2001). Cyberstalking, Personal Privacy, and Moral Responsibility. CEPE 2001 Conference: 14-16. UK: Lancaster University.
Haagman, D. & Ghavalas, B. (2005, February). Trojan Defense: A Forensic View. Digital Investigation Journal, 2(1): 23-30. Singapore: Elsevier Ltd..
Hagan, F. E. (2003). Research Methods in Criminal Justice and Criminology. MA: Pearson.
Haigh Y. (2007). Persistence and Desistance: Seductions of Repetition and Responsibility. 20th Annual Australian and New Zealand Society of Criminology Conference. Adelaide: ANZSOC Publications.
Hamelink, C.J. (2000). The Ethics of Cyberspace. London: Sage.
Harris, R. (2006). Arriving at an Anti-Forensics Consensus: Examining How to Define and Control the Anti-Forensics Problem. Proceedings of the 2006 Digital Forensics Research Workshop. Digital Investigation, 3, 44-49. Retrieved September 28, 2008, from http://dfrws.org/2006/ proceedings/6-Harris.pdf
Henderson, S.D. & Hodges, S.H. (2007). Music, Song, and the Creation of Community and Community Spirit by a Gay Subculture. Sociological Spectrum, 27(1): 57-80. London: Taylor & Francis Publisher.
Hendrix, G. M. (2004). A Test of Reintegrative Shaming Theory's Concepts of Interdependence and Expressed Shame in Restorative Justice Conferencing. Michigan: Michigan State University.
Henrique, G. W. (2006, September). Anti Forensics: Making Computer Forensics Hard. Code Breakers III. Brazil: São Paulo.
Hirschi, T. (1969). Causes of Delinquency: a Control Theory of Delinquency. In Jacoby J. E. (Ed.), Classics of Criminology: 294-301. IL: Waveland Press.
Holt, T.J. (2005). Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers. MO: University Of Missouri - Saint Louis.
International Organization on Computer Evidence. (2002). Guidelines for best practice in the forensic examination of digital technology. Retrieved September 22, 2005, from http://www.ioce.org/2002/ioce_bp_exam_ digit_tech.html
Internet Crime Complaint Center. (2007). 2006 Internet Crime Report. Retrieved September 20, 2008, from http://www.ic3.gov/media/annualreport/ 2006_IC3Report.pdf
Internet Crime Complaint Center. (2008). 2007 Internet Crime Report. Retrieved September 20, 2008, from http://www.ic3.gov/media/annualreport/2007_ IC3Report.pdf
Ishii, M. (2006). Criminal Regulation of Anti-forensic Tools in Japan. IFIP International Conference on Digital Forensics: 357-364. FL: Springer Press.
Jacoby, J. E. (2004). Classics of Criminology. IL: Waveland Press.
Jaishankar, K. (2007). Cyber Criminology: Evolving a Novel Discipline with a New Journal. International Journal of Cyber Criminology, 1(1). Retrieved on March 6 2008, from http://www40.brinkster.com/ccjournal/editorial.htm
Jame, S. H. & Nordby, J. J. (2003). Forensic Science – An Introduction to Scientific and Investigative Technique. Boca Raton: CRC Press.
James, S. H. & Nordby, J. J. (2005). Forensic Science: an Introduction to Scientific and Investigative Techniques (2nd Ed.), FL: CRC Press.
Jenson, B. (1996). Cyberstalking: Crime, Enforcement and Personal Responsibility of the On-Line World. Retrieved September10, 2008, from http://www.sgrm.com/art-8.htm
Johannesen, R. L. (2002). A Role for Shame in Communication Ethics. Seventh National Communication Ethics Conference. IL: Western Michigan University Press. Retrieved from http://www.wmich.edu/communication/ethics/keynote.pdf
Jone, K.J., Bejtlich, R. & Rose, C.W. (2006). Real Digital Forensics: Computer Security and Incident Response. New York: Person Education.
Jones, R. (2006). Internet Forensics. O’Reilly Inc.
Jupp, V., Davies P., & Francis P. (2000). Doing Criminal Research. CA: Sage.
Kahai, P., Srinivasan, M., Namuduri, K, & Pendse, R. (2005). Forensic Profiling System. IFIP International Conference on Digital Forensics: 153-164. FL: Springer Press.
Kao, D. Y., Huang, F .F. Y., & Wang, S. J. (2007, September). Maturity and Shame: Bringing Computer Ethics to Taiwan’s Juvenile Delinquents. Australian and New Zealand Society criminology, the 20th Annual ANZSOC Conference. Australia: Adelaide.
Kao, D. Y., Huang, F. F. Y., & Liao, Y. L. (2008, November). The Retest of Reintegrative Shaming Theory and Its Implications on Taiwanese Juvenile Hackers. Reinvigorating Theory through Diversity and Inclusiveness (2008 ASC Annual Meeting): 410. OH: The American Society of Criminology. MO: St. Louis.
Kao, D. Y. & Lee, H. C. (2005, November). The Forensic Examination of P2P Copyright Infringement. 2005 International Forensic Science Symposium (2005-IFSS). Taiwan: Taipei.
Kao, D. Y. & Wang, S. J. (2005, August). Evidences and Forensics at IP Address Clue in Cyber-crime. 17th Meeting of the International Association of Forensic Sciences, Hong-Kong.
Kao, D. Y., Wang, S. J., & Huang, F .F. Y. (2006, December). An Information Based Management on the Analysis of Internet Perpetrators. The 3th Asia-Pacific International Conference on Knowledge management (KMAP2006), Hong Kong.
Kao, D. Y., Wang, S. J., & Huang, F .F. Y. (2006, May). Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2006): 644-646. CA: Springer Press.
Kao, D. Y., Wang, S. J., Huang, F .F. Y., & Bhatia, S. (2008, June). Dataset Analyses of Proxy Logs to Detect and Prevent Future Network Attacks. IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2008): 245-250. NY: Springer Press. Taiwan: Taipei.
Kao, D. Y., Wang, S. J., Mathur, K., Jain, S., & Huang, F .F. Y. (2008, December). Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet. IEEE The First International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS-08). Taiwan: Yilan.
Kao, D. Y., Wang, S. J., Huang, F .F. Y., & Chang, Y. H. (2006, December). Inferring Social Network from Forensic Asessment Model of P2P Copyright Infrigement. The 3th Asia-Pacific International Conference on Knowledge management (KMAP2006), Hong Kong.
Kemmis, S. & McTaggart, R. (1988). The Action Research Structurener (3rd Ed.). Deakin University Press.
Keppel, R. D. (2000). Serial Offending by Children and Adolescents. In Schlesinger, L. B. (Ed.), Serial Offenders: Current Though, Recent Findings: 289-308. FL: CRC Press.
Kessler, G.C. (2007, December). Anti-forensics and the Digital Investigator. In C. Valli & A. Woodward (Ed.), Proceedings of the 5th Australian Digital Forensics Conference. Western Australia: Edith Cowan University.
Kizza, J. M. (2003). Ethical and Social Issues in the Information Age (2nd ed.). UK: Springer.
Kleen, L. J. (2001). Malicious Hackers: A Framework for Analysis and Case Study. Retrieved March 10, 2008, from http://www.iwar.org.uk/iwar/resources/usaf/ maxwell/students/ 2001/afit-gor-ens-01m-09.pdf
Klotter, J. C. (2000). Criminal Evidence (7th Ed.). Anderson Publishing Co.
Kocsis, R. N. (2007). Criminal Profiling: International Theory, Research, and Practical. OH: Humana Press.
Kruse, W. G. & Heiser J. G. (2002). Computer Forensics: Incident Response Essentials, Addison-Wesley Inc.
Ku, C. & Jacobson, H. K. (2003). Democratic Accountability and the Use of Force in International Law. Cambridge: Cambridge University Press.
Laub, J. H., & Sampson, R. J. (2003). Shared Beginnings, Divergent Lives: Delinquent Boys to Age 70. MA: Harvard.
Laurie, B. (2004). Network Forensics. ACM Queue, 2(4), 52-56.
Layfield, R., Kantarcioglu, M. & Thuraisingham, B. (2008, June). Simulating Bioterrorism through Epidemiology Approximation. ISI 2008 Proceedings of the 2008 IEEE International Conference on Intelligence and Security Informatics: 82-87. Taiwan: Taipei.
Le, D.P., Bonnecaze, A. & Gabillon, A. (2008). Signtiming Scheme Based on Aggregate Signatures. ISI 2008 Proceedings of the 2008 IEEE International Conference on Intelligence and Security Informatics: 145-149. Taiwan: Taipei.
Lee, H. C. & Kao, D. Y. (2005, March). A Forensic Analysis of Reverse Peep Attack. 2005 Internet Cyber Security Engineering Conference, Taipei.
Lemart, E. M. (1967). Human Deviance, Social Problems, and Social Control. Englewood Cliffs, New Jersey: Prentice Hall.
Levy, E. & Arce, I. (2004). Criminals Become Tech Savvy. IEEE Security and Privacy, 2(2): 65-68.
Leyden, I. (2005). Webcam Trojan Suspect Arrested in Spain. Retrieved September10, 2008, from http://www.theregister.co.uk/2005/01/20/webcam_trojan_arrest/
Li, L., Lin, C., Wu, Z., Wu, S., Rotheram-Borus, M.J., Detels, R., & Jia, M. (2007). Stigmatization and Shame: Consequences of Caring for HIV/AIDS Patients in China. AIDS CARE, 19(2): 258-263. London: Taylor & Francis Publisher.
Littlewood, A. (2003) Cyberporn and Moral Panic: an Evaluation of Press Reactions to Pornography on the Internet. Library and Information Research, 27(86): 8–18.
Liu, V. & Brown, F. (2006, April). Bleeding-Edge Anti-Forensics. Infosec World Conference & Expo, MIS Training Institute. Retrieved September 9, 2007, from http://stachliu.com/files/InfoSecWorld_2006-K2-Bleeding_Edge_ AntiForensics.ppt
Loewy, A. H. (2003). Criminal Law (4th ed.). MN: West Group.
Loper, D. K. (2001). The Criminology of Computer Hackers: A Qualitative and Quantitative Analysis. MI: Michigan State University.
Lu, C., Jen, W., Chang, W., & Chou, S. (2006, September) Cybercrime & Cybercriminals: An Overview of the Taiwan Experience. Journal of Computers, 1(6). 11-18. Retrieved September 22, 2008, from http://academypublisher.com/jcp/vol01/no06/jcp01061118.pdf
Lu, F. (2003, June). Law Gets Tough on Cybercrimes. Retrieved December 26, 2008, from http://www.taipeitimes.com/News/taiwan/archives/2003/06/04/ 2003053865
Mandia, K., Prosise, C., & Pepe, M. (2003). Incident Response & Computer Forensics – 2nd Ed., CA: McGraw-Hill Companies Inc.
Mann, David and Sutton, Mike, (1998). NetCrime. More Change in the Organisation of Thieving, British Journal of Criminology, 38(2).
Marcella, A. J. & Greenfield, R.S. (2002). Computer Forensics: a Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes. FL: CRC Press.
Mark, R., Clint, C., & Gregg, G. (2002). An Examination of Digital Forensic Models International. Journal of Digital Evidence, 1(3).
Marshall, B. & Chen, H. (2006, May). Using Importance Flooding to Identify Interesting Networks of Criminal Activity. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006: 14-25. CA: Springer Press.
Matza, D. & Sykes, G. (1961). Juvenile Delinquency and Subterranean Values. American Sociological Review. 26(5). 712-719.
Maxfield, M. G. & Babbie, E. (2001). Research Methods for Criminal Justice and Criminology. CA: Wadsworth/Thomson.
Mendell, R.L, (1998). Investigative Computer Crime: A Primer for Security Managers. Il: Charles.
Messner, S. F., Krohn, M.D., & Liska, A. E. (1989). Theoretical Integration in the Study of Deviance and Crime Problems and Prospects. Albany: State University of New York.
Meyer, G. R. (1989). The Social Organization of the Computer Underground. Retrieved March10, 2008, from http://csrc.nist.gov/secpubs/hacker.txt
McAlinden, A. M. (2006). Managing Risk: from Regulation to the Reintegration of Sexual Offenders. Criminology and Criminal Justice, 6 (2):197-218.
McCarty, B. (2004). Honeypot Forensics Part I: Analyzing the Network. IEEE Security and Privacy, 2(4): 72-78.
McKenzie, S. (2000). Child Safety on the Internet: An Analysis of Victorian Schools and Households Using the Routine Activity Approach. Retrieved on December 15 2006, from http://www.criminology.unimelb.edu.au/research/internet/ childsafety/index.html
McGuire, S. (2008). Young Hackers Are Just Curious. Retrieved March 19, 2008, from http://www.infoniac.com/hi-tech/young-hackers-are-just-curious.html
Meinel, C.P. (2004). Cyber-crime Treaty Could Chill Research. IEEE Security and Privacy, 2(4): 28-32.
Memon, N & Larsen, H. L. (2006, May). Practical Algorithms for Destabilizing Terrorist Networks. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006: 389-400. CA: Springer Press.
Mendell, R.L, (1998). Investigative Computer Crime: A Primer for Security Managers. IL: Charles.
Merton, R. K. (1938). Social Structure and Anomie. American Sociological Review 3: 672-682.
Messerschmidt, J. W. (1997). Crime as Structured Action: Gender, Race, Class and Crime in the Making. CA:Sage.
Meyers, M. & Rogers, M. (2005, February). Digital Forensics: Meeting the Challenges of Scientific Evidence. IFIP International Conference on Digital Forensics: 43-50. FL: Orlando.
Michael, A. C. (2001). Computer Forensics and Privacy. MA: Artech.
Michael, J. L. (2002). Forensic Analysis in a Digital World. Retrieved April 24, 2005, from http://www.advtechnologies.com/Forensic.pdf
Michael, N., Mark, M. P., & Lawrence, P. (2000). Recovering and Examining Computer Forensic Evidence. Forensic Science Communications, 2(4).
Microsoft Corporation. (2004). International Botnet Task Forse Initial Meeting and Training Conference Proceeding. Seattle: Microsoft Corporation.
Microsoft Corporation. (2005, April). International Botnet Task Forse Training Conference Proceeding. Prague: Microsoft Corporation.
Middleton, B. (2002). Cyber Crime Investigator’s Field Guide. Auerbach Publications.
Motion Picture Association of America. (2005). Anti-piracy. Retrieved September 22, 2005, from http://www.mpaa.org/anti Dpiracy/
Muncie, J. & McLaughlin, E. (2001). The Problem of Crime (2nd ed.). London: Sage Publishing.
National Institute of Justice. (2001). Electronic Crime Scene Investigation: A Guide for First Responders. Retrieved April 24, 2005, from http://www.ncjrs.org/pdffiles1/nij/187736.pdf
National Highway Safety Administration. (2004). Washington: Cape Horn Corridor Traffic Safety Project. Traffic Safety Digest, 2. Retrieved November 10, 2008, from http://www.nhtsa.dot.gov/people/outreach/safedige/Volume-2-2004/ Vol2_04_ W04_WA.htm
Nelson, B. & Philips, A. (2004). Computer Forensics and Investigations. Thomson Course Technology.
Nelson, B., Phillips, A., Enfinger, F., & Steuart, C. (2004). Computer Forensics and Investigations. NY: Thomson Press.
Ness, D. W. V. & Strong, K. H. (2002). Restoring Justice (2nd). OH: Anderson Publishing Co.
Orebaugh, A. (2004). Etheral Packet Sniffing. MA: Syngress Publishing Inc.
Osterburg, J. W. & Ward, R. H. (2000). Criminal Investigation (3rd ed.). OH: Anderson Publishing.
Palermo, G. B. & Kocsis, R. N. (2005). Offender Profiling: an Introduction to the Sociopsychological Analysis of Violence Crime. Charles C Thomas Publisher Ltd.
Parker, T., Shaw, E., Stroz, E., Devost, M. G., & Sachs, M. H. (2004). Cyber Adversary Characterization: Auditing the Hacker Mind. MA: Syngress.
Persaud, A. & Guan, Y. (2005). A Framework for Email Investigations – Automated Information Extraction and Linkage Discovery. IFIP International Conference on Digital Forensics: 79-90. FL: Springer Press.
Pollitt, M. & Whitledge, A. (2006, February). Exploring Big Haystacks – Data Mining and Knowledge Management. IFIP International Conference on Digital Forensics: 247-258. FL: Springer Press.
Quinney, R. (1977). Class, State, and Crime. New York: David McKay.
Rantala, R. R. (2004, March). Cybercrime against Businesses: Pilot Test Results, 2001 Computer Security Survey. Retrieved September 20, 2008, from http://www.ojp.usdoj.gov/bjs/abstract/ cb.htm
Rantala, R. R. (2008, September). Cybercrime against Businesses, 2005. Retrieved September 20, 2008, from http://www.ojp.usdoj.gov/bjs/abstract/cb05.htm
Raymond, E. S. (2008). How to Become a Hacker. Retrieved March 9, 2008, from http://www.catb.org/~esr/faqs/hacker-howto.html
Raymond, E. S. (2008). The New Hacker's Dictionary - The Jargon File. Retrieved March 9, 2008, from http://www.catb.org/jargon/html/H/hacker-ethic.html
Reason & Bradbury. (2001). Handbook of Action Research. London: Sage.
Redding, S. (2005). Using Peer-To-Peer Technology for Network Forensics. IFIP International Conference on Digital Forensics: 141-152. FL: Springer Press.
Reid, S. T. (2003). Crime and Criminology (10th ed.). NY: McGraw-Hill Co.
Reith, M., Carr, C., & Gunsch, G.. (2002), An Examination of Digital Forensic Models. International Journal of Digital Evidence, 1(3).
Rogers, M. (2006, March). Panel Session at CERIAS 2006 Information Security Symposium. Retrieved September 28, 2008, from http://www.cerias.purdue.edu/symposium/2006/ materials/dfs/antiforensics.pdf
Rokach, A. (1990). Content Analysis of Sexual Fantasies of Males and Females. Journal of Pediatric Psychology, 124: 427-436.
Rosenheim, M. R., Zimring, F. E., Tanenhaus D. S., & Dohrn B. (2002). A Century of Juvenile Justice. Chicago: The University of Chicago.
Sahakian, W. S. & Sahakian, M. L. (1993). Ideas of the Great Philosophers. Barnes and Noble Books.
Samenow, S. E. (2004). Inside the Criminal Mind. (2nd ed.). NY: Crown Publisher.
Sammes, T. & Jenkinson, B. (2000). Forensic Computing – A Practitioner’s Guide. UK: Springer.
Schell, B. H., Dodge, J. L., & Moutsatsos, S. S. (2002). The Hacking of America: Who’s Doing it, Why, and How. Westport, CT: Quorum Books.
Seier, S., Greer, G., & Manes, G. (2006). Linking Individuals to Digital Information. IFIP International Conference on Digital Forensics:131-140. FL: Orlando.
Shaw, C. R. & Mckay, H. D. (1969). Juvenile Delinquency and Urban Areas. Chicago: University of Chicago Press.
Sheridan, L.P. & Grant, T. (2007). Is Cyberstalking Different. Psychology, Crime & Law, 13(6): 627-640. UK: University of Leicester.
Shifreen, R. (2006). Defeating the Hacker: A Non-technical Guide to Computer Security. UK: John Wiley & Sons Ltd.
Siegel, L. J., Welsh, B. C., & Senna, J. J. (2003). Juvenile Delinquency: Theory, Practice, and Law (8th ed.) CA: Thomson Learning Inc.
Singer, P. (1993). Practical Ethics (2nd Ed.). Cambrdige: Cambridge University Press.
Smith N. (2007). Predicting Reoffending in Juvenile and Adult Offenders Given Noncustodial Sanctions. 20th Annual Australian and New Zealand Society of Criminology Conference. Adelaide: ANZSOC.
Smith, R. G. (2002). Crime in the Professions. England: Ashgate.
Solm, S. V., Louwrens, C., Reekie, C., & Grobler, T. (2006). A Control Framework for Digital Forensics. IFIP International Conference on Digital Forensics: 343-355. FL: Orlando.
Spafford, E. (2006). Some Challenges in Digital Forensics. IFIP International Conference on Digital Forensics: 3-9. FL: Orlando.
Spitzner, L. (2003). Honeypots – Tracking hackers. MA: Pearson.
Starnes, R. (2003, December). The Trojan Defense. Network Security:8. Singapore: Elsevier.
Stevens, D. J. (2001). Inside the Minds of Sexual Offenders: Predatory Rapists, Pedophiles, and Criminal Profiles. New York: Authors Choice Press.
Sutherland, E. H. (1947). Criminology. (4th ed.). Philadelphia, PA: Lippincott.
Swanson, C. R., Chamelin, N. C., & Territo L. (2000). Criminal Investigation (7th Ed.). McGraw-Hill Companies.
Taiwan Criminal Investigation Bureau. (2008). Criminal Investigation Bureau News. Retrieved March 10, 2008, from http://www.cib.gov.tw/
Tanenbaum, A. S. (1996). Computer Networks. New Jersey: Prentice Hall PTR Inc.
Tawil, D. D. (2000). ”Ready? Induce. Sting!”: Arguing for the Government’s Burden of Proving Readiness in Entrapment Cases. Michigan Law Review, 98(7).
Taylor, P. A. (1999). Hackers: Crime in the Digital Sublime. London: MPG Books Ltd.
Teichmann, J & Evans, K. C., (1999). Philosophy: a Beginner's Guide. Blackwell Publishing.
Thomas, D. & Loader, B. (2000). Cyber-crime: Law Enforcement, Security and Surveillance in the Information Age. London: Routledge.
Tittle, C. R. (1995). Control Balance: Toward a General Theory of Deviance. Boulder, CO: Westview.
Tonry, M. (2003). Confronting Crime: Crime Control Policy under New Labour. UK: Willan Publishing.
TPRC. (2008). Stopping Digital Copyright Infringement without Stopping Innovation. Retrieved May 10, 2008, from http://tprc.org/papers/2003/277/
United States Department of Justice. (2007, February). Prosecuting Computer Crimes. Retrieved May 10, 2008, from http://www.usdoj.gov/criminal/ Cyber-crime/ccmanual/ index.html
University of Wisconsin-Eau Clair. (2009). Definition of Cognitive Distortions. Retrieved April 20, 2005, from http://www.uwec.edu/counsel/pubs/defn.htm
USCERT. (2008). Computer Forensics. Retrieved September 28, 2008, from http://www.us-cert.gov/reading_room/forensics.pdf
U.S. Department of Justice. (2002). Creating an Effective Stalking Protocol. Retrieved September10, 2008, from http://www.cops.usdoj.gov
Wang, G., Chen, H., & Atabakhsh, H. (2004). Automatically Detecting Deceptive Criminal Identities. Communications of the ACM, 47: 71-76.
Wang, H. M. (2004). Contingency Planning: Emergency Preparedness for Terrorist Attacks. Aerospace and Electronic Systems Magazine, 19(3): 21-25.
Wang, S. J. & Kao, D. Y. (2004, November). Strategies to Combat the Invasion of Cyberspace from Within. 2004 Conference of Criminal Investigation and Forensics Science, Taiwan Academy of Forensic Sciences. Taiwan: TaoYuan.
Wang, S. J. & Kao, D. Y. (2004, June). Cyber-crime Myths in the Justice System. The 15th Information Security Conference 2005 (ISC2005), Taiwan: Kaoshiung.
Wang, S. J. & Kao, D. Y. (2007, May). Internet Forensics on the Basis of Evidence Gathering with Peep Attacks. International Journal Computer Standards & Interfaces, 29(4): 423-429. CA: Elsevier.
Wang, S. J., Kao, D. Y., & Huang, F .F. Y. (Accepted on 28 September 2008). Procedure Guidance for Internet Forensics Coping with Copyright Arguments of Client-Server-Based P2P Models. International Journal Computer Standards & Interfaces. CA: Elsevier.
WHO@ - Working to Halt Online Abuse. (2008). Online Harassment Statistics. Retrieved September 10, 2008, from http://www.haltabuse.org/ resources/stats/index.shtml
Hopone Internet Corporation (2008). Webster Dictionary. March 10, 2008, from http://www.webster-dictionary.net
Williams, M. (2006). Virtually Criminal: Crime, Deviance and Regulation Online. New York: Routledge Publisher.
Williams, P. (2001). Russian Organized Crime, Russian Hacking, and U.S. Security. Retrieved March 10, 2008, from http://www.cert.org/research/isw/isw2001/papers/Williams-06-09.pdf
Wilson, J. Q. & Herrnstein, R. J. (1985). Crime and Human Nature. New York: Simon and Schuster.
Wikimedia Foundation, Inc. (2008). Wikipedia, the Free Encyclopedia. Retrieved April 20, 2005, from http://en.wikipedia.org/wiki/Main_Page
Wilson, J. P., Drozdek B., & Turkovic, D. (2006). Prottraumatic Shame and Guilt. Trauma, Violence, & Abuse, 7(2). 122-141.
Wysocki, M. D. (2003). Cracking the Hacker code: An Analysis of the Computer Hacker Ethics from Multiple Perspectives. IL: Northwestern University.
Yang, C. C., Shi, X., & Wei, C. P. (2006, May). Tracing the Event Evolution of Terror Attacks from On-Line News. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006. : 343-354. CA: Springer Press.
Yar, M. (2005). The Novelty of ‘Cyber-crime’: An Assessment in Light of Routine Activity Theory. European Journal of Criminology, 2 (4): 407–427:
Yeung, D. & Lowrance, J. (2006). Computer-Mediated Collaborative Reasoning and Intelligence Analysis. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006: 1-13. CA: Springer Press.
Zhang, L. & Zhang, S. (2004). Reintegrative Shaming and Predatory Delinquency. Journal of Research in Crime and Delinquency, 41(4): 433 - 453. CA: Sage Publications.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關博士論文
 
無相關書籍
 
無相關著作
 
QR Code
QRCODE