Lennon Y. C. Chang

ORCID: 0000-0001-5240-2448
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cybercrime and Law Enforcement Studies
  • Cybersecurity and Cyber Warfare Studies
  • Crime Patterns and Interventions
  • Crime, Illicit Activities, and Governance
  • Network Security and Intrusion Detection
  • Criminal Justice and Corrections Analysis
  • Hate Speech and Cyberbullying Detection
  • Misinformation and Its Impacts
  • Asian Geopolitics and Ethnography
  • Policing Practices and Perceptions
  • Psychopathy, Forensic Psychiatry, Sexual Offending
  • Spam and Phishing Detection
  • Hong Kong and Taiwan Politics
  • Ethics and Social Impacts of AI
  • Wildlife Conservation and Criminology Analyses
  • Advanced Malware Detection Techniques
  • European Criminal Justice and Data Protection
  • Homelessness and Social Issues
  • ICT Impact and Policies
  • Law, AI, and Intellectual Property
  • Southeast Asian Sociopolitical Studies
  • Artificial Intelligence in Law
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Data Security Solutions
  • International Development and Aid

Deakin University
2023-2025

City University of Hong Kong
2012-2023

Monash University
2012-2022

Anna University, Chennai
2022

ASM Pacific Technology (China)
2022

Australian Regenerative Medicine Institute
2012-2021

Institute of Criminology
2011-2020

National Taitung University
2018

Chaoyang University of Technology
2014-2016

Australian National University
2009-2012

The proliferation of misinformation in the digital age has emerged as a pervasive and pressing challenge, threatening integrity information dissemination across online platforms. In response to this growing concern, survey paper offers comprehensive analysis landscape detection methodologies. Our delves into intricacies model architectures, feature engineering, data sources, providing insights strengths limitations each approach. Despite significant advancements detection, identifies...

10.1177/08944393251315910 article EN Social Science Computer Review 2025-01-24

The growing threat of cyber-crime poses significant challenges for police organisations. This paper presents original, empirical research on specialist units in Australia to report the issues and problems faced by staff at frontline cyber-policing. Using a mix survey data in-depth interviewing with supervisors, key investigators, civilian from two units, this outlines priority as identified members these units. While generally positive levels job satisfaction working field cyber-crime, three...

10.1080/15614263.2018.1507889 article EN Police Practice and Research 2018-09-20

Although public assessments of the police have become focal concern a substantial amount research efforts since 1970s, very small number studies analysed opinions on Taiwan police. Using survey data collected from three cities and two counties in 2010, this study expands existing literature by assessing whether residents’ perceptions are distinguishable terms procedural-based trust outcome-based both instrumental expressive models predictive Taiwanese Findings revealed that tended to...

10.1177/0004865813489306 article EN Australian & New Zealand Journal of Criminology 2013-06-28

Abstract Given the limited resources and capabilities of states to maintain cyber security, a variety co‐production efforts have been made by individuals or collectives, varying degrees organization coordination. This article identifies different forms citizen security notes risk unintended consequences. Safeguards principles are proposed in order facilitate constructive citizen/netizen security. Although can contribute social control, only those activities within bounds law should be...

10.1111/rego.12125 article EN Regulation & Governance 2016-08-23

This study mainly focuses on developing a gamebased learning system with the augmented reality technology, which is applied to English curriculums in primary schools. Through interactions of voice, graphics and real-world environments, students can learn common vocabulary each letter, then discuss impact motivation effectiveness. The purpose combining particularities high interactivity, immersion authenticity game-based model expect for attracting more people invest applications learning....

10.1109/ic3.2018.00015 article EN 2018-08-01

With the development of Internet, Internet vigilantism (netilantism) has emerged as a new phenomenon in recent years. Although there are several qualitative studies explaining netilantism, is little empirical research on public perceptions netilantism. This article aims to outline Hong Kong university students' general perception netilantism and investigate differences between different roles By using empowerment theory theoretical framework, we will whether vigilantes (netilantes) (a)...

10.1177/0306624x16639037 article EN International Journal of Offender Therapy and Comparative Criminology 2016-03-18

The world has well and truly entered the digital age where technology is ever-present all pervasive. development of technological innovations facilitate our everyday lives. But they also ma...

10.1080/15614263.2018.1507888 article EN Police Practice and Research 2018-09-20

<title>Abstract</title> Exploring human trust in Artificial Intelligence (AI) Law Enforcement domain is paramount for its ethical and effective deployment. As AI systems become increasingly integrated into society, ensures transparency, accountability, fairness their Despite the rapid increase discussion about usage law enforcement various sectors globally, no secondary research explores that OCEANIA, specifically Australia. Moreover, how humans are considered an uninvestigated area this...

10.21203/rs.3.rs-5933420/v1 preprint EN cc-by Research Square (Research Square) 2025-02-05

This study is based on the BYOL (Bootstrap Your Own Latent), a self-supervised learning model, combined with powerful data generation capability of Diffusion Model, to design an enhanced model for recognition rare bird species. The original architecture consisting dual neural networks, online network and target network. In contrast architecture, we propose BYOL-3T/4T framework, which incorporates multiple networks enhance feature aspect preparation training data, given that species are...

10.1177/17581559251334950 article EN Avian Biology Research 2025-04-23

This study examined the determinants of students’ willingness to intervene in bullying incidents, as well process underlying defending behaviors. The participants were 24 students (12 defenders and 12 outsiders) recruited from six secondary schools southern Taiwan. used semi-structured interviews collect qualitative data a grounded theory approach analyse data. results showed that bystanders situations tended assess perceived severity incident, personal responsibility, affective factors,...

10.1177/0143034316632282 article EN School Psychology International 2016-02-16

This study aims to comprehensively test the applicability of lifestyle exposure theory (LET) against other criminogenic and victimogenic factors in predicting differential risks online offending-victimization overlap across multiple types deviance. Using self-reported survey data from 3,741 Chinese college students, performed Latent Class Analysis (LCA) posterior multinomial logistic regression analysis. The LCA identified five latent classes overlap, with only 6% respondents reporting high...

10.1177/00111287241266589 article EN cc-by Crime & Delinquency 2024-07-30

10.1007/s11417-013-9163-5 article EN Asian Journal of Criminology 2013-04-22

This report surveys what is currently known about the financial transactions that cybercriminals conduct among themselves or demand/receive from their victims in English, Russia, Spanish, French, and Chinese contexts.

10.21428/cb6ab371.5f335e6f preprint EN cc-by CrimRxiv 2021-04-16

The rapid growth in Internet use Asia, including a tenfold or more increases access China, Indonesia and India since 2002 has also been accompanied by significant cybercrime. development of commercial-scale exploit toolkits criminal networks that focus on monetization malware have amplified the risks law-enforcement response Asia is briefly reviewed context 2001 Council Europe’s Cybercrime (Budapest) Convention. We describe nature cybercrime (including both ‘hate’ content ‘crime-ware’ such...

10.2139/ssrn.2118322 article EN SSRN Electronic Journal 2012-01-01

Cybercrime across the Taiwan Strait has become a global issue. Due to large number of Internet users and special political situation Strait, Republic China (Taiwan hereafter) People's (China are two countries where malicious computer activity is rampant. Malicious an impact not only on but also many other countries. For example, it been reported that there have attacks against USA originating from computers in controlled by command control servers China. It important understand current...

10.1080/10439463.2013.780221 article EN Policing & Society 2013-03-26
Coming Soon ...