- Cybercrime and Law Enforcement Studies
- Cybersecurity and Cyber Warfare Studies
- Crime Patterns and Interventions
- Crime, Illicit Activities, and Governance
- Network Security and Intrusion Detection
- Criminal Justice and Corrections Analysis
- Hate Speech and Cyberbullying Detection
- Misinformation and Its Impacts
- Asian Geopolitics and Ethnography
- Policing Practices and Perceptions
- Psychopathy, Forensic Psychiatry, Sexual Offending
- Spam and Phishing Detection
- Hong Kong and Taiwan Politics
- Ethics and Social Impacts of AI
- Wildlife Conservation and Criminology Analyses
- Advanced Malware Detection Techniques
- European Criminal Justice and Data Protection
- Homelessness and Social Issues
- ICT Impact and Policies
- Law, AI, and Intellectual Property
- Southeast Asian Sociopolitical Studies
- Artificial Intelligence in Law
- Internet Traffic Analysis and Secure E-voting
- Cloud Data Security Solutions
- International Development and Aid
Deakin University
2023-2025
City University of Hong Kong
2012-2023
Monash University
2012-2022
Anna University, Chennai
2022
ASM Pacific Technology (China)
2022
Australian Regenerative Medicine Institute
2012-2021
Institute of Criminology
2011-2020
National Taitung University
2018
Chaoyang University of Technology
2014-2016
Australian National University
2009-2012
The proliferation of misinformation in the digital age has emerged as a pervasive and pressing challenge, threatening integrity information dissemination across online platforms. In response to this growing concern, survey paper offers comprehensive analysis landscape detection methodologies. Our delves into intricacies model architectures, feature engineering, data sources, providing insights strengths limitations each approach. Despite significant advancements detection, identifies...
The growing threat of cyber-crime poses significant challenges for police organisations. This paper presents original, empirical research on specialist units in Australia to report the issues and problems faced by staff at frontline cyber-policing. Using a mix survey data in-depth interviewing with supervisors, key investigators, civilian from two units, this outlines priority as identified members these units. While generally positive levels job satisfaction working field cyber-crime, three...
Although public assessments of the police have become focal concern a substantial amount research efforts since 1970s, very small number studies analysed opinions on Taiwan police. Using survey data collected from three cities and two counties in 2010, this study expands existing literature by assessing whether residents’ perceptions are distinguishable terms procedural-based trust outcome-based both instrumental expressive models predictive Taiwanese Findings revealed that tended to...
Abstract Given the limited resources and capabilities of states to maintain cyber security, a variety co‐production efforts have been made by individuals or collectives, varying degrees organization coordination. This article identifies different forms citizen security notes risk unintended consequences. Safeguards principles are proposed in order facilitate constructive citizen/netizen security. Although can contribute social control, only those activities within bounds law should be...
This study mainly focuses on developing a gamebased learning system with the augmented reality technology, which is applied to English curriculums in primary schools. Through interactions of voice, graphics and real-world environments, students can learn common vocabulary each letter, then discuss impact motivation effectiveness. The purpose combining particularities high interactivity, immersion authenticity game-based model expect for attracting more people invest applications learning....
With the development of Internet, Internet vigilantism (netilantism) has emerged as a new phenomenon in recent years. Although there are several qualitative studies explaining netilantism, is little empirical research on public perceptions netilantism. This article aims to outline Hong Kong university students' general perception netilantism and investigate differences between different roles By using empowerment theory theoretical framework, we will whether vigilantes (netilantes) (a)...
The world has well and truly entered the digital age where technology is ever-present all pervasive. development of technological innovations facilitate our everyday lives. But they also ma...
<title>Abstract</title> Exploring human trust in Artificial Intelligence (AI) Law Enforcement domain is paramount for its ethical and effective deployment. As AI systems become increasingly integrated into society, ensures transparency, accountability, fairness their Despite the rapid increase discussion about usage law enforcement various sectors globally, no secondary research explores that OCEANIA, specifically Australia. Moreover, how humans are considered an uninvestigated area this...
This study is based on the BYOL (Bootstrap Your Own Latent), a self-supervised learning model, combined with powerful data generation capability of Diffusion Model, to design an enhanced model for recognition rare bird species. The original architecture consisting dual neural networks, online network and target network. In contrast architecture, we propose BYOL-3T/4T framework, which incorporates multiple networks enhance feature aspect preparation training data, given that species are...
This study examined the determinants of students’ willingness to intervene in bullying incidents, as well process underlying defending behaviors. The participants were 24 students (12 defenders and 12 outsiders) recruited from six secondary schools southern Taiwan. used semi-structured interviews collect qualitative data a grounded theory approach analyse data. results showed that bystanders situations tended assess perceived severity incident, personal responsibility, affective factors,...
This study aims to comprehensively test the applicability of lifestyle exposure theory (LET) against other criminogenic and victimogenic factors in predicting differential risks online offending-victimization overlap across multiple types deviance. Using self-reported survey data from 3,741 Chinese college students, performed Latent Class Analysis (LCA) posterior multinomial logistic regression analysis. The LCA identified five latent classes overlap, with only 6% respondents reporting high...
This report surveys what is currently known about the financial transactions that cybercriminals conduct among themselves or demand/receive from their victims in English, Russia, Spanish, French, and Chinese contexts.
The rapid growth in Internet use Asia, including a tenfold or more increases access China, Indonesia and India since 2002 has also been accompanied by significant cybercrime. development of commercial-scale exploit toolkits criminal networks that focus on monetization malware have amplified the risks law-enforcement response Asia is briefly reviewed context 2001 Council Europe’s Cybercrime (Budapest) Convention. We describe nature cybercrime (including both ‘hate’ content ‘crime-ware’ such...
Cybercrime across the Taiwan Strait has become a global issue. Due to large number of Internet users and special political situation Strait, Republic China (Taiwan hereafter) People's (China are two countries where malicious computer activity is rampant. Malicious an impact not only on but also many other countries. For example, it been reported that there have attacks against USA originating from computers in controlled by command control servers China. It important understand current...