Academic literature on the topic 'Computer security Taiwan'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer security Taiwan.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer security Taiwan"
Chin-Chen Chang and Wei-Bin Lee. "Taiwan: Focus on the information security market." IT Professional 5, no. 5 (September 2003): 26–29. http://dx.doi.org/10.1109/mitp.2003.1235606.
Full textHsiao, Kuo-Lun, Kuan-Yu Lin, Yi-Ting Wang, Chun-Hsiung Lee, and Zhe-Ming Zhang. "Continued use intention of lifestyle mobile applications: the Starbucks app in Taiwan." Electronic Library 37, no. 5 (October 7, 2019): 893–913. http://dx.doi.org/10.1108/el-03-2019-0085.
Full textChen, Tser-yieth, and Ji-jenn Chiou. "Forecasting the development of internet security technology in Taiwan via scenario analysis." International Journal of Services Technology and Management 5, no. 2 (2004): 170. http://dx.doi.org/10.1504/ijstm.2004.004057.
Full textChen, Yu-Tsang, Wen-Ling Shih, Chun-Hsiung Lee, Pai-Lu Wu, and Chun-Yen Tsai. "Relationships among undergraduates' problematic information security behavior, compulsive internet use, and mindful awareness in Taiwan." Computers & Education 164 (April 2021): 104131. http://dx.doi.org/10.1016/j.compedu.2021.104131.
Full textWang, Hsin-Wei, Szu-Yu Kuo, and Liang-Bi Chen. "Exploring the Relationship between Internal Information Security, Response Cost, and Security Intention in Container Shipping." Applied Sciences 11, no. 6 (March 15, 2021): 2609. http://dx.doi.org/10.3390/app11062609.
Full textShih-Hsiung Lee, Shih-Hsiung Lee, and Po-Hsiang Shih Shih-Hsiung Lee. "An Improved Gated System that Combines the Techniques of the Internet of Things for Community Security." 網際網路技術學刊 23, no. 2 (March 2022): 345–62. http://dx.doi.org/10.53106/160792642022032302014.
Full textChang, I.-Chiu, Hsin-Ginn Hwang, David C. Yen, and Hen-Yi Huang. "An empirical study of the factors affecting Internet security for the financial industry in Taiwan." Telematics and Informatics 23, no. 4 (November 2006): 343–64. http://dx.doi.org/10.1016/j.tele.2005.11.001.
Full textHo, Li-Hsing, Ming-Tsai Hsu, and Tieh-Min Yen. "Identifying core control items of information security management and improvement strategies by applying fuzzy DEMATEL." Information & Computer Security 23, no. 2 (June 8, 2015): 161–77. http://dx.doi.org/10.1108/ics-04-2014-0026.
Full textChen, Yun-Ju, Sheng Ming Hsu, Shu-Yi Liao, Tsung-Chi Chen, and Wei-Chun Tseng. "Natural Gas or Algal Reef: Survey-Based Valuations of Pro-Gas and Pro-Reef Groups Specifically for Policy Advising." Energies 12, no. 24 (December 9, 2019): 4682. http://dx.doi.org/10.3390/en12244682.
Full textOzdemir, Serkan, Martin Wynn, and Bilgin Metin. "Cybersecurity and Country of Origin: Towards a New Framework for Assessing Digital Product Domesticity." Sustainability 15, no. 1 (December 21, 2022): 87. http://dx.doi.org/10.3390/su15010087.
Full textDissertations / Theses on the topic "Computer security Taiwan"
Ching-Cheng, Tsai, and 蔡清正. "The Impact of Natural Disasters on Supply Chain Security Management of Industrial Computer Industry in Taiwan." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/8qgp7u.
Full text國立臺北科技大學
管理學院經營管理EMBA專班
100
Natural disasters are unavoidable problem for every industry, but how to respond when it had to face is very important. The industrial computer industry is booming but has to face the global financial tsunami, also affected by the impact of natural disasters the supply chain, in response to natural disasters in the financial tsunami to reduce the impact on supply chain security management by natural disasters become an important issue for the industry. International Standards Organization promulgated ISO 28000 supply chain security management system standards in September 2007, is also an internationally recognized with the national supply chain security standards set. For the inducted ISO 28000 process for business can be smoothly integrated the previous ISO management system with integration capability In this study, was using ISO 28000 to construct the supply chain security management index system for the industrial computer industry in response to natural disasters. Use the Delphi expert survey method to analyze with total 10 experts, the results are summarized as follows: 1. The supply chain security management index system for the industrial computer industry in response to natural disasters., is including: general requirements for safety management, security management policy development, security risk assessment and planning, implementation and operation of safety management, checking and corrective action of safety management and management review and continual improvement. 2. The results found that the experts have reached a very high consensus level for supply chain security management index system which " implementation and operation of safety management " is the most important, followed by" checking and corrective action of safety management” and “management review and continual improvement”, and “security risk assessment and planning” is to take seriously the degree to be low.
Books on the topic "Computer security Taiwan"
shih, Taiwan) Workshop on Cryptology and Information Security (1998 Tʻai-nan. Proceedings of Workshop on Cryptology and Information Security: International Computer Symposium (ICS '98) : National Cheng Kung University : Tainan, Taiwan, R.O.C. : December 17-19, 1998. Tainan, Taiwan, Republic of China: National Cheng Kung University, 1998.
Find full textC, Yang Christopher, Institute of Electrical and Electronics Engineers., and ISI 2008 (2008 : Taipei, Taiwan), eds. Intelligence and security informatics: IEEE ISI 2008 international workshops : PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008 : proceedings. Berlin: Springer, 2008.
Find full textACM Symposium on Information, Computer, and Communications Security (1st 2006 Taipei, Taiwan). Proceedings of the 2006 ACM Symposium on Information, computer and communications security: 2006, Taipei, Taiwan, March 21-24, 2006. New York, NY: ACM Press, 2006.
Find full text1956-, Laih Chi Sung, ed. Advances in cryptology-ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30-December 4, 2003 : proceedings. New York: Springer-Verlag, 2003.
Find full textTai-hoon, Kim, Peng Sheng-Lung, and SpringerLink (Online service), eds. Security-Enriched Urban Computing and Smart Grid: Second International Conference, SUComS 2011, Hualien, Taiwan, September 21-23, 2011. Proceedings. Berlin, Heidelberg: Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textIEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (2006 Tʻai-chung shih, Taiwan). IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing: Proceedings : June 5-7, 2006, Taichung, Taiwan. Piscataway, N.J: IEEE, 2006.
Find full textQuan qiu zi an shi chang ji wo guo zi an chan ye fa zhan ji hui fen xi: IT security : worldwide trends and industry opportunities in Taiwan. Taibei Shi: Cai tuan fa ren zi xun gong ye ce jin hui zi xun shi chang qing bao zhong xin (MIC), 2008.
Find full textK, Denko Mieso, and International Federation for Information Processing., eds. Emerging direction in embedded and ubiquitous computing: EUC 2007 Workshops, TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007 : proceedings. Berlin: Springer, 2007.
Find full textChen, Hsinchun, Michael Chau, G. Alan Wang, and Jau-Hwang Wang. Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings. Springer London, Limited, 2014.
Find full textIntelligence and Security Informatics: Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings. Springer, 2014.
Find full textBook chapters on the topic "Computer security Taiwan"
Liao, You-lu, and Cynthia Tsai. "Analysis of Computer Crime Characteristics in Taiwan." In Intelligence and Security Informatics, 49–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11734628_6.
Full textChen, Lily Shui-Lien, Michael Chih-Hung Wang, and Yung-Hsin Lee. "Relationship between Motivation and Satisfaction of Online Computer Games: Evidence from Adolescent Players Using Wireless Service in Taiwan." In Advances in Information Security and Assurance, 543–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02617-1_55.
Full textConference papers on the topic "Computer security Taiwan"
Huang, Yennun, and Szu-Chuang Li. "Overview of Taiwan information security center and its research on privacy." In 2016 8th International Conference on Advanced Computer Science and Information Systems (ICACSIS). IEEE, 2016. http://dx.doi.org/10.1109/icacsis.2016.7872716.
Full textWang, Ming-Hung, and Yu-Chen Dai. "POSTER: How Do Suspicious Accounts Participate in Online Political Discussions? A Preliminary Study in Taiwan." In ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3320269.3405433.
Full text