Academic literature on the topic 'Computer security Taiwan'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer security Taiwan.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer security Taiwan"

1

Chin-Chen Chang and Wei-Bin Lee. "Taiwan: Focus on the information security market." IT Professional 5, no. 5 (September 2003): 26–29. http://dx.doi.org/10.1109/mitp.2003.1235606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hsiao, Kuo-Lun, Kuan-Yu Lin, Yi-Ting Wang, Chun-Hsiung Lee, and Zhe-Ming Zhang. "Continued use intention of lifestyle mobile applications: the Starbucks app in Taiwan." Electronic Library 37, no. 5 (October 7, 2019): 893–913. http://dx.doi.org/10.1108/el-03-2019-0085.

Full text
Abstract:
Purpose In recent years, the ongoing development and rapid popularization of mobile devices, not only has brought new forms of lifestyle but also has boomed a wide array of service contents, allowing users to engage in entertainment, study and other daily activities, in addition to business transactions. To explore the factors that affect users' continued use of mobile app software, this paper aims to take into account the utilitarian value and privacy, as well as security factors and intends to propose an integrated research model based on the information systems success (ISS) model. Design/methodology/approach The data for this study were collected via an online survey questionnaire. A total of 190 valid responses were used to examine the hypotheses in the research model. The casual model was assessed using partial least squares techniques. Findings The results indicated that the three quality factors (information quality, system quality and service quality) in the ISS model significantly affected satisfaction and utilitarian value. Private and security have significant negative association with utilitarian value. The results also showed that private and security did not significantly affect satisfaction. The findings also provide some directions for further research. Practical implications The results show that user's continued use of mobile app software depends upon the perceived utilitarian value and satisfaction. The quality characteristics are the three critical factors that would affect the perceived utilitarian value and satisfaction. Compared to information quality and service quality, system quality has a higher degree of positive impact, which indicates that users are more concerned about the immediate download ability and ease-of-use provided by the system. Furthermore, the research also finds that privacy and security concerns have a negative influence on the utilitarian value, showing that in the context of task-oriented IS, the perceived risk of privacy and security during the process of using mobile app software services, will negatively affect users’ perception of utilitarian value. The insights provided by this study can help mobile app developers optimize design and marketing strategies. Originality/value This study provides a better understanding of how the factors in the theories influence the continuance usage intention of life style mobile applications.
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Tser-yieth, and Ji-jenn Chiou. "Forecasting the development of internet security technology in Taiwan via scenario analysis." International Journal of Services Technology and Management 5, no. 2 (2004): 170. http://dx.doi.org/10.1504/ijstm.2004.004057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Yu-Tsang, Wen-Ling Shih, Chun-Hsiung Lee, Pai-Lu Wu, and Chun-Yen Tsai. "Relationships among undergraduates' problematic information security behavior, compulsive internet use, and mindful awareness in Taiwan." Computers & Education 164 (April 2021): 104131. http://dx.doi.org/10.1016/j.compedu.2021.104131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Hsin-Wei, Szu-Yu Kuo, and Liang-Bi Chen. "Exploring the Relationship between Internal Information Security, Response Cost, and Security Intention in Container Shipping." Applied Sciences 11, no. 6 (March 15, 2021): 2609. http://dx.doi.org/10.3390/app11062609.

Full text
Abstract:
This study empirically investigates the influence of information security marketing and response cost on employees’ information security intention in the container shipping industry. Survey data were collected from 285 respondents in Taiwan. Exploratory factor analysis was employed to identify all the measures to be summarized in a relative set. Confirmatory factor analysis was utilized to ensure every measure’s construct’s convergent and discriminant validity. Structural equation modeling was carried out to the proposed model in this article. The results indicate that organizational information security marketing has a positive impact on information security intention. Furthermore, this study conducted hierarchical regression to examine the moderating effects of information security awareness and information security climate. In particular, information security awareness significantly influenced the relationships between organizational information security marketing, response cost, and information security intention. Moreover, information security climate moderated the relationship between response cost and information security intention. This article concludes by discussing these theoretical and practical findings and implications.
APA, Harvard, Vancouver, ISO, and other styles
6

Shih-Hsiung Lee, Shih-Hsiung Lee, and Po-Hsiang Shih Shih-Hsiung Lee. "An Improved Gated System that Combines the Techniques of the Internet of Things for Community Security." 網際網路技術學刊 23, no. 2 (March 2022): 345–62. http://dx.doi.org/10.53106/160792642022032302014.

Full text
Abstract:
<p>Residential security is important in today&rsquo;s society. As Taiwan will soon enter a super-aged society, there will be manpower shortages and scheduling problems in the dispatched resident guard service. Hence, how to develop a new security method and business model that uses the techniques of the Internet of Things to improve resident security is a top priority. In addition, in response to the severe global COVID-19 epidemic, residents&rsquo; access to and from residential areas shall be strictly controlled, such as body temperature records and access records, in order to enhance epidemic prevention within communities. Therefore, this paper proposes an improved gated system that combines the techniques of the Internet of Things (IoT) to ensure community security. In terms of access control, a facial recognition system is designed, which integrates with the functions of body temperature measurement, RFID, and QR codes. The QR code function is mainly used to allow guests to enter residential areas. Regarding the COVID-19 epidemic, the information recorded by the system can help to effectively control the contact history and body temperature of community residents. The advantages of this paper, including practicality, residential security, and integration, are explained in the experimental section.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
7

Chang, I.-Chiu, Hsin-Ginn Hwang, David C. Yen, and Hen-Yi Huang. "An empirical study of the factors affecting Internet security for the financial industry in Taiwan." Telematics and Informatics 23, no. 4 (November 2006): 343–64. http://dx.doi.org/10.1016/j.tele.2005.11.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ho, Li-Hsing, Ming-Tsai Hsu, and Tieh-Min Yen. "Identifying core control items of information security management and improvement strategies by applying fuzzy DEMATEL." Information & Computer Security 23, no. 2 (June 8, 2015): 161–77. http://dx.doi.org/10.1108/ics-04-2014-0026.

Full text
Abstract:
Purpose – The purpose of this paper is to analyze the cause-and-effect relationship and the mutually influential level among information security control items, as well as to provide organizations with a method for analyzing and making systematic decisions for improvement. Design/methodology/approach – This study utilized the Fuzzy DEMATEL to analyze cause-and-effect relationships and mutual influence of the 11 control items of the International Organization for Standardization (ISO) 27001 Information Security Management System (ISMS), which are discussed by seven experts in Taiwan to identify the core control items for developing the improvement strategies. Findings – The study has found that the three core control items of the ISMS are security policy (SC1), access control (SC7) and human resource security (SC4). This study provides organizations with a direction to develop improvement strategies and effectively manage the ISMS of the organization. Originality/value – The value of this study is for an organization to effectively dedicate resources to core control items, such that other control items are driven toward positive change by analyzing the cause-and-effect relation and the mutual influential level among information security control items, through a cause-and-effect matrix and a systematic diagram.
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Yun-Ju, Sheng Ming Hsu, Shu-Yi Liao, Tsung-Chi Chen, and Wei-Chun Tseng. "Natural Gas or Algal Reef: Survey-Based Valuations of Pro-Gas and Pro-Reef Groups Specifically for Policy Advising." Energies 12, no. 24 (December 9, 2019): 4682. http://dx.doi.org/10.3390/en12244682.

Full text
Abstract:
Much energy-related construction causes environmental concern. Sometimes the environmental issue is so huge that it is difficult to make a policy decision even with the assistance of traditional valuation techniques. The third natural gas receiving station at Datan, Taiwan, is one example of this. The construction would be beneficial to energy security, economic development, and particulate matter (PM) 2.5 reduction. However, it would destroy a precious algal reef, which is a habitat for endangered species, biodiversity, and a unique ecological system. Thus, we used willingness-to-pay to show the strength of both pro-energy and pro-ecology opinions specifically to help with decision-making. First, respondents were asked to choose between the gas station and the reef. Then they were asked about their willingness to pay for that choice. We then estimated parametric/nonparametric models—traditional probit, structured probit, and Turnbull—to obtain reliable estimates. We found that the per-person value for pro-gas-station respondents was higher than that for pro-reef respondents, while the percentage of pro-reef respondents was higher than the percentage of pro-gas-station respondents. These results together form a clear policy implication for this case.
APA, Harvard, Vancouver, ISO, and other styles
10

Ozdemir, Serkan, Martin Wynn, and Bilgin Metin. "Cybersecurity and Country of Origin: Towards a New Framework for Assessing Digital Product Domesticity." Sustainability 15, no. 1 (December 21, 2022): 87. http://dx.doi.org/10.3390/su15010087.

Full text
Abstract:
Recent events concerning the Kaspersky anti-virus software in the UK and the Android operating system in the US have highlighted the significance of the domesticity of digital products for national cybersecurity, and the importance of establishing the origin of digital products has been further brought into focus by the war in Ukraine and China’s military activities around Taiwan. Digital products can contain hardware components, software elements, embedded systems, and data, and determining the country of origin (COO) in these circumstances is problematic. The aim of this research, and its main contribution, is to provide an operational framework for the application of the COO concept to address this problem. Using an inductive research methodology based on semi-structured interviews and an online survey, a 19-parameter framework for assessing the COO of digital products is developed and then applied to the case example of a mobile phone import in Turkey. This article concludes that new processes and policies are urgently required to enhance the cyber and information security for digital products, aid domestic digital technology production, and support the transition to recyclable technologies. Such developments are of significance not only for western nations concerned with data and security issues, but also for developing world countries trying to develop their own domestic digital product manufacturing capabilities. This is also of relevance to the computer end-user, who would benefit from greater clarity on the origin of digital products ahead of a purchase decision.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer security Taiwan"

1

Ching-Cheng, Tsai, and 蔡清正. "The Impact of Natural Disasters on Supply Chain Security Management of Industrial Computer Industry in Taiwan." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/8qgp7u.

Full text
Abstract:
碩士
國立臺北科技大學
管理學院經營管理EMBA專班
100
Natural disasters are unavoidable problem for every industry, but how to respond when it had to face is very important. The industrial computer industry is booming but has to face the global financial tsunami, also affected by the impact of natural disasters the supply chain, in response to natural disasters in the financial tsunami to reduce the impact on supply chain security management by natural disasters become an important issue for the industry. International Standards Organization promulgated ISO 28000 supply chain security management system standards in September 2007, is also an internationally recognized with the national supply chain security standards set. For the inducted ISO 28000 process for business can be smoothly integrated the previous ISO management system with integration capability In this study, was using ISO 28000 to construct the supply chain security management index system for the industrial computer industry in response to natural disasters. Use the Delphi expert survey method to analyze with total 10 experts, the results are summarized as follows: 1. The supply chain security management index system for the industrial computer industry in response to natural disasters., is including: general requirements for safety management, security management policy development, security risk assessment and planning, implementation and operation of safety management, checking and corrective action of safety management and management review and continual improvement. 2. The results found that the experts have reached a very high consensus level for supply chain security management index system which " implementation and operation of safety management " is the most important, followed by" checking and corrective action of safety management” and “management review and continual improvement”, and “security risk assessment and planning” is to take seriously the degree to be low.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer security Taiwan"

1

shih, Taiwan) Workshop on Cryptology and Information Security (1998 Tʻai-nan. Proceedings of Workshop on Cryptology and Information Security: International Computer Symposium (ICS '98) : National Cheng Kung University : Tainan, Taiwan, R.O.C. : December 17-19, 1998. Tainan, Taiwan, Republic of China: National Cheng Kung University, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

C, Yang Christopher, Institute of Electrical and Electronics Engineers., and ISI 2008 (2008 : Taipei, Taiwan), eds. Intelligence and security informatics: IEEE ISI 2008 international workshops : PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008 : proceedings. Berlin: Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

ACM Symposium on Information, Computer, and Communications Security (1st 2006 Taipei, Taiwan). Proceedings of the 2006 ACM Symposium on Information, computer and communications security: 2006, Taipei, Taiwan, March 21-24, 2006. New York, NY: ACM Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1956-, Laih Chi Sung, ed. Advances in cryptology-ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30-December 4, 2003 : proceedings. New York: Springer-Verlag, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tai-hoon, Kim, Peng Sheng-Lung, and SpringerLink (Online service), eds. Security-Enriched Urban Computing and Smart Grid: Second International Conference, SUComS 2011, Hualien, Taiwan, September 21-23, 2011. Proceedings. Berlin, Heidelberg: Springer-Verlag GmbH Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (2006 Tʻai-chung shih, Taiwan). IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing: Proceedings : June 5-7, 2006, Taichung, Taiwan. Piscataway, N.J: IEEE, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Quan qiu zi an shi chang ji wo guo zi an chan ye fa zhan ji hui fen xi: IT security : worldwide trends and industry opportunities in Taiwan. Taibei Shi: Cai tuan fa ren zi xun gong ye ce jin hui zi xun shi chang qing bao zhong xin (MIC), 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

K, Denko Mieso, and International Federation for Information Processing., eds. Emerging direction in embedded and ubiquitous computing: EUC 2007 Workshops, TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007 : proceedings. Berlin: Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Hsinchun, Michael Chau, G. Alan Wang, and Jau-Hwang Wang. Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings. Springer London, Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer security Taiwan"

1

Liao, You-lu, and Cynthia Tsai. "Analysis of Computer Crime Characteristics in Taiwan." In Intelligence and Security Informatics, 49–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11734628_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Lily Shui-Lien, Michael Chih-Hung Wang, and Yung-Hsin Lee. "Relationship between Motivation and Satisfaction of Online Computer Games: Evidence from Adolescent Players Using Wireless Service in Taiwan." In Advances in Information Security and Assurance, 543–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02617-1_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer security Taiwan"

1

Huang, Yennun, and Szu-Chuang Li. "Overview of Taiwan information security center and its research on privacy." In 2016 8th International Conference on Advanced Computer Science and Information Systems (ICACSIS). IEEE, 2016. http://dx.doi.org/10.1109/icacsis.2016.7872716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Ming-Hung, and Yu-Chen Dai. "POSTER: How Do Suspicious Accounts Participate in Online Political Discussions? A Preliminary Study in Taiwan." In ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3320269.3405433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography