Dr Lennon Chang is currently a senior lecturer in Criminology in the School of Social Sciences at Monash University. Before joining Monash, he was working as an assistant professor in the Department of Applied Social Studies at the City University of Hong Kong. He is also a visitor at Regulatory Institutions Network at Australian National University and a member of International Cybercrime Research Centre at Simon Fraser University, Canada. He is a founding member and vice chairman of Asia Pacific Association of Technology and Society.
He was awarded his PhD by the Australian National University in November 2010. He has a Master in Criminology and Bachelor in Law degrees from National Taipei University. In 2007 he received an Endeavour Asia Award and in 2009 was identified by Peking University and Griffith Asia Institute as an Australia-China Emerging Leader. He was selected as the Global Emerging Voices Fellow and the Australia-China Youth Dialogue Fellow.
Dr Chang is interested in researching crime and governance of cyberspace - cybercrime, cyber terrorism and cyber warfare. He is particularly interested in the regulation and governance of cyberspace in the Asia-Pacific region. His book Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention (Edward Elgar, 2012) is about the nature and range of responses to cybercrime between China and Taiwan. Dr Chang’s professional interest in China continues and he is currently researching on-line vigilantism in China as well cybercrime and cyber-deviance among juveniles in the Greater China region.
Cybercrime is a worldwide problem of rapidly increasing magnitude and, of the countries in the As... more Cybercrime is a worldwide problem of rapidly increasing magnitude and, of the countries in the Asia Pacific region, Taiwan and China are suffering most. This timely book discusses the extent and nature of cybercrime in and between Taiwan and China, focussing especially on the prevalence of botnets (collections of computers that have been compromised and used for malicious purposes).
The book uses routine activity theory to analyse Chinese and Taiwanese legal responses to cybercrime, and reviews mutual assistance between the two countries as well as discussing third party cooperation. To prevent the spread of cybercrime, the book argues the case for a 'wiki' approach to cybercrime and a feasible pre-warning system. Learning from lessons in infectious disease prevention and from aviation safety reporting, Cybercrime in the Greater China Region proposes a feasible information security incident reporting and response system.
Academics, government agency workers, policymakers and those in the information security or legal compliance divisions in public and private sectors will find much to interest them in this timely study.
Contents: Foreword Preface Part I: Setting the Scene 1. Introduction 2. Risk, Routine Activity and Cybercrime Part II: New Crime in a New Field: Cybercrime in Taiwan and China 3. Cybercrime Across the Taiwan Strait Part III: Regulatory Responses Against Cybercrime Across the Taiwan Strait 4. Think Global, Act Glocal - 'Glocal' Responses to Cybercrime 5. Cooperation between Taiwan and China Part IV: Preventable Measures: Cybercrime as the Infectious Disease in the Virtual World 6. 'Wiki' Crime Prevention - Establishing a Pre-Warning System 7. Conclusion References Index
Given the limited resources and capabilities of states to maintain cyber security, a variety of c... more Given the limited resources and capabilities of states to maintain cyber security, a variety of co-production efforts have been made by individuals, or by collectives of varying degrees of organization and coordination. This article identifies different forms of citizen coproduction of cyber security and notes the risk of unintended consequences. Safeguards and principles are proposed in order to facilitate constructive citizen/netizen co-production of cyber security. Although co-production of security can contribute to social control, only those activities within the bounds of the law should be encouraged. Activities of private citizens/netizens that test the limits of legality should be closely circumscribed.
With the development of the internet, internet vigilantism (netilantism) has emerged as a new phe... more With the development of the internet, internet vigilantism (netilantism) has emerged as a new phenomenon in recent years. While there are several qualitative studies explaining netilantism, there is little empirical research on public perceptions of netilantism. This paper aims to outline Hong Kong university students’ general perception of netilantism and investigate the differences between different roles in netilantism. By using empowerment theory as the theoretical framework, we will investigate whether internet vigilantes (netilantes) 1) perceive the criminal justice system as effective, 2) possess high levels of self-efficacy in the cyber world, and 3) tend to believe netilantism can achieve social justice. Findings support the proposition that human flesh search engine is an empowerment tool for the netilante enabling him/her to achieve his goal of social justice. Different roles in netilantism (i.e. bystander, vigilante, victim and none of the above roles) have different perceptions of netilantism and the criminal justice system. The results will be explained by studying two representative cases of netilantism - the “Government Official Molestation” case and the “Cat Abuse in Shun Tin Village” case from China and Hong Kong respectively.
This chapter provides an insight into cyber crowdsourcing in the
Greater China region. It will, f... more This chapter provides an insight into cyber crowdsourcing in the Greater China region. It will, firstly, define and then describe the origins of cyber crowdsourcing. Based on archival studies conducted in 2012, it will categorize cyber crowdsourcing cases between 2003 and 2012. It will then discuss the positive and negative impacts of cyber crowdsourcing and discuss the possibility of using cyber crowdsourcing in criminal investigations.
This chapter will discuss the nature of cybercrime. It will examine the limitations of laws and r... more This chapter will discuss the nature of cybercrime. It will examine the limitations of laws and regulations and constraints to cybercrime investigation. It will then discuss the formation of strategies aimed at cybercrime prevention. Central to our discussion will be the recognition that no one institution or sector is able to secure cyberspace on its own. Cyber security requires pluralistic solutions involving cross-national and cross-sector collaboration wherever possible, and independent, unilateral security measures when cooperative efforts prove elusive.
Australian Journal of Forensic Sciences, Jan 1, 2012
Reports have shown that Taiwan and China are attractive targets for cybercriminals. The special p... more Reports have shown that Taiwan and China are attractive targets for cybercriminals. The special political situation between the two countries has encouraged numerous cyber-attacks across the Taiwan Strait. Establishing an efficient investigation and prosecution ...
Cybercrime has become a world concern. According to unofficial statistics, the projected loss of ... more Cybercrime has become a world concern. According to unofficial statistics, the projected loss of cybercrime will reach USD 2 trillions by 2019 (Forbes 2016). It affects not only individual but also corporates and states as a whole. Its transnational and anonymity characters make it hard to investigate. The blurred line between national security and crime also contribute to the complexity in international collaboration on crime investigation. Among all the regions in the world, Asia has the most internet users. More than half of the internet users in the world are in Asia. The number of internet users in Asia has almost doubled since 2011 and is still increasing (Miniwatts Marketing Group 2016). The member countries of the Association of Southeast-Asia Nations (ASEAN) have definitely contributed significantly to the increase in internet users in Asia. The Association of Southeast-Asia Nations was formed in 1967 by Indonesia, Malaysia, the Philippines, Singapore, and Thailand to promote regional security and cooperation. It has ten member states now including Brunei, Cambodia, Indonesia, Laos, Malaysia, Burma, Philippines, Singapore, Thailand and Vietnam. All ASEAN member states have had a dramatic increase in internet subscribers. This is especially the case for countries like Myanmar, which has recently opened to the world and privatized the internet provider. Of course, the region has become a new field for hackers and cyber criminals.
Being an emerging cybercrime market, there is still limited research that looks into cybercrime and cyber security in the ASEAN region. What are the trends in and challenges of cybercrime in ASEAN? Are current conventions such as Council of Europe’s Convention on Cybercrime appropriate for ASEAN? What are the challenges faced by ASEAN countries when collaborating internationally against cybercrime? This chapter aims to answer these questions and to consider whether the strategies developed in the global north are relevant to ASEAN. This paper will provide an overview of cybercrime trends in ASEAN, assess current measures adopted by ASEAN countries in combatting cybercrime, and make policy recommendations to strengthen those measures.
Oxford Handbooks Online in Criminology and Criminal Justice, (Chief Editor) Michael Tonry, Oct 7, 2014
China’s well-documented rapid socio-economic changes, including largely unmanaged rural to urban ... more China’s well-documented rapid socio-economic changes, including largely unmanaged rural to urban migration, forms an important pressure on development of an adequate juvenile justice system. This chapter identifies and describes key normative principles which are said to underpin contemporary juvenile justice in China. The development of the modern legal framework is also elucidated. In later sections we identify and analyse the regulatory and organizational limits to the implementation of such principles in everyday practice. We argue that the principles stand as part of professional discourse, but remain a largely discursive phenomenon – impinging to a limited extent on the reality of juvenile justice processing in contemporary China.
http://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780199935383.001.0001/oxfordhb-9780199935383-e-72
Cybercrime is a worldwide problem of rapidly increasing magnitude and, of the countries in the As... more Cybercrime is a worldwide problem of rapidly increasing magnitude and, of the countries in the Asia Pacific region, Taiwan and China are suffering most. This timely book discusses the extent and nature of cybercrime in and between Taiwan and China, focussing especially on the prevalence of botnets (collections of computers that have been compromised and used for malicious purposes).
The book uses routine activity theory to analyse Chinese and Taiwanese legal responses to cybercrime, and reviews mutual assistance between the two countries as well as discussing third party cooperation. To prevent the spread of cybercrime, the book argues the case for a 'wiki' approach to cybercrime and a feasible pre-warning system. Learning from lessons in infectious disease prevention and from aviation safety reporting, Cybercrime in the Greater China Region proposes a feasible information security incident reporting and response system.
Academics, government agency workers, policymakers and those in the information security or legal compliance divisions in public and private sectors will find much to interest them in this timely study.
Contents: Foreword Preface Part I: Setting the Scene 1. Introduction 2. Risk, Routine Activity and Cybercrime Part II: New Crime in a New Field: Cybercrime in Taiwan and China 3. Cybercrime Across the Taiwan Strait Part III: Regulatory Responses Against Cybercrime Across the Taiwan Strait 4. Think Global, Act Glocal - 'Glocal' Responses to Cybercrime 5. Cooperation between Taiwan and China Part IV: Preventable Measures: Cybercrime as the Infectious Disease in the Virtual World 6. 'Wiki' Crime Prevention - Establishing a Pre-Warning System 7. Conclusion References Index
Given the limited resources and capabilities of states to maintain cyber security, a variety of c... more Given the limited resources and capabilities of states to maintain cyber security, a variety of co-production efforts have been made by individuals, or by collectives of varying degrees of organization and coordination. This article identifies different forms of citizen coproduction of cyber security and notes the risk of unintended consequences. Safeguards and principles are proposed in order to facilitate constructive citizen/netizen co-production of cyber security. Although co-production of security can contribute to social control, only those activities within the bounds of the law should be encouraged. Activities of private citizens/netizens that test the limits of legality should be closely circumscribed.
With the development of the internet, internet vigilantism (netilantism) has emerged as a new phe... more With the development of the internet, internet vigilantism (netilantism) has emerged as a new phenomenon in recent years. While there are several qualitative studies explaining netilantism, there is little empirical research on public perceptions of netilantism. This paper aims to outline Hong Kong university students’ general perception of netilantism and investigate the differences between different roles in netilantism. By using empowerment theory as the theoretical framework, we will investigate whether internet vigilantes (netilantes) 1) perceive the criminal justice system as effective, 2) possess high levels of self-efficacy in the cyber world, and 3) tend to believe netilantism can achieve social justice. Findings support the proposition that human flesh search engine is an empowerment tool for the netilante enabling him/her to achieve his goal of social justice. Different roles in netilantism (i.e. bystander, vigilante, victim and none of the above roles) have different perceptions of netilantism and the criminal justice system. The results will be explained by studying two representative cases of netilantism - the “Government Official Molestation” case and the “Cat Abuse in Shun Tin Village” case from China and Hong Kong respectively.
This chapter provides an insight into cyber crowdsourcing in the
Greater China region. It will, f... more This chapter provides an insight into cyber crowdsourcing in the Greater China region. It will, firstly, define and then describe the origins of cyber crowdsourcing. Based on archival studies conducted in 2012, it will categorize cyber crowdsourcing cases between 2003 and 2012. It will then discuss the positive and negative impacts of cyber crowdsourcing and discuss the possibility of using cyber crowdsourcing in criminal investigations.
This chapter will discuss the nature of cybercrime. It will examine the limitations of laws and r... more This chapter will discuss the nature of cybercrime. It will examine the limitations of laws and regulations and constraints to cybercrime investigation. It will then discuss the formation of strategies aimed at cybercrime prevention. Central to our discussion will be the recognition that no one institution or sector is able to secure cyberspace on its own. Cyber security requires pluralistic solutions involving cross-national and cross-sector collaboration wherever possible, and independent, unilateral security measures when cooperative efforts prove elusive.
Australian Journal of Forensic Sciences, Jan 1, 2012
Reports have shown that Taiwan and China are attractive targets for cybercriminals. The special p... more Reports have shown that Taiwan and China are attractive targets for cybercriminals. The special political situation between the two countries has encouraged numerous cyber-attacks across the Taiwan Strait. Establishing an efficient investigation and prosecution ...
Cybercrime has become a world concern. According to unofficial statistics, the projected loss of ... more Cybercrime has become a world concern. According to unofficial statistics, the projected loss of cybercrime will reach USD 2 trillions by 2019 (Forbes 2016). It affects not only individual but also corporates and states as a whole. Its transnational and anonymity characters make it hard to investigate. The blurred line between national security and crime also contribute to the complexity in international collaboration on crime investigation. Among all the regions in the world, Asia has the most internet users. More than half of the internet users in the world are in Asia. The number of internet users in Asia has almost doubled since 2011 and is still increasing (Miniwatts Marketing Group 2016). The member countries of the Association of Southeast-Asia Nations (ASEAN) have definitely contributed significantly to the increase in internet users in Asia. The Association of Southeast-Asia Nations was formed in 1967 by Indonesia, Malaysia, the Philippines, Singapore, and Thailand to promote regional security and cooperation. It has ten member states now including Brunei, Cambodia, Indonesia, Laos, Malaysia, Burma, Philippines, Singapore, Thailand and Vietnam. All ASEAN member states have had a dramatic increase in internet subscribers. This is especially the case for countries like Myanmar, which has recently opened to the world and privatized the internet provider. Of course, the region has become a new field for hackers and cyber criminals.
Being an emerging cybercrime market, there is still limited research that looks into cybercrime and cyber security in the ASEAN region. What are the trends in and challenges of cybercrime in ASEAN? Are current conventions such as Council of Europe’s Convention on Cybercrime appropriate for ASEAN? What are the challenges faced by ASEAN countries when collaborating internationally against cybercrime? This chapter aims to answer these questions and to consider whether the strategies developed in the global north are relevant to ASEAN. This paper will provide an overview of cybercrime trends in ASEAN, assess current measures adopted by ASEAN countries in combatting cybercrime, and make policy recommendations to strengthen those measures.
Oxford Handbooks Online in Criminology and Criminal Justice, (Chief Editor) Michael Tonry, Oct 7, 2014
China’s well-documented rapid socio-economic changes, including largely unmanaged rural to urban ... more China’s well-documented rapid socio-economic changes, including largely unmanaged rural to urban migration, forms an important pressure on development of an adequate juvenile justice system. This chapter identifies and describes key normative principles which are said to underpin contemporary juvenile justice in China. The development of the modern legal framework is also elucidated. In later sections we identify and analyse the regulatory and organizational limits to the implementation of such principles in everyday practice. We argue that the principles stand as part of professional discourse, but remain a largely discursive phenomenon – impinging to a limited extent on the reality of juvenile justice processing in contemporary China.
http://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780199935383.001.0001/oxfordhb-9780199935383-e-72
Michalos AC (Ed.). Encyclopedia of Quality of Life and Well-Being Research. Springer, Dordrecht, Netherlands: Springer, pp 5218-5227, Mar 1, 2014
This chapter entry considers background and issues on public safety (crime/criminal justice) in T... more This chapter entry considers background and issues on public safety (crime/criminal justice) in Taiwan. It outlines a proposed framework of indicators in the context of the inter-play of policy, research and politics in Taiwan.
Uploads
Books by Lennon Chang
The book uses routine activity theory to analyse Chinese and Taiwanese legal responses to cybercrime, and reviews mutual assistance between the two countries as well as discussing third party cooperation. To prevent the spread of cybercrime, the book argues the case for a 'wiki' approach to cybercrime and a feasible pre-warning system. Learning from lessons in infectious disease prevention and from aviation safety reporting, Cybercrime in the Greater China Region proposes a feasible information security incident reporting and response system.
Academics, government agency workers, policymakers and those in the information security or legal compliance divisions in public and private sectors will find much to interest them in this timely study.
Contents: Foreword Preface Part I: Setting the Scene 1. Introduction 2. Risk, Routine Activity and Cybercrime Part II: New Crime in a New Field: Cybercrime in Taiwan and China 3. Cybercrime Across the Taiwan Strait Part III: Regulatory Responses Against Cybercrime Across the Taiwan Strait 4. Think Global, Act Glocal - 'Glocal' Responses to Cybercrime 5. Cooperation between Taiwan and China Part IV: Preventable Measures: Cybercrime as the Infectious Disease in the Virtual World 6. 'Wiki' Crime Prevention - Establishing a Pre-Warning System 7. Conclusion References Index
Papers by Lennon Chang
Greater China region. It will, firstly, define and then describe the origins of cyber crowdsourcing. Based on archival studies conducted in 2012, it will categorize cyber crowdsourcing cases between 2003 and 2012. It will then discuss the positive and negative impacts of cyber crowdsourcing and discuss the possibility of using cyber crowdsourcing in criminal investigations.
Book chapters by Lennon Chang
Among all the regions in the world, Asia has the most internet users. More than half of the internet users in the world are in Asia. The number of internet users in Asia has almost doubled since 2011 and is still increasing (Miniwatts Marketing Group 2016). The member countries of the Association of Southeast-Asia Nations (ASEAN) have definitely contributed significantly to the increase in internet users in Asia. The Association of Southeast-Asia Nations was formed in 1967 by Indonesia, Malaysia, the Philippines, Singapore, and Thailand to promote regional security and cooperation. It has ten member states now including Brunei, Cambodia, Indonesia, Laos, Malaysia, Burma, Philippines, Singapore, Thailand and Vietnam. All ASEAN member states have had a dramatic increase in internet subscribers. This is especially the case for countries like Myanmar, which has recently opened to the world and privatized the internet provider. Of course, the region has become a new field for hackers and cyber criminals.
Being an emerging cybercrime market, there is still limited research that looks into cybercrime and cyber security in the ASEAN region. What are the trends in and challenges of cybercrime in ASEAN? Are current conventions such as Council of Europe’s Convention on Cybercrime appropriate for ASEAN? What are the challenges faced by ASEAN countries when collaborating internationally against cybercrime? This chapter aims to answer these questions and to consider whether the strategies developed in the global north are relevant to ASEAN. This paper will provide an overview of cybercrime trends in ASEAN, assess current measures adopted by ASEAN countries in combatting cybercrime, and make policy recommendations to strengthen those measures.
http://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780199935383.001.0001/oxfordhb-9780199935383-e-72
The book uses routine activity theory to analyse Chinese and Taiwanese legal responses to cybercrime, and reviews mutual assistance between the two countries as well as discussing third party cooperation. To prevent the spread of cybercrime, the book argues the case for a 'wiki' approach to cybercrime and a feasible pre-warning system. Learning from lessons in infectious disease prevention and from aviation safety reporting, Cybercrime in the Greater China Region proposes a feasible information security incident reporting and response system.
Academics, government agency workers, policymakers and those in the information security or legal compliance divisions in public and private sectors will find much to interest them in this timely study.
Contents: Foreword Preface Part I: Setting the Scene 1. Introduction 2. Risk, Routine Activity and Cybercrime Part II: New Crime in a New Field: Cybercrime in Taiwan and China 3. Cybercrime Across the Taiwan Strait Part III: Regulatory Responses Against Cybercrime Across the Taiwan Strait 4. Think Global, Act Glocal - 'Glocal' Responses to Cybercrime 5. Cooperation between Taiwan and China Part IV: Preventable Measures: Cybercrime as the Infectious Disease in the Virtual World 6. 'Wiki' Crime Prevention - Establishing a Pre-Warning System 7. Conclusion References Index
Greater China region. It will, firstly, define and then describe the origins of cyber crowdsourcing. Based on archival studies conducted in 2012, it will categorize cyber crowdsourcing cases between 2003 and 2012. It will then discuss the positive and negative impacts of cyber crowdsourcing and discuss the possibility of using cyber crowdsourcing in criminal investigations.
Among all the regions in the world, Asia has the most internet users. More than half of the internet users in the world are in Asia. The number of internet users in Asia has almost doubled since 2011 and is still increasing (Miniwatts Marketing Group 2016). The member countries of the Association of Southeast-Asia Nations (ASEAN) have definitely contributed significantly to the increase in internet users in Asia. The Association of Southeast-Asia Nations was formed in 1967 by Indonesia, Malaysia, the Philippines, Singapore, and Thailand to promote regional security and cooperation. It has ten member states now including Brunei, Cambodia, Indonesia, Laos, Malaysia, Burma, Philippines, Singapore, Thailand and Vietnam. All ASEAN member states have had a dramatic increase in internet subscribers. This is especially the case for countries like Myanmar, which has recently opened to the world and privatized the internet provider. Of course, the region has become a new field for hackers and cyber criminals.
Being an emerging cybercrime market, there is still limited research that looks into cybercrime and cyber security in the ASEAN region. What are the trends in and challenges of cybercrime in ASEAN? Are current conventions such as Council of Europe’s Convention on Cybercrime appropriate for ASEAN? What are the challenges faced by ASEAN countries when collaborating internationally against cybercrime? This chapter aims to answer these questions and to consider whether the strategies developed in the global north are relevant to ASEAN. This paper will provide an overview of cybercrime trends in ASEAN, assess current measures adopted by ASEAN countries in combatting cybercrime, and make policy recommendations to strengthen those measures.
http://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780199935383.001.0001/oxfordhb-9780199935383-e-72