Hai-Cheng Chu

Hai-Cheng Chu
National Taichung University of Education · Department of International Business

About

15
Publications
2,079
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
140
Citations
Citations since 2016
1 Research Item
80 Citations
2016201720182019202020212022051015
2016201720182019202020212022051015
2016201720182019202020212022051015
2016201720182019202020212022051015

Publications

Publications (15)
Article
Radio Frequency Identification (RFID) technology provides a seamless link between physical world and the information system in cyber space. However, the emerging Internet of Things and cloud systems are full of security holes, which introduce new challenging security problems in both tag identification and data privacy. In this paper, we present ef...
Article
Nowadays, the on-line Instant Messaging (IM) is extensively utilized from leisure purposes to business-oriented missions, which undoubtedly plays an essential role in contemporary digital era. There are several popular IM tools available in the digital communities. Hence, the spirit of the research is focusing on the discovery of digital traces in...
Article
Unquestionably, the proliferation of mobile devices has dominated the main streams in contemporary ubiquitous wireless networks. Unfortunately, the misappropriating of those state-of-the-art gadgets has resulted in unprecedented information security issues in next generation cyberspace security arena. This paper illustrates the essence of generic p...
Article
As Android Operating System (OS) for mobile computing devices become one of the major trends, the utilization of smartphones set the record for global users and they are taking advantages of the contemporary Instant Messaging (IM) as a convenient tool to communicate with global users in real time because of its competitive rate, high availability,...
Article
Unquestionably, networked multimedia smart devices are commonly adopted in contemporary ubiquitous wireless computing era with unprecedented evolving pace in terms of mobility, portability, and pervasiveness. Regrettably, those technology-oriented gadgets are phenomenally exploited by cyber criminals or get involved in computer-related incidents un...
Article
The rapid proliferation of Radio Frequency IDentification (RFID) systems realizes integration of physical world with the cyber ones. One of the most promising is the Internet of Things (IoT), a vision in which the Internet extends into our daily activities through wireless networks of uniquely identifiable objects. Given that modern RFID systems ar...
Conference Paper
The purpose of this article is to incubate the establishment of semantic web services for next generation academic electronic library via Web 3.0. The e-library users will be extremely beneficial from the forthcoming semantic social web mechanism. Web 3.0 will be the third generation of WWW and integrate semantics web, intelligent agent, and Distri...
Article
Social Networking Service (SNS) emerges to be one of the most promising directions of web applications re- garding the next generation of Internet technology evolutions. Substantively, innumerable global on-line community members share common interests with each other via the User Gener- ated Content (UGC) platforms. Facebook is one of them and it...
Article
Full-text available
Cyberterrorism has become a hotly debated research issue in the past decades because of the convergence of mobile computing powers and the fledging multimedia communication computing capabilities. Cyberterrorism is the exploitation of computer network tools to incur malfunction or shut down critical infrastructures with several keyboard punches, wh...
Conference Paper
As mobile computing devices becomes pervasive, more and more civilians deposit precious information in mobile phones than desk top PCs especially for Global Logistics Management operators, who heavily depend on Global Position System in order to effectively and efficiently fulfill just-in-time delivery. In this paper, an embedded Global Position Sy...
Article
Portable electronic communication devices can be used for many purposes and they are capable of integrating with ubiquitous computing (UC) infrastructures to carry on mobile multimedia communications. As those devices become prevalent, they incur potential network security threatening to organizations. Nowadays, the Skype is the most popular P2P Vo...
Article
This issue is one of a pair of coordinated special issues on digital forensics by IEEE Security & Privacy and IEEE Signal Processing Magazine. S&P's special issue has articles debating the effectiveness of forensics, on capturing live forensics analysis of computers, on the new Microsoft Office file formats and their implications on forensics, on l...
Article
Full-text available
Innumerable firms are extensively integrating state-of-the-art ICT to boost the competitiveness of the organizations in all aspects. Simultaneously, the unprecedented availability of UC networks and mobile devices are exponentially growing. Unfortunately, based on the current voluminous computer crime incidents, the ICT deployments under UC infrast...
Article
Mobile communication devices are commonly adopted in contemporary Internet Communication Technology (ICT) era with unparalleled evolving pace. Regrettably, ICT related cybercrimes are rising in an unprecedented speed. Unquestionably, the detection and prevention of the associate information security incidents becomes much more urgent and unarguable...
Article
Full-text available
It is an urgent, imminent and present danger that we have to focus on the traditional terrorists, who are transforming ICT into the modern attacking tools that can devastate the metropolitan areas with the deconstruction of critical infrastructures via the computer network using state-of-the-art hacking and cracking technologies. The cyber terroris...

Network

Cited By