排序方式: 共有34条查询结果,搜索用时 31 毫秒
1.
Jaewoo Choo 《Asia Europe Journal》2009,7(3-4):389-404
Illuminating on the power transition theory, realists are more than convinced of potential structural conflicts in both economic and security realms due to China’s rise. They see China as a dormant source of challenges to American preeminence, economic policies of the west as evident in the recent negotiation discourses (e.g., G-20 and G-8 meetings), the “western” norms of diplomacy (e.g., Washington consensus) in developing countries including in Africa, and security concerns of its neighboring states. However, China will be able to avoid this claimed inevitability by abiding to peaceful ideas deeply embedded in “New Security Concept,” “peaceful rise theory,” “peaceful development” and a “harmonious world” doctrine. This paper argues that China will be able to rise peacefully because of the efficacy of practicing liberalism and constructivism at large in its diplomacy. China is increasingly and genuinely embracing shared norms and institutions, gradually gravitating East Asian regional order to its favor in the form of power constellation. 相似文献
2.
Niken Dwi Wahyu Cahyani Ph.D Kim‐Kwang Raymond Choo Ph.D. Nurul Hidayah Ab Rahman Ph.D. Helen Ashman Ph.D. 《Journal of forensic sciences》2019,64(1):243-253
Advances in technologies including development of smartphone features have contributed to the growth of mobile applications, including dating apps. However, online dating services can be misused. To support law enforcement investigations, a forensic taxonomy that provides a systematic classification of forensic artifacts from Windows Phone 8 (WP8) dating apps is presented in this study. The taxonomy has three categories, namely: Apps Categories, Artifacts Categories, and Data Partition Categories. This taxonomy is built based on the findings from a case study of 28 mobile dating apps, using mobile forensic tools. The dating app taxonomy can be used to inform future studies of dating and related apps, such as those from Android and iOS platforms. 相似文献
3.
4.
5.
Stephen Choo 《亚洲事务》2013,44(3):361-373
The Anglo-Nepali War of 1814 to 1816 was one of Britain's least distinguished military performances. It was just about a victory, but it produced no heroic feats and thus it was duly forgotten by the Victorians as it failed to fit into the cult of imperialism and the British Raj. But subsequently, as the exploits of Empire became unfashionable, the wars dear to the Victorians were forgotten. But the memory of the Anglo-Nepali War was resurrected as it formed an integral part of the enduring legend of the Gurkhas. 相似文献
6.
Jaewoo Choo 《East Asia》2006,23(3):91-106
It is a truism that Northeast Asian states could benefit very much if they were to cooperate in the energy security realm. However, to many, especially economists, their behaviour to this common sense solution has been bewildering: there has been simply no progress towards this end and it still remains a puzzle, even to many energy specialists. This article attempts to answer a simple question: Why do the Northeast Asian states, namely China, Japan, Korea, and Russia, not cooperate? For its analysis, the author of the article relies on content analysis of recently released official governmental long-term energy policy and strategy documents of these states, and notes that cooperation for energy security reasons at the regional level is conspicuously absent, which possibly implies a lack of desire and willingness to do so amongst themselves. The article, however, deliberately omits from its study Korea, simply because no such long-term energy policy exists today. It attributes the major cause to the strong propensity by energy specialists to interchangeably use the concepts of ‘energy cooperation’ and ‘energy security’ in their analysis. 相似文献
7.
Kim-Kwang Raymond Choo 《Trends in Organized Crime》2008,11(3):270-295
Three categories of organised groups that exploit advances in information and communications technologies (ICT) to infringe
legal and regulatory controls: (1) traditional organised criminal groups which make use of ICT to enhance their terrestrial
criminal activities; (2) organised cybercriminal groups which operate exclusively online; and (3) organised groups of ideologically
and politically motivated individuals who make use of ICT to facilitate their criminal conduct are described in this article.
The need for law enforcement to have in-depth knowledge of computer forensic principles, guidelines, procedures, tools, and
techniques, as well as anti-forensic tools and techniques will become more pronounced with the increased likelihood of digital
content being a source of disputes or forming part of underlying evidence to support or refute a dispute in judicial proceedings.
There is also a need for new strategies of response and further research on analysing organised criminal activities in cyberspace.
相似文献
Kim-Kwang Raymond ChooEmail: |
8.
9.
Andrew L.-T. Choo 《The Modern law review》1992,55(6):870-875
10.
Yee‐Yang Teing B.Sc. Ali Dehghantanha Ph.D. Kim‐Kwang Raymond Choo Ph.D. Tooska Dargahi Ph.D. Mauro Conti Ph.D. 《Journal of forensic sciences》2017,62(3):641-654
Researchers envisioned Storage as a Service (StaaS) as an effective solution to the distributed management of digital data. Cooperative storage cloud forensic is relatively new and is an under‐explored area of research. Using Symform as a case study, we seek to determine the data remnants from the use of cooperative cloud storage services. In particular, we consider both mobile devices and personal computers running various popular operating systems, namely Windows 8.1, Mac OS X Mavericks 10.9.5, Ubuntu 14.04.1 LTS, iOS 7.1.2, and Android KitKat 4.4.4. Potential artefacts recovered during the research include data relating to the installation and uninstallation of the cloud applications, log‐in to and log‐out from Symform account using the client application, file synchronization as well as their time stamp information. This research contributes to an in‐depth understanding of the types of terrestrial artifacts that are likely to remain after the use of cooperative storage cloud on client devices. 相似文献