ªF§d¤j¾Ç±Ð®v±Â½Ò­p¹ºªí

Àɮײ£¥Í®É¶¡¡G2021/10/8 ¤W¤È 11:56:56
¥»ªí¦p¦³²§°Ê¡A©ó4¤p®É¤º¦Û°Ê§ó·s
¤@¡B½Òµ{°ò¥»¸ê®Æ Course Information
¬ì¥Ø¦WºÙ Course Title¡G
(¤¤¤å)©Ê¼É¤O¬ã¨s
(­^¤å)STUDIES IN SEXUAL ASSAULT
¶}½Ò¾Ç´Á Semester¡G110¾Ç¦~«×²Ä1¾Ç´Á
¶}½Ò¯Z¯Å Class¡GªÀ¤uºÓ¤@
±Â½Ò±Ð®v Instructor¡G¹ù¬ü½¬ LIU, MEI-LIN MIRIAM
¬ì¥Ø¥N½X Course Code¡GMSW66901 ³æ¥þ¾Ç´Á Semester/Year¡G³æ ¤À²Õ²Õ§O Section¡G
¤H¼Æ­­¨î Class Size¡G ¥²¿ï­×§O Required/Elective¡G¿ï ¾Ç¤À¼Æ Credit(s)¡G3
¬P´Á¸`¦¸ Day/Session¡G ¤@567¡@ «e¦¸²§°Ê®É¶¡ Time Last Edited¡G110¦~09¤ë21¤é10®É11¤À
ªÀ·|¤u§@¾Ç¨t(ºÓ¤h¯Z)°ò¥»¯à¤O«ü¼Ð Basic Ability Index
½s¸¹
Code
«ü¼Ð¦WºÙ
Basic Ability Index
¥»¬ì¥Ø¹ïÀ³¤§«ü¼Ð
Correspondent Index
¹F¦¨¸Ó¶µ°ò¥»¯à¤O¤§¦Òµû¤è¦¡
Methods Of Evaluating This Ability
1±j¤ÆªÀ·|¤u§@ªÌªº¹ê§@²[¾i»P¯à¤O¡C
Strengthen the knowledge and ability of social workers in direct practice and social administration.
¡´¡n½Ò°ó°Q½×»Pªí²{
¡n³ø§i(§t­Ó¤H©Î¤p²Õ¡B¤fÀY©Î®Ñ­±¡B±MÃD¡B³X°Ý¡BÆ[¹îµ¥§Î¦¡)
2«P¨Ï¦Û¤v©M¨ó§U¥L¤Hı¹î¦Û§Ú¡B´L­«¦h¤¸¤å¤Æ¤Î¨ã³ÆÃöÃh¥»¤gªº²[¾i¡C
Promote one¡¦s self-awareness and that of others, respect for multiculturalism, and concern for local issues.
¡´¡n¥X¯Ê®uª¬ªp
¡n½Ò°ó°Q½×»Pªí²{
¡n³ø§i(§t­Ó¤H©Î¤p²Õ¡B¤fÀY©Î®Ñ­±¡B±MÃD¡B³X°Ý¡BÆ[¹îµ¥§Î¦¡)
3¤ÀªRªÀ·|¬Fµ¦»P¸Ñ¨M°ÝÃDªº¯à¤O¡C
Strengthen the ability to analyze social policies and solve social problems.
¡´¡n½Ò°ó°Q½×»Pªí²{
¡n³ø§i(§t­Ó¤H©Î¤p²Õ¡B¤fÀY©Î®Ñ­±¡B±MÃD¡B³X°Ý¡BÆ[¹îµ¥§Î¦¡)
¡n§@·~¦¨ÁZ
4°ö¾iªÀ·|¤u§@ºÞ²zª¾¯à»P¾÷ºc»â¾É¯à¤O¡C
Enhance the ability for individuals in social work management and leadership in social work agencies.
  
5¤Ï¬M¡B§å§P»P¦æ°Êªº¯à¤O¡C
Cultivate the ability of students to reflect, think critically and take action.
¡´¡n¥X¯Ê®uª¬ªp
¡n½Ò°ó°Q½×»Pªí²{
¡n³ø§i(§t­Ó¤H©Î¤p²Õ¡B¤fÀY©Î®Ñ­±¡B±MÃD¡B³X°Ý¡BÆ[¹îµ¥§Î¦¡)
¡n§@·~¦¨ÁZ
¤G¡B«ü©w±Ð¬ì®Ñ¤Î°Ñ¦Ò¸ê®Æ Textbooks and Reference
(½Ð­×½Ò¦P¾Ç¿í¦u´¼¼z°]²£Åv¡A¤£±o«Dªk¼v¦L)
¡´«ü©w±Ð¬ì®Ñ Required Texts
1.Powell, A. & Henry, N. (2017). Sexual Violence in a Digital Age. London: Palgrave Macmillan.
2.Jeglic, E. L. & Calkins, C. (2016). Sexual Violence: Evidence Based Policy and Prevention. Switzerland: Springer.
3.Kelly, L. (1988). Surviving Sexual Violence. Cambridge: Polity.
4.Russell, D. (1986). The Secret Trauma: Incest in the Lives of Girls. Beverly Hills: Sage.
5.Scully, D. (1994). Understanding Sexual Violence: A Study of Convicted Rapists. London: Routledge.
6.Navarro, J., S. Clevenger, S. & C. Marcum (Eds). The intersection between intimate partner abuse, technology, and cybercrime. Canada: Carolina Academic Press.
7.Pearce, J. (Ed.) Child sexual exploitation: Why theory matters. Bristol, UK: Policy Press.

¡´°Ñ¦Ò®Ñ¸ê®Æº[ºô¸ô¸ê·½ Reference Books and Online Resources
Reading List:
1.Susan McLeanµÛ¡B±iªé²EĶ¡]2020¡^¡C¡mºô¸ô¥¢±±¡X±¡¦â°Ç¯Á¡Bºô¸ôÅQ­â¡B¹CÀ¸¦¨Å}µL©Ò¤£¦b!«Ä¤lªº¦w¥þ½Ö¨ÓÅU¡n¡C»O¥_¡G¦nÀu¡C
2.¼ï²Qº¡¡BªLªFÀs¡BªL¶®®e¡B³¯§ö®e¡]2017¡^¡C¡m105¦~«×¥xÆW°ü¤k¾D¨ü¿Ë±KÃö«Y¼É¤O²Î­p¸ê®Æ½Õ¬d¡n¡C½Ã¥ÍºÖ§Q³¡«OÅ@ªA°È¥q©e°U¬ã¨s³ø§i¡C
3.¹ù¬ü½¬¡]2020¡^¡C¡qºô¸ô©Ê»¤©ä¡X¨à¤Ö¼v¹³©Ê­é«d¹ê°È¬D¾Ô ¡r¡C¡m·í¥NªÀ·|¤u§@¾Ç¥Z¡n¡A11¡A1-31¡C¨ú¦Û¡Ghttps://reurl.cc/kd8EpG
4.¹ù¬ü½¬¡]2019¡^¡C¡q¨«¶i¼h¼h±K«Ç¡Ð¿Ë±KÃö«Y©Ê¼É¤Oªº©w¸qºA¼Ë¡B²±¦æ²v»P¤u§@¬D¾Ô¤§¤åÄm¦^ÅU¡r¡C¡mªF§dªÀ·|¤u§@¾Ç³ø¡n¡A37¡A81-118.
5.¤ý¯\¬Â¡B¨H¼yÂE¡B­³·R±ö(2021). ¿Ë±KÃö«Y¼É¤O¨¾ªv:²z½×¡B¬Fµ¦»P¹ê°È¡C»O¥_:¥¨¬y¡C
6.Sheley, E. (2018). A Broken windows theory of sexual assault enforcement. The Journal of Criminal Law and Criminology (1973-), 108(3) , 455-510.(57)
7.Vincent, N. (2017). Victims of cybercrime: definitions and challenges. In E. Martellozo & E. Jane (Eds), Cybercrime and its victims (pp.1-25). Oxon: Routledge. (21)(Ch1)
8.Martellozo, E. (2017). Online grooming: children as victims of online abuse. In E. Martellozo & E. Jane (Eds), Cybercrime and its victims (pp.108-128). Oxon: Routledge. (25)(Ch6)
9.Henry, N. & Powell, A. (2018). Technology-facilitated sexual violence: A literature review of empirical research. Trauma, Violence, and Abuse, 19(2), 195-208.
10.Megan K. Maas, M. K., Bray, B. C. & Noll, J.G. (2019). Online sexual experiences predict subsequent sexual health and victimization outcomes among female adolescents: A latent class analysis. Journal of Youth and Adolescence, 48:837-849.
11.Leary, G. M. (2016). The Language of Child Sexual Abuse and Exploitation. In C.B. Hessick (Ed), Refining Child Pornography Law: Crime, Language, and Social Consequence (pp.109-146). Michigan, USA: University of Michigan Press. (47)(Ch4)
12.Maddocks, S. (2018). From non-consensual pornography to image-based sexual Abuse: charting the course of a problem with many names. Australian Feminist Studies, 33(97), 345¡V361.
13.van Gijn-Grosvenor, E. L. & Lamb, M. E. (2016). Behavioural differences between online sexual groomers approaching boys and girls. Journal of Child Sexual Abuse, 25(5), 577-598. (21)
14.Scully, D. (1994). Nothing is Rape: justifying sexual violence. In D. Scully(Ed), Understanding Sexual Violence: A study of convicted rapists (pp.97-117).Oxon: Routledge. (20)(Ch4)
15.Russell, D. (1986). What actually happened? The characteristics of incestuous abuse. In D. Russell(Ed), The Secret Trauma: Incest in lives of girls and women (pp.92-101). Sage: Beverly Hills. (10)(Ch7)
16.Kellera, J., Mendesb, K. & Jessica Ringrosec (2018). Speaking ¡¥unspeakable things¡¦: documenting digital feminist responses to rape culture. Journal of Gender Studies, 27(1), 22-36.
17.Lamphere, R. & Pikciumas, K. (2016) Sexting, sextortion, and other internet sexual offenses. In J. Navarro, S. Clevenger & C. Marcum (Eds), The intersection between intimate partner abuse, technology, and cybercrime (pp.141-156). Canada: Carolina Academic Press. (16)(Ch7)
18.Powell, A. & Henry, N. (2017). Sexual violence: A feminist criminological analysis. In A. Powell & N. Henry (Eds), Sexual Violence in a Digital Age (pp.23-47). London: Palgrave. (25)(CH2)
19.Mathews, B. & Delphine Collin-Vezine, D. (2016). Child sexual abuse: Raising awareness and empathy is essential to promote new public health responses. Journal of Public Health Policy, 37(3), 304-314.
20.Smallbone, S. (2016) Situational prevention approaches. In E. Jeglic, & C. Calkins (Eds), Sexual Violence: Evidence Based Policy and Prevention (pp.145-160). Switzerland: Springer. (16) (Ch10)

¤T¡B±Ð¾Ç¥Ø¼Ð Objectives
¥»½Òµ{±N¥Ñ¤ß²z¡BªÀ·|¡B¤å¤Æ¼h­±¡A±a»â¾Ç¥Í¥Ñ©Ê§O¡B©Ê¨ú¦V¡B±Ú¸s¡B¶¥¯Åµ¥¦V«×¡A±´°Q¼É¤O§Î¦¨ªº¦]¯À¡A¨Ã³z¹L¤k©Ê¥D¸qªÀ·|¾ÇÆ[ÂI¡A±´°Q©Ê§O¼É¤O¬ÛÃöijÃD¡A§Æ±æ¹F¨ì¤U¦C½Òµ{¥Ø¼Ð¡G
1.ÂǥѤåÄm¾\Ū¡B«ä¿ì»P°Q½×¤åÄm¡AÀ°§U¦P¾ÇÁA¸Ñ©Ê¼É¤O°ÝÃD¤§¬ÛÃö²z½×¤Î½×­z¡C
2.±q²{¥N¤HªºÆ[©À¬Ý©Ê¼É¤O¡A±Òµo¦P¾Ç±q©Ê§Oµø¨¤À˵ø¦Û¨­ªº³B¹Ò¡AÀ˵ø¨â©ÊªºÅv¤Oµ²ºc»P¤å¤Æ¦A²{¡C
3.'©Ê¼É¤O³Q®`¤H'¥DÅé¦a¦ìªº½T»{»P¬Ù«ä¡AªÀ·|¤u§@±M·~¹ï'­Òij'ªººA«×»P¥i¯àªº¦ì¸m¡C


This course is designed to investigate the factors of sexual assault in terms of gender, sexual orientation, ethnic, class and other dimensions through psychological, social, and cultural aspects. By discussing issues related to gender-based violence adopting feminism sociological perspectives, the objectives of this course are as follows:
1) To facilitate students¡¦ understanding of sexual violence theories and its discourse;
2) to inspire students to examine their own situation from a gender perspective, as well as gender power structures and cultural reproduction;
3) to encourage students¡¦ ongoing reflection with the dominant position of sexual violence victims and to aware that advocacy is at the foundation of social work GVB practice.
¡@
¥|¡B½Òµ{¤º®e Course Description
¡´¾ãÅé±Ô­z Overall Description
**­×½Ò¾Ç¥Íª`·N¨Æ¶µ¡G
1.¥»½Òµ{©ó²Ä¤@¶g¿ï¥X2¦W¦P¾Ç¾á¥ô½Òµ{¤§¸q°È½Ò¥Nªí¡A­t³d¼v¦L»P¤À°t¾\Ū¤Î§ë¼v³]³Æ¤§²ÎÄw¦w±Æ¡C
2.Ãö©ó±MÃD¡]¤fÀY¡^³ø§i¡G­×½Ò¦P¾Ç½Ð©ó²Ä9~11¶g«e¿ï©w¥DÃD¨Ã´£¥XÀ˯Áªº¤åÄm»P±Â½Ò¦Ñ®v°Q½×¥DÃDªº¦X²z©Ê¡C­t³dµoªíªº¦P¾Ç¥²¶··Ç³ÆPPT»P´£¨ÑÅ¥²³³ø§i¯È¥»¤jºõ¡C
3.¨C¶g¤À°t¤åÄm¾ÉŪ¡A¾ÉŪ¦P¾Ç¶·©ó«e¤@¶g¥ý¤W¶ÇºK­n¡AºK­n¤º®eªº§¹¾ã«×¥ç§@¬°µû¤Àªº¨Ì¾Ú¤§¤@¡C­t³d¾ÉŪªº¦P¾Ç¶··Ç³ÆPPT¡A»P¦³Ãö¾ÉŪ¤å³¹ªº©µ¦ù/«Øij¾\Ū¡A¾ÉŪ³Ì«á¡A´£¥X1-2­Ó»P¥»½g¬ÛÃöªºÄ³ÃD¤Þ¾É¤j®a°Q½×¨Ã§@¬°µ²»y¡C
4.­×½Ò¦P¾Ç¨C¶g¤W½Ò«e½Ð¥ý¾\Ū·í¶g¤W½Òªº¤åÄm¡A¨Ã±q¤åÄm§ä¥X1-2­ÓijÃD°Q½×¡]½Ð¤Å´£»P½Ķ¬ÛÃöªº°ÝÃD©Î¬O²µª¦¡ªº´£°Ý³á¡I¡I¡^¡A©Î´£¥X¹ï¤å³¹ªº²z¸Ñ¡BÅGÃҩεûªR¡A¤S©Î¬O³sµ²¹ê°È®×¨Òªº¸gÅç¬ÒÅwªï¡C
5.¥»½Ò°ó¥Ñ©ó¥²¶·Ãöª`¦P¾ÇªºÁô¨p¡A¦b¥¼¸g¦P·N¤U¤£¯à¿ý­µ¡C
¡´¤À¶g±Ô­z Weekly Schedule
¶g¦¸ Wk ¤é´Á Date ½Òµ{¤º®e Content ³Æµù Note

1

9/20 ¤¤¬î¸`



°±½Ò¤@¦¸

2

9/27 1.½Òµ{¤¶²Ð»P½Òµ{´Á«Ý¡C
2.¤À¨É¬°¦ó¹ï©Ê¼É¤OijÃD¦³¿³½ì¡H¥H¤Î¹ï©Ê¼É¤O¦³¤°»ò¯AÂy¡H
3.¤¶²Ð°ê®a©Ê¼É¤O¨¾ªv¤u§@ªº¦æ¬F¬[ºc¡BªA°È¡C
4.¤À°t¾\Ū¡C

https://meet.google.com/tkq-fgts-dhi?authuser=0


1.µn°O¦L®Ñ¡C
2.¨C¶g¤åÄm¥Ñ¦P¾Ç(²Õ)½ü¬y¾ÉŪ¡A¨C¦ì¦P¾Ç¦Ü¤Ö¿ï¨Ãú¥æ3¶g¡]¦¸¡^¼¶¼gÈФW½Ò«eÈЪº¤åÄm¤ß±o³ø§i»P´£¥X2­Ó¬ã¨s°ÝÃD¡C¶g¤­«eú¥æ¡]¶}©ñMoodle§@·~°Ï¡^¡C
3.¿ï¥X¢±¦ì½Òµ{¥Nªí¡]µLµ¹Â¾¡^¡C

3

10/4 ¬ã¨s¥Í¡X¹ê²ßµoªí¼Æ¦ì¬ì§Þ-©Ê«I®`«¬ºAªººtÅÜ¡H

½u¤W±Â½Ò¡X±j¼É¤å¤Æ»P©Ê¼É¤O¥úÃÐ
Kelly, L. (1988) Surviving Sexual Violence. Cambridge: Polity.(Ch. 4,5,6)
¬ã¨s¥Í§d¨ÎêM¡XÀyÄÉ°òª÷·|¥x¥_¤À¨Æ°È©Ò¡C

4

10/11 Âù¬B¸`¸É°²
°±½Ò¤@¦¸

5

10/18 ¤åÄm¾ÉŪ»P°Q½×(¤@) ¬ì§Þ§Uªøªº©Ê¼É¤O
Henry, N. & Powell, A. (2018). Technology-facilitated sexual violence: A literature review of empirical research. Trauma, Violence, and Abuse, 19(2), 195-208. https://doi.org/10.1177%2F1524838016650189
 ¡@

6

10/25 ¤åÄm¾ÉŪ»P°Q½×(¤G) »r·Óªº¨tÃоÇ
Maddocks, S. (2018). From non-consensual pornography to image-based sexual Abuse: charting the course of a problem
with many names. Australian Feminist Studies, 33(97),
345¡V361.

¶·¦V¦Ñ®v­É®Ñ½Æ¦L¡C

7

11/1 ¤åÄm¾ÉŪ»P°Q½×(¤T) ©Ê¼É¤O©w¸q
Kelly, L. (1988) Surviving Sexual Violence. Cambridge: Polity.(ch4,5,6)
Ch6.¡¦ I¡¦m not sure what to call it but ¡K¡¦defining sexual violence.
¶·¦V¦Ñ®v­É®Ñ½Æ¦L¡C

8

11/8 ¤åÄm¾ÉŪ»P°Q½×(¥|) ¨àµ£©Ê«I®`
Azzopardi, C., Alaggia, R., & Fallon, B. (2017). From Freud to feminism: Gendered constructions of blame across theories of child sexual abuse. Journal of Child Sexual Abuse, 27(3), 254-275.
 ¡@

9

11/15 ¤åÄm¾ÉŪ»P°Q½×(¤­) ºô¸ô©Ê»¤©ä
¹ù¬ü½¬¡]2020¡^¡C¡qºô¸ô©Ê»¤©ä¡X¨à¤Ö¼v¹³©Ê­é«d¹ê°È¬D¾Ô ¡r¡C¡m·í¥NªÀ·|¤u§@¾Ç¥Z¡n¡A11¡A1-31¡C
Martellozo, E. (2017). Online grooming: children as victims of online abuse. In E. Martellozo & E. Jane (Eds), Cybercrime and its victims (pp.108-128). Oxon: Routledge. (25)(Ch6)
¶·¦V¦Ñ®v­É®Ñ½Æ¦L¡C

10

11/22 ¤åÄm¾ÉŪ»P°Q½×(¤») Groomers approach
van Gijn-Grosvenor, E. L. & Lamb, M. E. (2016). Behavioural differences between online sexual groomers approaching boys
and girls. Journal of Child Sexual Abuse, 25(5), 577-598.

Kloess, J. A., Beech, A. R., & Harkins, L. (2014) Online Child Sexual Exploitation: Prevalence, Process, and Offender Characteristics. Trauma, Violence, & Abuse, 15(2) 126-139.
¿ï©w±MÃDªº¥DÃD¡C

11

11/29 ¤åÄm¾ÉŪ»P°Q½×(¤C) ³Ð¶Ëª¾±¡
Hickle, K. (2019) Understanding trauma and its relevance to
child sexual exploitation. In J. Pearce (Ed.) Child sexual exploitation: Why theory matters. (pp. 151-172). Bristol: Policy Press. (Ch8)
ú¥æ±MÃD¥DÃD¡C

12

12/6 ¤åÄm¾ÉŪ»P°Q½×(¤K)½u¤WÅv¤O½×­z
Brickell, C. (2017). Theorising power online. In E. Martellozo & E. Jane (Eds), Cybercrime and its victims (pp.43-58). Oxon: Routledge. (Ch2)
 ¡@

13

12/13 ¹q¼v°Q½×  ¡@

14

12/20 ¤åÄm¾ÉŪ»P°Q½×(¤E)¿Ë±KÃö«Y©Ê¼É¤O
¹ù¬ü½¬¡]2019¡^¡C¡q¨«¶i¼h¼h±K«Ç¡Ð¿Ë±KÃö«Y©Ê¼É¤Oªº©w¸qºA¼Ë¡B²±¦æ²v»P¤u§@¬D¾Ô¤§¤åÄm¦^ÅU¡r¡C¡mªF§dªÀ·|¤u§@¾Ç³ø¡n¡A37¡A81-118.
Henry, N.; Flynn, A.; Powell, A. (2020). Technology-
Facilitated Domestic and Sexual Violence: A Review. Violence Against Women, 26(15-16), 1828¡V1854. doi:10.1177/1077801219875821
 ¡@

15

12/27 ¤åÄm¾ÉŪ»P°Q½×(¤Q) ºôµ¸¦X§@
Radcliffe, P., Roy, A.; Barter, C.; Tompkins, C.; Brooks, M. (2020). A qualitative study of the practices and experiences of staff in multidisciplinary child sexual exploitation partnerships in three English coastal towns. Social Policy & Administration, 54(7), 1215-1230. doi:10.1111/spol.12600
 ¡@

16

1/3 ¤åÄm¾ÉŪ»P°Q½×(¤Q¤@)¹w¨¾µ¦²¤
Sunde, N. & Sunde, I. M. (2021) Conceptualizing an AI-based Police Robot for Preventing Online Child Sexual Exploitation and Abuse : Part I ¡V The Theoretical and Technical Foundations for PrevBOT. Nordic Journal of Studies in Policing, 8(2), 1-21.
 ¡@

17

1/10 ±MÃDµoªí¡]¤@) ³ø§i¤H»P¦^À³¤H

18

1/17 ±MÃDµoªí¡]¤G¡^ ³ø§i¤H»P¦^À³¤H
¤­¡B¦Òµû¤Î¦¨ÁZ®Öºâ¤è¦¡ Grading
°t¤À¶µ¥Ø Items ¦¸¼Æ Times °t¤À¤ñ²v Percentage °t¤À¼Ð·Ç»¡©ú Grading Description
¥X®u 20%°£¯f°²©Î¦³¦Xªk©Êªº­ì¦]¥~¡A¯Ê®u¤@¦¸¦©¤­¤À¡C
±MÃDµoªí 30%1.´Á¥½±MÃDµoªí¡G¦Û¿ï¤@­Ó»P©Ê/§O¼É¤O¬ÛÃöijÃD¡A¶i¦æ¤åÄm¦^ÅU»Pºî­z¡]°w¹ï¦¹¤@ijÃD¡Aª¦®Þ·í«e°ê¤º¥~¬ÛÃö¤åÄm»P¬ã¨s¸ê®Æ¡A±q¬ã¨s°ÝÃD¡B¹ê°È»ù­È¡B·§©À½dÃ¥¡B²z½×Æ[ÂI¤ÀªR¤§¨¤«×§e²{»Pµo®i¡A¨Ã¤ÀªR¥Ø«e³o­ÓijÃD¦b¦U­Ó¼h­±¤Wªº«]­­»P¹ï¥¼¨Ó¨¾ªv¤u§@´£¥X·U¨ãÅ骺·Qªk·U¦n¡^¡A¤]¥i¥H±Ä¤p«¬ªº¹êÃÒ¬ã¨s¡C
2.´Á¥½±MÃD§@·~¡G¤fÀY³ø§iµ²§ô«á¡A¦A¨Ì·Ó¦^À³¤Hªº·N¨£°u­×¡A³Ì«áú¥æ§¹¾ãªº´Á¥½¯È¥»§@·~¡]´Á«Ý³Ì«á§ï¼g¦¨§ë½Z¤å³¹¡^¡C
¾ÉŪ¡]¤fÀY³ø§i¡^ 40%1.¨C¦ì±N­t³d¾ÉŪ¬ù2-3½g¤åÄm¡A¨Ã¹ï¿ïŪªº¤åÄm´£¥X©µ¦ù¾\Ū¸ê®Æ»PijÃD°Q½×¡C
2.­t³d¾ÉŪªº¦P¾Ç¡A¥²¶·´£«e¤@¶g´£¨Ñ¦P¾Ç¾ÉŪºK­n¡A¥H»²§U¦P¾Ç¾\Ū¡C
¾\Ū¤ß±o 10%¥ô¿ï3¶g¤W½Ò«e¤åÄm¾\Ū¼¶¼g¤å³¹µûªR(¬ù¤@­¶A4)¡C
°t¤À¤ñ²v¥[Á` 100%  
¤»¡B±Â½Ò±Ð®v½Ò·~»²¾É®É¶¡©MÁpµ¸¤è¦¡ Office Hours And Contact Info
¡´½Ò·~»²¾É®É¶¡ Office Hour
1.¶g¤T¤U¤È¬°»²¾É®É¶¡¡A«Ø½Ð¬ã¨s¥Í¥ý¥HEMAIL/²°T(0988337164)¹w¬ù¡C
2.½Òµ{¤¤¦p¦³¥ô¦óijÃD·Q¹ï¸Ü©Î¸ß°Ý, ¥çÅwªï³z¹Lemail°Q½×¡C
¡´Ápµ¸¤è¦¡ Contact Info
¬ã¨s«Ç¦aÂI Office¡GD704 EMAIL¡Gmiriammlliu@gmail.com
Ápµ¸¹q¸Ü Tel¡G¤À¾÷ 6368 ¨ä¥L Others¡G
¤C¡B±Ð¾Ç§U²zÁpµ¸¤è¦¡ TA¡¦s Contact Info
±Ð¾Ç§U²z©m¦W Name ³sµ¸¹q¸Ü Tel EMAIL ¨ä¥L Others
§d¨ÎêM cywu6011@gmail.com¦ý§U²z¤£¸ò½Ò («D½Ò°óªº§U±Ð)
¤K¡B«Øij¥ý­×½Òµ{ Suggested Prerequisite Course
´¿­×²ß»P¤k©Ê¥D¸q©Î©Ê«I®`¥DÃD¬ÛÃö½Òµ{ªº¦P¾Ç©Î¦³¬ÛÃö¹ê°È¸gÅçªÌ¸û®e©ö»P¥»½Òµ{¹ï¸Ü¡C(¦ý¨Ã«D¥²­n)
¤E¡B½Òµ{¨ä¥L­n¨D Other Requirements
1.¤£±Æ¥¸©À­ì¤å¸ê®Æ¡C
2.Åwªï¹ï©Ê¼É¤O¥DÃD·P¿³½ìªº¦P¾Ç¥[¤J¿ï­×¡C²Ä¤@¦¸¤W½Ò®É½Ð½Í½Í§A­Ó¤H­×³oªù½Òªº°Ê¾÷»P´Á«Ý¡A¦p¥»½Òµ{»P¦P¾Ç­Ó§O´Á«Ý/·Q¹³¤£²Å®É¡A½Ð¦P¾Ç¦Û¦æ§PÂ_¬O§_¯à±µ¨ü³oªù½Òµ{ªº¥ß³õ¡C
3.¼¶¼g¬ã¨s³ø§iªº®æ¦¡¶·ª`·N¡G±ÄAPA®æ¦¡¡B¹q¸£¥´¦r¡A»²¥H«Ê­±¡]µù©ú½Òµ{¦WºÙ¡B§@·~ÃD¥Ø¡B¦W¦r¡B¾Ç¸¹¡B¤é´Áµ¥¡^¡A¨Ã·Ç®Éú¥æ¡A«Y¬°²Å¦X¥»½Òµ{«~½è­n¨Dªº§@·~À³³Æªº±ø¥ó¡C¦¹¥~¡AºëÅP¦a¤Þ¸g¾Ú¨å¡A¥[¤W­Ó¤H¨£¸Ñ¡A¬O¼¶¼g¾Ç³N³ø§i¤§°ò¥»¯µ³Z¡C
3.¥Ñ©ó½Ò°ó¤¤ªº¤À¨É¥i¯à·|¯A¤Î­Ó¤H/©Î³æ¦ìªºÁô¨p¡A¦]¦¹­ì«h¤W¤£§Æ±æ¥¼¸g¦P·N¦Ó¾Õ¦Û¿ý­µ¡C­Y¦³¥²¶·¿ý­µªº­ì¦]¡A¥²¶·¥ý¸g¹L¦Ñ®v»P¦P¾Ç¦P·N¡C
¤Q¡B¾Ç®Õ±Ð§÷¤Wºô¤Î±Ð®v­Ó¤Hºô§} University¡¦s Web Portal And Teacher's Website
¾Ç®Õ±Ð§÷¤Wºôºô§} University¡¦s Teaching Material Portal¡G
ªF§d¤j¾ÇMoodle¼Æ¦ì¥­¥x¡Ghttp://isee.scu.edu.tw
ªF§d¤j¾ÇTronclass¦æ°Ê¼Æ¦ì¥­¥x¡Ghttps://tronclass.scu.edu.tw
±Ð®v­Ó¤Hºô§} Teacher's Website¡G
¨ä¥L Others¡G
¤Q¤@¡B­pµeªí¤½¥¬«á²§°Ê»¡©ú Changes Made After Posting Syllabus