Cybercrime in the Greater China Region

Cybercrime in the Greater China Region

Regulatory Responses and Crime Prevention Across the Taiwan Strait

Lennon Yao-chung Chang

Cybercrime is a worldwide problem of rapidly increasing magnitude and, of the countries in the Asia Pacific region, Taiwan and China are suffering most. This timely book discusses the extent and nature of cybercrime in and between Taiwan and China, focussing especially on the prevalence of botnets (collections of computers that have been compromised and used for malicious purposes).

Chapter 3: Cybercrime across the Taiwan Strait

Lennon Yao-chung Chang

Subjects: asian studies, asian law, law - academic, asian law, corruption and economic crime, information and media law, internet and technology law, politics and public policy, terrorism and security


Taiwan and China are two countries which are highly computerized. Both have many internet users, and government agencies and business rely heavily on the Internet and computers. This makes Taiwan and China attractive targets for hackers. The special political situation between Taiwan and China and their often antagonistic relationship has encouraged the growth in malicious computer activities between them. It has been reported that both Taiwan and China have net-armies to hack into their respective counterpart government systems to conduct cyber espionage and to steal sensitive data (Mazanec, 2009; Schneier, 2008; Zhang, 2007). Websites of a sensitive political nature, such as those criticizing the ‘one China policy’ are usually the main targets for these crimes of a political nature. These include websites run by the Taiwan Tea Party which was mentioned earlier, and the website for the 2009 Kaohsiung Film Festival which screened the film ‘The 10 Condition’.2 They are commonly attacked by hackers from China (BBC, 2009; T. Z. Chen, 2002). This chapter will start by introducing the importance of Taiwan and China in cyberspace so as to understand the power of China and Taiwan in the cyber world and their cyber strategic position in the Asia-Pacific region

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information