Cybercrime in the Greater China Region

Cybercrime in the Greater China Region

Regulatory Responses and Crime Prevention Across the Taiwan Strait

Lennon Yao-chung Chang

Cybercrime is a worldwide problem of rapidly increasing magnitude and, of the countries in the Asia Pacific region, Taiwan and China are suffering most. This timely book discusses the extent and nature of cybercrime in and between Taiwan and China, focussing especially on the prevalence of botnets (collections of computers that have been compromised and used for malicious purposes).

Chapter 5: Cooperation between Taiwan and China

Lennon Yao-chung Chang

Subjects: asian studies, asian law, law - academic, asian law, corruption and economic crime, information and media law, internet and technology law, politics and public policy, terrorism and security


As discussed in Chapter 4, the issue of dual-criminality is not a significant problem between Taiwan and China. Both Taiwan and China have similar laws against cybercrime, and these laws are also consistent with the Council of Europe’s Convention on Cybercrime. However, domestic laws are only partial measures for controlling cybercrime. As Grabosky argued, ‘[t]he challenge of investigating (and prosecuting) cybercrime when it occurs in one’s own jurisdiction is daunting enough. When a cybercrime originates on the other side of the world, the problems are compounded’ (Grabosky, 2007:76). Both the UN and the Council of Europe emphasize the importance of international cooperation in addressing transnational/cross-border issues. The International Telecommunication Union (ITU), reflecting the principles of the Convention on Cybercrime, states that international cooperation should be built directly between States and/or with international organizations (2009:23). However, the political circumstances between Taiwan and China are a

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information