Cybercrime in the Greater China Region

Cybercrime in the Greater China Region

Regulatory Responses and Crime Prevention Across the Taiwan Strait

Lennon Yao-chung Chang

Cybercrime is a worldwide problem of rapidly increasing magnitude and, of the countries in the Asia Pacific region, Taiwan and China are suffering most. This timely book discusses the extent and nature of cybercrime in and between Taiwan and China, focussing especially on the prevalence of botnets (collections of computers that have been compromised and used for malicious purposes).

Chapter 7: Conclusion

Lennon Yao-chung Chang

Subjects: asian studies, asian law, law - academic, asian law, corruption and economic crime, information and media law, internet and technology law, politics and public policy, terrorism and security

Extract

The aim of the book was to identify the viability of regulatory responses to combat cybercrime and assist cybercrime prevention across the Taiwan Strait. It began with an account of the extent and nature of cybercrime between Taiwan and China. Guided by Routine Activity Theory, the book analysed legal responses, and third party cooperation that could be used as a substitute when there is a lack of official cooperation between Taiwan and China, to see if there are alternative capable guardians. It also suggested the desirability for a pre-warning system to build resilience and make targets less vulnerable. China has the largest number of Internet users in the Asia and Pacific region (the APJ region) and Taiwan has a very high proportion of its population using the Internet. China also has the highest volume of malicious computer activity among the countries of the APJ region and Taiwan had the highest percentage of malicious activity per person. The book finds that language and culture play important roles in facilitating cybercrime between Taiwan and China. Some malicious activities are disseminated through spam by people with social engineering skills. If a cyber criminal knows the culture of the target well, and employs the language that the user is familiar with, it is easier for the criminal to successfully persuade the target to open the email with a malicious code attached and become infected. Also, as shown in Chapter 2, some malware is specifically designed to attack only Chinese systems. Large information security companies invest limited resources to combat these threats.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information