Cybercrime in the Greater China Region
Show Less

Cybercrime in the Greater China Region

Regulatory Responses and Crime Prevention Across the Taiwan Strait

Lennon Yao-chung Chang

Cybercrime is a worldwide problem of rapidly increasing magnitude and, of the countries in the Asia Pacific region, Taiwan and China are suffering most. This timely book discusses the extent and nature of cybercrime in and between Taiwan and China, focussing especially on the prevalence of botnets (collections of computers that have been compromised and used for malicious purposes).
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 3: Cybercrime across the Taiwan Strait

Lennon Yao-chung Chang


Taiwan and China are two countries which are highly computerized. Both have many internet users, and government agencies and business rely heavily on the Internet and computers. This makes Taiwan and China attractive targets for hackers. The special political situation between Taiwan and China and their often antagonistic relationship has encouraged the growth in malicious computer activities between them. It has been reported that both Taiwan and China have net-armies to hack into their respective counterpart government systems to conduct cyber espionage and to steal sensitive data (Mazanec, 2009; Schneier, 2008; Zhang, 2007). Websites of a sensitive political nature, such as those criticizing the ‘one China policy’ are usually the main targets for these crimes of a political nature. These include websites run by the Taiwan Tea Party which was mentioned earlier, and the website for the 2009 Kaohsiung Film Festival which screened the film ‘The 10 Condition’.2 They are commonly attacked by hackers from China (BBC, 2009; T. Z. Chen, 2002). This chapter will start by introducing the importance of Taiwan and China in cyberspace so as to understand the power of China and Taiwan in the cyber world and their cyber strategic position in the Asia-Pacific region

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.