Regulatory Responses and Crime Prevention Across the Taiwan Strait
Chapter 6: ‘Wiki’ crime prevention - establishing a pre-warning system
In previous chapters, we have discussed the difficulties confronting mutual assistance between Taiwan and China when combating cybercrime. Although there is no official mutual assistance treaty between Taiwan and China, there are some alternative options in terms of mutual assistance. For example, there is currently collaboration between the Red Cross Society, the Straits Exchange Foundation, and the Association for Relations across the Taiwan Straits. Additionally, some large companies collaborate in crime investigation and evidence collection. However, these alternatives still have their limitations and they also rely heavily on a favourable prevailing political situation. They might not be as efficient, effective, or as reliable as they appear. Beccaria (1819) states that even severe penalties will not deter a criminal if that criminal believes that prosecution or conviction will be unlikely. According to this theory, any threat of punishment is likely to do little to deter cyber criminals from offending between Taiwan and China. That is because cyber criminals know there is very little chance that they will be arrested and prosecuted as cooperation between Taiwan and China is weak. Learning from Routine Activity Theory, the lack of strong capable guardians, such as inconsistencies in laws, or a lack of cooperation between police or counter-intelligence agencies from both sides, are factors explaining why cybercrime takes place between Taiwan and China. The absence of a capable guardian provides criminals with a greater incentive to commit cybercrime.
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.