Cybercrime in the Greater China Region Regulatory Responses and Crime Prevention Across the Taiwan Strait
Regulatory Responses and Crime Prevention Across the Taiwan Strait
Chapter 7: Conclusion
The aim of the book was to identify the viability of regulatory responses to combat cybercrime and assist cybercrime prevention across the Taiwan Strait. It began with an account of the extent and nature of cybercrime between Taiwan and China. Guided by Routine Activity Theory, the book analysed legal responses, and third party cooperation that could be used as a substitute when there is a lack of official cooperation between Taiwan and China, to see if there are alternative capable guardians. It also suggested the desirability for a pre-warning system to build resilience and make targets less vulnerable. China has the largest number of Internet users in the Asia and Pacific region (the APJ region) and Taiwan has a very high proportion of its population using the Internet. China also has the highest volume of malicious computer activity among the countries of the APJ region and Taiwan had the highest percentage of malicious activity per person. The book finds that language and culture play important roles in facilitating cybercrime between Taiwan and China. Some malicious activities are disseminated through spam by people with social engineering skills. If a cyber criminal knows the culture of the target well, and employs the language that the user is familiar with, it is easier for the criminal to successfully persuade the target to open the email with a malicious code attached and become infected. Also, as shown in Chapter 2, some malware is specifically designed to attack only Chinese systems. Large information security companies invest limited resources to combat these threats.
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.