Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention Across the Taiwan Strait
ŠProfessor Changės very thoughtful and impressively researched study of cybercrime in the greater China region is an invaluable contribution to the information and analyses available in this area. It not only provides important, and heretofore unavailable
What people are saying - Write a review
We haven't found any reviews in the usual places.
2 Risk routine activity and cybercrime
Cybercrime inTaiwan and China
3 Cybercrime across the Taiwan Strait
PART III Regulatory responses against cybercrime across the Taiwan Strait
4 Think global act glocal glocal responses to cybercrime
5 Cooperation between Taiwan and China
Other editions - View all
Cybercrime in the Greater China Region: Regulatory Responses and Crime ...
No preview available - 2014
Agreement APJ region argued bank bot programs bot-infected computers bot-master bot-net capable guardians CERTs Chapter CNCERT/CC CNNIC combating cybercrime command and control command-and-control servers commit competent authorities computer system Convention on Cybercrime Council of Europe countries crime investigation Criminal Law cyber attacks cyber criminals cybercrime investigation cyberspace DDoS attacks discussed enterprises established gatekeepers government agencies guan-xi Gunningham and Grabosky hackers hacking illegal access ILOVEYOU important incentives infected information security companies information security incidents information sharing infrastructure Internet service providers Internet users interviewees issue laws and regulations malicious activity malware measures mutual assistance offenders organized crime People’s Republic phishing Police officer pre-warning system private sector problem proprietary software prosecutors punishment pyramid regulatory reporting system Republic of China Routine Activity Theory self-regulation service providers similar spam surveillance Symantec Taiwan and China Taiwan Strait Taiwanese Government target telecommunication Trojan victims vulnerabilities