References
- Brenner, S., 2009. Cyberthreats: the emerging fault lines of the national state. Oxford: Oxford University Press.
- Brenner, S., 2010. Cybercrime: criminal threats from cyberspace. Santa Barbara, CA: Praeger.
- Bullwinkel, J.G., 2005. International cooperation in combating cyber-crime in Asia: existing mechanisms and new approaches. In: R. Broadhurst and P. Grabosky eds. Cyber-crime: the challenge in Asia. Hong Kong: Hong Kong University Press, 269–302.
- Chang, G.L., 2010. Mutual assistance between Taiwan and China: It is still difficult to repatriate criminals. Chinatimes, Available from http://news.chinatimes.com/CMoney/News/News-Page-content/0,4993,11050701+122010010300163,00.html [Accessed 3 January 2010]. 3 Jan
- Chang, Y.C., 2009. ‘Wiki’ crime prevention – What routine activity theory teaches us about cybercrime prevention. Journal of criminology, 12 (2), 87–116.
- Chang, Y.C., 2011. Cyber conflict between Taiwan and China. Strategic insights, 10 (1), 26–35.
- Chang, L.Y.C., 2012. Cybercrime in the Greater China region: regulatory responses and crime prevention across the Taiwan Strait. Cheltenham: Edward Elgar.
- Chang, Y.C., and Urbas, G., 2011. The prevalence of botnets in Taiwan and China. Paper presented at the Defense Science Research Conference and Expo (DSR), 2011, Singapore.
- Chao, Y., 2010. Google attacks used addresses based in Taiwan. Taipei Times, 16 Jan. Available from: http://www.taipeitimes.com/News/front/archives/2010/01/16/2003463643 [Accessed 15 March 2010].
- Chen, R., and Wang, J.S., 2009. From the “Kinmen Agreement” to the “Agreement on Cross-Strait Mutual Assistance in Crime Matters”. Fu-Jen law journal, 99, 51–55.
- China Review News, 2010. Great success on mutual assistance against crime matters. China Review News, 15 Sep. Available from: http://www.chinareviewnews.com/doc/1014/4/6/7/101446763.html?coluid=7&kindid=0&docid=101446763 [Accessed 22 February 2011].
- ChinaTimes, 2012a. China hacks Taiwan's coast guard. ChinaTimes, 8 July. Available from: http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20120708000008&cid=1101 [Accessed 23 August 2012].
- ChinaTimes, 2012b. Taiwan has second-most botnets is the world: Symantec. ChinaTimes, 18 May. Available from: http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20120518000055&cid=1103&MainCatID=11 [Accessed 23 August 2012].
- CNCERT/CC, 2012. 2011 CNCERT/CC annual report. Beijing: CNCERT/CC.
- Crime Investigation Bureau, 2004. Taiwanese hackers, cooperating with Chinese hackers, hacked into banking systems in Taiwan [online] Crime Investigation Bureau, Republic of China. Available from: http://www.cib.gov.tw/news/news01_2.aspx?no=419 [Assessed 25 August 2012].
- Epochtimes, 2007. Taiwan online game server hacked by Chinese hacker. Epochtimes, 6 Oct. Available from: http://www.epochtimes.com/b5/7/10/6/n1858889.htm [Accessed 23 August 2012].
- Epochtimes, 2010. The official website of the National Security Bureau was attacked 12 times per minute. Epochtimes, 25 Nov. Available from: http://www.epochtimes.com/b5/10/11/16/n3085823.htm [Accessed 22 August 2012].
- Gerspacher, N., 2008. The history of international police cooperation: a 150-year evolution in trends and approaches. Global crime, 9 (1), 169–184. 10.1080/17440570701862892
- Gold, T., Guthrie, D., and Wank, D., 2002. An introduction to the study of guanxi. In: T. Gold, D. Guthrie and D. Wank eds. Social connections in China: institutions, culture, and the changing nature of Guanxi. Cambridge: Cambridge University Press, 1–13.
- Hagestad, W., 2012. 21st century Chinese cyberwarfare. Cambridgeshire: IT Governance.
- Hsieh, L.K., 2003. Money-laundry in Taiwan and China—legal responses and mutual assistance. Tao-Yuan: Central Police University Press.
- Huang, J.P., 2006. Chinese net-army again stormed the Ministry of National Defence. AppleDaily, 15 May. Available from: http://tw.nextmedia.com/applenews/article/art_id/2609544/IssueID/20060515 [Accessed 22 August 2012].
- Huaxia, 2007. The Kinmen Agreement is becoming an important foundation for sending back the stowaway. Huaxia, 23 Aug. Available from: http://hk.huaxia.com/thpl/wzzdlj/2007/08/34796.html [Accessed 25 August 2012].
- Information Warfare Monitor, 2009. Tracking GhostNet: investigating a cyber espionage network. , Canada: Information Warfare Monitor.
- ITU, 2009. ITU toolkit for cybercrime legislation. Geneva: International Telecommunication Union.
- Jacobs, J.B., 1979. A preliminary model of particularistic tie in Chinese political alliance: Kan-ch'ing and kuan-hsi in a rural Taiwanese township. China quarterly, 78, 237–273. 10.1017/S0305741000040467
- Jen, M.H., 2009. Mutual assistance between Taiwan and China. C.I.B.: institutionalised the collaboration of combating crime. Central News Agency, 26 Apr . Available from: http://www.rti.com.tw/big5/topic/2009/0426/news_090426-07.aspx [Accessed 22 August 2012].
- Jiang, J.Y., 2009. Issues of hacking and extradition will all be included in the Jiang-Chen Meeting. Haixiainfo, 31 Mar. Available from: http://www.haixiainfo.com.tw/44565.html [Accessed 27 August 2012].
- King, A.Y.-C., 1991. Kuan-hsi and network building: a sociological interpretation. Daedalus, 120 (2), 63–84.
- Krekel, B., 2009. Capability of the People's Republic of China to conduct cyber warfare and computer network exploitation. McLean, VA: Northrop Grumman Corporation.
- Lee, H.F., and Wu, J.H., 2009. Judicial mutual assistance safeguards the rights and interests of citizens in both sides. Xinhuanet, 29 Dec. Available from: http://news.xinhuanet.com/tw/2009-12/30/content_12728447.htm [Accessed 22 August 2012].
- Libbenga, J., 2008. Neo-Nazi forum hacked. The Register, 1 Sep. Available from: http://www.theregister.co.uk/2008/09/01/neo_nazi_forum_hacked [Accessed 22 August 2012].
- Lin, N.S., 2011. DPP accused Chinese hacker for stealing information. BBC, 10 Aug. Available from: http://www.bbc.co.uk/zhongwen/simp/chinese_news/2011/08/110809_tw_dpp_hacked.shtml [Accessed 25 August 2012].
- Liu, J.B., 2012. Direct-General of the National Police Agency invited to visit China again. Central News Agency, 5 Sep. Available from: http://tw.news.yahoo.com/%E8%AD%A6%E6%94%BF%E7%BD%B2%E9%95%B7%E7%8E%8B%E5%8D%93%E9%88%9E-%E8%B5%B4%E9%99%B8%E5%8F%83%E8%A8%AA-223609037.html [Accessed 6 September 2012].
- Mazanec, B.M., 2009. The art of (cyber) war [online]. Available from: http://www.securityaffairs.org/issues/2009/16/index16.php [Accessed 22 August 2012].
- Morse, J.M., 1995. The significance of saturation. Qualitative health research, 5, 147–149. 10.1177/104973239500500201
- Schneier, B., 2008. The truth about Chinese hackers [online]. Discovery. Available from: http://dsc.discovery.com/technology/my-take/computer-hackers-china.html [Accessed 27 August 2012].
- Shau, J.M. et al., 2005. The evolution of crime. Beijing: Peking University Press.
- SinaNews, 2009. 38,936 Persons have been repatriated under the Kinmen Agreement. SinaNews, 10 Feb. Available from: http://news.sina.com/c/2009-02-11/111617192947.shtml [Accessed 10 January 2010].
- Smart, A., 1993. Gift, bribes, and guanxi: a reconsideration of Bourdieu's social capital. Cultural anthropology, 8 (3), 388–408. 10.1525/can.1993.8.3.02a00060
- Smith, R., Grabosky, P., and Urbas, G., 2004. Cyber criminals on trial. Cambridge: Cambridge University Press.
- Symantec, 2007. Symantec APJ Internet security threat report XII: trend for January-June 2007. Cupertino, CA: Symantec Corporation.
- Symantec, 2008. Symantec APJ Internet security threat report XIII: trend for July-December 2007. Cupertino, CA: Symantec Corporation.
- Tong, W.S., 2009. An analysis on the judicial agreement between Taiwan and China. EpochTimes, 3 May. Available from: http://www.dajiyuan.com/b5/9/5/3/n2514809.htm [Accessed 10 August 2012].
- Toy, M.-A., 2009. Chinese hack into film festival site. The Age, 26 July. Available from: http://www.theage.com.au/national/chinese-hack-into-film-festival-site-20090725-dwvx.html [Accessed 5 September 2012].
- United Nations, 1990. Resolution adopted by the General Assembly on the model treaty on mutual assistance in criminal matters (A/RES/45/117) [online]. United Nations. Available from: http://www.un.org/documents/ga/res/45/a45r117.htm [Accessed 10 July 2012].
- Wines, M., 2011. Nearly 600 arrested in Asian Swindling Ring. New York Times, 10 June. Available from: http://www.nytimes.com/2011/06/11/world/asia/11taiwan.html [Accessed 20 September 2011].
- Xinhua, 2011. China “biggest victim” of cyber attacks. Hinhua, 22 Aug. Available from: http://big5.china.com.cn/gate/big5/ml.china.com.cn/html/guanzhu/20110812/1558.html [Accessed 22 August 2012].
- Xu, S.C., 2009. Over 3,100 cyber attacks towards Taiwanese Government System were originated by Chinese cyber army. Liberty Times, 24 Mar. Available from: http://www.libertytimes.com.tw/2009/new/mar/24/today-fo2.htm [Accessed 22 August 2012].
- Yang, M.M., 1988. The modernity of power in the Chinese socialist order. Cultural anthropology, 3 (4), 408–427. 10.1525/can.1988.3.4.02a00050
- Zhang, H.Y., 2007. Taiwanese net-armies are targeting China. People, 1 Nov. Available from: http://tw.people.com.cn/BIG5/88649/6468348.html [Accessed 25 August 2012].