In this well-researched study. . . Dr Lennon Chang tackles the topic head-on with in-depth technical and legal analyses backed up by a wide range of interviews with internet professionals in both the private and public sectors and law enforcement. It is an accessible paper that is simple enough to understand for IT and legal novices, and detailed enough to be useful for experts. -- Howard Shih, Law Society Journal This really quite exciting book from Edward Elgar plies it way through vast areas of uncharted waters in the international fight against cybercrime. Its a work of original research which will go some way to establishing a common understanding internationally, of how to combat what has become a global problem calling for a global solution and thus requiring a greater degree of cross-border cooperation between nation states. . . Anyone interested in, or involved with cybercrime related issues, from lawyers to sociologists, criminologists and of course IT professionals will be fascinated by this book. . . As a research tool alone, this book has certainly earned its place in every professional and academic library. -- Phillip Taylor MBE and Elizabeth Taylor, The Barrister Magazine Professor Changs very thoughtful and impressively researched study of cybercrime in the greater China region is an invaluable contribution to the information and analyses available in this area. It not only provides important, and heretofore unavailable data, about the incidence and nature of cybercrime in this region, it also offers insightful suggestions into how this problem can most effectively be controlled. It belongs in the library of anyone interested in this area. -- Susan Brenner, University of Dayton, US East Asia is a heartland of the variegated scams of the cybercrime problem. Yao Chung Changs book is an innovative application of routine activity theory and regulatory theory to cybercrime prevention across the cybergulf between China and Taiwan. The long march through the scams and across the Taiwan Strait is fascinating. Chang leads us to ponder a wiki cybercrime prevention strategy that might work in such treacherous waters. -- John Braithwaite, Australian National University