Abstract
The authors would like to thank Peter Grabosky, Roderic Broadhurst, Brigitte Bouhours, Mamoun Alazab, and Steve Chon for their advice and comments on an earlier draft.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Bibliography
Brenner, S. (2006) “Cybercrime Jurisdiction,” Crime, Law and Social Change 46 (4–5): 189–206.
Brantingham, P. J. and Faust, F. L. (1976) “A Conceptual Model of Crime Prevention,” Crime & Delinquency 22: 284–96.
Chang, Y. C. (2012) Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention Across the Taiwan Strait, Cheltenham, UK: Edward Elgar Publishing Limited.
China Internet Network Information Centre (2012) Research Report on Information Safety Status of Chinese Internet Users in 2012, Beijing: China Internet Network Information Centre.
Cohen, L. E. and Felson, M. (1979) “Social Change and Crime Rate Trends: A Routine Activity Approach,” American Sociological Review 44: 588–608.
Dong, L., Ma, W. F. and Yang, Y. J. (2012) “Lack of Effective Means in Crackdown Online Shopping Fraud Crime,” Yangcheng Evening News, 3 September, A8.
Grabosky, P. (2007) “The Internet, Technology, and Organized Crime,” Asian Journal of Criminology 2 (2): 145–61.
Gu, J. (2013) “Online Fraud Accounts for 46.1% of Cyber Criminal Cases in 2012,” http://news.xinhuanet.com/fortune/2013-01/23/c_124271076.htm (accessed 16 July 2013).
Li, X. G. (2008) “The Criminal Phenomenon on the Internet: Hallmarks of Criminals and Victims Revisited through Typical Cases Prosecuted,” University of Ottawa Law & Technology Journal 5 (1–2): 125–40.
Li, Z., Jin, C. X., Zhang, F. J. and Yang, M. (2011) “Survey and Analysis on Cybercrime from 2007–2010 in Suzhou City,” Journal of Criminal Science 10: 120–7.
Ma, X. (2013) “Eliminate Local Protectionism, Consistent Fighting Against Illegal Activities such as Infringing upon Intellectual Rights and Manufacturing and Marketing Fake Commodities,” http://www.ipraction.cn/2013/02/16/ARTI1361008468220148.shtml (accessed 10 October 2013).
Macrum, C. D., Higgins, G. E. and Tewksbury, R. (2012) “Incarceration or Community Placement: Examining the Sentences of Cybercriminals,” Criminal Justice Studies 25 (1): 33–40.
Statement by the Chinese Delegation on the International cooperation Issue at the 1st UN Expert Group Meeting on Cybercrime (2011) http://www.chinesemission-vienna.at/chn/hyyfy/t790751.htm (accessed 22 September 2013).
United Nations (2003) Resolution adopted by the General Assembly 57/239. Creation of a Global Culture of Cybersecurity (A/RES/57/239), New York: United Nations.
United Nations (2004) United Nations Convention Against Transitional Organized Crime and the Protocols Thereto, New York: United Nations, http://www.unodc.org/documents/treaties/UNTOC/Publications/TOC%20Convention/TOCebook-e.pdf (accessed 12 February 2015).
Van Dijk, J. J. M. and De Waard, J. (1991) “A Two-dimensional Typology of Crime Prevention Projects; With a Bibliography,” Criminal Justice Abstracts 23 (3): 483–503.
Wei, Y. Z. (2013) 2012 Annual Report on Cybercrime in China, Beijing: Chinese People’s Public Security University, Policing Reform and Development Research Centre.
Zeng, C. and Wang, X. (2012) “Preliminary Results Were Achieved in Cracking Down Cybercrime by Hubei Police: 2670 Suspects Captured,” http://www.chinanews.com/fz/2012/10-23/4270201.shtml (accessed 18 June 2013).
Zhang, J. X. and Zhang, Y. N. (2005) “Sharply Increasing Cybercrime Starts to Merge with Traditional Crime,” http://www.china.com.cn/news/txt/2005-11/18/content_6034369.htm (accessed 20 September 2013).
Zhang, W. J. (2010) Empirical Research on Cybercrime of Metropolis, master thesis. Beijing: China University of Political Science and Law.
Zhang, X. W. (2007) “An Empirical Research on Property-related Crime Over Internet in Guangdong Province,” Journal of Criminal Science 4: 95–101.
Zhou, W. L. (2013) “30% of the Cases of Production and Distribution of Counterfeit Sued in Dongguan City People’s Procuratorate in 2012 Were Related to Tobacco and Alcohol,” Guangzhou Daily, 15 March, A5.
Editor information
Editors and Affiliations
Copyright information
© 2015 Darrell Chan and Dawei Wang
About this chapter
Cite this chapter
Chan, D., Wang, D. (2015). Profiling Cybercrime Perpetrators in China and its Policy Countermeasures. In: Smith, R.G., Cheung, R.CC., Lau, L.YC. (eds) Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137474162_14
Download citation
DOI: https://doi.org/10.1057/9781137474162_14
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-55788-2
Online ISBN: 978-1-137-47416-2
eBook Packages: Palgrave Social Sciences CollectionSocial Sciences (R0)