Skip to main content

Profiling Cybercrime Perpetrators in China and its Policy Countermeasures

  • Chapter
Cybercrime Risks and Responses

Abstract

The authors would like to thank Peter Grabosky, Roderic Broadhurst, Brigitte Bouhours, Mamoun Alazab, and Steve Chon for their advice and comments on an earlier draft.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  • Brenner, S. (2006) “Cybercrime Jurisdiction,” Crime, Law and Social Change 46 (4–5): 189–206.

    Google Scholar 

  • Brantingham, P. J. and Faust, F. L. (1976) “A Conceptual Model of Crime Prevention,” Crime & Delinquency 22: 284–96.

    Article  Google Scholar 

  • Chang, Y. C. (2012) Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention Across the Taiwan Strait, Cheltenham, UK: Edward Elgar Publishing Limited.

    Book  Google Scholar 

  • China Internet Network Information Centre (2012) Research Report on Information Safety Status of Chinese Internet Users in 2012, Beijing: China Internet Network Information Centre.

    Google Scholar 

  • Cohen, L. E. and Felson, M. (1979) “Social Change and Crime Rate Trends: A Routine Activity Approach,” American Sociological Review 44: 588–608.

    Article  Google Scholar 

  • Dong, L., Ma, W. F. and Yang, Y. J. (2012) “Lack of Effective Means in Crackdown Online Shopping Fraud Crime,” Yangcheng Evening News, 3 September, A8.

    Google Scholar 

  • Grabosky, P. (2007) “The Internet, Technology, and Organized Crime,” Asian Journal of Criminology 2 (2): 145–61.

    Article  Google Scholar 

  • Gu, J. (2013) “Online Fraud Accounts for 46.1% of Cyber Criminal Cases in 2012,” http://news.xinhuanet.com/fortune/2013-01/23/c_124271076.htm (accessed 16 July 2013).

  • Li, X. G. (2008) “The Criminal Phenomenon on the Internet: Hallmarks of Criminals and Victims Revisited through Typical Cases Prosecuted,” University of Ottawa Law & Technology Journal 5 (1–2): 125–40.

    Google Scholar 

  • Li, Z., Jin, C. X., Zhang, F. J. and Yang, M. (2011) “Survey and Analysis on Cybercrime from 2007–2010 in Suzhou City,” Journal of Criminal Science 10: 120–7.

    Google Scholar 

  • Ma, X. (2013) “Eliminate Local Protectionism, Consistent Fighting Against Illegal Activities such as Infringing upon Intellectual Rights and Manufacturing and Marketing Fake Commodities,” http://www.ipraction.cn/2013/02/16/ARTI1361008468220148.shtml (accessed 10 October 2013).

  • Macrum, C. D., Higgins, G. E. and Tewksbury, R. (2012) “Incarceration or Community Placement: Examining the Sentences of Cybercriminals,” Criminal Justice Studies 25 (1): 33–40.

    Article  Google Scholar 

  • Statement by the Chinese Delegation on the International cooperation Issue at the 1st UN Expert Group Meeting on Cybercrime (2011) http://www.chinesemission-vienna.at/chn/hyyfy/t790751.htm (accessed 22 September 2013).

  • United Nations (2003) Resolution adopted by the General Assembly 57/239. Creation of a Global Culture of Cybersecurity (A/RES/57/239), New York: United Nations.

    Google Scholar 

  • United Nations (2004) United Nations Convention Against Transitional Organized Crime and the Protocols Thereto, New York: United Nations, http://www.unodc.org/documents/treaties/UNTOC/Publications/TOC%20Convention/TOCebook-e.pdf (accessed 12 February 2015).

    Google Scholar 

  • Van Dijk, J. J. M. and De Waard, J. (1991) “A Two-dimensional Typology of Crime Prevention Projects; With a Bibliography,” Criminal Justice Abstracts 23 (3): 483–503.

    Google Scholar 

  • Wei, Y. Z. (2013) 2012 Annual Report on Cybercrime in China, Beijing: Chinese People’s Public Security University, Policing Reform and Development Research Centre.

    Google Scholar 

  • Zeng, C. and Wang, X. (2012) “Preliminary Results Were Achieved in Cracking Down Cybercrime by Hubei Police: 2670 Suspects Captured,” http://www.chinanews.com/fz/2012/10-23/4270201.shtml (accessed 18 June 2013).

    Google Scholar 

  • Zhang, J. X. and Zhang, Y. N. (2005) “Sharply Increasing Cybercrime Starts to Merge with Traditional Crime,” http://www.china.com.cn/news/txt/2005-11/18/content_6034369.htm (accessed 20 September 2013).

    Google Scholar 

  • Zhang, W. J. (2010) Empirical Research on Cybercrime of Metropolis, master thesis. Beijing: China University of Political Science and Law.

    Google Scholar 

  • Zhang, X. W. (2007) “An Empirical Research on Property-related Crime Over Internet in Guangdong Province,” Journal of Criminal Science 4: 95–101.

    Google Scholar 

  • Zhou, W. L. (2013) “30% of the Cases of Production and Distribution of Counterfeit Sued in Dongguan City People’s Procuratorate in 2012 Were Related to Tobacco and Alcohol,” Guangzhou Daily, 15 March, A5.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2015 Darrell Chan and Dawei Wang

About this chapter

Cite this chapter

Chan, D., Wang, D. (2015). Profiling Cybercrime Perpetrators in China and its Policy Countermeasures. In: Smith, R.G., Cheung, R.CC., Lau, L.YC. (eds) Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137474162_14

Download citation

Publish with us

Policies and ethics