Advertisement

Profiling Cybercrime Perpetrators in China and its Policy Countermeasures

  • Darrell Chan
  • Dawei Wang
Part of the Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity book series (PSCYBER)

Abstract

The authors would like to thank Peter Grabosky, Roderic Broadhurst, Brigitte Bouhours, Mamoun Alazab, and Steve Chon for their advice and comments on an earlier draft.

Keywords

Organize Crime Social Networking Service Organize Crime Group Routine Activity Theory Potential Offender 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  1. Brenner, S. (2006) “Cybercrime Jurisdiction,” Crime, Law and Social Change 46 (4–5): 189–206.Google Scholar
  2. Brantingham, P. J. and Faust, F. L. (1976) “A Conceptual Model of Crime Prevention,” Crime & Delinquency 22: 284–96.CrossRefGoogle Scholar
  3. Chang, Y. C. (2012) Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention Across the Taiwan Strait, Cheltenham, UK: Edward Elgar Publishing Limited.CrossRefGoogle Scholar
  4. China Internet Network Information Centre (2012) Research Report on Information Safety Status of Chinese Internet Users in 2012, Beijing: China Internet Network Information Centre.Google Scholar
  5. Cohen, L. E. and Felson, M. (1979) “Social Change and Crime Rate Trends: A Routine Activity Approach,” American Sociological Review 44: 588–608.CrossRefGoogle Scholar
  6. Dong, L., Ma, W. F. and Yang, Y. J. (2012) “Lack of Effective Means in Crackdown Online Shopping Fraud Crime,” Yangcheng Evening News, 3 September, A8.Google Scholar
  7. Grabosky, P. (2007) “The Internet, Technology, and Organized Crime,” Asian Journal of Criminology 2 (2): 145–61.CrossRefGoogle Scholar
  8. Gu, J. (2013) “Online Fraud Accounts for 46.1% of Cyber Criminal Cases in 2012,” http://news.xinhuanet.com/fortune/2013-01/23/c_124271076.htm (accessed 16 July 2013).
  9. Li, X. G. (2008) “The Criminal Phenomenon on the Internet: Hallmarks of Criminals and Victims Revisited through Typical Cases Prosecuted,” University of Ottawa Law & Technology Journal 5 (1–2): 125–40.Google Scholar
  10. Li, Z., Jin, C. X., Zhang, F. J. and Yang, M. (2011) “Survey and Analysis on Cybercrime from 2007–2010 in Suzhou City,” Journal of Criminal Science 10: 120–7.Google Scholar
  11. Ma, X. (2013) “Eliminate Local Protectionism, Consistent Fighting Against Illegal Activities such as Infringing upon Intellectual Rights and Manufacturing and Marketing Fake Commodities,” http://www.ipraction.cn/2013/02/16/ARTI1361008468220148.shtml (accessed 10 October 2013).
  12. Macrum, C. D., Higgins, G. E. and Tewksbury, R. (2012) “Incarceration or Community Placement: Examining the Sentences of Cybercriminals,” Criminal Justice Studies 25 (1): 33–40.CrossRefGoogle Scholar
  13. Statement by the Chinese Delegation on the International cooperation Issue at the 1st UN Expert Group Meeting on Cybercrime (2011) http://www.chinesemission-vienna.at/chn/hyyfy/t790751.htm (accessed 22 September 2013).
  14. United Nations (2003) Resolution adopted by the General Assembly 57/239. Creation of a Global Culture of Cybersecurity (A/RES/57/239), New York: United Nations.Google Scholar
  15. United Nations (2004) United Nations Convention Against Transitional Organized Crime and the Protocols Thereto, New York: United Nations, http://www.unodc.org/documents/treaties/UNTOC/Publications/TOC%20Convention/TOCebook-e.pdf (accessed 12 February 2015).Google Scholar
  16. Van Dijk, J. J. M. and De Waard, J. (1991) “A Two-dimensional Typology of Crime Prevention Projects; With a Bibliography,” Criminal Justice Abstracts 23 (3): 483–503.Google Scholar
  17. Wei, Y. Z. (2013) 2012 Annual Report on Cybercrime in China, Beijing: Chinese People’s Public Security University, Policing Reform and Development Research Centre.Google Scholar
  18. Zeng, C. and Wang, X. (2012) “Preliminary Results Were Achieved in Cracking Down Cybercrime by Hubei Police: 2670 Suspects Captured,” http://www.chinanews.com/fz/2012/10-23/4270201.shtml (accessed 18 June 2013).Google Scholar
  19. Zhang, J. X. and Zhang, Y. N. (2005) “Sharply Increasing Cybercrime Starts to Merge with Traditional Crime,” http://www.china.com.cn/news/txt/2005-11/18/content_6034369.htm (accessed 20 September 2013).Google Scholar
  20. Zhang, W. J. (2010) Empirical Research on Cybercrime of Metropolis, master thesis. Beijing: China University of Political Science and Law.Google Scholar
  21. Zhang, X. W. (2007) “An Empirical Research on Property-related Crime Over Internet in Guangdong Province,” Journal of Criminal Science 4: 95–101.Google Scholar
  22. Zhou, W. L. (2013) “30% of the Cases of Production and Distribution of Counterfeit Sued in Dongguan City People’s Procuratorate in 2012 Were Related to Tobacco and Alcohol,” Guangzhou Daily, 15 March, A5.Google Scholar

Copyright information

© Darrell Chan and Dawei Wang 2015

Authors and Affiliations

  • Darrell Chan
  • Dawei Wang

There are no affiliations available

Personalised recommendations