Skip to main content
Erschienen in: Electronic Commerce Research 1/2013

01.03.2013

Cybercrime and cyber-security issues associated with China: some economic and institutional considerations

verfasst von: Nir Kshetri

Erschienen in: Electronic Commerce Research | Ausgabe 1/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

China is linked to cybercrimes of diverse types, scales, motivations and objectives. The Chinese cyberspace thus provides an interesting setting for the study of cybercrimes. In this paper, we first develop typology, classification and characterization of cybercrimes associated with China, which would help us understand modus operandi, structures, profiles and personal characteristics of cybercrime organizations and potential perpetrators, the signature aspects and goals of cybercrimes, the nature and backgrounds of the criminal groups involved, characteristics of potential targets for criminal activities, the nature and extent of the damage inflicted on the victims and the implications to and responses elicited from various actors. We then examine this issue from developmental and international political economy angles. Specifically, we delineate salient features of China’s politics, culture, human capital and technological issues from the standpoint of cyber-security and analyze emerging international relations and international trade issues associated with this phenomenon. Our analysis indicates that China’s global ambition, the shift in the base of regime legitimacy from MarxLeninism to economic growth, the strong state and weak civil society explain the distinctive pattern of the country’s cyber-attack and cyber-security landscapes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Goldsmith, E., & McGregor, S. L. T. (2000). E-commerce: consumer protection issues and implications for research and education. Journal of Consumer Studies & Home Economics, 24(2), 124–127. CrossRef Goldsmith, E., & McGregor, S. L. T. (2000). E-commerce: consumer protection issues and implications for research and education. Journal of Consumer Studies & Home Economics, 24(2), 124–127. CrossRef
2.
Zurück zum Zitat Narayanasamy, K., Rasiah, D., & Tan, T. M. (2011). The adoption and concerns of e-finance in Malaysia. Electronic Commerce Research, 11(4), 383–400. CrossRef Narayanasamy, K., Rasiah, D., & Tan, T. M. (2011). The adoption and concerns of e-finance in Malaysia. Electronic Commerce Research, 11(4), 383–400. CrossRef
3.
Zurück zum Zitat Antoniou, G., & Batten, L. (2011). E-commerce: protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11, 421–456. CrossRef Antoniou, G., & Batten, L. (2011). E-commerce: protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11, 421–456. CrossRef
4.
Zurück zum Zitat Lu, J., Wang, L. Z., Yu, C. S., & Wu, J. Y. (2009). E-auction web assessment model in China. Electronic Commerce Research, 9(3), 149–172. CrossRef Lu, J., Wang, L. Z., Yu, C. S., & Wu, J. Y. (2009). E-auction web assessment model in China. Electronic Commerce Research, 9(3), 149–172. CrossRef
5.
Zurück zum Zitat Taylor, D. G., Donna, F. D., & Jillapalli, R. (2009). Privacy concern and online personalization: the moderating effects of information control and compensation. Electronic Commerce Research, 9(3), 203–223. CrossRef Taylor, D. G., Donna, F. D., & Jillapalli, R. (2009). Privacy concern and online personalization: the moderating effects of information control and compensation. Electronic Commerce Research, 9(3), 203–223. CrossRef
6.
Zurück zum Zitat Kshetri, N. (2010). Cloud computing in developing economies. Computer, 43(10), 47–55. CrossRef Kshetri, N. (2010). Cloud computing in developing economies. Computer, 43(10), 47–55. CrossRef
7.
Zurück zum Zitat Kshetri, N. (2010). The global cyber-crime industry: economic, institutional and strategic perspectives. Berlin: Springer. CrossRef Kshetri, N. (2010). The global cyber-crime industry: economic, institutional and strategic perspectives. Berlin: Springer. CrossRef
9.
Zurück zum Zitat Andreas, P., & Price, R. (2001). From war fighting to crime fighting: transforming the American national security state. International Studies Review, 3(3), 31–52. CrossRef Andreas, P., & Price, R. (2001). From war fighting to crime fighting: transforming the American national security state. International Studies Review, 3(3), 31–52. CrossRef
10.
Zurück zum Zitat Collins, A. (2003). Security and southeast Asia: domestic, regional and global issue. Boulder: Lynne Rienner Pub. Collins, A. (2003). Security and southeast Asia: domestic, regional and global issue. Boulder: Lynne Rienner Pub.
12.
Zurück zum Zitat Griffith, I. L. (1993). Drugs and security in the commonwealth Caribbean. Journal of Commonwealth & Comparative Politics, 31(2), 70–102. CrossRef Griffith, I. L. (1993). Drugs and security in the commonwealth Caribbean. Journal of Commonwealth & Comparative Politics, 31(2), 70–102. CrossRef
13.
Zurück zum Zitat Wenping, H. (2007). The balancing act of China’s Africa policy. China Security, 3(3), 32–40. Wenping, H. (2007). The balancing act of China’s Africa policy. China Security, 3(3), 32–40.
14.
Zurück zum Zitat Kshetri, N. (2013, forthcoming). Cyber-victimization and cybersecurity in China. Communications of the ACM. Kshetri, N. (2013, forthcoming). Cyber-victimization and cybersecurity in China. Communications of the ACM.
15.
Zurück zum Zitat Kshetri, N. (2013, forthcoming). Cybercrime and cybersecurity in the Global South. Basingstoke, UK: Palgrave Macmillan. Kshetri, N. (2013, forthcoming). Cybercrime and cybersecurity in the Global South. Basingstoke, UK: Palgrave Macmillan.
16.
Zurück zum Zitat Gowa, J. (1994). Allies, adversaries, and international trade. Princeton: Princeton University Press. Gowa, J. (1994). Allies, adversaries, and international trade. Princeton: Princeton University Press.
17.
Zurück zum Zitat Schafer, S. (2006). A piracy culture; Beijing continues to defy US and European efforts to stop IP theft. Newsweek International. Schafer, S. (2006). A piracy culture; Beijing continues to defy US and European efforts to stop IP theft. Newsweek International.
22.
Zurück zum Zitat Lindenmayer, I. (2006). Online. American Banker, 171(18), 6. Lindenmayer, I. (2006). Online. American Banker, 171(18), 6.
29.
Zurück zum Zitat Kim, S. H., Wang, Q., & Ullrich, J. B. (2012). A comparative study of cyberattacks. Communications of the ACM, 55(3), 66–73. CrossRef Kim, S. H., Wang, Q., & Ullrich, J. B. (2012). A comparative study of cyberattacks. Communications of the ACM, 55(3), 66–73. CrossRef
33.
Zurück zum Zitat Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: a routine activity approach. American Sociological Review, 44, 588–608. CrossRef Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: a routine activity approach. American Sociological Review, 44, 588–608. CrossRef
34.
Zurück zum Zitat Hindelang, M., Gottfredson, M., & Garofalo, J. (1978). Victims of personal crime: an empirical foundation for a theory of personal victimization. Cambridge: Ballinger. Hindelang, M., Gottfredson, M., & Garofalo, J. (1978). Victims of personal crime: an empirical foundation for a theory of personal victimization. Cambridge: Ballinger.
35.
Zurück zum Zitat Kshetri, N. (2009). Positive externality, increasing returns and the rise in cybercrimes. Communications of the ACM, 52(12), 141–144. CrossRef Kshetri, N. (2009). Positive externality, increasing returns and the rise in cybercrimes. Communications of the ACM, 52(12), 141–144. CrossRef
38.
Zurück zum Zitat Noga, E. (2010). I spy something rubber. Rubber & Plastics News, 40(7), 1. Noga, E. (2010). I spy something rubber. Rubber & Plastics News, 40(7), 1.
42.
Zurück zum Zitat Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in Computer Virology, 2, 13–20. CrossRef Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in Computer Virology, 2, 13–20. CrossRef
43.
Zurück zum Zitat Hamid, T. (2011). Smart devices prey for cybercrime. MEED. Middle East Economic Digest, 55(2), 25–26. Hamid, T. (2011). Smart devices prey for cybercrime. MEED. Middle East Economic Digest, 55(2), 25–26.
44.
Zurück zum Zitat Vardi, N. (2005). Chinese take out. July 25. Forbes, 54. Vardi, N. (2005). Chinese take out. July 25. Forbes, 54.
50.
Zurück zum Zitat Roberts, D. (2008). Inside the war against China’s blogs; vengeful bloggers? Flaming posts? PR firms help global brands navigate the country’s perilous web. Business Week, 4089, 60. Roberts, D. (2008). Inside the war against China’s blogs; vengeful bloggers? Flaming posts? PR firms help global brands navigate the country’s perilous web. Business Week, 4089, 60.
53.
Zurück zum Zitat Guillén, M. F., & Suárez, S. L. (2005). Explaining the global digital divide: economic, political and sociological drivers of cross-national Internet use. Social Forces, 84(2), 681–708. CrossRef Guillén, M. F., & Suárez, S. L. (2005). Explaining the global digital divide: economic, political and sociological drivers of cross-national Internet use. Social Forces, 84(2), 681–708. CrossRef
54.
Zurück zum Zitat Lewis, A. (1954). Economic development with unlimited supplies of labour. Manchester School of Economic and Social Studies, XXII, 139–191. CrossRef Lewis, A. (1954). Economic development with unlimited supplies of labour. Manchester School of Economic and Social Studies, XXII, 139–191. CrossRef
55.
Zurück zum Zitat Hasan, I., & Kobeissi, N. (2012). Innovations, intellectual protection rights and information technology: an empirical investigation in the MENA region. Electronic Commerce Research, 12, 455–484. CrossRef Hasan, I., & Kobeissi, N. (2012). Innovations, intellectual protection rights and information technology: an empirical investigation in the MENA region. Electronic Commerce Research, 12, 455–484. CrossRef
56.
Zurück zum Zitat Cetron, M. J., & Davies, O. (2009). Critical trends for cyber security. The Futurist, 43(5), 40–49. Cetron, M. J., & Davies, O. (2009). Critical trends for cyber security. The Futurist, 43(5), 40–49.
57.
Zurück zum Zitat Chenery, H. B. (1975). The structuralist approach to development policy. The American Economic Review, 65(2), 310–316. Papers and proceedings of the eighty-seventh annual meeting of the American Economic Association. Chenery, H. B. (1975). The structuralist approach to development policy. The American Economic Review, 65(2), 310–316. Papers and proceedings of the eighty-seventh annual meeting of the American Economic Association.
60.
Zurück zum Zitat North, D. C. (1990). Institutions, institutional change and economic performance. Cambridge: Harvard University Press. CrossRef North, D. C. (1990). Institutions, institutional change and economic performance. Cambridge: Harvard University Press. CrossRef
61.
Zurück zum Zitat Jones, E. L. (1981). The European miracle: environments, economies, and geopolitics in the history of Europe and Asia. New York: Cambridge University Press. Jones, E. L. (1981). The European miracle: environments, economies, and geopolitics in the history of Europe and Asia. New York: Cambridge University Press.
62.
Zurück zum Zitat Roland, G. (2004). Understanding institutional change: fast-moving and slow-moving institutions. Studies in Comparative International Development, 28(4), 109–131. CrossRef Roland, G. (2004). Understanding institutional change: fast-moving and slow-moving institutions. Studies in Comparative International Development, 28(4), 109–131. CrossRef
63.
Zurück zum Zitat De Laiglesia, J. R. (2006). Institutional bottlenecks for agricultural development a stock-taking exercise based on evidence from Sub-Saharan Africa (Working Paper No. 248). OECD Development Centre, Research programme on: policy analyses on the institutional requirements for advancing peace and development in Sub-Saharan Africa. http://www.oecd.org/dev/36309029.pdf. De Laiglesia, J. R. (2006). Institutional bottlenecks for agricultural development a stock-taking exercise based on evidence from Sub-Saharan Africa (Working Paper No. 248). OECD Development Centre, Research programme on: policy analyses on the institutional requirements for advancing peace and development in Sub-Saharan Africa. http://​www.​oecd.​org/​dev/​36309029.​pdf.
64.
Zurück zum Zitat Andreas, P. (2011). Illicit globalization: myths, misconceptions, and historical lessons. Political Science Quarterly, 126(3), 403–425. CrossRef Andreas, P. (2011). Illicit globalization: myths, misconceptions, and historical lessons. Political Science Quarterly, 126(3), 403–425. CrossRef
65.
Zurück zum Zitat Greif, A. (1994). Cultural beliefs and the organization of society: a historical and theoretical reflection on collectivist and individualist societies. Journal of Political Economy, 102, 912–950. CrossRef Greif, A. (1994). Cultural beliefs and the organization of society: a historical and theoretical reflection on collectivist and individualist societies. Journal of Political Economy, 102, 912–950. CrossRef
66.
Zurück zum Zitat Kshetri, N. (2005). Pattern of global cyber war and crime: a conceptual framework. Journal of International Management, 11(4), 541–562. CrossRef Kshetri, N. (2005). Pattern of global cyber war and crime: a conceptual framework. Journal of International Management, 11(4), 541–562. CrossRef
67.
Zurück zum Zitat Cohen, W., & Levinthal, D. (1990). Absorptive capacity: a new perspective on learning and innovation. Administrative Science Quarterly, 35, 128–152. CrossRef Cohen, W., & Levinthal, D. (1990). Absorptive capacity: a new perspective on learning and innovation. Administrative Science Quarterly, 35, 128–152. CrossRef
68.
Zurück zum Zitat Dahlman, L., & Nelson, R. (1995). Social absorption capability, national innovation systems and economic development. In B. H. Koo & D. H. Perkins (Eds.), Social capability and long-term growth (pp. 82–122). Basingstoke, UK: Palgrave Macmillan. Dahlman, L., & Nelson, R. (1995). Social absorption capability, national innovation systems and economic development. In B. H. Koo & D. H. Perkins (Eds.), Social capability and long-term growth (pp. 82–122). Basingstoke, UK: Palgrave Macmillan.
69.
Zurück zum Zitat Niosi, J. (2008). Technology, development and innovation systems: an introduction. The Journal of Development Studies, 44(5), 613–621. CrossRef Niosi, J. (2008). Technology, development and innovation systems: an introduction. The Journal of Development Studies, 44(5), 613–621. CrossRef
70.
Zurück zum Zitat Information Today (2008). Challenges in the East. February, 25(2), 22. Information Today (2008). Challenges in the East. February, 25(2), 22.
71.
Zurück zum Zitat Pearlstine, N. (2012). Life in Cyberia. Bloomberg Businessweek, 4291, 48–54. Pearlstine, N. (2012). Life in Cyberia. Bloomberg Businessweek, 4291, 48–54.
72.
Zurück zum Zitat Milner, H. V. (1999). The political economy of international trade. Annual Review of Political Science, 2, 91–114. CrossRef Milner, H. V. (1999). The political economy of international trade. Annual Review of Political Science, 2, 91–114. CrossRef
73.
Zurück zum Zitat Lan, T. (2011). Real rules for virtual space. Beijing Review, 54(47), 12–13. Lan, T. (2011). Real rules for virtual space. Beijing Review, 54(47), 12–13.
74.
Zurück zum Zitat Kshetri, N. (2009). The evolution of the Chinese online gaming industry. Journal of Technology Management in China, 4(2), 158–179. CrossRef Kshetri, N. (2009). The evolution of the Chinese online gaming industry. Journal of Technology Management in China, 4(2), 158–179. CrossRef
75.
Zurück zum Zitat Kshetri, N. (2009). Positive externality, increasing returns and the rise in cybercrimes. Communications of the ACM, 52(12), 141–144. CrossRef Kshetri, N. (2009). Positive externality, increasing returns and the rise in cybercrimes. Communications of the ACM, 52(12), 141–144. CrossRef
76.
81.
Zurück zum Zitat Blakely, R., Richards, J., & Halpin, T. (2007). Cyber gang raises fear of new crime wave. The Times, 13. November 10. Blakely, R., Richards, J., & Halpin, T. (2007). Cyber gang raises fear of new crime wave. The Times, 13. November 10.
85.
Zurück zum Zitat Kalathil, S. (2003). China’s new media sector: keeping the state in. The Pacific Review, 16(4), 489–501. CrossRef Kalathil, S. (2003). China’s new media sector: keeping the state in. The Pacific Review, 16(4), 489–501. CrossRef
87.
Zurück zum Zitat Zhao, S. (2000). Chinese nationalism and its international orientations. Political Science Quarterly, 115(1), 1–33. CrossRef Zhao, S. (2000). Chinese nationalism and its international orientations. Political Science Quarterly, 115(1), 1–33. CrossRef
88.
Zurück zum Zitat Wu, G. (2009). In the name of good governance: e-government, Internet pornography and political censorship in China. In X. Zhang & Y. Zheng (Eds.), China’s information and communications technology revolution: social changes and state responses (pp. 69–83). Wu, G. (2009). In the name of good governance: e-government, Internet pornography and political censorship in China. In X. Zhang & Y. Zheng (Eds.), China’s information and communications technology revolution: social changes and state responses (pp. 69–83).
94.
Zurück zum Zitat Furnell, S. M., Dowland, P. S., & Sanders, P. W. (1999). Dissecting the “Hacker manifesto”. Information Management & Computer Security, 7(2), 69–75. CrossRef Furnell, S. M., Dowland, P. S., & Sanders, P. W. (1999). Dissecting the “Hacker manifesto”. Information Management & Computer Security, 7(2), 69–75. CrossRef
95.
Zurück zum Zitat Hvistendahl, M. (2009). The China syndrome. Popular Science, 274(5), 60–65. Hvistendahl, M. (2009). The China syndrome. Popular Science, 274(5), 60–65.
96.
Zurück zum Zitat Pei, M. (2003). The paradoxes of American nationalism. Foreign Policy, 136, 30–37. CrossRef Pei, M. (2003). The paradoxes of American nationalism. Foreign Policy, 136, 30–37. CrossRef
97.
Zurück zum Zitat Ong, A. (1997). Chinese modernities: narratives of nation and of capitalism. In A. Ong & D. Nonini (Eds.), Underground empires: the cultural politics of modern Chinese transformation, New York: Routledge. Ong, A. (1997). Chinese modernities: narratives of nation and of capitalism. In A. Ong & D. Nonini (Eds.), Underground empires: the cultural politics of modern Chinese transformation, New York: Routledge.
98.
Zurück zum Zitat Barme, G. (1999). In the red: on contemporary Chinese culture, New York: Columbia University Press. Barme, G. (1999). In the red: on contemporary Chinese culture, New York: Columbia University Press.
99.
Zurück zum Zitat Hansen, M. (1999). Lessons in being Chinese: minority education and ethnic identity in southwest China. Seattle: University of Washington Press. Hansen, M. (1999). Lessons in being Chinese: minority education and ethnic identity in southwest China. Seattle: University of Washington Press.
100.
Zurück zum Zitat Sautman, B. (2001). Peking man and the politics of paleoanthropological nationalism in China. The Journal of Asian Studies, 60(1), 95–124. CrossRef Sautman, B. (2001). Peking man and the politics of paleoanthropological nationalism in China. The Journal of Asian Studies, 60(1), 95–124. CrossRef
102.
Zurück zum Zitat The Economist (2002). Asia: stop your searching; the Internet in China. 7 September, 68. The Economist (2002). Asia: stop your searching; the Internet in China. 7 September, 68.
104.
Zurück zum Zitat Hawser, A. (2011). Hidden threat. Global Finance, 25(2), 44. Hawser, A. (2011). Hidden threat. Global Finance, 25(2), 44.
107.
Zurück zum Zitat Massey, J. A. (2006). The emperor is far away: China’s enforcement of intellectual property rights protection, 1986–2006. Chicago Journal of International Law, 7(1), 231–237. Massey, J. A. (2006). The emperor is far away: China’s enforcement of intellectual property rights protection, 1986–2006. Chicago Journal of International Law, 7(1), 231–237.
109.
Zurück zum Zitat Adams, J. (2001). Virtual defense. Foreign Affairs, May/June, 98–112. Adams, J. (2001). Virtual defense. Foreign Affairs, May/June, 98–112.
Metadaten
Titel
Cybercrime and cyber-security issues associated with China: some economic and institutional considerations
verfasst von
Nir Kshetri
Publikationsdatum
01.03.2013
Verlag
Springer US
Erschienen in
Electronic Commerce Research / Ausgabe 1/2013
Print ISSN: 1389-5753
Elektronische ISSN: 1572-9362
DOI
https://doi.org/10.1007/s10660-013-9105-4

Weitere Artikel der Ausgabe 1/2013

Electronic Commerce Research 1/2013 Zur Ausgabe