Cybercrime and cyber-security issues associated with China: some economic and institutional considerations

China is linked to cybercrimes of diverse types, scales, motivations and objectives. The Chinese cyberspace thus provides an interesting setting for the study of cybercrimes. In this paper, we first develop typology, classification and characterization of cybercrimes associated with China, which would help us understand modus operandi, structures, profiles and personal characteristics of cybercrime organizations and potential perpetrators, the signature aspects and goals of cybercrimes, the nature and backgrounds of the criminal groups involved, characteristics of potential targets for criminal activities, the nature and extent of the damage inflicted on the victims and the implications to and responses elicited from various actors. We then examine this issue from developmental and international political economy angles. Specifically, we delineate salient features of China’s politics, culture, human capital and technological issues from the standpoint of cyber-security and analyze emerging international relations and international trade issues associated with this phenomenon. Our analysis indicates that China’s global ambition, the shift in the base of regime legitimacy from MarxLeninism to economic growth, the strong state and weak civil society explain the distinctive pattern of the country’s cyber-attack and cyber-security landscapes.

[1]  Greg Felker Security and Southeast Asia: Domestic, Regional, and Global Issues (review) , 2004 .

[2]  Minxin Pei,et al.  The Paradoxes of American Nationalism , 2003 .

[3]  Lynn Margaret Batten,et al.  E-commerce: protecting purchaser privacy to enforce trust , 2011, Electron. Commer. Res..

[4]  W. Lewis Economic Development with Unlimited Supplies of Labour , 1954 .

[5]  Mark Harrison,et al.  In the Red: On Contemporary Chinese Culture , 2000 .

[6]  Ian Mathie Chinese Take-out , 2014 .

[7]  Steven Furnell,et al.  Dissecting the "Hacker Manifesto" , 1999, Inf. Manag. Comput. Secur..

[8]  Gérard Roland,et al.  Understanding institutional change: Fast-moving and slow-moving institutions , 2004 .

[9]  M. Guillén,et al.  THE GLOBAL DIGITAL DIVIDE : ECONOMIC , POLITICAL , AND SOCIOLOGICAL DRIVERS OF CROSS-NATIONAL INTERNET USE , 2005 .

[10]  David G. Taylor,et al.  Privacy concern and online personalization: The moderating effects of information control and compensation , 2009, Electron. Commer. Res..

[11]  Daniel A. Levinthal,et al.  ABSORPTIVE CAPACITY: A NEW PERSPECTIVE ON LEARNING AND INNOVATION , 1990 .

[12]  Richard R. Nelson,et al.  Social Absorption Capability, National Innovation Systems and Economic Development , 1995 .

[13]  J. Warford,et al.  The Structuralist Approach to Development Policy , 2022 .

[14]  J. A. IRVING,et al.  China syndrome , 1982, Nature.

[15]  P. Aghion,et al.  Handbook of Economic Growth , 2005 .

[16]  Christian Aghroum,et al.  Foreign spies stealing US economic secrets in cyberspace. Report to Congress on foreign economic collection and industrial espionage. 2009-2011 , 2012 .

[17]  Nir Kshetri,et al.  The evolution of the Chinese online gaming industry , 2009 .

[18]  Shanthi Kalathil China's new media sector: Keeping the state in , 2003 .

[19]  Nir Kshetri Cyber-victimization and cybersecurity in China , 2013, CACM.

[20]  N. Kshetri The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives , 2010 .

[21]  U GuoguangW In the name of good governance: E-government, Internet pornography and political censorship in China , 2009 .

[22]  Narayanasamy Kogilah,et al.  The adoption and concerns of e-finance in Malaysia , 2011, Electron. Commer. Res..

[23]  Elizabeth B. Goldsmith,et al.  E‐commerce: consumer protection issues and implications for research and education , 2000 .

[24]  D. North Institutions, Institutional Change and Economic Performance: Economic performance , 1990 .

[25]  U GuoguangW In the Name of Good Governance: E-Government, Internet Pornography, and Political Censorship in China , 2015 .

[26]  Liu Zequan,et al.  Lessons in Being Chinese: Minority Education and Ethnic Identity in Southwest China , 2001 .

[27]  Nir Kshetri,et al.  Cybercrime and Cybersecurity in the Global South , 2013 .

[28]  Phillip C. Saunders,et al.  China's Rising Influence in Asia: Implications for U.S. Policy , 2008 .

[29]  A. W. Coats,et al.  The European Miracle: Environments, Economies, and Geopolitics in the History of Europe and Asia. , 1982 .

[30]  Jeroen de Kloet Digitisation and Its Asian Discontents: The Internet, Politics and Hacking in China and Indonesia , 2002, First Monday.

[31]  Michael R. Gottfredson,et al.  Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization , 1977 .

[32]  Peter Andreas,et al.  Illicit Globalization: Myths, Misconceptions, and Historical Lessons , 2011 .

[33]  Joseph A. Massey The Emperor Is Far Away: China's Enforcement of Intellectual Property Rights Protection, 1986-2006 , 2006 .

[34]  Juan Ramón de Laiglesia,et al.  Institutional Bottlenecks for Agricultural Development: A Stock-Taking Exercise Based on Evidence from Sub-Saharan Africa , 2006 .

[35]  N. Kshetri Privacy and security issues in cloud computing: The role of institutions and institutional evolution , 2013 .

[36]  N. Kshetri Pattern of Global Cyber War and Crime: A Conceptual Framework , 2005 .

[37]  Yongnian Zheng,et al.  China's Information and Communications Technology Revolution: Social changes and state responses , 2012 .

[38]  Mike Gray,et al.  THE CHINA SYNDROME , 1979, China for SMEs.

[39]  Bohn Stafleu van Loghum,et al.  Online … , 2002, LOG IN.

[40]  James A. Robinson,et al.  Institutions as a Fundamental Cause of Long-Run Growth , 2005 .

[41]  Tina Darmohray Hacking for Fun and Profit , 2003, login Usenix Mag..

[42]  N. Kshetri The Global Cybercrime Industry , 2010 .

[43]  J. Rupnik,et al.  Challenges to the East , 1995 .

[44]  Charles K. Wilber,et al.  The political economy of development and underdevelopment , 1973 .

[45]  A. Collins,et al.  Security and Southeast Asia: Domestic, Regional, and Global Issues , 2003 .

[46]  Iftekhar Hasan,et al.  Innovations, intellectual protection rights and information technology: an empirical investigation in the MENA region , 2012, Electronic Commerce Research.

[47]  Peter Andreas,et al.  From War Fighting to Crime Fighting: Transforming the American National Security State , 2001 .

[48]  Joanne Gowa,et al.  Allies, Adversaries, and International Trade , 1993 .

[49]  June Lu,et al.  E-auction web assessment model in China , 2009, Electron. Commer. Res..

[50]  G Fitt Hidden threat. , 1997, Nursing standard (Royal College of Nursing (Great Britain) : 1987).

[51]  Richard Ford,et al.  On the definition and classification of cybercrime , 2006, Journal in Computer Virology.

[52]  Seung-Hyun Kim,et al.  A comparative study of cyberattacks , 2012, Commun. ACM.

[53]  Nir Kshetri,et al.  Positive externality, increasing returns, and the rise in cybercrimes , 2009, Commun. ACM.

[54]  Nir Kshetri,et al.  Cloud Computing in Developing Economies , 2010, Computer.

[55]  Helen V. Milner,et al.  THE POLITICAL ECONOMY OF INTERNATIONAL TRADE , 1999 .

[56]  B. Sautman,et al.  Peking man and the politics of paleoanthropological nationalism in China. , 2001, The Journal of Asian studies.

[57]  Lawrence E. Cohen,et al.  Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .

[58]  Ivelaw L. Griffith,et al.  Drugs and security in the commonwealth Caribbean , 1993 .

[59]  Jorge Niosi,et al.  Technology, Development and Innovation Systems: An Introduction , 2008 .

[60]  Suiseheng Zhao,et al.  Chinese Nationalism and Its International Orientations , 2000 .

[61]  A. Greif Cultural Beliefs and the Organization of Society: A Historical and Theoretical Reflection on Collectivist and Individualist Societies , 1994, Journal of Political Economy.