IDEAS home Printed from https://ideas.repec.org/a/pal/palcom/v11y2024i1d10.1057_s41599-024-04042-w.html
   My bibliography  Save this article

Cybercrime as an industry: examining the organisational structure of Chinese cybercrime

Author

Listed:
  • Qiaoyu Luo

    (University of Oxford)

Abstract

In an age of advancing information technology, widespread internet access has facilitated a rise in profit-driven cybercrime. Empirical research has found that cybercrime is now highly industrialised. Cybercrime operations have evolved into an assembly of various malicious acts, some of which do not require advanced technical abilities. While extensive research on cybercrime has been conducted globally, there is a lack of detailed investigation into the cybercrime landscape in China, despite it being a vast economic entity with a significant number of cybercrime incidents. Drawing on interviews and secondary data from China collected between 2020 and 2022, this paper seeks to address this gap by offering a comprehensive examination of Chinese cybercrime. It explores the degree of industrialisation within Chinese cybercrime and discusses its impact on the work performed by Chinese cybercriminals. Echoing findings from previous studies on the industrialisation of cybercrime, the current study reveals an elaborate industry built around cyber fraud, populated by various market players working on diverse tasks to support the successful operation of cyber fraud. The research also uncovers the existence of cybercriminal firms that closely mimic the structural and operational approaches of legitimate companies. Similar to how the Industrial Revolution reshaped traditional manufacturing, the industrialisation of cybercrime has transformed it into an assembly line operation, where each cybercriminal carries out basic, tedious, and repetitive tasks on a daily basis.

Suggested Citation

  • Qiaoyu Luo, 2024. "Cybercrime as an industry: examining the organisational structure of Chinese cybercrime," Palgrave Communications, Palgrave Macmillan, vol. 11(1), pages 1-12, December.
  • Handle: RePEc:pal:palcom:v:11:y:2024:i:1:d:10.1057_s41599-024-04042-w
    DOI: 10.1057/s41599-024-04042-w
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1057/s41599-024-04042-w
    File Function: Abstract
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1057/s41599-024-04042-w?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Shuai Chen & Mengmeng Hao & Fangyu Ding & Dong Jiang & Jiping Dong & Shize Zhang & Qiquan Guo & Chundong Gao, 2023. "Exploring the global geography of cybercrime and its driving forces," Palgrave Communications, Palgrave Macmillan, vol. 10(1), pages 1-10, December.
    2. Ben Collier & Richard Clayton & Alice Hutchings & Daniel Thomas, 2021. "Cybercrime is (often) boring: Infrastructure and alienation in a deviant subculture [Producing Trust among Illicit Actors: A Techno-Social Approach to an Online Illicit Market]," The British Journal of Criminology, Centre for Crime and Justice Studies, vol. 61(5), pages 1407-1423.
    3. Peng Wang & Mei Su & Jingyi Wang, 2021. "Organized crime in cyberspace: How traditional organized criminal groups exploit the online peer-to-peer lending market in China," The British Journal of Criminology, Centre for Crime and Justice Studies, vol. 61(2), pages 303-324.
    4. Varese, Federico, 2001. "The Russian Mafia: Private Protection in a New Market Economy," OUP Catalogue, Oxford University Press, number 9780198297369.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Pierfrancesco Rolla & Patricia Justino, 2022. "The social consequences of organized crime in Italy," WIDER Working Paper Series wp-2022-106, World Institute for Development Economic Research (UNU-WIDER).
    2. Bo Rothstein, 2011. "Can markets be expected to prevent themselves from self‐destruction?," Regulation & Governance, John Wiley & Sons, vol. 5(4), pages 387-404, December.
    3. Giuseppe De Feo & Giacomo Davide De Luca, 2017. "Mafia in the Ballot Box," American Economic Journal: Economic Policy, American Economic Association, vol. 9(3), pages 134-167, August.
    4. Ethan Bueno De Mesquita & Catherine Hafer, 2008. "Public Protection Or Private Extortion?," Economics and Politics, Wiley Blackwell, vol. 20(1), pages 1-32, March.
    5. Corinna Elsenbroich & Jennifer Badham, 2016. "The Extortion Relationship: A Computational Analysis," Journal of Artificial Societies and Social Simulation, Journal of Artificial Societies and Social Simulation, vol. 19(4), pages 1-8.
    6. David Skarbek & Peng Wang, 2015. "Criminal rituals," Global Crime, Taylor & Francis Journals, vol. 16(4), pages 288-305, October.
    7. Kevin Lewis O’Neill, 2021. "Terminal velocity: The speed of extortion in Guatemala City," Environment and Planning A, , vol. 53(5), pages 977-991, August.
    8. David Skarbek, 2024. "The political economy of criminal governance," Public Choice, Springer, vol. 200(1), pages 1-24, July.
    9. Astarita, Caterina & Capuano, Carlo & Purificato, Francesco, 2018. "The macroeconomic impact of organised crime: A post-Keynesian analysis," Economic Modelling, Elsevier, vol. 68(C), pages 514-528.
    10. Lonsky, Jakub, 2020. "Gulags, Crime, and Elite Violence: Origins and Consequences of the Russian Mafia," GLO Discussion Paper Series 711, Global Labor Organization (GLO).
    11. Karla Hoff & Joseph E. Stiglitz, 2008. "Exiting a Lawless State," Economic Journal, Royal Economic Society, vol. 118(531), pages 1474-1497, August.
    12. de Groot, Olaf J. & Rablen, Matthew D. & Shortland, Anja, 2011. "Gov-Aargh-Nance – “Even Criminals Need Law And Order”," NEPS Working Papers 7/2011, Network of European Peace Scientists.
    13. Ichiro Iwasaki & Yuko Adachi, 2024. "Legal Weakness, Investment Risks, and Distressed Acquisitions: Evidence from Russian Regions," Comparative Economic Studies, Palgrave Macmillan;Association for Comparative Economic Studies, vol. 66(1), pages 1-69, March.
    14. Peter J. Boettke & Rosolino A. Candela, 2020. "Productive specialization, peaceful cooperation and the problem of the predatory state: lessons from comparative historical political economy," Public Choice, Springer, vol. 182(3), pages 331-352, March.
    15. Serguey Braguinsky & Roger Myerson, 2007. "A macroeconomic model of Russian transition," The Economics of Transition, The European Bank for Reconstruction and Development, vol. 15(1), pages 77-107, January.
    16. Natalia Vasilenok, 2018. "What Drives the Private Provision of Security: Evidence from Russian Regions," HSE Working papers WP BRP 197/EC/2018, National Research University Higher School of Economics.
    17. Michele Battisti & Andrea Mario Lavezzi & Lucio Masserini & Monica Pratesi, 2018. "Resisting the extortion racket: an empirical analysis," European Journal of Law and Economics, Springer, vol. 46(1), pages 1-37, August.
    18. Louis-Alexandre Berg & Marlon Carranza, 2018. "Organized criminal violence and territorial control," Journal of Peace Research, Peace Research Institute Oslo, vol. 55(5), pages 566-581, September.
    19. Michele Battisti & Andrea Mario Lavezzi & Roberto Musotto, 2022. "Organizing Crime: an Empirical Analysis of the Sicilian Mafia," Papers 2205.02310, arXiv.org.
    20. Anja Shortland, 2010. "The Business of Piracy in Somalia," Weekly Report, DIW Berlin, German Institute for Economic Research, vol. 6(23), pages 182-186.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pal:palcom:v:11:y:2024:i:1:d:10.1057_s41599-024-04042-w. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: https://www.nature.com/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.