IDEAS home Printed from https://ideas.repec.org/a/pal/palcom/v11y2024i1d10.1057_s41599-024-04042-w.html
   My bibliography  Save this article

Cybercrime as an industry: examining the organisational structure of Chinese cybercrime

Author

Listed:
  • Qiaoyu Luo

    (University of Oxford)

Abstract

In an age of advancing information technology, widespread internet access has facilitated a rise in profit-driven cybercrime. Empirical research has found that cybercrime is now highly industrialised. Cybercrime operations have evolved into an assembly of various malicious acts, some of which do not require advanced technical abilities. While extensive research on cybercrime has been conducted globally, there is a lack of detailed investigation into the cybercrime landscape in China, despite it being a vast economic entity with a significant number of cybercrime incidents. Drawing on interviews and secondary data from China collected between 2020 and 2022, this paper seeks to address this gap by offering a comprehensive examination of Chinese cybercrime. It explores the degree of industrialisation within Chinese cybercrime and discusses its impact on the work performed by Chinese cybercriminals. Echoing findings from previous studies on the industrialisation of cybercrime, the current study reveals an elaborate industry built around cyber fraud, populated by various market players working on diverse tasks to support the successful operation of cyber fraud. The research also uncovers the existence of cybercriminal firms that closely mimic the structural and operational approaches of legitimate companies. Similar to how the Industrial Revolution reshaped traditional manufacturing, the industrialisation of cybercrime has transformed it into an assembly line operation, where each cybercriminal carries out basic, tedious, and repetitive tasks on a daily basis.

Suggested Citation

  • Qiaoyu Luo, 2024. "Cybercrime as an industry: examining the organisational structure of Chinese cybercrime," Palgrave Communications, Palgrave Macmillan, vol. 11(1), pages 1-12, December.
  • Handle: RePEc:pal:palcom:v:11:y:2024:i:1:d:10.1057_s41599-024-04042-w
    DOI: 10.1057/s41599-024-04042-w
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1057/s41599-024-04042-w
    File Function: Abstract
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1057/s41599-024-04042-w?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Shuai Chen & Mengmeng Hao & Fangyu Ding & Dong Jiang & Jiping Dong & Shize Zhang & Qiquan Guo & Chundong Gao, 2023. "Exploring the global geography of cybercrime and its driving forces," Palgrave Communications, Palgrave Macmillan, vol. 10(1), pages 1-10, December.
    2. Ben Collier & Richard Clayton & Alice Hutchings & Daniel Thomas, 2021. "Cybercrime is (often) boring: Infrastructure and alienation in a deviant subculture [Producing Trust among Illicit Actors: A Techno-Social Approach to an Online Illicit Market]," The British Journal of Criminology, Centre for Crime and Justice Studies, vol. 61(5), pages 1407-1423.
    3. Peng Wang & Mei Su & Jingyi Wang, 2021. "Organized crime in cyberspace: How traditional organized criminal groups exploit the online peer-to-peer lending market in China," The British Journal of Criminology, Centre for Crime and Justice Studies, vol. 61(2), pages 303-324.
    4. Varese, Federico, 2001. "The Russian Mafia: Private Protection in a New Market Economy," OUP Catalogue, Oxford University Press, number 9780198297369, Decembrie.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Krishnashree Achuthan & Sugandh Khobragade & Robin Kowalski, 2025. "Cybercrime through the public lens: a longitudinal analysis," Palgrave Communications, Palgrave Macmillan, vol. 12(1), pages 1-16, December.
    2. Pierfrancesco Rolla & Patricia Justino, 2022. "The social consequences of organized crime in Italy," WIDER Working Paper Series wp-2022-106, World Institute for Development Economic Research (UNU-WIDER).
    3. Anja Shortland, 2010. "The Business of Piracy in Somalia," Weekly Report, DIW Berlin, German Institute for Economic Research, vol. 6(23), pages 182-186.
    4. Bo Rothstein, 2011. "Can markets be expected to prevent themselves from self‐destruction?," Regulation & Governance, John Wiley & Sons, vol. 5(4), pages 387-404, December.
    5. Arie Aviram, 2009. "Socialization For Entrepreneurship: The Second Generation," Journal of Developmental Entrepreneurship (JDE), World Scientific Publishing Co. Pte. Ltd., vol. 14(03), pages 311-330.
    6. Giuseppe De Feo & Giacomo Davide De Luca, 2017. "Mafia in the Ballot Box," American Economic Journal: Economic Policy, American Economic Association, vol. 9(3), pages 134-167, August.
    7. Skarbek, David, 2016. "Covenants without the Sword? Comparing Prison Self-Governance Globally," American Political Science Review, Cambridge University Press, vol. 110(4), pages 845-862, November.
    8. Raimo Väyrynen, 2003. "Illegal Immigration, Human Trafficking, and Organized Crime," WIDER Working Paper Series DP2003-72, World Institute for Development Economic Research (UNU-WIDER).
    9. Ethan Bueno De Mesquita & Catherine Hafer, 2008. "Public Protection Or Private Extortion?," Economics and Politics, Wiley Blackwell, vol. 20(1), pages 1-32, March.
    10. Corinna Elsenbroich & Jennifer Badham, 2016. "The Extortion Relationship: A Computational Analysis," Journal of Artificial Societies and Social Simulation, Journal of Artificial Societies and Social Simulation, vol. 19(4), pages 1-8.
    11. David Skarbek & Peng Wang, 2015. "Criminal rituals," Global Crime, Taylor & Francis Journals, vol. 16(4), pages 288-305, October.
    12. José Noguera & Susan J. Linz, 2006. "Barter, credit and welfare," The Economics of Transition, The European Bank for Reconstruction and Development, vol. 14(4), pages 719-745, October.
    13. Kevin Lewis O’Neill, 2021. "Terminal velocity: The speed of extortion in Guatemala City," Environment and Planning A, , vol. 53(5), pages 977-991, August.
    14. Cortney S. Rodet, 2016. "Social Order in a Fragile State: Rio's Favelas," Economic Affairs, Wiley Blackwell, vol. 36(3), pages 309-317, October.
    15. Carlo Capuano & Massimiliano Giacalone, 2018. "Measuring Organized Crime: Statistical Indicators and Economics Aspects," EERI Research Paper Series EERI RP 2018/11, Economics and Econometrics Research Institute (EERI), Brussels.
    16. Keith Darden, 2008. "The Integrity of Corrupt States: Graft as an Informal State Institution," Politics & Society, , vol. 36(1), pages 35-59, March.
    17. David Skarbek, 2024. "The political economy of criminal governance," Public Choice, Springer, vol. 200(1), pages 1-24, July.
    18. Paolo Campana & Federico Varese, 2013. "Cooperation in criminal organizations: Kinship and violence as credible commitments," Rationality and Society, , vol. 25(3), pages 263-289, August.
    19. Astarita, Caterina & Capuano, Carlo & Purificato, Francesco, 2018. "The macroeconomic impact of organised crime: A post-Keynesian analysis," Economic Modelling, Elsevier, vol. 68(C), pages 514-528.
    20. Yuhki Tajima, 2018. "Political Development and the Fragmentation of Protection Markets," Journal of Conflict Resolution, Peace Science Society (International), vol. 62(5), pages 1100-1126, May.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pal:palcom:v:11:y:2024:i:1:d:10.1057_s41599-024-04042-w. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: https://www.nature.com/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.