Abstract
Cybercrimes have become an eye-catching social problem in not only China but also other countries of the world. Cybercrimes can be divided into two categories and different kinds of cybercrimes shall be treated differently. In this article, some typical cybercrimes are introduced in detail in order to set forth the characteristics of those cybercrimes. However, to defeat cybercrimes, joint efforts from countries all over the world shall be made.
This work was supported by National Social Science Foundation of China (No. 06BFX051) and Judicial Expertise Construction Project of 5th Key Discipline of Shanghai Education Committee (No. J51102).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Pi, Y.: Research on Cyber-Security Law. Chinese People’s Public Security University, Beijing (2008)
Qi, M., Wang, Y., Xu, R., M.S.: Fighting Cybercrime: Legislation in China. International Journal of Electronic Security and Digital Forensics (IJESDF) 2(2), 219–227 (2009)
Criminal Law in PRC, http://www.mps.gov.cn/n16/n1282/n3493/n3763/n493954/494322.html
The Anti-Phishing Alliance of China has handled more than 6300 phishing websites, http://www.cert.org.cn/articles/news/common/2009092724555.shtml
24th Statistical Report on Internet Development, http://www.cnnic.cn/uploadfiles/pdf/2009/10/13/94556.pdf
25th Statistical Report on Internet Development, http://www.cnnic.cn/uploadfiles/pdf/2010/1/15/101600.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Xu, A., Gong, Y., Wang, Y., Ai, N. (2011). On Different Categories of Cybercrime in China. In: Lai, X., Gu, D., Jin, B., Wang, Y., Li, H. (eds) Forensics in Telecommunications, Information, and Multimedia. e-Forensics 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 56. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23602-0_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-23602-0_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23601-3
Online ISBN: 978-3-642-23602-0
eBook Packages: Computer ScienceComputer Science (R0)