{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T12:27:19Z","timestamp":1773664039379,"version":"3.50.1"},"reference-count":111,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,2,6]],"date-time":"2013-02-06T00:00:00Z","timestamp":1360108800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1007\/s10660-013-9105-4","type":"journal-article","created":{"date-parts":[[2013,2,5]],"date-time":"2013-02-05T11:29:35Z","timestamp":1360063775000},"page":"41-69","source":"Crossref","is-referenced-by-count":52,"title":["Cybercrime and cyber-security issues associated with China: some economic and institutional considerations"],"prefix":"10.1007","volume":"13","author":[{"given":"Nir","family":"Kshetri","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,2,6]]},"reference":[{"issue":"2","key":"9105_CR1","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1046\/j.1365-2737.2000.00150.x","volume":"24","author":"E. Goldsmith","year":"2000","unstructured":"Goldsmith, E., & McGregor, S. L. T. (2000). E-commerce: consumer protection issues and implications for research and education. Journal of Consumer Studies & Home Economics, 24(2), 124\u2013127.","journal-title":"Journal of Consumer Studies & Home Economics"},{"issue":"4","key":"9105_CR2","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s10660-011-9081-5","volume":"11","author":"K. Narayanasamy","year":"2011","unstructured":"Narayanasamy, K., Rasiah, D., & Tan, T. M. (2011). The adoption and concerns of e-finance in Malaysia. Electronic Commerce Research, 11(4), 383\u2013400.","journal-title":"Electronic Commerce Research"},{"key":"9105_CR3","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/s10660-011-9083-3","volume":"11","author":"G. Antoniou","year":"2011","unstructured":"Antoniou, G., & Batten, L. (2011). E-commerce: protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11, 421\u2013456.","journal-title":"Electronic Commerce Research"},{"issue":"3","key":"9105_CR4","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s10660-009-9033-5","volume":"9","author":"J. Lu","year":"2009","unstructured":"Lu, J., Wang, L. Z., Yu, C. S., & Wu, J. Y. (2009). E-auction web assessment model in China. Electronic Commerce Research, 9(3), 149\u2013172.","journal-title":"Electronic Commerce Research"},{"issue":"3","key":"9105_CR5","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/s10660-009-9036-2","volume":"9","author":"D. G. Taylor","year":"2009","unstructured":"Taylor, D. G., Donna, F. D., & Jillapalli, R. (2009). Privacy concern and online personalization: the moderating effects of information control and compensation. Electronic Commerce Research, 9(3), 203\u2013223.","journal-title":"Electronic Commerce Research"},{"issue":"10","key":"9105_CR6","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MC.2010.212","volume":"43","author":"N. Kshetri","year":"2010","unstructured":"Kshetri, N. (2010). Cloud computing in developing economies. Computer, 43(10), 47\u201355.","journal-title":"Computer"},{"key":"9105_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-11522-6","volume-title":"The global cyber-crime industry: economic, institutional and strategic perspectives","author":"N. Kshetri","year":"2010","unstructured":"Kshetri, N. (2010). The global cyber-crime industry: economic, institutional and strategic perspectives. Berlin: Springer."},{"key":"9105_CR8","doi-asserted-by":"crossref","unstructured":"UNDP (2006). Country evaluation: assessment of development results Honduras. New York: United Nations Development Programme Evaluation Office. http:\/\/web.undp.org\/evaluation\/documents\/ADR\/ADR_Reports\/ADR_Honduras.pdf .","DOI":"10.18356\/b1445759-en"},{"issue":"3","key":"9105_CR9","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1111\/1521-9488.00243","volume":"3","author":"P. Andreas","year":"2001","unstructured":"Andreas, P., & Price, R. (2001). From war fighting to crime fighting: transforming the American national security state. International Studies Review, 3(3), 31\u201352.","journal-title":"International Studies Review"},{"key":"9105_CR10","doi-asserted-by":"crossref","DOI":"10.1515\/9781685857639","volume-title":"Security and southeast Asia: domestic, regional and global issue","author":"A. Collins","year":"2003","unstructured":"Collins, A. (2003). Security and southeast Asia: domestic, regional and global issue. Boulder: Lynne Rienner Pub."},{"key":"9105_CR11","unstructured":"Frost, E. L., Przystup, J. J., & Saunders, C. P. (2008). China\u2019s rising influence in Asia: Implications for US Policy. Institute for National Strategic Studies (INSS), Washington DC, United States. http:\/\/www.isn.ethz.ch\/isn\/Digital-Library\/IR-Directory\/Detail\/?ots591=0c54e3b3-1e9c-be1e-2c24-a6a8c7060233&lng=en&id=13298 ."},{"issue":"2","key":"9105_CR12","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1080\/14662049308447657","volume":"31","author":"I. L. Griffith","year":"1993","unstructured":"Griffith, I. L. (1993). Drugs and security in the commonwealth Caribbean. Journal of Commonwealth & Comparative Politics, 31(2), 70\u2013102.","journal-title":"Journal of Commonwealth & Comparative Politics"},{"issue":"3","key":"9105_CR13","first-page":"32","volume":"3","author":"H. Wenping","year":"2007","unstructured":"Wenping, H. (2007). The balancing act of China\u2019s Africa policy. China Security, 3(3), 32\u201340.","journal-title":"China Security"},{"key":"9105_CR14","doi-asserted-by":"crossref","unstructured":"Kshetri, N. (2013, forthcoming). Cyber-victimization and cybersecurity in China. Communications of the ACM.","DOI":"10.1145\/2436256.2436267"},{"key":"9105_CR15","doi-asserted-by":"crossref","unstructured":"Kshetri, N. (2013, forthcoming). Cybercrime and cybersecurity in the Global South. Basingstoke, UK: Palgrave Macmillan.","DOI":"10.1057\/9781137021946"},{"key":"9105_CR16","volume-title":"Allies, adversaries, and international trade","author":"J. Gowa","year":"1994","unstructured":"Gowa, J. (1994). Allies, adversaries, and international trade. Princeton: Princeton University Press."},{"key":"9105_CR17","unstructured":"Schafer, S. (2006). A piracy culture; Beijing continues to defy US and European efforts to stop IP theft. Newsweek International."},{"key":"9105_CR18","unstructured":"Xinxin, Z. (2012). China to Further Safeguard Cyber Security. 13 January. http:\/\/english.peopledaily.com.cn\/90882\/7704949.html . Accessed 12 May 2012."},{"key":"9105_CR19","unstructured":"chinadaily.com (2012). Internet population grows amid concerns. 11 January. http:\/\/www.chinadaily.com.cn\/china\/2012-01\/11\/content_14424818.htm ."},{"key":"9105_CR20","unstructured":"China Daily (2010). 2010 Internet policing hinges on transnational cybercrime. 10 November. http:\/\/www.china.org.cn\/business\/2010-11\/10\/content_21310523.htm ."},{"key":"9105_CR21","unstructured":"Riptech (2002). Riptech Internet Security Threat Report (Vol. II). July. http:\/\/www.4law.co.il\/276.pdf . Accessed 27 Oct 2005."},{"issue":"18","key":"9105_CR22","first-page":"6","volume":"171","author":"I. Lindenmayer","year":"2006","unstructured":"Lindenmayer, I. (2006). Online. American Banker, 171(18), 6.","journal-title":"American Banker"},{"key":"9105_CR23","unstructured":"Greenberg, A. (2007). The top countries for cybercrime. Forbes.com. 17 July. http:\/\/www.forbes.com\/2007\/07\/13\/cybercrime-world-regions-tech-cx_ag_0716cybercrime.html . Accessed 9 Apr 2008."},{"key":"9105_CR24","unstructured":"Pauli, D. (2012). China named \u2018world\u2019s biggest\u2019 cybercrime victim. 23 March. http:\/\/www.crn.com.au\/News\/294695,china-named-worlds-biggest-cybercrime-victim.aspx ."},{"key":"9105_CR25","unstructured":"Microsoft.com (2012). Microsoft security intelligence report, Volume 13. January through June. www.microsoft.com\/sir ."},{"key":"9105_CR26","unstructured":"sophos.com (2012). Security threat report. http:\/\/www.sophos.com\/medialibrary\/PDFs\/other\/SophosSecurityThreatReport2012.ashx ."},{"key":"9105_CR27","unstructured":"Microsoft (2011). Microsoft security intelligence report. http:\/\/www.microsoft.com\/security\/sir\/keyfindings\/default.aspx#!section_4_1_d ."},{"key":"9105_CR28","volume-title":"APWG","author":"G. Aaron","year":"2012","unstructured":"Aaron, G., & Rasmussen, R. (2012). Global phishing survey: trends and domain name use in 2H2011. In APWG, April 26. http:\/\/www.antiphishing.org\/reports\/APWG_GlobalPhishingSurvey_2H2011.pdf ."},{"issue":"3","key":"9105_CR29","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/2093548.2093568","volume":"55","author":"S. H. Kim","year":"2012","unstructured":"Kim, S. H., Wang, Q., & Ullrich, J. B. (2012). A comparative study of cyberattacks. Communications of the ACM, 55(3), 66\u201373.","journal-title":"Communications of the ACM"},{"key":"9105_CR30","unstructured":"Fletcher, O. (2009). China game boss sniped rivals, took down Internet. 28 August. http:\/\/www.pcworld.com\/businesscenter\/article\/171018\/china_game_boss_sniped_rivals_took_down_internet.html . Accessed 12 May 2012."},{"key":"9105_CR31","unstructured":"Fletcher, O. (2009). China jails Trojan virus authors in cybercrime crackdown: arrests and jail time for cybercriminals are increasingly common in China. 16 December. http:\/\/www.networkworld.com\/news\/2009\/121709-china-jails-trojan-virus-authors.html . Accessed 12 May 2012."},{"key":"9105_CR32","unstructured":"Schwartz, M. J. (2011). 111 arrested in identity theft probe. InformationWeek. http:\/\/www.informationweek.com\/news\/security\/attacks\/231900438 . Accessed 12 May 2012."},{"key":"9105_CR33","doi-asserted-by":"crossref","first-page":"588","DOI":"10.2307\/2094589","volume":"44","author":"L. E. Cohen","year":"1979","unstructured":"Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: a routine activity approach. American Sociological Review, 44, 588\u2013608.","journal-title":"American Sociological Review"},{"key":"9105_CR34","volume-title":"Victims of personal crime: an empirical foundation for a theory of personal victimization","author":"M. Hindelang","year":"1978","unstructured":"Hindelang, M., Gottfredson, M., & Garofalo, J. (1978). Victims of personal crime: an empirical foundation for a theory of personal victimization. Cambridge: Ballinger."},{"issue":"12","key":"9105_CR35","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1145\/1610252.1610288","volume":"52","author":"N. Kshetri","year":"2009","unstructured":"Kshetri, N. (2009). Positive externality, increasing returns and the rise in cybercrimes. Communications of the ACM, 52(12), 141\u2013144.","journal-title":"Communications of the ACM"},{"key":"9105_CR36","unstructured":"bbc.co.uk (2011). Chemicals and defense firms targeted by hacking attack. 31 October. http:\/\/www.bbc.co.uk\/news\/technology-15529930 ."},{"key":"9105_CR37","unstructured":"Pelofsky, J. (2011). Chinese man gets prison for US trade secrets theft. http:\/\/www.chicagotribune.com\/news\/sns-rt-us-crime-china-thefttre7bk2a4-20111221,0,6950261.story . Accessed 12 May 2012."},{"issue":"7","key":"9105_CR38","first-page":"1","volume":"40","author":"E. Noga","year":"2010","unstructured":"Noga, E. (2010). I spy something rubber. Rubber & Plastics News, 40(7), 1.","journal-title":"Rubber & Plastics News"},{"key":"9105_CR39","unstructured":"ncix.gov (2011). Foreign spies stealing US economic secrets in cyberspace. Office of the National Counterintelligence Executive, Washington, DC. October. http:\/\/www.ncix.gov\/publications\/reports\/fecie_all\/Foreign_Economic_Collection_2011.pdf Accessed 8 Nov. 2011."},{"key":"9105_CR40","unstructured":"Riley, M. (2012). SEC push may yield new disclosures of company cyber attacks. 10 January. http:\/\/www.businessweek.com\/news\/2012-01-10\/sec-push-may-yield-new-disclosures-of-company-cyber-attacks.html"},{"key":"9105_CR41","unstructured":"Chirgwin, R. (2011). Feds finger China in wire fraud: Where phishing victims\u2019 money goes. 26 April. http:\/\/www.theregister.co.uk\/2011\/04\/26\/feds_finger_china\/ ."},{"key":"9105_CR42","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/s11416-006-0015-z","volume":"2","author":"S. Gordon","year":"2006","unstructured":"Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in Computer Virology, 2, 13\u201320.","journal-title":"Journal in Computer Virology"},{"issue":"2","key":"9105_CR43","first-page":"25","volume":"55","author":"T. Hamid","year":"2011","unstructured":"Hamid, T. (2011). Smart devices prey for cybercrime. MEED. Middle East Economic Digest, 55(2), 25\u201326.","journal-title":"MEED. Middle East Economic Digest"},{"key":"9105_CR44","unstructured":"Vardi, N. (2005). Chinese take out. July 25. Forbes, 54."},{"key":"9105_CR45","unstructured":"Information Warfare Monitor\/Shadow server Foundation (2010). Shadows in the cloud: investigating cyber espionage 2.0. Joint report: Information Warfare Monitor Shadowserver Foundation, JR03-2010, 6 Apr. www.utoronto.ca\/mcis\/pdf\/shadows-in-the-cloud-web.pdf ."},{"key":"9105_CR46","unstructured":"McMillan, R. (2010). More than 100 companies targeted by Google hackers. 27 February. http:\/\/www.computerworld.com\/s\/article\/9163158\/More_than_100_companies_targeted_by_Google_hackers ."},{"key":"9105_CR47","unstructured":"McDonald, J. (2011). Cyber attacks on chemical companies traced to China. http:\/\/www.usatoday.com\/money\/industries\/technology\/story\/2011-11-01\/China-hackers\/51024936\/1 . Accessed 12 May 2012."},{"key":"9105_CR48","unstructured":"Blitz, J. (2011). Security: a huge challenge from China, Russia and organised crime. 1 November. http:\/\/www.ft.com\/intl\/cms\/s\/0\/b43488b0-fe2a-11e0-a1eb-00144feabdc0.html#axzz1dnezI1eF ."},{"key":"9105_CR49","unstructured":"bbc.co.uk (2011). China seeks to combat hi-tech crime wave. 30 December. http:\/\/www.bbc.co.uk\/news\/technology-16357238 ."},{"key":"9105_CR50","first-page":"60","volume":"4089","author":"D. Roberts","year":"2008","unstructured":"Roberts, D. (2008). Inside the war against China\u2019s blogs; vengeful bloggers? Flaming posts? PR firms help global brands navigate the country\u2019s perilous web. Business Week, 4089, 60.","journal-title":"Business Week"},{"key":"9105_CR51","unstructured":"De Kloet, J. (2002). Digitisation and its Asian discontents: the Internet, politics and hacking in China and Indonesia. First Monday, 7(9). http:\/\/firstmonday.org\/issues\/issue7_9\/kloet\/index.html ."},{"key":"9105_CR52","unstructured":"washingtonpost.com (2012). Global police network Interpol to make war on cyber criminals a priority. May 8. http:\/\/www.washingtonpost.com\/business\/global-police-network-interpol-to-make-war-on-cyber-criminals-a-priority\/2012\/05\/08\/gIQARD4RAU_story.html . Accessed 12 May 2012."},{"issue":"2","key":"9105_CR53","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1353\/sof.2006.0015","volume":"84","author":"M. F. Guill\u00e9n","year":"2005","unstructured":"Guill\u00e9n, M. F., & Su\u00e1rez, S. L. (2005). Explaining the global digital divide: economic, political and sociological drivers of cross-national Internet use. Social Forces, 84(2), 681\u2013708.","journal-title":"Social Forces"},{"key":"9105_CR54","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1111\/j.1467-9957.1954.tb00021.x","volume":"XXII","author":"A. Lewis","year":"1954","unstructured":"Lewis, A. (1954). Economic development with unlimited supplies of labour. Manchester School of Economic and Social Studies, XXII, 139\u2013191.","journal-title":"Manchester School of Economic and Social Studies"},{"key":"9105_CR55","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/s10660-012-9100-1","volume":"12","author":"I. Hasan","year":"2012","unstructured":"Hasan, I., & Kobeissi, N. (2012). Innovations, intellectual protection rights and information technology: an empirical investigation in the MENA region. Electronic Commerce Research, 12, 455\u2013484.","journal-title":"Electronic Commerce Research"},{"issue":"5","key":"9105_CR56","first-page":"40","volume":"43","author":"M. J. Cetron","year":"2009","unstructured":"Cetron, M. J., & Davies, O. (2009). Critical trends for cyber security. The Futurist, 43(5), 40\u201349.","journal-title":"The Futurist"},{"issue":"2","key":"9105_CR57","first-page":"310","volume":"65","author":"H. B. Chenery","year":"1975","unstructured":"Chenery, H. B. (1975). The structuralist approach to development policy. The American Economic Review, 65(2), 310\u2013316. Papers and proceedings of the eighty-seventh annual meeting of the American Economic Association.","journal-title":"The American Economic Review"},{"key":"9105_CR58","unstructured":"Acemoglu, D. (2005). Political economy of development and underdevelopment. Gaston Eyskens lectures, Leuven, Department of Economics, Massachusetts Institute of Technology. http:\/\/economics.mit.edu\/files\/1064 ."},{"key":"9105_CR59","volume-title":"Handbook of economic growth","author":"D. Acemoglu","year":"2005","unstructured":"Acemoglu, D., Johnson, S., & Robinson, A. J. (2005). Institutions as a fundamental cause of long-run growth. In P. Aghion & S. N. Durlauf (Eds.), Handbook of economic growth, IA, Amsterdam: Elsevier. http:\/\/baselinescenario.files.wordpress.com\/2010\/01\/institutions-as-a-fundamental-cause.pdf ."},{"key":"9105_CR60","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511808678","volume-title":"Institutions, institutional change and economic performance","author":"D. C. North","year":"1990","unstructured":"North, D. C. (1990). Institutions, institutional change and economic performance. Cambridge: Harvard University Press."},{"key":"9105_CR61","volume-title":"The European miracle: environments, economies, and geopolitics in the history of Europe and Asia","author":"E. L. Jones","year":"1981","unstructured":"Jones, E. L. (1981). The European miracle: environments, economies, and geopolitics in the history of Europe and Asia. New York: Cambridge University Press."},{"issue":"4","key":"9105_CR62","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/BF02686330","volume":"28","author":"G. Roland","year":"2004","unstructured":"Roland, G. (2004). Understanding institutional change: fast-moving and slow-moving institutions. Studies in Comparative International Development, 28(4), 109\u2013131.","journal-title":"Studies in Comparative International Development"},{"key":"9105_CR63","doi-asserted-by":"crossref","unstructured":"De Laiglesia, J. R. (2006). Institutional bottlenecks for agricultural development a stock-taking exercise based on evidence from Sub-Saharan Africa (Working Paper No. 248). OECD Development Centre, Research programme on: policy analyses on the institutional requirements for advancing peace and development in Sub-Saharan Africa. http:\/\/www.oecd.org\/dev\/36309029.pdf .","DOI":"10.1787\/671788081061"},{"issue":"3","key":"9105_CR64","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1002\/j.1538-165X.2011.tb00706.x","volume":"126","author":"P. Andreas","year":"2011","unstructured":"Andreas, P. (2011). Illicit globalization: myths, misconceptions, and historical lessons. Political Science Quarterly, 126(3), 403\u2013425.","journal-title":"Political Science Quarterly"},{"key":"9105_CR65","doi-asserted-by":"crossref","first-page":"912","DOI":"10.1086\/261959","volume":"102","author":"A. Greif","year":"1994","unstructured":"Greif, A. (1994). Cultural beliefs and the organization of society: a historical and theoretical reflection on collectivist and individualist societies. Journal of Political Economy, 102, 912\u2013950.","journal-title":"Journal of Political Economy"},{"issue":"4","key":"9105_CR66","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/j.intman.2005.09.009","volume":"11","author":"N. Kshetri","year":"2005","unstructured":"Kshetri, N. (2005). Pattern of global cyber war and crime: a conceptual framework. Journal of International Management, 11(4), 541\u2013562.","journal-title":"Journal of International Management"},{"key":"9105_CR67","doi-asserted-by":"crossref","first-page":"128","DOI":"10.2307\/2393553","volume":"35","author":"W. Cohen","year":"1990","unstructured":"Cohen, W., & Levinthal, D. (1990). Absorptive capacity: a new perspective on learning and innovation. Administrative Science Quarterly, 35, 128\u2013152.","journal-title":"Administrative Science Quarterly"},{"key":"9105_CR68","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/978-1-349-13512-7_5","volume-title":"Social capability and long-term growth","author":"L. Dahlman","year":"1995","unstructured":"Dahlman, L., & Nelson, R. (1995). Social absorption capability, national innovation systems and economic development. In B. H. Koo & D. H. Perkins (Eds.), Social capability and long-term growth (pp. 82\u2013122). Basingstoke, UK: Palgrave Macmillan."},{"issue":"5","key":"9105_CR69","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1080\/00220380802009084","volume":"44","author":"J. Niosi","year":"2008","unstructured":"Niosi, J. (2008). Technology, development and innovation systems: an introduction. The Journal of Development Studies, 44(5), 613\u2013621.","journal-title":"The Journal of Development Studies"},{"key":"9105_CR70","unstructured":"Information Today (2008). Challenges in the East. February, 25(2), 22."},{"key":"9105_CR71","first-page":"48","volume":"4291","author":"N. Pearlstine","year":"2012","unstructured":"Pearlstine, N. (2012). Life in Cyberia. Bloomberg Businessweek, 4291, 48\u201354.","journal-title":"Bloomberg Businessweek"},{"key":"9105_CR72","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1146\/annurev.polisci.2.1.91","volume":"2","author":"H. V. Milner","year":"1999","unstructured":"Milner, H. V. (1999). The political economy of international trade. Annual Review of Political Science, 2, 91\u2013114.","journal-title":"Annual Review of Political Science"},{"issue":"47","key":"9105_CR73","first-page":"12","volume":"54","author":"T. Lan","year":"2011","unstructured":"Lan, T. (2011). Real rules for virtual space. Beijing Review, 54(47), 12\u201313.","journal-title":"Beijing Review"},{"issue":"2","key":"9105_CR74","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1108\/17468770910965019","volume":"4","author":"N. Kshetri","year":"2009","unstructured":"Kshetri, N. (2009). The evolution of the Chinese online gaming industry. Journal of Technology Management in China, 4(2), 158\u2013179.","journal-title":"Journal of Technology Management in China"},{"issue":"12","key":"9105_CR75","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1145\/1610252.1610288","volume":"52","author":"N. Kshetri","year":"2009","unstructured":"Kshetri, N. (2009). Positive externality, increasing returns and the rise in cybercrimes. Communications of the ACM, 52(12), 141\u2013144.","journal-title":"Communications of the ACM"},{"key":"9105_CR76","unstructured":"Fong, C. (2008). Fighting the agents of organized cybercrime. 8 May. CNN.com ."},{"key":"9105_CR77","unstructured":"China Daily (2008). China gets its game on 5 May. http:\/\/www.chinadaily.com.cn\/bizchina\/2008-05\/05\/content_6661519.htm . Accessed 2 Oct. 2008."},{"key":"9105_CR78","unstructured":"chinadaily.com.cn (2012). China\u2019s online gaming market reports 32 % revenue increase. 10 January. http:\/\/www.chinadaily.com.cn\/china\/2012-01\/10\/content_14415239.htm . Accessed 12 May 2012."},{"key":"9105_CR79","unstructured":"Nystedt, D. (2004). Online gaming growing fast in China, study says. http:\/\/archive.thestandard.com\/movabletype\/datadigest\/archives\/003210.php . Accessed 27 Oct 2005."},{"key":"9105_CR80","unstructured":"Mims, C. (2012). Chinese cyber-criminals caught laundering $48 m through online games. 17 October. http:\/\/qz.com\/16717\/chinese-cyber-criminals-caught-laundering-48-mln-through-online-games\/ ."},{"key":"9105_CR81","unstructured":"Blakely, R., Richards, J., & Halpin, T. (2007). Cyber gang raises fear of new crime wave. The Times, 13. November 10."},{"key":"9105_CR82","unstructured":"Barboza, D. (2010). Hacking for fun and profit in China\u2019s underworld. 1 February. http:\/\/www.nytimes.com\/2010\/02\/02\/business\/global\/02hacker.html?pagewanted=all ."},{"key":"9105_CR83","unstructured":"Rashid, F. Y. (2011). Cyber-criminals register free domains and subdomains for phishing attacks. 27 April. http:\/\/www.eweek.com\/c\/a\/Security\/CyberCriminals-Register-Free-Domains-and-SubDomains-for-Phishing-Attacks-470147\/ . Accessed 12 May 2012."},{"key":"9105_CR84","unstructured":"Rashid, F. Y. (2011). Internet expands to 220 million domains: VeriSign. 23 December. http:\/\/www.eweek.com\/c\/a\/Security\/Internet-Expands-to-220-Million-Domains-VeriSign-406627\/ . Accessed 12 May 2012."},{"issue":"4","key":"9105_CR85","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1080\/0951274032000132227","volume":"16","author":"S. Kalathil","year":"2003","unstructured":"Kalathil, S. (2003). China\u2019s new media sector: keeping the state in. The Pacific Review, 16(4), 489\u2013501.","journal-title":"The Pacific Review"},{"key":"9105_CR86","doi-asserted-by":"crossref","unstructured":"Kshetri, N. (2013, forthcoming). Privacy and security issues in cloud computing: the role of institutions and institutional evolution. Telecommunications Policy. doi: 10.1016\/j.telpol.2012.04.011","DOI":"10.1016\/j.telpol.2012.04.011"},{"issue":"1","key":"9105_CR87","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/2658031","volume":"115","author":"S. Zhao","year":"2000","unstructured":"Zhao, S. (2000). Chinese nationalism and its international orientations. Political Science Quarterly, 115(1), 1\u201333.","journal-title":"Political Science Quarterly"},{"key":"9105_CR88","first-page":"69","volume-title":"China\u2019s information and communications technology revolution: social changes and state responses","author":"G. Wu","year":"2009","unstructured":"Wu, G. (2009). In the name of good governance: e-government, Internet pornography and political censorship in China. In X. Zhang & Y. Zheng (Eds.), China\u2019s information and communications technology revolution: social changes and state responses (pp. 69\u201383)."},{"key":"9105_CR89","unstructured":"Greenberg, A. (2009). Brazil: the new spam king. Forbes.com. 8th December. http:\/\/www.forbes.com\/2009\/12\/08\/spam-china-cisco-technology-cio-network-brazil.html ."},{"key":"9105_CR90","unstructured":"Sophos (2004). Sophos outs \u2018dirty dozen\u2019 spam producing countries. 26 February. http:\/\/www.sophos.com\/en-us\/press-office\/press-releases\/2004\/02\/sa_dirtydozen.aspx . Accessed July 2011."},{"key":"9105_CR91","unstructured":"Theregister.co.uk (2006). China poised to pinch US spam crown. 21 April. http:\/\/www.theregister.co.uk\/2006\/04\/21\/spam_relay_hotlist\/ ."},{"key":"9105_CR92","unstructured":"Trupela Tok (2010). Spam statistics for 2009. 5 January. http:\/\/www.trupela.com\/2010\/01\/05\/spam-statistics-for-2009\/ ."},{"key":"9105_CR93","unstructured":"Secure List (2010). Spam evolution: January-March 2010. 12 May. http:\/\/www.securelist.com\/en\/analysis\/204792117\/Spam_evolution_January_March_2010 ."},{"issue":"2","key":"9105_CR94","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1108\/09685229910265493","volume":"7","author":"S. M. Furnell","year":"1999","unstructured":"Furnell, S. M., Dowland, P. S., & Sanders, P. W. (1999). Dissecting the \u201cHacker manifesto\u201d. Information Management & Computer Security, 7(2), 69\u201375.","journal-title":"Information Management & Computer Security"},{"issue":"5","key":"9105_CR95","first-page":"60","volume":"274","author":"M. Hvistendahl","year":"2009","unstructured":"Hvistendahl, M. (2009). The China syndrome. Popular Science, 274(5), 60\u201365.","journal-title":"Popular Science"},{"key":"9105_CR96","doi-asserted-by":"crossref","first-page":"30","DOI":"10.2307\/3183620","volume":"136","author":"M. Pei","year":"2003","unstructured":"Pei, M. (2003). The paradoxes of American nationalism. Foreign Policy, 136, 30\u201337.","journal-title":"Foreign Policy"},{"key":"9105_CR97","volume-title":"Underground empires: the cultural politics of modern Chinese transformation","author":"A. Ong","year":"1997","unstructured":"Ong, A. (1997). Chinese modernities: narratives of nation and of capitalism. In A. Ong & D. Nonini (Eds.), Underground empires: the cultural politics of modern Chinese transformation, New York: Routledge."},{"key":"9105_CR98","volume-title":"In the red: on contemporary Chinese culture","author":"G. Barme","year":"1999","unstructured":"Barme, G. (1999). In the red: on contemporary Chinese culture, New York: Columbia University Press."},{"key":"9105_CR99","volume-title":"Lessons in being Chinese: minority education and ethnic identity in southwest China","author":"M. Hansen","year":"1999","unstructured":"Hansen, M. (1999). Lessons in being Chinese: minority education and ethnic identity in southwest China. Seattle: University of Washington Press."},{"issue":"1","key":"9105_CR100","doi-asserted-by":"crossref","first-page":"95","DOI":"10.2307\/2659506","volume":"60","author":"B. Sautman","year":"2001","unstructured":"Sautman, B. (2001). Peking man and the politics of paleoanthropological nationalism in China. The Journal of Asian Studies, 60(1), 95\u2013124.","journal-title":"The Journal of Asian Studies"},{"key":"9105_CR101","unstructured":"Denning, D. E. (2000). Hacktivism: an emerging threat to diplomacy. American Foreign Service Association. www.afsa.org\/fsj\/sept00\/Denning.cfm . Accessed 1 Oct 2009."},{"key":"9105_CR102","unstructured":"The Economist (2002). Asia: stop your searching; the Internet in China. 7 September, 68."},{"key":"9105_CR103","unstructured":"MacKinnon, R. (2012). Inside China\u2019s censorship machine. 29 January. http:\/\/fullcomment.nationalpost.com\/2012\/01\/29\/rebecca-mackinnon-inside-chinas-censorship-machine\/ ."},{"issue":"2","key":"9105_CR104","first-page":"44","volume":"25","author":"A. Hawser","year":"2011","unstructured":"Hawser, A. (2011). Hidden threat. Global Finance, 25(2), 44.","journal-title":"Global Finance"},{"key":"9105_CR105","unstructured":"Krebs, B. (2007). Internet Explorer unsafe for 284 days in 2006. 4 January. http:\/\/blog.washingtonpost.com\/securityfix\/2007\/01\/internet_explorer_unsafe_for_2.html ."},{"key":"9105_CR106","unstructured":"Qingli, D. (2011). China itself is facing growing cybercrime and attacks. 11 November. http:\/\/www.ft.com\/intl\/cms\/s\/0\/2a134f8c-f5be-11e0-bcc2-00144feab49a.html#axzz1dOy0Cfug . Accessed 12 May 2012."},{"issue":"1","key":"9105_CR107","first-page":"231","volume":"7","author":"J. A. Massey","year":"2006","unstructured":"Massey, J. A. (2006). The emperor is far away: China\u2019s enforcement of intellectual property rights protection, 1986\u20132006. Chicago Journal of International Law, 7(1), 231\u2013237.","journal-title":"Chicago Journal of International Law"},{"key":"9105_CR108","unstructured":"Kizekova, A. (2012). The Shanghai Cooperation Organization: challenges in cyberspace\u2014analysis. http:\/\/www.eurasiareview.com\/27022012-the-shanghai-cooperation-organisation-challenges-in-cyberspace-analysis\/ . Accessed 12 May 2012."},{"key":"9105_CR109","doi-asserted-by":"crossref","unstructured":"Adams, J. (2001). Virtual defense. Foreign Affairs, May\/June, 98\u2013112.","DOI":"10.2307\/20050154"},{"key":"9105_CR110","unstructured":"IDC (2011). China IT security solutions: an IDC report series. http:\/\/www.idc.com\/getdoc.jsp?containerId=IDC_P10684 ."},{"key":"9105_CR111","unstructured":"Tsuruoka, D. (2012). Tencent, Kingsoft to run online games together. March 13. http:\/\/news.investors.com\/article\/604133\/201203131136\/tencent-kingsoft-form-online-game-alliance.htm . Accessed 12 May 2012."}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9105-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-013-9105-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9105-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T06:43:27Z","timestamp":1688021007000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-013-9105-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,6]]},"references-count":111,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,3]]}},"alternative-id":["9105"],"URL":"https:\/\/doi.org\/10.1007\/s10660-013-9105-4","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2,6]]}}}