2013
DOI: 10.1145/2436256.2436267
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-victimization and cybersecurity in China

Abstract: Seeking insights into cyberattacks associated with China.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…Unsurprisingly these measures have also faced opposition and suffered setbacks as illustrated in the examples below (Kshetri 2013b).…”
Section: Conflicting Sets Of Rules Of Behaviormentioning
confidence: 99%
See 3 more Smart Citations
“…Unsurprisingly these measures have also faced opposition and suffered setbacks as illustrated in the examples below (Kshetri 2013b).…”
Section: Conflicting Sets Of Rules Of Behaviormentioning
confidence: 99%
“…While the Green Dam would be free to users, manufacturers needed to pay license fees to the Ministry of Industry and Information Technology (MIIT) to install the software (Kshetri 2013b).…”
Section: Conflicting Sets Of Rules Of Behaviormentioning
confidence: 99%
See 2 more Smart Citations
“…There is also increasing concern about cybercrime in China (China Daily 2010; Pauli, 2012). The source and extent of malware attacks (whether of domestic or foreign origin) and the scale of malware/botnet activity remain unclear, but a substantial proportion of Chinese computers are compromised and it is likely that local crime groups play a crucial role (Kshetri, 2013a;Chang, 2012;Kshetri, 2013b;Broadhurst & Chang, 2013). A recent study of spam and phishing sources found that these originated from a small number of ISPs (20 of 42,201 observed), which the author dubbed 'Internet bad neighbourhoods.'…”
Section: The Role Of Organized Crime Groupsmentioning
confidence: 99%