
Analysis of "Pig-Butchering Scam" Type of Network Fraud from the Legal Perspective
- 1 Beijing University of Technology
* Author to whom correspondence should be addressed.
Abstract
With the rapid development and broad application of network information technology in recent years, the typical criminal behavior of network fraud has gradually increased, causing severe damage and marketing to social order and citizens' rights and interests. Among them, the "pig-butchering scam" type network fraud, as a typical crime method different from the traditional mode, a wide range of victims, a vast amount of money involved, and severe social harm, has become the focus of legal circles and social public opinion. From a legal perspective, this paper will conduct a multi-dimensional detailed analysis of "pig-butchering scam" online fraud, analyze the crime mode from the fraud process and characteristics of "pig-butchering scam," and study the current judicial and legislative status quo in China, explore the current legal dilemma related to the crime from the legal perspective and propose solutions, in order to provide a valuable reference for our legislation and judicature.
Keywords
pig-butchering scam, criminal law, network fraud
[1]. Teng Baoyi (2023) Research on Social Network Intelligence Analysis of the Crime of "pig-butchering scam" Network Fraud in Western Academic Journal, (12), 98-101.
[2]. Mao Junda (2020) Research on Investigation and Prevention Strategies for Telecom Network Fraud Crimes Using the "pig-butchering scam" Approach, Journal of Hebei Public Security Police Vocational College, 20 (3), 24-27.
[3]. Wang, F., & Zhou, X. (2023). Persuasive Schemes for Financial Exploitation in Online Romance Scam: An Anatomy on Sha Zhu Pan (pig-butchering scam) in China. Victims & Offenders, 18(5), 915–942.
[4]. Meng Qiang (2017) Research on Conviction and Sentencing of Telecom Network Fraud Assistance, Journal of Guangzhou Public Security Management Cadre College, 27 (4), 54-59.
[5]. Jin Yi (2022) A Study on the Criminal Law Qualitative Crime of False Financial Investment in the "Pig Slayer" Behavior, (4), 92-99.
[6]. Meng Qiang (2018) Research on the Conviction and Sentencing of Joint Crimes of Telecom Network Fraud Assisted by Wuhan Public Security Cadre College Journal, 32 (1), 60-62.
[7]. Sun Tiancheng (2023) Research on Network Security Technology and Application of "pig-butchering scam" Telecommunications Network Fraud Prevention Countermeasures, (4), 156-159.
[8]. Wang, F. (2024). Victim-offender overlap: the identity transformations experienced by trafficked Chinese workers escaping from pig-butchering scam syndicate. Trends in Organized Crime, Trends in organized crime, 2024-02.
[9]. Whittaker, J. M., Lazarus, S., & Corcoran, T. (2024). Are fraud victims nothing more than animals? Critiquing the propagation of "pig butchering" (Sha et al., pig-butchering scam). Journal of Economic Criminology, p. 3, 100052.
[10]. Jiang Airu (2022) Empirical analysis and prevention measures research on the crime of "pig-butchering scam" online fraud, network security technology and application, (3), 159-161.
[11]. Wang Xue&Pan Xiaolong (2020) Research on Telecommunications Fraud Cases: Taking the Internet's "pig-butchering scam" as an Example, Legal Expo, (13), 17-21.
Cite this article
Fu,Z. (2024). Analysis of "Pig-Butchering Scam" Type of Network Fraud from the Legal Perspective. Lecture Notes in Education Psychology and Public Media,73,8-14.
Data availability
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
Disclaimer/Publisher's Note
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
About volume
Volume title: Proceedings of the 2nd International Conference on Global Politics and Socio-Humanities
© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license. Authors who
publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons
Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this
series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published
version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial
publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and
during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See
Open access policy for details).