
The New Network Fraud of “Pig Butchering” from the Perspective of Criminal Law
- 1 Chifeng University
* Author to whom correspondence should be addressed.
Abstract
With the continuous development of the network, many new types of fraud also came into being, and “pig butchering” is a representative crime. This type of crime takes advantage of the weakness of human nature, that is, the lack of emotional life. In the face of this crime, the purpose of this article is to take an easy look at the new cyber crime of “pig butchering” from the perspective of criminal law. The purpose of this article is to show how to prevent and control this type of cybercrime and what countermeasures people should adopt in the face of these problems. It is argued that to solve the problem it requires the police to cooperate with the work of the judiciary while reducing errors in the investigation and collection of evidence. For another aspect, this new form of network fraud crime could be a challenge for the judical system. The difficulties in identifying accomplices in the crime is also worthy of attention.
Keywords
pig butchering, network fraud, criminal law
[1]. Rege, A. (2009). What's Love Got to Do with It? Exploring Online Dating Scams and Identity Fraud. International Journal of Cyber Criminology, 3(2).
[2]. Suarez-Tangil, G., Edwards, M., Peersman, C., Stringhini, G., Rashid, A., & Whitty, M. (2019). Automatically dismantling online dating fraud. IEEE Transactions on Information Forensics and Security, 15, 1128-1137.
[3]. Edwards, M., de Tangil Rotaeche, G. N. S., Peersman, C., Stringhini, G., Rashid, A., & Whitty, M. (2018, May). The geography of online dating fraud. In Workshop on technology and consumer protection (ConPro).
[4]. Cross, C., & Blackshaw, D. (2015). Improving the police response to online fraud. Policing: a journal of policy and practice, 9(2), 119-128.
[5]. Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International Review of Victimology, 21(2), 187-204.
[6]. Cross, C. (2019). Is online fraud just fraud? Examining the efficacy of the digital divide. Journal of Criminological Research, Policy and Practice, 5(2), 120-131.
[7]. Norris, G., & Brookes, A. (2021). Personality, emotion and individual differences in response to online fraud. Personality and Individual Differences, 169, 109847.
[8]. Weber, A. M. (2003). The council of Europe's convention on cybercrime. Berkeley Technology Law Journal, 18(1), 425-446.
[9]. Payne, B. K., & Hadzhidimova, L. (2020). Disciplinary and interdisciplinary trends in cybercrime research: An examination. International Journal of Cyber Criminology, 14(1), 81-105.
[10]. Lusthaus, J. (2013). How organised is organised cybercrime?. Global Crime, 14(1), 52-60.
[11]. Baesens, B., Van Vlasselaer, V., & Verbeke, W. (2015). Fraud analytics using descriptive, predictive, and social network techniques: a guide to data science for fraud detection. John Wiley & Sons.
Cite this article
Tan,X. (2023). The New Network Fraud of “Pig Butchering” from the Perspective of Criminal Law. Lecture Notes in Education Psychology and Public Media,17,57-62.
Data availability
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
Disclaimer/Publisher's Note
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
About volume
Volume title: Proceedings of the 4th International Conference on Educational Innovation and Philosophical Inquiries
© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license. Authors who
publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons
Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this
series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published
version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial
publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and
during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See
Open access policy for details).