References
- 315 Consumer Association. (2020). Sha Zhu Pan scam regains its force: The love of millions in debt is just a “misunderstanding.” https://weibo.com/ttarticle/x/m/show/id/2309404582430601248861?_wb_client_=1&object_id=1022%3A2309404582430601248861&extparam=lmid–4582430600338773&luicode=10000011&lfid=1076035784133871
- Anti-Fraud Guardian. (2021). Detailed illustration from Chinese public security: What is Sha Zhu Pan scam? [WeChat Blog]. https://mp.weixin.qq.com/s/ADA8O-n56stHHzf2_NVGlw
- Bachman, R. D., Schutt, R. K., & Plass, P. S. (2015). Fundamentals of research in criminology and criminal justice: With selected readings. Sage Publications.
- Boyatzis, R. E. (1998). Transforming qualitative information: Thematic analysis and code development. Sage Publications, Inc.
- Buchanan, T., & Whitty, M. T. (2014). The online dating romance scam: Causes and consequences of victimhood. Psychology, Crime & Law, 20(3), 261–283. https://doi.org/10.1080/1068316X.2013.772180
- Budd, C., & Anderson, J. (2011). Consumer fraud in Australasia: Results of the Australasian consumer fraud taskforce online Australia surveys 2008 and 2009. Australian Institute of Criminology.
- Buller, D. B., & Burgoon, J. K. (1996). Interpersonal deception theory. Communication Theory, 6(3), 203–242. https://doi.org/10.1111/j.1468-2885.1996.tb00127.x
- Cannabiccino. (2020, May). Asian guy/girl from online dating mentors you to invest in Forex/Cryptocurrency Trading – Sha Zhu Pan 杀猪盘 or Pig-Butchering Scam [Online forum post]. Reddit. https://www.reddit.com/r/Scams/comments/nuxtsq/a_pigbutchering_scammer_confesses_about_asian/
- CBC (Canadian Broadcasting Corporation). (2008). Cyber love lost in Russian bride scam. http://www.cbc.ca/canada/montreal/story/2008/02/13/qc-russian-dating-0213.html
- China News. (2019). Top 10 new words in Chinese media in 2019, including night economy, extreme pressure and more. https://www.chinanews.com.cn/gn/2019/12-16/9034981.shtml
- Chung, S. H., Su, Y. F., & Su, S. W. (2012). The impact of cognitive flexibility on resistance to organizational change. Social Behavior and Personality: An International Journal, 40(5), 735–745. https://doi.org/10.2224/sbp.2012.40.5.735
- Cialdini, R. B. (1993). Influence: The psychology of persuasion. 2nd rev. edn. New York: Quill—William Morrow.
- Clark, L., Lawrence, A. J., Astley-Jones, F., & Gray, N. (2009). Gambling near-misses enhance motivation to gamble and recruit win-related brain circuitry. Neuron, 61(3), 481–490. https://doi.org/10.1016/j.neuron.2008.12.031
- Clarke, R. V. (1980). Situational crime prevention: Theory and practice. The British Journal of Criminology, 20(2), 136. https://doi.org/10.1093/oxfordjournals.bjc.a047153
- Clarke, R. V. (1995). Situational crime prevention. Crime and Justice, 19, 91–150. https://doi.org/10.1086/449230
- Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608. https://doi.org/10.2307/2094589
- Communal News. (2020). New internet Fraud on the rise in China. https://communalnews.com/new-internet-fraud-on-the-rise-in-china/
- Cornish, D. B., & Clarke, R. V. (1987). Understanding crime displacement: An application of rational choice theory. Criminology, 25(4), 933–948. https://doi.org/10.1111/j.1745-9125.1987.tb00826.x
- Cornish, D., & Clarke, R. (2014). Introduction. In D. Cornish & R. Clark (Eds.), The reasoning criminal: Rational choice perspectives on offending (pp. 1–13). UK: Transaction Publishers.
- Cross, C. (2020). Romance fraud. In T. J. Holt, & A. Bossler (Eds.), The Palgrave handbook of international cybercrime and cyberdeviance (pp. 1–22). Switzerland: Palgrave Macmillan.
- Cukier, W. L., Nesselroth, E. J., & Cody, S. (2007). Genre, narrative and the ”Nigerian Letter” in electronic mail. In 2007 40th annual Hawaii international conference on system sciences (HICSS’07) (pp. 1–10). Waikoloa, HI: IEEE. https://doi.org/10.1109/HICSS.2007.238
- FBI. (n.d.). Romance scam. https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/romance-scams
- Federal Trade Commission. (2019). Romance scams rank number one on total reported losses. https://www.ftc.gov/news-events/blogs/data-spotlight/2019/02/romance-scams-rank-number-one-total-reported-losses
- Freiermuth, M. R. (2011). Text lies and electronic bait: An analysis of email fraud and the decisions of the unsuspecting. Discourse & Communication, 5(2), 123–145. https://doi.org/10.1177/1750481310395448
- FX110. (2021). The horrible aftermath of the Sha Zhu Pan scam: Debts, ridicule and depression. https://www.fx110.cool/special/5658
- Gardner, H. (2006). Changing minds: The art and science of changing our own and other people’s minds. Harvard Business Review Press.
- Gibbs, J. P. (1975). Crime, punishment, and deterrence. Elsevier.
- Hamm, A., & Lin, Z. (2019). “Why Drones for Ordinary People?” Digital Representations, Topic Clusters, and Techno-Nationalization of Drones on Zhihu. Information, 10(8), 256. https://doi.org/10.3390/info10080256
- He, L. R. (2018). Analysis on the necessity of adding the crime of cyber-fraud into Chinese legislation. Social Scientist, 8(256), 108–113.
- Jiangsu Police. (2021). The most patient scammers in the world — Demystifying the Sha Zhu Pan scam [WeChat Blog]. https://mp.weixin.qq.com/s/9jZ48LOx_ElXXkAPJ-pj1Q
- Johnson, K. L. (2008). Tactics for changing minds. Harvard Business Review. https://hbr.org/2008/02/tactics-for-changing-minds-1.html
- Landis, J. R., & Koch, G. G. (1977). The measurement of observer agreement for categorical data. Biometrics, 159–174.
- Langenderfer, J., & Shimp, T. A. (2001). Consumer vulnerability to scams, swindles, and fraud: A new theory of visceral influences on persuasion. Psychology & Marketing, 18(7), 763–783. https://doi.org/10.1002/mar.1029
- Lea et.al. (2009). The psychology of scams: Provoking and committing errors of judgement. Office of Fair Trading. https://ore.exeter.ac.uk/repository/bitstream/handle/10871/20958/OfficeOfFairTrading%202009.pdf;sequence=1
- Leetaru, K. (2019). Why do we trust online images and video? Forbes. https://www.forbes.com/sites/kalevleetaru/2019/08/28/why-do-we-trust-online-images-and-video/?sh=b867f816d26a
- Li, J., & Zheng, H. (2020). Coverage of HPV-related information on Chinese social media: A content analysis of articles in Zhihu. Human Vaccines & Immunotherapeutics, 16(10), 2548–2554. https://doi.org/10.1080/21645515.2020.1729028
- Loewenstein, G. (1996). Out of control: Visceral influences on behavior. Organizational Behavior and Human Decision Processes, 65(3), 272–292. https://doi.org/10.1006/obhd.1996.0028
- Lu, T. L., Tu, J. A., Du, Y. H., & Liu, Y. Q. (2020). Design experiments for analysis of telecom network fraud cases based on big data technology. Experimental Technology and Management, 37(10), 50–55. https://doi.org/10.16791/j.cnki.sjg.2020.10.014
- Lyu, Z. W. (2018). How to precisely target fraud in the era of big data. Social Governance. https://kns.cnki.net/kcms/detail/detail.aspx?dbcode=CJFD&dbname=CJFDLAST2018&filename=RMLT201811031&uniplatform=NZKPT&v=PPEEA5je7mrfvMstonXuHVgMalitp3dEjlKs-vYFL5cHCwxjU220LSUqqOzaF4wa
- Mao, J. D. (2020). Research on the countermeasures for detecting and preventing the “Sha Zhu Pan” telecom network fraud. Journal of Hebei Vocational College of Public Security Police, 20(3), 24–27.
- Milgram, S. (1965). Some conditions of obedience and disobedience to authority. Human Relations, 18(1), 57–76. https://doi.org/10.1177/001872676501800105
- Nhan, J., Kinkade, P., & Burns, R. (2009). Finding a pot of gold at the end of an internet rainbow: Further examination of fraudulent email solicitation. International Journal of Cyber Criminology, 3(1), 452–475.http://www.cybercrimejournal.com/nhanetalijcc2009.pdf
- Parke, J., & Griffiths, M. (2004). Gambling addiction and the evolution of the “near miss” [Editorial]. Addiction Research & Theory, 12(5), 407–411. https://doi.org/10.1080/16066350410001728118
- Paternoster, R. (1989). Absolute and restrictive deterrence in a panel of youth: Explaining the onset, persistence/ desistance,and frequency of delinquent offending. Social Problems, 36(3), 289–309. https://doi.org/10.2307/800696
- Peng, A. Y., Cummings, J., & Li, Y. (2020). Post-reform gender politics: How do Chinese internet users portray Theresa May on Zhihu. Feminist Media Studies, 20, 1–18. https://doi.org/10.1080/14680777.2020.1788110
- Rege, A. (2009). What’s love got to do with it? Exploring online dating scams and identity fraud. International Journal of Cyber Criminology, 3(2), 494–512. https://www.cybercrimejournal.com/AunshulIJCCJuly2009.pdf
- Reid, R. L. (1986). The psychology of the near miss. Journal of Gambling Behavior, 2(1), 32–39. https://doi.org/10.1007/BF01019932
- Rusch, J. (1999). The “social engineering” of internet fraud [Paper presented]. In 1999 Internet Society’s INET’99 conference. Internet Society Proceedings. www.isoc.org/isoc/conferences/inet/99/proceedings/3g/3g_2.htm
- Shi, Y. A. (2017). Personal information protection and internet fraud governance. Journal of National Prosecutors College, 25(6), 3–23.
- Shi, Y. A. (2018). Personal information protection and governance of cyber fraud. Journal of National Prosecutors College, 25(6), 3–24.
- Sina Finance News. (2020). Guiyang police smashed a huge cross-border Sha Zhu Pan gang, involving more than 200-million-yuan financial loss. https://finance.sina.com.cn/money/lczx/2020-10-10/doc-iivhvpwz1318351.shtml
- Sina Finance News. (2021). A thorough analysis of the Sha Zhu Pan scam. https://finance.sina.com.cn/china/2021-09-28/doc-iktzqtyt8482717.shtml
- Sina News. (2019). An in-depth analysis of the Sha Zhu Pan scam: The trilogy of “pig hunting, pig nurturing and pig harvesting” in the “true-love” buchter-house. https://finance.sina.com.cn/tech/2021-09-27/doc-iktzscyx6617130.shtml
- Tan, H. K., & David, Y. (2013). Preying on lonely hearts: A systematic deconstruction of an internet romance scammer’s online lover persona. Journal of Modern Languages, 23(1), 28–40. http://ijie.um.edu.my/index.php/JML/article/view/3288
- Wang, S. L. (2009). The empirical analysis and coping strategies on cyber-fraud — A case study on Anhui Province. Academics in China, 139(6), 198–204. https://kns.cnki.net/kcms/detail/detail.aspx?dbcode=CJFD&dbname=CJFDLAST2018&filename=RMLT201811031&uniplatform=NZKPT&v=PPEEA5je7mrfvMstonXuHVgMalitp3dEjlKsvYFL5cHCwxjU220LSUqqOzaF4wa
- Wang, J. (2020). Investigating on the effect of judicial control over telecom network fraud. China Justice Magazine, 12(1), 160–176. https://doi.org/10.19430/j.cnki.3891.2020.01.011
- Whitty, M. T. (2013a). Anatomy of the online dating romance scam. Security Journal, 28(4), 443–455. https://doi.org/10.1057/sj.2012.57
- Whitty, M. T. (2013b). The scammers persuasive techniques model: Development of a stage model to explain the online dating romance scam. British Journal of Criminology, 53(4), 665–684. https://doi.org/10.1093/bjc/azt009
- Whitty, M. T. (2015). Mass-marketing fraud: A growing concern. IEEE Security & Privacy, 13(4), 84–87. https://doi.org/10.1109/MSP.2015.85
- Whitty, M. T. (2018). Do you love me? Psychological characteristics of romance scam victims. Cyberpsychology, Behavior and Social Networking, 21(2), 105–109. https://doi.org/10.1089/cyber.2016.0729
- Wu, L. P., & Jian, Q. R. (2014). The emergence, continuation and fracture of the telecommunication fraud by rural youth: A quantitative research based on six scammers from China’s south-coastal area. Youth Studies, 394(22), 22–30. https://www.cnki.com.cn/Article/CJFDTOTAL-QNYJ201401003.htm
- Xinhua Net. (2019). Sha Zhu Pan scam investigations. http://www.xinhuanet.com/legal/2019-09/03/c_1124956701.htm
- Xinhua Net. (2021). Ministry of public security: Over 300,000 telecommunications network fraud cases were cracked down, recovering a total loss of nearly 200 billion. http://www.xinhuanet.com/legal/2021-03/16/c_1211068174.htm
- Ye, & Duan. (2020). A case analysis and stimulation experimental research on Sha Zhu Pan scam. Journal of People’s Public Security University of China (Social Science Edition), 5(5), 10–16.
- Young, M. (2008, 18 September). http://419.com/
- Yuan, H. X. (2020). Qualitative and punishment of the criminal case of “killing pigs”: Thoughts from different sentences in the same case. Beijing Social Science Review, 2, 87–101. https://doi.org/10.13262/j.bjsshkxy.bjshkx.210208
- Zhang, L. J., & Wu, X. L. (2020). Research on the governance of cyber-fraud. Jiangxi Communication Science and Technology, 1, 42–45. https://doi.org/10.16714/j.cnki.36-1115/tn.2020.01.014