Table Of ContentInternationalPoliticalEconomy
SeriesEditor:TimothyM.Shaw,VisitingProfessor,UniversityofMassachusetts
Boston,USA,andEmeritusProfessor,UniversityofLondon,UK
The global political economy is in flux as a series of cumulative crises impacts
its organization and governance. The International Political Economy series has
tracked its development in both analysis and structure over the last three
decades.IthasalwayshadaconcentrationontheglobalSouth.NowtheSouth
increasingly challenges the North as the centre of development, also reflected
in a growing number of submissions and publications on indebted Eurozone
economiesinSouthernEurope.
An indispensable resource for scholars and researchers, the series examines a
variety of capitalisms and connections by focusing on emerging economies,
companies and sectors, debates and policies. It informs diverse policy commu-
nities as the established trans-Atlantic North declines and ‘the rest’, especially
theBRICS,rise.
Titlesinclude:
CarolineKuzemko
THEENERGYSECURITY–CLIMATENEXUS
HansLöfgrenandOwainDavidWilliams(editors)
THENEWPOLITICALECONOMYOFDRUGS
Production,InnnovationandTRIPSintheGlobalSouth
TimothyCadman(editor)
CLIMATECHANGEANDGLOBALPOLICYREGIMES
TowardsInstitutionalLegitimacy
IanHudson,MarkHudsonandMaraFridell
FAIRTRADE,SUSTAINABILITY,ANDSOCIALCHANGE
AndrésRivarolaPuntiglianoandJoséBriceño-Ruiz(editors)
RESILIENCEOFREGIONALISMINLATINAMERICAANDTHECARIBBEAN
DevelopmentandAutonomy
GodfreyBaldacchino(editor)
THEPOLITICALECONOMYOFDIVIDEDISLANDS
UnifiedGeographies,MultiplePolities
MarkFindlay
CONTEMPORARYCHALLENGESINREGULATINGGLOBALCRISES
NirKshetri
CYBERCRIMEANDCYBERSECURITYINTHEGLOBALSOUTH
KristianStokkeandOlleTörnquist(editors)
DEMOCRATIZATIONINTHEGLOBALSOUTH
TheImportanceofTransformativePolitics
JeffreyWilson
GOVERNINGGLOBALPRODUCTION
ResourceNetworksintheAsia-PacificSteelIndustry
InternationalPoliticalEconomy
SeriesStandingOrderISBN978–0–333–71708–0hardcover
SeriesStandingOrderISBN978–0–333–71110–1paperback
(outsideNorthAmericaonly)
You can receive future titles in this series as they are published by placing a
standing order. Please contact your bookseller or, in case of difficulty, write to
usattheaddressbelowwithyournameandaddress,thetitleoftheseriesand
oneoftheISBNsquotedabove.
Customer Services Department, Macmillan Distribution Ltd, Houndmills,
Basingstoke,HampshireRG216XS,England
Cybercrime and
Cybersecurity in the
Global South
Nir Kshetri
AssociateProfessor,UniversityofNorthCarolina-Greensboro,USA
©NirKshetri2013
Softcover reprint of the hardcover 1st edition 2013 978-1-137-02193-9
Allrightsreserved.Noreproduction,copyortransmissionofthis
publicationmaybemadewithoutwrittenpermission.
Noportionofthispublicationmaybereproduced,copiedortransmitted
savewithwrittenpermissionorinaccordancewiththeprovisionsofthe
Copyright,DesignsandPatentsAct1988,orunderthetermsofanylicence
permittinglimitedcopyingissuedbytheCopyrightLicensingAgency,
SaffronHouse,6–10KirbyStreet,LondonEC1N8TS.
Anypersonwhodoesanyunauthorizedactinrelationtothispublication
maybeliabletocriminalprosecutionandcivilclaimsfordamages.
Theauthorhasassertedhisrighttobeidentifiedastheauthorofthiswork
inaccordancewiththeCopyright,DesignsandPatentsAct1988.
Firstpublished2013by
PALGRAVEMACMILLAN
PalgraveMacmillanintheUKisanimprintofMacmillanPublishersLimited,
registeredinEngland,companynumber785998,ofHoundmills,Basingstoke,
HampshireRG216XS.
PalgraveMacmillanintheUSisadivisionofStMartin’sPressLLC,
175FifthAvenue,NewYork,NY10010.
PalgraveMacmillanistheglobalacademicimprintoftheabovecompanies
andhascompaniesandrepresentativesthroughouttheworld.
Palgrave®andMacmillan®areregisteredtrademarksintheUnitedStates,
theUnitedKingdom,Europeandothercountries.
ISBN 978-1-349-43775-7 ISBN 978-1-137-02194-6 (eBook)
DOI 10.1057/9781137021946
Thisbookisprintedonpapersuitableforrecyclingandmadefromfully
managedandsustainedforestsources.Logging,pulpingandmanufacturing
processesareexpectedtoconformtotheenvironmentalregulationsofthe
countryoforigin.
AcataloguerecordforthisbookisavailablefromtheBritishLibrary.
AcatalogrecordforthisbookisavailablefromtheLibraryofCongress.
10 9 8 7 6 5 4 3 2 1
22 21 20 19 18 17 16 15 14 13
Contents
ListofFiguresandTables viii
PrefaceandAcknowledgements x
1 CybercrimeandCybersecurityintheGlobalSouth:
Status,DriversandTrends 1
1.1 Introduction 1
1.2 Cybercrimeandcybersecurityissuesinrelationto
theinternationalpoliticaleconomy 3
1.3 Definitionsofmajorterms 6
1.4 AreviewofcybercrimesintheGS 8
1.5 TheGN–GSstructuraldifferencesincybercrimeand
cybersecurity 12
1.6 AtypologyofcybercrimesintheGS 20
1.7 Concludingcomments 28
2 TechnologicalandGlobalForcesShapingCybercrime
andCybersecurityintheGlobalSouth 30
2.1 Introduction 30
2.2 Technologicalforces 33
2.3 Globalforces 44
2.4 Concludingcomments 49
3 CybercrimeandCybersecurityintheFormerSoviet
UnionandCentralandEasternEurope 51
3.1 Introduction 51
3.2 Assessingthenature,extentandimpactof
cybercrimesassociatedwiththeregion 52
3.3 Formalandinformalinstitutionsrelatedto
cybercrime 58
3.4 Thepushandpullfactorsrelatedtocybercrimes 61
3.5 Internationalcollaboration,cooperationand
partnership 64
3.6 Casestudiesofsomefirmsfromtheregionengaged
incybercrimes 67
3.7 Discussionandimplications 75
v
vi Contents
4 CybercrimeandCybersecurityinChina 77
4.1 Introduction 77
4.2 Asurveyofcybercrimesassociatedwith
China 78
4.3 StructureoftheChineseeconomyinrelationto
cybercrimesoriginatingfromandaffectingthe
country 81
4.4 Institutionalfactors 86
4.5 Concludingcomments 98
5 CybercrimeandCybersecurityinIndia 101
5.1 Introduction 101
5.2 AnoverviewofcybercrimesinIndia 102
5.3 StructureoftheIndianeconomyinrelationto
cybercrimesoriginatingfromandaffectingthe
country 106
5.4 Institutionsrelatedtocybercrimes 111
5.5 ACasestudyofNASSCOM’seffortsinenhancing
cybersecurityintheIndianoffshoringindustry 113
5.6 Discussionandimplications 115
5.7 Concludingcomments 117
6 CybercrimeandCybersecurityintheMiddleEastand
NorthAfricanEconomies 119
6.1 Introduction 119
6.2 Asurveyofcybercrimesassociatedwiththe
MENAeconomies 120
6.3 StructureoftheMENAeconomiesinrelationto
cybercrimesoriginatingfromandaffectingthem 125
6.4 InstitutionsrelatedtocybercrimesinMENA 126
6.5 Discussionandimplications 132
6.6 Concludingcomments 134
7 CybercrimeandCybersecurityinLatinAmericanand
CaribbeanEconomies 135
7.1 Introduction 135
7.2 Theescalationofcybercrimeactivitiesassociated
withLACeconomies 136
7.3 Economicfactors 140
7.4 InstitutionalfactorsrelatedtocybercrimesinLAC
economies 145
Contents vii
7.5 Naturesoforganizedcrimeandcybercrimegroups
inLACeconomies 146
7.6 Concludingcomments 149
8 CybercrimeandCybersecurityinSub-SaharanAfrican
Economies 152
8.1 Introduction 152
8.2 SSA’sdigitization:Thecybercrimeandcybersecurity
dimensions 154
8.3 HollownessinAfrica’sdigitizationinitiatives 159
8.4 ExternalitiesintheSSAcybercrimeindustry 161
8.5 Progressesontheinstitutionalandtechnological
fronts 164
8.6 Concludingcomments 168
9 CybercrimeandCybersecurityintheDeveloping
PacificIslandEconomies 171
9.1 Introduction 171
9.2 DigitizationofDPIEsandcybercrimesassociated
withtheseeconomies 172
9.3 Aframeworkforexplainingcybercrimesassociated
withDPIEs 176
9.4 Discussionandimplications 183
9.5 Concludingcomments 188
10 Discussion,ImplicationsandConcludingRemarks 190
10.1 Introduction 190
10.2 Dominantandidiosyncraticforcesrelatedto
cybercrimesinGSeconomies 193
10.3 Evolutionofcybersecurity-relatedinstitutionsinthe
GNandtheGS 196
10.4 Internationalrelationsandinternationalpolitics
issuesrelatedtocybersecurity 200
10.5 Futureresearch 201
10.6 Finalthought 202
Notes 205
References 206
Index 247
Figures and Tables
Figures
1.1 Atypologyofcybercrimes 21
Tables
1.1 Explanationofsomeofthemajortermsusedinthe
book 7
1.2 Topcybercrimesources(2002–2004) 9
1.3 Topcybercrimesourcesandtargets(2007–2012) 10
1.4 Someexamplesofcybercrimesassociatedwithvarious
categoriesofperpetratorsandtargetsintheGS 25
1.5 A2×2matrixforcategoriesofcyberattacks
representingjurisdictionofthetarget/victimand
motivation:anillustrationfromChina 28
2.1 Variousexamplesandsomeoftheassociated
mechanismsrelatedtocybercrimesassociatedwith
theGS 31
2.2 Variousflowsrelatedtocybercrimeandcybersecurity 32
3.1 Someexamplesofnotableinternationalcybercrime
networksassociatedwiththeFSU&CEEeconomies 55
4.1 SomerepresentativestudiesonChina’spositioninthe
globalcyberattackindustry 79
4.2 Somenotableexamplesoftheengagementofethnic
Chineseinallegedcyberespionageactivitiesagainst
economicandindustrialtargets 82
4.3 SomenotableexamplesofChina’sallegedcyber
espionageactivitiesagainstmilitaryandpoliticaltargets 83
7.1 CybercrimeactivitiesoriginatinginLACeconomies 137
7.2 CybercrimeactivitiestargetingLACeconomies 137
7.3 SomeeconomiesinLatinAmericaandtheCaribbeanas
topcybercrimesources 141
8.1 Someofthetopcybercrime-originatingSSAcountries 163
8.2 Cybercrime-relatedlawsinselectedSSAeconomies 165
viii
ListofFiguresandTables ix
8.3 Currentstatesandfutureprospectsofcybercrimesin
SSAeconomies 169
9.1 Digitizationandescalationofcybercrimeactivitiesand
evolutionofcybersecurity-relatedinstitutionsinDPIEs:
Majormilestones 173
9.2 Externalitymechanismsandfeedbacksystems
producingincreasingreturnincybercrimeactivities
associatedwithDPIEs 178
9.3 Variousformsofcontrolsforcybercrimeactivitiesin
DPIEs 184
9.4 DeterminantsandimpactsofcybercrimesinDPIEs 186
10.1 Dominantandidiosyncraticforcesrelatedto
cybercrimesintheeconomiesusedinthebook 194