HomeAsia Pacific Journal of Management and Sustainable Developmentvol. 13 no. 1 Part 3 (2025)

Social Engineering and Government Initiatives in Combating Cybercrime in China

Yin Bihui | Philip B. Magtaan

Discipline: Politics

 

Abstract:

Technology and the internet have become an essential need that can help our world to be fairer, peaceful, and just. This study investigated social engineering as the main variable in the commission of cybercrime and assessed the government actions to prevent cybercrime in China. This study adopted a descriptive-correlational research design and utilized the validated and reliable self-constructed survey questionnaire administered to 390 professionals selected through stratified random sampling. The findings revealed that the majority of the respondents were in their early adulthood stage, male, obtained a college degree, and belonged to the corporate industry; They moderately disagreed that social, psychological, and technical factors contributed to social engineering as an indicator of cybercrime incidence. Further, it was found that that they moderately disagreed on government initiatives in combatting cybercrime with regards to national cybersecurity strategies, cyber-defense initiatives and international cooperation. The study further found a significant relationship between social engineering as a factor in cybercrime and government initiatives to combat it, along with notable differences in perceptions of social engineering based on gender and education level while proposing a strategy to address social engineering factors in cybercrime. Based on the results, it hereby proposed measures to address the privacy and security dilemma which include strengthening transparency and fairness in data collection practices, enhancing public trust in law enforcement through tailored governance, providing targeted protection for vulnerable groups in resource allocation, and fostering international cooperation and support systems for cybercrime victims to improve overall cybersecurity and individual rights.



References:

  1. Xia, L., Baghaie, S., & Sajadi, S. M. (2023). The digital economy: Challenges and opportunities in the new era of technology and electronic communications. Ain Shams Engineering Journal, 15(2), 102411. https://doi.org/10.1016/j.asej.2023.102411
  2. Calif, S. (2020). Cybercrime To Cost The World $10.5 Trillion Annually By 2025. https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/
  3. FORTRA (2024). 81% of Security Professionals Identify Phishing as the Top Threat in 2024. https://www.fortra.com/resources/press-releases/81-security-professionals-identify-phishing-top-threat-2024
  4. Griffiths, C. (2025). The Latest 2025 Cyber Crime Statistics. https://aag-it.com/the-latest-cyber-crime-statistics/
  5. Xinhua. (2023). Cybercrime surge in China: Ministry of Public Security data. Xinhua News. https://www.xinhuanet.com
  6. Alawida, M., Omolara, A. E., Abiodun, O. I., & Al-Rajab, M. (2022). A deeper look into cybersecurity issues in the wake of Covid-19: A survey. Journal of King Saud University - Computer and Information Sciences, 34(10), 8176–8206. https://doi.org/10.1016/j.jksuci.2022.08.003
  7. Han, B. (2023). Individual Frauds in China: Exploring the Impact and Response to Telecommunication Network Fraud and Pig Butchering Scams. https://pure.port.ac.uk/ws/portalfiles/portal/81985344/Bing_Han_PhD_thesis.pdf
  8. Toso, C. et al (2024). Cybercrime Awareness Among Senior High School Students. https://doi.org/10.46382/MJBAS.2023.7218
  9. Mwangi, B. et al (2022). A Survey of Cyber Crime Awareness Among Netizens of Higher Education Institutions: A Case Study of Zetech University. https://doi.org/10.7753/IJCATR1111.1002
  10. Kirvan, P., & Bacon, M. (2025). What are social engineering attacks? Search Security. https://www.techtarget.com/searchsecurity/definition/social-engineering
  11. Dupont, B., & Holt, T. J. (2022). Advancing research on the Human Factor in Cybercrime. Computers in Human Behavior, 138, 107410. https://doi.org/10.1016/j.chb.2022.107410
  12. Hildebrandt, M. (2020). Cybercrime. In Oxford University Press eBooks (pp. 163–190). https://doi.org/10.1093/oso/9780198860877.003.0006
  13. Wright, M. R. (2020). "The Art of Social Engineering: Understanding the Motivations Behind Cyber Attacks." Journal of Cybersecurity, 9(1), 56-70.
  14. Zhong, X. (2023). China: New Law Takes Effect to Combat Telecom and Online Fraud. https://www.loc.gov/item/global-legal-monitor/2023-01-31/china-new-law-takes-effect-to-combat-telecom-and-online-fraud/
  15. SCIO (2023). China's Law-Based Cyberspace Governance in the New Era. http://www.scio.gov.cn/zfbps/ndhf/49551/202303/t20230320_709284_m.html
  16. Cristiano, F. & Berg, B. (2023). Hybridity, Conflict, and the Global Politics of Cybersecurity. https://www.researchgate.net/publication/374295519_Hybridity_Conflict_and_the_Global_Politics_of_Cybersecurity
  17. Vandendorpe, M. et al. (2025). Effect of gender differences on cognitive ability. https://www.ebsco.com/research-starters/psychology/effect-gender-differences-cognitive-ability
  18. Schmengler, H., Peeters, M., Stevens, G. W. J. M., Kunst, A. E., Hartman, C. A., Oldehinkel, A. J., & Vollebergh, W. a. M. (2021). Educational level, attention problems, and externalizing behaviour in adolescence and early adulthood: the role of social causation and health-related selection—the TRAILS study. European Child & Adolescent Psychiatry, 32(5), 809–824. https://doi.org/10.1007/s00787-021-01913-4
  19. Fatokun, F. B., Hamid, S., Norman, A., & Fatokun, J. O. (2019). The Impact of Age, Gender, and Educational level on the Cybersecurity Behaviors of Tertiary Institution Students: An Empirical investigation on Malaysian Universities. Journal of Physics Conference Series, 1339(1), 012098. https://doi.org/10.1088/1742-6596/1339/1/012098
  20. World Economic Forum (2022). Global Cybersecurity Outlook 2024. https://www3.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2024.pdf
  21. Du, X., & Chintakovid, T. (2023). A survey of cybersecurity awareness among undergraduate students at Yunnan University of Finance and Economics in China. In Atlantis Highlights in Computer Sciences/Atlantis highlights in computer sciences (pp. 740–753). https://doi.org/10.2991/978-94-6463-172-2_78 
  22. Interpol (2024). Global Cyber Security Report. https://www.interpol.int/content/download/22308/file/Asia%20and%20South%20Pacific%20Cyberthreat%20Assessment%20Report%202024-4.pdf
  23. Oliinyk. B. and Oleksiuk, V. (2024). Social engineering as a component of professional competence in information security of future computer science teachers https://acnsci.org/journal/index.php/ed/article/view/778/770
  24. Witjes, N., & Wentland, A. (2021). Hacking humans? Social engineering and the construction of the “Deficient user” in cybersecurity discourses. Science Technology & Human Values, 46(6), 1316–1339. https://doi.org/10.1177/0162243921992844.
  25. Mishra, A., Alzoubi, Y. I., Anwar, M. J., & Gill, A. Q. (2022). Attributes impacting cybersecurity policy development: An evidence from seven nations. Computers & Security, 120, 102820. https://doi.org/10.1016/j.cose.2022.102820