Abstract
The pig-butchering scam, also known as Sha Zhu Pan (杀猪盘) in Chinese, is a distinctive form of online romance scam. It involves fraudulently enticing victims through fake online investment platforms and the use of romantic persuasion. While this crime is renowned for its innovative social engineering techniques, there is a lack of knowledge regarding the scammers' involvement in human trafficking, particularly their recruitment of vulnerable Chinese workers for illegal labor practices. Recognizing these overlapping identities, the current research aims to comprehensively understand the process of identity transformation experienced by these Chinese workers concerning their vulnerabilities and resilience. Using victim testimonial data from two prominent online sources, this study presents a four-stage model outlining the processes undergone by trafficked Chinese workers, leading to the development of a victim-offender identity. Additionally, this effort elucidates strategies employed by them to manage the unique identity subsequent to their escape from the base camp of the pig-butchering scam. The outcomes shed light on a significant criminogenic aspect within the pig-butchering scam, an area that has received limited attention thus far. This knowledge is crucial for a comprehensive understanding of the factors contributing to the transformation of these individuals into scammers, thereby offering valuable insights for preemptive prevention and rehabilitation initiatives.

Similar content being viewed by others
Data Availability
The data collected for this publication is not publicly released.
Notes
It is advisable to employ a specialized term to describe this base camp, which is often referred to as a technology park and self-described as a high-tech corporation, thereby exhibiting a deceptive and misleading facade. These parks typically comprise various buildings serving for different purposes, maintain their own armed security personnel, institute a comprehensive organizational structure, and enforce strict access controls (Sohu 2023a, b, c).
The United Wa State Army, abbreviated as the UWSA or the UWS Army, is the military wing of the United Wa State Party, the de facto ruling party of Wa State in Myanmar. It is a well-equipped ethnic minority army of an estimated 20,000–30,000 Wa soldiers, led by Bao Youxiang.
A typical base camp of pig-butchering scam is divided into infield and outfield. Infield is consisted of those individuals working on talking to victims, manipulating the baits for fake investments or gambling. Outfield serves for those individuals working infield, is consisted of workers managing different gambling games, with the purpose of drain the money earned by those infield workers. The ultimate purpose is to benefit the head of pig-butchering scam.
This happens because the new company needs to pay additional 10,000 USD or even more to buy this worker. Thus, the additional amount is the number that the worker owned to the new company.
References
163.com News (2023a) Highly Educated and Still Deceived? Chinese Academy of Sciences PhD Lured into Myanmar, Missing Without a Trace - Girlfriend Reveals Further Details. https://www.163.com/dy/article/ICDS0MDJ0552PK4S.html
163.com News (2023b) The United Nations Releases a Special Report, Revealing the Gruesome Reality of 'Pig Butchering Scam' in Southeast Asia. https://www.163.com/dy/article/IDLADI4U05562MTO.html
Aborisade RA, Aderinto AA (2008) Pathways to sex workers’ social rehabilitation and assessment of rehabilitation approaches in Nigeria: Evidence from a qualitative study. Gend Behav 6(2):1925–1959. https://hdl.handle.net/10520/EJC34557
Agnew R (1992) Foundation for a general strain theory of crime and delinquency. Criminology 30:47–88. https://doi.org/10.1111/j.1745-9125.1992.tb01093.x
Agnew R (2006) General strain theory: Current status and directions for further research. In: Cullen FT, Wright J, Blevins K (eds) Taking stock: The status of criminological theory. Transaction Publishers
Akers RL, Jennings WG (2009) The social learning theory of crime and deviance. In: Krohn M, Lizotte A, Hall G (eds) Handbook on criminology and deviance. Springer, New York, pp 103–120 (538-548)
Aronowitz, A. A., & Chmaitilly, M. (2020). Human trafficking: Women, children, and victim-offender overlap. In Oxford Research Encyclopedia of Criminology and Criminal Justice. https://doi.org/10.1093/acrefore/9780190264079.013.609
Bachmann DJ, Jamison NK, Martin A, Delgado J, Kman NE (2015) Emergency preparedness and disaster response: There’s an app for that. Prehosp Disaster Med 30(5):486–490. https://doi.org/10.1017/S1049023X15005099
Bao ZP (2023) How Northern Myanmar Became a 'Scamming Hell. China Institute of International Studies. https://www.ciis.org.cn/yjcg/sspl/202309/t20230906_9057.html
Barnes JC, Raine A, Farrington DP (2022) The interaction of biopsychological and socio-environmental influences on criminological outcomes. Justice Q 39(1):26–50. https://doi.org/10.1080/07418825.2020.1730425
Baxter ALA (2020) When the line between victimization and criminalization blurs: the victim-offender overlap observed in female offenders in cases of trafficking in persons for sexual exploitation in Australia. J Hum Traffick 6(3):327–338. https://doi.org/10.1080/23322705.2019.1578579
BBC (2023) The 'Pig Butchering Scam' Love Trap Revealed: 'How We Swindled Millions of Dollars. https://www.bbc.com/zhongwen/simp/chinese-news-64885188
Beckley AL, Caspi A, Arseneault L, Barnes JC, Fisher HL, Harrington H, ..., Moffitt TE (2018) The developmental nature of the victim-offender overlap. J Dev Life-Course Criminol 4:24–49. https://doi.org/10.1007/s40865-017-0068-3
Berg MT, Stewart EA, Schreck CJ, Simons RL (2012) The victim–offender overlap in context: examining the role of neighborhood street culture. Criminology 50(2):359–390. https://doi.org/10.1111/j.1745-9125.2011.00265.x
Boppre B, Reed SM (2021) “I’m not a number, I’ma human being:” a phenomenological study of women’s responses to labeling. Fem Criminol 16(2):191–215. https://doi.org/10.1177/1557085120953488
Bossler AM, Holt TJ (2009) On-line activities, guardianship, and malware infection: An examination of routine activities theory. Int J Cyber Criminol 3(1):400–420
Bossler AM, Holt TJ (2010) The effect of self-control on victimization in the cyberworld. J Crim Just 38(3):227–236. https://doi.org/10.1016/j.jcrimjus.2010.03.001
Bracy K, Lul B, Roe-Sepowitz D (2021) A four-year analysis of labor trafficking cases in the United States: exploring characteristics and labor trafficking patterns. J Hum Traffick 7(1):35–52. https://doi.org/10.1080/23322705.2019.1638148
Broidy L, Payne J, Piquero AR (2018) Making sense of heterogeneity in the influence of childhood abuse, mental health, and drug use on women’s offending pathways. Crim Justice Behav 45(10):1565–1587. https://doi.org/10.1177/0093854818776687
Buglar S (2016) The ‘focal concerns’ of parole board decision-making: a thematic analysis. Curr Issues Crim Just 27(3):285–302. https://doi.org/10.1080/10345329.2016.12036047
Buller DB, Burgoon JK (1996) Interpersonal deception theory. Commun Theory 6(3):203–242. https://doi.org/10.1111/j.1468-2885.1996.tb00127.x
Casassa K, Knight L, Mengo C (2022) Trauma bonding perspectives from service providers and survivors of sex trafficking: a scoping review. Trauma Violence Abuse 23(3):969–984. https://doi.org/10.1177/1524838020985542
Chan HCO (2019) Exploring the overlap between victimization and offending among Hong Kong adolescents. J Crim Just 61:72–80. https://doi.org/10.1016/j.jcrimjus.2019.03.003
Chen X, Deng S (2014) Influencing factors of answer adoption in social Q&A communities from users’ perspective: Taking Zhihu as an example. Chinese Journal of Library and Information Science 7(3):81–95
China News (2023) How I Was Deceived into Scams in Myanmar: Man Shares Inhumane Experience. https://www.chinanews.com.cn/sh/2023/07-12/10041129.shtml
Christensen J, Aarøe L, Baekgaard M, Herd P, Moynihan DP (2020) Human capital and administrative burden: The role of cognitive resources in citizen-state interactions. Public Adm Rev 80(1):127–136. https://doi.org/10.1111/puar.13134
Chu K, Billings J (2022) Mental health experiences of sex trafficking victims in western countries: a qualitative study. J Hum Traffick 8(4):367–389. https://doi.org/10.1080/23322705.2020.1825897
Cohen LE, Felson M (1979) Social change and crime rate trends: a routine activity approach. Am Sociol Rev 44(4):88–608. https://www.jstor.org/stable/2094589
Coinbase Global Investigations (2022) Security PSA: Sha Zhu Pan (Pig Butchering) Investment Scams. Coinbase. https://www.coinbase.com/blog/security-psa-sha-zhu-pan-pig-butchering-investment-scams
Contreras M, Farley M (2011) Human trafficking: Not an isolated issue. In: Bryant-Davis T (ed) Surviving Sexual Violence: A Guide to Recovery and Empowerment. Rowman and Littlefield, pp 26–36
Cross C (2023) Romance baiting, cryptorom and ‘pig butchering’: an evolutionary step in romance fraud. Curr Issues Crim Justice: 1–13. https://doi.org/10.1080/10345329.2023.2248670
Daday JK, Broidy LM, Crandall CS, Sklar DP (2005) Individual, neighborhood, and situational factors associated with violent victimization and offending. Crim Justice Stud 18(3):215–235. https://doi.org/10.1080/14786010500287347
Daquin JC, Daigle LE (2021) The victim-offender overlap in prison: examining the factors associated with group membership. J Interpers Violence 36(23–24):NP13439–NP13462. https://doi.org/10.1177/0886260519898427
Davidson and Lin (2022) Hundreds of Taiwanese trafficked to Cambodia and held captive by telecom scam gangs. The Guardian. https://www.theguardian.com/world/2022/aug/23/hundreds-of-taiwanese-trafficked-to-cambodia-and-held-captive-by-telecom-scam-gangs
Deng S, Jiang Y, Li H, Liu Y (2020) Who contributes what? Scrutinizing the activity data of 4.2 million Zhihu users via immersion scores. Inf Process Manag 57(5):102274. https://doi.org/10.1016/j.ipm.2020.102274
Doychak K, Raghavan C (2020) “No voice or vote:” trauma-coerced attachment in victims of sex trafficking. J Hum Traffick 6(3):339–357. https://doi.org/10.1080/23322705.2018.1518625
Engström M, Hiltunen J, Wallby T, Lucas S (2021) Child Health Nurses’ experiences of addressing psychosocial risk factors with the families they meet. Acta Paediatr 110(2):574–583
Fagan AA (2005) The relationship between adolescent physical abuse and criminal offending: support for an enduring and generalized cycle of violence. J Fam Violence 20:279–290. https://doi.org/10.1007/s10896-005-6604-7
Felson RB, Burchfield KB (2004) Alcohol and the risk of physical and sexual assault victimization. Criminology 42(4):837–860. https://doi.org/10.1111/j.1745-9125.2004.tb00538.x
Finn MA, Muftić LR, Marsh EI (2015) Exploring the overlap between victimization and offending among women in sex work. Vict Offenders 10(1):74–94. https://doi.org/10.1080/15564886.2014.918069
Flexon JL, Meldrum RC, Piquero AR (2016) Low self-control and the victim–offender overlap: a gendered analysis. J Interpers Violence 31(11):2052–2076. https://doi.org/10.1177/0886260515572471
Fox B (2017) What makes a difference? Evaluating the key distinctions and predictors of sexual and non-sexual offending among male and female juvenile offenders. J Crim Psychol 7(2):134–150. https://doi.org/10.1108/JCP-12-2016-0047
Gillespie AA (2017) The electronic Spanish prisoner: Romance frauds on the internet. J Crim Law 81(3):217–231. https://doi.org/10.1177/0022018317702803
Goffman E (1978) The presentation of self in everyday life. Harmondsworth, London
Gottfredson MR (1981) On the etiology of criminal victimization. J Crim L Criminol 72:714
Gottfredson MR, Hirschi T (1990) A general theory of crime. Stanford University Press
Guémené D, Guy G (2004) The past, present and future of force-feeding and “foie gras” production. Worlds Poult Sci J 60(2):210–222. https://doi.org/10.1079/WPS200314
Hamm A, Lin Z (2019) “Why drones for ordinary people?” Digital representations, topic clusters, and techno-nationalization of drones on Zhihu. Information 10(8):256
Hay C, Meldrum R (2010) Bullying victimization and adolescent self-harm: testing hypotheses from general strain theory. J Youth Adolesc 39:446–459. https://doi.org/10.1007/s10964-009-9502-0
He LR (2018) Analysis on the necessity of adding the crime of cyber-fraud into Chinese legislation. Soc Sci 8(256):108–113
Henderson AC, Rhodes SM (2022) “Got sold a dream and it turned into a nightmare”: the victim-offender overlap in commercial sexual exploitation. J Hum Traffick 8(1):33–48. https://doi.org/10.1080/23322705.2021.2019530
Higgins GE, Jennings WG (2010) Is unstructured socializing a dynamic process? An exploratory analysis using a semiparametric group-based modeling approach. Crim Justice Rev 35(4):514–532. https://doi.org/10.1177/0734016810377351
Hindelang MJ, Gottfredson MR, Garofalo J (1978) Victims of personal crime: an empirical foundation for a theory of personal victimization. Ballinger, Cambridge
Holt TJ, Fitzgerald S, Bossler AM, Chee G, Ng E (2016) Assessing the risk factors of cyber and mobile phone bullying victimization in a nationally representative sample of Singapore youth. Int J Offender Ther Comp Criminol 60(5):598–615. https://doi.org/10.1177/0306624X14554852
Holzscheiter A, Gholiagha S, Liese A (2022) Advocacy coalition constellations and norm collisions: Insights from International drug control, human trafficking, and child labour. Glob Soc 36(1):25–48. https://doi.org/10.1080/13600826.2021.1885352
Hong W, Mao J, Wu L, Pu X (2021) Public cognition of the application of blockchain in food safety management—Data from China’s Zhihu platform. J Clean Prod 303:127044. https://doi.org/10.1016/j.jclepro.2021.127044
Hopper EK (2017) The multimodal social ecological (MSE) approach: A trauma-informed framework for supporting trafficking survivors’ psychosocial health. Human trafficking is a public health issue: A paradigm expansion in the United States. pp 153–183
Jennings WG, Higgins GE, Tewksbury R, Gover AR, Piquero AR (2010) A longitudinal assessment of the victim-offender overlap. J Interpers Violence 25(12):2147–2174. https://doi.org/10.1177/0886260509354888
Jennings WG, Piquero AR, Reingle JM (2012) On the overlap between victimization and offending: a review of the literature. Aggress Violent Behav 17(1):16–26. https://doi.org/10.1016/j.avb.2011.09.003
Jiang T, Wang Y, Lin T, Shangguan L (2021) Evaluating Chinese government WeChat official accounts in public service delivery: a user-centered approach. Gov Inf Q 38(1):101548. https://doi.org/10.1016/j.giq.2020.101548
Jose PE, Kljakovic M, Scheib E, Notter O (2012) The joint development of traditional bullying and victimization with cyber bullying and victimization in adolescence. J Res Adolesc 22(2):301–309. https://doi.org/10.1111/j.1532-7795.2011.00764.x
Kalergis KI (2009) A passionate practice: addressing the needs of commercially sexually exploited teenagers. Affilia 24(3):315–324. https://doi.org/10.1177/0886109909337706
Kerstens J, Jansen J (2016) The victim–perpetrator overlap in financial cybercrime: evidence and reflection on the overlap of youth’s on-line victimization and perpetration. Deviant Behav 37(5):585–600. https://doi.org/10.1080/01639625.2015.1060796
Kuo SY, Chang KM, Chen YS, Lai YL, Chang YS, Li Y (2022) Assessing the victim–offender overlap in prison victimization and misconduct among Taiwanese male inmates. Br J Criminol 62(3):585–606. https://doi.org/10.1093/bjc/azab066
Kushner M (2022) Betrayal trauma and gender: An examination of the victim–offender overlap. J Interpers Violence 37(7–8):NP3750–NP3778. https://doi.org/10.1177/0886260520951309
Lauritsen J, Laub J (2007) Understanding the link between victimization and offending: New reflections on an old idea. In: Hough M, Maxfield Monsey M (eds) Surveying crime in the twenty-first century, vol 22. Criminal Justice Press, New York
Li J, Zheng H (2020) Coverage of HPV-related information on Chinese social media: a content analysis of articles in Zhihu. Hum Vaccin Immunother 16(10):2548–2554
Liu XJ (2023) Chinese Descendants Caught in Pig Slaughter Scam: High Education No Escape from Two-Time Deception. https://www.worldjournal.com/wj/story/121519/7074673?from=wj_hotnews_story&zh-cn
Loughran TA (2019) Behavioral criminology and public policy. Criminol Public Policy 18(4):737–758. https://doi.org/10.1111/1745-9133.12465
Lyu ZW (2018) How to precisely target fraud in the era of big data. Social Governance. https://kns.cnki.net/kcms/detail/detail.aspx?dbcode=CJFD&dbname=CJFDLAST2018&filename=RMLT201811031&uniplatform=NZKPT&v=PPEEA5je7mrfvMstonXuHVgMalitp3dEjlKsvYFL5cHCwxjU220LSUqqOzaF4wa
Maldonado-Molina MM, Jennings WG, Tobler AL, Piquero AR, Canino G (2010) Assessing the victim-offender overlap among Puerto Rican youth. J Crim Just 38(6):1191–1201. https://doi.org/10.1016/j.jcrimjus.2010.09.008
Marcum CD, Higgins GE, Freiburger TL, Ricketts ML (2014) Exploration of the cyberbullying victim/offender overlap by sex. Am J Crim Justice 39:538–548. https://doi.org/10.1007/s12103-013-9217-3
Maruna S (2010) Mixed method research in criminology: why not go both ways? In: Piquero AR, Weisburd D (eds) Handbook of Quantitative Criminology. Springer, pp 123–140
McClain NM, Garrity SE (2011) Sex trafficking and the exploitation of adolescents. J Obstet Gynecol Neonatal Nurs 40(2):243–252
McCready A (2023) From industrial-scale scam centers, trafficking victims are being forced to steal billions. The Vice. https://www.vice.com/en/article/n7zb5d/pig-butchering-scam-cambodia-trafficking
McGloin JM, O’Neill Shermer L (2009) Self-control and deviant peer network structure. J Res Crime Delinq 46(1):35–72. https://doi.org/10.1177/0022427808326585
Miley LN, Fox B, Muniz CN, Perkins R, DeLisi M (2020) Does childhood victimization predict specific adolescent offending? An analysis of generality versus specificity in the victim-offender overlap. Child Abuse Negl 101:104328. https://doi.org/10.1016/j.chiabu.2019.104328
Ngo FT, Paternoster R (2011) Cybercrime victimization: an examination of individual and situational level factors. Int J Cyber Criminol 5(1):773
Osgood DW, Wilson JK, O’Malley PM, Bachman JG, Johnston LD (1996) Routine activities and individual deviant behavior. Am Sociol Rev 61:635–655. https://doi.org/10.2307/2096397
Papalia N, Ogloff JR, Cutajar M, Mullen PE (2018) Child sexual abuse and criminal offending: gender-specific effects and the role of abuse characteristics and other adverse outcomes. Child Maltreat 23(4):399–416. https://doi.org/10.1177/1077559518785779
Pascual-Leone A, Kim J, Morrison OP (2017) Working with victims of human trafficking. J Contemp Psychother 47:51–59
Peng AY, Cummings J, Li Y (2022) Post-reform gender politics: how do Chinese Internet users portray Theresa May on Zhihu. Fem Media Stud 22(1):48–65
Piquero AR, MacDonald J, Dobrin A, Daigle LE, Cullen FT (2005) Self-control, violent offending, and homicide victimization: assessing the general theory of crime. J Quant Criminol 21:55–71. https://doi.org/10.1007/s10940-004-1787-2
Pitts WJ, Barrick K, Zhang SX, Lattimore PK (2015) Estimating labor trafficking among farmworkers: an inverse sampling strategy based on reliable housing predictions. J Hum Traffick 1(2):117–135. https://doi.org/10.1080/23322705.2014.977092
Pratt TC, Cullen FT (2000) The empirical status of Gottfredson and Hirschi’s general theory of crime: a meta-analysis. Criminology 38(3):931–964. https://doi.org/10.1111/j.1745-9125.2000.tb00911.x
Pyrooz DC, Moule RK Jr, Decker SH (2014) The contribution of gang membership to the victim–offender overlap. J Res Crime Delinq 51(3):315–348. https://doi.org/10.1177/0022427813516128
Rafferty Y (2016) Challenges to the rapid identification of children who have been trafficked for commercial sexual exploitation. Child Abuse Negl 52:158–168. https://doi.org/10.1016/j.chiabu.2015.11.015
Raitt FE, Zeedyk MS (2003) False memory syndrome: undermining the credibility of complainants in sexual offences. Int J Law Psychiatry 26(5):453–471. https://doi.org/10.1016/S0160-2527(03)00081-5
Reyns BW, Fisher BS, Bossler AM, Holt TJ (2019) Opportunity and self-control: do they predict multiple forms of online victimization? Am J Crim Justice 44:63–82. https://doi.org/10.1007/s12103-018-9447-5
Schreck CJ (1999) Criminal victimization and low self-control: an extension and test of a general theory of crime. Justice Q 16(3):633–654. https://doi.org/10.1080/07418829900094291
Serie CM, Krumeich A, van Dijke A, de Ruiter E, Terpstra L, de Ruiter C (2018) Sex traffickers’ views: a qualitative study into their perceptions of the victim–offender relationship. J Hum Traffick 4(2):169–184. https://doi.org/10.1080/23322705.2017.1337439
Shen L, Wang S, Chen W, Fu Q, Evans R, Lan F, ..., Zhang Z (2019) Understanding the function constitution and influence factors on communication for the WeChat official account of top tertiary hospitals in China: cross-sectional study. J Med Internet Res 21(12):e13025. https://doi.org/10.2196/13025
Shi YA (2018) Personal information protection and governance of cyber fraud. J Natl Prosecutors Coll 25(6):3–24
Silver E, Piquero AR, Jennings WG, Piquero NL, Leiber M (2011) Assessing the violent offending and violent victimization overlap among discharged psychiatric patients. Law Hum Behav 35:49–59. https://doi.org/10.1007/s10979-009-9206-8
Simser J (2014) Culpable insiders–the enemy within, the victim without. J Financ Crime 21(3):310–320. https://doi.org/10.1108/JFC-11-2013-0068
Sina News (2023) 15 people sentenced! The entire process of the rise and fall of a "pig killing ring" in northern Myanmar exposed. https://news.sina.cn/2023-08-29/detail-imziwehf8261676.d.html
Sohu News (2021) How Does the Pig Butchering Scam in Northern Myanmar Lead to Financial Ruin?. https://www.sohu.com/a/484277414_121124619
Sohu News (2023a) Highly Educated Talent Becoming Main Cash Resource for Scam Syndicates in Northern Myanmar. https://www.sohu.com/a/714206268_120565087
Sohu News (2023b) Returning to China to 'stand on their own feet'? This couple was both arrested. https://m.sohu.com/a/715790401_162758
Sohu News (2023c) The End Draws Near for Northern Myanmar Fraud Groups as Myanmar and China Collaborate: Wa State in Myanmar Announces Comprehensive Clean-Up. https://www.sohu.com/a/718559833_121451252
Solomon F (2023) China's Zero Tolerance for 'Pig Butchering' Scams: Cross-Border Heavy-handed Crackdown on Telecommunications Scams. Wall Street J. https://cn.wsj.com/articles/中国重拳打击跨国电信诈骗-杀猪盘-42e4e1c8
Steele S (2013) Human trafficking, labor brokering, and mining in southern Africa: responding to a decentralized and hidden public health disaster. Int J Health Serv 43(4):665–680. https://doi.org/10.2190/HS.43.4.e
Surtees R (2008) Traffickers and trafficking in Southern and Eastern Europe: considering the other side of human trafficking. Eur J Criminol 5(1):39–68. https://doi.org/10.1177/1477370807084224
Taylor TJ, Peterson D, Esbensen FA, Freng A (2007) Gang membership as a risk factor for adolescent violent victimization. J Res Crime Delinq 44(4):351–380. https://doi.org/10.1177/0022427807305845
Toutiao News (2019) The Painful Revelation: A Detailed Explanation of the 'Pig Slaughter Scam' Tactic. https://www.toutiao.com/article/6765767768902992397/?&source=m_redirect&wid=1694100841716
Trebilcock J, Griffiths C (2022) Student motivations for studying criminology: a narrative inquiry. Criminol Crim Just 22(3):480–497. https://doi.org/10.1177/1748895821993843
United Nations Human Rights (2023) Online Scam Operations and Trafficking into Forced Criminality in Southeast Asia: Recommendations for a Human Rights Response. https://bangkok.ohchr.org/wp-content/uploads/2023/08/ONLINE-SCAM-OPERATIONS-2582023.pdf
United Nations (2023) Child Recruitment and Use. https://childrenandarmedconflict.un.org/six-grave-violations/child-soldiers/
Von Hentig H (1948) The crime and his victim. Soc Forces 27(4):445–446
Walters GD (2020) Viewing the cycle of violence through a gendered pathways lens: perceived parental tolerance of violence, peer influence, and child aggressive behavior. J Interpers Violence 35(11–12):2189–2209. https://doi.org/10.1177/0886260517702493
Walters GD (2022) Managing the offender-to-victim transition with parental support, low neighborhood disorder, positive school culture, and moral cognition: protective and promotive factors and the person proximity effect. Crim Justice Stud 35(3):235–254. https://doi.org/10.1080/1478601X.2022.2083615
Wang F (2023) Sentencing disparity and focal concern: An assessment of judicial decisions on Sha Zhu Pan cases collected from China judgements online. Crime Delinq. https://doi.org/10.1177/00111287231158571
Wang F, Topalli V (2022) Understanding romance scammers through the lens of their victims: qualitative modeling of risk and protective factors in the online context. Am J Crim Justice: 1–37. https://doi.org/10.1007/s12103-022-09706-4
Wang F, Topalli V (2023) The cyber-industrialization of catfishing and romance fraud. CrimRxiv. https://doi.org/10.21428/cb6ab371.76272507
Wang F, Zhou X (2023) Persuasive schemes for financial exploitation in online romance scam: an Anatomy on Sha Zhu pan (杀猪盘) in China. Vict Offenders 18(5):915–942. https://doi.org/10.1080/15564886.2022.2051109
Whitty MT (2013) The scammers persuasive techniques model: development of a stage model to explain the online dating romance scam. Br J Criminol 53(4):665–684. https://doi.org/10.1093/bjc/azt009
Whitty MT (2015) Anatomy of the online dating romance scam. Secur J 28:443–455. https://doi.org/10.1057/sj.2012.57
Wolfgang (1958) The victim-offender relationship, in patterns in criminal homicide. University of Pennsylvania Press, Philadelphia
Xinhua Net (2022a) Unveiling the Northern Myanmar 'Pig Slaughter Scam': Fraudulent Groups Treating Sales Agents as Commodities. http://www.news.cn/politics/2021-11/30/c_1128113883.htm
Xihua Net (2022b) Is the Ethnic Issue in Myanmar Hard to Resolve?. http://www.news.cn/globe/2022-04/12/c_1310541261.htm
Zhihu (2023) Unveiling the ruthless hearts of the bosses behind scam syndicates in Northern Myanmar: evil matches every ounce of virtue. https://zhuanlan.zhihu.com/p/652784271
Zoellner LA, Sheikh IS, Walker RW, Rosencrans P, Garcia NM, Marks EH, Bedard-Gilligan MA (2019) Sexual assault and memory. In: O’Donohue William T, Schewe Paul A (eds) Handbook of Sexual Assault and Sexual Assault Prevention. Springer, pp 337–352
Funding
No funding information is provided for this study.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Research involving human participants and/or animals (declaration)
The study utilizes publicly available online data and does not qualify as human subjects research, thereby exempting it from requiring IRB review.
Informed consent
This study, being non-human subject research, does not necessitate the provision of informed consent to participants.
Disclosure of potential conflicts of interest
The author declares no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Wang, F. Victim-offender overlap: the identity transformations experienced by trafficked Chinese workers escaping from pig-butchering scam syndicate. Trends Organ Crim (2024). https://doi.org/10.1007/s12117-024-09525-5
Accepted:
Published:
DOI: https://doi.org/10.1007/s12117-024-09525-5