Volume 3, Issue 1, Journal of Social Systems and Policy Analysis
Volume 3, Issue 1, 2026
Submit Manuscript Edit a Special Issue
Article QR Code
Article QR Code
Scan the QR code for reading
Popular articles
Journal of Social Systems and Policy Analysis, Volume 3, Issue 1, 2026: 37-44

Open Access | Research Article | 11 February 2026
Study on the Judicial Application of the Crime of Aiding Information Network Criminal Activities
1 School of Law, Guangzhou College of Commerce, Guangzhou 511363, China
* Corresponding Author: Jingjing Cao, [email protected]
ARK: ark:/57805/jsspa.2025.899142
Received: 05 August 2025, Accepted: 17 November 2025, Published: 11 February 2026  
Abstract
The rapid advancement of internet and information technology has given rise to new forms of cybercrimes and illegal activities. To precisely combat such increasingly severe new types of crimes, China incorporated the "crime of aiding information network criminal activities" into the Amendment (IX) to the Criminal Law of the People's Republic of China. However, in judicial practice, issues persist, including an overly low threshold for determining "knowingly," insufficient justification for "the principal offender's commission of a crime," ambiguous definition of "aiding acts," and biased assessment of "serious circumstances." These problems have exacerbated the vagueness of legal provisions, leading to a tendency of over-expansion in penalty application by judicial authorities. Therefore, it is imperative to reasonably define the scope of "knowingly," standardize criteria for identifying "serious circumstances," deepen research on interpreting "aiding acts," and strengthen investigations into "others' use of information networks for criminal activities," thereby improving adjudication standards and addressing the high incidence of this crime.

Graphical Abstract
Study on the Judicial Application of the Crime of Aiding Information Network Criminal Activities

Keywords
aiding information network criminal activities
aiding acts
serious circumstances
knowingly

Data Availability Statement
Data will be made available on request.

Funding
This work was supported without any funding.

Conflicts of Interest
The authors declare no conflicts of interest.

AI Use Statement
The authors declare that no generative AI was used in the preparation of this manuscript.

Ethical Approval and Consent to Participate
Not applicable.

References
  1. Ministry of Public Security of the People's Republic of China. (2015, September 14). Zhonghua renmin gongheguo xingfa xiuzheng’an (jiu) [The Criminal Law Amendment (IX) of the People's Republic of China]. Retrieved October 27, 2024, from https://www.mps.gov.cn/n6557558/c5111909/content.html
    [Google Scholar]
  2. Supreme People's Court & Supreme People's Procuratorate of the People's Republic of China. (2019, October 21). Zuigao renmin fayuan, zuigao renmin jianchayuan guanyu banli feifa liyong xinxi wangluo, bangzhu xinxi wangluo fanzui huodong deng xingshi anjian shiyong falv ruogan wenti de jieshi [Interpretation on several issues concerning the application of law in the handling of criminal cases such as illegal use of information networks and aiding information network criminal activities] (Judicial Interpretation No. 15). Retrieved August 01, 2025, from http://gongbao.court.gov.cn/Details/2aa922f042f1cfc097b56d8b61f686.html
    [Google Scholar]
  3. Cai, X., Deng, J., & Yan, X. (2022, June). On the Types and Cognizance of “Knowing” in the Crime of Aiding Information Network Crime. In 2022 8th International Conference on Humanities and Social Science Research (ICHSSR 2022) (pp. 2096-2101). Atlantis Press.
    [CrossRef]   [Google Scholar]
  4. Zhou, Y. (2025). Research on the Crime of Helping Information Network Crime. Law and Humanities, 1(3), 22-30.
    [CrossRef]   [Google Scholar]
  5. Hua, G., Liu, J., Zhou, K., & Shen, X. (2022, December). The Identification of Serious Circumstances of Help Information Network Criminal Activity Crime. In 2022 6th International Seminar on Education, Management and Social Sciences (ISEMSS 2022) (pp. 1744-1753). Atlantis Press.
    [CrossRef]   [Google Scholar]
  6. Hao, Z. (2025, November). The Judicial Dilemmas in Determining the “Constructive Knowledge” of the Crime of Assisting Information Network Criminal Activities and the Reconstruction of Relevant Rules. In Exploring Science Academic Conference Series (Vol. 8, pp. 34-42).
    [CrossRef]   [Google Scholar]
  7. Huang, H. (2024). Criminalization Challenge and Analysis of Network Crime Assistance Behaviors. Journal of Politics and Law, 17(2).
    [Google Scholar]
  8. Zhang, Y., & Dong, H. (2023). Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing. Journal of Cloud Computing, 12(1), 64.
    [CrossRef]   [Google Scholar]
  9. Berlusconi, G., Calderoni, F., Parolini, N., Verani, M., & Piccardi, C. (2016). Link prediction in criminal networks: A tool for criminal intelligence analysis. PloS one, 11(4), e0154244.
    [CrossRef]   [Google Scholar]
  10. Gu, J., & Song, S. (2022, June). The Nature and Restriction of the Crime of Helping Information Network Crime. In 2022 8th International Conference on Humanities and Social Science Research (ICHSSR 2022) (pp. 2343-2347). Atlantis Press.
    [CrossRef]   [Google Scholar]
  11. Shi, J. Criminal Regulation of AI Crimes: The Application Dilemma and Path Optimization of the Crime of Assisting Information Network Criminal Activities.
    [CrossRef]   [Google Scholar]
  12. Xiao, W., & Zhang, Y. (2024, September). Analysis of the Recognition of “Clearly Knowing” in the Crime of Assisting Information Network Criminal Activities Based on Chinese Payment Methods. In 2024 10th International Conference on Humanities and Social Science Research (ICHSSR 2024) (pp. 1718-1728). Atlantis Press.
    [CrossRef]   [Google Scholar]
  13. Wall, D. S. (2015). The Internet as a conduit for criminal activity. Information technology and the criminal justice system, Pattavina, A., ed, 77-98.
    [Google Scholar]

Cite This Article
APA Style
Cao, J., & Liu, Q. (2026). Study on the Judicial Application of the Crime of Aiding Information Network Criminal Activities. Journal of Social Systems and Policy Analysis, 3(1), 37–44. https://doi.org/10.62762/JSSPA.2025.899142
Export Citation
RIS Format
Compatible with EndNote, Zotero, Mendeley, and other reference managers
RIS format data for reference managers
TY  - JOUR
AU  - Cao, Jingjing
AU  - Liu, Qiuju
PY  - 2026
DA  - 2026/02/11
TI  - Study on the Judicial Application of the Crime of Aiding Information Network Criminal Activities
JO  - Journal of Social Systems and Policy Analysis
T2  - Journal of Social Systems and Policy Analysis
JF  - Journal of Social Systems and Policy Analysis
VL  - 3
IS  - 1
SP  - 37
EP  - 44
DO  - 10.62762/JSSPA.2025.899142
UR  - https://www.icck.org/article/abs/JSSPA.2025.899142
KW  - aiding information network criminal activities
KW  - aiding acts
KW  - serious circumstances
KW  - knowingly
AB  - The rapid advancement of internet and information technology has given rise to new forms of cybercrimes and illegal activities. To precisely combat such increasingly severe new types of crimes, China incorporated the "crime of aiding information network criminal activities" into the Amendment (IX) to the Criminal Law of the People's Republic of China. However, in judicial practice, issues persist, including an overly low threshold for determining "knowingly," insufficient justification for "the principal offender's commission of a crime," ambiguous definition of "aiding acts," and biased assessment of "serious circumstances." These problems have exacerbated the vagueness of legal provisions, leading to a tendency of over-expansion in penalty application by judicial authorities. Therefore, it is imperative to reasonably define the scope of "knowingly," standardize criteria for identifying "serious circumstances," deepen research on interpreting "aiding acts," and strengthen investigations into "others' use of information networks for criminal activities," thereby improving adjudication standards and addressing the high incidence of this crime.
SN  - 3068-5540
PB  - Institute of Central Computation and Knowledge
LA  - English
ER  - 
BibTeX Format
Compatible with LaTeX, BibTeX, and other reference managers
BibTeX format data for LaTeX and reference managers
@article{Cao2026Study,
  author = {Jingjing Cao and Qiuju Liu},
  title = {Study on the Judicial Application of the Crime of Aiding Information Network Criminal Activities},
  journal = {Journal of Social Systems and Policy Analysis},
  year = {2026},
  volume = {3},
  number = {1},
  pages = {37-44},
  doi = {10.62762/JSSPA.2025.899142},
  url = {https://www.icck.org/article/abs/JSSPA.2025.899142},
  abstract = {The rapid advancement of internet and information technology has given rise to new forms of cybercrimes and illegal activities. To precisely combat such increasingly severe new types of crimes, China incorporated the "crime of aiding information network criminal activities" into the Amendment (IX) to the Criminal Law of the People's Republic of China. However, in judicial practice, issues persist, including an overly low threshold for determining "knowingly," insufficient justification for "the principal offender's commission of a crime," ambiguous definition of "aiding acts," and biased assessment of "serious circumstances." These problems have exacerbated the vagueness of legal provisions, leading to a tendency of over-expansion in penalty application by judicial authorities. Therefore, it is imperative to reasonably define the scope of "knowingly," standardize criteria for identifying "serious circumstances," deepen research on interpreting "aiding acts," and strengthen investigations into "others' use of information networks for criminal activities," thereby improving adjudication standards and addressing the high incidence of this crime.},
  keywords = {aiding information network criminal activities, aiding acts, serious circumstances, knowingly},
  issn = {3068-5540},
  publisher = {Institute of Central Computation and Knowledge}
}

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 5
PDF Downloads: 0

Publisher's Note
ICCK stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and Permissions
CC BY Copyright © 2026 by the Author(s). Published by Institute of Central Computation and Knowledge. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
Journal of Social Systems and Policy Analysis

Journal of Social Systems and Policy Analysis

ISSN: 3068-5540 (Online)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/icck/