Skip to main content Accessibility help
×
Hostname: page-component-857557d7f7-fn92c Total loading time: 0 Render date: 2025-11-22T13:26:52.970Z Has data issue: false hasContentIssue false

Bibliography

Published online by Cambridge University Press:  21 November 2025

Peng Wang
Affiliation:
University of Hong Kong
Wanlin Lin
Affiliation:
Sun Yat-sen University
Get access

Information

Type
Chapter
Information
Extralegal Governance
The Social Order of Illegal Markets in China
, pp. 175 - 202
Publisher: Cambridge University Press
Print publication year: 2025

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Book purchase

Temporarily unavailable

References

Acemoglu, D., Moscona, J., and Robinson, J. A. (2016). “State capacity and American technology: Evidence from the nineteenth century.” American Economic Review, 106(5), 61–67.CrossRefGoogle Scholar
Albrecht, C., Morales, V., Baldwin, J. K., and Scott, S. D. (2017). “Ezubao.” Journal of Financial Crime, 24, 256–259.CrossRefGoogle Scholar
Aldohni, A. K. (2013). “Loan sharks v. short-term lenders.” Journal of Law and Society, 40(3), 420–449.CrossRefGoogle Scholar
Aldrich, D. P. (2012). Building resilience: Social capital in post-disaster recovery. Chicago, IL: University of Chicago Press.CrossRefGoogle Scholar
Allen, D. W. (2011). The institutional revolution: Measurement and the economic emergence of the modern world. Chicago, IL: University of Chicago Press.CrossRefGoogle Scholar
Allen, D. W., and Reed, C. G. (2006). “The duel of honor: Screening for unobservable social capital.” American Law and Economics Review, 8(1), 81–115.CrossRefGoogle Scholar
Alon, I., Farrell, M., and Li, S. (2020). “Regime type and COVID-19 response.” FIIB Business Review, 9(3), 152–160.CrossRefGoogle Scholar
Alston, L. J., Libecap, G. D., and Schneider, R. (1996). “The determinants and impact of property rights: Land titles on the Brazilian frontier.” Journal of Law, Economics, and Organization, 12(1), 25–61.CrossRefGoogle Scholar
Anderson, T. L., and Hill, P. J. (2004). The not so wild, wild west: Property rights on the frontier. Stanford, CA: Stanford University Press.CrossRefGoogle Scholar
Andreas, P., and Wallman, J. (2009). “Illicit markets and violence.” Crime, Law and Social Change, 52(3), 225–229.CrossRefGoogle Scholar
Antonopoulos, G. A. (2013). “The dragon’s shadow: An introduction to the special issue on ‘Chinese organized crime’.” Trends in Organized Crime, 16(1), 1–12.CrossRefGoogle Scholar
Antonopoulos, G. A., and Papanicolaou, G. (2018). Organized crime. Oxford: Oxford University Press.Google Scholar
Antonopoulos, G. A., Groenhuijsen, M., Harvey, J., Kooijmans, T., Maljevic, A., and von Klaus, L. (2011). Usual and unusual organising criminals in Europe and beyond. Belgium: Maklu.Google Scholar
Antonopoulos, G. A., Papanicolaou, G., and Simpson, M. (2009). “Entertainment starts with an E: The ecstasy market in Greece.” Trends in Organized Crime, 13(1), 31–45.Google Scholar
Aoki, M. (2001). Toward a comparative institutional analysis. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Arlacchi, P. (1998). “Some observations on illegal markets.” In Vincenzo, R., Nigel, S., and Taylor, I. R. (Eds.), The new European criminology: Crime and social order in Europe (pp. 203–215). London: Routledge.Google Scholar
Arrow, K. J. (1987). “Reflections on the essays.” In Feiwel, G. R. (Ed.), Arrow and the foundations of the theory of economic policy (pp. 727–734). New York, NY: New York University Press.Google Scholar
Atkinson-Sheppard, S., and Hayward, H. (2019). “Conceptual similarities; distinct difference: Exploring ‘the gang’ in mainland China.” British Journal of Criminology, 59(3), 614–633.CrossRefGoogle Scholar
Axelrod, R. (1984). The evolution of cooperation. London: Basic Books.Google Scholar
Backe, E. L., Lilleston, P., and McCleary-Sills, J. (2018). “Networked individuals, gendered violence.” Violence and Gender, 5(3), 135–146.CrossRefGoogle Scholar
Bai, C. E., Lu, J., and Tao, Z. (2006). “Property rights protection and access to bank loans: Evidence from private enterprises in China.” Economics of Transition, 14(4), 611–628.CrossRefGoogle Scholar
Bakken, B. (Ed.). (2005). Crime, punishment, and policing in China. Lanham: Rowman & Littlefield Publishers.CrossRefGoogle Scholar
Bakken, B., and Wang, J. (2021). “The changing forms of corruption in China.” Crime, Law and Social Change, 75(3), 247–265.CrossRefGoogle ScholarPubMed
Baland, J. M., and Platteau, J. P. (1996). Halting degradation of natural resources: Is there a role for rural communities? Rome: Food & Agriculture Organization of the United Nations and Clarendon Press Oxford.Google Scholar
Barbalet, J. (2014). “The structure of guanxi: Resolving problems of network assurance.” Theory and Society, 43(1), 51–69.CrossRefGoogle Scholar
Barbalet, J. (2015). “Guanxi, tie strength, and network attributes.” American Behavioral Scientist, 59(8), 1038–1050.CrossRefGoogle Scholar
Barbalet, J. (2018). “Guanxi as social exchange: Emotions, power and corruption.” Sociology, 52(5), 934–949.CrossRefGoogle Scholar
Barbalet, J. (2021). The theory of guanxi and Chinese society. Oxford: Oxford University Press.CrossRefGoogle Scholar
Bardhan, D. (2019). “Informality.” In Orum, A. M. (Ed.), The Wiley Blackwell encyclopedia of urban and regional studies (pp. 1–11). Hoboken, NJ: John Wiley & Sons.Google Scholar
Barnes, N. (2017). “Criminal politics: An integrated approach to the study of organized crime, politics, and violence.” Perspectives on Politics, 15(4), 967–987.CrossRefGoogle Scholar
Barzel, Y. (1997). Economic analysis of property rights. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Basu, G. (2014). “Concealment, corruption, and evasion: A transaction cost and case analysis of illicit supply chain activity.” Journal of Transportation Security, 7(3), 209–226.CrossRefGoogle Scholar
Basu, K. (2018). The republic of beliefs: A new approach to law and economics. Princeton, NJ: Princeton University Press.Google Scholar
Bauhr, M. (2017). “Need or greed? Conditions for collective action against corruption.” Governance, 30(4), 561–581.CrossRefGoogle Scholar
Bayar, G. (2005). “The role of intermediaries in corruption.” Public Choice, 122(3–4), 277–298.CrossRefGoogle Scholar
Becker, G. (1968). “Crime and punishment: An economic approach.” Journal of Political Economy, 76, 169–217.CrossRefGoogle Scholar
Beckert, J. (1996). “What is sociological about economic sociology? Uncertainty and the embeddedness of economic action.” Theory and Society, 25(6), 803–840.CrossRefGoogle Scholar
Beckert, J., and Dewey, M. (2017). “Introduction: The social organization of illegal markets.” In Beckert, J. and Dewey, M. (Eds.), The architecture of illegal markets: Towards an economic sociology of illegality in the economy (pp. 1–36). Oxford: Oxford University Press.CrossRefGoogle Scholar
Beckert, J., and Wehinger, F. (2013). “In the shadow: Illegal markets and economic sociology.” Socio-Economic Review, 11(1), 5–30.CrossRefGoogle Scholar
Beetham, D. (2013). The legitimation of power. London: Palgrave Macmillan.CrossRefGoogle Scholar
Beijing Municipality Bureau of Land and Resources (BMBLR). (2013). “Beijing gongbu 108 ‘ge xiaochanquan fang’ yichai 25 ge” [Beijing announces that 25 of 108 small property houses have been demolished]. People.cn, December 5, 2013, available at: http://politics.people.com.cn/n/2013/1205/c1001-23751862.html.Google Scholar
Benkler, Y. (2006). The wealth of networks: How social production transforms markets and freedom. New Haven and London: Yale University Press.Google Scholar
Bernstein, L. (1992). “Opting out of the legal system: Extralegal contractual relations in the diamond industry.” Journal of Legal Studies, 21(1), 115–157.Google Scholar
Bertaud, A. (2018). Order without design: How markets shape cities. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Bevan, D., Collier, P., and Gunning, J. W. (1989). “Black markets: Illegality, information, and rents.” World Development, 17(12), 1955–1963.CrossRefGoogle Scholar
Bezemer, D., and Headey, D. (2008). “Agriculture, development, and urban bias.” World Development, 36(8), 1342–1364.CrossRefGoogle Scholar
Bhowmik, S. (2005). “Street vendors in Asia.” Economic and Political Weekly, May 28th–June 4th: 2256–2264.Google Scholar
Bhowmik, S. (2010). Street vendors in the global urban economy. London: Routledge.Google Scholar
Bian, Y. (1997). “Bringing strong ties back in: Indirect ties, network bridges, and job searches in China.” American Sociological Review, 62(3), 366–385.CrossRefGoogle Scholar
Bian, Y. (2019). Guanxi, how China works. Cambridge: Polity Press.Google Scholar
Boettke, P. J., Candela, R. A., and Zhukov, K. (2023). “The morality of illicit markets: ‘Greasing the wheels’ or ‘greasing the palm’?Journal of Economic Behavior & Organization, 209, 411–422.CrossRefGoogle Scholar
Boittin, M. L. (2013). “New perspectives from the oldest profession: Abuse and the legal consciousness of sex workers in China.” Law & Society Review, 47(2), 245–278.CrossRefGoogle Scholar
Bonnet, F., and Venkatesh, S. (2016). “Poverty and informal economies.” In Brady, D. and Burton, L. M. (Eds.), Oxford handbook of the social science of poverty (pp. 637–659). Oxford: Oxford University Press.Google Scholar
Bottoms, A. E., and Wiles, P. (1997). “Environmental criminology.” In Maguire, M., Morgan, R., and Reiner, R. (Eds.), The Oxford handbook of criminology (pp. 305–359). Oxford: Oxford University Press.Google Scholar
Broadhurst, R., and Wang, P. (2014). “After the Bo Xilai trial: Does corruption threaten China’s future?Survival, 56(3), 157–178.CrossRefGoogle Scholar
Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., and Chon, S. (2014). “Organizations and cyber crime.” International Journal of Cyber Criminology, 8, 1–20.Google Scholar
Brown, D. W., and Konrad, A. M. (2001). “Job-seeking in a turbulent economy: Social networks and the importance of cross-industry ties to an industry change.” Human Relations, 54, 1015–1044.CrossRefGoogle Scholar
Bruggeman, J. (2016). “The strength of varying tie strength: Comment on Aral and Van Alstyne.” American Journal of Sociology, 121(6), 1919–1930.CrossRefGoogle Scholar
Buchanan, J. (1974). “Review of the machinery of freedom: Guide to a radical capitalism.” Journal of Economic Literature, 12, 914–915.Google Scholar
Buchanan, J. (1975). The limits of liberty: Between anarchy and Leviathan. Chicago, IL: University of Chicago Press.Google Scholar
Buckley, P. J., Clegg, J., and Tan, H. (2006). “Cultural awareness in knowledge transfer to China: The role of guanxi and mianzi.” Journal of World Business, 41, 275–288.CrossRefGoogle Scholar
Cai, M., Fan, J., Ye, C., and Zhang, Q. (2021). “Government debt, land financing and distributive justice in China.” Urban Studies, 58(11), 2329–2347.CrossRefGoogle Scholar
Cai, M., Murtazashvili, I., and Murtazashvili, J. (2020). “The politics of land property rights.” Journal of Institutional Economics, 16(2), 151–167.CrossRefGoogle Scholar
Cai, Y. (2003). “Collective ownership or cadres’ ownership? The non-agricultural use of farmland in China.” China Quarterly, 175, 662–680.CrossRefGoogle Scholar
Cai, Y. (2010). Collective resistance in China: Why popular protests succeed or fail. Stanford, CA: Stanford University Press.Google Scholar
Cai, Y. (2014). State and agents in China: Disciplining government officials. Stanford, CA: Stanford University Press.CrossRefGoogle Scholar
Calvert, R. (1995). “Rational actors, equilibrium, and social institutions.” In Knight, J. and Sened, I. (Eds.), Explaining social institutions (pp. 57–93). Ann Arbor, MI: University of Michigan Press.Google Scholar
Campana, P., and Varese, F. (2013). “Cooperation in criminal organizations: Kinship and violence as credible commitments.” Rationality and Society, 25(3), 263–289.CrossRefGoogle Scholar
Campana, P., and Varese, F. (2018). “Organized crime in the United Kingdom: Illegal governance of markets and communities.” British Journal of Criminology, 58(6), 1381–1400.CrossRefGoogle Scholar
Carr, D. J., Gotlieb, M. R., Lee, N. J., and Shah, D. V. (2012). “Examining overconsumption, competitive consumption, and conscious consumption from 1994 to 2004.” Annals of the American Academy of Political and Social Science, 644(1), 220–233.Google Scholar
Casavant, L., and Collin, C. (2001). Illegal drug use and crime: A complex relationship. Canada: Paper prepared for the Special Senate Committee on Illegal Drugs. Ottawa, ON: Library of Parliament.Google Scholar
Caulkins, J. P., and Reuter, P. (1998). “What price data tell us about drug markets.” Journal of Drug Issues, 28(3), 593–612.CrossRefGoogle Scholar
Caulkins, J. P., Reuter, P., and Taylor, L. J. (2006). “Can supply restrictions lower price? Violence, drug dealing and positional advantage.” Contributions in Economic Analysis & Policy, 5(1), 1–18.CrossRefGoogle Scholar
Chamlee-Wright, E. (2010). The cultural and political economy of recovery: Social learning in a post-disaster environment. Abingdon: Routledge.CrossRefGoogle Scholar
Chan, C. S. C. (2009). “Invigorating the content in social embeddedness: An ethnography of life insurance transactions in China.” American Journal of Sociology, 115(3), 712–754.CrossRefGoogle ScholarPubMed
Chan, C. S. C., and Yao, Z. (2018). “A market of distrust: Toward a cultural sociology of unofficial exchanges between patients and doctors in China.” Theory and Society, 47(6), 737–772.CrossRefGoogle Scholar
Chang, K. C. (2011). “A path to understanding guanxi in China’s transitional economy: Variations on network behavior.” Sociological Theory, 29(4), 315–339.CrossRefGoogle Scholar
Che, J., and Qian, Y. (1998). “Institutional environment, community government, and corporate governance: Understanding China’s township-village enterprises.” Journal of Law, Economics, & Organization, 14(1), 1–23.CrossRefGoogle Scholar
Chen, M. A. (2006). “Rethinking the informal economy.” In Guha-Khansnobis, B., Kanbur, R., and Ostrom, E. (Eds.), Linking the formal and informal economy (pp. 93–120). Oxford: Oxford University Press.Google Scholar
Chen, X. (2012). Social protest and contentious authoritarianism in China. Cambridge: Cambridge University Press.Google Scholar
Chen, Y. (2016). “Student loans are deceptive and they are not as simple as you think.” Newbelink.com, available at: www.newbelink.com/article/16301.html (accessed April 4, 2020; in Chinese).Google Scholar
Chen, Y. (2020). “Shenzhen xiaochanquanfang xiaoshou huobao, quequan hou jiang zouxianghefang, goumaizhe shi zheme xiangde” [Small-property houses in Shenzhen are on hot sales! Where will it end up after the property rights are confirmed? Perspectives from Buyers]. Egsea, June 14, 2020, available at: https://m.thepaper.cn/newsDetail_forward_7845984.Google Scholar
Chen, Z., and Jin, M. (2017). “Financial inclusion in China: Use of credit.” Journal of Family and Economic Issues, 38(4), 528–540.CrossRefGoogle Scholar
Cheng, H., and Shaw, D. (2018). “Polycentric development practice in master planning: The case of China.” International Planning Studies, 23(2), 163–179.CrossRefGoogle Scholar
Cheng, W. (2004). “An empirical study of corruption within China’s state-owned enterprises.” China Review, 4(2), 55–80.Google Scholar
Chin, K., and Godson, R. (2006). “Organized crime and the political-criminal nexus in China.” Trends in Organized Crime, 9(3), 5–44.CrossRefGoogle Scholar
Choo, K. K. R. (2008). “Organised crime groups in cyberspace.” Trends in Organized Crime, 11, 270–295.CrossRefGoogle Scholar
Chu, C., and Wang, L. (2017). “Guanyuan luoma hou, shenbian de ren dou qu na er le” [When officials are sacked, where have the people around them gone?]. Southern Weekly, February 17, 2017, available at: www.infzm.com/content/122929 (accessed August 1, 2021).Google Scholar
Chu, Y. K. (2000). The triads as business. London: Routledge.Google Scholar
Chwe, M. S. Y. (2013). Rational ritual: Culture, coordination, and common knowledge. Princeton, NJ: Princeton University Press.Google Scholar
Clay, K. (1997). “Trade without law: Private-order institutions in Mexican California.” Journal of Law, Economics, and Organization, 13(1), 202–231.CrossRefGoogle Scholar
Coase, R. H. (1937). “The nature of the firm.” Economica, 4(16), 386–405.CrossRefGoogle Scholar
Coase, R. H. (1960). “The problem of social cost.” Journal of Law and Economics, 3, 1–44.Google Scholar
Coase, R. H. (1984). “The new institutional economics.” Journal of Institutional and Theoretical Economics, 140(1), 229–231.Google Scholar
Coase, R. H. (1993). “Coase on Posner on Coase: Comment.” Journal of Institutional and Theoretical Economics, 149(1), 96–98.Google Scholar
Coase, R., and Wang, N. (2016). How China became capitalist. London: Palgrave Macmillan.Google Scholar
Cohen, L. E., and Felson, M. (1979). “Social change and crime rate trends.” American Sociological Review, 44, 588–608.CrossRefGoogle Scholar
Cook, K. S., and Emerson, R. M. (1978). “Power, equity and commitment in exchange networks.” American Sociological Review, 43(5), 721–739.CrossRefGoogle Scholar
Cook, K. S., Emerson, R. M., Gillmore, M. R., and Yamagishi, T. (1983). “The distribution of power in exchange networks: Theory and experimental results.” American Journal of Sociology, 89(2), 275–305.CrossRefGoogle Scholar
Cook, K. S., Hardin, R., and Levi, M. (2005). Cooperation without trust? London: Russell Sage Foundation.Google Scholar
Copes, H. (2015). “Neutralization theory.” In Huebner, B. M. (Ed.), Oxford bibliographies in criminology. Oxford University Press. DOI: 10.1093/OBO/9780195396607-0140.Google Scholar
Cowen, T. (2020). “What libertarianism has become and will become: State capacity libertarianism,” available at: https://marginalrevolution.com/marginalrevolution/2020/01/what-libertarianism-has-become-and-will-become-state-capacity-libertarianism.html.Google Scholar
Coyne, C. J., and Mathers, R. L. (2011). “Rituals: An economic interpretation.” Journal of Economic Behavior & Organization, 78(1–2), 74–84.CrossRefGoogle Scholar
Crawford, S. E., and Ostrom, E. (1995). “A grammar of institutions.” American Political Science Review, 89(3), 582–600.CrossRefGoogle Scholar
Cross, J. C. (1998). “Co-optation, competition, and resistance.” Latin American Perspectives, 25(2), 41–61.CrossRefGoogle Scholar
Crossa, V. (2009). “Resisting the entrepreneurial city.” International Journal of Urban and Regional Research, 33(1), 43–63.CrossRefGoogle Scholar
Darling, K., and Perzanowski, A. (Eds.). (2017). Creativity without law: Challenging the assumptions of intellectual property. New York, NY: New York University Press.Google Scholar
De Keyzer, M. (2013). “The impact of different distributions of power on access rights to the common wastelands: The Campine, Brecklands and Geest compared.” Journal of Institutional Economics, 9(4), 517–542.CrossRefGoogle Scholar
De Soto, H. (1989). Their other path. New York, NY: Harper & Row.Google Scholar
Décary-Hétu, D., and Dupont, B. (2013). “Reputation in a dark network of online criminals.” Global Crime, 14(2–3), 175–196.CrossRefGoogle Scholar
Della Porta, D., and Vannucci, A. (2012). The hidden order of corruption: An institutional approach. Farnham: Ashgate Publishing.Google Scholar
Deng, J. (2018). “The national supervision commission: A new anti-corruption model in China.” International Journal of Law, Crime and Justice, 52, 58–73.CrossRefGoogle Scholar
Deng, S. (2016). “Sanya 2015 nian zhijin gong chaichu weijian chao 1 wan dong, zongmianji 583 wan m2” [More than 10,000 illegal buildings (with 5,830,000 m2) demolished in Sanya since 2015]. Hinews, October 9, 2016, available at: www.hinews.cn/news/system/2016/08/09/030604135.shtmlGoogle Scholar
Densley, J. (2012). “Street gang recruitment: Signaling, screening, and selection.” Social Problems, 59(3), 301–321.Google Scholar
Densley, J. (2013). How gangs work. London: Palgrave Macmillan.CrossRefGoogle Scholar
Denyer, S., and Xu, Y. (2016). “China vows to tackle ‘family corruption’ – but even state media can’t hide its skepticism.” The Washington Post, April 29, 2016, available at: www.washingtonpost.com/news/worldviews/wp/2016/04/29/china-vows-to-tackle-family-corruption-but-even-state-media-cant-hide-its-skepticism/ (accessed August 21, 2021).Google Scholar
Devlin, R. T. (2011). “An area that governs itself.” Planning Theory, 10(1), 53–65.Google Scholar
Dewey, M. (2019). “The characteristics of illegal markets.” In Pontell, H. N. (Ed.), Oxford research encyclopedia of criminology and criminal justice (pp. 1–24). Oxford: Oxford University Press.Google Scholar
Dewey, M., Míguez, D. P., and Saín, M. F. (2017). “The strength of collusion: A conceptual framework for interpreting hybrid social orders.” Current Sociology, 65(3), 395–410.CrossRefGoogle Scholar
Di Tella, R., and Schargrodsky, E. (2003). “The role of wages and auditing during a crackdown on corruption in the city of Buenos Aires.” Journal of Law and Economics, 46(1), 269–292.Google Scholar
Dick, A. R. (1995). “When does organized crime pay? A transaction cost analysis.” International Review of Law and Economics, 15(1), 25–45.CrossRefGoogle Scholar
Dickinson, T., and Wright, R. (2015). “Gossip, decision-making and deterrence in drug markets.” British Journal of Criminology, 55(6), 1263–1281.CrossRefGoogle Scholar
Dickinson, T., and Wright, R. (2017). “The funny side of drug dealing: Risk, humor, and narrative identity.” Criminology, 55(3), 691–720.CrossRefGoogle Scholar
Dixit, A. K. (2004). Lawlessness and economics: Alternative modes of governance. Princeton, NJ: Princeton University Press.Google Scholar
Dixit, A. K. (2009). “Governance institutions and economic activity.” American Economic Review, 99(1), 5–24.CrossRefGoogle Scholar
Dong, W. (2012). “Chaijie 116 ge xiaochanquan fang chuzhi yangben.” [Inveighing samples 116 of intervened small property houses]. Leju, October 15, 2012, available at: http://bj.leju.com/zhuanti/ldgc09/.Google Scholar
Donovan, M. G. (2008). “Informal cities and the contestation of public space.” Urban Studies: 45(1), 29–51.CrossRefGoogle Scholar
Dorn, N., and South, N. (1990). “Drug markets and law enforcement.” British Journal of Criminology, 30(2), 171–188.CrossRefGoogle Scholar
Drugov, M., Hamman, J., and Serra, D. (2014). “Intermediaries in corruption: An experiment.” Experimental Economics, 17(1), 78–99.CrossRefGoogle Scholar
Dunfee, T. W., and Warren, D. E. (2001). “Is guanxi ethical? A normative analysis of doing business in China.” Journal of Business Ethics, 32(3), 191–204.CrossRefGoogle Scholar
Durán-Martínez, A. (2015). “To kill and tell? State power, criminal competition, and drug violence.” Journal of Conflict Resolution, 59(8), 1377–1402.CrossRefGoogle Scholar
Earley, P. C. (1997). Face, harmony, and social structure: An analysis of organizational behavior across cultures. Oxford: Oxford University Press.CrossRefGoogle Scholar
Ellickson, R. C. (1991). Order without law: How neighbors settle disputes. Cambridge, MA: Harvard University Press.CrossRefGoogle Scholar
Emerson, R. M. (1962). “Power–dependence relations.” American Sociological Review, 27, 31–41.CrossRefGoogle Scholar
Emerson, R. M. (1972a). “Exchange theory, part I: A psychological basis for social exchange.” In Berger, J. (Ed.), Sociological theories in progress, vol. 2 (pp. 38–57). Boston, MA: Houghton Mifflin.Google Scholar
Emerson, R. M. (1972b). “Exchange theory, part II: Exchange relations and network structures.” In Berger, J. (Ed.), Sociological theories in progress, vol. 2 (pp. 58–87). Boston, MA: Houghton Mifflin.Google Scholar
Engwicht, N. (2017). “‘We are the genuine people’: Legality and legitimacy in the Sierra Leonean diamond market.” In Beckert, J. and Dewey, M. (Eds.), The architecture of illegal markets: Towards an economic sociology of illegality in the economy (pp. 198–217). Oxford: Oxford University Press.Google Scholar
Fan, Y. (2002). “Guanxi’s consequences: Personal gains at social cost.” Journal of Business Ethics, 38(4), 371–380.CrossRefGoogle Scholar
Fewsmith, J. (2013). The logic and limits of political reform in China. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Flashman, J., and Gambetta, D. (2014). “Thick as thieves.” Rationality and Society, 26(1), 3–45.CrossRefGoogle Scholar
Flock, R., and Breitung, W. (2016). “Migrant street vendors in urban China and the social production of public space.” Population, Space and Place, 22(2), 158–169.CrossRefGoogle Scholar
Frank, H. F. (2015). Microeconomics and behavior. New York, NY: McGraw-Hill Education.Google Scholar
Friedman, D. (1979). “Private creation and enforcement of law: A historical case.” Journal of Legal Studies, 8(2), 399–415.Google Scholar
Friedman, M. (1962). Capitalism and freedom. Chicago, IL: University of Chicago Press.Google Scholar
Fu, D. (2018). Mobilizing without the masses: Control and contention in China. Cambridge: Cambridge University Press.Google Scholar
Fu, H. (2015). “Wielding the sword: President Xi’s new anti-corruption campaign.” In Rose-Ackerman, S. and Felipe Lagunes, P. (Eds.), Greed, corruption, and the modern state: Essay in political economy (pp. 134–135). Cheltenham: Edward Elgar.Google Scholar
Fu, H. (2016). “China’s striking anti-corruption adventure: A political journey towards the rule of law?” In Chen, W. (Ed.), The Beijing consensus? How China has changed the western ideas of law and economic development (pp. 249–274). Cambridge: Cambridge University Press.Google Scholar
Fukuyama, F. (2013). “What is governance?Governance, 26(3), 347–368.CrossRefGoogle Scholar
Galanter, M. (1981). “Justice in many rooms: Courts, private ordering, and indigenous law.” Journal of Legal Pluralism and Unofficial Law, 13(19), 1–47.CrossRefGoogle Scholar
Gambetta, D. (1993). The Sicilian mafia: The business of private protection. Cambridge, MA: Harvard University Press.Google Scholar
Gambetta, D. (2009). Codes of the underworld: How criminals communicate. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Gambetta, D. (2018). “Why is Italy disproportionally corrupt?” In Basu, K. and Cordella, T. (Eds.), Institutions, governance and the control of corruption (pp. 133–164). New York, NY: Springer.Google Scholar
Gambetta, D., and Przepiorka, W. (2019). “Sharing compromising information as a cooperative strategy.” Sociological Science, 6, 352–379.CrossRefGoogle Scholar
Gans-Morse, J., Borges, M., Makarin, A., Mannah-Blankson, T., Nickow, A., and Zhang, D. (2018). “Reducing bureaucratic corruption: Interdisciplinary perspectives on what works.” World Development, 105, 171–188.CrossRefGoogle Scholar
Geis, G. (1966). “Violence and organized crime.” Annals of the American Academy of Political and Social Science, 364(1), 86–95.Google Scholar
Gerring, J. (2006). Case study research: Principles and practices. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Giardini, F., and Wittek, R. (Eds.). (2019). The oxford handbook of gossip and reputation. Oxford: Oxford University Press.CrossRefGoogle Scholar
Godfrey, P. C. (2011). “Toward a theory of the informal economy.” Academy of Management Annals, 5(1), 231–277.CrossRefGoogle Scholar
Godson, R. (2017). Menace to society: Political-criminal collaboration around the world. London: Routledge.CrossRefGoogle Scholar
Goffman, E. (1955). “On face-work: An analysis of ritual elements in social interaction.” Psychiatry, 18(3), 213–231.CrossRefGoogle ScholarPubMed
Goffman, E. (1967). Interaction ritual: Essays in face-to-face behavior. New Brunswick, NJ: Aldine Transaction.Google Scholar
Gong, T. (2002). “Dangerous collusion: Corruption as a collective venture in contemporary China.” Communist and Post-Communist Studies, 35(1), 85–103.CrossRefGoogle Scholar
Gong, T. (2004). “Dependent judiciary and unaccountable judges: Judicial corruption in contemporary China.” China Review, 4(2), 33–54.Google Scholar
Gong, T. (2006). “Corruption and local governance: The double identity of Chinese local governments in market reform.” Pacific Review, 19(1), 85–102.CrossRefGoogle Scholar
Gong, T., and Yang, S. L. (2019). “Controlling bureaucratic corruption.” In Oxford Research Encyclopedia of Politics, available at: https://doi.org/10.1093/acrefore/9780190228637.013.1463.CrossRefGoogle Scholar
Gottfredson, M. R., and Hirschi, T. (1990). A general theory of crime. Palo Alto, CA: Stanford University Press.CrossRefGoogle Scholar
Grabosky, P. (2013). “Organised crime and the internet.” RUSI Journal, 158(5), 18–25.CrossRefGoogle Scholar
Grabosky, P. (2015). “Organized cybercrime and national security.” In Smith, R. G., Cheung, R. C., and Lau, L. Y. (Eds.), Cybercrime risks and responses (pp. 67–80). London: Palgrave Macmillan.Google Scholar
Granovetter, M. (1973). “The strength of weak ties.” American Journal of Sociology, 78(6), 1360–1380.CrossRefGoogle Scholar
Granovetter, M. (1985). “Economic action and social structure: The problem of embeddedness.” American Journal of Sociology, 91(3), 481–510.CrossRefGoogle Scholar
Granovetter, M. (1995). Getting a job: A study of contacts and careers. Chicago, IL: University of Chicago Press.CrossRefGoogle Scholar
Greif, A. (1989). “Reputation and coalitions in medieval trade: Evidence on the Maghribi traders.” Journal of Economic History, 49(4), 857–882.CrossRefGoogle Scholar
Greif, A. (1994). “Cultural beliefs and the organization of society: A historical and theoretical reflection on collectivist and individualist societies.” Journal of Political Economy, 102(5), 912–950.CrossRefGoogle Scholar
Greif, A. (2000). “The fundamental problem of exchange: A research agenda in historical institutional analysis.” European Review of Economic History, 4(3), 251–284.CrossRefGoogle Scholar
Greif, A. (2006). Institutions and the path to the modern economy: Lessons from medieval trade. New York, NY: Cambridge University Press.CrossRefGoogle Scholar
Greif, A., and Kingston, C. (2011). “Institutions: Rules or equilibria?” In Schofield, N. and Caballero, G. (Eds.), Political economy of institutions, democracy and voting (pp. 13–43). New York, NY: Springer.Google Scholar
Greif, A., Milgrom, P., and Weingast, B. R. (1994). “Coordination, commitment, and enforcement: The case of the merchant guild.” Journal of Political Economy, 102(4), 745–776.CrossRefGoogle Scholar
Greitens, S. C., and Truex, R. (2020). “Repressive experiences among China scholars: New evidence from survey data.” China Quarterly, 242, 349–375.CrossRefGoogle Scholar
Grossman, S. (2020). “The politics of order in informal markets: Evidence from Lagos.” World Politics, 72(1), 47–79.CrossRefGoogle Scholar
Grossman, S. (2021). The politics of order in informal markets: How the state shapes private governance. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Guo, C., and Miller, J. K. (2010). “Guanxi dynamics and entrepreneurial firm creation and development in China.” Management and Organization Review, 6(2), 267–291.CrossRefGoogle Scholar
Guo, X. (2014). “Controlling corruption in the party: China’s central discipline inspection commission.” China Quarterly, 219, 597–624.CrossRefGoogle Scholar
Hall, A., and Antonopoulos, G. A. (2016). Fake meds online: The internet and the transnational market in illicit pharmaceuticals. New York, NY: Springer.CrossRefGoogle Scholar
Haller, T. (2007). Understanding institutions and their links to resource management from the perspective of new institutionalism. Bern, Switzerland: NCCR North-South.Google Scholar
Hardy, R. A., and Norgaard, J. R. (2016). “Reputation in the internet black market: An empirical and theoretical analysis of the deep web.” Journal of Institutional Economics, 12(3), 515–539.CrossRefGoogle Scholar
Hart, K. (1973). “Informal income opportunities and urban employment in Ghana.” Journal of Modern African Studies, 11(1), 61–89.CrossRefGoogle Scholar
Hart, K. (2010). “Informal economy.” In Hart, K., Laville, J.-L., and David Cattani, A. (Eds.), The human economy (pp. 142–53). Cambridge: Polity Press.Google Scholar
Hasker, K., and Okten, C. (2008). “Intermediaries and corruption.” Journal of Economic Behavior & Organization, 67(1), 103–115.CrossRefGoogle Scholar
He, B. (2008). “Chengguan chase and hawkers resist.” China Legal Science, 5, 15–169.Google Scholar
He, S., Wang, D., Webster, C., and Chau, K. W. (2019). “Property rights with price tags? Pricing uncertainties in the production, transaction and consumption of China’s small property right housing.” Land Use Policy, 81, 424–433.CrossRefGoogle Scholar
He, X., and Ng, K. H. (2017). “‘It must be rock strong!’ Guanxi’s impact on judicial decision making in China.” American Journal of Comparative Law, 65(4), 841–871.CrossRefGoogle Scholar
Helmke, G., and Levitsky, S. (2004). “Informal institutions and comparative politics: A research agenda.” Perspectives on Politics, 2(4), 725–740.CrossRefGoogle Scholar
Hill, P. B. (2003). The Japanese mafia: Yakuza, law, and the state. Oxford: Oxford University Press.CrossRefGoogle Scholar
Hillman, B. (2010). “Factions and spoils: Examining political behavior within the local state in China.” China Journal, 64, 1–8.CrossRefGoogle Scholar
Hillman, B. (2014). Patronage and power: Local state networks and party-state resilience in rural China. Palo Alto, CA: Stanford University Press.Google Scholar
Ho, D. Y. (1976). “On the concept of face.” American Journal of Sociology, 81(4), 867–884.CrossRefGoogle Scholar
Ho, P. (2005). Institutions in transition: Land ownership, property rights, and social conflict in China. Oxford: Oxford University Press.CrossRefGoogle Scholar
Ho, P. (2017). Unmaking China’s development: The function and credibility of institutions. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Hobbes, T. (1651) [1955]. Leviathan. London: Blackwell.Google Scholar
Holt, T. J. (2013). “Examining the forces shaping cybercrime markets online.” Social Science Computer Review, 31(2), 165–177.CrossRefGoogle Scholar
Holt, T. J., Smirnova, O., Chua, Y. T., and Copes, H. (2015). “Examining the risk reduction strategies of actors in online criminal markets.” Global Crime, 16(2), 81–103.CrossRefGoogle Scholar
Hooghe, L., and Marks, G. (2003). “Unraveling the central state, But how?American Political Science Review, 97(2), 233–243.Google Scholar
Hsing, Y. (2010). The great urban transformation: Politics of land and property in China. Oxford: Oxford University Press.CrossRefGoogle Scholar
Hu, B. (2007). Informal institutions and rural development in China. London: Routledge.CrossRefGoogle Scholar
Huang, Y. (2022). “Why did the peer-to-peer lending market fail in China?” HKUST IEMS Thought Leadership Brief, no. 61, 1–4.Google Scholar
Huang, G., Xue, D., and Li, Z. (2014). “From revanchism to ambivalence.” Antipode, 46(1), 170–189.CrossRefGoogle Scholar
Huang, G., Zhang, H. O., and Xue, D. (2018). “Beyond unemployment: Informal employment and heterogeneous motivations for participating in street vending in present-day China.” Urban Studies, 55(12), 2743–2761.CrossRefGoogle Scholar
Huang, L. J., and Snell, R. S. (2003). “Turnaround, corruption and mediocrity: Leadership and governance in three state owned enterprises in Mainland China.” Journal of Business Ethics, 43(1), 111–124.CrossRefGoogle Scholar
Huang, R. H. (2018). “Online P2P lending and regulatory responses in China: Opportunities and challenges.” European Business Organization Law Review, 19(1), 63–92.CrossRefGoogle Scholar
Hubbard, M. (1995). “Bureaucrats and markets in China: The rise and fall of Entrepreneurial Local Government.” Governance, 8(3), 335–353.CrossRefGoogle Scholar
Hübschle, A. (2017). “Contested illegality: Processing the trade prohibition of rhino horn.” In Beckert, J. and Dewey, M. (Eds.), The architecture of illegal markets: Towards an economic sociology of illegality in the economy (pp. 177–197). Oxford: Oxford University Press.Google Scholar
Human Rights Watch. (2012). Beat him, take everything away. New York, NY: Human Rights Watch.Google Scholar
Hummel, C. (2017). “Disobedient markets: Street vendors, enforcement, and state intervention in collective action.” Comparative Political Studies, 50(11), 1524–1555.CrossRefGoogle Scholar
Hummel, C. (2021). Why informal workers organize: Contentious politics, enforcement, and the state. Oxford: Oxford University Press.CrossRefGoogle Scholar
Husted, B. W. (1994). “Honor among thieves: A transaction-cost interpretation of corruption in third world countries.” Business Ethics Quarterly, 4(1), 17–27.CrossRefGoogle Scholar
Hutchings, A., and Holt, T. J. (2015). “A crime script analysis of the online stolen data market.” British Journal of Criminology, 55(3), 596–614.CrossRefGoogle Scholar
Hwang, K. K. (1987). “Face and favor: The Chinese power game.” American Journal of Sociology, 92(4), 944–974.CrossRefGoogle Scholar
Infzm. (2010). “Sanya gao fangjia ciji zhengfu chaichu weijian xiaochanquanfang fang bu sheng fang.” [Sanya’s high housing prices stimulate the government to dismantle houses with small property rights]. Infzm, December 20, 2010, available at: http://news.sina.com.cn/c/sd/2010–12–20/140621674508.shtml.Google Scholar
Irwin-Rogers, K., Densley, J., and Pinkney, C. (2018). “Gang violence and social media.” In Ireland, J. L., Ireland, C. A., and Birch, P. (Eds.), The Routledge international handbook of human aggression. London: Routledge.Google Scholar
Jacques, S., and Wright, R. (2011). “Informal control and illicit drug trade.” Criminology, 49(3), 729–765.CrossRefGoogle Scholar
Jacques, S., and Wright, R. (2015). Code of the suburb: Inside the world of young middle-class drug dealers. Chicago, IL: University of Chicago Press.CrossRefGoogle Scholar
James, D. (2014). “Deeper into a hole?Current Anthropology, 55(S9), S17–S29.Google Scholar
Jancsics, D. (2019). “Corruption as resource transfer: An interdisciplinary synthesis.” Public Administration Review, 79(4), 523–537.CrossRefGoogle Scholar
Jiang, A. (2020). Regulating street vendors in urban China: Soft law enforcement, dirty institution, and adaptations of vendors. Doctoral dissertation, University of Macau.Google Scholar
Jiang, A., and Wang, P. (2022). “Governance and informal economies: Informality, uncertainty and street vending in China.” British Journal of Criminology, 62(6), 1431–1453.CrossRefGoogle Scholar
Jiang, G., Lo, T. W., and Garris, C. P. (2012). “Formation and trend of Guanxi practice and Guanxi phenomenon.” International Journal of Criminology and Sociology, 1, 207–220.CrossRefGoogle Scholar
Jiang, T., and Nie, H. (2014). “The stained China miracle: Corruption, regulation, and firm performance.” Economics Letters, 123(3), 366–369.CrossRefGoogle Scholar
Jiang, X. (2016). “Glut of ways to pay.” China Daily, available at: www.chinadaily.com.cn/business/3rdWuzhenWorldInternetConference/2016-11/18/content_27415834.htm (accessed March 30, 2020).Google Scholar
Johnson, C., Dowd, T. J., and Ridgeway, C. L. (2006). “Legitimacy as a social process.” Annual Review of Sociology, 32, 53–78.CrossRefGoogle Scholar
Jung, D. F., and Cohen, D. K. (2020). Lynching and local justice: Legitimacy and accountability in weak states. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Kali, R. (1999). “Endogenous business networks.” Journal of Law, Economics, and Organization, 15(3), 615–636.CrossRefGoogle Scholar
Kaptein, M., and Van Helvoort, M. (2019). “A model of neutralization techniques.” Deviant Behavior, 40(10), 1260–1285.CrossRefGoogle Scholar
Kassab, H. S., and Rosen, J. D. (2019). Corruption, institutions, and fragile states. Cham: Palgrave Macmillan.CrossRefGoogle Scholar
Kaufman, A. A., and Mackenzie, P. W. (2009). The culture of the Chinese people’s liberation army. Arlington: CNA China Studies.Google Scholar
Keliher, M., and Wu, H. 2016. “Corruption, anticorruption, and the transformation of political culture in contemporary China.” Journal of Asian Studies, 75(1), 5–18.CrossRefGoogle Scholar
Kelly, R. J. (1999). “The political-criminal nexus in the united states.” Trends in Organized Crime, 5(2), 85–122.CrossRefGoogle Scholar
Khanna, J., and Johnston, M. (2007). “India’s middlemen: Connecting by corrupting?Crime, Law and Social Change, 48(3–5), 151.CrossRefGoogle Scholar
Kiong, T. C., and Kee, Y. P. (1998). “Guanxi bases, xinyong and Chinese business networks.” British Journal of Sociology, 49(1), 75–96.CrossRefGoogle Scholar
Kleemans, E. R., and Van de Bunt, H. G. (1999). “The social embeddedness of organized crime.” Transnational Organized Crime, 5(1), 19–36.Google Scholar
Kojouharov, A., and Rusev, A. (2016). “Sharks in sheep’s clothing.” In Antonopoulos, G. A. (Ed.), Illegal entrepreneurship, organized crime and social control (pp. 101–121). New York, NY: Springer.Google Scholar
Kong, D., Wang, L., and Wang, M. (2017). “Effects of anti-corruption on firm performance: Evidence from a quasi-natural experiment in China.” Finance Research Letters, 23, 190–195.CrossRefGoogle Scholar
Kundu, D. (2019). “Urban informality.” In Orum, A. M. (Eds.), The Wiley Blackwell encyclopedia of urban and regional studies (pp. 1–5). Hoboken, NJ: John Wiley & Sons.Google Scholar
Ladegaard, I. (2020). “Open secrecy: How police crackdowns and creative problem-solving brought illegal markets out of the shadows.” Social Forces, 99(2), 532–559.CrossRefGoogle Scholar
Lafarguette, R. (2011). “Chongqing: Model for a new economic and social policy?China Perspectives, 2011(2011/4), 62–64.CrossRefGoogle Scholar
Lai, Y., Wang, J., and Lok, W. (2017). “Redefining property rights over collective land in the urban redevelopment of Shenzhen, China.” Land Use Policy, 69, 485–493.CrossRefGoogle Scholar
Lambert-Mogiliansky, A., Majumdar, M., and Radner, R. (2009). “Strategic analysis of petty corruption with an intermediary.” Review of Economic Design, 13(1), 45–57.CrossRefGoogle Scholar
Lambsdorff, J. G. (2002). “Making corrupt deals: Contracting in the shadow of the law.” Journal of Economic Behavior & Organization, 48(3), 221–241.CrossRefGoogle Scholar
Lambsdorff, J. G. (2007). The institutional economics of corruption and reform: Theory, evidence and policy. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Lambsdorff, J. G. (2013). “Corrupt intermediaries in international business transactions: Between make, buy and reform.” European Journal of Law and Economics, 35(3), 349–366.Google Scholar
Landa, J. T. (1981). “A theory of the ethnically homogeneous middleman group: An institutional alternative to contract law.” Journal of Legal Studies, 10(2), 349–362.Google Scholar
Landa, J. T. (1994). Trust, ethnicity, and identity: Beyond the new institutional economics of ethnic trading networks, contract law, and gift-exchange. Ann Arbor, MI: University of Michigan Press.Google Scholar
Larson, J. M. (2017). “The weakness of weak ties for novel information diffusion.” Applied Network Science, 2(1), 1–15.CrossRefGoogle ScholarPubMed
Lata, L., Walters, P., and Roitman, S. (2019). “A marriage of convenience.” Cities, 84, 143–150.CrossRefGoogle Scholar
Lavorgna, A. (2015). “Organised crime goes online.” Journal of Money Laundering Control, 18, 153–168.CrossRefGoogle Scholar
Lawler, E. J. (1992). “Power processes in bargaining.” Sociological Quarterly, 33(1), 17–34.CrossRefGoogle Scholar
Lee, R., and Thoumi, F. (1997). “The criminal-political nexus in Colombia.” Trends in Organized Crime, 3(1), 59–65.CrossRefGoogle Scholar
Lee, S. H., and Phan, P. H. (2006). “The effects of tie strength and tie diversity on job search, pay increases, and promotions in Singapore and Thailand.” Journal of Social and Personal Relationships, 23(5), 820–839.CrossRefGoogle Scholar
Leeson, P. T. (2006). “Efficient anarchy.” Public Choice, 130(1–2), 41–53.Google Scholar
Leeson, P. T. (2007). “An-arrgh-chy: The law and economics of pirate organization.” Journal of Political Economy, 115(6), 1049–1094.CrossRefGoogle Scholar
Leeson, P. T. (2008). “Social distance and self-enforcing exchange.” Journal of Legal Studies, 37(1), 161–188.Google Scholar
Leeson, P. T. (2009). The invisible hook: The hidden economics of pirates. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Leeson, P. T. (2014). Anarchy unbound: Why self-governance works better than you think. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Leeson, P. T. (2020). “Logic is a harsh mistress: Welfare economics for economists.” Journal of Institutional Economics, 16 (2), 145–150.CrossRefGoogle Scholar
Leeson, P. T., and Harris, C. (2018). “Wealth-destroying private property rights.” World Development, 107, 1–9.CrossRefGoogle Scholar
Leeson, P. T., and Skarbek, D. (2010). “Criminal constitutions.” Global Crime, 11(3), 279–297.CrossRefGoogle Scholar
Leeson, P. T., and Williamson, C. R. (2009). “Anarchy and development: An application of the theory of second best.” Law and Development Review, 2(1), 77–96.CrossRefGoogle Scholar
Leukfeldt, E. R., Lavorgna, A., and Kleemans, E. R. (2017). “Organised cybercrime or cybercrime that is organised?European Journal on Criminal Policy and Research, 23(3), 287–300.CrossRefGoogle Scholar
Leung, T. K. P., and Chan, Y. K. (2003). “Face, favour and positioning: A Chinese power game.” European Journal of Marketing, 37(11), 1575–1598.CrossRefGoogle Scholar
Levi, M. (2018). “The who, what, and why of performance-based legitimacy.” Journal of Intervention and Statebuilding, 12(4), 603–610.CrossRefGoogle Scholar
Levi, M., and Sacks, A. (2009). “Legitimating beliefs: Sources and indicators.” Regulation & Governance, 3(4), 311–333.CrossRefGoogle Scholar
Levi, M., Sacks, A., and Tyler, T. (2009). “Conceptualizing legitimacy, measuring legitimating beliefs.” American Behavioral Scientist, 53(3), 354–375.CrossRefGoogle Scholar
Lewison, M. (1999). “Conflicts of interest?Journal of Business Ethics, 22(4), 327–339.CrossRefGoogle Scholar
Li, F., and Deng, J. (2016a). “The limits of the arbitrariness in anticorruption by China’s local Party discipline inspection committees.” Journal of Contemporary China, 25(97), 75–90.CrossRefGoogle Scholar
Li, F., and Deng, J. (2016b). “The power and the misuse of power by China’s local procuratorates in anticorruption.” International Journal of Law, Crime and Justice, 45, 1–25.CrossRefGoogle Scholar
Li, J. S. (2003). “Relation‐based versus rule‐based governance: An explanation of the East Asian miracle and Asian crisis.” Review of International Economics, 11(4), 651–673.CrossRefGoogle Scholar
Li, L. (2011). “Performing bribery in China: Guanxi-practice, corruption with a human face.” Journal of Contemporary China, 20(68), 1–20.CrossRefGoogle Scholar
Li, L. (2012). “The ‘production’ of corruption in China’s courts: Judicial politics and decision making in a one-party state.” Law & Social Inquiry, 37(4), 848–877.CrossRefGoogle Scholar
Li, L. (2016). “The rise of the discipline and inspection commission, 1927–2012: Anticorruption investigation and decision-making in the Chinese communist party.” Modern China, 42(5), 447–482.CrossRefGoogle Scholar
Li, L., and Wang, P. (2019). “From institutional interaction to institutional integration: The national supervisory commission and China’s new anti-corruption model.” China Quarterly, 240, 967–989.CrossRefGoogle Scholar
Li, L., Lien, D., Wu, Y., and Zhao, Y. (2017). “Enforcement and political power in anticorruption – Evidence from China.” World Development, 98, 133–147.CrossRefGoogle Scholar
Li, R. (2013). “Media corruption: A Chinese characteristic.” Journal of Business Ethics, 116(2), 297–310.CrossRefGoogle Scholar
Li, S. (2015). “Sanya weijian bian chai bian zhang 5 nian xinzeng 500 wan pingfangmi weijian.” [Sanya illegal buildings were expanded as they were dismantled, 5 billion square meters were increased in the past 5 years]. Nanguo Dushibao, April 22, 2015, available at: http://hainan.ifeng.com/app/sanya/detail_2015_04/22/3812061_0.shtmlGoogle Scholar
Li, S., Li, S., and Zhang, W. (2000). “The road to capitalism: Competition and institutional change in China.” Journal of Comparative Economics, 28(2), 269–292.CrossRefGoogle Scholar
Li, W., and Pye, L. W. (1992). “The ubiquitous role of the mishu in Chinese politics.” China Quarterly, 132, 913–936.CrossRefGoogle Scholar
Li, Y. (2014). The judicial system and reform in post-mao China: Stumbling towards justice. London: Routledge.Google Scholar
Li, Y. (2018). Playing by the informal rules: Why the Chinese regime remains stable despite rising protests. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Liao, X., and Tsai, W. H. (2020). “Strengthening China’s powerful commission for discipline inspection under Xi Jinping, with a case study at the county level.” China Journal, 84(1), 29–50.CrossRefGoogle Scholar
Lin, C. S. (2009). Developing China: Land, politics and social conditions. London: Routledge.CrossRefGoogle Scholar
Lin, J., and Si, S. X. (2010). “Can guanxi be a problem? Contexts, ties, and some unfavorable consequences of social capital in China.” Asia Pacific Journal of Management, 27(3), 561–581.CrossRefGoogle Scholar
Lin, W. (2022). “Garnering sympathy: Moral appeals and land bargaining under autocracy.” Journal of Institutional Economics. 18(5), 767–784.CrossRefGoogle Scholar
Lin, W., and Lin, G. C. (2023). “Strategizing actors and agents in the functioning of informal property rights: The tragicomedy of the extralegal housing market in China.” World Development, 161, 106111.CrossRefGoogle Scholar
Liu, L., and Weingast, B. R. (2017). “Taobao, federalism, and the emergence of law, Chinese style.” Minnesota Law Review, 102(4), 1563–1590.Google Scholar
Liu, T., Cao, G., Yan, Y., and Wang, R. Y. (2016). “Urban land marketization in China: Central policy, local initiative, and market mechanism.” Land Use Policy, 57, 265–276.CrossRefGoogle Scholar
Liu, Y. (2013). “Beijing songzhuang xiaochanquan fang diaocha: Shiji dong loupan yi tinggong 2 yue.” [Research on small property houses of Songzhuang in Beijing: More than ten buildings have been shut for 2 months]. China Economic Weekly, August 27, 2013, available at: http://news.sina.com.cn/c/sd/2013–08–27/004528052942.shtmlGoogle Scholar
Liu, Y., He, S., Wu, F., and Webster, C. (2010). “Urban villages under China’s rapid urbanization: Unregulated assets and transitional neighbourhoods.” Habitat International, 34(2), 135–144.CrossRefGoogle Scholar
Lo, S. H. (1993). “Bureaucratic corruption and its control in Macao.” Asian Journal of Public Administration, 15(1), 32–58.CrossRefGoogle Scholar
Lo, T. W., and Kwok, S. I. (2017). “Triad organized crime in Macau casinos.” British Journal of Criminology, 57(3), 589–607.Google Scholar
Lord, N. J., Campbell, L. J., and Van Wingerde, K. (2019). “Other people’s dirty money.” British Journal of Criminology, 59(5): 1217–1236.CrossRefGoogle Scholar
Lorentzen, P., Fravel, M. T., and Paine, J. (2017). “Qualitative investigation of theoretical models: The value of process tracing.” Journal of Theoretical Politics, 29(3), 467–491.CrossRefGoogle Scholar
Loubere, N. (2016). “Cyber loan sharks, social credit, and new frontiers of digital control.” In Golley, J., Jaivin, L., and Tomba, L. (Eds.), China story yearbook 2016: Control (pp. 214–223). Canberra: Australian National University Press.Google Scholar
Loubere, N. (2017). “China’s internet finance boom and tyrannies of inclusion.” China Perspectives, 26, 9–18.Google Scholar
Lu, J. (2014). Varieties of governance in China: Migration and institutional change in Chinese villages. Oxford: Oxford University Press.CrossRefGoogle Scholar
Lu, X. (2000). “Booty socialism, bureau-preneurs, and the state in transition: Organizational corruption in China.” Comparative Politics, 32(3), 273–294.CrossRefGoogle Scholar
Luk, J. (2016). “Hundreds of nude photos sent by desperate women to online loan sharks as guarantees are leaked.” Mail Online, available at: www.dailymail.co.uk/news/peoplesdaily/article-3989842/Hundreds-nude-photos-sent-desperate-women-online-loan-sharks-guarantees-leaked.html (accessed April 8, 2020).Google Scholar
Luo, Y. (2008). “The changing Chinese culture and business behavior.” International Business Review, 17(2), 188–193.CrossRefGoogle Scholar
Lusthaus, J. (2013). “How organised is organised cybercrime?Global Crime, 14(2), 52–60.CrossRefGoogle Scholar
Lusthaus, J. (2018a). “Honour among (cyber) thieves?European Journal of Sociology, 59(2), 191–223.CrossRefGoogle Scholar
Lusthaus, J. (2018b). Industry of anonymity. Cambridge, MA: Harvard University Press.Google Scholar
Lusthaus, J., and Varese, F. (2021). “Offline and local: The hidden face of cybercrime.” Policing: A Journal of Policy and Practice, 15(1), 4–14.CrossRefGoogle Scholar
Ma, X. (2013). “Less than 10 thousand chengguan regulating 0.3 million to 0.5 million street vendors in Guangzhou.” Southern Metropolis Daily, available at: http://news.sina.com.cn/c/2013-09-10/083028177550.shtml (accessed April 28, 2020).Google Scholar
Macrae, J. (1982). “Underdevelopment and the economics of corruption: A game theory approach.” World Development, 10(8), 677–687.CrossRefGoogle Scholar
Manion, M. (2016). “Taking China’s anticorruption campaign seriously.” Economic and Political Studies, 4(1), 3–18.CrossRefGoogle Scholar
Marinaro, I. C. (2017). “Loan-sharking in a time of crisis.” Trends in Organized Crime, 20(1–2), 196–215.CrossRefGoogle Scholar
Marsden, P. V., and Campbell, K. E. (1984). “Measuring tie strength.” Social Forces, 63(2), 482–501.CrossRefGoogle Scholar
Martin, J., Munksgaard, R., Coomber, R., Demant, J., and Barratt, M. J. (2020). “Selling drugs on darkweb cryptomarkets: Differentiated pathways, risks and rewards.” British Journal of Criminology, 60(3), 559–578.Google Scholar
Martínez, L., Short, J. R., and Estrada, D. (2018). “The diversity of the street vending.” Cities, 79, 18–25.CrossRefGoogle Scholar
Mayntz, R. (2017). “Illegal markets: Boundaries and interfaces between legality and illegality.” In Beckert, J. and Dewey, M. (Eds.), The architecture of illegal markets: Towards an economic sociology of illegality in the economy (pp. 37–47). Oxford: Oxford University Press.CrossRefGoogle Scholar
McCusker, R. (2006). “Transnational organized cyber crime.” Crime, Law and Social Change, 46, 257–273.CrossRefGoogle Scholar
McMillan, J., and Woodruff, C. (1999). “Dispute prevention without courts in Vietnam.” Journal of Law, Economics, and Organization, 15(3), 637–658.CrossRefGoogle Scholar
Meramveliotakis, G., and Milonakis, D. (2010). “Surveying the transaction cost foundations of new institutional economics: A critical inquiry.” Journal of Economic Issues, 44(4), 1045–1072.CrossRefGoogle Scholar
Middleton, D., and Levi, M. (2015). “Let sleeping lawyers lie.” British Journal of Criminology, 55(4), 647–668.CrossRefGoogle Scholar
Middleton, D. J., and Levi, M. (2005). “The role of solicitors in facilitating organized crime.” Crime, Law and Social Change, 42(2–3), 123–161.CrossRefGoogle Scholar
Milgrom, P. R., North, D. C., and Weingast, B. R. (1990). “The role of institutions in the revival of trade: The law merchant, private judges, and the champagne fairs.” Economics & Politics, 2(1), 1–23.CrossRefGoogle Scholar
Miron, J. A., and Zwiebel, J. (1995). “The economic case against drug prohibition.” Journal of Economic Perspectives, 9(4), 175–192.CrossRefGoogle Scholar
Mishra, A., and Samuel, A. (2016). “Corruption and hold-up: The role of intermediaries.” European Journal of Law and Economics, 41(3), 575–599.CrossRefGoogle Scholar
Molm, L. D. (1981). “The conversion of power imbalance to power use.” Social Psychology Quarterly, 44(3), 151–163.CrossRefGoogle Scholar
Molm, L. D. (1989). “Punishment power: A balancing process in power-dependence relations.” American Journal of Sociology, 94(6), 1392–1418.CrossRefGoogle Scholar
Molm, L. D. (1994). “Is punishment effective? Coercive strategies in social exchange.” Social Psychology Quarterly, 57(2), 75–94.CrossRefGoogle Scholar
Molm, L. D. (1997). Coercive power in social exchange. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Molm, L. D., Takahashi, N., and Peterson, G. (2000). “Risk and trust in social exchange: An experimental test of a classical proposition.” American Journal of Sociology, 105(5), 1396–1427.CrossRefGoogle Scholar
Murphy, R. H., and O’Reilly, C. (2020). “Assessing state capacity libertarianism.” Cato Journal, 40, 735–767.Google Scholar
Murtazashvili, I., and Murtazashvili, J. (2016). “The origins of private property rights: States or customary organizations?Journal of Institutional Economics, 12(1), 105–128.CrossRefGoogle Scholar
Murtazashvili, J. B. (2016). Informal order and the state in Afghanistan. New York, NY: Cambridge University Press.CrossRefGoogle Scholar
Murtazashvili, J., and Murtazashvili, I. (2020). “Wealth-destroying states.” Public Choice, 182(3), 353–371.CrossRefGoogle Scholar
Murtazashvili, J. B., and Murtazashvili, I. (2021). Land, the state, and war: Property institutions and political order in Afghanistan. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Nee, V. (2005). “The new institutionalisms in economics and sociology.” In Smelser, N. J. and Swedberg, R. (Eds.), The handbook of economic sociology (pp. 49–74). Princeton, NJ: Princeton University Press.Google Scholar
Nee, V., and Opper, S. (2012). Capitalism from below: Markets and institutional change in China. Cambridge, MA and London: Harvard University Press.CrossRefGoogle Scholar
Nee, V., and Swedberg, R. (2005). “Economic sociology and new institutional economics.” In Menard, C. and Shirley, M. M. (Eds.), Handbook of new institutional economics (pp. 789–818). Boston, MA: Springer.Google Scholar
Ng, K. H., and He, X. (2017). Embedded courts: Judicial decision-making in China. New York, NY: Cambridge University Press.CrossRefGoogle Scholar
Nip, A. (2020). “Sex-video chatroom under police probe.” (updated May 14, 2020), available at: www.thestandard.com.hk/section-news/section/47181603/219017/Sex-video-chatroom-under-police-probe (accessed April 27, 2022).Google Scholar
North, D. C. (1990). Institutions, institutional change and economic performance. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
North, D. C. (1993). “Institutions and credible commitment.” Journal of Institutional and Theoretical Economics, 149, 11–23.Google Scholar
Nozick, R. (1974). Anarchy, state, and utopia. New York, NY: Basic Books.Google Scholar
O’Brien, K. J., and Deng, Y. (2017). “Preventing protest one person at a time.” China Review, 17(2), 179–201.Google Scholar
O’Cass, A., and Siahtiri, V. (2013). “In search of status through brands from western and Asian origins.” Journal of Retailing and Consumer Services, 20(6), 505–515.Google Scholar
Oba, B., and Semerciöz, F. (2005). “Antecedents of trust in industrial districts: An empirical analysis of inter-firm relations in a Turkish industrial district.” Entrepreneurship & Regional Development, 17(3), 163–182.CrossRefGoogle Scholar
O’brien, K. J., and Han, R. (2009). “Path to democracy? Assessing village elections in China.” Journal of Contemporary China, 18(60), 359–378.Google Scholar
Odabas, M., Holt, T. J., and Breiger, R. L. (2017). “Governance in online stolen data markets.” In Beckert, J. and Dewey, M. (Eds.), The architecture of illegal markets: Towards an economic sociology of illegality in the economy (pp. 87–107). Oxford: Oxford University Press.Google Scholar
Oldenburg, P. (1987). “Middlemen in third-world corruption: Implications of an Indian case.” World Politics, 39(4), 508–535.CrossRefGoogle Scholar
Ong, L. H. (2018). “Thugs-for-Hire: Subcontracting of state coercion and state capacity in China.” Perspectives on Politics, 16(3), 680–695.CrossRefGoogle Scholar
Ostrom, E. (1990). Governing the commons: The evolution of institutions for collective action. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Özen, Ş., Uysal, Ö. Ö., and Çakar, M. (2016). “Seemingly embedded but obviously exploitative relations: Organizational contingencies of mutual dependence, power imbalance and embedded relations.” European Management Review, 13(1), 53–68.CrossRefGoogle Scholar
Palan, R. (2017). “Futurity, offshore, and the international political economy of crime.” In Beckert, J. and Dewey, M. (Eds.), The architecture of illegal markets: Towards an economic sociology of illegality in the economy (pp. 108–120). Oxford: Oxford University Press.Google Scholar
Paletta, D. (2011). “Political legitimacy.” In Chatterjee, D. K. (Ed.), Encyclopedia of global justice. Dordrecht: Springer, available at: https://doi.org/10.1007/978-1-4020-9160-5_201.Google Scholar
Paoli, L. (2002). “The paradoxes of organized crime.” Crime, Law and Social Change, 37(1), 51–97.CrossRefGoogle Scholar
Paoli, L., Greenfield, V. A., and Reuter, P. (2009). The world heroin market: Can supply be cut? Oxford: Oxford University Press.CrossRefGoogle Scholar
Parodi, G., Pastore, F., Giulietti, C., Ning, G., and Zimmermann, K. F. (2012). “Self‐employment of rural‐to‐urban migrants in China.” International Journal of Manpower, 33(1), 96–117.Google Scholar
Peerenboom, R., and He, X. (2009). “Dispute resolution in China: Patterns, causes and prognosis.” East Asia Law Review, 4(1), 1–61.Google Scholar
Pei, M. (2006). China’s trapped transition: The limits of developmental autocracy. London and Cambridge, MA: Harvard University Press.CrossRefGoogle Scholar
Pei, M. (2016). China’s crony capitalism: The dynamics of regime decay. Cambridge, MA and London: Harvard University Press.CrossRefGoogle Scholar
Piano, E. E. (2019). “State capacity and public choice: A critical survey.” Public Choice 178(1), 289–309.CrossRefGoogle Scholar
Polinsky, A. M., and Shavell, S. (2000). “The economic theory of public enforcement of law.” Journal of Economic Literature, 38(1), 45–76.CrossRefGoogle Scholar
Popke, E. J., and Ballard, R. (2004). “Dislocating modernity.” Geoforum, 35(1), 99–110.Google Scholar
Portes, A., and Haller, W. (2005). “The informal economy.” In Smelser, N. J. and Swedberg, R. (Eds.), The handbook of economic sociology (pp. 403–425). Princeton, NJ: Princeton University Press.Google Scholar
Poteete, A. R., Janssen, M. A., and Ostrom, E. (2010). Working together: Collective action, the commons, and multiple methods. Princeton, NJ: Princeton University Press.Google Scholar
Powell, B., and Stringham, E. P. (2009). “Public choice and the economic analysis of anarchy: A survey.” Public Choice, 140(3), 503–538.CrossRefGoogle Scholar
Powell, W. W. (1990). “Neither market nor hierarchy.” Research in Organizational Behaviour, 12, 259–336.Google Scholar
Prieger, J. E., and Kulick, J. (2015). “Violence in illicit markets: Unintended consequences and the search for paradoxical effects of enforcement.” B.E. Journal of Economic Analysis & Policy, 15(3), 1263–1295.CrossRefGoogle Scholar
Provis, C. (2008). “Guanxi and conflicts of interest.” Journal of Business Ethics, 79(1), 57–68.CrossRefGoogle Scholar
Przepiorka, W., Norbutas, L., and Corten, R. (2017). “Order without law: Reputation promotes cooperation in a cryptomarket for illegal drugs.” European Sociological Review, 33(6), 752–764.CrossRefGoogle Scholar
Punch, M. (2000). “Police corruption and its prevention.” European Journal on Criminal Policy and Research, 8(3), 301–324.CrossRefGoogle Scholar
Punch, M. (2009). Police corruption: Deviance, accountability and reform in policing. Devon: Willan Publishing.Google Scholar
Pyrooz, D. C., and MouleJr., R. K. (2019). “Gangs and social media.” In Oxford Research Encyclopedias of Criminology and Criminal Justice, doi: 10.1093/acrefore/9780190264079.013.439.CrossRefGoogle Scholar
Qi, X. (2011). “Face: A Chinese concept in a global sociology.” Journal of Sociology, 47(3), 279–295.Google Scholar
Qi, X. (2013). “Guanxi, social capital theory and beyond: Toward a globalized social science.” British Journal of Sociology, 64(2), 308–324.CrossRefGoogle Scholar
Qi, X. (2017). “Reconstructing the concept of face in cultural sociology: In Goffman’s footsteps, following the Chinese case.” Journal of Chinese Sociology, 4(1), 1–17.CrossRefGoogle Scholar
Qian, Y. (2010). “Sanya ‘tiechui xingdong’ chaiqian: Zhengfu congzhong yuli.” [Sanya’s “hammer campaign” demolition: Government profits]. Xinhuanet, October 22, 2010, available at: https://news.qq.com/a/20101022/000642.htmGoogle Scholar
Qian, Y., and Weingast, B. R. (1997). “Federalism as a commitment to reserving market incentives.” Journal of Economic Perspectives, 11(4), 83–92.CrossRefGoogle Scholar
Qiao, S. (2015). “Small property, big market: A focal point explanation.” American Journal of Comparative Law, 63(1), 197–238.CrossRefGoogle Scholar
Qiao, S. (2017). Chinese small property: The co-evolution of law and social norms. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Qun, W., Yongle, L., and Siqi, Y. (2015). “The incentives of China’s urban land finance.” Land Use Policy, 42, 432–442.CrossRefGoogle Scholar
Raub, W. (2004). “Hostage posting as a mechanism of trust: Binding, compensation, and signaling.” Rationality and Society, 16(3), 319–365.CrossRefGoogle Scholar
Raub, W., and Keren, G. (1993). “Hostages as a commitment device: A game-theoretic model and an empirical test of some scenarios.” Journal of Economic Behavior & Organization, 21(1), 43–67.Google Scholar
Raub, W., and Weesie, J. (1990). “Reputation and efficiency in social interactions: An example of network effects.” American Journal of Sociology, 96(3), 626–654.CrossRefGoogle Scholar
Reuter, P. (1983). Disorganized crime: The economics of the visible hand. Cambridge, MA: MIT Press.Google Scholar
Reuter, P. (1985). The organization of illegal markets: An economic analysis. Washington, DC: US Department of Justice, National Institute of Justice.Google Scholar
Reuter, P. (2009). “Systemic violence in drug markets.” Crime, Law and Social Change, 52(3), 275–284.CrossRefGoogle Scholar
Rhodes, R. A. W. (1996). “The new governance.” Political Studies, 44(4), 652–667.CrossRefGoogle Scholar
Richman, B. D. (2017). Stateless commerce: The diamond network and the persistence of relational exchange. Cambridge, MA: Harvard University Press.CrossRefGoogle Scholar
Richter, R. (2015). Essays on new institutional economics. Heidelberg: Springer.CrossRefGoogle Scholar
Rindfleisch, A. (2019). “Transaction cost theory: Past, present and future.” AMS Review, 10, 85–97.Google Scholar
Rona-Tas, A., and Guseva, A. (2018). “Consumer credit in comparative perspective.” Annual Review of Sociology, 44, 55–75.CrossRefGoogle Scholar
Rooks, G., Tazelaar, F., and Snijders, C. (2011). “Gossip and reputation in business networks.” European Sociological Review, 27(1), 90–106.CrossRefGoogle Scholar
Rosenfeld, R., Jacobs, B. A., and Wright, R. (2003). “Snitching and the code of the street.” British Journal of Criminology, 43(2), 291–309.CrossRefGoogle Scholar
Rothstein, B., and Varraich, A. (2017). Making sense of corruption. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Roy, A. (2011). “Slumdog cities: Rethinking subaltern urbanism.” International Journal of Urban and Regional Research, 35(2), 223–238.CrossRefGoogle ScholarPubMed
Ruan, J. (2016). Guanxi, social capital and school choice in China: The rise of ritual capital. New York, NY: Springer.Google Scholar
Ruan, J. (2019). “Bribery with Chinese characteristics and the use of guanxi to obtain admission to prestigious secondary schools in urban China.” Critical Asian Studies, 51(1), 120–130.CrossRefGoogle Scholar
Ruan, J. (2021). “Motivations for ritual performance in bribery: Ethnographic case studies of the use of guanxi to gain school places in China.” Current Sociology, 69(1), 41–58.CrossRefGoogle Scholar
Sa, H. (2020). “Do ambiguous property rights matter? Collective value logic in Lin Village.” Land Use Policy, 99, 105066.CrossRefGoogle Scholar
Sagy, T. (2011). “What’s so private about private ordering?Law & Society Review, 45(4), 923–954.CrossRefGoogle Scholar
Sandberg, S. (2012). “The importance of culture for cannabis markets: Towards an economic sociology of illegal drug markets.” British Journal of Criminology, 52(6), 1133–1151.CrossRefGoogle Scholar
Sanders, A., Young, R., and Burton, M. (2010). Criminal justice. New York, NY: Oxford University Press.CrossRefGoogle Scholar
Schelling, T. C. (1960). The strategy of conflict. Cambridge, MA: Harvard University Press.Google Scholar
Schelling, T. C. (2006). Strategies of commitment and other essays. Cambridge, MA: Harvard University Press.Google Scholar
Schmitz, P. W. (2013). “Bargaining position, bargaining power, and the property rights approach.” Economics Letters, 119(1), 28–31.CrossRefGoogle Scholar
Schneider, F. (2005). “Shadow economies around the world.” European Journal of Political Economy, 21(3), 598–642.CrossRefGoogle Scholar
Schotter, A. (1981). The economic theory of social institutions. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Schramm, M., and Taube, M. (2003). “The institutional economics of legal institutions, guanxi, and corruption in the PR China.” In Kidd, J. and Richter, F. J. (Eds.), Fighting corruption in Asia: Causes, effects, and remedies (pp. 271–296). Danvers, MA: World Scientific.Google Scholar
Sela-Shayovitz, R. (2012). “Gangs and the web.” Journal of Contemporary Criminal Justice, 28, 389–405.CrossRefGoogle Scholar
Shanghai Daily (2017). “Lawyer who joined loan sharks jailed,” available at: http://english.china.com/news/china/54/20170829/1059168.html (accessed April 9, 2020).Google Scholar
Shelley, L. I. (1997). “The criminal-political nexus: Russian case study.” Trends in Organized Crime, 3(1), 12–14.CrossRefGoogle Scholar
Shen, A., Antonopoulos, G. A., and Von Lampe, K. (2010). “The dragon breathes smoke: Cigarette counterfeiting in the people’s republic of China.” British Journal of Criminology, 50(2), 239–258.CrossRefGoogle Scholar
Shen, X., and Tsai, K. S. (2016). “Institutional adaptability in China: Local developmental models under changing economic conditions.” World Development, 87, 107–127.CrossRefGoogle Scholar
Shenzhen Municipality Urban Planning Land and Resources Commission (SMUPLRC). (2015). Guanyu chawei he lishi yiliu weijian chuli gongzuo de huibao [Report on the investigation of illegal buildings and the handling of illegal buildings left over by history].Google Scholar
Shieh, S. (2005). “The rise of collective corruption in China: The Xiamen smuggling case.” Journal of Contemporary China, 14(42), 67–91.CrossRefGoogle Scholar
Shifa, A. B., and Xiao, W. (2022). “Urban bias, migration control and rural land policy: The case of Hukou in China.” Journal of Economic Geography, available at: https://doi.org/10.1093/jeg/lbac008.Google Scholar
Shirk, D. A. (2010). “Drug violence in Mexico: Data and analysis from 2001–2009.” Trends in Organized Crime, 13(2–3), 167–174.Google Scholar
Shortland, A. (2018). “Governing criminal markets: The role of private insurers in kidnap for ransom.” Governance, 31(2), 341–358.CrossRefGoogle Scholar
Shortland, A. (2019). Kidnap: Inside the ransom business. Oxford: Oxford University Press.CrossRefGoogle Scholar
Shortland, A., and Varese, F. (2016). “State-building, informal governance and organised crime: The case of Somali piracy.” Political Studies, 64(4), 811–831.CrossRefGoogle Scholar
Shue, V. (2004). “Legitimacy crisis in China?” In Gries, P. and Rosen, S. (Eds.), State and society in 21st century China: Crisis, contention, and legitimation (pp. 24–49). New York, NY: Routledge.Google Scholar
Simon, H. (1961). Administrative behavior. 2nd ed. New York, NY: Macmillan.Google Scholar
Skarbek, D. (2011). “Governance and prison gangs.” American Political Science Review, 105(4), 702–716.CrossRefGoogle Scholar
Skarbek, D. (2012). “Prison gangs, norms, and organizations.” Journal of Economic Behavior & Organization, 82(1), 96–109.CrossRefGoogle Scholar
Skarbek, D. (2014). The social order of the underworld: How prison gangs govern the American penal system. Oxford: Oxford University Press.CrossRefGoogle Scholar
Skarbek, D. (2020a). The puzzle of prison order: Why life behind bars varies around the world. Oxford: Oxford University Press.CrossRefGoogle Scholar
Skarbek, D. (2020b). “Qualitative research methods for institutional analysis.” Journal of Institutional Economics, 16(4), 409–422.CrossRefGoogle Scholar
Skarbek, D., and Wang, P. (2015). “Criminal rituals.” Global Crime, 16(4), 288–305.CrossRefGoogle Scholar
Skarbek, E. C. (2014). “The Chicago fire of 1871: A bottom–up approach to disaster relief.” Public Choice, 160(1–2), 155–180.CrossRefGoogle Scholar
Sløk-Madsen, S. K., Skarbek, D., Hansen, A., and Rezaei, A. (2021). “The organization of Danish gangs: A transaction cost approach.” Trends in Organized Crime, 24(3), 361–377.CrossRefGoogle Scholar
Small, M. L. (2009). “‘How many cases do I need?’ On science and the logic of case selection in field-based research.” Ethnography, 10(1), 5–38.CrossRefGoogle Scholar
Smart, A., and Hsu, C. L. (2007). “Corruption or social capital? Tact and the performance of guanxi in market socialist China.” In Nuijten, M. and Anders, G. (Eds.), Corruption and the secret of law (pp. 167–190). London: Routledge.Google Scholar
Smith, R. (2009). “Understanding entrepreneurial behaviour in organized criminals.” Journal of Enterprising Communities: People and Places in the Global Economy, 3(3), 256–268.Google Scholar
Soudijn, M. R., and Zhang, S. X. (2013). “Taking loan sharking into account.” Trends in Organized Crime, 16(1), 13–30.CrossRefGoogle Scholar
Standifird, S. S., and Marshall, R. S. (2000). “The transaction cost advantage of guanxi-based business practices.” Journal of World Business, 35(1), 21–42.CrossRefGoogle Scholar
Steel, C. M. (2019). “Stolen identity valuation and market evolution on the dark web.” International Journal of Cyber Criminology, 13(1), 70–83.Google Scholar
Storr, V. H., Haeffele-Balch, S., and Grube, L. E. (2016). Community revival in the wake of disaster: Lessons in local entrepreneurship. London: Palgrave Macmillan.Google Scholar
Storrod, M. L., and Densley, J. A. (2017). “Going viral and going country: The expressive and instrumental activities of street gangs on social media.” Journal of Youth Studies, 20, 677–696.CrossRefGoogle Scholar
Stringham, E. (2005). Anarchy, state and public choice. Cheltenham: Edward Elgar Publishing.CrossRefGoogle Scholar
Stringham, E. (2015). Private governance: Creating order in economic and social life. Oxford: Oxford University Press.CrossRefGoogle Scholar
Stuart, F. (2020). “Code of the tweet: Urban gang violence in the social media age.” Social Problems, 67(2), 191–207.CrossRefGoogle Scholar
Suchman, M. C. (1995). “Managing legitimacy: Strategic and institutional approaches.” Academy of Management Review, 20(3), 571–610.CrossRefGoogle Scholar
Sugden, R. (2004). The economics of rights, co-operation and welfare. London: Palgrave Macmillan.Google Scholar
Sun, L., and Ho, P. (2018). “Formalizing informal homes, a bad idea: The credibility thesis applied to China’s ‘extra-legal’ housing.” Land Use Policy, 79, 891–901.CrossRefGoogle Scholar
Suvilehto, J. T., Glerean, E., Dunbar, R. I., Hari, R., and Nummenmaa, L. (2015). “Topography of social touching depends on emotional bonds between humans.” Proceedings of the National Academy of Sciences, 112(45), 13811–13816.CrossRefGoogle ScholarPubMed
Swedberg, R. (2001). “Sociology and game theory: Contemporary and historical perspectives.” Theory and Society, 30(3), 301–335.CrossRefGoogle Scholar
Sykes, G. M., and Matza, D. (1957). “Techniques of neutralization: A theory of delinquency.” American Sociological Review, 22(6), 664–670.CrossRefGoogle Scholar
Tatlow, D. K. (2016). “To secure loans, Chinese women supply perilous collateral.” The New York Times, available at: www.nytimes.com/2016/06/16/world/asia/to-secure-loans-chinese-women-supply-perilous-collateral-nude-photos.html (accessed April 8, 2020).Google Scholar
Trebilcock, M. J., and Prado, M. M. (2011). What makes poor countries poor? Institutional determinants of development. Cheltenham: Edward Elgar Publishing.CrossRefGoogle Scholar
Trevaskes, S. (2007). Courts and criminal justice in contemporary China. Lanham: Lexington Books.Google Scholar
Trevaskes, S. (2010). Policing serious crime in China: From strike hard to kill fewer. London and New York: Routledge.Google Scholar
Tsai, K. S. (2002). Back-alley banking: Private entrepreneurs in China. Ithaca and London: Cornell University Press.Google Scholar
Tsai, K. S. (2006). “Adaptive informal institutions and endogenous institutional change in China.” World Politics, 59, 116.CrossRefGoogle Scholar
Tsai, L. L. (2007). “Solidary groups, informal accountability, and local public goods provision in rural China.” American Political Science Review, 101(2), 355–372.CrossRefGoogle Scholar
Tucker, J. L., and Devlin, R. T. (2019). “Uncertainty and the governance of street vending.” International Journal of Urban and Regional Research, 43(3), 460–475.CrossRefGoogle Scholar
Tufekci, Z. (2017). Twitter and tear gas: The power and fragility of networked protest. New Haven: Yale University Press.Google Scholar
Tullock, G. (Ed.). (1972). Explorations in the theory of anarchy. Blacksburg: Center for Study of Public Choice.Google Scholar
Tullock, G. (Ed.). (1974). Further explorations in the theory of anarchy. Blacksburg: University Publications.Google Scholar
Tyler, T. R. (2006a). Why people obey the law. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Tyler, T. R. (2006b). “Psychological perspectives on legitimacy and legitimation.” Annual Review of Psychology, 57(1), 375–400.CrossRefGoogle Scholar
Tyler, T. R. (2023). “Whither legitimacy? Legal authority in the twenty-first century.” Annual Review of Law and Social Science, 19(1), 1–17.CrossRefGoogle Scholar
Ulyssea, G. (2018). “Firms, informality, and development.” American Economic Review, 108(8), 2015–2047.CrossRefGoogle Scholar
Ulyssea, G. (2020). “Informality.” Annual Review of Economics, 12, 525–546.CrossRefGoogle Scholar
Van de Bunt, H., Siegel, D., and Zaitch, D. (2014). “The social embeddedness of organized crime.” In Paoli, L. (Ed.), The oxford handbook of organized crime (pp. 321–339). Oxford: Oxford University Press.Google Scholar
van Uhm, D. P., and Wong, R. W. (2019). “Establishing trust in the illegal wildlife trade in China.” Asian Journal of Criminology, 14(1), 23–40.CrossRefGoogle Scholar
Varese, F. (2001). The Russian mafia: Private protection in a new market economy. Oxford: Oxford University Press.CrossRefGoogle Scholar
Varese, F. (2010). “General introduction: What is organized crime?” In Varese, F. (Ed.), Organized crime (pp. 1–33). London and New York: Routledge.Google Scholar
Varese, F. (2011). Mafias on the move: How organized crime conquers new territories. Oxford: Princeton University Press.Google Scholar
Varese, F., and Wong, R. W. (2018). “Resurgent triads? Democratic mobilization and organized crime in Hong Kong.” Australian and New Zealand Journal of Criminology, 51(1), 23–39.CrossRefGoogle Scholar
Varese, F., Wang, P., and Wong, R. W. (2019). “‘Why should I trust you with my money?’: Credible commitments in the informal economy in China.” British Journal of Criminology, 59(3), 594–613.CrossRefGoogle Scholar
Velthuis, B. O. (1999). “The changing relationship between economic sociology and institutional economics: From Talcott parsons to mark Granovetter.” American Journal of Economics and Sociology, 58(4), 629–649.CrossRefGoogle Scholar
Vereeck, L., and Mühl, M. (2000). “An economic theory of court delay.” European Journal of Law and Economics, 10(3), 243–268.CrossRefGoogle Scholar
Von Lampe, K. (2008). “Organized crime in Europe.” Policing, 2(1), 7–17.CrossRefGoogle Scholar
Von Lampe, K., and Antonopoulos, G. A. (2018). “An introduction to the special issue on ‘organised crime and illegal markets in the UK and Ireland’.” Trends in Organized Crime, 21, 99–103.CrossRefGoogle Scholar
Von Lampe, K., and Ole Johansen, P. (2004). “Organized crime and trust: On the conceptualization and empirical relevance of trust in the context of criminal networks.” Global Crime, 6(2), 159–184.CrossRefGoogle Scholar
Walker, S. (1983). Sense and nonsense about crime: A policy guide. Monterey, CA: Brooks/Cole.Google Scholar
Wall, D. S. (2015). “Dis-organised crime: Towards a distributed model of the organization of cybercrime.” European Review of Organised Crime, 2, 71–90.Google Scholar
Wall, D. S. (2024). Cybercrime: The transformation of crime in the information age. Hoboken, NJ: John Wiley & Sons.Google Scholar
Wang, J., and Wang, P. (2024). “Campaign-style law enforcement in China: Causes and consequences.” Journal of Criminology, available at: https://doi.org/10.1177/26338076241252686.Google Scholar
Wang, L., and Sun, T. (2014). “Capitalization of legal title: Evidence from small-property-rights houses in Beijing.” Habitat International, 44, 306–313.CrossRefGoogle Scholar
Wang, P. (2013a). “The rise of the Red Mafia in China: A case study of organised crime and corruption in Chongqing.” Trends in Organized crime, 16(1), 49–73.CrossRefGoogle Scholar
Wang, P. (2014). “Extra-legal protection in China: How guanxi distorts China’s legal system and facilitates the rise of unlawful protectors.” British Journal of Criminology, 54(5), 809–830.CrossRefGoogle Scholar
Wang, P. (2016). “Military corruption in China: The role of guanxi in the buying and selling of military positions.” China Quarterly, 228, 970–991.CrossRefGoogle Scholar
Wang, P. (2017). The Chinese mafia: Organized crime, corruption, and extra-legal protection. Oxford: Oxford University Press.CrossRefGoogle Scholar
Wang, P. (2020a). “How to engage in illegal transactions: Resolving risk and uncertainty in corrupt dealings.” British Journal of Criminology, 60, 1282–1301.CrossRefGoogle Scholar
Wang, P. (2020b). “Politics of crime control: How campaign-style law enforcement sustains authoritarian rule in China.” British Journal of Criminology, 60(2), 422–443.Google Scholar
Wang, P., and Antonopoulos, G. A. (2016). “Organized crime and illegal gambling: How do illegal gambling enterprises respond to the challenges posed by their illegality in China?Australian & New Zealand Journal of Criminology, 49(2), 258–280.CrossRefGoogle Scholar
Wang, P., and Kwok, S. I. (2023). “Hong Kong triads: The historical and political evolution of urban criminal polity, 1842–2020.” Urban History, 50(3), 445–467.CrossRefGoogle Scholar
Wang, P., and Wang, J. (2018). “How China promotes its military officers: Interactions between formal and informal institutions.” China Quarterly, 234, 399–419.CrossRefGoogle Scholar
Wang, P., and Yan, X. (2020). “Bureaucratic slack in China: The anti-corruption campaign and the decline of patronage networks in developing local economies.” China Quarterly, 243, 611–634.CrossRefGoogle Scholar
Wang, P., Cho, L. F., and Li, R. (2018). “An institutional explanation of media corruption in China.” Journal of Contemporary China, 27(113), 748–762.CrossRefGoogle Scholar
Wang, P., Su, M., and Wang, J. (2021). “Organized crime in cyberspace: How traditional organized criminal groups exploit the online peer-to-peer lending market in China.” British Journal of Criminology, 61(2), 303–324.CrossRefGoogle Scholar
Wang, S., Tan, S., Yang, S., Lin, Q., and Zhang, L. (2019). “Urban-biased land development policy and the urban-rural income gap: Evidence from Hubei Province, China.” Land Use Policy, 87, 104066.CrossRefGoogle Scholar
Wang, Y. (2013b). “Court funding and judicial corruption in China.” China Journal, (69), 43–63.CrossRefGoogle Scholar
Wang, Y. P., Wang, Y., and Wu, J. (2009). “Urbanization and informal development in China: Urban villages in Shenzhen.” International Journal of Urban and Regional Research, 33(4), 957–973.CrossRefGoogle Scholar
Wang, Y., and You, J. (2012). “Corruption and firm growth: Evidence from China.” China Economic Review, 23(2), 415–433.CrossRefGoogle Scholar
Wank, D. L. (2001). Commodifying communism: Business, trust, and politics in a Chinese city. Cambridge: Cambridge University Press.Google Scholar
Wank, D. L. (2002). “Business-state clientelism in China: Decline or evolution.” In Gold, T., Guthrie, D., and Wank, D. (Eds.), Social connections in China: Institutions, culture, and the changing nature of Guanxi (pp. 97–116). Cambridge: Cambridge University Press.Google Scholar
Webb, J. W., Bruton, G. D., Tihanyi, L., and Ireland, R. D. (2013). “Research on entrepreneurship in the informal economy.” Journal of Business Venturing, 28(5): 598–614.CrossRefGoogle Scholar
Webb, J. W., Tihanyi, L., Ireland, R. D., and Sirmon, D. G. (2009). “You say illegal, I say legitimate: Entrepreneurship in the informal economy.” Academy of Management Review, 34(3), 492–510.CrossRefGoogle Scholar
Weber, M. (1956). Wirtschaft and gesellschaft. München: C.H. Beck.Google Scholar
Weber, M. (1978). Economy and society: An outline of interpretive sociology. Oakland, CA: University of California Press.Google Scholar
Webster, C., Wu, F., Zhang, F., and Sarkar, C. (2016). “Informality, property rights, and poverty in China’s ‘favelas’.” World Development, 78, 461–476.CrossRefGoogle Scholar
Wedeman, A. H. (2012). Double paradox: Rapid growth and rising corruption in China. Ithaca, NY: Cornell University Press.Google Scholar
Wedeman, A. H. (2013). “The challenge of commercial bribery and organized crime in China.” Journal of Contemporary China, 22(79), 18–34.CrossRefGoogle Scholar
Weesie, J., and Raub, W. (1996). “Private ordering: A comparative institutional analysis of hostage games.” Journal of Mathematical Sociology, 21(3), 201–240.CrossRefGoogle Scholar
Weingast, B. R. (1997). “The political foundations of democracy and the rule of the law.” American Political Science Review, 91(2), 245–263.CrossRefGoogle Scholar
Weinland, D. (2015). “The big score.” South China Morning Post, available at: www.scmp.com/business/banking-finance/article/1878528/big-score-making-or-breaking-chinas-consumer-credit-market (accessed March 30, 2020).Google Scholar
Williams, C. C., and Lansky, M. A. (2013). “Informal employment in developed and developing economies.” International Labour Review, 152(3–4), 355–380.CrossRefGoogle Scholar
Williams, P. (2001). “Organized crime and cybercrime: Synergies, trends, and responses.” Global Issues, 6(2), 22–26.Google Scholar
Williamson, C. (2011). “Informal institutions rule: Institutional arrangements and economic performance.” Public Choice, 139(3), 371–387.Google Scholar
Williamson, O. E. (1975). Markets and hierarchies. New York, NY: Free Press.Google Scholar
Williamson, O. E. (1979). “Transaction-cost economics: The governance of contractual relations.” Journal of Law and Economics, 22, 233–261.Google Scholar
Williamson, O. E. (1983). “Credible commitments: Using hostages to support exchange.” American Economic Review, 73(4), 519–540.Google Scholar
Williamson, O. E. (1985). The economic institutions of capitalism. New York, NY: Free Press.Google Scholar
Williamson, O. E. (1986). “Transaction-cost economics: The governance of contractual relations.” In Barney, J. and Ouchi, W. (Eds.), Organizational economics (pp. 98–129). San Francisco: Jossey-Bass.Google Scholar
Williamson, O. E. (1993). “Opportunism and its critics.” Managerial and Decision Economics, 14, 97–107.CrossRefGoogle Scholar
Williamson, O. E. (2000). “The new institutional economics: Taking stock, looking ahead.” Journal of Economic Literature, 38(3), 595–613.CrossRefGoogle Scholar
Williamson, O. E. (2002). “The theory of the firm as governance structure: From choice to contract.” Journal of Economic Perspectives, 16(3), 171–195.CrossRefGoogle Scholar
Wong, K. C. (2012). Police reform in China. Boca Raton: CRC Press.Google Scholar
Wong, R. W. (2016). “The organization of the illegal tiger parts trade in China.” British Journal of Criminology, 56(5), 995–1013.CrossRefGoogle Scholar
Wong, R. W. (2017). “The role of reputation in the illegal purchase of protected wildlife in China.” Deviant Behavior, 38(11), 1290–1302.CrossRefGoogle Scholar
Wright, R. T., and Decker, S. H. (1996). Burglars on the job: Streetlife and residential break-ins. Boston, MA: Northeastern University Press.Google Scholar
Wu, C. (2016). Regulating government ethics: An underused weapon in China’s anti-corruption campaign. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Wu, F. (2016). “Housing in Chinese urban villages.” Housing Studies, 31(7), 852–870.CrossRefGoogle Scholar
Wu, F., Zhang, F., and Webster, C. (2013). “Informality and the development and demolition of urban villages in the Chinese peri-urban area.” Urban Studies, 50(10), 1919–1934.CrossRefGoogle Scholar
Wu, J., Balliet, D., and Van Lange, P. A. (2016). “Reputation, gossip, and human cooperation.” Social and Personality Psychology Compass, 10(6), 350–364.CrossRefGoogle Scholar
Xia, M. (2008). “Organizational formations of organized crime in China: Perspectives from the state, markets, and networks.” Journal of Contemporary China, 17(54), 1–23.Google Scholar
Xu, C. (2011). “The fundamental institutions of China’s reforms and development.” Journal of Economic Literature, 49(4), 1076–1151.CrossRefGoogle Scholar
Xu, J. (2017). “China’s internet finance.” China and World Economy, 25(4), 78–92.CrossRefGoogle Scholar
Xu, J., and Jiang, A. (2019). “Police civilianization and the production of underclass violence.” British Journal of Criminology, 59(1), 64–84.CrossRefGoogle Scholar
Xue, D., and Huang, G. (2015). “Informality and the state’s ambivalence in the regulation of street vending in transforming Guangzhou, China.” Geoforum, 62, 156–165.CrossRefGoogle Scholar
Yamagishi, T., and Yamagishi, M. (1994). “Trust and commitment in the United States and Japan.” Motivation and Emotion, 18(2), 129–166.CrossRefGoogle Scholar
Yan, Y. (1996). The flow of gifts: Reciprocity and social networks in a Chinese village. Palo Alto, CA: Stanford University Press.Google Scholar
Yang, H., and Zhao, D. (2015). “Performance legitimacy, state autonomy and China’s economic miracle.” Journal of Contemporary China, 24(91), 64–82.CrossRefGoogle Scholar
Yang, M. M. H. (1994). Gifts, favors, and banquets: The art of social relationships in China. Ithaca, NY: Cornell University Press.Google Scholar
Yeo, Y. (2016). “Complementing the local discipline inspection commissions of the CCP: Empowerment of the central inspection groups.” Journal of Contemporary China, 25(97), 59–74.CrossRefGoogle Scholar
Yeung, G., He, C., and Zhang, P. (2017). “Rural banking in China: Geographically accessible but still financially excluded?Regional Studies, 51(2), 297–312.CrossRefGoogle Scholar
Yiftachel, O. (2009). “Theoretical notes on gray cities.” Planning Theory, 8(1), 88–100.CrossRefGoogle Scholar
Yin, R. K. (2009). Case study research: Design and methods (4th ed.). Thousand Oaks, CA: SAGE Publications.Google Scholar
Yin, R. K. (2012). Application of case study research (3rd ed.). Thousand Oaks, CA: SAGE Publications.Google Scholar
You, J., Chen, Y., Wang, W., and Shi, C. (2018). “Uncertainty, opportunistic behavior, and governance in construction projects: The efficacy of contracts.” International Journal of Project Management, 36(5), 795–807.CrossRefGoogle Scholar
Zelizer, V. A. (2012). “How I became a relational economic sociologist and what does that mean?Politics & Society, 40(2), 145–174.CrossRefGoogle Scholar
Zelizer, V. A. (2019). “Why and how social relations matter for economic lives?” Presentation at the Ostrom Speaker Series at George Mason University, October 17, 2019.Google Scholar
Zhai, X. (2013). Renqing, mianzi yu quanli de zaishengchan [Face, Favor and Reproduction of Power]. Beijing: Peking University Press.Google Scholar
Zhan, J. V. (2012). “Filling the gap of formal institutions: The effects of Guanxi network on corruption in reform-era China.” Crime, Law and Social Change, 58(2), 93–109.CrossRefGoogle Scholar
Zhan, J. V. (2017). “Do natural resources breed corruption? Evidence from China.” Environmental and Resource Economics, 66(2), 237–259.CrossRefGoogle Scholar
Zhan, J. V., and Zhu, J. (2016). “Explaining China’s selective anticorruption efforts in the reform era.” Presented at 2016 American Political Science Association Annual Meeting, available at SSRN: https://ssrn.com/abstract=2838087.Google Scholar
Zhang, H. (2013). “Dui songzhuang qiangchai shijian de jianjie.” [Insights about forced demolition in Songzhuang]. Art Intern, December 27, 2013, available at: http://collection.sina.com.cn/plfx/20131227/0929138395.shtmlGoogle Scholar
Zhang, M., and Zhao, P. (2018). “The determinants of informal housing price in Beijing: Village power, informal institutions, and property security.” Cities, 77, 117–129.CrossRefGoogle Scholar
Zhang, S. (2016). Game: The segmentation, implementation and protection of land rights in China. Hackensack: World Scientific.Google Scholar
Zhang, T., and Zhao, X. (2014). “Do kinship networks strengthen private property? Evidence from rural China.” Journal of Empirical Legal Studies, 11(3), 505–540.CrossRefGoogle Scholar
Zhang, X., Fan, S., Zhang, L., and Huang, J. (2004). “Local governance and public goods provision in rural China.” Journal of Public Economics, 88(12), 2857–2871.CrossRefGoogle Scholar
Zhao, P. (2017). “An ‘unceasing war’ on land development on the urban fringe of Beijing: A case study of gated informal housing communities.” Cities, 60, 139–146.Google Scholar
Zhao, S. X., Lao, Q., and Chan, N. Y. M. (2013). “The rise of China and the development of financial centres in Hong Kong, Beijing, Shanghai, and Shenzhen.” Journal of Globalization Studies, 4(1), 32–62.Google Scholar
Zhou, Y. Y. (2016). “The investigation of the leak of a 10g file concerning naked borrowing.” The Paper, available at: www.thepaper.cn/newsDetail_forward_1572198 (accessed April 8, 2020; in Chinese).Google Scholar
Zhou, Y., Yu, Y., Chen, X., and Zhou, X. (2020). “Guanxi or justice? An empirical study of WeChat voting.” Journal of Business Ethics, 164(1), 201–225.CrossRefGoogle Scholar
Zhou, Z., and Yau, Y. (2021). “The small property rights housing institution in mainland China: The perspective of substitutability of institutional functions.” Land, 10(9), 915.CrossRefGoogle Scholar
Zhu, A., Fu, P., Zhang, Q., and Chen, Z. (2017). “Ponzi scheme diffusion in complex networks.” Physica A, 479, 128–136.CrossRefGoogle Scholar
Zhu, J. (2002). “Urban development under ambiguous property rights: A case of China’s transition economy.” International Journal of Urban and Regional Research, 26(1), 41–57.CrossRefGoogle Scholar
Zhu, J. (2008). “Why are offices for sale in China? A case study of the office-selling chain in Heilongjiang province.” Asian Survey, 48, 558–579.CrossRefGoogle Scholar
Zhu, J. (2012). “The shadow of the skyscrapers: Real estate corruption in China.” Journal of Contemporary China, 21(74), 243–260.CrossRefGoogle Scholar
Zhu, J., and Zhang, D. (2017). “Weapons of the powerful: Authoritarian elite competition and politicized anticorruption in China.” Comparative Political Studies, 50(9), 1186–1220.CrossRefGoogle Scholar
Zhu, J., Huang, H., and Zhang, D. (2017). “Big tigers, big data: Learning social reactions to China’s anticorruption campaign through online feedback.” Public Administration Review, 79(4), 500–513.Google Scholar
Zhu, X., Wei, Y., Lai, Y., Li, Y., Zhong, S., and Dai, C. (2019). “Empirical analysis of the driving factors of China’s ‘land finance’ mechanism using soft budget constraint theory and the PLS-SEM model.” Sustainability, 11(3), 742.Google Scholar
Zhu, Y. (2011). “‘Performance legitimacy’ and China’s political adaptation strategy.” Journal of Chinese Political Science, 16(2), 123–140.CrossRefGoogle Scholar

Accessibility standard: WCAG 2.0 A

Why this information is here

This section outlines the accessibility features of this content - including support for screen readers, full keyboard navigation and high-contrast display options. This may not be relevant for you.

Accessibility Information

The PDF of this book conforms to version 2.0 of the Web Content Accessibility Guidelines (WCAG), ensuring core accessibility principles are addressed and meets the basic (A) level of WCAG compliance, addressing essential accessibility barriers.

Content Navigation

Table of contents navigation
Allows you to navigate directly to chapters, sections, or non‐text items through a linked table of contents, reducing the need for extensive scrolling.
Index navigation
Provides an interactive index, letting you go straight to where a term or subject appears in the text without manual searching.

Reading Order & Textual Equivalents

Single logical reading order
You will encounter all content (including footnotes, captions, etc.) in a clear, sequential flow, making it easier to follow with assistive tools like screen readers.
Short alternative textual descriptions
You get concise descriptions (for images, charts, or media clips), ensuring you do not miss crucial information when visual or audio elements are not accessible.
Full alternative textual descriptions
You get more than just short alt text: you have comprehensive text equivalents, transcripts, captions, or audio descriptions for substantial non‐text content, which is especially helpful for complex visuals or multimedia.

Structural and Technical Features

ARIA roles provided
You gain clarity from ARIA (Accessible Rich Internet Applications) roles and attributes, as they help assistive technologies interpret how each part of the content functions.

Save book to Kindle

To save this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Bibliography
  • Peng Wang, University of Hong Kong, Wanlin Lin, Sun Yat-sen University
  • Book: Extralegal Governance
  • Online publication: 21 November 2025
  • Chapter DOI: https://doi.org/10.1017/9781009622158.009
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Bibliography
  • Peng Wang, University of Hong Kong, Wanlin Lin, Sun Yat-sen University
  • Book: Extralegal Governance
  • Online publication: 21 November 2025
  • Chapter DOI: https://doi.org/10.1017/9781009622158.009
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Bibliography
  • Peng Wang, University of Hong Kong, Wanlin Lin, Sun Yat-sen University
  • Book: Extralegal Governance
  • Online publication: 21 November 2025
  • Chapter DOI: https://doi.org/10.1017/9781009622158.009
Available formats
×