參考文獻 |
一、中文部份
[1] 王俊程、邱垂鎮、葛煥元, 2005, “以交易記錄的社會網絡結構建立線上拍賣哄抬評價的偵測指標”, 資訊管理學報, 12卷4期, pp.143-184
[2] 王思峰, 劉麗萍, 2007, “虛擬社群中誰比較可信任?,” 中華心理學刊, 49卷, 1期, pp.1-17
[3] 邱垂鎮, 2007, “Detecting Reputation-Shilling Behaviors: A Social Network Analysis Approach,” 國立中正大學資訊管理研究所, 博士論文
[4] 邱議德, 2003, “以社會網路分析法評估工作團隊知識創造與分享,” 國立中正大學資訊管理研究所, 碩士論文
[5] 林吟潔, 2005, “整合關係策略與社會網絡觀點探討廠商間競合傾向—多重層次網絡分析法之應用,” 東海大學企業管理學系碩士班,碩士論文
[6] 林佳瑩, 2002, “誰在八卦?一個社會網絡的分析,” 國立政治大學社會學研究所,碩士論文
[7] 徐源隆, 2004, “以行為分析為基礎的網路拍賣詐欺偵防策略之研究,”中央員警大學資訊管理研究所, 碩士論文
[8] 洪儀玶, 2007, “具早期預警能力之線上拍賣詐騙偵測,” 淡江大學資訊管理研究所, 碩士論文
[9] 陳育騏, 2007, “結合社會網絡分析與資料探勘技術應用於網路拍賣詐欺偵測之研究,” 元智大學資訊管理研究所,碩士論文
[10] 陳樺誼、周樹林、周文卿, 2006, “網路消費行為與商機模式研究,” MIC產業情報研究所
[11] 曾百川, 2005, “網路詐欺犯罪歷程之質化研究,” 國立中央員警大學犯罪防治研究所, 碩士論文
[12] 葉懿慧, 2008, “以社會網路分析方法偵測線上拍賣網站的詐欺共犯群體,” 國立中央大學資訊管理研究所, 碩士論文
[13] 葛煥元, 2003, “線上拍賣欺騙行為偵測之研究,” 國立中正大學資訊管理研究所, 碩士論文
二、英文部份
[14] Alba, R. D., 1973, “A graph-theoretic definition of a sociometric clique,” Journal of Mathematical Sociology, 3, pp.113-126
[15] Baron, David P., 2002, “Private Ordering on the Internet: The eBay Community of Traders,” Business and Politics: Vol. 4 : Iss. 3, Article 1. pp.245-274.
[16] Bezalel Gavish and Christopher L. Tucci, 2008, “Reducing internet auction fraud,” Communications of the ACM, May 2008, Vol.51, No.5, pp.89-97
[17] Bywell, C.E., Oppenheim, C., 2001, “Fraud on Internet auctions,” ASLIB, 2001, pp.265-272.
[18] Carley, K.M., 2002 , “Dynamic Network Analysis,” in: Summary of the NRC workshop on Social Network Modeling and Analysis, R. Breiger and K.M. Carley (eds.), National Research Council, 2002.
[19] Christos et al., 2005, “Fraud Detection in Electronic Auction,” Proceedings of European Web Mining Forum (EWMF 2005) at ECML/PKDD 2005
[20] Christos et al., 2006, “Detecting fraudulent personalities in networks of online auctioneers,” Proceedings of PKDD 2006, pp.103-114.
[21] Christos et al., 2007, “Netprobe: A fast and scalable system for fraud detection in online auction networks,” Proceedings of the 16th International Conference on World Wide Web, pp. 201-210.
[22] Christos et al., 2008, “Toward a Comprehensive Model in Internet Auction Fraud Detection,” the 41st Annual Hawaii International Conference on System Sciences, pp.79
[23] Chua, C. E. H., Wareham, J., and Robey, D., 2002, “Anti-fraud mechanisms in internet auctions: the roles of markets, hierarchies and communities of practice,” international conference on information systems (ICIS).
[24] Cross, R., Rice, R.E., and Parker, A., 2001, “Information Seeding in Social Context: Structural Influences and Receipt of Information Benefits,” IEEE Transactions On Systems, Man, And Cybernetics-part C: Applications And Reviews (31:4), pp.438-448
[25] Dawn G. Gregg & Judy E. Scott., 2008, “A typology of complaints about eBay sellers,” Communications of the ACM, April 2008, Vol.51, No.4, pp.69-74
[26] Elirlich, I., Participation in Illegitimate Activities: An Economic Analysis, 1974.
[27] Elizabeth F. Churchill, Christine A. Halverson, 2005, “Guest Editors' Introduction: Social Networks and Social Networking,” IEEE Internet Computing, vol. 9, no. 5, pp. 14-19, Sep./Oct. 2005
[28] Freedman, D.H., 2002, “What eBay isn’t telling you,” Business 2.0 (3:8), Aug 2002, pp. 56
[29] Griggs, B., 2003, “Identity Theft, Other Cybercrimes Show No Sigh of Slowing in Utah,” Knight Ridder Tribune Business News, Jun 21, 2003, pp.1
[30] Han, K.H., 2003, “Brother and Sister Partners on the Net. Scan NT$ 5 Million on Yahoo Auction,” in: United Evenings, Taipei, Taiwan
[31] Krebs, V.E., 2002, “Mapping Networks of Terrorist Cells,” Journal of the International Network for Social Network Analysis (24:3) 2002, pp.3-52.
[32] Mikolaj Morzy and Juliusz Jezierski, 2006, “Cluster-Based Analysis and Recommendation of Sellers in Online Auctions,” Computer Systems Science and Engineering, Vol.22, No.5, pp.279-287
[33] Resnick, Paul and Richard Zeckhauser, 2002, “Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System,” The Economics of the Internet and E-Commerce. Michael R. Baye, editor. Volume 11 of Advances in Applied Microeconomics. Amsterdam, Elsevier Science. pp.127-157
[34] Snyder, J.M., 2000, “Online Auction Fraud: Are the Auction Houses Doing All They Should or Could to Stop Online Fraud,” Federal Communications Law Journal (52:2), pp. 453-472.
[35] Stanley Wasserman, Katherine Faust , 1994, “Social network analysis,” chapter 7
[36] Tsae, W., 2002, “Social Structure of Coopetition Within a Multiunit Organization: Coordination, Competition, and Intraorganizational Knowledge Sharing,” Organization Science (13:2), 2002, pp.179-190
[37] Tyler, J. R., Wilkinson, D. M. and Huberman, B. A., 2003, “Email as spectroscopy: automated discovery of community structure within organizations,” Proceeding of 1st International Conference Communities and Technologies, pages 81-96, September 2003.
[38] Vladimir and Matjaz, 2002, “An O(m) Algorithm for Cores Decomposition of Networks,” University of Ljubljana, preprint series 2002, 40:799
[39] Wang, W. et al., “Designing Mechanisms for E-Commerce Security: An Example from Sealed-Bid Auctions”, International Journal of Electronic Commerce (6:2), Winter 2001-2002, pp.139-156
[40] Wellman B., 1992, “Which types of ties and networks give what kinds of social support? ,” Advances in Group Processes, 9, pp.207-235.
[41] Wilke, J.R. and Wingfield, N., 2003, “Leading the News: Fraud Crackdown Hits Web Auctions – Federal and State Officials to Make Arrests. File Suits eBay Cooperates in Probe,” in: Wall Street Journal, pp. A.3.
三、網頁部分
[42] 中廣新聞, 2009, “反詐欺重點年 刑事局網站公佈十大詐欺手法,” http://www.tcpd.gov.tw/cht/index.php?code=list&flag=detail&ids=105&article_id=3465
[43] 刑事員警大隊, 2009, “提供民眾於春節期間防制網路拍賣詐欺之方法,” http://www.taipei.gov.tw/cgi-bin/Message/MM_msg_control?mode=viewnews&ts=497982b4:4fee&theme=&layout=
[44] 刑事警察局, 2008, “上半年網路犯罪12007件 詐欺案佔四成,”http://www.itis.tw/node/202
[45] 吳佩玲, 2008, “2012年台灣寬頻上網家戶普及率預計將達74%,”
http://www.find.org.tw/find/home.aspx?page=news&id=5295, 財團法人資訊工業策進會FIND網站新聞
[46] 時報資訊, 2008, “全民搶錢 網拍兼差賣家增5成”, http://tw.money.yahoo.com/news_article/adbf/d_a_080804_3_12r6v
[47] 葉亭佳, 2008, “2008年6月底止台灣上網人口,” http://www.find.org.tw/find/home.aspx?page=many&id=205,資策會FIND/經濟部技術處「創新資訊應用研究計畫」
[48] 趙鬱竹, 2008, “露天兩週年:商品數破千萬,買的人還是少,” http://www.ithome.com.tw/itadm/article.php?c=51461, iThome online 新聞
[49] 露天拍賣網討論區-交易安全, “拍賣網是騙錢好地方,” http://forum.ruten.com.tw/replylist.php?article=3572721&page=1
[50] 露天拍賣網, “交易安全, ”
http://www.ruten.com.tw/security/index.html
[51] 露天拍賣網, “信用評價的分數如何計算?” http://www.ruten.com.tw/system/server_center.htm?0005000500010004
[52] 露天拍賣網, “註冊會員: 一個身分證可註冊 3 個帳號,” https://member.ruten.com.tw/user/register_profile.htm
[53] 露天拍賣網, “評價可以修改嗎? 評價時要注意哪些事情?”, http://www.ruten.com.tw/system/server_center.htm?0005000500020005
[54] 露天拍賣網, “買家防身術,” http://www.ruten.com.tw/security/knowing_sellers.html
[55] 露天拍賣網, “露天拍賣會員合約,” http://www.ruten.com.tw/system/server_center.htm?00060001
[56] 露天拍賣網討論區, “【公告】 詐騙賣家,有跡可循,” http://forum.ruten.com.tw/replylist.php?article=312844&page=1
[57] Yahoo奇摩拍賣網, “Yahoo!奇摩拍賣買家 / 賣家保障方案,” http://tw.help.yahoo.com/auct/policy/protection.html
[58] Yahoo奇摩拍賣網, “拍賣教室-新手上路(會員註冊確認程式)”, http://tw.bid.yahoo.com/phtml/auc/tw/classroom/newbie/newbie_reg_home.html
[59] Yahoo奇摩拍賣網, “評價的顯示與計算方式,” http://help.cc.tw.yahoo.com/cp_info.html?id=2402
[60] Yahoo奇摩拍賣網, “黑名單公告區,” http://tw.mb.yahoo.com/auction/board.php?action=a&bname=9_blacklist
[61] Yahoo奇摩拍賣網, “買家防詐五招,” http://tw.help.yahoo.com/auct/safety/buyer.html
[62] Yahoo奇摩拍賣網, “賣家自保三式,” http://tw.help.yahoo.com/auct/safety/seller.html
[63] Borgatti, S.P., 1998, “What Is Social Network Analysis?,” http://www.analytictech.com/networks/whatis.htm.
[64] Hanneman, Robert A. and Mark Riddle, 2005, “Introduction to social network methods,”
http://faculty.ucr.edu/~hanneman/nettext/, ch11
[65] Internet Crime Complaint Center (IC3), “2008 IC3 Annual Report,” http://www.ic3.gov/media/annualreport/2008_IC3Report.pdf
[66] Laura Garton , Caroline Haythornthwaite and Barry Wellman, 1997, “Studying Online Social Networks,”
http://jcmc.indiana.edu/vol3/issue1/garton.html
[67] Luis R. Izquierdo and Robert A. Hanneman, 2006, “Introduction to the Formal Analysis of Social Networks Using Mathematica,” http://faculty.ucr.edu/~hanneman/mathematica_networks.pdf
[68] Stephen P. Borgatti, “Graph Theory,” http://www.steveborgatti.com/papers/graphtheory.doc
[69] Uwe Matzat, 2006, “Techniques of the Analysis of Social Networks II: A: Subgroup Models (Cohesion) and B: Positional Analysis (Structural Equivalence ),” http://www.tue-tm.org/iin/IIN6_2006.ppt
|