博碩士論文 964203042 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:51 、訪客IP:18.116.65.125
姓名 宋勇達(Yung-Ta Sung)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 以社會網路分析與詐騙手法比對建構網拍買賣家導向的詐欺偵測系統
(Developing an User-oriented Internet Auction Fraud Detection System By Social Network Analysis and Fraud Rules Matching)
相關論文
★ 探討國內田徑競賽資訊系統-以103年全國大專田徑公開賽資訊系統為例★ 生物晶片之基因微陣列影像分析之研究
★ 台灣資訊家電產業IPv6技術地圖與發展策略之研究★ 台灣第三代行動通訊產業IPv6技術地圖與發展策略之研究
★ 影響消費者使用電子書閱讀器採納意願之研究★ 以資訊素養映對數位學習平台功能之研究
★ 台商群聚指標模式與資料分析之研究★ 未來輪輔助軟體發展之需求擷取研究
★ 以工作流程圖展現未來研究方法配適於前瞻研究流程之研究★ 以物件導向塑模未來研究方法配適於前瞻研究之系統架構
★ 應用TRIZ 探討核心因素 建構電子商務新畫布★ 企業策略資訊策略人力資源管理策略對組織績效的影響
★ 採用Color Petri Net方法偵測程式原始碼緩衝區溢位問題★ 簡單且彈性化的軟體代理人通訊協定之探討與實作
★ 利用分析層級程序法探討台灣中草藥製造業之關鍵成功因素★ 利用微陣列資料分析於基因調控網路之建構與預測
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 本研究針對現行的網路拍賣交易評價制度,運用社會網路分析的k-core分群演算法,以及詐欺手法特徵比對的觀念,建構出一個以網拍買賣家為導向的系統,可協助買賣家偵測「哄抬評價」及具有「賣家收款後未交付商品」詐欺特徵的潛伏詐欺者。系統的核心觀念是「以網拍買賣家為導向」,不同於為網拍平臺業者開發的偵測系統,買賣家可以主動且隨時地利用本系統查詢某個帳號的詐欺嫌疑程度,而系統會將帳號再細分成具有或不具有詐欺嫌疑,為系統使用者在拍賣網站的黑名單帳號外提供多一層防護;有經驗的買賣家更可以依據商品特性、本身經驗將系統預設參數進行個人化的調整,讓系統的詐欺偵測規則更貼近他的需求。
系統利用k-core分群演算法分析「交易網路結構」,找出隱藏其中的可疑內聚子群體(cohesive subgroup),然後分析「交易記錄」做進一步的確認,是一種運用交易網路結構與交易紀錄兩種不同資料類型的哄抬評價偵測方式;而系統對於另一個詐欺手法「賣家收款後未交付商品」的偵測方式,則是挑出六種具針對性的詐欺偵測指標來進行偵測,秉持的觀念是不同的詐欺手法其偵測指標、指標參數、及門檻值設定亦應有所不同,藉由高針對性的指標組合設定,可有效提升系統準確率。
摘要(英) The research focuses on existing reputation system of the internet auction and an user-oriented internet auction fraud detection system is developed by using k-core clustering algorithm and fraud rules matching. The system helps users to detect fraudsters who may inflate his reputation or receive payment without delivering goods. The core concept of the system is user-oriented, and is very different from the dealer-oriented systems. The fraud degree of some accounts can be queried actively. The accounts can be classified according fraud or not fraud and another protection besides the blacklist will be provided. The detection indices of the system can be adjusted based on the property of goods or an experienced user. Then system will be more fitted.
The k-core clustering algorithm is used to analyze the structure of transaction network and the suspicious cohesive subgroup will be found out. Then transaction records will be analyzed for verification. This is an inflated reputation detection method which combines structure of transaction network and transaction records. As for the fraud of receiving payment without delivering goods, six fraud detection indices is used to detect it. The core concept is each fraud method should have corresponding detection indices and thresholds. The accurate rate can be improved by using high correlation indices.
關鍵字(中) ★ 詐欺手法比對
★ 哄抬評價
★ 網路拍賣詐欺偵測
★ 社會網絡分析
關鍵字(英) ★ fraud rules matching
★ Internet auction fraud detection
★ social network analysis
★ k-core
★ inflated reputation
論文目次 第一章 緒論
1-1 研究背景 1
1-2 研究動機 3
1-3 研究目的 4
1-4 研究限制 5
1-5 研究方法 6
第二章 文獻探討 7
2-1網路拍賣詐欺犯罪之現況 7
2-2拍賣與拍賣詐欺分類 8
2-2-1網路拍賣詐欺成因與特性 8
2-2-2網路拍賣詐欺類型 9
2-3社會網路分析 12
2-3-1社會網路分析的分析基本單元: 13
2-3-2社會網路分析的種類 14
2-3-3 社會網路分析的分群方法 15
2-3-4分群演算法K-Core 17
2-4詐欺共犯群體之組織特性 18
2-5預防網路拍賣詐欺之相關研究 19
第三章 系統分析與設計 21
3-1系統假設 21
3-2實驗對象 22
3-3系統架構 26
3-4詐欺偵測指標之建立與設定 28
第四章 系統開發與驗證 35
4-1實驗資料之蒐集 35
4-2系統模組 37
4-3系統流程 44
4-4系統效能 47
4-5系統驗證 49
第五章 結論與建議 55
5-1結論與貢獻 55
5-2未來研究發展之建議 57
參考文獻 58
附錄 64
附錄A 哄抬評價案例 64
附錄B 實驗帳號列表 65
參考文獻 一、中文部份
[1] 王俊程、邱垂鎮、葛煥元, 2005, “以交易記錄的社會網絡結構建立線上拍賣哄抬評價的偵測指標”, 資訊管理學報, 12卷4期, pp.143-184
[2] 王思峰, 劉麗萍, 2007, “虛擬社群中誰比較可信任?,” 中華心理學刊, 49卷, 1期, pp.1-17
[3] 邱垂鎮, 2007, “Detecting Reputation-Shilling Behaviors: A Social Network Analysis Approach,” 國立中正大學資訊管理研究所, 博士論文
[4] 邱議德, 2003, “以社會網路分析法評估工作團隊知識創造與分享,” 國立中正大學資訊管理研究所, 碩士論文
[5] 林吟潔, 2005, “整合關係策略與社會網絡觀點探討廠商間競合傾向—多重層次網絡分析法之應用,” 東海大學企業管理學系碩士班,碩士論文
[6] 林佳瑩, 2002, “誰在八卦?一個社會網絡的分析,” 國立政治大學社會學研究所,碩士論文
[7] 徐源隆, 2004, “以行為分析為基礎的網路拍賣詐欺偵防策略之研究,”中央員警大學資訊管理研究所, 碩士論文
[8] 洪儀玶, 2007, “具早期預警能力之線上拍賣詐騙偵測,” 淡江大學資訊管理研究所, 碩士論文
[9] 陳育騏, 2007, “結合社會網絡分析與資料探勘技術應用於網路拍賣詐欺偵測之研究,” 元智大學資訊管理研究所,碩士論文
[10] 陳樺誼、周樹林、周文卿, 2006, “網路消費行為與商機模式研究,” MIC產業情報研究所
[11] 曾百川, 2005, “網路詐欺犯罪歷程之質化研究,” 國立中央員警大學犯罪防治研究所, 碩士論文
[12] 葉懿慧, 2008, “以社會網路分析方法偵測線上拍賣網站的詐欺共犯群體,” 國立中央大學資訊管理研究所, 碩士論文
[13] 葛煥元, 2003, “線上拍賣欺騙行為偵測之研究,” 國立中正大學資訊管理研究所, 碩士論文
二、英文部份
[14] Alba, R. D., 1973, “A graph-theoretic definition of a sociometric clique,” Journal of Mathematical Sociology, 3, pp.113-126
[15] Baron, David P., 2002, “Private Ordering on the Internet: The eBay Community of Traders,” Business and Politics: Vol. 4 : Iss. 3, Article 1. pp.245-274.
[16] Bezalel Gavish and Christopher L. Tucci, 2008, “Reducing internet auction fraud,” Communications of the ACM, May 2008, Vol.51, No.5, pp.89-97
[17] Bywell, C.E., Oppenheim, C., 2001, “Fraud on Internet auctions,” ASLIB, 2001, pp.265-272.
[18] Carley, K.M., 2002 , “Dynamic Network Analysis,” in: Summary of the NRC workshop on Social Network Modeling and Analysis, R. Breiger and K.M. Carley (eds.), National Research Council, 2002.
[19] Christos et al., 2005, “Fraud Detection in Electronic Auction,” Proceedings of European Web Mining Forum (EWMF 2005) at ECML/PKDD 2005
[20] Christos et al., 2006, “Detecting fraudulent personalities in networks of online auctioneers,” Proceedings of PKDD 2006, pp.103-114.
[21] Christos et al., 2007, “Netprobe: A fast and scalable system for fraud detection in online auction networks,” Proceedings of the 16th International Conference on World Wide Web, pp. 201-210.
[22] Christos et al., 2008, “Toward a Comprehensive Model in Internet Auction Fraud Detection,” the 41st Annual Hawaii International Conference on System Sciences, pp.79
[23] Chua, C. E. H., Wareham, J., and Robey, D., 2002, “Anti-fraud mechanisms in internet auctions: the roles of markets, hierarchies and communities of practice,” international conference on information systems (ICIS).
[24] Cross, R., Rice, R.E., and Parker, A., 2001, “Information Seeding in Social Context: Structural Influences and Receipt of Information Benefits,” IEEE Transactions On Systems, Man, And Cybernetics-part C: Applications And Reviews (31:4), pp.438-448
[25] Dawn G. Gregg & Judy E. Scott., 2008, “A typology of complaints about eBay sellers,” Communications of the ACM, April 2008, Vol.51, No.4, pp.69-74
[26] Elirlich, I., Participation in Illegitimate Activities: An Economic Analysis, 1974.
[27] Elizabeth F. Churchill, Christine A. Halverson, 2005, “Guest Editors' Introduction: Social Networks and Social Networking,” IEEE Internet Computing, vol. 9, no. 5, pp. 14-19, Sep./Oct. 2005
[28] Freedman, D.H., 2002, “What eBay isn’t telling you,” Business 2.0 (3:8), Aug 2002, pp. 56
[29] Griggs, B., 2003, “Identity Theft, Other Cybercrimes Show No Sigh of Slowing in Utah,” Knight Ridder Tribune Business News, Jun 21, 2003, pp.1
[30] Han, K.H., 2003, “Brother and Sister Partners on the Net. Scan NT$ 5 Million on Yahoo Auction,” in: United Evenings, Taipei, Taiwan
[31] Krebs, V.E., 2002, “Mapping Networks of Terrorist Cells,” Journal of the International Network for Social Network Analysis (24:3) 2002, pp.3-52.
[32] Mikolaj Morzy and Juliusz Jezierski, 2006, “Cluster-Based Analysis and Recommendation of Sellers in Online Auctions,” Computer Systems Science and Engineering, Vol.22, No.5, pp.279-287
[33] Resnick, Paul and Richard Zeckhauser, 2002, “Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System,” The Economics of the Internet and E-Commerce. Michael R. Baye, editor. Volume 11 of Advances in Applied Microeconomics. Amsterdam, Elsevier Science. pp.127-157
[34] Snyder, J.M., 2000, “Online Auction Fraud: Are the Auction Houses Doing All They Should or Could to Stop Online Fraud,” Federal Communications Law Journal (52:2), pp. 453-472.
[35] Stanley Wasserman, Katherine Faust , 1994, “Social network analysis,” chapter 7
[36] Tsae, W., 2002, “Social Structure of Coopetition Within a Multiunit Organization: Coordination, Competition, and Intraorganizational Knowledge Sharing,” Organization Science (13:2), 2002, pp.179-190
[37] Tyler, J. R., Wilkinson, D. M. and Huberman, B. A., 2003, “Email as spectroscopy: automated discovery of community structure within organizations,” Proceeding of 1st International Conference Communities and Technologies, pages 81-96, September 2003.
[38] Vladimir and Matjaz, 2002, “An O(m) Algorithm for Cores Decomposition of Networks,” University of Ljubljana, preprint series 2002, 40:799
[39] Wang, W. et al., “Designing Mechanisms for E-Commerce Security: An Example from Sealed-Bid Auctions”, International Journal of Electronic Commerce (6:2), Winter 2001-2002, pp.139-156
[40] Wellman B., 1992, “Which types of ties and networks give what kinds of social support? ,” Advances in Group Processes, 9, pp.207-235.
[41] Wilke, J.R. and Wingfield, N., 2003, “Leading the News: Fraud Crackdown Hits Web Auctions – Federal and State Officials to Make Arrests. File Suits eBay Cooperates in Probe,” in: Wall Street Journal, pp. A.3.
三、網頁部分
[42] 中廣新聞, 2009, “反詐欺重點年 刑事局網站公佈十大詐欺手法,” http://www.tcpd.gov.tw/cht/index.php?code=list&flag=detail&ids=105&article_id=3465
[43] 刑事員警大隊, 2009, “提供民眾於春節期間防制網路拍賣詐欺之方法,” http://www.taipei.gov.tw/cgi-bin/Message/MM_msg_control?mode=viewnews&ts=497982b4:4fee&theme=&layout=
[44] 刑事警察局, 2008, “上半年網路犯罪12007件 詐欺案佔四成,”http://www.itis.tw/node/202
[45] 吳佩玲, 2008, “2012年台灣寬頻上網家戶普及率預計將達74%,”
http://www.find.org.tw/find/home.aspx?page=news&id=5295, 財團法人資訊工業策進會FIND網站新聞
[46] 時報資訊, 2008, “全民搶錢 網拍兼差賣家增5成”, http://tw.money.yahoo.com/news_article/adbf/d_a_080804_3_12r6v
[47] 葉亭佳, 2008, “2008年6月底止台灣上網人口,” http://www.find.org.tw/find/home.aspx?page=many&id=205,資策會FIND/經濟部技術處「創新資訊應用研究計畫」
[48] 趙鬱竹, 2008, “露天兩週年:商品數破千萬,買的人還是少,” http://www.ithome.com.tw/itadm/article.php?c=51461, iThome online 新聞
[49] 露天拍賣網討論區-交易安全, “拍賣網是騙錢好地方,” http://forum.ruten.com.tw/replylist.php?article=3572721&page=1
[50] 露天拍賣網, “交易安全, ”
http://www.ruten.com.tw/security/index.html
[51] 露天拍賣網, “信用評價的分數如何計算?” http://www.ruten.com.tw/system/server_center.htm?0005000500010004
[52] 露天拍賣網, “註冊會員: 一個身分證可註冊 3 個帳號,” https://member.ruten.com.tw/user/register_profile.htm
[53] 露天拍賣網, “評價可以修改嗎? 評價時要注意哪些事情?”, http://www.ruten.com.tw/system/server_center.htm?0005000500020005
[54] 露天拍賣網, “買家防身術,” http://www.ruten.com.tw/security/knowing_sellers.html
[55] 露天拍賣網, “露天拍賣會員合約,” http://www.ruten.com.tw/system/server_center.htm?00060001
[56] 露天拍賣網討論區, “【公告】 詐騙賣家,有跡可循,” http://forum.ruten.com.tw/replylist.php?article=312844&page=1
[57] Yahoo奇摩拍賣網, “Yahoo!奇摩拍賣買家 / 賣家保障方案,” http://tw.help.yahoo.com/auct/policy/protection.html
[58] Yahoo奇摩拍賣網, “拍賣教室-新手上路(會員註冊確認程式)”, http://tw.bid.yahoo.com/phtml/auc/tw/classroom/newbie/newbie_reg_home.html
[59] Yahoo奇摩拍賣網, “評價的顯示與計算方式,” http://help.cc.tw.yahoo.com/cp_info.html?id=2402
[60] Yahoo奇摩拍賣網, “黑名單公告區,” http://tw.mb.yahoo.com/auction/board.php?action=a&bname=9_blacklist
[61] Yahoo奇摩拍賣網, “買家防詐五招,” http://tw.help.yahoo.com/auct/safety/buyer.html
[62] Yahoo奇摩拍賣網, “賣家自保三式,” http://tw.help.yahoo.com/auct/safety/seller.html
[63] Borgatti, S.P., 1998, “What Is Social Network Analysis?,” http://www.analytictech.com/networks/whatis.htm.
[64] Hanneman, Robert A. and Mark Riddle, 2005, “Introduction to social network methods,”
http://faculty.ucr.edu/~hanneman/nettext/, ch11
[65] Internet Crime Complaint Center (IC3), “2008 IC3 Annual Report,” http://www.ic3.gov/media/annualreport/2008_IC3Report.pdf
[66] Laura Garton , Caroline Haythornthwaite and Barry Wellman, 1997, “Studying Online Social Networks,”
http://jcmc.indiana.edu/vol3/issue1/garton.html
[67] Luis R. Izquierdo and Robert A. Hanneman, 2006, “Introduction to the Formal Analysis of Social Networks Using Mathematica,” http://faculty.ucr.edu/~hanneman/mathematica_networks.pdf
[68] Stephen P. Borgatti, “Graph Theory,” http://www.steveborgatti.com/papers/graphtheory.doc
[69] Uwe Matzat, 2006, “Techniques of the Analysis of Social Networks II: A: Subgroup Models (Cohesion) and B: Positional Analysis (Structural Equivalence ),” http://www.tue-tm.org/iin/IIN6_2006.ppt
指導教授 薛義誠(Yih-chearing Shiue) 審核日期 2009-6-16
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明