參考文獻 |
〔1〕 周文卿、周樹林、陳樺誼,2006年12月,「網路消費行為與商機模式研究」,資策會資訊市場情報中心(MIC),經濟部。
〔2〕 「96年數位落差研究報告」,2007年10月,行政院研究發展考核委員會。
〔3〕 “2007 Internet crime report” , Internet Crime Complaint Center, 2008.
〔4〕 “2004 Internet crime report” , Internet Crime Complaint Center, 2005.
〔5〕 “2005 Internet crime report” , Internet Crime Complaint Center, 2006.
〔6〕 “2006 Internet crime report” , Internet Crime Complaint Center, 2007.
〔7〕 刑事局165反詐騙專線週報,2007年10月,取自http://www.tcpd.gov.tw/all-tcpd.php?topage=1&t_type=d&id=365。
〔8〕 莊明雄,「虛擬世界籠罩詐騙風暴-網路族人心惶惶」,刑事局偵九隊,刑事雙月刊,2008年。
〔9〕 朱桓毅,「拍賣網站消費與詐欺行為之研究」,銘傳大學傳播管理研究所碩士論文,碩士論文,民92。
〔10〕 歐建智,「拍賣網站買空賣空,防欺出招」,大成報,2003年3月29日。
〔11〕 劉忠陽,「拍賣網站消費者與詐欺行為之研究」,銘傳大學數位媒體的發展與再造學術研討會,2004年。
〔12〕 Bierman, H.S. and Fernandez, L. 1998, Game Theory with Economic Applications, Addison-Wesley, USA.
〔13〕 Klein,Stephan and O’Keefe,Robert M. 1999. The impact of the web on auctions:some empirical evidence and theoretical considerations, International Journal of Electronic Commerence, 3, Spring, 7-20.
〔14〕 Wurman , P. R. , Wellman , M. P. and Walsh W. E. 1998, The Mighigan Internet AuctionBot : A Configurable Auction Server for Human and Software Agents, Proceddings of the International Conference on Autonomous Agents, 301-308.
〔15〕 Chua, C. E. H., & Jonathan Wareham, E. (2004). Fighting internet auction fraud: An assessment and proposal.
〔16〕 Conte, R., & Paolucci, M. (2003). Social cognitive factors of unfair ratings in reputation reporting systems. Web Intelligence, 2003.WI 2003.Proceedings.IEEE/WIC International Conference on, , 316-322.
〔17〕 Jenamani, M., Zhong, Y., & Bhargava, B. (2007). Cheating in online auction-towards explaining the popularity of english auction. Electronic Commerce Research and Applications, 6(1), 53-62.
〔18〕 Borgatti, S.P., “What Is Social Network Analysis?”, 1998, http://www.analytictech.com/networks/whatis.htm.
〔19〕 Freeman, L., “Centrality in Social Networks: I. Conceptual Clarification,” Social Networks, 1979.
〔20〕 Wellman, B., “For a Social Network Analysis of Computer Networks: A Sociological Perspective on Collaborative Work and Virtual Community,” ACM, 1996.
〔21〕 Garton, L. and Haythornthwaite, C. and Wellman, B., “Studying Online Social Networks,” Journal of Computer-Medicated Communication, June 1997, http://jcmc.huji.ac.il/vol3/issue1/garton.html.
〔22〕 Scott, J., Social Network Analysis, A Handbook, London: SAGE, 1991.
〔23〕 Hanneman, R.A., Introduction to Social Network Methods, http://faculty.ucr.edu/hanneman/SOC157/NETTEXT.pdf
〔24〕 Mokken, R.J. (1979). Cliques, clubs and clans. Quality and Quantity, 13, 161-173.
〔25〕 Alba, R. D. (1973). A graph-theoretic definition of a sociometric clique Journal of Mathematical Sociology, 3, 113-126
〔26〕 Everett, M.G. (1982). Graph theoretic blockings K-Plexes and K-cutpoints. Journal of Mathematical Sociology, 9, 75-84.
〔27〕 Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications Cambridge University Press.
〔28〕 楊雅惠,「從經濟學角度分析犯罪行爲」,經濟前瞻,(17),pp. 129-130。
〔29〕 Elirlich, I., Participation in Illegitimate Activities: An Economic Analysis, 1974.
〔30〕 曾百川,「網路詐欺犯罪歷程之質化研究」,國立中央警察大學犯罪防治研究所,碩士論文,民94。
〔31〕 張博欽,「線上拍賣賣家信任、競標意圖、與競價結果—以法、比、港、新四國eBay拍賣為例」,國立東華大學國際企業學系,碩士論文,民94。
〔32〕 Pandit, S., Chau, D. H., Wang, S., & Faloutsos, C. (2007). Netprobe: A fast and scalable system for fraud detection in online auction networks. Proceedings of the 16th International Conference on World Wide Web, , 201-210.
〔33〕 Kauffman, R. J., & Wood, C. A. (2003). Running up the bid: Detecting, predicting, and preventing reserve price shilling in online auctions. Proceedings of the 5th International Conference on Electronic Commerce, , 259-265.
〔34〕 Rubin, S., Christodorescu, M., Ganapathy, V., Giffin, J. T., Kruger, L., & Wang, H. (2005). An auctioning reputation system based on anomaly detection. Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS),
〔35〕 Trevathan, J., & Read, W. (2006a). Detecting shill bidding in online english auctions. Social and Human Elements of Information Security: Emerging Trends and Counter Measures,
〔36〕 Trevathan, J., & Read, W. (2006b). Secure online english auctions. Proceedings of the International Conference on Security and Cryptography (SECRYPT), , 387–396.
〔37〕 Trevathan, J., & Read, W. (2007). Detecting collusive shill bidding. Proceedings of the Fourth International Conference on Information Technology: New Generations, , 799-808.
〔38〕 Chau, D. H., & Faloutsos, C. (2005). Fraud detection in electronic auction. European Web Mining Forum at ECML/PKDD,
〔39〕 王俊程、邱垂鎮、葛煥元,「以交易記錄的社會網絡結構建立線上拍賣哄抬評價的偵測指標」,資訊管理學報,12卷4期,2005年10月,143-184。
〔40〕 Liu, Y., Jiang, Y., & Lin, W. (2006). A rough set and evidence theory based method for fraud detection. Intelligent Control and Automation, 2006.WCICA 2006.the Sixth World Congress on, 1
〔41〕 Matsuo, T., Ito, T., Day, R. W., & Shintani, T. (2006). A robust combinatorial auction mechanism against shill bidders. Proceedings of the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems, , 1183-1190.
〔42〕 Wang, W., Hidvegi, Z., & Whinston, A. (2002). Shill bidding in multi-round online auctions. System Sciences, 2002.HICSS.Proceedings of the 35th Annual Hawaii International Conference on, , 7. |