簡易檢索 / 詳目顯示

研究生: 楊雅淨
Ya-Jing Yang
論文名稱: 14種詐騙類型的案例分析
In-depth Analysis of 14 Types of Fraud
指導教授: 紀佳芬
Chia-Fen Chi
口試委員: 鄭仁偉
Jen-Wei Cheng
邱敏綺
Min-Chi Chiu
學位類別: 碩士
Master
系所名稱: 管理學院 - 工業管理系
Department of Industrial Management
論文出版年: 2022
畢業學年度: 110
語文別: 中文
論文頁數: 71
中文關鍵詞: 詐騙情境詐騙類型卡方自動互動檢視法
外文關鍵詞: Fraud scenario, Type of fraud, CHAID
相關次數: 點閱:306下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

本研究分析 2010 年至 2022 年間 168 件台灣及中國與詐騙有關之新聞案例及台灣各縣市警察局所刊登之詐騙案例,並以台灣及美國所提出的詐騙類型為基礎,將所蒐集的 168 件案例利用根本原因進行分類,提出完整的一套詐騙類型。針對各詐騙案例找出其促使案例發生的接觸媒介與交易媒介,並將各媒介進行編碼,接著應用卡方自動互動檢視法(CHAID)透過逐次搜尋處理屬性間的相互關係,以驗證媒介與類型之間的關係。

本研究所提出的詐騙類型共有十四種,分別為假親友詐騙、愛情詐騙、工作詐騙、投資詐騙、預付費詐騙、人頭帳戶詐騙、恐嚇詐騙、假客服詐騙、假檢警詐騙、未收到商品詐騙、商業電子郵件詐騙、略讀詐騙、釣魚詐騙及駭客詐騙。一系列的詐騙類型流程圖是依照 CHAID 分析結果所建構出來的,每一詐騙流程圖可清楚說明受害者是透過什麼樣的接觸媒介遇到犯罪者,再透過什麼樣的交易媒介交付出金錢或個人資訊及物品。最後,將針對各詐騙類型提出使該詐騙類型發生之機會點。


This research analyzes 168 fraud-related news cases in Taiwan and China and fraud cases published by police stations in Taiwan's counties and cities from 2010 to 2022. Based on the types of fraud proposed by Taiwan and the United States, the collected 168 cases that are categorized by root cause to present a complete set of fraud types. For each fraud case, find out the information media and money media that caused the case to occur, encode each media, and then apply the chi-square automatic interactive inspection method (CHAID) to process the relationship between attributes
through successive searches to verify the relationship between media and type.

There are fourteen types of fraud proposed in this study, namely, fake identity
fraud, romance scam, job scam, investment fraud, advance fraud, money mules scam,
intimidation fraud, tech support scam, government impersonation fraud, email account
typos, skimming scams, phishing scams and hacking scams. A series of fraud type flow
charts are constructed according to the results of CHAID analysis. Each fraud flow
chart can clearly illustrate the information media through which the victim encounters the criminal, and through which money media is used to deliver money or personal information and items. Finally, for each type of fraud, the point of opportunity for that type of fraud to occur will be presented.

摘要 I Abstract II 誌謝 III 圖目錄 V 表目錄 VI 第一章 緒論 1 第一節 研究背景與動機 1 第二節 研究目的 7 第三節 研究流程與架構 8 第二章 文獻探討 9 第一節 詐騙型態 9 第二節 詐騙犯罪相關理論 18 第三章 研究方法 27 第一節 資料來源 27 第二節 資料分析手法 31 第四章 研究結果 36 第一節 詐騙媒介 36 第二節 卡方自動互動檢視法分析結果 38 第三節 各詐騙類型之受騙機會 49 第五章 結論與建議 54 第一節 研究結論 54 第二節 未來研究方向 57 參考文獻 58

1. Nguyen, A. L., Mosqueda, L., Windisch, N., Weissberger, G., Axelrod, J., & Han, S. D. (2021). Perceived types, causes, and consequences of financial exploitation: narratives from older adults. The Journals of Gerontology: Series B, 76(5), 996-1004.
2. Amy, F. (2022). The most common types of consumer fraud. Retrieved from https://www.investopedia.com/financial-edge/0512/the-most-common-types-of-consumer-fraud.aspx (June 6, 2022)
3. Clarke, R. V., & Cornish, D. B. (1985). Modeling offenders' decisions: A framework for research and policy. Crime and justice, 147-185.
4. Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American sociological review, 588-608.
5. Cornish, D. B., & Clarke, R. V. (2003). Opportunities, precipitators and criminal decisions: A reply to Wortley's critique of situational crime prevention. Crime prevention studies, 16, 41-96.
6. Donner, C. M., Marcum, C. D., Jennings, W. G., Higgins, G. E., & Banfield, J. (2014). Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy. Computers in Human Behavior, 34, 165-172.
7. Dove, M. (2018). The voices of scam victims: A psychological model of the experience of fraud. Chapter from Predicting Individual Differences in Vulnerability to Fraud (Doctoral dissertation, University of Portsmouth).
8. Felson, M., & Clarke, R. V. (1998). Opportunity makes the thief. Police research series, paper, 98(1-36), 10.
9. Glickman, H., 2005. The Nigerian “419” advance fee scams: prank or peril?. Canadian Journal of African Studies/La Revue canadienne des études africaines, 39(3), pp.460- 489.
10. George, K. (2022). 9 Common Types of fraud. Retrieved from https://www.ramseysolutions.com/insurance/types-of-fraud (Jan 19, 2022)
11. Holtfreter, K., Reisig, M. D., & Pratt, T. C. (2008). Low self‐control, routine activities, and fraud victimization. Criminology, 46(1), 189-220.
12. Kass, G. V. (1980). An exploratory technique for investigating large quantities of categorical data. Journal of the Royal Statistical Society: Series C (Applied Statistics), 29(2), 119-127.
13. Kabir, S. M. S. (2016). Basic guidelines for research: An introductory approach for all disciplines. Book Zone Publication.
14. Luhmann, N., (2000). Familiarity, confidence, trust: Problems and alternatives. Trust: Making and breaking cooperative relations, 6, p.94-107.
15. Langenderfer, J. and Shimp, T.A. (2001). Consumer vulnerability to scams, swindles, and fraud: A new theory of visceral influences on persuasion. Psychology & Marketing, 18(7), p.763-783.
16. Misztal, B., (2013). Trust in modern societies: The search for the bases of social order. John Wiley & Sons.
17. Mesch, G. S., & Dodel, M. (2018). Low self-control, information disclosure, and the risk of online fraud. American Behavioral Scientist, 62(10), 1356-1371.
18. Marshall Chen, Loseway Lu, Paul Pajares, Fyodor Yarochkin (2021). Analyzing Email Services Abused for Business Email Compromise. [https://www.trendmicro.com/en_us/research/21/j/analyzing-email-services-abused-for-business-email-compromise.html]
19. Office of Fair Trading. (2006). Research on impact of mass marketed scams. Author, London.
20. Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of research in crime and delinquency, 47(3), 267-296.
21. Rex, J. H., Turnbull, J. E., Allen, S. J., Voorde, K. V., & Luther, K. (2000). Systematic root cause analysis of adverse drug events in a tertiary referral hospital. The Joint Commission journal on quality improvement, 26(10), 563-575.
22. Schreck, C. J. (1999). Criminal victimization and low self-control: An extension and test of a general theory of crime. Justice Quarterly, 16(3), 633-654.
23. Smith, R. G. (2010). Identity theft and fraud. Handbook of internet crime, 273-301.
24. Stajano, F., & Wilson, P. (2011). Understanding scam victims: seven principles for systems security. Communications of the ACM, 54(3), 70-75.
25. Shariati, A., & Guerette, R. T. (2017). Situational crime prevention. In Preventing crime and violence (p. 261-268). Springer, Cham.
26. Titus, R. M., & Gover, A. R. (2001). Personal fraud: The victims and the scams. Crime prevention studies, 12, 133-152.
27. The Mobile Bank. (2020). Retrieved from https://n26.com/en-eu/blog/what-is-an-atm-skimmer (Sep 09, 2020)
28. Van Wilsem, J. (2013). ‘Bought it, but never got it’assessing risk factors for online consumer fraud victimization. European sociological review, 29(2), 168-178.
29. Whitty, M. T. (2018). Do you love me? Psychological characteristics of romance scam victims. Cyberpsychology, behavior, and social networking, 21(2), 105-109.
30. Whitty, M. T., & Buchanan, T. (2016). The online dating romance scam: the psychological impact on victims – both financial and non-financial. Criminology & Criminal Justice, 16(2), 176–194.
31. Yona, N. F. (2015). Atm fraud and its impacts to financial institutions: The case of NMB and CRDB banks in Arusha (Doctoral dissertation, Mzumbe University).
32. Zuckoff, M. (2005). Annals of crime: The perfect mark. The New Yorker, 82(13), 36-42.
33. 張平吾. (1996). 被害者學. 中央警察大學出版社。
34. 蔡德輝, & 楊士隆. (2009). 犯罪學. 五南圖書出版股份有限公司。
35. 江志慶(2005),ATM 轉帳詐欺犯罪的實證研究,桃園:中央警察大學犯罪防治研究所論文。
36. 羅時強. (2005). 性侵害成因之 [生活方式/暴露被害] 理論之驗證初探。
37. 許國敏、莊秀文及莊淑婷(2006)。病人安全管理與風險管理實務引導。臺北市:華杏出版股份有限公司。
38. 紀佳芬. (2017). 營造業感電重大職災之危害情境路徑圖. 工業安全衛生, (331), 17-43.
39. 中華民國內政部警政署 全球資訊網 警政統計通報https://www.npa.gov.tw/ch/app/data/list?module=wg057&id=2218
40. 美國聯邦調查局https://www.fbi.gov/scams-and-safety
41. TWNIC財團法人台灣網路資訊中心 (2020) https://www.twnic.tw/doc/twrp/202012e.pdf
42. 陳玉書, 簡鳳容, 呂豐足, & 劉士誠. (2020). 網路犯罪被害: 人口特性與情境機會的影響. 刑事政策與犯罪研究論文集, 113-148.
43. 福建高等檢察署金門檢察分署,常見詐騙型態及手法 (Aug 16, 2021) https://www.kmh.moj.gov.tw/292027/292029/292041/313737/post
44. 內政部警政署刑事警察局,猜猜我是誰 (Dec 15,2020) https://cib.npa.gov.tw/ch/app/data/view?module=wg116&id=1909&serno=6bb1f2f3-8e90-4fde-bf55-e47a561b6d44
45. 張國威. (2020). 小心!港仙股騙局 台人投資血本無歸. 網域連結https://ctee.com.tw/news/stocks/225056.html (Feb 24, 2020)

無法下載圖示 全文公開日期 2025/07/05 (校內網路)
全文公開日期 2120/07/05 (校外網路)
全文公開日期 2120/07/05 (國家圖書館:臺灣博碩士論文系統)
QR CODE