簡易檢索 / 詳目顯示

研究生: 安莉莎
Aliza - Ardana
論文名稱: 台灣與印尼之詐騙案件:如何騙取受害者
Fraud Cases in Taiwan & Indonesia: How to Get the Victim
指導教授: 紀佳芬
Chia-Fen Chi
口試委員: 江行全
Jiang, Bernard C
林瑞豐
Lin, Ray F
學位類別: 碩士
Master
系所名稱: 管理學院 - 工業管理系
Department of Industrial Management
論文出版年: 2015
畢業學年度: 103
語文別: 英文
論文頁數: 82
中文關鍵詞: 跨境犯罪組織犯罪服務藍圖
外文關鍵詞: Cross-border crime, Organized crime, Service Blueprint
相關次數: 點閱:193下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

註冊舞弊審查師協會(ACFE)定義詐騙為行騙者蓄意的利用詭計、欺騙或其他不正當手段剝奪他人財產或金錢。金融詐騙案件為行騙者試圖得到受害者的信任,並且最終拿到數額的錢。近年來,金融詐騙案件在台灣的數量急劇增加,由1997年的2,817件至2005年的43,342件,這意味著這8年內的金融詐騙案件增加了15倍 (Wang, et al., 2006) 。因此,目前的研究使用服務藍圖來描述詐騙系統化的過程,其說明人、產品和流程之間的關係。該方法描述行騙者及其行騙過程,藉由受害者在台面/可視與台下/非可視下的回應。目前的研究將著重於行騙者交付其行騙受害者的物證,並說明服務藍圖其每一步的詐騙。總體而言,目前的研究分析於2008年至2014年之間在台灣和印尼所發生的50起詐騙案件。本研究目的為在受害者遭受任何財務損失之前,盡可能找出預防措施。


The Association of Certified Fraud Examiners defines fraud as any intentional or deliberate act to deprive another of property or money by guile, deception, or other unfair means. Financial frauds cases start by fraudster(s) try to attain victim’s trust and end by victim loss a certain amount of their money. In recent years, the number of financial frauds in Taiwan increased dramatically, from 2,817 in 1997 to 43,342 in 2005, which means a 15 fold increase in 8 years (Wang, et al., 2006). Thus, the current study proposed to describe the fraud process systematically using blue print to illustrate the relationship between human, product and process as in a service activity. The approach started out by describing the onstage/visible and offstage/non visible actions initiated by the fraudster and their supporting process followed by responses from the victims. The current study would highlight the physical evidences delivered by the fraudsters and received by victims and illustrated by a blueprint to show every step of a fraud activity. Overall, the current study analyzed 50 of fraud cases happened in Taiwan and Indonesia between 2008 and 2014. The purpose is to show possible stopping points and prevention measures before the victim had suffered any financial loss.

Cover i 摘要 i ABSTRACT ii ACKNOWLEDGEMENTS iii CONTENT v LIST OF FIGURE vii LIST OF TABLE viii 1. CHAPTER 1 INTRODUCTION 1 1.1 Research Background and Motivation 1 1.1.1 Importance and Statistics of Fraud Crime 1 1.1.2 Fraud as a crime 4 1.2 Research Objectives 5 1.3 Research Scope & Limitation 5 1.4 Research Framework 6 2. CHAPTER 2 LITERATURE REVIEW 8 2.1 Fraud: Organized crime 8 2.2 Method of the other research 11 2.3 Blueprint of service process 11 2.4 Classification of fraud 15 3. CHAPTER 3 RESEARCH METHODOLOGY 17 3.1 Collecting the Cases 17 3.2 Building of Fraud Scenario 17 3.2.1 The processes of fraud and other crimes for gain (Levi, 2008) 18 3.2.2 Service Blueprint 21 3.3 Framework Diagram 22 4. CHAPTER 4 RESULT AND DISCUSSION 25 4.1 Classification of Fraud 25 4.2 The Process of Fraud 27 4.3 Blueprint Model of Frauds 49 4.3.1 Advance fee 51 4.3.2 Job 55 4.3.3 Charity 55 4.3.4 Romance/Relationship 58 4.3.5 Intimidation/extortion 60 4.3.6 Unnoticeable 66 4.4 Prevention of Fraud 67 5. CHAPTER 5 CONCLUSION 69 REFERENCES 70

Action fraud. (2011). Identity fraud and identity theft. National Fraud & Cyber crime Reporting Centre. [online accessed: April 22, 2015]. URL: http://www.actionfraud.police.uk/fraud_protection/identity_fraud
Albrecht, W., Albrecht, C., Albrecht, C., & Zimbelman, M. (2008). Fraud examination: Cengage Learning.
Bitner, M. J., Ostrom, A. L., & Morgan, F. N. (2008). Service blueprinting: A practical technique for service innovation. California management review, 50(3), 66.
Dolan, K. M. (2004). Internet auction fraud: the silent victims. Journal of Economic Crime Management, 2(1), 1-22.
Fließ, S., & Kleinaltenkamp, M. (2004). Blueprinting the service company: Managing service processes efficiently. Journal of Business Research, 57(4), 392-404.
Geum, Y., & Park, Y. (2011). Designing the sustainable product-service integration: a product-service blueprint approach. Journal of Cleaner Production, 19(14), 1601-1614.
Ghosh, M., & Systems, C. (2010). Telecoms Fraud. Computer Fraud and Security.
Graycar, A. (2000). Fraud prevention and control in Australia. Paper presented at the Fraud Prevention and Control Conference.
Holtfreter, K., Reisig, M. D., & Pratt, T. C. (2008). LOW SELF-CONTROL, ROUTINE ACTIVITIES, AND FRAUD VICTIMIZATION*. Criminology, 46(1), 189-220. doi: 10.1111/j.1745-9125.2008.00101.x
Kunz, M., & Wilson, P. (2004). Computer crime and computer fraud. Professional Master Degree Thesis. Department of Criminology and Criminal Justice in University of Maryland.
Lee, C.-H., Wang, Y.-H., & Trappey, A. J. C. (2014). Service design for intelligent parking based on theory of inventive problem solving and service blueprint. Advanced Engineering Informatics. doi: 10.1016/j.aei.2014.10.002
Levi, M. (2008). Organized fraud and organizing frauds: Unpacking research on networks and organization. Criminology and Criminal Justice, 8(4), 389-419. doi: 10.1177/1748895808096470
Li, S.-H., Yen, D. C., Lu, W.-H., & Wang, C. (2012). Identifying the signs of fraudulent accounts using data mining techniques. Computers in Human Behavior, 28(3), 1002-1013. doi: 10.1016/j.chb.2012.01.002
Morselli, C. (2005). Contacts, opportunities, and criminal enterprise: University of Toronto Press.
Oriola, T. A. (2005). Advance fee fraud on the Internet: Nigeria's regulatory response. Computer Law & Security Review, 21(3), 237-248. doi: 10.1016/j.clsr.2005.02.006
Patricio, L., Fisk, R. P., Falcao e Cunha, J., & Constantine, L. (2011). Multilevel Service Design: From Customer Value Constellation to Service Experience Blueprinting. Journal of Service Research, 14(2), 180-200. doi: 10.1177/1094670511401901
Seppelt, R., Fath, B., Burkhard, B., Fisher, J. L., Grêt-Regamey, A., Lautenbach, S., . . . Verburg, P. H. (2012). Form follows function? Proposing a blueprint for ecosystem service assessments based on reviews and case studies. Ecological Indicators, 21, 145-154.
Singleton, T. W., & Singleton, A. J. (2010). Fraud auditing and forensic accounting (Vol. 11): John Wiley & Sons.
Stabek, A., Brown, S., & Watters, P. A. (2009). The case for a consistent cyberscam classification framework (CCCF). Paper presented at the Ubiquitous, Autonomic and Trusted Computing, 2009. UIC-ATC'09. Symposia and Workshops on.
Stajano, F., & Wilson, P. (2011). Understanding scam victims: seven principles for systems security. Communications of the ACM, 54(3), 70-75.
Tade, O., & Aliyu, I. (2011). Social Org of Internet Fraud among University Undergraduates in Nigeria. International Journal of Cyber Criminology (IJCC), 2(2), 860-875.
Titus, M. R., & Gover, A. R. (2001). Personal Fraud: The Victims and The Scams. Crime Prevention Studies, 12, 133-151.
Wolfe, D. T., & Hermanson, D. R. (2004). The fraud diamond: Considering the four elements of fraud.

QR CODE