簡易檢索 / 詳目顯示

研究生: Argo Hadi Kusumo
Argo - Hadi Kusumo
論文名稱: 臺灣、中國與印尼的詐騙模式分析
Pattern Analysis of Fraud Case In Taiwan, China and Indonesia
指導教授: 紀佳芬
Chia-Fen Chi
口試委員: 江行全
Bernard C Jiang
林瑞豐
Jui-Feng Lin
學位類別: 碩士
Master
系所名稱: 管理學院 - 工業管理系
Department of Industrial Management
論文出版年: 2014
畢業學年度: 102
語文別: 英文
論文頁數: 127
中文關鍵詞: 編碼方案流程圖圖形圖標
外文關鍵詞: coding scheme, flow diagram, graphical icon
相關次數: 點閱:234下載:7
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 目前的研究分析,台灣,中國,印尼發生了125成功的詐騙案件2008至2012年出版的英文在線報紙。本病例報告是通過搜索在線報紙與術語“欺詐”和“騙局”獲得的。每個案例報告必須包括有關騙局的類型,騙子如何與受害人進行信息交換,以及如何騙徒取得未經授權的經濟利益,並判斷有關的其他附加信息。當關鍵信息是不能提供英文,作者將刊載於中國或印尼文報紙搜索相同的信息。傳統的欺詐行為,如貪污,保險詐騙,投資詐騙,魔術/特種電源的能力,以及交易被排除在目前的分析。一種編碼方案制定到每個欺詐信息的媒體,騙局類型(抽獎和頒獎,預收費,慈善事業,幫助他人,恐嚇/勒索,浪漫/關係,就業,不易察覺) ,和金錢傳媒方面進行分類。信息傳媒分為面對面,電話,互聯網,笊籬在ATM或POS機,以及雜誌/報紙,而媒體的錢被歸類為現金,支票,信用卡/借記卡,預付費卡的錢,電匯,網上支付服務,銀行賬戶的借方,產品和網上購物。比較分析了三個國家之間進行揭示的文化背景上的信息媒體,騙局類型和金錢的媒體使用的騙子引誘受害者的效果。一系列流程圖的是基於信息的媒體和媒體的錢建造,說明騙子如何與受害人進行信息交換和騙子如何獲取未經授權的經濟利益。類似的預防電擊傷的,每個流程圖都可以直接與可行的預防策略通過削減信息或資金流動聯繫在一起的。以提高在防止欺詐的通信有效性,圖形圖標被納入流程圖來說明該流程圖中的圖形方式。


    The current study analyzed 125 successful fraud cases happened in Taiwan, China, and Indonesia from 2008 to 2012 published in the English online newspapers. The case reports were obtained by searching the online newspapers with the terms “fraud” and “scam”. Each of the case report must include information about scam type, how the fraudsters exchange information with the victims, and how the fraudsters obtain unauthorized financial benefit, and other additional information which is judged to be relevant. When critical information was not available in English, the authors would search the same information from newspapers published in Chinese or Indonesian language. Traditional frauds such as corruption, insurance scam, investment scam, magic/special power ability, and trading were excluded from the current analysis. A coding scheme is developed to classify each fraud in terms of information media, scam type (lottery and award, advance fee, charity, helping others, intimidation/extortion, romance/relationship, job, unnoticeable), and money media. Information media were classified into face to face, telephone, internet, skimmer in ATM or POS machine, and magazine/newspaper while money media was categorized into cash, check, credit/debit card, prepaid money card, wire transfer, online payment service, bank account debit, product, and online shopping. A comparison analysis was made between three countries to reveal the effect of cultural background on information media, scam type and money media used by the fraudsters to lure their victims. A series of flow diagrams was constructed based on the information media and money media to illustrate how the fraudsters exchange information with the victims and how the fraudsters obtain unauthorized financial benefit. Similar to the prevention of electrical injury, each of the flow diagrams can be directly linked with feasible prevention strategies by cutting the flow of information or money. To improve effectiveness in communication of fraud prevention, graphical icons were incorporated into the flow diagrams to illustrate the flow diagrams in a graphical manner.

    TABLE OF CONTENTS ABSTRACT ACKNOWLEDGMENT TABLE OF CONTENTS LIST OF FIGURES LIST OF TABLES CHAPTER 1 INTRODUCTION 1.1 Research Background 1.2 Research Objective 1.3 Research Scope and Constrain 1.4 Research Frame Work CHAPTER 2 LITERATURE REVIEW 2.1 Overview of Fraud 2.2 Online Newspaper 2.3 Classification Scheme 2.3.1 Victim’s Age 2.3.2 Type of Scam and Bait 2.3.3 Information Media 2.3.4 Money Media 2.4 Crosstabs Analysis 2.5 Flow Diagram 2.6 Prevention CHAPTER 3 RESEARCH METHODOLOGY 3.1 Coding Schemes 3.2 Collecting the Case 3.3 Developing the Database 3.4 Analyzing Database with Crosstabs Analysis 3.5 Constructing Flow Diagram CHAPTER 4 RESULT AND DISCUSSION 4.1 Pattern Result 4.2 Flow Diagram Result and Prevention 4.2.1 Charity Fraud 4.2.2 Job Scam 4.2.3 Other Scam 4.2.4 Romance Scam 4.2.5 Scam type in one case (Romance scam– Lottery/award or intimidation) 4.2.6 Unnoticeable Scam 4.2.7 Intimidation Scam 4.2.8 Advance Fee Fraud/Lottery/Award Fraud 4.3 Phi Analysis 4.4 Fraud and Globalization CHAPTER 5 CONCLUSION REFFERENCES APPENDIX A Total Case Data in Taiwan, China, Taiwan

    1. Akinladejo, Olubusola H. (2007). Advance fee fraud: trends and issues in the Caribbean. Journal of Financial Crime, 14(3), 320-339.
    2. Archbold, Carol A, Lytle, Daniel, Weatherall, Corneshia, Romero, Ann, & Baumann, Catherine. (2006). Lawsuits involving the police: a content analysis of newspaper accounts. Policing: An International Journal of Police Strategies & Management, 29(4), 625-642.
    3. Baker, C Richard. (1999). An analysis of fraud on the Internet. Internet Research, 9(5), 348-360.
    4. Bounie, David, & Francois, Abel. (2006). Cash, check or bank card? The effects of transaction characteristics on the use of payment instruments. Telecom Paris Economics and Social Sciences Working Paper No. ESS-06-05.
    5. Broadhurst, Roderic. (2006). Developments in the global law enforcement of cyber-crime. Policing: An International Journal of Police Strategies & Management, 29(3), 408-433.
    6. Button, Mark, Lewis, Chris, & Tapley, Jacki. (2009). Fraud typologies and the victims of fraud literature review.
    7. Chantal duPlessis, Renee. (2003). A Convergence of Modes: Present Status of Online News Sites. A Content Analysis of 100 Online Newspaper Web Sites.
    8. Chi, Chia-Fen, Lin, Yuan-Yuan, & Ikhwan, Mohamad. (2012). Flow diagram analysis of electrical fatalities in construction industry. Safety Science, 50(5), 1205-1214.
    9. Chi, Chia-Fen, Yang, Chong-Cheng, & Chen, Zheng-Lun. (2009). In-depth accident analysis of electrical fatalities in the construction industry. International Journal of Industrial Ergonomics, 39(4), 635-644.
    10. Felten, Edward W, Balfanz, Dirk, Dean, Drew, & Wallach, Dan S. (1997). Web spoofing: An internet con game. Software World, 28(2), 6-8.
    11. Fraud, Insurance. (2000). Insurance fraud.
    12. Goett, Jen. (2012). Measuring the Presence of Money Mule Recruitment in Online Job Boards.
    13. Guo, Haitao, & Yang, Xianhui. (2007). A simple reliability block diagram method for safety integrity verification. Reliability Engineering & System Safety, 92(9), 1267-1273.
    14. IBM. (2011). IBM SPSS Statistics Base 20.
    15. Joshi, Mayur. (2006). Black Cards Forensics: Riskpro Management Consulti.
    16. Julisch, K. (2010). Risk-Based Payment Fraud Detection. Computer Science.
    17. Kerr, Jane, Owen, Rachael, Nicholls, Carol McNaughton, & Button, Mark. (2013). Research on Sentencing Online Fraud Offences: Retrieved September.
    18. Kunz, Michael, & Wilson, Patrick. (2004). Computer Crime and Computer Fraud. University of Maryland, Department of Criminology and Criminal Justice.
    19. Laleh, Naeimeh, & Azgomi, Mohammad Abdollahi. (2009). A taxonomy of frauds and fraud detection techniques Information Systems, Technology and Management (pp. 256-267): Springer.
    20. Long, Byron, & Baecker, Ronald. (1997). A Taxonomy of Internet Communication Tools. Paper presented at the WebNet.
    21. Markey, Patrick M, & Wells, Shannon M. (2002). Interpersonal perception in internet chat rooms. Journal of Research in Personality, 36(2), 134-146.
    22. Mehta, Cyrus R, Patel, Nitin, & Senchaudhuri, Pralay. (1992). Exact stratified linear rank tests for ordered categorical and binary data. Journal of Computational and Graphical Statistics, 1(1), 21-40.
    23. Mintz, Anne P. (2002). Web of deception: misinformation on the Internet: Information Today, Inc.
    24. Nardi, Bonnie A, & Whittaker, Steve. (2002). The place of face-to-face communication in distributed work. Distributed work, 83-110.
    25. O'Hara, Kieron, & Shadbolt, Nigel. (2008). The spy in the coffee machine: the end of privacy as we know it.
    26. Onyebadi, Uche, & Park, Jiwoo. (2012). ‘I’m Sister Maria. Please help me’: A lexical study of 4-1-9 international advance fee fraud email communications. International Communication Gazette, 74(2), 181-199.
    27. Panurach, Patiwat. (1996). Money in electronic commerce: digital cash, electronic fund transfer, and Ecash. Communications of the ACM, 39(6), 45-50.
    28. Poria, Yaniv, & Oppewal, Harmen. (2003). A new medium for data collection: online news discussions. International Journal of Contemporary Hospitality Management, 15(4), 232-236.
    29. Rege, Aunshul. (2009). What's love got to do with it? Exploring online dating scams and identity fraud. International Journal of Cyber Criminology, 3(2), 494-512.
    30. Ross, Stuart, & Smith, Russell G. (2011). Trends & issues in Crime and Criminal Justice. Australian Institute of Criminology.
    31. Schiefer, Gunther, & Decker, Michael. (2008). Taxonomy for Mobile Terminals. ICE-B 2008, 255.
    32. Singleton, Tommie W, & Singleton, Aaron J. (2010). Fraud Principles. Fraud Auditing and Forensic Accounting, Fourth Edition, 39-69.
    33. Smith, R, & Urbas, Gregor. (2001). Controlling fraud on the internet: A CAPA perspective. Canberra: Ausrtralian Institute of Criminology Research and Public Policy Series(39).
    34. Stabek, Amber, Brown, Simon, & Watters, Paul A. (2009). The Case for a Consistent Cyberscam Classification Framework (CCCF). Paper presented at the Ubiquitous, Autonomic and Trusted Computing, 2009. UIC-ATC'09. Symposia and Workshops on.
    35. Stabek, Amber, Watters, Paul, & Layton, Robert. (2010). The seven scam types: mapping the terrain of cybercrime. Paper presented at the Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second.
    36. Stajano, Frank, & Wilson, Paul. (2011). Understanding scam victims: seven principles for systems security. Communications of the ACM, 54(3), 70-75.
    37. Tierney, Karen J, CFE, CPA, & CVA, CIA. (2003). Fraudbasics: Con Schemes Abound, Part One. White Paper, 17(1), 35-38.
    38. Tuovinen, Lauri, Roning, J, Tuovinen, L, & Roning, J. (2007). Baits and beatings: vigilante justice in virtual communities. Paper presented at the Proceedings of CEPE 2007. The 7th International Conference of Computer Ethics: Philosophical Enquiry}.
    39. Turetken, Ozgur, & Schuff, David. (2007). The impact of context-aware fisheye models on understanding business processes: an empirical study of data flow diagrams. Information & management, 44(1), 40-52.
    40. Utakrit, Nattakant. (2007). The phantasm of ATM withdrawal.
    41. Wang, Jau-Hwang, Liao, You-Lu, Tsai, Tyan-muh, & Hung, Garfield. (2006). Technology-based financial frauds in Taiwan: issues and approaches. Paper presented at the Systems, Man and Cybernetics, 2006. SMC'06. IEEE International Conference on.
    42. Weber, Bryan A, Yarandi, Hossein, Rowe, Meredeth A, & Weber, Justus P. (2005). A comparison study: paper-based versus web-based data collection and management. Applied Nursing Research, 18(3), 182-185.
    43. Weber, Paull C, Schaper, Michael T, Teo, Stephen, & Geneste, Louis. (2011). Small business scams: a preliminary overview and investigation.
    44. A Garda Siochana - Ireland's National Police Service. (n.d.). Crime Prevention Advice - ATM (Cash Machine) Fraud. Retrieved September 29, 2007, from
    45. Bureau of Justice Assistance, IC3.2012.Internet Crime Report. Internet Crime Complaint Center
    46. Bureau of Justice Assistance, IC3.2011.Internet Crime Report. Internet Crime Complaint Center
    47. Bureau of Justice Assistance, IC3.2010.Internet Crime Report. Internet Crime Complaint Center
    48. Bureau of Justice Assistance, IC3.2009.Internet Crime Report. Internet Crime Complaint Center
    49. Bureau of Justice Assistance, IC3.2008.Internet Crime Report. Internet Crime Complaint Center
    50. Diebold Launches First-of-Its-Kind, Consumer ATM Security Web Site. (2005). PR Newswire, 1.
    51. Mikkelson, B. (2006). Lebanese Loop. Retrieved October 3, 2007, from
    52. North East Fraud Forum. (n.d.). ATM Advice - How to protect your card details. Retrieved October 4, 2007, from http://www.northeastfraudforum.co.uk/atmfraud.asp
    53. Pentagon Federal Credit Union. (2007). Preventing Fraud: Automated Teller Machine (ATM) Fraud Protection Retrieved October 7, 2007, from https://www.penfed.org/productsAndRates/resourceCenter/preventingFraud/atmFraud.asp
    54. Richard, C. (n.d.). Guard Your Card: ATM Grows More Sophisticated. Retrieved October 4, 2007, from http://www.csmonitor.com/2003/0721/p15s01-wmcn.html
    55. FBI.2012. The Grand Parent Scam. Retrieved January 15, 2014, from http://www.fbi.gov/news/stories/2012/april/grandparent_040212
    56. Slade, Robin. 2012. Devastating Sweepstakes Scams Targeting Seniors. Retrieved January 15, 2014, from http://fraudavengers.org/2012/07/devastating-sweepstakes-scams-targeting-seniors

    QR CODE