跳到主要內容

臺灣博碩士論文加值系統

(44.200.194.255) 您好!臺灣時間:2024/07/23 15:03
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:張恆睿
論文名稱:應用社會網路分析於犯罪網路模型之研究
論文名稱(外文):The study of crime network model with social network analysis
指導教授:張明桑張明桑引用關係
學位類別:碩士
校院名稱:中央警察大學
系所名稱:資訊管理研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:中文
相關次數:
  • 被引用被引用:2
  • 點閱點閱:906
  • 評分評分:
  • 下載下載:3
  • 收藏至我的研究室書目清單書目收藏:1
隨著時代的演變,犯罪的性態不斷的推陳出新,從個別性犯罪到組織性犯罪型態的改變,組織性犯罪活動的威脅與其所造成的嚴重經濟混亂,至今沒有任何一個國家可以自外於這個日趨嚴重的問題,尤其自從美國911事件以來,各國安全部門及單位就開始重視組織犯罪的問題,諸如毒品侵害、持械搶劫、綁架甚至恐怖活動等,均具犯罪組織特性,常常牽涉到很多犯罪者,這些犯罪者可以把他們視為一個網路,在網路中他們互相影響,並且扮演不同的角色。因此我們欲以社會網絡的分析應用於犯罪網路模型研究,並提出以下三種演算法來解決問題:
第一、找尋犯罪網路模型中最佳的偵查路徑及其替代機制,即針對犯罪組織找出特定兩成員間之最強關聯路徑,並搜尋其他關聯路徑,以防止採取實際偵查行動時,當最強關聯路徑有失敗的情況下,能適時的利用適當的替代路徑,來輔助偵查行動。
第二、若犯罪網路規模過於龐大,將需要花費許多時間來搜尋關聯路徑,除此之外找尋出的眾多的關聯路徑將使得偵查人員疲於奔命,因此欲將犯罪網路模型維持在一個可控制及容易管理的範圍。我們依社會網絡分析的六度分割理論及替代路徑的繞徑距離來控制網路模型規模,目的在於剔除關聯性微小的節點及連結,以減少計算偵查路徑及替代路徑的時間複雜度。
第三、要瓦解犯罪組織,就必須找出組織中的重要成員,因此如何找尋這些路徑中關鍵性的節點便為重要的課題。我們依社會網絡分析的中心性指標,即接近中心性( closeness centrality )及中介中心性( betweenness centrality ),來定義何謂關鍵節點,並透過路徑搜尋方式來找尋犯罪網路中的關鍵節點,亦即犯罪組織中重要成員。

透過上述這些分析方式與技巧提供潛在及有利的證據來進一步勾勒出犯罪組織集群關係性質的分析。
[1] 李湧清、陳明傳編,警察百科全書(七)刑事警察,中央警察大學,民國88年。
[2] 傅士哲、謝良瑜,六個人的小世界,大塊文化,民國93年。
[3] A. Kontostathis, and W. M. Pottenger. “A this approach may have an important application in framework for understanding LSI performance.”, Information Processing & Management, 2006, 42(1), pp. 56-73.
[4] Aldrich H and Whetten D.A., “Organisation-Sets, Action-Sets, and Networks: Making the Most of Simplicity”, in Nystrom and Starbuck.(Eds)(1981) Handbook of Organisational Design: Adapting Organisations to Environments. London: Oxford Press.
[5] Bauman,Z., ”Sociological Enlightenment-For Whom,About What?” Theory,Culture & Society, Vol.17(2), 2000.
[6] Burt, R.S., “Toward A Structural Theory of Action,”, New York: Academic Press, 1986.
[7] Boissevain J., “Friends of Friends: Networks, Manipulators and Coalitions,” Oxford: Blackwell, 1974.
[8] Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., Chau, M., “Crime data mining: A general framework and some examples,” Computer, 2004, 37(4), 50-56.
[9] Cheswick, B., Burch, H. and Branigan, S., “Mapping and Visualizing the Internet,” Proceedings of the 2000USENIX Annual Technical Conference, 2000, 18-23.
[10] Coles Nigel, “It’s not What You Know—It’s Who You Know That Counts: Analysing Serious Crime Groups as Social Networks,” British Journal Criminal, 2001, 41: 580-594.
[11] Davis, R.H., “Social network analysis: An aid in conspiracy investigations,” FBI Law Enforcement Bulletin, 1981, 11-19.
[12] E. Dijkstra, ” A note on two problems in connection with graphs,” Numerische Mathematik, 1959, 1, 269– 271.
[13] F. Araujo, B. Ribeiro, L. Rodrigues, A neural network for shortest path computation, IEEE Transactions on Neural Networks 12 (5) (2001) 1067–1073.
[14] Freeman, L., “Centrality in Social Networks Conceptual Clarification,” Soc. Net., 1979, 1, 215-239.
[15] H.G. Goldberg, T.E. Senator, “Restructuring databases for knowledge discovery by consolidation and link formation,” Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis, AAAI Press, Menlo Park, CA, 1998.
[16] Jackson J.L, Herbrinck J.C and Jansen R., “Examining Criminal Organisations: Possible Methodologies,” Transnational Organised Crime,1996, 2/4: 83-105.
[17] Jennifer J. Xu and Hsinchun Chen, “Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks,” 2004.
[18] Krebs, V., “Mapping network of terrorist cells,” Connections, 2002, 24, 45-52.
[19] M. Ali, F. Kamoun, Neural networks for shortest path computation and routing in computer networks, IEEE Transactions on Neural Networks, 1993, 4 (5), 941– 953.
[20] Mena, J., “Investigative Data Mining for Security and Criminal Detection,” U.S.: Butterworth Heinemann, 2003.
[21] McAndrew D., “The Structural Analysis of Criminal Networks,” in Canter D and Alison L. (Eds) The Social Psychology of Crime: Groups, Teams and Networks. 52-92, Aldershot: Ashgate, 1999.
[22] Milgram, S., “The small world problem,” Psychology Today, 1967, 2, 60-67.
[23] M.K. Sparrow, “The application of network analysis to criminal intelligence: an assessment of the prospects,” Social Networks, 1991, 13 251– 274.
[24] Pool, I. De Sola, and Kochen, M., “Contacts and influence, Social network,” 1978,1(1), 1-51.
[25] R.V. Hauck, H. Atabakhsh, P. Ongvasith, H. Gupta, H. Chen, “Using coplink to analyze criminal-justice data,” IEEE Computer 35 (3) , 2002, 30– 37.
[26] Sageman, S., Faust, K., “Social Network Analysis,” Cambridge University Press, 1994.
[27] S. Wasserman, K. Faust, “Social Network Analysis: Methods and Applications,” Cambridge Univ. Press, 1994, Cambridge.
[28] Schnabel, W., Lohse, D., “Grundlagen der Strassen-Verkehrestechnik under Verkehrsplanung,”1997.
[29] Scott J M., "Organized Crime: A Social Network Approach,” Crime, Law and Social Change, 2000, 32, 301-323.
[30] Sparrow M., “The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects,” Social Network, 1991,13:251-274.
[31] T. Asano, D. Kirkpatrick, C. Yap, “Pseudo approximation algorithms, with applications to optimal motion planning,” Proceedings of the Eighteenth Annual Symposium on Computational Geometry (Barcelona, Spain), 2002, pp. 170–178.
[32] Travers, J., and Milgram, S., “An experimental study of the small world problem,” Sociometry, 1969,32(4), 425-442.
[33] Valdis E. Krebs, “Mapping Networks of Terrorist Cells”, 2002.
[34] Wasserman, S. and Galaskiewicz, J., “Advances in Social Network Analysis.”, Sage Publications, Thousand Oaks CA, 1994.
[35] W.F. Coady, “Automated link analysis: articficial intelligence-based tool for investigators,” Police Chief, 1985, 52(9), 22-23.
[36] W.R. Harper, D.H. Harris, “The application of link analysis to police intelligence,” Human Factors, 1975, 17(2), 157-164.
電子全文 電子全文(本篇電子全文限研究生所屬學校校內系統及IP範圍內開放)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top