(3.230.143.40) 您好!臺灣時間:2021/04/21 07:54
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:陳育騏
研究生(外文):Yu-Chi Chen
論文名稱:結合社會網絡分析與資料探勘技術應用於網路拍賣詐欺偵測之研究
論文名稱(外文):Combining Social Network Analysis and Data Mining Techniques for Internet Auction Fraud Detection
指導教授:邱昭彰邱昭彰引用關係
指導教授(外文):Chao-Chang Chiu
學位類別:碩士
校院名稱:元智大學
系所名稱:資訊管理學系
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:中文
論文頁數:45
中文關鍵詞:網路拍賣網路拍賣詐欺社會網絡分析
外文關鍵詞:Internet auctionInternet auction fraudSocial network analysis
相關次數:
  • 被引用被引用:6
  • 點閱點閱:733
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:7
網路拍賣是少數幾個能透過網際網路成功經營的商業模式。由於網路拍賣的本質,如高度匿名性、寬鬆的交易限制、很低的進入或離開成本等,使得欲詐欺者有利可圖,並在網路拍賣活動中設下騙局以進行詐欺行為。不可否認地,在買賣雙方資訊不對稱及缺乏直接讓買方驗證商品真偽的情況下,在交易完成之前,買方無法確認賣方真偽及其所賣的商品特性,這使得買方很容易成為網路拍賣詐欺的被害者。因此,為了使買賣雙方進行交易前可先行簡單過濾潛在詐欺者,以促進網路拍賣交易安全及正常化,提供網路拍賣平台業者與相關政府單位作進一步網路拍賣詐欺防治或偵查參考。本研究從拍賣網站公布之黑名單及相關訊息中蒐集帳號交易資料,透過社會網絡分析先行由所有交易帳號中過濾出異常交易帳號群組,進而再利用資料探勘技術,辨別詐欺帳號之特徵與規則。最後,交易帳號可分類為正常交易、異常交易與詐欺帳號三種不同類型並探討各類型之交易行為。本研究發現,不同交易帳號類型確實有不同的特徵與規則,其中異常交易帳號存在循環交易情況,但交易次數不高,本身在評價上無不良記錄;在詐欺帳號中,與異常交易關係相同存在循環交易,當評價在短時間內累積至一定正面評價後,負面評價隨之快速攀升,且詐欺帳號較少扮演網絡中媒介的角色。
Internet auction is one of few successful new business models. Owing to the nature of Internet auction, e.g. high degree of anonymity, relaxed legal constraints, and low costs for entry and exit, etc…, fraudsters are easily to setup scams in auction activities. An undeniable fact is that because of the information asymmetry between sellers and buyers and the lacking of immediately examination of the merchandise, the buyers can’t verify the seller the merchandise until after the transaction is completed. This makes buyers become victims of network auction fraud easily.
Thus, in order to promote the safety and normality of Internet auction, to assist buyers verifying sellers, so we need to provide the Internet auction platform and government to prevent or detect Internet auction fraud. This research collected account data of blacklist and relative information proclaimed by Internet auction platform. These unusual accounts were filtered by Social Network Analysis from all accounts’ data, then we using data mining techniques to discover the attributes and patterns of fraudsters. These accounts can be categorized into three parts including usual accounts, unusual accounts and accounts of fraudster, then we discuss the behaviors of transactions of these three different categories. This research found that different kinds of accounts have different characteristics and patterns indeed. Within unusual accounts, there are circle transactions, lesser times of transactions, and no negative reputations. Within fraud accounts, there are also circle transactions, positive reputation accumulated a higher scores, negative reputation which increase suddenly, and these fraud accounts less play an intermediary roles in a transaction network.
書名頁 i
論 ii
授權書 iii
中文摘要 iv
英文摘要 v
誌謝 vi
目錄 vii
表目錄 viii
圖目錄 ix
第壹章 緒論 1
第一節 研究背景 1
第二節 研究動機與目的 2
第三節 預期效益 5
第四節 論文架構 5
第貳章 文獻探討 7
第一節 拍賣與網路拍賣 7
壹 拍賣的定義 7
貳 網路拍賣 8
參 網路拍賣流程 9
第二節 網路拍賣詐欺與相關研究 11
第三節 社會網絡分析 14
壹 何謂社會網絡 14
貳 社會網絡分析方法 15
參 重要角色 (key players) 分析 18
第參章 研究方法 20
第一節 研究設計與流程 20
第二節 實驗設計 24
第肆章 網路拍賣詐欺分析 26
第伍章 討論 34
第陸章 結論與未來發展 37
第一節 結論 37
第二節 研究限制 38
第三節 未來展望 38
1.Anderson, K.B., “Internet Auction Fraud: What Can We Learn From Consumer Sentinel Data?,” http://www.ftc.gov/be/workshops/internetauction/keithandersonslides.pdf, Data accessed: 2005/08/19.
2.Ba, S., Whinston, A.B., and Zhang, H., “Building Trust in Online Auction Markets through an Economic Incentive Mechanism,” Decision Support Systems, Vol. 35, No. 3, pp. 273-286, 2003.
3.Bierman, H.S. and Fernandez, L. Game Theory with Economic Applications, Mass: Addison-Wesley, 1998.
6.Bywell, C.E., and Oppenheim, C., “Fraud on Internet Auction,” Aslib Proceedings, Vol. 53, No. 7, pp. 265-272, 2001.
7.Chae, M., Shim, S., Cho, H., and Lee, B., “An Empirical Analysis of Fraud Detection in Online Auctions: Credit Card Phantom Transaction,” 40th Annual Hawaii International Conference on System Sciences (HICSS’07), pp. 155-164, 2007.
4.Chen, H., “Exploring Extremism and Terrorism on the Web: The Dark Web Project,” Proceedings of Pacific Asia Intelligence and Security Informatics, pp. 1-20, 2007.
5.Chen, H., Chung, W., Xu, J.J., Wang, G.., Qin, Y., and Chau, M., “Crime Data Mining: A General Framework and Some Examples,” Journal of Computer, Vol. 37, No. 4, pp. 50–56, 2004.
6.Chen, H., Petersen, T., Violette, C., Atabakhsh, H., Xu, JJ., “Coplink Center: Social Network Analysis and Identity Deception Detection for Law Enforcement and Homeland Security Intelligence and Security Informatics: A Crime Data Mining Approach to Developing Border Safe Research,” ACM International Conference Proceeding Series, Vol. 89, pp. 112-113, 2005.
7.Chua, C.E.H., and Wareham, J., “Fighting Internet Auction Fraud: An Assessment and Proposal,” Journal of Computer, Vol. 37, No. 10, pp. 31-37, 2004.
8.Freeman, L.C., “Centrality in Social Networks: Conceptual Clarification,” Social Network, Vol. 1, pp. 215-329, 1979.
9.Granovetter, M. “The Strength of weak Ties,” American Journal of Sociology, Vol. 78, No. 6, pp. 1360-1380, 1973.
10.Gregg, D.G. and Scott, J.E., “The Role of Reputation Systems in Reducing On-Line Auction Fraud,” International Journal of Electronic Commerce, Vol. 10, No. 3, pp. 95-120, 2006.
11.Haythornthwaite, C., “Social Network Analysis: An Approach and Technique for The Study of Information Exchange,” Library and Information Science Research, Vol. 18, No. 4, pp.323-342, 1996.
12.Heck, V. E., and Vervest, P., “How Should CIOs Deal with Web-Based Auction?,” Communication of the ACM, Vol. 41, No. 7, pp. 99-100, 1998.
13.Houser, D. and Wooders, J., “Reputation in Auctions: Theory, and Evidence from eBay,” Journal of Economics & Management Strategy, Vol. 15, No. 2, pp. 353-370, 2006.
14.Huisman, M. and Duijn, M.A.J.V., “Software for Social Network Analysis,” http://perso.ens-lyon.fr/eric.boix/Cat/SimulationSurvey/SoftwareComparison/SoftwareSocialNetworkAnalysisOct2003.pdf, Data accessed: 2006/07/31.
15.Jenamani, M., Zhong, Y., and Bhargave, B., “Cheating in Online Auction – Towards Explaining the Popularity of English Auction,” Electronic Commerce Research and Applications, Vol. 6, No. 1, pp. 53-62, 2007.
16.Klein, S., “Introduction to Electronic Auction,” Journal of Electronic Markets, Vol. 7, No. 4, pp. 3-6, 1997.
17.Klein, S. and O’Keefe, R.M., “The Impact of The Web on Auctions: Some Empirical Evidence and Theoretical Considerations,” International Journal of Electronic Commerence, Vol. 3, No. 3, pp. 7-20, 1999.
18.Krebs, V.E., “Mapping Networks of Terrorist Cells,” Journal of the International Network for Social Network Analysis, Vol. 24, No. 33, pp. 43-52, 2002.
19.Kauffman, R.J. and Wood, C.A., “Premium Bidding in Online Auctions: An Examination of Opportunism and Seller Preference,” http://www.mgmt.purdue.edu/academics/mis/workshop/kw_111805.pdf, Data accessed: 2007/01/17.
20.Kumar, M. and Feldman, S.I., “Internet Auction,” Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp.49-60, 1998.
21.Lin, Z., Janamanachi, B., and Huang, W., “Reputation Distribution and Consumer-to- Consumer Online Auction Market Structure: An Exploratory Study,” Decision Support Systems, Vol. 41, No. 2, pp. 435-488, 2006.
22.McMillan, R., “Auction Fraud Tops Computer Crime Complaints,” InfoWorld, http://www.infoworld.com/article/07/03/16/HNauctionfraudtopscomplaints_1.html, Data accessed: 2008/01/21.
23.Mitchell, J.C., Social Networks in Urban Situation, Manchester: Manchester University Press, 1969.
24.National Consumer League Internet Fraud Watch, “Internet Fraud Statistics (2000-2005),” http://www.fraud.org/internet/intstat.htm, Data access: 2007/06/20.
25.NFIC (National Fraud Information Center), “Internet Fraud Statistics Reports,” http://www.fraud.org/internet/intstat.htm, Data access: 2007/06/20.
26.Ramsey, J.B., Alternative Bidding Strategies: Some Theoretical Considerations Bidding and oil Leases, JAL Press INC, 1980.
27.Resnick, P., Zeckhauser, R., Friedman, E., and Kuwabara, K., “Reputation Systems,” Communication of the ACM, Vol. 43, No. 12, pp. 45-48, 2000.
28.Resnick, P. and Zeckhauser, R., “Trust among Strangers in Internet Transactions: Empirical Analysis of eBay’s Reputation System,” Advances in Applied Microeconomics, Vol 11, pp. 127-157, 2002.
29.Scott, J., Social Network Analysis: A Handbook, Thousands Oaks, Calif.: SAGE Publications, 2000.
30.Stallaert, B.S., Whinston, J.A.B., and Zhang, H., “Choice of Transaction Channels: The Effects of Product Characteristics on Market Evolution,” Journal of Management Information Systems, Vol. 21, No. 4, pp. 173-197, 2005.
31.Tokeley, K., “Vendor Bidding on Online Auctions Protecting Consumers from Vender Bidding on New Zealand Online Auctions,” Journal of Consumer Policy, Vol. 30, No. 2, pp. 137-150, 2007.
32.Wasserman, S. and Faust, K., Social Network Analysis: Methods and Applications, New York: Cambridge University Press, 1994.
33.Wurman, P.R., Wellman, M.P. and Walsh, W.E., ”The Michigan Internet AuctionBot: A Configurable Auction Server for Human and Software Agents,” Proceedings of the second International Conference on Autonomous Agents, pp. 301-308, 1998.
34.Wang, J.C., Chiu, C.C. and Ker, H.Y., “Detecting Online Auction Fraud of Reputation Inflation through Social Network Structures Embedded in Transaction Records,” Journal of Information Management (Taiwan), Vol. 12, No. 4, pp. 144-184, 2004.
35.Weinberg, B. D. and Davis, L., “Exploring the WOW in Online-Auction Feedback,” Journal of Business Research, Vol. 58, No. 11, pp.1609-1621, 2005.
36.Xu, J. and Chen, H., “Fighting organized crime: Using Shortest-Path Algorithms to Identify Associations in Criminal Networks,” Decision Support Systems, Vol. 38, pp. 473-487, 2004
37.Yang, C., Ng, T. D., Wang, J. H., Wei, C. P., and Chen, H., “Analyzing and Visualizing Gray Web Forum Structure,” Proceedings of Pacific Asia Intelligence and Security Informatics, pp. 21-33, 2007.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊
 
系統版面圖檔 系統版面圖檔