跳到主要內容

臺灣博碩士論文加值系統

(44.200.122.214) 您好!臺灣時間:2024/10/07 22:58
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:艾偉
研究生(外文):ALVIN PRATAMA
論文名稱:印尼與臺灣網絡警察的網路欺詐案之策略管理比較研究
論文名稱(外文):A COMPARATIVE STUDY ON STRATEGIC MANAGEMENT IN CYBER CRIME POLICE BETWEEN INDONESIA AND TAIWAN: IN CASES OF INTERNET FRAUD
指導教授:孟維德孟維德引用關係
指導教授(外文):Mon, Wei-Teh
口試委員:施光恆張維容
口試委員(外文):Kuang-Heng ShihWei-Jung Chang
口試日期:2020-05-11
學位類別:碩士
校院名稱:中央警察大學
系所名稱:外事警察研究所
學門:軍警國防安全學門
學類:警政學類
論文種類:學術論文
論文出版年:2020
畢業學年度:108
語文別:英文
論文頁數:189
中文關鍵詞:網路犯罪策略性管理網路法網路詐欺網路警察單位
外文關鍵詞:CybercrimeStrategic ManagementCyberlawInternet FraudCybercrime Police Units
相關次數:
  • 被引用被引用:0
  • 點閱點閱:161
  • 評分評分:
  • 下載下載:42
  • 收藏至我的研究室書目清單書目收藏:0
工業革命4.0發展下,全球化創造了新的社會認識,特別在商業交易,訊息接觸,軟體發展和電腦網絡系統安全性的交互層面。網路成為一種共享信息的功能而開始發軔,如今已發展成為一種更廣泛的互動方式,網路發展除提供收益外,還帶來了新的犯罪概念,犯罪模式和網絡犯罪革命。各國開始訂定與網絡法律相關的訊息和技術控制法律規範。警察作為執法人員進行合作,制定新的執法結構,進行戰略管理,制定新的處理網絡犯罪的標準程序,在這些程序中發現網絡犯罪案件,根據法律,依法逮捕和懲罰犯罪者,有時有必要比較法律以及如何加快處理網絡犯罪案件的辦案時效。網絡犯罪的性質不僅跨越國界,犯罪者或受害者也可能在不同國家/地區之外發生。網絡犯罪案件中,其中之一是要解決網絡詐欺案的數量呈現緩慢增加,這會使大眾對執法組織信心下降。預防和揭露這方面的執法成功模式之比較研究需要印尼和台灣的網絡警察增加預防知識,訊息共享,證據和網絡犯罪技術。本文針對網絡警察單位戰略設定和對網絡欺詐的處理進行研究,通過研究影響和管理網絡欺詐的因素,旨在為政策管理的發展戰略提供參考。該研究是通過訪談和文獻研究進行的。這項研究將基於戰略管理概念,通過使用內部,外部和SWOT矩陣來進行,這些矩陣用於概述網絡犯罪,尤其是網路欺詐辦案方式,了解網絡警察單位的定位,通過日常活動尋找作案手法,動機性網路欺詐,以及預防情境犯罪,然後確定處理網路詐欺的正確策略。

關鍵字: 網路犯罪, 策略性管理, 網路法, 網路詐欺, 網路警察單位.

Development of Industrial Revolution 4.0, Globalization creates a new understanding in society in interacting, both trade transactions, access to information, software development and security of computer cybersecurity systems. The function of the Internet that started as a means of sharing information is now developing into a method of broader interaction, the development of the use of the Internet in addition to providing benefits also gives rise to new crime concepts, modes, and revolutions of cybercrime. Each country began to make regulations on controlling information and technology related to cyberlaw. The police as law enforcers collaborate, formulate new structures, strategic management, create new standard procedures for dealing with cybercrime in which to uncover a case of cybercrime, arrest and punish perpetrators in accordance with the rule of law, sometimes it is necessary to have a comparative study of law and how to deal with cybercrime for speed in handling cybercrime cases. The nature of the cybercrime that is not only across national lines but perpetrators or victims can also occur outside different countries, in cybercrime cases, one of them is internet fraud solving cases that are slow and increasing which can make public confidence in the police organization decline. Comparative studies success in prevention and disclosure Cybercrimes police units between Indonesia and Taiwan are needed as an increase in officer's knowledge, information sharing, evidence and techniques of cybercrime units in uncovering and preventing.
In this thesis, a study on the formulation of cybercrime police unit strategy and analysis of handling internet fraud by looking at the factors that influence and management in handling internet fraud aim to provide input to policy management in determining its development strategy. The study was conducted with interviews and document research. The research will be done based on strategic management concepts by using Internal, External and SWOT matrix used to provide an overview of handling Cybercrime especially internet fraud, knowing the position of cybercrime police units, finding the modus operandi, motive internet fraud through routine activity, as well as prevention with situational crime prevention to then determine the right strategy for handling internet fraud

Keywords: Cybercrime, Strategic Management, Cyberlaw, Internet Fraud, Cybercrime Police Units.

Table of Contents

ACKNOWLEDGEMENTS I
ABSTRACT III
LIST OF FIGURES VIII
LIST OF TABLES IX
LIST OF ABREVIATIONS X
CHAPTER 1 1
INTRODUCTION 1
1.1 BACKGROUND 1
1.2 RESEARCH QUESTIONS 7
1.3 RESEARCH OBJECTIVES 7
1.4 RESEARCH CONTRIBUTION 7
1.5 STRUCTURE OF WRITING 8
CHAPTER 2 10
LITERATURE REVIEW 10
2.1. INTERNET. 10
2.1.1 Internet Concept 10
2.1.2 Internet of Thing (IOT) 12
2.2 SOCIAL MEDIA. 14
2.2.1 Social Media Concept 14
2.2.2 Social Media and Crime. 18
2.3 ORGANIZED CRIME. 20
2.4 CYBER CRIME 22
2.4.1 Cyber Crime Concept 22
2.4.2 Cybercrime Categorization 26
2.4.3 The Perpetrators of Cybercrime 27
2.5 CYBERLAW 32
2.5.1 Cyberlaw Concept 32
2.6 INTERNET FRAUD 36
2.6.1 Internet Fraud Concept 36
2.6.2 Type of Internet Fraud 38
2.6.3 Efforts by States and Internet Fraud Cases. 47
2.7 STRATEGIC MANAGEMENT 49
2.8 SWOT ANALYSIS 53
2.9 ROUTINE ACTIVITY 55
2.10 SITUATIONAL CRIME PREVENTION (SCP) 57
2.12 THE INDONESIA NATIONAL POLICE CRIMINAL INVESTIGATION AGENCY 63
2.13 CRIMINAL INVESTIGATION BUREAU (CIB) IN TAIWAN 66
2.14 MINISTRY OF COMMUNICATION AND INFORMATION OF THE REPUBLIC OF INDONESIA (KEKOMINFO) 70
2.15 NATIONAL CYBER AND CRYPTO AGENCY (BSSN) 73
2.16 DESIGN FRAMEWORK 75
CHAPTER 3 76
METHODOLOGY 76
3.1 RESEARCH APPROACHES AND METHODS 76
3.2 DATA AND INFORMATION SOURCE 77
3.3 DATA COLLECTION TECHNIQUE 78
3.3.1 Interview 78
3.3.2 Research Document 78
3.4 DATA ANALYSIS TECHNIQUE 78
CHAPTER 4 80
DATA COLLECTION AND ANALYSIS 80
4.1 OVERVIEW OF RESEARCH LOCATIONS 80
4.1.1 Indonesia 80
4.1.2 Taiwan 84
4.2 CYBERCRIME POLICE UNIT OVERVIEW 87
4.2.1 Cyber Crime Police Unit in Criminal Investigation Agency in Indonesia. 87
4.2.1.1 Human Resources 90
4.2.1.2 Facilities and Infrastructure 92
4.2.1.3 Budget 92
4.2.2 The 9th Investigation Brigade (Cybercrime Police Unit) in Taiwan… 93
4.2.2.1 Human Resources 96
4.2.2.2 Facilities and Infrastructure 97
4.2.2.3 Budget 97
4.3 CHARACTERISTICS OF INTERNET FRAUD 97
4.3.1 Indonesia 97
4.3.1.1 Modus Operandi 98
4.3.1.2 Perpetrators 101
4.3.1.3 Victim 103
4.3.1.4 Location 104
4.3.2 Taiwan 104
4.3.2.1 Modus Operandi 105
4.3.2.2 Perpetrators 108
4.3.2.3 Victim 108
4.3.2.4 Location 109
4.4 EFFORTS OF THE CYBERCRIME POLICE UNIT TO CRACK DOWN ON INTERNET FRAUD 109
4.4.1 CYBERCRIME POLICE IN INDONESIA 109
4.4.1.1 Disclosure Steps 109
4.4.1.2 Preventive Steps 112
4.4.2 CYBERCRIME POLICE IN TAIWAN 114
4.4.2.1 Disclosure Steps 114
4.4.2.2 Preventive Steps 118
4.5 ANALYSIS OF INTERNET FRAUD CHARACTERISTICS BETWEEN INDONESIA AND TAIWAN 119
4.6 ANALYSIS OF STRATEGIC MANAGEMENT CYBERCRIME POLICE UNIT FOR HANDLING INTERNET FRAUD. 126
4.6.1 Factors Affecting The Cyber Crime Police Unit 130
4.6.2 Situational Crime Prevention of Internet Fraud 135
4.7 STRATEGIES FOR HANDLING INTERNET FRAUD 146
CHAPTER 5 153
CONCLUSION AND SUGGESTION 153
5.1 CONCLUSION 153
5.2 SUGGESTION 159
REFERENCE 162
APPENDIX A 166
APPENDIX B 175
APPENDIX C 179
APPENDIX D 183


Agency, N. (2020). Overview of Cybercrime in 108. Taipei: National Police Agency.
Agency, N. P. (2016, 11 22). Hotline. Retrieved from National Police Agency: https://www.npa.gov.tw/NPAGip/wSite/ct?xItem=80859&ctNode=12543&mp=4
Agency, N. P. (2020, 4 23). Anti Fraud. Retrieved from 165 Anti Fraud: https://165.npa.gov.tw/#/article/news/193
Agmasari, S. (2019, 11 5). Hati-hati Saat Beli Tiket Taman Safari Bogor, Ada Penipuan Online Artikel ini telah tayang di Kompas.com dengan judul "Hati-hati Saat Beli Tiket Taman Safari Bogor, Ada Penipuan Online", https://travel.kompas.com/read/2019/11/05/140000427/hati-hati-saat-. Retrieved from Kompas: https://travel.kompas.com/read/2019/11/05/140000427/hati-hati-saat-beli-tiket-taman-safari-bogor-ada-penipuan-online?page=all
Ariyanti, D. S. (2018, 11 21). Lebih dari 50% Kejahatan Siber Berasal dari Media Sosial. Retrieved from Teknologi: https://teknologi.bisnis.com/read/20180921/84/840939/lebih-dari-50-kejahatan-siber-berasal-dari-media-sosial
Bank, U. N., & United Nation , T. A. (2017). Combatting Cybercrime Tools and Capacity Building. Washington DC: ITU.
Bernik, I. (2014). Cybercrime and Cyberwarfare. London: Wiley.
Bullock, K., Clarke, R. V., & Tilley, N. (2010). Situational Prevention of Organised Crimes. Canada: Willan.
Bureau, C. I. (2019, 7 20). Organization. Retrieved from Criminal Investigation Bureau: https://www.cib.gov.tw/Module/Doc/Index/63
Bureau, C. I. (2020, 4 20). International Cooperation. Retrieved from CIB: https://www.cib.gov.tw/English/Module/Doc/Index/142
Button , M., Lewis, C., & Tapley, J. (2009). Fraud Typologies and Victims of Fraud. UK: University of Portsmouth.
Button, M., Nicholls, M., Kerr, J., & Owen, R. (2014). Online Frauds: Learning from victims why they fall for these scams. Journal of Criminology, 391-408.
Clough, J. (2010). Principles of Cybercrime. New York: Cambridge University Press.
Comer, D. E. (2019). e Internet Book Everything You Need to Know about Computer Networking and How the Internet Works. New York: CRC Press.
Creswell, J. W. (2009). Research Design. Qualitative,Quantitative, and Mixed Methods Approaches. London: SAGE.
Creswell, J. W. (2013). Qualitative Inquiry & Research Design. London: SAGE.
Creswell, J. W., & Creswell, J. D. (2014). Research Design. Qualitative,Quantitative, and Mixed Methods Approaches (Vol. Fifth Edition). London: SAGE.
Cross, M. (2008). Scene of the Cybercrime. Syngress.
Curtis, G. (2012). The Law of Cybercrimes and Their Investigations. New York: CRC Press.
David, F. R. (2011). Strategic Management Concepts and Cases. New Jersey: Prentice Hall.
Djanggih, H., & Qamar, N. (2018). Penerapan Teori-Teori Kriminologi dalam Penanggulangan Kejahatan Siber (Cyber Crime). Hukum, 10-23.
Eck, J. E., & Spelman, W. (1987). Problem Solving. Problem Oriented Policing In Newport News. USA: U.S Departmen of Justice.
Evans, D. (2011). The Internet of Things How the Next Evolution of the Internet Is Changing Everything. Netherland: Cisco IBSG.
Gabosky, P., Smith, R. G., & Dempsey, G. (2001). Electronic Theft Unlawful Acquisition in Cybercrime. UK: Cambridge .
Gee, S. (2015). Fraud and Fraud Detection. New Jersey: Wiley.
Government, T. (2020, 4 20). Taiwan Government. Retrieved from Government Agencies: https://www.taiwan.gov.tw/3866.php?xq_xCat=2
Gragido , W., & Pirc, J. (2011). Cybercrime and Espionage. USA: Elsevier.
Graham, J. (2009). Cyber Fraud.Tactics,Techniques, and Procedures. New York: CRC press.
Hamzah, A. (1990). Aspek aspek pidana di Bidang Komputer. Jakarta.
Hill, J. B., & Marion, N. E. (2016). Introduction to Cyber Crime. California: PSI textbox.
Holt, T. J., & Bossler, A. M. (2016). Cybercrime in Progress. London: Routledge.
Hubeis, M., & Najib, M. (2014). Manajemen Strategik. Jakarta: Gramedia.
Hunger, J. D., & Wheelen, T. L. (2011). Essential of Strategic Management. New Jersey: Prentice Hall.
Indonesia, C. P. (2020, 4 5). Patroli Siber. Retrieved from Statistic: https://patrolisiber.id/statistic
ITU. (2012). Understanding Cybercrime: Phenomena,Challenges and Legal Response. France: ITU.
Jaishankar, K. (2011). Cyber Crimonology.Exploring Internet Crimes and Criminal Behavior. New York: CRC press.
Jewkes, Y., & Yar , M. (2010). Handbook of Internet Crime (Vol. First Editon). Canada: Willan.
Justice, M. o. (2019, 6 19). Law. Retrieved from Law and Regulations Database of The Republic of China: https://law.moj.gov.tw/ENG/LawClass/LawAll.aspx?pcode=C0000001
Kovacich, G. L., & Jones, A. (2006). High Technology Crime Investigators Hanbook (Vol. Second Edition). USA: Elsevier.
Kremling, J., & Parker, A. M. (2018). Cyberspace,Cybersecurity,and Cybercrime. California: SAGE.
Lab, S. P. (2014). Crime Prevention.Approaches, Practices, and Evaluations. USA: Elsevier.
Lanier, M. M., Henry, S., & Anastasia, D. J. (2015). Essential Criminology. Alabama: Westview Press.
Larsen, H. L., Blanco, J. M., Pastor, R., & Yager, R. (2017). Using Open Data to Detect Organized Crime Threats Factors Driving Future Crime. Switzerland: Springer.
Leclerc, B., & Savona , E. U. (2017). Crime Prevention in the 21st Century Insightful Approaches for Crime Prevention Initiatives. Switzerland: Springer.
Levi, M. (2008). Organized Fraud and Organizing Frauds: Unpacking Research on Networks and Organization. Criminology & Criminal Justice, 389-419.
Lindsey, N. (2019, 3 12). Cyber Criminals Have Turned Social Media Cyber Crime Into a $3 Billion Business. Retrieved from Cybersecurity: https://www.cpomagazine.com/cyber-security/cyber-criminals-have-turned-social-media-cyber-crime-into-a-3-billion-business/
Martin , A. A., & Graham , F. (2015). The Criminal Act The Role and Influence of Routine Activity Theory. England: Palgrave Macmillan.
Masyur, D., & Gultom, E. (2005). Cyber Law. Bandung: Aditama.
Mennie, P. (2015). Social Media Risk and Governance Managing enterprise risk . London: Kogan Page.
Newburn, T. (2007). Criminology. London: Routledge.
Octaveri. (2017). A Research On Cybercrime Control Policy in Indonesia. Taipei: Central Police University.
Piquero, A. R. (2016). The Handbook of Criminological Theory. USA: John Willy & Sons.
Population, W. (2020, 4 20). Population. Retrieved from World Population: https://worldpopulationreview.com/countries/
Pratt, T. C., Holtfreter, K., & Reisig, M. (2010). Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory. Research in Crime and Delinquency, 267-296.
Priyono. (2007). Pengantar Manajemen. Surabaya: Zifatama.
Raco, J. R. (2010). Metode Penelitian Kualitatif. Jakarta: Gramedia.
Raharjo, A. (2002). Cybercrime. Bandung: Fist.
Rahutomo, T. A. (2016). Policy Strategy For Prevention Fraud Crimes Through Electronic Media In Metro Princint, Center Jakarta. Jakarta: Police Science Collage of Indonesia National Police.
Rangkuti, F. (2015). Personal SWOT Analysis. Jakarta: Gramedia.
Reichel, P., & Albanese, J. (2014). Transnational Crime and Justice. USA: SAGE.
Richard , J. (1999). Transnational Criminal Organizations,Cybercrime, and Money Laundering. New york: CRC Press.
Ross, S., & Smith, R. G. (2011). Risk factors for advance fee fraud victimisation. Australia: Australian Institute of Criminology.
Schneider, S. (2015). Crime Prevention Theory and Practice . New York: CRC Press.
Setiawan, R. (2019, July 2 ). BSSN Sebut Ada 1,9 Juta Serangan Siber pada Mei 2019 Baca selengkapnya di artikel "BSSN Sebut Ada 1,9 Juta Serangan Siber pada Mei 2019", . Retrieved from Teknologi: https://tirto.id/bssn-sebut-ada-19-juta-serangan-siber-pada-mei-2019-edur
Siegel, L. J. (2010). Criminology.Theories,Patterns, and Typologies. Canada: Wadsworth.
Siyoto, S., & Sodik, A. (2015). Dasar Metodologi Penelitian. Yogyakarta: Literasi Media.
Sjouwerman, S. (2016). Cyberheist. Florida: Knowbe.
Speedtest. (2020, 4 20). Speedtest. Retrieved from Global-Index: https://www.speedtest.net/global-index
Sumadi, H. (2015). Kendala Dalam Menanggulangi Tindak Pidana Penipuan Transaksi Eelektronik di Indonesia. Wawasan Hukum, 175-203.
Sumenge, M. M. (2013). Penipuan Menggunakan Media Internet Berupa Jual Beli Online. Lex Crimen, 102-112.
Trottier, D., & Fuchs, C. (2015). Social Media, Politics, and The State. New York: Routledge.
Viano, E. C. (2017). Cybercrime, Organized Crime, and Societal Responses. Switzerland: Springer.
Wahid, A., & Labib, M. (2005). Kejahatan Mayantara. Bandung: Aditama.
Wells, J. T. (2010). Internet Fraud Casebook . New Jersey: John Wiley & Son.
Wexler, C. (2000). Excellence in Problem Oriented Policing:The 1999 Herman Goldstein. USA: U.S Departement Of Justice.
Willems, E. (2019). Cyberdanger Understanding and Guarding Against Cybercrime. Switzerland: Springer.
Wortley, R., & Townsley, M. (2017). Environmental Criminology and Crime Analysis. New York: Routledge.
Yar, M. (2006). Cybercrime and Society. California: SAGE.

Legislation
Criminal Code Law (KUHP) of the Republic of Indonesia.
Criminal Procedure Code (KUHAP) of the Republic of Indonesia.
Law Number 19 the Year 2016 concerning Amendments to Law Number 11 the Year 2008 concerning Information and Electronic Transactions of the Republic of Indonesia.
Law of the Republic of Indonesia Number 5 the Year 2009 Concerning Ratification Of the United Nations Convention Against Transnational Organized Crime.
Criminal Code Law of the Republic of China.
Personal Data Protection Law of the Republic of China.
Cyber Security Management Law of the Republic of China.
Organized Crime Prevention Law of the Republic of China

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊