| 研究生: |
宋勇達 Yung-Ta Sung |
|---|---|
| 論文名稱: |
以社會網路分析與詐騙手法比對建構網拍買賣家導向的詐欺偵測系統 Developing an User-oriented Internet Auction Fraud Detection System By Social Network Analysis and Fraud Rules Matching |
| 指導教授: |
薛義誠
Yih-chearing Shiue |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
管理學院 - 資訊管理學系 Department of Information Management |
| 畢業學年度: | 97 |
| 語文別: | 中文 |
| 論文頁數: | 75 |
| 中文關鍵詞: | 詐欺手法比對 、哄抬評價 、網路拍賣詐欺偵測 、社會網絡分析 |
| 外文關鍵詞: | fraud rules matching, Internet auction fraud detection, social network analysis, k-core, inflated reputation |
| 相關次數: | 點閱:14 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本研究針對現行的網路拍賣交易評價制度,運用社會網路分析的k-core分群演算法,以及詐欺手法特徵比對的觀念,建構出一個以網拍買賣家為導向的系統,可協助買賣家偵測「哄抬評價」及具有「賣家收款後未交付商品」詐欺特徵的潛伏詐欺者。系統的核心觀念是「以網拍買賣家為導向」,不同於為網拍平臺業者開發的偵測系統,買賣家可以主動且隨時地利用本系統查詢某個帳號的詐欺嫌疑程度,而系統會將帳號再細分成具有或不具有詐欺嫌疑,為系統使用者在拍賣網站的黑名單帳號外提供多一層防護;有經驗的買賣家更可以依據商品特性、本身經驗將系統預設參數進行個人化的調整,讓系統的詐欺偵測規則更貼近他的需求。
系統利用k-core分群演算法分析「交易網路結構」,找出隱藏其中的可疑內聚子群體(cohesive subgroup),然後分析「交易記錄」做進一步的確認,是一種運用交易網路結構與交易紀錄兩種不同資料類型的哄抬評價偵測方式;而系統對於另一個詐欺手法「賣家收款後未交付商品」的偵測方式,則是挑出六種具針對性的詐欺偵測指標來進行偵測,秉持的觀念是不同的詐欺手法其偵測指標、指標參數、及門檻值設定亦應有所不同,藉由高針對性的指標組合設定,可有效提升系統準確率。
The research focuses on existing reputation system of the internet auction and an user-oriented internet auction fraud detection system is developed by using k-core clustering algorithm and fraud rules matching. The system helps users to detect fraudsters who may inflate his reputation or receive payment without delivering goods. The core concept of the system is user-oriented, and is very different from the dealer-oriented systems. The fraud degree of some accounts can be queried actively. The accounts can be classified according fraud or not fraud and another protection besides the blacklist will be provided. The detection indices of the system can be adjusted based on the property of goods or an experienced user. Then system will be more fitted.
The k-core clustering algorithm is used to analyze the structure of transaction network and the suspicious cohesive subgroup will be found out. Then transaction records will be analyzed for verification. This is an inflated reputation detection method which combines structure of transaction network and transaction records. As for the fraud of receiving payment without delivering goods, six fraud detection indices is used to detect it. The core concept is each fraud method should have corresponding detection indices and thresholds. The accurate rate can be improved by using high correlation indices.
一、中文部份
[1] 王俊程、邱垂鎮、葛煥元, 2005, “以交易記錄的社會網絡結構建立線上拍賣哄抬評價的偵測指標”, 資訊管理學報, 12卷4期, pp.143-184
[2] 王思峰, 劉麗萍, 2007, “虛擬社群中誰比較可信任?,” 中華心理學刊, 49卷, 1期, pp.1-17
[3] 邱垂鎮, 2007, “Detecting Reputation-Shilling Behaviors: A Social Network Analysis Approach,” 國立中正大學資訊管理研究所, 博士論文
[4] 邱議德, 2003, “以社會網路分析法評估工作團隊知識創造與分享,” 國立中正大學資訊管理研究所, 碩士論文
[5] 林吟潔, 2005, “整合關係策略與社會網絡觀點探討廠商間競合傾向—多重層次網絡分析法之應用,” 東海大學企業管理學系碩士班,碩士論文
[6] 林佳瑩, 2002, “誰在八卦?一個社會網絡的分析,” 國立政治大學社會學研究所,碩士論文
[7] 徐源隆, 2004, “以行為分析為基礎的網路拍賣詐欺偵防策略之研究,”中央員警大學資訊管理研究所, 碩士論文
[8] 洪儀玶, 2007, “具早期預警能力之線上拍賣詐騙偵測,” 淡江大學資訊管理研究所, 碩士論文
[9] 陳育騏, 2007, “結合社會網絡分析與資料探勘技術應用於網路拍賣詐欺偵測之研究,” 元智大學資訊管理研究所,碩士論文
[10] 陳樺誼、周樹林、周文卿, 2006, “網路消費行為與商機模式研究,” MIC產業情報研究所
[11] 曾百川, 2005, “網路詐欺犯罪歷程之質化研究,” 國立中央員警大學犯罪防治研究所, 碩士論文
[12] 葉懿慧, 2008, “以社會網路分析方法偵測線上拍賣網站的詐欺共犯群體,” 國立中央大學資訊管理研究所, 碩士論文
[13] 葛煥元, 2003, “線上拍賣欺騙行為偵測之研究,” 國立中正大學資訊管理研究所, 碩士論文
二、英文部份
[14] Alba, R. D., 1973, “A graph-theoretic definition of a sociometric clique,” Journal of Mathematical Sociology, 3, pp.113-126
[15] Baron, David P., 2002, “Private Ordering on the Internet: The eBay Community of Traders,” Business and Politics: Vol. 4 : Iss. 3, Article 1. pp.245-274.
[16] Bezalel Gavish and Christopher L. Tucci, 2008, “Reducing internet auction fraud,” Communications of the ACM, May 2008, Vol.51, No.5, pp.89-97
[17] Bywell, C.E., Oppenheim, C., 2001, “Fraud on Internet auctions,” ASLIB, 2001, pp.265-272.
[18] Carley, K.M., 2002 , “Dynamic Network Analysis,” in: Summary of the NRC workshop on Social Network Modeling and Analysis, R. Breiger and K.M. Carley (eds.), National Research Council, 2002.
[19] Christos et al., 2005, “Fraud Detection in Electronic Auction,” Proceedings of European Web Mining Forum (EWMF 2005) at ECML/PKDD 2005
[20] Christos et al., 2006, “Detecting fraudulent personalities in networks of online auctioneers,” Proceedings of PKDD 2006, pp.103-114.
[21] Christos et al., 2007, “Netprobe: A fast and scalable system for fraud detection in online auction networks,” Proceedings of the 16th International Conference on World Wide Web, pp. 201-210.
[22] Christos et al., 2008, “Toward a Comprehensive Model in Internet Auction Fraud Detection,” the 41st Annual Hawaii International Conference on System Sciences, pp.79
[23] Chua, C. E. H., Wareham, J., and Robey, D., 2002, “Anti-fraud mechanisms in internet auctions: the roles of markets, hierarchies and communities of practice,” international conference on information systems (ICIS).
[24] Cross, R., Rice, R.E., and Parker, A., 2001, “Information Seeding in Social Context: Structural Influences and Receipt of Information Benefits,” IEEE Transactions On Systems, Man, And Cybernetics-part C: Applications And Reviews (31:4), pp.438-448
[25] Dawn G. Gregg & Judy E. Scott., 2008, “A typology of complaints about eBay sellers,” Communications of the ACM, April 2008, Vol.51, No.4, pp.69-74
[26] Elirlich, I., Participation in Illegitimate Activities: An Economic Analysis, 1974.
[27] Elizabeth F. Churchill, Christine A. Halverson, 2005, “Guest Editors'' Introduction: Social Networks and Social Networking,” IEEE Internet Computing, vol. 9, no. 5, pp. 14-19, Sep./Oct. 2005
[28] Freedman, D.H., 2002, “What eBay isn’t telling you,” Business 2.0 (3:8), Aug 2002, pp. 56
[29] Griggs, B., 2003, “Identity Theft, Other Cybercrimes Show No Sigh of Slowing in Utah,” Knight Ridder Tribune Business News, Jun 21, 2003, pp.1
[30] Han, K.H., 2003, “Brother and Sister Partners on the Net. Scan NT$ 5 Million on Yahoo Auction,” in: United Evenings, Taipei, Taiwan
[31] Krebs, V.E., 2002, “Mapping Networks of Terrorist Cells,” Journal of the International Network for Social Network Analysis (24:3) 2002, pp.3-52.
[32] Mikolaj Morzy and Juliusz Jezierski, 2006, “Cluster-Based Analysis and Recommendation of Sellers in Online Auctions,” Computer Systems Science and Engineering, Vol.22, No.5, pp.279-287
[33] Resnick, Paul and Richard Zeckhauser, 2002, “Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay''s Reputation System,” The Economics of the Internet and E-Commerce. Michael R. Baye, editor. Volume 11 of Advances in Applied Microeconomics. Amsterdam, Elsevier Science. pp.127-157
[34] Snyder, J.M., 2000, “Online Auction Fraud: Are the Auction Houses Doing All They Should or Could to Stop Online Fraud,” Federal Communications Law Journal (52:2), pp. 453-472.
[35] Stanley Wasserman, Katherine Faust , 1994, “Social network analysis,” chapter 7
[36] Tsae, W., 2002, “Social Structure of Coopetition Within a Multiunit Organization: Coordination, Competition, and Intraorganizational Knowledge Sharing,” Organization Science (13:2), 2002, pp.179-190
[37] Tyler, J. R., Wilkinson, D. M. and Huberman, B. A., 2003, “Email as spectroscopy: automated discovery of community structure within organizations,” Proceeding of 1st International Conference Communities and Technologies, pages 81-96, September 2003.
[38] Vladimir and Matjaz, 2002, “An O(m) Algorithm for Cores Decomposition of Networks,” University of Ljubljana, preprint series 2002, 40:799
[39] Wang, W. et al., “Designing Mechanisms for E-Commerce Security: An Example from Sealed-Bid Auctions”, International Journal of Electronic Commerce (6:2), Winter 2001-2002, pp.139-156
[40] Wellman B., 1992, “Which types of ties and networks give what kinds of social support? ,” Advances in Group Processes, 9, pp.207-235.
[41] Wilke, J.R. and Wingfield, N., 2003, “Leading the News: Fraud Crackdown Hits Web Auctions – Federal and State Officials to Make Arrests. File Suits eBay Cooperates in Probe,” in: Wall Street Journal, pp. A.3.
三、網頁部分
[42] 中廣新聞, 2009, “反詐欺重點年 刑事局網站公佈十大詐欺手法,” http://www.tcpd.gov.tw/cht/index.php?code=list&flag=detail&ids=105&article_id=3465
[43] 刑事員警大隊, 2009, “提供民眾於春節期間防制網路拍賣詐欺之方法,” http://www.taipei.gov.tw/cgi-bin/Message/MM_msg_control?mode=viewnews&ts=497982b4:4fee&theme=&layout=
[44] 刑事警察局, 2008, “上半年網路犯罪12007件 詐欺案佔四成,”http://www.itis.tw/node/202
[45] 吳佩玲, 2008, “2012年台灣寬頻上網家戶普及率預計將達74%,”
http://www.find.org.tw/find/home.aspx?page=news&id=5295, 財團法人資訊工業策進會FIND網站新聞
[46] 時報資訊, 2008, “全民搶錢 網拍兼差賣家增5成”, http://tw.money.yahoo.com/news_article/adbf/d_a_080804_3_12r6v
[47] 葉亭佳, 2008, “2008年6月底止台灣上網人口,” http://www.find.org.tw/find/home.aspx?page=many&id=205,資策會FIND/經濟部技術處「創新資訊應用研究計畫」
[48] 趙鬱竹, 2008, “露天兩週年:商品數破千萬,買的人還是少,” http://www.ithome.com.tw/itadm/article.php?c=51461, iThome online 新聞
[49] 露天拍賣網討論區-交易安全, “拍賣網是騙錢好地方,” http://forum.ruten.com.tw/replylist.php?article=3572721&page=1
[50] 露天拍賣網, “交易安全, ”
http://www.ruten.com.tw/security/index.html
[51] 露天拍賣網, “信用評價的分數如何計算?” http://www.ruten.com.tw/system/server_center.htm?0005000500010004
[52] 露天拍賣網, “註冊會員: 一個身分證可註冊 3 個帳號,” https://member.ruten.com.tw/user/register_profile.htm
[53] 露天拍賣網, “評價可以修改嗎? 評價時要注意哪些事情?”, http://www.ruten.com.tw/system/server_center.htm?0005000500020005
[54] 露天拍賣網, “買家防身術,” http://www.ruten.com.tw/security/knowing_sellers.html
[55] 露天拍賣網, “露天拍賣會員合約,” http://www.ruten.com.tw/system/server_center.htm?00060001
[56] 露天拍賣網討論區, “【公告】 詐騙賣家,有跡可循,” http://forum.ruten.com.tw/replylist.php?article=312844&page=1
[57] Yahoo奇摩拍賣網, “Yahoo!奇摩拍賣買家 / 賣家保障方案,” http://tw.help.yahoo.com/auct/policy/protection.html
[58] Yahoo奇摩拍賣網, “拍賣教室-新手上路(會員註冊確認程式)”, http://tw.bid.yahoo.com/phtml/auc/tw/classroom/newbie/newbie_reg_home.html
[59] Yahoo奇摩拍賣網, “評價的顯示與計算方式,” http://help.cc.tw.yahoo.com/cp_info.html?id=2402
[60] Yahoo奇摩拍賣網, “黑名單公告區,” http://tw.mb.yahoo.com/auction/board.php?action=a&bname=9_blacklist
[61] Yahoo奇摩拍賣網, “買家防詐五招,” http://tw.help.yahoo.com/auct/safety/buyer.html
[62] Yahoo奇摩拍賣網, “賣家自保三式,” http://tw.help.yahoo.com/auct/safety/seller.html
[63] Borgatti, S.P., 1998, “What Is Social Network Analysis?,” http://www.analytictech.com/networks/whatis.htm.
[64] Hanneman, Robert A. and Mark Riddle, 2005, “Introduction to social network methods,”
http://faculty.ucr.edu/~hanneman/nettext/, ch11
[65] Internet Crime Complaint Center (IC3), “2008 IC3 Annual Report,” http://www.ic3.gov/media/annualreport/2008_IC3Report.pdf
[66] Laura Garton , Caroline Haythornthwaite and Barry Wellman, 1997, “Studying Online Social Networks,”
http://jcmc.indiana.edu/vol3/issue1/garton.html
[67] Luis R. Izquierdo and Robert A. Hanneman, 2006, “Introduction to the Formal Analysis of Social Networks Using Mathematica,” http://faculty.ucr.edu/~hanneman/mathematica_networks.pdf
[68] Stephen P. Borgatti, “Graph Theory,” http://www.steveborgatti.com/papers/graphtheory.doc
[69] Uwe Matzat, 2006, “Techniques of the Analysis of Social Networks II: A: Subgroup Models (Cohesion) and B: Positional Analysis (Structural Equivalence ),” http://www.tue-tm.org/iin/IIN6_2006.ppt