英文摘要
|
The living quality of users has been improved by the convenience of Internet, such as the applications of online shopping and financial transaction are enable user to reduce their valuable time without counter transactions. However, such convenience usually accompanies with cybercrime concerns and users are suffering the risks of personal information leak. According to traditional crime theory, crime behavior is a dynamic systemically complex problem which is more than just a simple personal behavior. Various factors, such as networking security, government policy and their feedback influence, are all related with cybercrime which is a getting serious issue. Therefore, to realize core structure of cybercrime, a simulation model has been proposed in this research based on the methodology of system dynamics from attack and defense perspectives respectively. Finally, some simulation experiments are implemented by using actual criminal data of Taiwan from 1991 to 2007. As the simulation result demonstrated, the accurate prediction rate of the proposed model can be achieved to 80%. Additionally, particular dark cybercrime parameters, such as report rate, are revealed and some interesting patterns are also discovered. Furthermore, the simulation model can be regarded as a pilot-test for the implementation of actual crime-related policy. Finally, the simulation results can also be took into account for traditional crime theory refinement.
|
参考文献
|
-
馬信行(2001)。犯罪理論之統合分析-以自陳犯罪之研究報告為樣本。教育與社會研究,2,35-66。
連結:
-
內政部警政署97年第30號警政統計通報
-
Beck, U.(1991).Der Konflikt der zwei Modernen, in: demselben: Politik in der Risikogesellschaft.Frankfurt/M.
-
Brenner, S.,Schwerha IV, J.(2004).Introduction-Cybercrime: A Note on International Issues.Information Systems Frontiers,6(2),111-114.
-
Cohen, L. E.,Felson, M.(1979).Social Change and Crime Rate Trends: A Routine Activity Approach.American Sociological Review,44,588-608.
-
Cymru, T.(2006).Cybercrime-An Epidemic.ACM Queue,9(4),25-28.
-
Dallaway, E.(2007).Cybercrime unreported due to reputation risks.InfoSecuirty,4(4),11.
-
Forrester, J. W.(1961).Industrial Dynamics.Cambridge MIT Press.
-
Forrester, J. W.(1971).World Dynamics.Wright-Allen Press.
-
Hinduja, S.(2008).Deindivididuation and Internet Software Piracy.CyberPsychology & Behavior,11(4),391-398.
-
Hirschi, T.(1969).Causes of Delinquency.Berkeley:University of California Press.
-
O''Hanlon, C.(2006).The Criminal Mind.ACM Queue,9(4),7.
-
Stephens, G.(2008).Cybercrime in the Year 2005.The Futurist,32-36.
-
Wadlow, T.,Gorelik, V.(2006).The Making of a Cybercriminal.ACM Queue,9(4),25-28.
-
Wolak, J. D.,J., Finkelhor, D.,Mitchell, K.(2008).Is Talking Online to Unknown People Always Risky? Distinguishing Online Interaction Styles in a National Sample of Youth Internet Users.CyberPsychology & Behavior,11(3),340-343.
-
非傳統類型犯罪之預防第三章
-
王明禮、許慈健(2001)。碩士論文(碩士論文)。國立交通大學管理學院科技法律組。
-
林宜隆、邱士娟(2003)。我國網路犯罪案例現況分析。Journal of Information, Technology and Society,3(2),73-88。
-
林宜隆、黃讚松(2002)。網路使用問題分析與犯罪預防之探討。Journal of Information, Technology and Society,2(2),95-114。
-
林宜隆、楊鴻正(2001)。網路交易犯罪之偵查要領-以網路詐欺犯罪為例。Journal of Information, Technology and Society,創刊號,135-151。
-
高聲凱(2007)。電腦網路犯罪之防制2008網際網路趨勢研討會
-
創新資訊應用研究計畫
|