:::

詳目顯示

回上一頁
題名:盜用身分犯罪預防指標與因果權重體系之建構
作者:呂文廷
作者(外文):Lu, Wen-Ting
校院名稱:中央警察大學
系所名稱:警察政策研究所
指導教授:李湧清、黃俊能
學位類別:博士
出版日期:2014
主題關鍵詞:盜用身分犯罪模糊德菲法決策實驗室分析法決策實驗室之網路層級分析法折衷排序法identity theft crimefuzzy DELPHIDEMATELDANPVIKOR
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:1
「盜用身分」在美國是一項快速成長的犯罪,故本文援引美國「盜用身分犯罪嚇阻法」說明其定義,並針對該項犯罪,論述犯罪型態、犯罪現況、犯罪理論及犯罪預防政策;而本研究旨在建構盜用身分犯罪預防指標,透過文獻探討及模糊德菲法,對於構面與指標的重要性有較為一致的看法,並刪去專家學者認為較不重要之構面與指標;因此,本研究共有4項構面與11項指標:
一、 身分保護者:包含3項指標,現行法令與配套措施檢討、落實盜用身分案件受理與通報、盜用身分案件研析與建檔。
二、 身分檢查者:包含2項指標,研發識別身分之科技與系統、協助盜用身分被害者回復各項損失與權利。
三、 身分發行者:包含3項指標,遵守個人資料保護法之規範、強化各類身分發行者防制責任與義務、建立跨機關防制盜用身分犯罪網絡。
四、 身分持有者:包含3項指標,養成良好生活規範以減少個資外洩、注意工作職場環境及確實保護個人資料、落實網路安全觀念與資安政策。
透過決策實驗室分析法(DEMATEL)及決策實驗室之網路層級分析法(DANP)方法,評估各構面與指標的相互關聯度,找出因果關係與權重,並利用折衷排序法VIKOR方法,了解各構面與指標的績效值與達到可望水準差距;研究發現,身分保護者與身分發行者構面的中心度與權重值是最高的,且也有很高的績效值,未來政策制定者應將此二項構面作為優先改善項目;最後,本文認為近期需健全犯罪偵查體系、法制規範體系、作業審核體系及被害關懷體系,而教育宣導體系及案件建檔體系可列為中長期之考量。
Idnetity theft is a fast growing crime in the United States. This study adopts the definition of “Identity Theft and Assumption Deterrence Act” of the United States, subsequent discussion on crime patterns, crime situations, crime theories and crime prevention policies are made based on the same definition. The purpose of this study is to establish identity theft prevention indicators. By utilizing the fuzzy DELPHI method and reviewing past studies, a consistent view has been reached on the important dimensions and indicators, and those considered less important by experts and scholars were deleted. There are 4 dimensions and 11 indicators in this study.
1. Identity protector: including 3 indicators, namely reviewing current laws and measures adopted accordingly, making sure that every identity theft case will be processed and reported and keeping an archive thereof.
2. Identity checker: including 2 indicators, namely developing identity recognition technologies and systems and assisting victims to recoup money and rights lost in identity theft.
3. Identity issuer: including 3 indicators, namely obeying provisions of the Personal Information Protection Act, shouldering identity issuers with more responsibilities and obligations on prevention, and establishing an inter agency prevention network to suppress identity theft.
4. Identity owner: including 3 indicators, namely developing good habits to reduce the possibility of identity theft, staying alert and avoiding identity theft at work and strictingly observing the rules of internet and information security.
Decision-Making Trial and Evaluation Laboratory (DEMATEL) and DEMATEL based ANP (DANP) are used to evaluate the correlation between the dimensions and indicators and to find out the weight and the realation of cause and effect. We also understand the gaps of reaching aspiration level and the performance value of each dimension and indicator by VIKOR method. We discover the prominence and relation of identity protector and identity issuer are highest, as well as the performance value. In the future, policy makers should regard these two dimensions as top priority improvement. Finally, the study suggests that in the short term, efforts should be made to improve the crime investigation system, the legal system, the verifying procedure system and the victim care system. As for the improvement of the education and awareness-raising system and the case filing system might be considered as a mid-to-long term goal.
壹、中文文獻
內政部警政署(2008)。第一屆政府服務品質獎參獎申請書。臺北:內政部警政署。
內政部警政署(2014)。警政統計月報(中華民國103年1月)。臺北:內政部警政署。
內政部警政署刑事警察局(2013)。中華民國刑案統計-2012年。臺北:警政署刑事警察局。
王文科(1990)。教育研究法。臺北:五南。new window
王志誠(2004)。金融商品共同行銷與公平競爭(上)。臺灣本土法學,第58期,頁3-19。
古慧珍(2006)。我國網路詐欺防制之研究-以使用人頭帳戶為中心。國立交通大學科技法律研究所碩士論文,未出版,新竹市。
汪惠健(2006)。模糊理論與應用。新北市:高立圖書公司。
行政院國家資通安全會報(2013)。國家資通訊安全發展方案(102年至105年)。臺北:行政院。
吳政達(1999)。國民小學教師評鑑指標體系建構之研究。國立政治大學教育研究所博士論文,未出版,臺北市。new window
吳雅玲(2001)。德懷術及其在課程研究上的運用。教育研究,第9期,頁297-306。
呂雅惠(2006)。企業內電子郵件監控與隱私權保護爭議之探討。國立政治大學法學院碩士論文,未出版,臺北市。
李振瑋、江耀國(2010)。英國資料保護法中資料所有人權利之研究-兼論我國個資法之相關規範及案例。中原財經法學,第24期,夜29-86。new window
李桐豪(2001)。由美國金融服務現代化法看我國的金融控股公司法。臺灣金融財務季刊,第2輯第2期,頁1-17。new window
汪惠健(2006)。模糊理論與應用。臺北市:全威。
周崇儒(2008),國民中小學校務評鑑專業內函建構之研究。臺北市立教育大學教育學系博士論文,未出版,臺北市。new window
周慧蓮(2005)。英國個人資料保護最新案例發展及其對我國法制之啟示。科技法律透析,第17卷第1期,頁52-62。
林鈺雄(2006)。新刑法總則。臺北:元照出版公司。
林山田(2006a)。刑法各罪論上冊。臺北:元照出版公司。
林山田(2006b)。刑法各罪論下冊。臺北:元照出版公司。
林俊宏、曾國雄、任維廉(2005)。利用VIKOR 方法解決企業資源規劃系統評選問題。農業與經濟,第34期,頁69-90。new window
林原宏(2002)。模糊語意量表的語意模糊數建構演算與實驗分析。調查研究,第11期,頁31-71。new window
林詩韻(2012)。銀行國際傳輸客戶資料保護規範-以英國法為中心。國立政治大學法學院碩士論文,未出版,臺北市。
胡秀媛(2008)。運用Kano Model 與DEMATEL 於贏得訂單條件的改善:以臺灣工業電腦製造業個案為例,私立中華大學科技管理研究所碩士論文,未出版,新竹市。new window
孫志麟(2000)。教育指標的概念模式。教育政策論壇,第3卷第1期,頁117-136。new window
孫宗瀛、楊英魁(2005)。Fuzzy控制:理論、實作與實用。臺北市:全華。
徐村和(1998)。模糊德菲層級分析法。模糊系統學刊,第4卷第1期,頁59-72。
張紹勳(2012)。模糊多準則評估法及統計。臺北:五南。
張耀中(2005)。英國身分證立法-我國之借鏡?科技法律透析,第17卷第11期,頁13-18。
許春金(2008)。犯罪預防與犯罪分析。台北:三民書局。
郭昭佑(2001)。教育評鑑指標建構方法研究。國教學報(13),頁253-285。
陳俊明(2008)。反詐騙工作執行成效與偵辦困境。刑事雙月刊,第22期,頁4-9。
陳政全(2009),以DEMATEL方法探討建廠專案工程的成功關鍵因素。私立中華大學運輸科技與物流管理研究所碩士論文,未出版,新竹市。
陳家駿(2002)。從台基電員工傳送email洩密談公司處理電子郵件法律問題。智慧財產季刊,第41期,頁68-69。
陳順和、劉太強(2009)。我國電信詐騙平臺犯罪及其防制對策之研究。警學叢刊,第40卷第2期,頁87-126。new window
曾淑惠(2002)。教育方案評鑑。臺北市:師大書苑。
湯德宗(2009)。政府資訊公開法改進之研究。法務部委託中央研究院法律研究所報告。
黃宗仁(2005)。建構詐騙犯罪預防宣導指標之研究-以網路及電信詐騙犯罪為例。中央警察大學犯罪防治研究所博士論文,未出版,桃園縣。new window
黃昭元(2005)。無指紋則無身分證?換發國民身分證與強制全民按奈指紋的憲法爭議分析。民主、人權、國家-蘇俊雄教授七秩華祝壽論文集。
楊士隆、曾淑萍(2007)。詐騙犯罪防制策略之成效評估研究(PG9608-0187)。內政部警政署刑事警察局委託國立中正大學犯罪研究中心研究報告。new window
楊永年、楊士隆、邱柏嘉、李宗憲(2009)。網路犯罪防治體系之政府職能與角色分析(PG9608-0187)。行政院研考會委辦臺灣公共治理研究中心計畫案。
楊明慧(2002)。模糊理論的意涵與啟示。測驗統計簡訊,第45期,頁31-40。
廖有祿、江芝迎(2009)。冒用人頭資料犯罪及相關防制對策。刑事政策與犯罪研究論文集,第12期,頁259-284
管倖生(2006)。設計研究方法。臺北市:全華圖書股份有限公司。
劉建浩、林榮禾、曾國雄(2009),結合模糊積分與VIKOR 模式評估航空公司服務品質,顧客滿意學刊,第5卷第1期,頁175-200。new window
蔣蓉華(2004)。企業知識管理績效評價研究。中南大學管理科學與工程研究所博士論文,未出版,長沙市。
衛萬里(2007)。應用分析網路程序法選擇最佳品設計方案之決策分析模式。國立臺灣科技大學設計研究所博士學位論文,未出版。new window
鄭滄濱(2001)。軟體組織提昇人員能力之成熟度模糊評估模式。國立臺灣科技大學資訊管理系研究所碩士論文,未出版,臺北市。
賴建宏(2006)。情治分立與情報監督-英國與國之制度比較。中央警察大學外事警察研究所,未出版,桃園縣。
駱叔君(2006)。美國公平信用報告法。臺北:財團法人金融聯合徵信中心。
蘇柏毓(2009)。美國聯邦交易委員會延展紅旗規則之施行日。資策會法律科技研究所。取自http://140.92.88.53/ContentPage.aspx?i=3192

貳、外文文獻
Allison, S.F.H., Schuck, A.M. & Lersch, K.M. (2005). Exploring the Crime of Identity Theft: Prevalence, Clearance Rates, and Victim/Offender Characteristics. Journal of Criminal Justice, 33, 19-29.
Anderson, K.B. (2006). Who Are the Victims of Identity Theft? The Effect of Demographics. Journal of Public Policy & Marketing, 25(2), 160-171.
Australian Centre for Policing Research, ACPR. (2004). Standardisation of Definitions of Identity Crime Terms – Discussion Paper. Prepared by the Australasian Centre for Policing Research (ACPR) for Police Commissioners' Australasian Identity Crime Working Partyand the AUSTRAC POI Steering Committee. Retrieved August 1, 2013, from http://www.acpr.gov.au/pdf/Standdefinit.pdfnew window
Bellah, J. (2001). Training: Identity Theft. Law and Order, 49(10), 222-226.
Berg, S. E. (2006). Recommendations for a Comprehensive Identity Theft Victimization Survey Framework and Information Technology Prevention Strategies. Retrieved August 1, 2013, from http://www.sparsa.org/files/research/IDTheftVictim.pdfnew window
BrØnn, P. S. & BrØnn, C. (2003). A Reflective Stakeholder Approach: Co-Orientation Abasis for Communication and Learning. Journal of Communication Management, 7(4), 291-303
Canadian Internet Policy and Public Interest Clinic, CIPPIC. (2007a). Techniques of Identity Theft. Cippic Working Papers, 2, 1-39. Retrieved May 22, 2013, from http://www.cippic.ca/sites/default/files/bulletins/Introduction.pdf
Canadian Internet Policy and Public Interest Clinic, CIPPIC. (2007b). Legislative Approaches to Identity Theft: An Overview. Cippic Working Papers, 3, 1-24. Retrieved February 6, 2014, from http://www.cippic.ca/sites/default/files/bulletins/Introduction.pdf
Cavoukian, A. (1997). Identity Theft: Who’s using your name? Toronto: Information and Privacy Commissioner of Ontario.
Copes, H., Kerley, K. R., Huff, R., & Kane, J. (2010). Differentiating Identity Theft: An Exploratory Study of Victims Using a National Victimization Survey. Journal of Criminal Justice, 38, 1045-1052.
Council of Australian Governments Agreement to a National Identity Security Strategy. (2007). An Agreement to a National Identity Security Strategy. Australia Government, 1-9.
Davis, E.S. (2003). A World Wide Problem on the World Wide Web: International Responses to Transnational Identity Theft via the Internet. Washington University Journal of Law & Policy, 12, 201-227
Dytczak, M. & Ginda, G. (2009). Identification of Building Repair Policy Choice Criteria Role. Technological and Economic Development of Economy, 15(2), 213-228.
Eisenstein, E.M. (2007). Identity Theft: An Exploratory Study With Implications for Marketers. Journal of Business Research, 61, 1160–1172.
Federal Trade Commission, FTC (2003). When Bad Things Happen to Your Good Name. Retrieved August 05, 2013, from http://www.ftc.gov/bcp/edu/microsites/idtheft/
Federal Trade Commission, FTC. (2012). Consumer Sentinel Network, Data Book, from January-December, 2012. Washington, DC: Federal Trade Commission.
Fichtman, P. (2001). Preventing Credit Card Fraud and Identity Theft: A Primer for Online Merchants. Information Systems Security, 10(5), 1-8.
Finklea, K. M. (2012). Identity Theft: Trends and Issues. Congressional Research Service. Retrieved June 29, 2013, from http://www.fas.org/sgp/crs/misc/R40599.pdf
Gordon, G. R., Rebovich, D., Choo, K. S., & Gordon, J. B. (2007). Identity Fraud Trends and Patterns: Building a Data-Based Foundation for Proactive Enforcement. Center for Identity Management and Information Protection, Utica College, OJP, BJA Grant No. 2006-DD-BX-K086.
Gordon, G.R., Willox, N.A., Rebovich, D.J., Regan, T.M., & Gordon, J.B. (2004). Identity Fraud: A Critical National and Global Threat. Journal of Economic Crime Management, 1-48.
Hazelah, A., Ismail, N.N. & Hashim, R. (2011). Identity Theft Awareness among City Dwellers in Malaysia. Journal of Information Assurance and Cybersecurity, 1-8.
Hoar, S.B. (2001). Identity Theft: The Crime of the New Millennium. USA Bulletin, 49(2), 1-10. Retrieved July 31, 2013, from: http://www.usdoj.gov/criminal/cybercrime/usamarch2001_3.htm
Jamieson, R., Land, L., Stephens, G. & Winchester, D. (2008). Identity Crime: The Need for an Appropriate Government Strategy. Forum on Public Policy Online, Spring edition, 1-33.
Ji, S. B., Smith-Chao, S. & Min, Q. F. (2008). Systems Plan for Combating Identity Theft-A Theoretical Framework. J. Serv. Sci. & Management, 2008(1): 143-152new window
Kresse, W., Watland, K. & Lucki, J. (2007). Identity Theft: Findings and Public Policy Recommendations. Final report to the Institute for Fraud Prevention. Retrieved July 30, 2013, from http://info.ethicspoint.com/files/web_seminars/2008/Red_Flag/Identity_Theft_Xavier_Study.pdf
Kumar, U., Kumar, V. & Shareef, M.A. (2007). Measure to Prevent/Control Identity Theft: Relations with Sources. Carleton University
Lacoste, J. & Tremblay, P. (2003). Crime Innovation: A Script Analysis of Patterns in Check Forgery. Crime Prevention Studies, 16, 171-198.
Lai, F., Li, D. & Hsieh, C.T. (2012). Fighting Identity Theft: The Coping Perspective. Decision Support Systems, 52, 353-363
Lawson, P. (2009). Identity-Related Crime Victim Issues: A Discussion Paper. Commission on Crime Prevention and Criminal Justice.
Lawson, P. (2011). Responding to Victims of Identity Crime: A Manual for Law Enfocement Agents, Prosecutors and Policy-Makers. International Center for Criminal Law Reform and Criminal Justice Policy.
Leland, J. (2006). Meth Users, Attuned to Detail, Add Another Habit: ID Theft. New York Times, July 11.
Lin, C. J., & Wu, W. W. (2008). A causal analytical method for group Decision-Making under fuzzy environment. Expert System with Applications, 34(1), 205-213.new window
Mativat, F., & Tremblay, P. (1997). Counterfeiting Credit Cards: Displacement Effects, Suitable Offenders, and Crime Wave Patterns. British Journal of Criminology , 37(2), 165–183.
Meulen, N. V. D. (2006). The Challenge of Countering Identity Theft: Recent Developments in the United States, the United Kingdom, and the European Union. Report Commissioned by the National Infrastructure Cyber Crime Program. Retrieved July 30, 2013, from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.103.6835&rep=rep1&type=pdfnew window
Milne, G.R. (2003). How Well Do Consumers Protect Themselves from Identity Theft? Journal of Consumer Affairs, 37(2), 388-402.
Newman, G.R. & Clarke, R. (2005). Superhighway Robbery: Preventing E-Commerce Crime. London: Willan
Newman, G.R. & McNally, M. (2005). Identity Theft Literature Review. Paper Prepared for the National Institute of Justice Focus Group M-eetings. Washington, DC: U.S. Department of Justice, National Institute of Justice. Retrieved July 30, 2013, from http://www.ncjrs.gov/pdffiles1/nij/grants/210459.pdf
Newman, G.R. & McNally, M. (2008). Perspectives on Identity Theft. Monsey, NY: Criminal Justice Press.
Newman, G.R. (2004). Identity Theft. Problem-Oriented Guides for Police, Problem-Specific Guides Series, 25, 1-64. U.S., Department of Justice, Retrieved June 29, 2013, from http://www.cops.usdoj.gov.
Office of Community Oriented Policing Services, COPS. (2006). A National Strategy to Combat Identity Theft. US. Department of Justice, Major Cities Chiefs Association, Division of Public Safety Leadership, Johns Hopkins University. Retrieved June 29, 2013, from http://www.asisonline.org/newsroom/crisisResponse/0205idtheft.pdf
Organization for Economic Co-Opearation and Development, OECD. (2007). The Development of Policies for the Protection of Critical Information Infrastructures. OECD Ministerial Meeting on the Future of the Internet Economy. Retrieved August 05, 2013, from http://www.oecd.org/sti/40761118.pdf
Ou Yang, Y. P., Shieh, H. M., Leu, J. D., & Tzeng, G. H. (2008). A novel hybrid MCDM model combined with DEMATEL and ANP with applications. International Journal of Operations Research, 5(3), 1-9.
Perl, M. W. (2003). It Is Not Always About Money: Why the State Identity Theft Laws Fail to Adequately Address Criminal Record Identity Theft. Journal of Criminal Law and Criminology, 94 (1).new window
Porter, D. (2004). Identity Fraud: the Stealth Threat to UK plc. Computer Fraud & Security, July, 7, 4-6.
President's Identity Theft Task Force. (2007). Combating Identity Theft: A Strategic Plan. Retrieved May 05, 2013, from http://www.idtheft.gov/reports/StrategicPlan.pdf
Privacy and American Business. (2003). Identity theft: New survey and trend report. Retrieved December 29, 2012, from http://www.bbbonline.org/idtheft/IDTheftSrvyAug03.pdf
Resing, M. D., Pratt, T.C. & Holtfreter, K. (2009). Perceived Risk of Internet Theft Victimization: Examining the Effects of Social Vulnerability and Financial Impulsivity. Criminal Justice and Behavior, 36, 369-384.
Reyns, B. W. (2011). Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory Beyond Direct-Contact Offenses. Journal of Research in Crime and Delinquency, 1-22.
Robinson , N., Graux, H., Parrilli, D.M., Klautzer, L. & Valeri, L.(2011). Comparative Study on Legislative and Non Legislative MEASURES to Combat Identity Theft and Identity Related Crime: Final Report. Prepared for DG Home Affairs.
Romanosky, S., Telang, R. & Acquisti, A. (2008). Do Data Breach Laws Reduce Identity Theft? Heinz School of Public Policy and Management, Carnegie Mellon University. Retrieved June 8, 2012, from http://weis2008.econinfosec.org/papers/Romanosky.pdf
Skulmoski, G.J., Hartman, F.T. & Krahn, J. (2007). The Delphi Method for Graduate Research. Journal of Information Technology Education, 6, 1-21.
Sproule, S. & Archer, N. (2006). Defining Identity Theft - A Discussion Paper. McMaster eBusiness Research Centre, Ontario.
Synovate. (2006). Federal Ttrade Commission—Identity Theft Survey Report. Retrieved May 05, 2013, from http://www.ftc.gov/os/2013/05/SynovateFinalReportIDTheft2006.pdf
Synovate. (2007). Federal Trade Commission—2006 identity theft survey report. Retrieved December 29, 2012, from http://www.ftc.gov/os/2012/29/SynovateFinalReportIDTheft2006.pdf
The President’s Identity Theft Task Force. (2007). Combating Identity Theft. A Strategic Plan. Retrieved July 21, 2014, from http://www.aicpa.org/interestareas/informationtechnology/resources/privacy/downloadabledocuments/combating_identity_theft_a_strategic_plan.pdf
Tzeng et al. (2007).Evaluating Intertwined Effects in E-learning Programs: A Novel Hybrid MCDM Model Based on Factor Analysis and DEMATEL. Expert Systems with Applications, 32(4), 1028-1044.
Wang , W. , Yuan, Y. , & Archer, N. (2006). Identity Theft: A Contextual Framework for Combating Identity Theft. IEEE Security and Privacy, 4(2), 30-38.
Wang, S.K. & Huang, W. (2011). The Evolutional View of the Types of Identity Thefts and Online Frauds in the Era of the Internet. Internet Journal of Criminology, 1-21.
White, M.D. & Fisher, C. (2008). Assessing Our Knowledge of Identity Theft: The Challenges to Effective Prevention and Control Efforts. Criminal Justice Policy Review, 19(3), 1-24.
Willox, N.A. & Regan, T. M. (2002). Identity Fraud: Providing a Solution. Journal of Economic Crime Management, Summer, 1, 1-15.new window
Winterdyk, J. & Filipuzzi, N. (2009). Identity Theft: Comparing Candian and Mexican Students’ Perceptions and Awareness and Risk of Victimization. International Review of Victimology, 16, 309-337.
Winterdyk, J. & Thompson, N. (2008). Student and Non-Student Perceptions and Awareness of IdentityTheft. Canadian Journal of Criminology and Criminal Justice, April, 153-186
Winterdyk, J., Thompson, M. & Antonopolous, G. (2007). Identity Theft: A Comparative Study of Student Awareness. Canadian Journal of Police & Security Services, 5(1/2), 23-28.new window
Wu, W. W. & Lee,Y. T. (2007). Developing Global Managers’ Competencies Using Fuzzy DEMATEL Method. Expert System with Applications, 32(2), 499-507.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top