Internet Frauds Cases Analysis and Investigation Mechanism
碩士 === 國立宜蘭大學 === 多媒體網路通訊數位學習碩士在職專班 === 103 === Internet is immediate, convenient, interopearable, occult, without boundary, time limit, and geographical restrictions and hence cybercrime becomes more rampant. "Science and technology", "Investigation and Prevention" are important...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2015
|
Online Access: | http://ndltd.ncl.edu.tw/handle/37610288163222318125 |
id |
ndltd-TW-103NIU01652017 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-103NIU016520172017-01-28T04:16:16Z http://ndltd.ncl.edu.tw/handle/37610288163222318125 Internet Frauds Cases Analysis and Investigation Mechanism 網路詐欺犯罪模式分析與偵查模式之研究 Jui-Chin Chen 陳瑞金 碩士 國立宜蘭大學 多媒體網路通訊數位學習碩士在職專班 103 Internet is immediate, convenient, interopearable, occult, without boundary, time limit, and geographical restrictions and hence cybercrime becomes more rampant. "Science and technology", "Investigation and Prevention" are important security stratege of National Police Agency. Through science and technology in handling cases, there are more effective ways to eliminate crimes. In order to cope with emerging technology crime, we actively train scientific and technological personnel, expan software and hardware facilities, strengthen intelligence analysis ability to integrate resources.How to achieve our goal of "science and technology","Investigation and Prevention", the integration of Interpol and technology, the establishment of science and technology police system, actively training of scientific and police professionals and enhance the effectiveness of criminal investigation would be a major issue. This article will focus on the current cyber-crime cases and take “Internet fraud” as an example, analyze and discuss them in order to understand the motives of the crime, the characteristics and practices. We must conclude the investigation of crime patterns and construct viable manner and mechanisms to provide investigators to handle the case as a reference, to detect patterns. Therefore, we can enhance the effectiveness and efficiency of investigation, prevent the increase in Internet fraud, and protect people’s rights. This research will cover 396 (2004 -2014) cyber crime cases which were solved by the Criminal Investigator Bureau through crime analysis framework method. These cases will help us undertand the characteristics, the types, the locations, the time of cyber crime, offender’s age, offender’s status, crime’s patterns, motive, damage, and prosecution. Then we will further analyze the “Internet fraud” case by case to find internet fraud patterns and construct a model and mechanism for the criminal investigation along with interviewing with senior police advicer to view and amend criminal investigation mode. Therefore, the results can improve the effectiveness of Internet fraud investigations and in this way, more internet fraud cases can be solved. Han Chieh Chao I-Long Lin 趙涵捷 林宜隆 2015 學位論文 ; thesis 117 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立宜蘭大學 === 多媒體網路通訊數位學習碩士在職專班 === 103 === Internet is immediate, convenient, interopearable, occult, without boundary, time limit, and geographical restrictions and hence cybercrime becomes more rampant.
"Science and technology", "Investigation and Prevention" are important security stratege of National Police Agency. Through science and technology in handling cases, there are more effective ways to eliminate crimes. In order to cope with emerging technology crime, we actively train scientific and technological personnel, expan software and hardware facilities, strengthen intelligence analysis ability to integrate resources.How to achieve our goal of "science and technology","Investigation and Prevention", the integration of Interpol and technology, the establishment of science and technology police system, actively training of scientific and police professionals and enhance the effectiveness of criminal investigation would be a major issue.
This article will focus on the current cyber-crime cases and take “Internet fraud” as an example, analyze and discuss them in order to understand the motives of the crime, the characteristics and practices. We must conclude the investigation of crime patterns and construct viable manner and mechanisms to provide investigators to handle the case as a reference, to detect patterns. Therefore, we can enhance the effectiveness and efficiency of investigation, prevent the increase in Internet fraud, and protect people’s rights.
This research will cover 396 (2004 -2014) cyber crime cases which were solved by the Criminal Investigator Bureau through crime analysis framework method. These cases will help us undertand the characteristics, the types, the locations, the time of cyber crime, offender’s age, offender’s status, crime’s patterns, motive, damage, and prosecution. Then we will further analyze the “Internet fraud” case by case to find internet fraud patterns and construct a model and mechanism for the criminal investigation along with interviewing with senior police advicer to view and amend criminal investigation mode. Therefore, the results can improve the effectiveness of Internet fraud investigations and in this way, more internet fraud cases can be solved.
|
author2 |
Han Chieh Chao |
author_facet |
Han Chieh Chao Jui-Chin Chen 陳瑞金 |
author |
Jui-Chin Chen 陳瑞金 |
spellingShingle |
Jui-Chin Chen 陳瑞金 Internet Frauds Cases Analysis and Investigation Mechanism |
author_sort |
Jui-Chin Chen |
title |
Internet Frauds Cases Analysis and Investigation Mechanism |
title_short |
Internet Frauds Cases Analysis and Investigation Mechanism |
title_full |
Internet Frauds Cases Analysis and Investigation Mechanism |
title_fullStr |
Internet Frauds Cases Analysis and Investigation Mechanism |
title_full_unstemmed |
Internet Frauds Cases Analysis and Investigation Mechanism |
title_sort |
internet frauds cases analysis and investigation mechanism |
publishDate |
2015 |
url |
http://ndltd.ncl.edu.tw/handle/37610288163222318125 |
work_keys_str_mv |
AT juichinchen internetfraudscasesanalysisandinvestigationmechanism AT chénruìjīn internetfraudscasesanalysisandinvestigationmechanism AT juichinchen wǎnglùzhàqīfànzuìmóshìfēnxīyǔzhēnchámóshìzhīyánjiū AT chénruìjīn wǎnglùzhàqīfànzuìmóshìfēnxīyǔzhēnchámóshìzhīyánjiū |
_version_ |
1718410322611535872 |