Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
    • Advisor
  • Search TDR
  • Rights Q&A
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 社會科學院
  3. 國家發展研究所
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/86423
Full metadata record
???org.dspace.app.webui.jsptag.ItemTag.dcfield???ValueLanguage
dc.contributor.advisor唐代彪(De-Piao Tang)
dc.contributor.authorChih -kuo Changen
dc.contributor.author張致國zh_TW
dc.date.accessioned2023-03-19T23:54:56Z-
dc.date.copyright2022-08-23
dc.date.issued2022
dc.date.submitted2022-08-19
dc.identifier.citation孟維德(2017)。〈組織犯罪、全球化及其預防〉,《涉外執法與政策學報》107年5月(8) :81-107。 馬財專(2010)。〈台灣組織及個體販毒網絡之質化考察〉,《人文及社會科學集刊》22(3) :353-392。 法務部(2022)。〈法務部統計資訊網〉。https://www.rjsd.moj.gov.tw/rjsdweb/book/Book.aspx?category_id=4。2022/3/10檢索。 曾雅芬(2016)。《行騙天下:臺灣跨境電信詐欺犯罪網絡之分析》。臺北:國立政治大學國家發展研究所,博士論文。 內政部警政署刑事警察局(2022)。〈內政部警政署刑事警察局全球資訊網〉。https://cib.npa.gov.tw/ch/app/data/list?module=wg136&id=2053。2022/3/10檢索。 黃友岳(2015)。《適地性社群資料分析在犯罪預測之應用》。臺北:國立台灣大學電機工程學研究所,碩士論文。 黃薇菁譯,Dunbar, R. (原著)(1992)。《150法則:從演化角度解密人類的社會行為》。台北:商周出版社。 汪明亮(2010)。〈社會網絡分析之犯罪學意義〉,《法律科學》2010(6) :47。 Alba, R.D. (1973). “A graph-theoretic definition of a sociometric clique.” Journal of Mathematical Sociology.3: 113-126. Bailey, L., Harinam1 V., Ariel B.(2020). Victims, offenders and victim-offender overlaps of knife crime: A social network analysis approach using police records. . PLoS ONE 15(12): e0242621. Barnes, J. A. (1954). “Class and committees in a norwegian island parish. ”Human Relations. 7(1):39–58. Bastomski,Sara., Brazil,N. and Papachristos,A.V. (2017).“Neighborhood co-offending networks, structural embeddedness, and violent crime in Chicago.” Social Networks Vol. 51:23-29. Bichler, G., Lim, S. and Larin, E. (2016). “Tactical social network analysis: using affiliation networks to aid serial homicide investigation. ”Homicide Studies. 21(2):133–158. Bonacich, P. (1972). “ Factoring and weighting approaches to status scores and clique identification. ” Journal of Mathematical Sociology,.2(1): 113-120. Bouchard, M. and Konaraski, R. (2014). “Assessing the core membership of a youth gang from its co-offending network. ” Crime and networks. ed. by Morselli, C. New York :Routledge, 81–93 Brantingham, P., & Brantingham, P. (1984). Patterns in crime. New York: Macmillan. Brantingham, P., Brantingham, P. (1993). “Nodes, paths, and edges: consideration onthe complexity of crime and the physical environment”. J. Environ. Psychol. 13,328. Bright, D. A., Greenhill, C., Reynolds, M., Ritter, A., Morselli, C. (2015). “The use of actor-level attributes and centrality measures to identify key actors: A case study of an australian drug trafficking network. ”Journal of ContemporaryCriminal Justice (2015) 31(3): 262-278. Burt, R. S. (2009). Structural holes: The social structure of competition. Harvard University Press. Cohen ,L. E. and Felson, M. (1979). “Social change and crime rate trends: A routine activity approach. ” American Sociological Review 44(4) : 588-608. Cornish, D. B., and Clarke, R. V. (1986). The reasoning criminal: Rational choice perspectives on offending. New York: Springer. Collins, R. (1988). Theoretical sociology. New York: Harcourt Brace Jovanovich. Duxbury S, Haynie D.(2018) The network structure of opioid distribution on a darknet cryptomarket. Journal of Quantitative Criminology .34(4): 921–941. Eagle, N., Pentland, A., Lazer, D. (2007). “Inferring social network structure using mobile phone data. ”Proceedings of the National Academy of Sciences (PNAS) (106): 15,274-15,278. Felson, M. and Clark ,R. V. (1998). Opportunity makes the thief: Practical theory for crime prevention. Great Britain: Home office, Policing and Reducing Crime Unit. Freeman, L. C. (1979). “Centrality in social networks: Conceptual clarification. ”Social Networks 1(3): 215-239. Friedkin, N.E. (1981). “The development of structure in random networks: an analysis of the effects of increasing network density on five measures of structure. ”Social Network. 3(1):41–52 Granovetter, M. S. (1973). “The strength of weak ties.” American Journal of Sociology.78(6):1360-1380. Hindelang, M. J., Gottfredson, M. R., Garofalo J. (1978) Victims of personal crime: A empirical foundation for a theory of personal victimization . Cambridge, M.A.: Ballinger. Hirschi, T. (2002). Causes of delinquency . London: Routledge. Huang Yu-Yueh., Li Cheng-Te., Jeng Shyh-Kang. (2015). “Mining location-based social networks for criminal activity prediction. ” 2015 24th Wireless and Optical Communication Conference (WOCC). Hughes, C. E., Bright, D. A. and Chalmers, J.(2017).“Social network analysis of Australian poly-drug trafficking networks: How do drug traffickers manage multiple illicit drugs? ”Social Networks vol. 51:135-147. Krebs, V. E. (2001). “Mapping networks of terrorist cells. ” Connections. 24(3): 43-52. Lazzati, N. and Menichini, A. A. (2016). Hot spot policing: A study of place-based strategies for crime prevention. Southern Economic Journal 82(3):893-913. Leong, K. and Sung, A. (2015). “A review of spatio-temporal pattern analysis approaches on crime analysis. ”International E-journal of Criminal Sciences,9:1-33. Malm, A., Schoepfer, A., Bichler, G. and Boyd, N. “Pushing the Ponzi: the rise and fall of network fraud. ” Crime and networks. ed. by Morselli, C. New York :Routledge. 249–262. Merton, R.K. (1938). “Social structure and anomie.” American Sociological Review. (3): 672–682. Nash, R., Bouchard, M. and Malm,A. (2013). “Investing in people: the role of social networks in the diffusion of a large-scale fraud. ” Social Network. 35(4), 686-698. Merton, R.K. (1938). “Social structure and anomie.” American Sociological Review. (3): 672–682. Morselli, C., Giguere C., Petit K.(2007) The efficiency/security trade-off in criminal networks. Social Networks . 29(1): 143–153. Morselli, C., Petit K., Law-enforcement disruption of a drug importation network. Glob. Crime 8(2), 109–130 (2007) Morselli, C., Assessing vulnerable and strategic positions in a criminal network. J. Contemp. Crim. Justice 26(4), 382–392 (2010) Papachristos, A.V., Braga, A.A., Piza, E. and Grossman, L. S. (2015). “The company you keep? the spillover effects of gang membership on individual gunshot victimization in a co-offending network. ” Criminol. 53(4): 624-649 . Ratcliffe, J. H. (2008). Intelligence led policing. Cullompton:Willan Publishing. Ronald, L. S., and Callie ,H. Burt. (2011). “Learning to be bad: adverse social conditions, social schemas, and crime”. Criminology 49(2): 553– 598. Scott N, Baggio R, Cooper C. (2008). Network analysis and tourism: From theory to practice. New York:Channel View Publications. Seidman, S. and Foster, B. (1978). “Social network analysis and modeling system.”Social Networks. 2: 85-90. Shakila, K . R., Ke, D. , Flora , D. S. (2018). “Crime event prediction with dynamic features”. EPJ Data Science. (2018) 7:43. Slutkin, G. (2017). “Reducing violence as the next great public health achievement.” Nature Human Behaviour. 10 Jan 2017. Sparrow, M.K. (1991). “The application of network analysis to criminal intelligence: an assessment of the prospects. ”Social Network. 13(3): 251–274. Sutherland, E. H. (1939). Principles of criminology 3rd ed..Chicago: Philadelphia J.B. Lippincott Company. Tsai Fu-Ching, Hsu Ming-Chun , Chen Chien-Ta , Kao Da-Yu. (2019).“Exploring drug-related crimes with social network analysis Systems. ” Procedia Computer Science.159:1907-1917. Xiao Xiangye, Zheng Yu, Luo Qiong , Xie Xing (2010). “Finding similar users using category-based location history”.Proceedings of the 18th SIGSPATIAL international conference on advances in geographic information systems:442-445. New York: Association for Computing Machinery.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/86423-
dc.description.abstract在資通訊技術的進步下,警方現行執行勤務所使用的警用行動載具M-Police,可透過各項警政APP輔助員警各項警察任務,由於M-Police是員警執勤時的必要裝備,故其查詢之日誌紀錄即為員警的攔查或臨檢的紀錄歷程,且其後台查詢紀錄亦包含時間及座標位置,資料具有深入分析的價值。 本研究利用員警的盤查紀錄建立犯罪者的社會接觸網絡,再以故意殺人、竊盜、毒品、詐欺、賭博、槍砲刀械及妨害性自主案件等犯罪類型,建立各犯罪類型之社會接觸網絡,以社會網絡分析(Social Network Analysis,SNA)對不同犯罪類型之網絡進行驗證分析,透過分析網絡的密度(Density)及群聚係數(Clustering coefficient)探討網絡的凝聚程度(Cohesion),以及分析不同犯罪角色的連線中心性(Degree Centrality)、介數中心性(Betweenness Centrality)及接近中心性(Closeness Centrality)等中心性指標,探討不同犯罪角色在網絡中的呈現特性。 研究結果發現,不同犯罪類型所形成之網絡型態大相逕庭,在傳統暴力犯罪類型中,犯罪者之間並未發現接觸紀錄,故社會網絡分析針對此犯罪類型,可提供刑案偵查或犯罪預防之效果有限。但在毒品及詐欺犯罪中,不同犯罪者之間接觸的情形複雜。毒品犯罪角色不同,則網絡中呈現的樣貌也有所差異,其中以毒品施用者最積極與他人建立關係,毒品犯罪角色位階越高,其網絡的連線中心性及介數中心性呈現越低,接近中心性越高,代表高階毒品犯罪者雖然盡量減少與其他節點接觸,但卻身處網絡的中心,具備獨立性;而詐欺犯罪者呈現恰好與毒品犯罪者相反,犯罪角色位階越高,連線中心性及介數中心性呈現越高,接近中心性越低,代表低階詐欺犯罪者大多各自為政,反倒是高階詐欺犯罪者基於犯罪需要,必須與其他犯罪者建立關係。zh_TW
dc.description.abstractDue to the advancement of information and communication technology, M-Police, currently used by the police to perform everyday duties, can assist police officers in numerous police tasks through various apps. Since the M-Police is necessary for police officers on duty, the log records of the query are the records of the police's interception or inspection, and its background include time and coordinate position. Therefore In-depth analysis to this data are highly valued. This research used the police investigation records to establish the social contact network of criminals, and then establishes social contacts for each type of crimes, such as intentional homicide, theft, drugs, fraud, gambling, guns and knives, and cases of obstructing sexual autonomy. IT used Social Network Analysis to verify and analyze the network of different types of crimes, analyzed the density and the clustering coefficient of the network to explore the degree of network cohesion, and analyzed Centrality indicators such as Degree Centrality, Betweenness Centrality and Closeness Centrality of different criminal roles to explore the revealing characteristics of different criminal roles in the network. The results of the study found that the style of networks form by different types of crimes are so different. In the types of traditional violent crimes, no contact records were found between offenders. Social network analysis can neither provide information on criminal investigation nor crime prevention for this type of crime, the effect is limited. However, in the case of drug and fraud crimes, the interacting between different offenders are complex. The appearances of different roles in the drug crime performance differently. Drug users prefer to establish relationships most proactively. The higher the rank of the drug crime role is, the lower Degree Centrality and Betweenness Centrality it shows. The higher Closeness Centrality presents that although the higher-level drug criminals try to minimize contact with other nodes, they are in the center of the network with independence. Fraud offenders, however, appear to be the exact opposite of drug offenders. The higher the rank of the drug crime role is, the higher Degree Centrality and Betweenness Centrality it shows. The lower Closeness Centrality presents that Low-level fraud offenders mostly act on their own, but high-level fraud offenders must establish relationships with other offenders based on criminal needs.en
dc.description.provenanceMade available in DSpace on 2023-03-19T23:54:56Z (GMT). No. of bitstreams: 1
U0001-1508202210293500.pdf: 2560376 bytes, checksum: a1471330d935e31611cd3cb075e031fa (MD5)
Previous issue date: 2022
en
dc.description.tableofcontents第一章 緒論 1 第一節 研究緣起與問題意識 1 第二節 研究目的與主要研究問題 3 第二章 相關理論回顧與文獻探討 8 第一節 整體犯罪社會網絡分析研究 9 第二節 個體犯罪社會網絡分析研究 10 第三節 基於位置的社交網絡應用 11 第四節 相關犯罪學理論研究 12 第五節 文獻綜評 14 第三章 研究設計 17 第一節 研究架構與研究假設 17 第二節 研究途徑、工具與流程 20 第三節 研究限制 30 第四節 研究對象與資料來源 31 第四章 資料分析 33 第一節 犯罪類型凝聚程度 33 第二節 犯罪者角色中心性指標 42 第三節 綜合分析結果 44 第五章 結論 53 第一節 主要研究發現 53 第二節 後續研究建議 56 第三節 政策建議 56 參考文獻 59 附錄 65 圖表目錄 圖1 歷年全般刑案發生數 4 圖2各類案件佔全般刑案比例 5 圖3詐欺案件被害總金額 5 圖4毒品查獲純質淨重 6 圖5研究架構圖 19 圖6研究流程圖 26 圖7各類犯罪網絡孤點比例圖 33 圖8竊盜案類整體網絡結構圖 34 圖9賭博案類整體網絡結構圖 35 圖10槍砲刀械案類整體網絡結構圖 37 圖11詐欺案類整體網絡結構圖 38 圖12故意殺人案類整體網絡結構圖 39 圖13 妨害性自主案類整體網絡結構圖 40 圖14 毒品案類整體網絡結構圖 41 圖15各階級犯罪角色連線中心性指標 47 圖16各階級犯罪角色介數中心性指標 48 圖17各階級犯罪角色接近中心性指標 48 圖18毒品案類角色分階級網絡圖 50 圖19毒品案類角色分階級網絡圖 51 表1毒品犯罪角色分級表 29 表2詐欺犯罪角色分級表 29 表3竊盜案類凝聚程度相關數據彙整表 35 表4賭博案類凝聚程度相關數據彙整表 36 表5槍砲刀械案類凝聚程度相關數據彙整表 37 表6詐欺案類凝聚力相關數據彙整表 38 表7故意殺人案類凝聚力相關數據彙整表 40 表8妨害性自主案類凝聚力相關數據彙整表 41 表9毒品案類凝聚力相關數據彙整表 42 表10毒品犯罪角色中心性指標分析表 43 表11詐欺犯罪角色中心性指標分析表 44 表12各犯罪類型凝聚程度比較分析 45 表13毒品犯罪角色分區密度表 49 表14詐欺犯罪角色分區密度表 50 表15犯罪網絡被害人數表 52
dc.language.isozh-TW
dc.subject警用行動載具zh_TW
dc.subject中心性指標zh_TW
dc.subject凝聚程度zh_TW
dc.subject警用行動載具zh_TW
dc.subject社會網絡分析zh_TW
dc.subject犯罪網絡zh_TW
dc.subject中心性指標zh_TW
dc.subject犯罪網絡zh_TW
dc.subject社會網絡分析zh_TW
dc.subject凝聚程度zh_TW
dc.subjectcriminal networken
dc.subjectM-Policeen
dc.subjectsocial network analysisen
dc.subjectsocial network analysisen
dc.subjectM-Policeen
dc.subjectCohesionen
dc.subjectcriminal networken
dc.subjectCentralityen
dc.subjectCohesionen
dc.subjectCentralityen
dc.titleM-Police查詢紀錄之應用-犯罪者社會網絡之研究zh_TW
dc.titleThe Application of M-Police Log Recording: Research on the Social Network of Criminalsen
dc.typeThesis
dc.date.schoolyear110-2
dc.description.degree碩士
dc.contributor.coadvisor鄧志松(Chih-Sung Teng)
dc.contributor.oralexamcommittee周嘉辰(Chia-Chen Chou),馬財專(Tsai-Chuan Ma)
dc.subject.keyword犯罪網絡,社會網絡分析,警用行動載具,凝聚程度,中心性指標,zh_TW
dc.subject.keywordcriminal network,social network analysis,M-Police,Cohesion,Centrality,en
dc.relation.page80
dc.identifier.doi10.6342/NTU202202389
dc.rights.note同意授權(全球公開)
dc.date.accepted2022-08-19
dc.contributor.author-college社會科學院zh_TW
dc.contributor.author-dept國家發展研究所zh_TW
dc.date.embargo-lift2022-08-23-
Appears in Collections:國家發展研究所

Files in This Item:
File SizeFormat 
U0001-1508202210293500.pdf2.5 MBAdobe PDFView/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved