Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/150231
|
Title: | 失財記事-社群平臺詐騙自述之敘事探索 Properties loss – the exploration of self-narrative defrauded experience post on social media |
Authors: | 宋守珏 Sung, Shou-Chueh |
Contributors: | 陳百齡 Chen, Pai-Lin 宋守珏 Sung, Shou-Chueh |
Keywords: | 犯罪學 社群詐騙 敘事理論 論述分析 故事原型 Criminology Social fraud Narrative theory Discourse analysis Story archetype |
Date: | 2024 |
Issue Date: | 2024-03-01 14:02:20 (UTC+8) |
Abstract: | 近年來詐騙作為新聞頭條時有所見,甚至串流影音平臺以社群詐騙為戲劇題材,也創造極高收視,可見詐騙吸金與吸睛的能力。然而雖有媒體大量報導與警政單位的不斷呼籲,但每天都有人上當受騙,這些也反映在社群平臺上激增的失財記事發文數量中。到底這些社群詐騙(Social fraud)被害人,是被什麼故事情節勾引,而深信不疑?過去關於詐騙的研究,多半著重在傳統的犯罪學視角,著重在詐騙類型樣態與手法等特徵化分析,試圖給予預防犯罪與提前偵測的作用。然而詐騙作為一個加害人與被害人高度互動,運用話術說服的過程,需要納入傳播學與敘事學的研究視角,來看待詐騙兩大元素:(1)人包含角色與互動;與(2)事包含騙術與詐騙敘事。 又,社群上失財記事的發文,是反應當代社會情境脈絡如還看待被騙,而論述分析(discourse analysis)正是找出文本、社會與權力之間的關係。故,本研究從結構主義的敘事理論到後結構主義的論述分析,從失財記事文本中探索被害人聽到什麼相信什麼,詐騙集團敘說的故事,如何建構出當下的社會情境脈絡與世界觀。於是,提出以下三個面向的探索:(1)詐騙敘事中,角色與事件的敘事結構。(2)分享被騙失財經驗的論述分析。(3)詐騙敘事的故事原型。希冀透過本研究能夠喚起社會大眾對於現代社群詐騙的重視,能讓大眾在社群使用上,能多一分預防詐騙警覺與思維。 In recent years, fraud has become a recurring headline in the news, and even streaming video platforms have used social fraud as a dramatic theme, generating extremely high viewership. This illustrates the ability of fraud to attract both money and attention. Despite extensive media coverage and continuous appeals from law enforcement agencies, people continue to fall victim to scams every day, as evidenced by the increasing number of posts about financial losses on social media platforms. What stories and narratives entice these victims of social fraud to believe without skepticism? Previous research on fraud has mostly focused on traditional criminological perspectives, emphasizing characterisation of fraud types in an attempt to prevent and detect crime in advance. However, fraud, as a highly interactive process between perpetrators and victims, utilizing persuasive rhetoric, needs to be incorporated into the perspectives of communication and narrative studies to understand its two main elements: (1) people, including roles and interactions, and (2) events, encompassing deception techniques and fraud narrativ Moreover, the posting of financial loss incidents on social media reflects contemporary societal contexts in terms of how being deceived is perceived, and discourse analysis aims to uncover the relationships between fraud story , society, and power dynamics of viewers. Therefore, this study moves from structuralist narrative theory to post-structuralist discourse analysis, exploring what victims hear, believe, and the stories told by fraud groups, thereby constructing the social contexts and worldviews of the victims. Thus, the study proposes exploration in three dimensions: (1) the narrative structure of characters and events in fraud stories, (2) discourse analysis of shared experiences of being deceived and suffering financial losses, and (3) the story archetype of fraud narratives. It is hoped that this research will raise public awareness of modern social fraud and encourage vigilance and critical thinking in social media usage to prevent fraud. |
Reference: | 〈中華民國刑法〉(2023 年 2 月 8 日)。取自全國法規資料庫網頁https://law.moj.gov.tw/LawClass/LawParaDeatil.aspx?pcode=C0000001&bp=49 Graham(2022年8月16日)。〈假帳號詐騙V神怨 : IG上有5,000個我;CZ : LinkedIn上7000幣安員工僅50是真的〉,《動區新聞-專為區塊鏈而生的新聞網》。取自https://www.blocktempo.com/there-are-thousands-of-fake-employees-on-the-link-so-beware-of-scams-said-changpeng-zhao-ceo-of-money-security/ Similarweb (2023年10月)。〈台灣 熱門的社群媒體網路網站排名分析〉,《similarweb》。取至https://www.similarweb.com/zh-tw/top-websites/taiwan/computers-electronics-and-technology/social-networks-and-online-communities/ Simon Kemp (2022年2月15日)。〈DIGITAL 2022: Global Overview Report〉《datareportal》。取自https://datareportal.com/reports/digital-2021-global-overview-report Whoscall(2022年1月18日)。〈2021年度報告-深度解析全球與在地詐騙動態〉,《Whoscall官網》。取自 https://whoscall.com/zh-hant/blog/articles/279 于小軒(2011)。《詐騙被害情境分析》。臺灣科技大學工業管理系碩士論文。 大人物專欄(2021年12月9日)。〈秘台灣最大年輕人社群 Dcard 的行銷之道!匿名,讓分享不再受限〉 ,《國立政治大學商學院創新創業辦公室》。取自:https://oie.nccuc.tw/knowledge/view/17 內政部警政署(2023年1月13日)。〈假網拍排第一內政部公布111年詐騙手法〉(一月十三日新聞稿)【公告】。臺北市:內政部警政署。取自 https://www.moi.gov.tw/News_Content.aspx?n=4&s=275532 王文生(2005)。《新興詐欺犯罪被害人之研究-以台北縣假盜刷真詐財案件為例》。中央警察大學交通管理研究所碩士論文。 王秋惠(2007)。《網路詐欺被害特性與被害歷程之研究》。中央警察大學犯罪防治研究所碩士論文。 朱祖儀(2022年8月20日) 。〈詐騙系列停更真正原因曝光!Bump吐救人初衷「只想要贖罪」〉,《ETtoday新聞雲》。取自 https://www.ettoday.net/news/20220820/2320762.htm#ixzz7lNRUtcH4 江志慶(2005)。《ATM 轉帳詐欺犯罪的實證研究》。中央警察大學犯罪防治研究所碩士論文。 池晉煒(2022)。《竟是一場空:網路愛情詐騙被害歷程之研究》。中央警察大學犯罪防治研究所碩士論文。 何瑞玲(2012)。《詐騙集團是說故事高手?-從敘事理論解構詐騙集團的教戰手冊》。未出版之碩士論文,政治大學傳播學院碩士在職專班碩士論文。 吳佩臻(2022年3月 15日)。〈台灣人每天上網超過8小時!最新使用報告出爐,8大數據亮點幫助精準行銷。〉,《 數位時代 》。取自https://www.bnext.com.tw/article/68026/2022-internet-report 吳明恬(2014)。〈電影《賽德克‧巴萊》的敘事結構分析〉,臺灣師範大學大眾傳播研究所。 卓冠齊、董容慈、曾芯敏、陳柏逢(2022年)。〈誰偷走你口袋的錢,解密一頁式詐騙。〉,《公共P#新聞實驗室》。取自https://news.pts.org.tw/project/landing-page-scam/ 林東泰(2008)。《大眾傳播理論》。台北市:師大書苑。 林東泰(2015)。《敘事新聞與數位敘事》。臺北,臺灣:五南。 林昱萱、周裕翔、 蘇益賢(2020)。《 今天被騙了嗎? : 心理師教你破解詐騙伎倆 》。 台北市:時報文化。 林美珠、溫錦真(2018)。〈臺灣心理與諮商敘事研究之回顧與展望〉,《中華輔導與諮商學報》,(53),81-116。https://doi.org/10.3966/172851862018100053004 林清榮(2006)。《新興詐欺犯罪被害歷程之研究-以信用貸款詐欺為例》。國立中正大學犯罪防治所碩士論文,嘉義縣。 邱于芸(2014)。《用故事改變世界:文化脈絡與故事原型》。台北市:遠流 施伯燁(2007)。〈媒體即使用者,使用者即媒體〉,《傳播學研究》,92,193-202。 柯皓翔、洪琴宣、劉致昕 (2021年11月22日)。〈交友×PUA×假投資:分解「沉浸式詐騙」手法,你需要的4個反制手段。〉,《報導者》。取自https://www.twreporter.org/a/online-scams-solutions 研議網路詐騙防範措施委託研究計畫期末報告。《財團法人台灣網路資訊中心》。取自https://www.twnic.tw/file/08327b.pdf 唐偉勝(2013)。《文本、語境、讀者:當代美國敘事理論研究》。上海:世界圖 書出版公司。 桂裕芳譯(2008)。《嘔吐 》。台北市,志文出版。原書:Jean-Paul Sartre 「1938」La Nausée. Grant & Cutler 張慶振(2010)。《重建犯罪現場:網拍詐騙案例分析與詐騙情境樣態重建》。臺北大學資訊管理研究所碩士論文。 張耀中(2009)。〈「維基式犯罪預防」-從日常生活理論談網路犯罪預防模式〉,犯罪學期刊,12(2),87-115。 許春金(2017)。《犯罪學》。台北市:三民書局。 連雪雅譯(2017)。《嚴禁惡用!跟詐騙集團學「暗黑交涉術」:再強心防都能突破, 讓他不知不覺說YES!》。新北市:野人。(原書 多田文明 [2016]《ワルに学ぶ黒すぎる交渉術. 》日本東京:プレジデント社) 陳玉書、王秋惠(2011)。〈網路詐欺被害特性分析〉。《執法新知論衡》,7(2),11-31。 陳玉書、曾百川(2007)。網路詐欺犯罪理性選擇歷程之質性分析。中央警察大學犯罪防治學報,8,115-145。 陳佳玉(2007)。《通訊金融詐欺犯罪被害特性及歷程之分析》。中央警察大學犯罪防治研究所碩士論文。 陳國明、彭文正、葉銀嬌、安然(2010)。《傳播研究方法》。新北市:威仕曼文化。 陳雪雲(1990)。〈論媒介現實之論述分析〉。《師大社會教育學刊》,第 19 期:135-167。 喬懷禹(2019)。《台灣詐騙產業行為之經濟分析》。臺灣大學經濟學研究所碩士論文。 曾靉 ( 2017年5年10日)。〈5年打造每月800萬不重複訪客,台灣社群新星Dcard如何崛起?〉,《數位時代》。取自:https://meet.bnext.com.tw/articles/view/40544 無風卻起念 (2021年10月17日)。 〈中國古代騙子也不少,騙術驚人,古人還專門為此寫了一本《騙經》。〉,《今日頭條》。 取自:https://twgreatdaily.com/495561110_587798-sh.html 童元泓(2022)。《從金光黨到跨境電信詐欺—詐騙犯罪的理性化決策與福特主義分工》。中正大學犯罪防治研究所碩士論文 馮川編譯(1997)。《榮格全集》北京:改革出版社。(原書Jung, C., G(1997). Final Volumes: Miscellaneous Works) 黃潔文( 2022年4年9日)。 〈不忍了!LINE、臉書成詐騙溫床,謝金河批「終將毀滅」〉。《TVBS新聞網》取自https://news.tvbs.com.tw/life/1761960 楊智強(2022年8月10日)。〈斬不斷的台柬人口販運鏈,台灣公權力無法企及的陰影〉,《報導者》。取自https://www.twreporter.org/a/cambodia-taiwanese-human-trafficking-shadow-of-state-power 維基百科,〈詐騙〉。取自https://zh.wikipedia.org/zh-tw/%E7%BD%91%E7%BB%9C%E8%AF%88%E9%AA%97。上網日期:2022年3月27。 維基百科,〈詐騙〉。取自https://zh.wikipedia.org/zh-tw/%E7%BD%91%E7%BB%9C%E8%AF%88%E9%AA%97。上網日期:2022年3月27。 維基百科,〈網路詐騙〉。取自https://zh.wikipedia.org/zh-tw/詐騙。上網日期:2022年3月27。 臧國仁、蔡琰(2017)。《敘事傳播:故事/人文觀點》。台北:五南。 劉品秀(2007)。《網路交友詐騙類型及被害特質之研究》。國立中正大學犯罪防治所碩士論文。 劉致昕、陳德倫(2021年11月17日)。〈被騙後的人生─不要再有下一個被害人,就是「最好的復仇」。〉,《報導者》。取自:https://www.twreporter.org/a/online-scams-victims-rebrith 劉揚銘、陳柏璿、胡舜詅、周昱璇(2016年2月1日)。〈解讀Ptt:台灣最有影響力的網路社群〉,《數位時代》。取自https://www.bnext.com.tw/article/38609/bn-2016-01-29-161210-178 劉慧雯(2020)。〈從新聞到粉絲團:社群小編重構公共話語現象的初探研究〉。《傳播與社會學刊》,第54期,頁161–192。 蔡田木、周文勇、陳玉書(2009)。〈詐騙犯罪被害人屬性之研究〉。內政部警政署刑事警察局委託研究報告。 蔡田木、陳永鎮(2006)。〈新興詐欺犯罪趨勢與防治對策之探討〉。《2006 年犯罪防治學術研討會論文集》。2006 年 12 月。桃園:中央警察大學。 蔡其芳(2006)。《網線上遊戲竊盜加害與被害特徵之研究》。臺北大學犯罪學研究所碩士論文。 蔡宗河(2008)。〈後結構文本的課程論述、批判及跨越〉,《課程與教學》,11(2):127-154。 蔡琰(2000)。《電視劇:戲劇傳播的敘事理論》。臺北市:三民。 鄭喬之(2018)。《失落的探戈 -我的失落療癒敘說》,屏東大學教育心理與輔導學系碩士論文。 謝靜雯譯(2018)。《暢銷作家的21堂繪本寫作課:大師的30年精髓20道寫作練習題》。臺北市:采實。(原書 Ann, W. P. [2009].Writing Picture Books: A Hands-On Guide from Story Creation to Publication. Cincinnati, Ohio : Writer's Digest Books.) 瞿海源、畢恆達、劉長萱、楊國樞主編 (2012)。《 社會及行為科學硏究法_質性硏究法 》。台北市:臺灣東華書局。 Adoni, H., & Mane, S. (1984). Media and the social construction of reality: Toward an integration of theory and research. Communication Research, 11(3), 323–340. https://doi.org/10.1177/009365084011003001 Apte, M. M., Palshikar, G.K., & Baskaran, S. (2018). Frauds in Online Social Networks: A Review. In Reda Alhajj, & Uwe Glässer. (Eds.), Lecture Notes in Social Networks. (pp.1-18). Cham, Switzerland: Springer Aristotle (2009). Nicomachean Ethics. trans. by David Ross. Oxford: Oxford University Press, https://global.oup.com/ukhe/product/the-nicomachean-ethics-9780199213610?cc=tw&lang=en& Baker,W. E. & Faulkner, R. R. (2003), Diffusion of fraud: Intermediate economic crime and investor dynamics. Criminology, 41(4),1173-1206. https://doi.org/10.1111/j.1745-9125.2003.tb01017 Belsey,C. (1980). Critical Practice. London and New York: Methuen. Booker C. (2004). The seven basic plots : why we tell stories. Continuum. Bruner, J. (1987). Life as narrative. Social Research, 54(1), 11–32. http://www.jstor.org/stable/40970444 Buchanan, J. & Grant, A. J. (2001). Investigating and prosecuting Nigerian fraud. United States Attorneys’ Bulletin, 49(6), 39–47. Button, M. & Cross, C. (2017). Cyber frauds, scams and their victims. London, UK: Routledge. https://doi.org/10.4324/9781315679877 Button, M., Lewis, C., & Tapley, J. (2009). Fraud typologies and the victims of fraud: literature review. London, UK: National Fraud Authority. Chang, J. J. (2008). An analysis of advance fee fraud on the internet. Journal of Financial Crime, 15(1), 71–81. https://doi.org/10.1108/13590790810841716 Chang, J. & Chong, M. (2010). Psychological influences in e-mail fraud. Journal of Financial Crime, 17(3), 337–350. https://doi.org/10.1108/13590791011056309 Chatman, S. (1978). Story and Discourse: Narrative Structure in Fiction and Film. Ithaca, NY: Cornell University Press Choi, K. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308-333. Cohen, L. E., & Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44(4), 588–608. https://doi.org/10.2307/2094589 Coluccia, A., Pozza, A., Ferretti, F., Carabellese, F., Masti, A., & Gualtieri, G. (2020). Online Romance Scams: Relational Dynamics and Psychological Characteristics of the Victims and Scammers. A Scoping Review. Clinical practice and epidemiology in mental health: CP & EMH, 16, 24-35. https://doi.org/10.2174/1745017902016010024 Cross, C. (2019). Online fraud. In H. N. Pontell (Ed.), Oxford research encyclopedia of criminology (pp. 1-32). Oxford, UK: Oxford University Press Cross, C. & Holt, T. J. (2021). The use of military profiles in romance fraud schemes. Victims & offenders, 16(3), 385-406. DOI: 10.1080/15564886.2020.1850582 Cross, C., Dragiewicz, M., & Richards, K. (2018). Understanding Romance fraud: Insights from domestic violence research. British Journal of Criminology, 58(6), 1303–1322. https://doi.org/10. 1093/bjc/azy005 Cross, C. (2016). Using financial intelligence to target online fraud victimization: Applying a tertiary prevention perspective. Criminal Justice Studies, 29(2), 125-141. Dion, M. (2010). Advance fee fraud letters as Machiavellian/narcissistic narratives. International Journal of Cyber Criminology, 4(1&2), 630-642. Drew, J. & Farrell, L. (2018). Online victimization risk and self-protective strategies: developing police-led cyber fraud prevention programs. Police Practice and Research, 19, 537-549. doi:10.1080/15614263.2018.1507890. Fairclough, N.(1995). Critical Discourse Analysis: The Critical Study of Language. London and New York: Longman. Federal Trade Commission (2022). New Data Shows FTC Received 2.8 Million Fraud Reports from Consumers in 2021. Retrieved from Federal Trade Commission :https://www.ftc.gov/news-events/news/press-releases/2022/02/new-data-shows-ftc-received-28-million-fraud-reports-consumers-2021-0 Field, S. (1979). Screenplay: the foundations of screenwriting . New York: Dell Publishing. Fisher, W. R. (1987). Human communication as narration: Toward a philosophy of reason, value and action. Columbia, CA: University of South Carolina Press. Fisher, W.R. (1984). The narrative paradigm: in the beginning. Journal of Communication, 34(1): 74-89. https://doi.org/10.1111/j.1460-2466.1984.tb02986.x Gee, J. P. (2000). An introduction to discourse analysis: theory and method. New York:Routledge. Genette, G. (1972/1980). Narrative Discourse: An Essay in Method. (Jane E. & Lewin, Trans.) Ithaca, NY: Vornell UP. Gergen, K. J. & Gergen, M. M. (1988). Narrative and the self as relationship. In L. Berkowitz (Ed.), Advances in experimental social psychology, Vol. 21. Social psychological studies of the self: Perspectives and programs (pp. 17–56). Academic Press. Goffman, E. (1963). Stigma: Notes on the Management of Spoiled Identity. New York: Simon & Schuster. Goffman, E. (1981). In Forms of Talk. Philadelphia, PA: University of Philadelphia Press. Greimas, A. J. (1966). Sémantique Structurale. Paris, French: Larousse. Hindelang, M. J., Gottfredson, M. R., & Garofalo, J. (1978) Victims of personal crime: An empirical foundation for a theory of personal victimization. Cambridge, MA: Ballinger Pub. Co. Hiß, F. (2015). Fraud and Fairy Tales: Storytelling and Linguistic Indexicals in Scam E-mails. International Journal of Literary Linguistics. 4(1), 1-13 https://doi.org/10.15462/ijll.v4i1.26 Holt, T. & Bossler, A. (2015). Cybercrime in Progress: Theory and prevention of technology-enabled offenses (1st ed.). England, UK: Routledge https://doi.org/10.4324/9781315775944 Holt, T. & Graves, D. (2007). A qualitative analysis of advance fee fraud e-mail schemes. International Journal of Cyber Criminology, 1, 137–154. Hovland, C. I., Janis, I. L., & Kelley, H. H. (1953). Communication and persuasion; psychological studies of opinion change. Yale University Press. https://doi.org/10.1080/1478601X.2016.1170278 Johnstone, B. (1996). The linguistic individual. New York, NY: Oxford University Press. Jones, H. S., Towse, J. N., & Race, N. (2015). Susceptibility to Email Fraud: A Review of Psychological Perspectives, Data-Collection Methods, and Ethical Considerations. International Journal of Cyber Behavior, Psychology and Learning (IJCBPL), 5(3), 13-29. http://doi.org/10.4018/IJCBPL.2015070102 Kahneman, D. & Tversky, A. (1979). Prospect Theory: An Analysis of Decision under Risk. Econometrica, Econometric Society,47(2), 263-291. Kara, I., & Aydos, M. (2020, Oct). Cyber fraud: detection and analysis of the crypto-ransomware. 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 0764-0769. (線上) Lacuška, M. & Peráček, T. (2021). Trends in Global Telecommunication Fraud and Its Impact on Business. In Kryvinska, N., Greguš, M. (eds.), Developments in Information & Knowledge Management for Business Applications. (pp. 459-485). Cham, Switzerland: Springer doi:10.1007/978-3-030-62151-3_12 Lasswell, H. D. (1948). The structure and function of communication in society. In Bryson L. (Ed.), The communication of ideas (pp. 37-51). New York, NY: Harper and Row. Lazarus, S. & Okolorie, G. (2019). The Bifurcation of the Nigerian Cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) Agents. Telematics and Informatics, 40, 14-26. DOI: 10.1016/j.tele.2019.04.009. Maimon, D. & Louderback, E. (2019). Cyber-Dependent Crimes: An Interdisciplinary Review. Annual Review of Criminology. 2, 191-216. McLuhan, M. (1975). McLuhan’s Laws of the Media. Technology and Culture, 16(1), 74–78. https://doi.org/10.2307/3102368 Nikolopoulou, K. (2022, December 01). What Is Purposive Sampling? | Definition & Examples. https://www.scribbr.com/methodology/purposive-sampling/ Oudshoorn, N. & Pinch, T. J. (2003). How users matter: The co-construction of users and technologies. Cambridge, MA: MIT Press. Polkinghorne, D. E. (1988). Narrative knowing and human sciences . Albay, NY: State University of New York Press. Propp. V. I︠A︡. (1928). Morphology of the folktale. Austin, Texas: University of Texas Press. https://pitt.primo.exlibrisgroup.com/discovery/fulldisplay?context=L&vid=01PITT_INST:01PITT_INST&docid=alma9933921783406236 Reddy, E. & Minnaar, A. (2018). Cryptocurrency : a tool and target for cybercrime. Acta Criminologica: Southern African Journal of Criminology 31(3). https://hdl.handle.net/10520/EJC-14d902942d Rich, T. (2017). You can trust me: a multimethod analysis of the Nigerian email scam. Security Journal,31(3) doi:10.1057/s41284-017-0095-0 Saad, M. E., Abdullah, S. N. H. S., & Murah, M. Z. (2018). Cyber romance scam victimization analysis using routine activity theory versus apriori algorithm. International Journal of Advanced Computer Science and Applications, 9(12), 479-485. Thomas B., Clergue J., Schaad A., & Dacier M. (2004 Oct). A comparison of conventional and online fraud. CRIS’04, 2nd International Conference on Critical Infrastructures, Grenoble, France. https://www.eurecom.fr/fr/publication/1556 Thorndike, E.L. (1920). A constant error in psychological ratings. Journal of Applied Psychology, 4(1), 25–29. https://doi.org/10.1037/h0071663 Titus, R. M., Heinzelmann, F., & Boyle, J. M. (1995). Victimization of persons by fraud. Crime & Delinquency, 41(1), 54-72. Todorov, T. (1969). Grammaire du Décaméron. The Hague: Mouton. Trend Micro and INTERPOL (2017). ‘Cybercrime in West Africa: Poised for an Underground Market’, available at: https://documents.trendmicro.com/assets/wp/wp-cybercrime-in-west-africa.pdf, accessed 7/7/17 van Dijck, J. (2009). Users like you? Theorizing agency in user-generated content. Media Culture & Society, 31, 41-58. Whitty, M. T. (2018). Do You Love Me? Psychological Characteristics of Romance Scam Victims. Cyberpsychology, behavior and social networking, 21(2), 105–109. https://doi.org/10.1089/cyber.2016.0729 Whitty, M. T. & Buchanan, T. (2012). The online romance scam: a serious cybercrime. Cyberpsychology, behavior and social networking, 15(3), 181–183. https://doi.org/10.1089/cyber.2011.0352 Yar, M. & Steinmetz, K. (2019). Cybercrime and Society (3rd ed.). New York, NY: SAGE Publications Ltd. |
Description: | 碩士 國立政治大學 傳播學院碩士在職專班 110941007 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0110941007 |
Data Type: | thesis |
Appears in Collections: | [傳播學院碩士在職專班] 學位論文
|
Files in This Item:
File |
Description |
Size | Format | |
100701.pdf | | 2766Kb | Adobe PDF | 5 | View/Open |
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|