English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113160/144130 (79%)
Visitors : 50737114      Online Users : 526
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/31062
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/31062


    Title: 信用卡偽卡偵測之研究
    Authors: 張憶賢
    Contributors: 陳春龍
    諶家蘭



    張憶賢
    Keywords: 偽卡偵測
    Date: 2003
    Issue Date: 2009-09-14 09:11:00 (UTC+8)
    Abstract: 檢視以往在偽卡偵測的研究上,均是以能找出最多偽卡交易的方法為研究目標,再以該方法應用在所有持卡人身上。這些研究中的確找出了許多的好方法,但卻也有著以大多數人的行為模式套用在個人行為模式上的盲點,雖然也有研究是依據個人行為模式來偵測偽卡,但仍然沒有做到完全以個人為研究單位。
    為解決上述的問題,本研究採用事件歷史分析法(Event History analysis) ,此方法用於觀察一段時間內某一事件的發生與否,探討事件的發生原因,並據以產生預測模型(hazard function)來預測事件發生的可能性。[王仕茹,民82] [林欣美,民84] [張佩惠,民85] 應用此方法於偽卡交易偵測上,可以得知造成該卡人偽卡交易產生的因素為何?是地點、特店別還是其他因素;更甚而可以建立個人預測偽卡的模型(hazard function),利用此模型判斷某筆交易是偽卡交易的百分比。
    本研究應用此方法找出造成偽卡交易產生的因素,但限於所使用的軟體未提供當時間相關變數存在時,建構危機函數 (hazard function) 的功能,因此本研究採用決策樹來彌補這方面的不足。
    When reviewing the researches about fraud cards detecting in the past, most of them focus on how to enhance the probabilities to detect fraud cards. Then,they applied the methods they found to detect all the cardholders’ credit cards. The shortcoming is it’s easy to treat the fraud transactions as the normal transactions because every cardholder has different consuming behavior. Even some researchers try to detect fraud cards by personal consuming behavior. In fact,they still don’t detect fraud cards by personal consuming behavior completely.
    To resolve the problems described as above,this research adapt Event History analysis. Event history analysis revolves around two concepts: the risk set and the hazard rate(Allison 1984). The risk set comprises the number of dyads subject to event occurrence at a particular point in time. “The hazard rate is the probability that an event will occur at a particular time to a particular individual, given that the individual is at risk at that time” (Allison 1984, 16). We applied this method on fraud cards detecting to find the factors which cause fraud cards happened. Besides that,we can build the hazard function and use it to know the fraud opportunity of the transaction.
    This research applied the method to find the factors which cause fraud cards happened successfully. The software this research used doesn’t provide the function to create hazard function when the time dependent variables exist,so this research replaced it with decision tree
    Reference: Ø 中文部份
    [劉秀玲,民90]
    劉秀玲,「英國晶片信用卡推動及發展情形」,財政部金融局,出國報告書,民國90年。
    [黃琮聖,民90]
    黃琮盛,「以個人消費行為預測信用卡詐欺事件之研究」,國立中央大學資訊管理研究所,碩士論文,民國90年。
    [張佩惠,民85]
    張佩惠,信用卡持卡期間長短之研究 : 以事件歷史分析法分析之,國立台灣大學國際企業學研究所,碩士論文,民國85年。
    [林欣美,民84]
    林欣美,事件分析法探討廣告代理關係的不穩定性,國立台灣大學國際企業學研究所,碩士論文,民國84年。
    [王仕茹,民82]
    王仕茹,以事件歷史分析法探討中外合資事業之不穩定性,國立台灣大學國際貿易研究所,碩士論文,民國82年。
    [聯合信用卡處理中心,民91]
    聯合信用卡處理中心,「聯合信用卡中心會員銀行詐欺損失形態分析圖」,民國91年,http://www.nccc.com.tw
    [聯合晚報,民91]
    蔡政諺、曹敏吉,「利誘入黑幫 偽卡當零用錢」,聯合晚報,2002/09/18。
    蔡政諺,「財金員工盜賣密碼 追查偽造金融卡」,聯合報,2002/09/20。
    [中央社,民92]
    吳顯申,「駭客入侵美電腦星國銀行未發現未獲授權交易」,中央社,2003/02/21。
    [顏志義,民88]
    顏志義,「信用卡犯罪問題之研究」,中央警察大學刑事警察研究所,碩士論文,民國88年。
    [Michael J. A. Berry, Gordon S. Linoff,2001]
    Michael J. A. Berry, Gordon S. Linoff,譯者 : 彭文正博士,Data Mining 資料採礦 顧客關係管理暨電子行銷之應用,2001/06。
    Ø 英文部份
    [Joseph F. Hair,Jr. Rolph E. Anderson Ronald L. Tatham,1987]
    Joseph F. Hair,Jr. Rolph E. Anderson Ronald L. Tatham,”Multivariate Data Analysis with Readings”,Macmillan,Second Edition,1987。
    [Kevin J. Leonard,1993]
    Kevin J. Leonard “The development of a rule based expert system model for fraud alert in consumer credit”, European Journal of Operational Research,Received Novermber;revised June 1993.
    [Lori MacVittie,2002]
    Lori MacVittie,’Online fraud detection takes diligence’,Network Computing,Feb 18, 2002.
    [Paul D. Allison, 1995]
    Paul D. Allison, Survival Analysis Using SAS Systems: A Practical Guide. SAS Institute Inc. Cary, NC, USA, 1995.
    [Wheeler,R., Aitken,S,2000]
    Wheeler,R., Aitken,S., “Mutilple Algorithms for Fraud Detection”, Knowledge-Based System, Volume: 13, Issue: 2-3,April, 2000.
    [W Kim; M Kim,1999]
    W Kim; M Kim; ‘Performance and scalability in knowledge engineering: Issues and solutions’, Journal of Object - Oriented Programming; New York; Nov/Dec 1999.
    Description: 碩士
    國立政治大學
    資訊管理研究所
    90356039
    92
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0090356039
    Data Type: thesis
    Appears in Collections:[資訊管理學系] 學位論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML2250View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback