Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/106448
題名: 行騙天下:臺灣跨境電信詐欺犯罪網絡之分析
Global networks of fraud : criminal networks of Taiwan`s cross-border telecommunications fraud
作者: 曾雅芬
Tseng, Ya-Fen
貢獻者: 許春金<br>王振寰
Sheu, Chuen-Jim<br>Wang, Jenn-Hwan
曾雅芬
Tseng, Ya-Fen
關鍵詞: 跨境電信詐欺
犯罪網絡
犯罪機會
空間分工
社會網絡
Cross-border telecommunications fraud
Criminal network
Criminal opportunity
Spatial division of labor
Social network
日期: 2016
上傳時間: 8-二月-2017
摘要:   資訊時代下全球化造成了流動空間的出現,亦促進了網絡社會的崛起;其影響不僅擴及政治、社會、經濟層面,更形成了全球犯罪經濟的現象。臺灣境內詐欺犯罪從過去當面直接接觸,轉為透過電信或網路間接接觸的詐騙形式;在政府的全面查緝及兩岸共同打擊犯罪之下,近年來電信詐欺集團呈現向外擴散跨越國境乃至全球的趨勢。此類全球犯罪網絡的相關實證研究至今仍極為缺乏,因此,本研究旨在討論前述犯罪機會、空間分工及社會網絡如何形成跨境電信詐欺犯罪網絡,及其背後的特殊運作機制。\n  經由文獻探討法、現有資料統計分析法及深度訪談18名受訪者(受刑人11名、偵查人員4名、駐外聯絡官3名),本研究發現犯罪機會同時影響空間分工及社會網絡,這三個重要指標亦型塑了跨境電信詐欺的犯罪網絡。詐欺集團利用各類犯罪機會(犯罪者、標的物、監控缺乏及手法工具的聚合,其中監控包含國家、網路與金融管制層面),結合空間移動、分工與第三地機制,社會網絡強弱連帶與第三方機制,形成特殊運作機制,促使詐欺網絡成為無遠弗屆的全球犯罪體系;核心組成員與第三方既是連結也是斷點的關係,更是其中的運作關鍵。透過此種犯罪網絡分析,可深入瞭解全球跨境犯罪的運作概略,進而形成應對防治作法及刑事政策建議。
In the Information Age, globalization has brought about the emergence of space of flows and the rise of network society. Its influence not only extends to the political, social, and economic levels, but also forms the global criminal economy. In Taiwan, fraud has occurred from direct contact format (such as face-to-face) to indirect ones (such as via telephones and the Internet). Owing to the government`s comprehensive investigation and the cross-strait joint criminal judicial co-operation, the telecoms fraud groups recently have traveled across borders and even to the whole world. As the relevant research based on empirical data is scant, this research aims to discuss how criminal opportunities, spatial division of labor, and social networks construct a cross-border telecommunications fraud criminal network and the special operational mechanism behind it.\n In this research, I reviewed the relevant literature, analyzed empirical data, and then conducted in-depth interviews with 18 respondents which include 11 prisoners, 4 criminal investigators and 3 police liaison officers. It is concluded that criminal opportunities would influence the spatial division of labor and social networks within criminal groups; these three important indicators formulate the criminal network of cross-border telecommunications fraud. A special operational mechanism combining various criminal opportunities (the convergence of offenders, targets, absence of guardians, and means; in which guardians include the level of national, cyber and financial regulations), spatial mobility and division of labor with the third-place mechanism, and strong and weak ties of social networks with the third-person mechanism, transforms fraud networks into a far-reaching global criminal system. The relationship between core group members and the third-person is not only a link but also a breakpoint, and it is undoubtedly the operational key. Ultimately, this research paints a clear picture of the global criminal networks and thus will possibly benefit the development of future criminal prevention and correction policies.
參考文獻: 丁水復(2005)。新興詐欺犯罪問題防治法制之研究。國立中山大學大陸研究所碩士論文。\n內政部警政署(2015)。103年警政工作年報。\n王振寰(1999)。全球化,在地化與學習型區域:理論反省與建構。臺灣社會研究季刊,34,69-112。\n王振寰(2009)。全球化的社會變遷。社會學與臺灣社會,王振寰、瞿海源(編)。台北:巨流,頁499-521。\n王振寰(2010)。社會學是什麼。社會學與臺灣社會,王振寰、瞿海源(編)2010,三版。台北:巨流,頁3-25。\n王振寰(2012)。發展研究歷久彌新─發展研究特刊序。都市與計劃,39(2),1-18。\n丘宏達(2006)。現代國際法。台北:三民書局,修訂二版。\n江信賢(2004)。詐欺罪適用之檢討—以傳統詐欺罪與經濟詐欺為中心。國立成功大學法律研究所碩士論文。\n何招凡(2013)。全球執法合作機制與實踐。台北:元照。\n吳秉勳(2014)。網路電話與電信詐欺。刑事雙月刊59期,2014年4月,頁24-27。\n吳芝儀、李奉儒譯(1999)。質的評鑑與研究。臺北:桂冠(原書:Patton, M. Q. (1995). Qualitative Evaluation and Research Methods. Sage Publications, Inc.)。\n宋學文編(2009)。全球化下國際關係理論、政策與治理。台北:巨流。\n李宏倫(2008)。臺灣與國際合作打擊跨國電信詐欺犯罪之研究。中央警察大學外事警察研究所碩士論文。\n李宏倫(2009)。跨國電信詐欺犯罪發展趨勢。刑事雙月刊32期,2009年9-10月。\n李華欣(2011)。兩岸共同打擊犯罪之研究-以偵辦新興詐欺犯罪為例。國立金門大學中國大陸研究所碩士論文。\n周文科(2004)。臺灣地區詐欺犯罪問題之研究。國立政治大學行政管理碩士學程碩士論文。\n周愫嫺(2010)。偏差與犯罪。社會學與臺灣社會,王振寰、瞿海源(編)2010,三版。台北:巨流,頁75-100。\n周愫嫻、曹立群(2007)。犯罪學理論及其實證。台北市:五南。\n孟維德(2001)。海峽兩岸與跨境犯罪。兩岸治安問題學術研討會論文集,桃園:中央警察大學。\n孟維德(2004)。海峽兩岸人口走私活動之實證研究。中華民國犯罪學會犯罪學期刊,7(2),67-128。\n孟維德(2010)。國際警察合作與跨國犯罪防制。桃園:中央警察大學。\n孟維德(2012)。跨國犯罪。台北市:五南。\n孟維德、江世雄、張維容(2011)。外事警察專業法規解析彙編。中央警察大學。\n林山田(1987)。經濟犯罪與經濟刑法。台北:三民。\n林山田、林東茂(1990)。犯罪學。台北:三民。\n林山田、林東茂、林燦璋(2005)。犯罪學。台北:三民。\n林德華(2011)。兩岸跨境合作共同打擊犯罪的挑戰與策略。刑事雙月刊45期,2011年12月。\n邱佩俞(2012)。電信詐欺犯罪運作歷程及其查緝因應策略之研究。中央警察大學犯罪防治研究所碩士論文。\n邵明仁(2011)。從個案研究論兩岸合作共同打擊經濟犯罪。國立中山大學中國與亞太區域研究所碩士論文。\n洪漢周(2003)。新興詐欺犯罪趨勢與對策研究。中央警察大學警學叢刊,34(1),頁141。\n夏樂生(1999)。從大陸地方政府與企業之間關係看地方主義的滋長。共黨問題研究,V.25,N.4,頁17-26。\n夏鑄九、徐進鈺(1997)。臺灣的石化工業與地域性比較研究。臺灣社會研究,第26期,頁129-166。\n夏鑄九、畢恆達、黃瑞茂、徐進鈺、康旻杰、劉欣容等人(2003)。全球化台北。台北市政府都市發展局委託研究。\n馬財專(2003)。組織性犯罪—社會網絡分析的考察與初探。犯罪與刑事司法研究,1:97-124。\n馬財專(2010)。臺灣組織及個體販毒網絡之質化考察。中研院人文及社會科學集刊,22(3):353-392。\n高政昇(2002)。兩岸經濟犯罪型態之探討。國境警察學報,創刊號,2002年10月。\n張俊揚(2016)。臺灣警政在巨量資料的應用。警光雜誌,2016年6月號,719: 48-51。\n張苙雲、譚康榮(1999)。社會鑲崁與產業網路。張苙雲編,臺灣產業研究Mook2--網絡臺灣:企業的人情關係與經濟理性,頁17-64,台北市:遠流出版公司。\n張剛維、林森田(2008)。尋租行為與土地使用分區管制—財產權觀點之分析。臺灣土地研究,第11卷,第2期,頁127-153。\n張淑平(2011)。海峽兩岸刑事司法互助研究。九州出版。\n畢武卿(1996)。國際刑事司法協助的理論與實務。司法協助研究,北京:司法部司法協助局。\n許芳雄(2010)。兩岸跨境犯罪之研究-以新興詐欺集團為例。玄奘大學大學公共事務管理學系碩士在職專班碩士論文。\n許春金(2010)。犯罪學。台北:三民書局。\n許振明、唐正儀(2002)。公營銀行民營化問題。財團法人國家政策研究基金會國改研究報告,財金(研)091-066號。\n許福生(2014)。論兩岸共同打擊跨境洗錢犯罪與司法互助協議問題。海峽法學,第16卷第3期,福建江夏學院法學院,2014年9月。\n陳春山(2007)。2020全球趨勢與全球治理。聯經出版公司。\n曾百川(2006)。網路詐欺犯罪歷程之質化研究。中央警察大學犯罪防治研究所碩士論文。\n曾忠進(2010)。資通訊詐欺犯罪特性及歷程之研究。國立臺北大學犯罪學研究所碩士論文。\n楊士隆、何明洲(2004)。竊盜犯罪防治理論與實務。臺北:五南。\n楊士隆、曾淑萍、周子敬、李政曉(2007)。詐騙犯罪防制策略之成效評估研究,內政部警政署刑事警察局委託研究報告,2007年12月。\n楊雲驊,(2012)。兩岸刑事訴訟管轄權移轉之探討-以歐洲刑事訴訟移轉管轄公約為中心。刑事政策與犯罪研究論文集〈16〉,法務部司法官學院,2013年12月,頁27-42。\n葉毓蘭(2004)。保護弱勢從反詐騙做起。刑事雙月刊,2:5-7。\n詹德恩(2002)。從犯罪學理論探討跨國經濟犯罪。法令月刊,第53 卷9 期,2002 年9月,頁20-36。\n資策會(1997)。我國電腦網路產業發展趨勢分析。台北:財團法人資訊工業策進會。\n廖培珊、伊慶春、章英華(2002)。調查資料之三角交叉分析:以大學社區生活品質之評估為例。調查研究,11期(2002 / 04 / 01),頁105-131。\n趙永琛(2000)。跨國犯罪對策。吉林:吉林人民出版社。\n趙永琛(2004)。國際刑法與司法互助。北京:法律出版社。\n趙秉志、錢毅、郝興旺等著(1996)。跨國跨地區犯罪的懲治與防範。北京:中國方正出版社。\n劉家妤(2012)。跨境電話詐欺集團特徵之研究。國立臺北大學犯罪學研究所碩士論文。\n潘淑滿(2003)。質性研究:理論與應用。台北:心理。\n蔡田木、陳永鎮(2006)。新興詐欺犯罪趨勢與防治對策之探討。中央警察大學犯罪防治學報,7,309-331。\n盧俊光(2007)。新興詐欺犯罪模式及其偵查作為之研究。中央警察大學刑事警察研究所碩士論文。\n戴育毅(1998)。跨國性組織犯罪問題之探討。刑事政策與犯罪研究論文集(一),法務部犯罪研究中心編印,頁52。\n謝立功(2004)。兩岸跨境犯罪及其對策。刑事政策與犯罪研究論文集(七),頁171-172。台北:法務部。\n謝立功、吳東明、陳國勝、簡建章、林志勇、劉家榮(2004)。建立兩岸共同打擊海上犯罪之作法與協商機制之研究。行政院海岸巡防署。\n謝立功、蔡庭榕、簡建章、柯雨瑞(2002)。跨境犯罪偵查之理論與實務。桃園:中央警察大學。\n譚志忠(2004)。2005年網通產業趨勢-網路電話VoIP。元大京華投資資訊,2004年12月,3-15頁。\nBeck, Ulrich著、孫治本譯(1999)。全球化危機(Was ist globalisierung?)。台北:臺灣商務印書館。\nNeuman, W.L.著(2000)、王佳煌、潘中道、郭俊賢、黃瑋瑩譯(2002)。當代社會研究法:質化與量化取向(Social research methods: Qualitative and quantitative approaches.)。台北:學富文化。\n\nAas, Katja Franko. (2007). Analysing a world in motion: Global flows meet "criminology of the other`. Theoretical Criminology. May 2007 vol. 11 no. 2 283-303.\nAas, Katja Franko. (2008). Globalization and Crime. SAGE Publications Ltd.\nAbadinsky, H. (2003). Organized crime. Boston, MA: Allyn & Bacon.\nAdams, Reed. (1974). The Adequacy of Differential Association Theory. Journal of Research in Crime and Delinquency. 11 (1): 1-8.\nAlmiron, Núria. (2007). ICTs and Financial Crime: An Innocent Fraud? International Communication Gazette. February 2007 69: 51-67.\nBabbie, E. R. (2001). The practice of social research (9th ed.). Belmont, CA: Wadsworth.\nBecker, Gary S.(1968). Crime and Punishment: An Economic Approach. Journal of Political Economy. 76(2): 169-217.\nBlommaert, Jan & Tope Omoniyi. (2006). Email Fraud: Language, Technology, and the Indexicals of Globalization. Social Semiotics. 16(4), p.573-605.\nBlum, Jack, Levi, Michael, Naylor, R. Thomas and Williams, Phil. (1999). Financial Havens, Bank Secrecy and Money Laundering. New York: United Nations.\nBossard, A. (1990). Transnational crime and criminal law. Chicago, IL: University of Chicago, Office of International Criminal Justice.\nBourdieu P. (1986). The forms of capital. In Handbook of Theory and Practice for the Sociology of Education, Richardson JG (ed.). Greenwood: New York; 241–258.\nBovenkerk, Frank (2001). Organized Crime and Ethnic Minorities: Is There a Link? In Combating Transnational Crime: Concepts, Activities, and Responses, edited by Phil Williams and Dimitri Vlassis. London: Frank Cass Publishers.\nBrantingham, P. J., & Brantingham, P. L. (1984). Patterns in crime. New York: Macmillan.\nBrantingham, Patricia L. & Paul J. Brantingham (1993). Environment, Routine, and Situation: Toward a Pattern Theory of Crime. In Advances in Criminological Theory, 5: 259-294, Ronald V. Clarke and Marcus Felson, eds.\nBurt, R. S. (1992). Structural Holes: The Social Structure of Competition. Cambridge: Harvard University Press.\nCampbell, Peter B. (2013). The Illicit Antiquities Trade as a Transnational Criminal Network: Characterizing and Anticipating Trafficking of Cultural Heritage. International Journal of Cultural Property. Vol.20(2): pp 113-153.\nCasey, J. (2010). Policing in the world: The practice of international and transnational policing. Durham, NC: Carolina Academic Press.\nCastells, Manuel (1997, second edition, 2004). The Power of Identity, The Information Age: Economy, Society and Culture Vol. II. Cambridge, MA; Oxford, UK: Blackwell.\nCastells, Manuel (1998, second edition, 2000). End of Millennium, The Information Age: Economy, Society and Culture Vol. III. Cambridge, MA; Oxford, UK: Blackwell.\nClarke, Ronald & Marcus Felson (eds.). (1993). Routine Activity and Rational Choice. Advances in Criminological Theory. Vol. 5. New Brunswick, NJ: Transaction.\nClarke, Ronald ed. (1997). Situational Crime Prevention: Successful Case Studies. New York: Harrow and Heston.\nCohen, Lawrence E. & Marcus Felson (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review. Vol. 44, No. 4, pp. 588-608.\nColeman JS. (1990). Foundations of Social Theory. Belknap Press of Harvard University Press: Cambridge, MA.\nCornish, Derek & Ronald V. Clarke. (2002). Analyzing Organized Crimes. In Alexis Piquero and Stephen Tibbetts (Eds.), Rational Choice and Criminal Behaviour. London: Routledge.\nCornish, Derek B. & Ronald V. Clarke. (1987). Understanding Crime Displacement: An Application of Rational Choice Theory. Criminology. 25(4): 933-948.\nCornish, Derek B. & Ronald V. Clarke. (2009). Rational Choice. In Stephen G. Tibbetts & Craig T. Hemmens (Eds.), Criminological Theory: A Text/Reader (pp. 89-108). SAGE Publications, Inc.\nCornish, Derek B. (1994). The Procedural Analysis of Offending and its relevance for Situational Prevention. In R. V. Clarke (ed.), Crime Prevention Studies. Vol. 3. Monsey, NY: Criminal Justice Press.\nCreswell, J. W. (1997). Qualitative Inquiry and Research Design. Thousand Oaks, CA: Sage.\nDaele, Stijn Van., Tom Vander Beken, & Gerben J.N. Bruinsma. (2012). Does the mobility of foreign offenders fit the general pattern of mobility? European Journal of Criminology. May 2012 vol. 9no. 3 290-308.\nDenzin, N. K. ed. (1970). Sociological Methods: A Sourcebook. Chicago: Aldine Publishing Company.\nEdwards, Adam & Peter Gill (Eds.). (2006). Transnational Organised Crime: Perspectives on Global Security. London: Routledge.\nEvans, Malcolm D. (2nd ed.). (2006). International Law. Oxford: Oxford University Press.\nFelsen, D. & Kalaitzidis, A. (2005). A historical overview of transnational crime. In P. Reichel (Ed.), Handbook of transnational crime and justice, pp.3-19. Thousand Oak, CA: Sage Publications Inc.\nFelson, M. & R.V. Clarke. (1998). Opportunity Makes the Thief: Practical Theory for Crime Prevention. Police Research Series, Paper 98. London: Home Office.\nFelson, M. (1998). Crime and everyday life: Insights and implications for society (2nd ed.). Thousand Oaks, CA: Pine Forge Press.\nFelson, M. (2002). Crime and everyday life. 3rd ed.. Thousand Crime Mapping Research Lab in the School of Criminal Justice, Oaks, CA: Pine Forge Press.\nFelson, Marcus (2003). The Process of Co-offending. In Martha Smith and Derek Cornish (eds), Theory for Practice in Situational Crime Prevention, Crime Prevention Studies, vol. 16, pp. 149– 67. Mounsey, NJ: Criminal Justice Press.\nGiddens, Anthony. (1990). The Consequence of Modernity. Cambridge: Polity Press.\nGiddens, Anthony. (2002). Runaway World: How Globalization is Reshaping Our Lives. Taylor & Francis.\nGottfredson, Michael R. and Travis Hirschi. (1990). A General Theory of Crime. California: Stanford University Press.\nGrabosky,P.N., & Smith,R.G.,&Wright,P.(1996).Crime and Telecommunications. Trends and Issues in Crime and Criminal Justice, 59,1-6.\nGrabosky, P.N., & Smith,R.G. (1998). Crime in the Digital Age. The Federation.\nGranovetter, M. (1973). Getting a Job: A Study of Contacts and Career. Chicago: Chicago University Press.\nGranovetter, M. (1983). The Strength of Weak Ties: A Network Theory Revisited. Sociological Theory 1: 201–233.\nGraycar,A.(2000). Fraud Prevention and Control in Australia. Paper presented at the Fraud Prevention and Control Conference convened by the Australian Institute of Criminology in association with the Commonwealth Attorney-General’s Department and held in Surfers Paradise, 24-25 August 2000.\nHall, Tim. (2012). Geographies of the illicit: Globalization and organized crime. Prog Hum Geogr. October 18, 2012 .\nHare, A. P. (1962). Handbook of small group research. New York: Macmillan Publishers.\nHarfield, Clive. (2008). The organization of `organized crime policing` and its international context. Criminology and Criminal Justice. November 2008 vol. 8no. 4 483-507.\nHarvey, David (1989). The Condition of Postmodernity. Blackwell.\nHastings, Justin V. (2010). No Man’s Land: Globalization, Territory, and Clandestine Groups in Southeast Asia. Cornell University Press.\nHayes, Hennessey. & Tim Prenzler. (2003). Profiling Fraudsters-A Queensland Case Study in Fraudster Crime. Australia:Griffith University.\nHeld, D., A. Mcgrew, D. Goldblatt & J. Perraton (1999). Global Transformation: Politics, Economics, and Culture. Cambridge: Polity Press.\nHeld, David & Anthony Mcgrew (2002). Governing Globalization: Power, Authority and Global Governance. John Wiley & Sons.\nHill, R. A. & R. I. M. Dunbar (2003). Social network size in humans. Human Nature, 14 (1), pp. 53-72.\nhttp://www.aic.gov.au/conferences/fraud/graycar.pdf\nhttp://www.aic.gov.au/publications/tandi/ti59.pdf\nhttp://www.utica.edu/academic/institutes/ecii/publications /articles/BA309CD2-01B6-DA6B-5F1DD7850BF6EE22.pdf\nHutchins, Christopher E. & Marge Benham-Hutchins. (2010). Hiding in plain sight: criminal network analysis. Computational and Mathematical Organization Theory, March 2010, Volume 16, Issue 1, pp 89-111.\nHycner, R. H. (1985). Some guidelines for the phenomenological analysis of interview data. Human Studies 8, 279-303.\nIanni, Francis A. J.(1974). Black Mafia: Ethnic Succession in Organized Crime. NY: Simon and Schuster.\nKarstedt, Susanne. (2002). Durkheim, Tarde and beyond: The global travel of crime policie. Criminology and Criminal Justice. May 2002 vol. 2 no. 2111-123.\nKennedy, Leslie W. & Vincent F. Sacco. (1998). Crime Victims in Context. Los Angeles, CA:Roxbury Publishing Co.\nKinsell, Jeremy. (2000). The conductivity of transnational crime. Cross Border Control. 16, p.38.\nKrueger, A. O. (1974). The Political Economy of the Rent-Seeking. American Economic Review, 64: 291-303.\nKurtzman, Joel. (1993). The Death of Money. New York: Simon and Schuster.\nLeong, Angela Veng Mei. (2007). The Disruption of International Organised Crime - An Analysis of Legal and Non-legal Strategies. Hampshire: Ashgate Publishing Ltd.\nLevi, Michael. (2008). Organized fraud and organizing frauds: Unpacking research on networks and organization. Criminology and Criminal Justice. November 2008, vol. 8, no. 4, 389-419.\nLincoln, Y. S. & E. G. Guba (1985). Naturalistic Inquiry. Beverly Hills, CA: Sage.\nLupsha, P. A. (1987). A Macro Perspective on Organized Crime: Rational Choice Not Ethnic Behavior. Paper Presented to ASC Annual Meeting, Montreal Canada.\nMacNamara, D. E. J., & Stead, P. J. (1982). “Introduction,” in D. E. J. MacNamara & P. J. Stead (Eds.), New dimensions in transnational crime. New York: John Jay.\nMartin, J. M .,& Romano, A. T. (1992). Multinational Crime. Newbury Park, CA: SAGE Publications.\nMassey, Doreen B. (1984). Spatial divisions of labour: Social structures and the geography of production. New York: Methuen.\nMinc, Alain. (1993). Le Nouveau Moyen Age. Paris: Gallimard.\nMorselli, Carlo & Roy, Julie (2008). Brokerage Qualifications in Ringing Operations. Criminology 46(1): 71–98.\nMueller, G. O. (2001). “Transnational crime: Definitions and concepts,”pp.13-21 in P. Williams & D. Vlassis (Eds.), Combating transnational crime: Concepts, activities and responses. London, UK: Frank Cass.\nNaím, Moisés. (2005). ILLICIT: How Smugglers, Traffickers, and Copycats Are Hijacking the Global Economy. Public Affairs.\nNelken, David. (2011). Comparative Criminal Justice and Globalization. Farnham, UK: Ashgate.\nOhmae, Kenichi. (1990). The Borderless World. London: Collins.\nOhmae, Kenichi. (1995). The End of the Nation State. NY: Free Press.\nO’Keefe, Roger (2004). Universal Jurisdiction: Clarifying the Basic Concept. Journal of International Criminal Justice. 2 (3): 735-760.\nOnyebadi, Uche & Jiwoo Park (2012). ‘I’m Sister Maria. Please help me’: A lexical study of 4-1-9 international advance fee fraud email communications. International Communication Gazette. 74 (2): pp. 181-199.\nPatton, M. Q. (1980). Qualitative evaluation methods. Beverly Hills, CA: Sage.\nReiboldt, W. & Vogel, R. E. (2003). A Critical Analysis of Telemarketing Fraud in a Gated Senior Community. New York: UNODC.\nReichel, Philip. (Ed.). (2005). Handbook of Transnational Crime and Justice. Thousands Oaks, CA: Sage.\nReppetto, T. A. (1976). Crime Prevention and the Displacement Phenomenon. Crime and Delinquency, 22:166-177.\nReuter, P. & Petrie, C. (1999). Transnational organized crime: Summary of a workshop. Washington, DC: National Academy of Sciences, Committee on Law and Justice, Commission on Behavioral and Social Sciences and Education, National Research Council.\nSassen, Saskia. (1994). Cities in a World Economy. Thousand Oaks: Pine Forge press.\nSassen, Saskia. (1996). Losing Control. New York: Columbia University Press.\nSauerman, Adri. (2012). Book Review: Comparative Criminal Justice and Globalization. International Criminal Justice Review. 2012 22: 221.\nSerrano, M. (2002). “Transnational organized crime and international security: Business as usual?”pp.13-36 in M. Berdal & M. Serrano (Eds.), Transnational organized crime and international security: Business as usual? Boulder, CO: Lynne Rienner.\nShelley, Louise I.(1998). Crime and Corruption in the Digital Age. Journal of International Affairs, 51 (2): 605-620.\nShelley, L. (2006). The Globalization of Crime and Terrorism. Journal USA: The Challenges of Globalization, 4245. Washington:U.S. Department of State.\nSheptycki, James. & Ali Wardak (eds). (2005). Transnational and Comparative Criminology. Routledge-Cavendish.\nSiegel, Larry J.(2011). Criminology (11th ed.). Cengage Learning.\nSmith, H. (1989). Transnational crime: Investigative responses. Chicago, IL: Office of International Criminal Justice, University of Illinois at Chicago.\nSullivan, R. F. (1973).The Economics of Crime: An Introduction to the Literature. Crime and Delinquency, 19 (2):138-149.\nTashakkori, A. & C. Teddlie (1998). Mixed Methodology. Thousand Oak: Sage.\nTittle, C. R. & A. R. Rowe (1974). Certainty of arrest and crime rates: A further test of the deterrence hypothesis. Social Forces. 52:455-461.\nTreadwell, James. (2011). From the car boot to booting it up? eBay, online counterfeit crime and the transformation of the criminal marketplace. Criminology and Criminal Justice. November 9, 2011.\nTremblay, Pierre (1993). Searching for Suitable co-offenders. In Ron Clarke and Marcus Elson (eds), Routine Activity and Rational Choice. Edison, NJ: Transaction.\nTullock, G. (1967). The Welfare Costs of Tariffs, Monopolies and Theft. Western Economic Journal, 5: 224-232.\nVarese, Federico (2011). Mafias on the Move: How Organized Crime Conquers New Territories. NJ: Princeton University Press.\nWasserman, Stanley & Katherine Faust (1994). Social Network Analysis in the Social and Behavioral Sciences. Social Network Analysis: Methods and Applications. Cambridge University Press. pp. 1–27.\nWilhelm,W.K.(2004). The Freud Management Lifecycle Theory. Journal of Economic Crime Management, 2(2).\nWilliams, P. & Vlassis, D. (2001). Combating Transational Crime: Concepts, Activities, and Responses. London: Antony Rowe Ltd.\nWilliams, P. (2001). “Organizing transnational crime: Networks, markets and hierarchies,”pp. 57-87 in P. Williams & D. Vlassis (Eds.), Combating transnational crime: Concepts, activities and responses. London, UK: Frank Cass.\nWilliams, Phil (2001). Transnational Criminal Networks. In John Arquilla & David Ronfeldt (Eds.), Networks and Netwars: The Future of Terror, Crime, and Militancy. RAND Corporation.\nWilliams, Phil. & Gregory Baudin-O’ Hayon. (2002). “Global Governance, Transnational Organized Crime and Money Laundering.” in Governing Globalization: Power, Authority and Global Governance, edited by Held, David & Anthony Mcgrew. John Wiley & Sons.\nWoodiwiss, Michael. (2007). Double Cross: States, Corporations, and the Global Reach of Organized Crime. International Criminal Justice Review. March 2007(17): 45-51.\nXu, Jennifer & Hsinchun Chen. (2005) Criminal network analysis and visualization. Communications of The ACM. June 2005, 48 (6): 100-107. NY.
描述: 博士
國立政治大學
國家發展研究所
97261503
資料來源: http://thesis.lib.nccu.edu.tw/record/#G0097261503
資料類型: thesis
Appears in Collections:學位論文

Files in This Item:
File SizeFormat
150301.pdf4.5 MBAdobe PDF2View/Open
Show full item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.