Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/36948
題名: 以BDI代理人架構為基礎於網路虛擬社群 之群體犯罪偵測
A BDI-based Collective Crime Detection Service for Virtual Community
作者: 莊竣丞
Jhuang, Jyun Cheng
貢獻者: 苑守慈
Yuan, Soe Tsyr
莊竣丞
Jhuang, Jyun Cheng
關鍵詞: 網路群體犯罪
BDI代理人架構
差別接觸理論
社會學習理論
網路科學
Collective Crime
BDI Architecture
Theory of Differential Association
Theory of Social Learning
Network Science
日期: 2007
上傳時間: 18-Sep-2009
摘要: 本論文所定義之「網路群體犯罪」,不同於組織犯罪般有結構的犯罪團體,亦非為了追求共同利益而合作的共犯夥伴,而是網路使用者自發性互動行為下逐漸浮現的群體近似犯行為,並且普遍存在於當今各式各樣的網際網路社群,以各種不同的樣貌與形式展現。本研究以Sutherland(1978)提出之差別接觸理論與Bandura(1977)提出之社會學習理論為基礎,運用理論相關的元素與概念作為食材與食譜,以BDI代理人模式為方法來設計網路群體犯罪之模擬模式,透過動態模擬群體犯罪在不同條件下展現不同之面貌。更運用Watts(2003)主張的網路科學概念與分析方法,來分析犯罪關係網絡之特性,本研究藉由控制網路社群之使用者人數(Size)與初始犯罪率(ICR)來觀察不同組合之下所演化的網路結構差異,並從四個衡量指標:犯罪技能平均數、群聚係數、前10%使用者平均連結度、連結度小於10之比率,標示演化之網路結構的特徵。研究結果發現:1. 犯罪技能擴散的速度受到ICR高低的影響,當ICR越高的時候犯罪技能擴散的速度越快,反之,當ICR較低的時候犯罪技能擴散速度隨之減緩。2. 當ICR超越某一特定臨界值之後,使用者擁有的犯罪技能平均數與所屬社群人數成正向關係。3. ICR的高低對於群聚係數的高低有反向關係,當ICR越高則群聚係數越低,反之,當ICR越低時群聚係數越高。4. 社群使用者人數越多的情況下,群聚係數越低。5. 前10%使用者的平均連結度有隨著演化次數逐漸增加的趨勢。6. 初始犯罪率的高低與前10% 使用者的平均連結度成反比關係。7. 不論演化次數、社群人數多寡與初始犯罪率值之高低,均僅有少數犯罪者擁有高度的連結,絕大多數的使用者或犯罪者其連結度數均不高(符合power law分佈)。
Collective crime is an emerging phenomenon along with collective intelligence in recent years. It is defined as a form of universally distributed crime originated from spontaneous interaction among community users in this paper. The issues that collective crime addresses focus on deviant or criminal behavior existing in common groups or crowds rather than traditional topics at computer crime or cybercrime. The theories, “differential association” proposed by criminologist Sutherland(1978) and “social learning” proposed by sociologist Bandura(1977), underpin the explanation of collective crime phenomena and the model design of agent-based simulation. The detection function of collective crime consists of the evolving network function based on the micro-simulation and an analysis of the function along with four indicators: average amount of crime skills, average cluster coefficient, average degree of top 10% users, and rate of users with degrees smaller than 10. The research findings are: 1. A community with higher initial crime rate (ICR) results in faster spreading of crime skills. 2. A negative relationship between the community size and the average amounts of crime skills exists, as ICR exceeds a threshold. 3. As ICR gets increasing, the average cluster coefficient gets decreasing, and vice versa. 4. The average cluster coefficient gets decreasing along with increasing community size. 5. The average degree of top 10% users gets increasing along time. 6. A negative relationship exists between ICR and the average degree of the top 10% users. 7. The distribution of the degrees of community users follows the scale-free power law distribution – whatever the network evolution times, community size and ICR are, most of the community users have fewer degrees and only few criminals have pretty high degrees relatively.
參考文獻: 1. 林山田、林東茂、林燦璋,民94。『犯罪學』(3版),臺北市 : 三民。
2. 林宜隆、黃讚松,民88,『網路犯罪學芻議之探討』,台灣區網際網路學術研討會(TANET’99),國立中山大學主辦。
3. 邱議德,民92,以社會網路分析法評估工作團隊知識創造與分享,國立中正大學資訊管理研究所碩士論文。
4. 范國勇,民94,網路犯罪成因與防治對策之研究。內政部警政署刑事警察局委託之專題研究報告,未出版。
5. Bandura, A. 1977. Social learning theory, Englewood Cliffs, N.J.: Prentice-Hall.
6. Barabasi, A. L., & Albert, R. 1999. “Emergence of Scaling in Random Networks,” Science (286:5439), pp. 509-512.
7. Bosse, T., Jonker, C. M., Meij, L van der. & Treur, J. 2005. “LEADSTO: a language and environment for analysis of dynamics by SimulaTiOn,” Proceedings of MATES`05. LNAI 3550. Springer Verlag 2005, pp.165-178.
8. Bratman, M. E. 1987. Intentions, Plans, and Practical Reason, Cambridge, MA: Harvard University.
9. Bratman, M. E., Israel, D. J., & Pollack, M. E. 1988. “Plans and resource-bounded practical reasoning,” Computational Intelligence (4), pp. 349-355.
10. Clarke, R. V., 2004. “Technology, Criminology and Crime Science,” European Journal on Criminal Policy and Research (10:1), pp. 55-63
11. Ferber, J. 1999. Multi-agent systems: an introduction to distributed artificial intelligence (Addison-Wesley Longman, Trans.), New York: Addison-Wesley Longman. (Original work published 1995)
12. Georgeff, M. P., & Lansky, A. L. 1987. “Reactive reasoning and planning,” Proceedings of the Sixth National Conference on Artificial Intelligence (AAAI-87), Seattle, Washington, pp. 677-682.
13. Latane, B., & Wolf, S. 1981. “The Social Impact of Majorities and Minorities,” Psychological Review (88:5), pp. 438-453.
14. Latora, V., & Marchiori, M. 2003. “Economic small-world behavior in weighted networks,” The European Physical Journal B - Condensed Matter and Complex Systems (32:2), pp. 249-263.
15. Newman, M. E. J. 2003. “The structure and function of complex networks,” SIAM Review (45:2), pp. 167–256.
16. Panzarasa, P., Jennings, N. R., & Norman, T. J. 2001. “Social mental shaping: modelling the impact of sociality on autonomous agents` mental states,” Computational Intelligence (17:4). pp. 738-782.
17. Rao, A. S., & Georgeff, M. P. 1995. “BDI agents: from theory to practice,” Proceedings of the First International Conference on Multi-Agent Systems (ICMAS’95), San Francisco, pp. 312–319.
18. Sutherland, E. H., & Cressey, D. R. 1978. Criminology (10th ed.), Philadelphia: Lippencott.
19. Williams III, F. P., & McShane, M. D. 1998. Criminology Theory: Selected Classic Readings (2nd ed.), Cincinnati, Ohio: Anderson Publishing.
20. Watts , D. J. 2003. Six degrees: the science of a connected age, New York: W. W. Norton & Company.
21. Wooldridge, M. J. 2000. Reasoning About Rational Agents, Cambridge, MA: The MIT Press.
22. Young, H. P. 2007. “Innovation Diffusion in Heterogeneous Populations: Contagion, Social Influence, and Social Learning,” CSED Working Paper.
描述: 碩士
國立政治大學
資訊管理研究所
95356030
96
資料來源: http://thesis.lib.nccu.edu.tw/record/#G0095356030
資料類型: thesis
Appears in Collections:學位論文

Files in This Item:
File Description SizeFormat
603001.pdf295.53 kBAdobe PDF2View/Open
603002.pdf296.94 kBAdobe PDF2View/Open
603003.pdf137.84 kBAdobe PDF2View/Open
603004.pdf370.48 kBAdobe PDF2View/Open
603005.pdf385.51 kBAdobe PDF2View/Open
603006.pdf416.04 kBAdobe PDF2View/Open
603007.pdf494.03 kBAdobe PDF2View/Open
603008.pdf454.29 kBAdobe PDF2View/Open
603009.pdf1.33 MBAdobe PDF2View/Open
603010.pdf347.23 kBAdobe PDF2View/Open
603011.pdf368.89 kBAdobe PDF2View/Open
Show full item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.