學術產出-Theses

Article View/Open

Publication Export

Google ScholarTM

政大圖書館

Citation Infomation

  • No doi shows Citation Infomation
題名 信用卡偽卡偵測之研究
作者 張憶賢
貢獻者 陳春龍<br>諶家蘭
<br>
張憶賢
關鍵詞 偽卡偵測
日期 2003
上傳時間 14-Sep-2009 09:11:00 (UTC+8)
摘要 檢視以往在偽卡偵測的研究上,均是以能找出最多偽卡交易的方法為研究目標,再以該方法應用在所有持卡人身上。這些研究中的確找出了許多的好方法,但卻也有著以大多數人的行為模式套用在個人行為模式上的盲點,雖然也有研究是依據個人行為模式來偵測偽卡,但仍然沒有做到完全以個人為研究單位。
     為解決上述的問題,本研究採用事件歷史分析法(Event History analysis) ,此方法用於觀察一段時間內某一事件的發生與否,探討事件的發生原因,並據以產生預測模型(hazard function)來預測事件發生的可能性。[王仕茹,民82] [林欣美,民84] [張佩惠,民85] 應用此方法於偽卡交易偵測上,可以得知造成該卡人偽卡交易產生的因素為何?是地點、特店別還是其他因素;更甚而可以建立個人預測偽卡的模型(hazard function),利用此模型判斷某筆交易是偽卡交易的百分比。
     本研究應用此方法找出造成偽卡交易產生的因素,但限於所使用的軟體未提供當時間相關變數存在時,建構危機函數 (hazard function) 的功能,因此本研究採用決策樹來彌補這方面的不足。
When reviewing the researches about fraud cards detecting in the past, most of them focus on how to enhance the probabilities to detect fraud cards. Then,they applied the methods they found to detect all the cardholders’ credit cards. The shortcoming is it’s easy to treat the fraud transactions as the normal transactions because every cardholder has different consuming behavior. Even some researchers try to detect fraud cards by personal consuming behavior. In fact,they still don’t detect fraud cards by personal consuming behavior completely.
     To resolve the problems described as above,this research adapt Event History analysis. Event history analysis revolves around two concepts: the risk set and the hazard rate(Allison 1984). The risk set comprises the number of dyads subject to event occurrence at a particular point in time. “The hazard rate is the probability that an event will occur at a particular time to a particular individual, given that the individual is at risk at that time” (Allison 1984, 16). We applied this method on fraud cards detecting to find the factors which cause fraud cards happened. Besides that,we can build the hazard function and use it to know the fraud opportunity of the transaction.
     This research applied the method to find the factors which cause fraud cards happened successfully. The software this research used doesn’t provide the function to create hazard function when the time dependent variables exist,so this research replaced it with decision tree
參考文獻 Ø 中文部份
[劉秀玲,民90]
劉秀玲,「英國晶片信用卡推動及發展情形」,財政部金融局,出國報告書,民國90年。
[黃琮聖,民90]
黃琮盛,「以個人消費行為預測信用卡詐欺事件之研究」,國立中央大學資訊管理研究所,碩士論文,民國90年。
[張佩惠,民85]
張佩惠,信用卡持卡期間長短之研究 : 以事件歷史分析法分析之,國立台灣大學國際企業學研究所,碩士論文,民國85年。
[林欣美,民84]
林欣美,事件分析法探討廣告代理關係的不穩定性,國立台灣大學國際企業學研究所,碩士論文,民國84年。
[王仕茹,民82]
王仕茹,以事件歷史分析法探討中外合資事業之不穩定性,國立台灣大學國際貿易研究所,碩士論文,民國82年。
[聯合信用卡處理中心,民91]
聯合信用卡處理中心,「聯合信用卡中心會員銀行詐欺損失形態分析圖」,民國91年,http://www.nccc.com.tw
[聯合晚報,民91]
蔡政諺、曹敏吉,「利誘入黑幫 偽卡當零用錢」,聯合晚報,2002/09/18。
蔡政諺,「財金員工盜賣密碼 追查偽造金融卡」,聯合報,2002/09/20。
[中央社,民92]
吳顯申,「駭客入侵美電腦星國銀行未發現未獲授權交易」,中央社,2003/02/21。
[顏志義,民88]
顏志義,「信用卡犯罪問題之研究」,中央警察大學刑事警察研究所,碩士論文,民國88年。
[Michael J. A. Berry, Gordon S. Linoff,2001]
Michael J. A. Berry, Gordon S. Linoff,譯者 : 彭文正博士,Data Mining 資料採礦 顧客關係管理暨電子行銷之應用,2001/06。
Ø 英文部份
[Joseph F. Hair,Jr. Rolph E. Anderson Ronald L. Tatham,1987]
Joseph F. Hair,Jr. Rolph E. Anderson Ronald L. Tatham,”Multivariate Data Analysis with Readings”,Macmillan,Second Edition,1987。
[Kevin J. Leonard,1993]
Kevin J. Leonard “The development of a rule based expert system model for fraud alert in consumer credit”, European Journal of Operational Research,Received Novermber;revised June 1993.
[Lori MacVittie,2002]
Lori MacVittie,’Online fraud detection takes diligence’,Network Computing,Feb 18, 2002.
[Paul D. Allison, 1995]
Paul D. Allison, Survival Analysis Using SAS Systems: A Practical Guide. SAS Institute Inc. Cary, NC, USA, 1995.
[Wheeler,R., Aitken,S,2000]
Wheeler,R., Aitken,S., “Mutilple Algorithms for Fraud Detection”, Knowledge-Based System, Volume: 13, Issue: 2-3,April, 2000.
[W Kim; M Kim,1999]
W Kim; M Kim; ‘Performance and scalability in knowledge engineering: Issues and solutions’, Journal of Object - Oriented Programming; New York; Nov/Dec 1999.
描述 碩士
國立政治大學
資訊管理研究所
90356039
92
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0090356039
資料類型 thesis
dc.contributor.advisor 陳春龍<br>諶家蘭zh_TW
dc.contributor.advisor <br>en_US
dc.contributor.author (Authors) 張憶賢zh_TW
dc.creator (作者) 張憶賢zh_TW
dc.date (日期) 2003en_US
dc.date.accessioned 14-Sep-2009 09:11:00 (UTC+8)-
dc.date.available 14-Sep-2009 09:11:00 (UTC+8)-
dc.date.issued (上傳時間) 14-Sep-2009 09:11:00 (UTC+8)-
dc.identifier (Other Identifiers) G0090356039en_US
dc.identifier.uri (URI) https://nccur.lib.nccu.edu.tw/handle/140.119/31062-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊管理研究所zh_TW
dc.description (描述) 90356039zh_TW
dc.description (描述) 92zh_TW
dc.description.abstract (摘要) 檢視以往在偽卡偵測的研究上,均是以能找出最多偽卡交易的方法為研究目標,再以該方法應用在所有持卡人身上。這些研究中的確找出了許多的好方法,但卻也有著以大多數人的行為模式套用在個人行為模式上的盲點,雖然也有研究是依據個人行為模式來偵測偽卡,但仍然沒有做到完全以個人為研究單位。
     為解決上述的問題,本研究採用事件歷史分析法(Event History analysis) ,此方法用於觀察一段時間內某一事件的發生與否,探討事件的發生原因,並據以產生預測模型(hazard function)來預測事件發生的可能性。[王仕茹,民82] [林欣美,民84] [張佩惠,民85] 應用此方法於偽卡交易偵測上,可以得知造成該卡人偽卡交易產生的因素為何?是地點、特店別還是其他因素;更甚而可以建立個人預測偽卡的模型(hazard function),利用此模型判斷某筆交易是偽卡交易的百分比。
     本研究應用此方法找出造成偽卡交易產生的因素,但限於所使用的軟體未提供當時間相關變數存在時,建構危機函數 (hazard function) 的功能,因此本研究採用決策樹來彌補這方面的不足。
zh_TW
dc.description.abstract (摘要) When reviewing the researches about fraud cards detecting in the past, most of them focus on how to enhance the probabilities to detect fraud cards. Then,they applied the methods they found to detect all the cardholders’ credit cards. The shortcoming is it’s easy to treat the fraud transactions as the normal transactions because every cardholder has different consuming behavior. Even some researchers try to detect fraud cards by personal consuming behavior. In fact,they still don’t detect fraud cards by personal consuming behavior completely.
     To resolve the problems described as above,this research adapt Event History analysis. Event history analysis revolves around two concepts: the risk set and the hazard rate(Allison 1984). The risk set comprises the number of dyads subject to event occurrence at a particular point in time. “The hazard rate is the probability that an event will occur at a particular time to a particular individual, given that the individual is at risk at that time” (Allison 1984, 16). We applied this method on fraud cards detecting to find the factors which cause fraud cards happened. Besides that,we can build the hazard function and use it to know the fraud opportunity of the transaction.
     This research applied the method to find the factors which cause fraud cards happened successfully. The software this research used doesn’t provide the function to create hazard function when the time dependent variables exist,so this research replaced it with decision tree
en_US
dc.description.tableofcontents 中文摘要…………………………………………………………………………………..1
     英文摘要…………………………………………………………………………………..2
     目錄………………………………………………………………………………………..3
     第一章 研究動機與目的………………….…………………………………………...5
     第二章 文獻探討
     第一節、信用卡偽卡偵測方法……………………………………………………..7
     第二節、事件歷史分析法 (Event History Analysis)………………………………11
     第三章 研究方法……………….………………………………………………….….15
     第四章 實證分析……………….………………………………………………….….20
     第五章 研究結果與建議……………….…………………………………….……….29
     參考文獻 …………………………………………………………………………………30
     附件一.SAS PROC PHREG 執行結果…………………………………………………..37
     
     圖表
     圖表一. 決策樹的判斷方式……………………………………………………………15
     
     表格
     表一. 執行COX之資料內容…………………………………………………………18
     表二. 持卡人消費行為資料格式--商店類別…………………………………………20
     表三. 持卡人消費行為資料格式--消費地點…………………………………………21
     表四. 持卡人消費行為資料格式--消費金額…………………………………………21
     表五. 持卡人消費行為資料格式--消費時間…………………………………………21
     表六. 驗證最佳決策樹之結果…………………..………………………………….…24
     表七.決策樹一之實驗結果…..…………………..………………………………….…25
     表八.決策樹二之實驗結果…..…………………..………………………………….…25
     表九.決策樹三之實驗結果…..…………………..………………………………….…26
     表十.各決策樹之誤差率……..…………………..………………………………….…26
zh_TW
dc.language.iso en_US-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0090356039en_US
dc.subject (關鍵詞) 偽卡偵測zh_TW
dc.title (題名) 信用卡偽卡偵測之研究zh_TW
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) Ø 中文部份zh_TW
dc.relation.reference (參考文獻) [劉秀玲,民90]zh_TW
dc.relation.reference (參考文獻) 劉秀玲,「英國晶片信用卡推動及發展情形」,財政部金融局,出國報告書,民國90年。zh_TW
dc.relation.reference (參考文獻) [黃琮聖,民90]zh_TW
dc.relation.reference (參考文獻) 黃琮盛,「以個人消費行為預測信用卡詐欺事件之研究」,國立中央大學資訊管理研究所,碩士論文,民國90年。zh_TW
dc.relation.reference (參考文獻) [張佩惠,民85]zh_TW
dc.relation.reference (參考文獻) 張佩惠,信用卡持卡期間長短之研究 : 以事件歷史分析法分析之,國立台灣大學國際企業學研究所,碩士論文,民國85年。zh_TW
dc.relation.reference (參考文獻) [林欣美,民84]zh_TW
dc.relation.reference (參考文獻) 林欣美,事件分析法探討廣告代理關係的不穩定性,國立台灣大學國際企業學研究所,碩士論文,民國84年。zh_TW
dc.relation.reference (參考文獻) [王仕茹,民82]zh_TW
dc.relation.reference (參考文獻) 王仕茹,以事件歷史分析法探討中外合資事業之不穩定性,國立台灣大學國際貿易研究所,碩士論文,民國82年。zh_TW
dc.relation.reference (參考文獻) [聯合信用卡處理中心,民91]zh_TW
dc.relation.reference (參考文獻) 聯合信用卡處理中心,「聯合信用卡中心會員銀行詐欺損失形態分析圖」,民國91年,http://www.nccc.com.twzh_TW
dc.relation.reference (參考文獻) [聯合晚報,民91]zh_TW
dc.relation.reference (參考文獻) 蔡政諺、曹敏吉,「利誘入黑幫 偽卡當零用錢」,聯合晚報,2002/09/18。zh_TW
dc.relation.reference (參考文獻) 蔡政諺,「財金員工盜賣密碼 追查偽造金融卡」,聯合報,2002/09/20。zh_TW
dc.relation.reference (參考文獻) [中央社,民92]zh_TW
dc.relation.reference (參考文獻) 吳顯申,「駭客入侵美電腦星國銀行未發現未獲授權交易」,中央社,2003/02/21。zh_TW
dc.relation.reference (參考文獻) [顏志義,民88]zh_TW
dc.relation.reference (參考文獻) 顏志義,「信用卡犯罪問題之研究」,中央警察大學刑事警察研究所,碩士論文,民國88年。zh_TW
dc.relation.reference (參考文獻) [Michael J. A. Berry, Gordon S. Linoff,2001]zh_TW
dc.relation.reference (參考文獻) Michael J. A. Berry, Gordon S. Linoff,譯者 : 彭文正博士,Data Mining 資料採礦 顧客關係管理暨電子行銷之應用,2001/06。zh_TW
dc.relation.reference (參考文獻) Ø 英文部份zh_TW
dc.relation.reference (參考文獻) [Joseph F. Hair,Jr. Rolph E. Anderson Ronald L. Tatham,1987]zh_TW
dc.relation.reference (參考文獻) Joseph F. Hair,Jr. Rolph E. Anderson Ronald L. Tatham,”Multivariate Data Analysis with Readings”,Macmillan,Second Edition,1987。zh_TW
dc.relation.reference (參考文獻) [Kevin J. Leonard,1993]zh_TW
dc.relation.reference (參考文獻) Kevin J. Leonard “The development of a rule based expert system model for fraud alert in consumer credit”, European Journal of Operational Research,Received Novermber;revised June 1993.zh_TW
dc.relation.reference (參考文獻) [Lori MacVittie,2002]zh_TW
dc.relation.reference (參考文獻) Lori MacVittie,’Online fraud detection takes diligence’,Network Computing,Feb 18, 2002.zh_TW
dc.relation.reference (參考文獻) [Paul D. Allison, 1995]zh_TW
dc.relation.reference (參考文獻) Paul D. Allison, Survival Analysis Using SAS Systems: A Practical Guide. SAS Institute Inc. Cary, NC, USA, 1995.zh_TW
dc.relation.reference (參考文獻) [Wheeler,R., Aitken,S,2000]zh_TW
dc.relation.reference (參考文獻) Wheeler,R., Aitken,S., “Mutilple Algorithms for Fraud Detection”, Knowledge-Based System, Volume: 13, Issue: 2-3,April, 2000.zh_TW
dc.relation.reference (參考文獻) [W Kim; M Kim,1999]zh_TW
dc.relation.reference (參考文獻) W Kim; M Kim; ‘Performance and scalability in knowledge engineering: Issues and solutions’, Journal of Object - Oriented Programming; New York; Nov/Dec 1999.zh_TW