|
吳宗穎 (2016) 從情境犯罪預防觀點探究國內詐欺犯罪之利益與風險-詐欺犯罪人的自我陳述,國立中正大學犯罪防治學系研究所碩士論文。 林耿徽 (2013) 電信詐欺犯罪偵查管理之研究,中央警察大學刑事警察研究所碩士論文。 紀延熹 (2014) 海峽兩岸跨境電信詐欺犯罪歷程之研究-以假冒機構詐欺集團犯罪模式為例,國立臺北大學犯罪學研究所碩士論文。 許華孚、吳宗穎、劉育偉 (2018) 本土化電信詐欺犯罪利益及風險之實證研究,公共事務評論,第 17 卷,第 2 期,頁25。 張鴻昌 (2001) 以機器學習分析自設非法電信平台詐欺電話之通聯紀錄,中央警察大學刑事警察研究所碩士論文。 曾雅芬 (2016)行騙天下:臺灣跨境電信詐欺犯罪網絡之分析,國立政治大學國家發展研究所博士論文。 潘育華 (2019) 電信詐騙提款犯罪熱點之環境特性分析-以新竹市為例,國立清華大學環境與文化資源學系社區與社會學習領域碩士在職專班論文。 劉家妤 (2012) 跨境電話詐欺集團特徵之研究,國立臺北大學犯罪學研究所碩士論文。 謝浚鋒 (2009) 電信詐欺犯罪模式與偵查之研究,國立臺北大學犯罪學研究所碩士論文。 簡禎富(2005),決策分析與管理,雙葉書廊,台北。 簡禎富(2019),紫式決策工具全書,雙葉書廊,台北。 Ahn, B. S., Cho, S. S. & Kim, C. Y. (2000), The integrated methodology of rough set theory and artificial neural network for business failure prediction, Expert Systems with Applications, 18(2), 65-74. Andrzej J.& Lala S.-R.(2019), Package ‘RoughSets’. Data Analysis Using Rough Set and Fuzzy Rough Set Theories. Ver. 1.3-7. Barbagallo, S., Consoli, S., Pappalardo, N., Greco, S. & Zimbone, S. M. (2006), “Discovering reservoir operating rules by a Rough Set approach,” Water Resources Management, 20(1), 19-36. Chien, C.-F. & Chen, L.-F. (2007), “Using Rough Set Theory to Recruit and Retain High-Potential Talents for Semiconductor Manufacturing,” IEEE Transactions on Semiconductor Manufacturing, Vol.20, No.4, pp.528-541. Chien, C.-F., Wang, H., & Wang, M. (2007), “A UNISON framework for analyzing alternative strategies of IC fnal testing for enhancing overall operational effectiveness,” International Journal of Production Economics, 107(1), 20–30. Chien, C.-F., & Hsu, C.-Y. (2011), “UNISON analysis to model and reduce step-and-scan overlay errors for semiconductor manufacturing,” Journal of Intelligent Manufacturing, 22(3), 399–412. Chien, C.-F., Kerh, R., Lin, K.-Y., Yu, A. P.-I (2016), “Data-driven innovation to capture user-experience product design: An empirical study for notebook visual aesthetics design,” Computers & Industrial Engineering, 99, 162–173. Fu, W.-H., & Chien, C.-F. (2019), “UNISON data-driven intermittent demand forecast framework to empower supply chain resilience and an empirical study in electronics distribution,” Computers & Industrial Engineering, 135, 940-949. Hu, Y.-F., Hou, J.-L., & Chien, C.-F. (2019), “A UNISON framework for knowledge management of university-industry collaboration and an illustration,” Computers & Industrial Engineering, 129, 31–43. Keeney, R.L., Raiffa, H. (1993), “Decisions with multiple objectives: preferences and value tradeoffs,” Cambridge University Press, New York. Laimek, R. & Kaothanthong, N.,(2018), “ATM Fraud Detection using Behavior Model,” Asian Conference on Defense Technology, Oct.25-26, Hanoi. Lin, K.-Y., Chien, C.-F., & Kerh, R. (2016), “UNISON framework of data-driven innovation for extracting user experience of product design of wearable devices,” Computers & Industrial Engineering, 99, 487–502. Linoff, G. S., & Berry, M. J. A. (2011), "Data mining techniques: For marketing, sales and customer relationship management”, 3rd ed. Lin, Y.-H., Chien, C.-F., & Yu, C.-M. (2015), “UNISON decision analysis framework for workforce planning for semiconductor fabs and an empirical study.” International Journal of Industrial Engineering: Theory, Applications and Practice, 22(5), 631–644. Pawlak, Z. (1982), “Rough sets,” International Journal of Computer and Information Sciences. Pawlak, Z. (1997), “Rough set approach to knowledge-based decision support,” European Journal of Operational Research, 99(1), 48–57. Peng, J.-T. Chien, C.-F. & Tseng, T.-L.B.(2004), “Rough set theory for data mining for fault diagnosis on distribution feeder,” IEE Proceedings - Generation, Transmission and Distribution, Vol.151, No.6, November. Robin, X.(2020), Package ‘pROC’, Display and Analyze ROC Curves, Ver.1.17.0.1 Shalabi, L.-A.(2017), “Perceptions of crime behavior and Relationships: Rough Set Based Approach,” International Journal of Computer Science and Information Security, Vol.15, No.3, March. Su, C.-T. & Hsu, J.-H. (2006), Precision parameter in the variable precision rough sets model: an application. Omega-International Journal of Management Science, 34(2), 149-157. Xu, W., Pang, Y., Ma, J., Wang, S.-Y., Hao, G., Zeng, S.& Qian, Y.-H. (2008), “Fraud Detection in Telecommunication: A Rough Fuzzy Set Based Approach,” International Conference on Machine Learning and Cybernetics, July 12-15. Zhou, C.& Lin, Z. (2018), “Study on Fraud Detection of Telecom Industry Based on Rough Set,” IEEE 8th Annual Computing and Communication Workshop and Conference, Jan. 8-10.
|