透過您的圖書館登入
IP:3.21.34.0
  • 學位論文

低欺騙偵知線索環境下欺騙認知互動模式之探索性研究 -以台灣地區電話詐騙案為例

An Explorative Study of Deception Cognition Interactive Model In Low Deception Detecting Cue:An Empirical Study of Taiwan’s Telephone Deception

指導教授 : 陳啟光

摘要


有鑑於近年來電話詐騙問題日趨嚴重,因此如何有效嚇阻此現象成為一個非常重要且急迫的課題。根據文獻回顧,過去學者對詐騙問題的探究多偏重於「面對面」環境下的欺騙認知研究,近年來雖有部份學者針對網路交易等「非面對面」詐騙行為進行研究,但領域上仍偏向於犯罪手法的分析,對於以認知互動觀點探討「非面對面」詐騙認知的研究仍相當缺乏。因此本文欲從認知科學的觀點,探討「非面對面」及「低欺騙偵知線索」環境下的電話詐騙行為,以提供電話詐騙預防的參考。本研究透過刑事警察局的協助,以個案訪談為研究方法共蒐集了「中獎詐騙」、「信用卡詐騙」及「恐嚇詐騙」三種類型計18個電話詐騙受害者樣本。概念架構主要包括「欺騙者資訊輸出」及「偵知者認知截取及判斷」兩大構面,並將詐騙過程分為「引誘接觸」、「設計說服」、「行動指示」、「獲利隱匿」等四階段進行探討。根據訪談資料內容分析結果顯示,在不同詐騙類型中,詐騙者的訊息操作手法以及偵知者的認知判斷與處理行為均有其共通性;但在不同詐騙階段,詐騙者的訊息操作手法以及偵知者的認知判斷與處理行為卻有其差異性。其次,以詐騙預防的觀點對各階段認知互動訊息進行內容分析,發現以「第三階段-行動指示」產生的互動訊息最多,影響也最為關鍵。最後,本研究根據資料分析結果,提出一個電話詐騙認知互動模式。上述各項分析結果所代表之意義,在本文中有進一步的探討。

並列摘要


Telephone communication is becoming more pervasive in most recent ten years, especially mobilephone. Yet, as with all human communication, telephone communication vulnerable to deceit, the objective of this paper is to examine the influential factors of deception deceiver and detector interactive cognition behavior under telephone medium. According to the past literature review, we found most of studies either focused on the deception cognition of face-to-face circumstance or focused on the deception manipulation trick of compute-mediated communication. Has been little if any research at the intersection of these two research streams that including electronic communication and deception cognition behavior. We review these two streams and suggest a research framework for investigating their intersection. The framework proposes to decompose into two aspect(deceiver and detector)and four processes phase:(I)entice somebody contact (II)interpret & convince(III)mission indicate(IV)escape & hide. In the conclusion , we have provided four propositions:(1)the interactive cue of different process phase were significant(2)process phase III was the most influential phase as detector point of view(3)we explain failure to detect deception by means of cognition bugs & biases(4)the availability of most detector cognition was originate with the lasting intellectual legacy of his work & experience. The interesting finding and its implications are further discussed in the following.

參考文獻


6.吳秀,2003,我們都是一家人-成功收養大小孩之初探性研究,國立台灣師範大學教育心理與輔導研究所碩士論文
10.陳玉真,2003,以Rogers組織創新過程模型探索政府機關為民服務創新作為之擴散過程,元智大學工業工程與管理研究所碩士論文。
2.Buller, D. B. and J. K. Burgoon. (1996). “Interpersonal Deception Theory,” Communication Theory 6 (3), 203–242.
3.Burgoon, J. K, D. B. Buller, A. Ebesu, and P. Rockwall. (1994). “Interpersonal Deception: V. Accuracy in Deception Detection,” Communication Monographs 61, 303–325.
4.Burgoon, J.K. and Buller, D.B., (1994), "Interpersonal deception:III. Effects of deceit on perceived communication and nonverbal behavior dynamics," Journal of Nonverbal Behavior, 18(2), , pp. 155-184.

被引用紀錄


王強(2008)。資料探勘技術應用於詐騙交易帳戶行為之研究〔碩士論文,大同大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0081-0607200917244835
黃麗琴(2009)。國小學生運動安全認知、態度與行為之研究--以台中市某國小高年級學生為例〔碩士論文,國立臺灣師範大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0021-1610201315152811
翁嗡琳(2015)。室外運動場地設施對運動傷害認知及使用者滿意度之探討〔碩士論文,朝陽科技大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0078-2502201617133088

延伸閱讀