:::

詳目顯示

回上一頁
題名:視覺化虛設行號逃漏稅預警機制建置之探討
作者:許志誠
作者(外文):Chih-Cheng Hsu
校院名稱:元智大學
系所名稱:管理學院博士班
指導教授:鄭雅穗
學位類別:博士
出版日期:2014
主題關鍵詞:虛設行號逃漏稅商業智慧資料探勘知識管理Tax EvasionBogus Business EntitiesVisualized Data MiningBusiness IntelligenceKnowledge Management
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:14
虛設行號之困擾存在已久,這類型不法企業之營業人開立發票供他人作為進貨或費用憑證,此行為與發票憑證影響我國正常稅務課徵之機制與公平性。政府稅務相關單位為此投入人力與資源,目的在於能夠早期發現虛設行號進而有效抑止。然而稅務人員面對數量繁多的申報資料,以及稅務任務多元化的實際狀況下,經驗傳承與選案效率都是查核困難原因。
本研究之目的在於協助稅務單位有效管理與分享查核虛設行號之知識,進而能夠給予有效的預警資訊。我們運用資訊科技與資料科學分析技術,建置視覺化虛設行號預警機制,運用DMAIC方法論建構整體知識發掘流程,依據知識管理與分享本體論定義,以KNIME作為視覺化預警機制建置之呈現。
在執行虛設行號資料來源之資料蒐集與轉置後,我們進行三個研究主題,包括虛設行號負責人特徵、虛設行號申報營業稅特徵、虛設行號與正常企業申報資料之比較。研究過程中我們歸納出虛設行號可能存在的兩個面項特徵,亦即企業在申報營業稅時基於進銷平衡與營運槓桿等。在各流程中我們均依據知識管理與分享本體論建置,並進行視覺化呈現與操作,可快速有效產出相關報告,協助相關單位進行虛設行號逃漏稅主動稽查之決策依據。
我們所建立之虛設行號逃漏稅預警機制之資料庫與分析模式庫具有無限擴充特性,可依使用者經驗、新開發資料探勘技術與分析改善後之結果回饋執行,持續強化決策正確性。除營業稅與虛設行號資料外,仍可套用於其他財稅相關資料、專家經驗與必要之外部資料等,建置符合該類型逃漏稅預警機制。
We aimed to apply visualized data mining technique to establish a mechanism for bogus entity detection. In the past research, we collected datasets related to a large bogus entities group and their tax records, analyzing and extracting characteristics of crime. In this project, relevant datasets from large databases of 8 different systems at the Fiscal Information Agency will be integrated, examined, and extracted for tax evasion pattern recognition and for prior/ex crime behavior analysis.
Based on DMAIC (Define, Measure, Analyze, Improve, and Control), we expect to build up a detection mechanism, to define its ontology, including data, models, parameters and results, with visualized data mining technique. We also expect to discuss open data issues, such as its possible applications, legal and safety, data management, planning for data mining and data analysis, as well as the possible social impact.
1. 中華民國財政部 (2014)。102年度財政統計年報。臺北市。
2. 中華民國財政部 (2014)。102年度國庫署年報。臺北市。
3. 中華民國財政部 (2014)。102年稅賦年報。臺北市。
4. 財政部財政史料陳列室 (2009)。 「營業稅重要史料」, (取得日期:2012年4月22日), [available at http://www.mof.gov.tw/museum/ct.asp?xItem=15579&;ctNode=35&;mp=1]
5. 財政部財政史料陳列室 (2009)。 「所得稅重要史料」, (取得日期:2012年4月22日), [available at http://www.mof.gov.tw/museum/ct.asp?xItem=15556&;ctNode=35&;mp=1]
6. 財政部稅務入口網 (2014)。「開立不實統一發票營業人」, (取得日期:2014年9月29日), [available at http://www.etax.nat.gov.tw/etwmain/front/ETW118W/CON/417/9065740665415077982?tagCode=]
7. 許加文 (2007)。「知識管理與分享之DMAIC方法論」, 元智大學管理研究所博士論文。new window
8. 梁直青、王杉進 (2011)。「運用層級分析法探討虛設行號特徵因子之研究」, 財稅121期, 中華民國財政部
9. 魏伶宇 (2012)。「視覺化資料探勘技術應用於虛設行號偵測模式之探討」, 元智大學資訊管理學系碩士論文。
10. 彭志驊 (2013)。「資料探勘視覺化之互動性擴充」, 元智大學資訊管理學系碩士論文。
11. Allingham, M. G. and Sandom, A. (1972), Income tax evasion: a theoretical analsys. Joural of Public Economic, 1(3-4), 323-338.
12. Bayer, R-C. (2006), A Contest with the Taxman - The Impact of Tax Rates on Tax Evasion and Wastefully Invested Resources. European Economic Review, 50(5), 1071–1104.
13. Berthold, M. R. (2003), Mixed fuzzy rule formation, International Journal of Approximate Reasoning, 32(2-3), 67-84.
14. Breiman, L., Friedman, J. H., Olshen, R. A. and Stone, C. J (1984). Classification and regression trees. Monterey, CA: Wadsworth &; Brooks/Cole Advanced Books &; Software.
15. Chen, C. W. (1998), Image Segmentation via Adaptive K-Mean Clustering and Knowledge-Based Morphological Operations with Biomedical Applications. IEEE TRANSATIONS ON IMAGE PROCESSING, 7(12), 1673-1683.
16. Chen, K. P. &; Chu, C. Y. (2005), Internal control versus external manipulation:a model of corporate income tax evasion. The RAND Journal of Economics, 36(1), 151-164.
17. Cheng, H., Lu, Y-C. &; Sheu, C. (2009), An ontology-based business intelligence application in a financial knowledge management system, Expert Systems with Applications, 36(2), 3614-3622.
18. Cowell, F. A. (1981), Taxation and labor supply with risky activities, Economica, 48(192), 365-379.
19. Cowell, F. A. (1990), Tax Sheltering and the Cost of Evasion. Oxford Economic Papers, 42(1), 231-243.
20. Cristea, I. (2012), Reflections Regarding the Concept, Forms, Causes and Effects of Tax Evasion, Contemporary Readings in Law and Social Justice, 4(1), 431-439.
21. Cule, M. &; Fulton, M. (2009), Business culture and tax evasion:Why corruption and the unofficial economy can persist. Journal of Economic Behavior &; Organization, 72, 811-822.
22. Fortin, B., Lacroix, G. &; Villeval, M. C. (2007), Tax Evasion and Social Interactions. Journal of Public Economics, 91(11-12), 2089-2112.
23. Friedland, N., Maital, S. &; Rutenberg, A. (1978), A Simulation Study of Income Tax Evasion, Journal of Public Economics, 10(1), 107-116.
24. Friedman, E., Johnson, S., Kaufmann, D. &; Zoido-Lobaton, P. (2000), Dodging the grabbing hand: the determinants of unofficial activity in 69 countries, Journal of Public Economics, 76(3), 459–493.
25. Galbiati, R. &; Zanella, G. (2012), The tax evasion social multiplier: Evidence from Italy. Journal of Public Economics, 96(5-6), 485-494.
26. Hibbs, D. A. &; Piculescu, V. (2010), Tax Toleration and Tax Compliance: How Government Affects the Propensity of Firms to Enter the Unofficial Economy, American Journal of Political Science, 54(1), 18-33.
27. Hunter, W. J. &; Nelson, M. A. (1996), An IRS production function, National Tax Journal, Vol. 49(1), pp. 105-115
28. James, X. L. (2004), Visualization of high-dimensional data with relational perspective map. Information Visualization, 3, 49-59.
29. Karbauskaite, R., Marcinkevicius, V. &; Dzemyda, G. (2006), Testing the relational perspective map for visualization of multidimensional data. Technological and Economic Development of Economy, 4, 289-294.
30. Kim, S. (2008), Does Political Intention Affect Tax Evasion? Journal of Policy Modeling, 30(3), 401-415.
31. King, S. &; Sheffrin S. M. (2002), Tax Evasion and Equity Theory:An Investigative Approach. International Tax and Public Finance, 9(4), 505-521.
32. Lewis, D. D (1998). Na#westeur048#ve (Bayes) at Forty: The Independence Assumption in Information Retrieval. Machine learning: ECML-98. 1398. 4-15.
33. Linde, Y., Buzu, A. &; Gray, R. M. (1980), An algorithm for vector quantizer design. IEEE Transactions on Communication, COM-28, 84-95.
34. Lloyd, S. P. (1982), Least squares quantization in pcm. Technical report. IEEE Trans. on Information Theory. IT-28(2), 129-137.
35. Lu, Y. &; Cheng, H. (2004). Towards Automated Optimal Equity Portfolios Discovery in a Financial Knowledge Management System. Computational Intelligence in Economics and Finance, 387-402. Springer-Verlag.
36. Marrelli, M. &; Martina, R. (1988), Tax evasion and strategic behavior of the firms. Journal of Public Economic, 37(1), 55-69.
37. McGee, R. W. &; Guo, Z. (2007), A survey of law, business and philosophy students in China on the ethics of tax evasion. Society and Business Review, 2(3), 299-315.
38. Orviska, M., Caplanova, A., Medved, J. and Hudson, J. (2006), A Cross-Section Approach to Measuring the Shadow Economy, Journal of Policy Modeling, 28(7), 713-724.
39. Orviska, M. and Hudson J. (2003), Tax Evasion, Civic Duty and the Law Abiding Citizen, European Journal of Political Economy, 19(1), 83-102.
40. Quinlan, J. R (1986). Induction of Decision Trees, Machine Learning ,1(1), 81-106.
41. Ramos, V. &; Muge, F. (2000), Map Segmentation by Color Cube Genetic K-Mean Clustering. Research and Advanced Technology for Digital Libraries. 1923, 319-323.
42. Richardson, G. (2006), Determinants of Tax Evasion: A Cross-Country Investigation, Journal of International Accounting, Auditing and Taxation, 15(2), 150-169.
43. Richardson, G. (2008), The Relationship Between Culture and Tax Evasion Across Countries: Additional Evidence and Extensions, Journal of International Accounting, Auditing and Taxation, 17(2), 67-78.
44. Roch, K. G. L., Zhou, Y., Blair, P. L., Grainger, M., Moch, J. K., Haynes, J. D., Vega, P. D. L., Holder, A. A., Batalov, S., Carucci, D. J. &; Winzeler, E. A. (2003), Discovery of Gene Function by Expression Profiling of the Malaria Parasite Life Cycle. SCIENCE, 301, 1503-1508.
45. Rosseel, Y. (2002), Mixture Models of Categorization. Journal of Mathematical Psychology, 46, 178-210.
46. Sandmo, A. (2005), The theory of tax evasion: a retrospective view. National Tax Journal, 58(4), 643-663.
47. Slemrod, J. (2007). Cheating Ourselves: The Economics of Tax Evasion, The Journal of Economic Perspectives, 21(1), 25-48.
48. Tsakumis, G. T., Curatola, A. P. &; Porcano, T. M. (2007), The Relation Between National Cultural Dimensions and Tax Evasion, Journal of International Accounting, Auditing and Taxation, 16(2), 131-147.
49. Webley, P., Cole, M. and Eidjar O-P. (2001), The Prediction of Self-reported and Hypothetical Tax-evasion: Evidence from England, France and Norway, Journal of Economic Psychology, 22(2), 141-155.
50. Yaniv, G. (2009), The Tax Compliance Demand Curve: A Diagrammatical Approach to Income Tax Evasion. Journal of Economic Education, 40(2), 213-233.
51. Yitzhaki, S. (1974), Income tax evasion: A theoretical analysis, Journal of Public Economics, 3(2), 201-202.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top