學術產出-Theses

Article View/Open

Publication Export

Google ScholarTM

政大圖書館

Citation Infomation

  • No doi shows Citation Infomation
題名 銀行如何偵測政治人物金流?新聞文本應用於人脈萃取之可行性研究
How do banks detect money flow from PEPs? A Feasibility Study on News Archives Applied to Network Extraction
作者 黃邦平
Huang, Pang-Ping
貢獻者 陳百齡
Chen, Pai-Lin
黃邦平
Huang, Pang-Ping
關鍵詞 社會網絡分析
資訊視覺化
政治人物洗錢風險
Social Network Analysis
Information Visualization
Money Laundering Risk of Politicians
日期 2023
上傳時間 6-Apr-2023 18:09:54 (UTC+8)
摘要 法令遵循是金融業永續發展的根本,而在金融業務走向國際化的同時,將持續面臨到更高強度之防制洗錢及打擊資恐、反武器擴散與遵循要求。政治人物其政治影響力可能被濫用,故具一定之貪腐與洗錢疑慮,而此類型之客戶需要在建立業務關係時進行客戶識別,並施以相關強化管控。
金融機構要防範政治人物洗錢並不容易,政治人物的名單持續動態調整,且瞬息萬變,金融機構難以定義出完整名單與明確界定範圍,造成實務上相關資訊收集挑戰。不但相關資料有限,且金融機構要如何取得相關資訊相當具有挑戰性。,通常會透過持續監控政治人物之金流以檢視是否有異常交易,若能掌握政治人物之人脈是否可有效掌握其不法所得之去向。
人際關係難以界定,其社會資本之資訊不易蒐集,本研究欲透過公開資訊管道探究政治人物之人際關係,並使用新聞資料庫中的新聞資料事件,萃取各新聞事件之政治人物進行連結與量化,並探討政治人物間的互動與社會網絡分析若以視覺化圖形之樣貌為何?又透過曾有相關負面新聞或已知有貪腐洗錢事實之政治人物之新聞關聯網絡中密切往來者,是否其貪腐洗錢之風險亦為較高?
Compliance is the foundation for financial sustainability in the financial industry. While financial businesses are going international, more internal measures are needed such as higher-intensity prevention and control requirements of AML/CFT (Anti-Money Laundering and Combating the Financing of Terrorism). Politicians may abuse their political power, raising concerns about corruption and money laundering. This type of customer needs to be identified when establishing business relationships with them.
It is not easy for financial institutions to prevent politicians from laundering money. The list of politicians is dynamic and changes rapidly. It is difficult for financial institutions to define the complete list and to measure the scope, which poses challenges in collecting relevant information. Not only is the relevant information limited, but it is also quite challenging to obtain. Financial institutions usually monitor the cash flows of politicians to check for abnormal transactions on a regular basis. If the politicians’ connections can be mapped out, the whereabouts of their illegal gains can be tracked down more effectively.
An interpersonal relationship is difficult to trace, and social capital information is hard to collect. This study intends to explore the interpersonal relationship of politicians through public information channels, and to use a news database to extract politicians from each news event to link and quantify their connections in order to answer the following questions: what does the interaction between politicians and social network analysis look like in visual graphics? Do the people who have closer ties to corrupted politicians have higher risks of corruption and money laundering?
參考文獻 王淑美(2018)。〈網路速度與新聞-轉變中的記者時間實踐及價值反思〉,《中華傳播學刊》,33:65-98。
何志欽、蔡群立(2014)。〈臺灣地下經濟規模的估計〉,(臺灣地下經濟之成因研究成果報告)。臺北市:Visa 國際信用卡組織。
吳東野(1999)。〈臺灣立法院全國不分區委員制度之研究〉,《選舉研究》,6(1):143-174。
李政德、張峻銘、劉建邦、陳尚澤、林守德(2008年11月)。〈社會網路之建置、分析與視覺化:以臺灣學術社群網路為例〉,《圖書與資訊學刊》,67:72-87。
沃爾夫斯堡(2008)。〈沃爾夫斯堡關於政治人物的常見問答〉。取自https://www.wolfsberg-principles.com/sites/default/files/wb/pdfs/translations/chinese-traditional/49.%20Wolfsberg-PEP-FAQs-chin-trad.pdf
那福忠(2005)。〈不光是印刷〉,取自http://www.brainnew.com.tw/article/na2005/N_062005.htm
林南(2007)。〈社會資本理論與研究簡介〉,《社會科學論叢》,1:1-32。
林照真(2014)。〈聚合對傳統報紙轉型的衝擊:《紐約時報》與《衛報》的比較研究〉,《新聞學研究》,120:1-45。
法務部(2018)。〈重要政治性職務之人與其家庭成員及有密切關係之人範圍認定標準〉,取自https://mojlaw.moj.gov.tw/LawContent.aspx?LSID=FL085256
法務部調查局洗錢防制處(2019)。〈洗錢防制工作年報〉,取自https://www.mjib.gov.tw/userfiles/files/35-%E6%B4%97%E9%8C%A2%E9%98%B2%E5%88%B6%E8%99%95/files/%E6%B4%97%E9%8C%A2%E9%98%B2%E5%88%B6%E5%B7%A5%E4%BD%9C%E5%B9%B4%E5%A0%B1/annual_109.pdf
金融監督管理委員會銀行局(2016)。〈金管銀法字第10400259730號函: 有關金融控股公司及銀行業內部控制及稽核制度實施辦法(下稱實施辦法)第37條第3款規定與個人資料保護法及洗錢防制法保密規定間之適用疑義一案,釋示如說明,請查照轉知各金融控股公司,並依說明五辦理〉,取自https://www.fsc.gov.tw/ch/home.jsp?id=128&parentpath=0,3&mcustomize=lawnew_view.jsp&dataserno=201603030003&toolsflag=Y&dtable=NewsLaw
金耀基(1992)。〈關係和網絡的建構〉,《中國社會與文化》,香港:牛津大學出版社。
柏保路.博奇科夫斯基、李立峯、崔迪(2013)。〈數位化時代網絡新聞的持續演變〉,《傳播與社會學刊 》,25: 1-26。
陳百齡、李蔡彥(2010)。〈資料庫裡尋人脈:考掘新聞人物的社會網絡〉,(行政院國家科學委員會補助專題研究計畫成果報告)。臺北市:國立政治大學新聞學系。
陳百齡(2000)。〈新聞媒體裡的圖書館〉,《圖書與資訊學刊》,36:15-27。
陳百齡(2015)。〈石碑背後的家族史: 新竹近代社會家族研究〉,新竹: 新竹市文化局。
陳百齡(2016)。〈追分趕秒:新聞組織的時間結構化策略—以報社圖表產製為例〉,《新聞學研究》,127:75-117。
陳百齡、鄭宇君、陳恭(2016)。〈社群媒體資料分析:特性與歷程的初探〉,《傳播文化》,15:48-89。
陳志賢(2017 年 10 月 3 日)。〈吞30億逃14年 劉偉傑不起訴〉,《中時新聞網》。取自https://www.chinatimes.com/newspapers/20171003000423-260106?chdtv
程法彰(2018)。〈洗錢防制與個人資料保護的兩難〉,《全國律師》,22(11):65-69。
葉俊榮(2003)。〈民主轉型與金錢政治的法律因應〉,《國家發展研究》,2:1-29。
劉蕙苓(2006)。〈網路的新聞再現1994 vs 2004 以聯合報為例〉,《資訊社會研究》,12:143-177。
蔣念祖(2019)。〈美國、新加坡及香港洗錢防制國際相互評鑑報告之研析〉,《臺灣法學雜誌》,378:19–54。
鄭宇君、陳百齡(2014)。〈探索2012臺灣總統大選之社交媒體浮現社群:鉅量資料分析取徑〉,《新聞學研究》,120:121-165。
鄭宇君(2016)。〈社交媒體之雙重性:人的連結與技術的連結〉,《 傳播文化與政治》,4:1-25。
錢世傑(2018)。〈重要政治性職務之人(PEPs)規定之合理性及其適用〉,《財產法暨經濟法》,52:139-176。
羅家德(2006)。〈華人的人脈──個人中心信任網絡〉,《關係管理研究》,3:1-24。
羅偉瑄(2013)。《人脈管理行動應用系統之設計》。中興大學資訊管理學系碩士論文。
〈2021國家洗錢資恐及資武擴風險評估報告〉(2021)。取自行政院洗錢防制辦公室網頁https://www.amlo.moj.gov.tw/media/20211299/2021%E5%9C%8B%E5%AE%B6%E6%B4%97%E9%8C%A2%E8%B3%87%E6%81%90%E5%8F%8A%E8%B3%87%E6%AD%A6%E6%93%B4%E9%A2%A8%E9%9A%AA%E8%A9%95%E4%BC%B0%E5%A0%B1%E5%91%8A.pdf?mediaDL=true
〈防制洗錢及打擊資恐查詢系統〉(2022年5月10日)。臺灣集中保管交易結所。取自https://www.tdcc.com.tw/portal/zh/service/laundering
〈臺灣接受亞太防制洗錢組織(APG)第三輪相互評鑑之評鑑報告正式出爐!!〉(2019),取自行政院洗錢防制辦公室https://www.amlo.moj.gov.tw/1506/1507/14969/post
Basel Committee on Banking Supervision. (1998). Prevention of Criminal Use of the Banking System for the purpose of Money-Laundering. Retrieved from https://www.bis.org/publ/bcbsc137.pdf
Bhatia, P. (2019). Data Mining and Data Warehousing: Principles and Practical Techniques, Cambridge, U.K.:Cambridge Univ. Press.
Bowen, R. M, Burgstahler, D.,& Daley L. A., (1986). Evidence on the Relationships between Earnings and Various Measures of Cash Flow. The Accounting Review, 61(4), 713-725, Lakewood Ranch: American Accounting Association.
Boczkowski , P. J. (2005). Digitizing the News:Innovation in Online Newspapers. Massachusetts, Cambridge:The MIT Press.
Coleman, J. S. (1986). Social theory, social research, and a theory of action. American Journal of Sociology, 91(6), 1309–1335.
Debora, C. (2013, August). Text mining newspapers and news content:new trends and research methodologies. IFLA WLIC 2013, Singapore.
Diaz, L. (2022, August 3). Mexico probes former president Pena Nieto for money laundering. Reuters. Retrieved from https://www.reuters.com/
Drucker, P.F. (2001). Management Challenges for the 21st Century, London: Routledge.
Duan, Y., Jatowt, A., Bhowmick S. S., & Yoshikawa, M. (2019). Mapping entity sets in news archives across time. Data Science and Engineering, 4(3):208-222.
Emirbayer, M., Goodwin, J. (1994). Network Analysis, Culture, and the Problem of Agency. American Journal of Sociology, 99(6), 1411-1454.
FATF. (2007). Money Laundering & Terrorist Financing Through The Real Estate Sector. Retrieved from https://www.fatf-gafi.org/media/fatf/documents/reports/ML%20and%20TF%20through%20the%20Real%20Estate%20Sector.pdf
FATF. (2012). The FATF Recommendations-International Standards on Combating Money Laundering and the Financing of Terrorism & Proliferation. Retrieved from https://www.fatf-gafi.org/publications/fatfrecommendations/documents/fatf-recommendations.html
FATF. (2013). FATF Guidance:Politically Exposed Persons. Retrieved from https://www.fatf-gafi.org/documents/documents/peps-r12-r22.html
FATF. (2014). Risk-Based Approach for the Banking Sector. Retrieved from https://www.fatf-gafi.org/documents/riskbasedapproach/documents/risk-based-approach-banking-sector.html?hf=10&b=0&s=desc(fatf_releasedate)
FATF. (2017). FATF Guidance: Private Sector Information Sharing. Retrieved from https://www.fatf-gafi.org/media/fatf/documents/recommendations/Private-Sector-Information-Sharing.pdf
FATF. (2020). FATF Virtual Assets Red Flag Indicators of Money Laundering and Terrorist Financing. Retrieved from https://www.fatf-gafi.org/media/fatf/documents/recommendations/Virtual-Assets-Red-Flag-Indicators.pdf
FATF. (2021). Methodology for Assessing Technical Compliance with the FATF Recommendations and the Effectiveness of AML/CFT Systems . Retrieved from https://www.fatf-gafi.org/media/fatf/documents/methodology/FATF%20Methodology%2022%20Feb%202013.pdf
FFIEC. (last viewed date 2022, March 7). ASSESSING COMPLIANCE WITH BSA REGULATORY REQUIREMENTS. Retrieved from https://bsaaml.ffiec.gov/manual/AssessingComplianceWithBSARegulatoryRequirements/02
Fischer, C.S., Jackson, R.M., Stueve, C.A., Gerson K., Jones, L.M. & Baldassare, M. (1977). Networks and Places:Social Relations in the Urban Setting. New York, NY: Free Press.
Freeman, L.C. (2004). The Development of Social Network Analysis:A Study in the Sociology of Science. Vancouver, BC: Empirical Press.
Fry, B. (2007). Visualizing Data. California, Sebastopol: O`Reilly Media.
Goldberg, Y. (2015). A Primer on Neural Network Models for Natural Language Processing. Journal of Artificial Intelligence Research, 57, 345–420.
Graber, D. A. (2006). Mass media & American politics, Washington, D.C.: CQ Press.
Granovetter, M. (1985). Economic action and social Structure: The problem of embeddedness. American Journal of Sociology, 91(3), 481-510.
Jatowt, A., Kanazawa, K. & Oyama, S. & Tanaka. K. (2009). Supporting analysis of future-related information in news archives and the web. In JCDL, 115-124.
Kilduff, M., & Tsai, W. (2003). Social networks and organizations. London: SAGE.
Knoke, D., Kuklinski, J.H. (1982). Network analysis. California, Newbury park: SAGE Publications.
Lewis, S. C., Guzman, A. L., & Schmidt, T. R. (2019). Automation, Journalism, and Human–Machine Communication: Rethinking Roles and Relationships of Humans and Machines in News. Digital Journalism, 7, 409-427.
Lin, N. (2001). Social capital. A Theory of Social Structure and Action. Cambridge University Press.
Lopes, M. (2017, July 12). Former Brazilian president Lula convicted of corruption and money laundering, The Washington Post. Retrieved from https://www.washingtonpost.com/
Merriam-Webster. (2021, March 10). Retrieved from https://www.merriam-webster.com/dictionary/politician
Milgram, S. (1967). The Small World Problem. Psychology Today, 2, 60-67.
Mitchell, J.C. (1974). The concept and use of social networks. Annual Review of Anthropology, 3, 179-299.
Moody, J. & White, D. R., (2003). Structural Cohesion and Embeddedness: A Hierarchical Concept of Social Groups. American Sociological Review, 68(1), 103-127.
Mugarura, N. (2016). Uncoupling the relationship between corruption and money laundering crimes. Journal of Financial Regulation and Compliance, 24(1), 74-89.
Nations United. (2004). United Nations Convention against Corruption. Retrieved from https://www.unodc.org/unodc/en/treaties/CAC/
New York Times. (2010, March 17). Wachovia and U.S. Settle a Money Laundering Case. The New York Times. Retrieved from https://www.nytimes.com/2010/03/18/business/18launder.html
Pattison, P. (1993). Algebraic Models for Social Networks. Cambridge: Cambridge University Press.
Provan, K. G., Fish, A., & Sydow, J. (2007). Interorganizational Networks at the network level: A review of the empirical literature on whole networks. Journal of Management, 33(3), 479-516.
Saleiro, P., Teixeira, J., Soares, Carlos, S. & Oliveira, E. (2016). Timemachine: Entity-centric search and visualization of news archives. European Conference on Information Retrieval. ECIR 2016, 945-848.
Scott, J. (2017). Social Network Analysis. California, Newbury park: SAGE Publications.
SENACLAFT. (2022, December 24). Lista de Personas Políticamente Expuestas (PEP) - Actualizada al 21 de Diciembre de 2022 con cargos y organismos. Retrieved from https://www.gub.uy/secretaria-nacional-lucha-contra-lavado-activos-
The Egmont Group. (2021). Best Egmont Cases: Financial Analysis Cases 2014–2020. Retrieved from https://egmontgroup.org/wp-content/uploads/2022/01/2021-Financial.Analysis.Cases_.2014-2020-3.pdf
The Wolfsberg Group. (2006). Wolfsberg Statement Guidance on a Risk Based Approach for Managing Money Laundering Risks. Retrieved from https://www.wolfsberg-principles.com/sites/default/files/wb/pdfs/wolfsberg-standards/15.%20Wolfsberg_RBA_Guidance_%282006%29.pdf
The Wolfsberg Group. (2017). Guidance on Politically Exposed Persons(PEPs). Retrieved from https://www.wolfsberg-principles.com/sites/default/files/wb/Wolfsberg-Guidance-on-PEPs-May-2017.pdf
The Wolfsberg Group. (2019). Correspondent Banking Due Diligence Questionnaire (CBDDQ) Capacity Building Guidance. Retrieved from https://wolfsberg-principles.com/sites/default/files/wb/pdfs/CBDDQ-Capacity-Building/Wolfsberg%27s_CBDDQ_Capacity_Building_Guidance_Final%20V1.1.pdf
United Nations Conference on Trade and Development. (2021). Trade and Development Report 2021. Retrieved from https://unctad.org/webflyer/trade-and-development-report-2021
United Nations. (1988). Convention Against Illicit Traffic In Narcotic Drugs And Psychotropic Substances (The Vienna Convention). Retrieved from https://www.unodc.org/pdf/convention_1988_en.pdf
United Nations. (2000). Convention against Transnational Organized Crime and the Protocols Thereto (The Palermo Convention). Retrieved from https://www.unodc.org/documents/treaties/UNTOC/Publications/TOC%20Convention/TOCebook-e.pdf
Wellman, B. (1979). The Community Question: Intimate Networks of East Yorkers. American Journal of Sociology, 84(5), 1201-1231.
Wellman, B. (1983). Network analysis: Some basic principles. Sociological Theory, 1, 155-200.
Yang, C.C., Shi, X. & Wei C-P. (2009). Discovering Event Evolution Graphs from News Corpora. IEEE Transactions on Systems Man and Cybernetics-Part A Systems and Humans, 39(4), 850-863.
Кириленко, A. (2018, March 18). Online dissidents expose the Russian prime minister’s material empire, The Insider. Retrieved from https://theins.ru/
描述 碩士
國立政治大學
傳播學院碩士在職專班
109941008
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0109941008
資料類型 thesis
dc.contributor.advisor 陳百齡zh_TW
dc.contributor.advisor Chen, Pai-Linen_US
dc.contributor.author (Authors) 黃邦平zh_TW
dc.contributor.author (Authors) Huang, Pang-Pingen_US
dc.creator (作者) 黃邦平zh_TW
dc.creator (作者) Huang, Pang-Pingen_US
dc.date (日期) 2023en_US
dc.date.accessioned 6-Apr-2023 18:09:54 (UTC+8)-
dc.date.available 6-Apr-2023 18:09:54 (UTC+8)-
dc.date.issued (上傳時間) 6-Apr-2023 18:09:54 (UTC+8)-
dc.identifier (Other Identifiers) G0109941008en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/144070-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 傳播學院碩士在職專班zh_TW
dc.description (描述) 109941008zh_TW
dc.description.abstract (摘要) 法令遵循是金融業永續發展的根本,而在金融業務走向國際化的同時,將持續面臨到更高強度之防制洗錢及打擊資恐、反武器擴散與遵循要求。政治人物其政治影響力可能被濫用,故具一定之貪腐與洗錢疑慮,而此類型之客戶需要在建立業務關係時進行客戶識別,並施以相關強化管控。
金融機構要防範政治人物洗錢並不容易,政治人物的名單持續動態調整,且瞬息萬變,金融機構難以定義出完整名單與明確界定範圍,造成實務上相關資訊收集挑戰。不但相關資料有限,且金融機構要如何取得相關資訊相當具有挑戰性。,通常會透過持續監控政治人物之金流以檢視是否有異常交易,若能掌握政治人物之人脈是否可有效掌握其不法所得之去向。
人際關係難以界定,其社會資本之資訊不易蒐集,本研究欲透過公開資訊管道探究政治人物之人際關係,並使用新聞資料庫中的新聞資料事件,萃取各新聞事件之政治人物進行連結與量化,並探討政治人物間的互動與社會網絡分析若以視覺化圖形之樣貌為何?又透過曾有相關負面新聞或已知有貪腐洗錢事實之政治人物之新聞關聯網絡中密切往來者,是否其貪腐洗錢之風險亦為較高?
zh_TW
dc.description.abstract (摘要) Compliance is the foundation for financial sustainability in the financial industry. While financial businesses are going international, more internal measures are needed such as higher-intensity prevention and control requirements of AML/CFT (Anti-Money Laundering and Combating the Financing of Terrorism). Politicians may abuse their political power, raising concerns about corruption and money laundering. This type of customer needs to be identified when establishing business relationships with them.
It is not easy for financial institutions to prevent politicians from laundering money. The list of politicians is dynamic and changes rapidly. It is difficult for financial institutions to define the complete list and to measure the scope, which poses challenges in collecting relevant information. Not only is the relevant information limited, but it is also quite challenging to obtain. Financial institutions usually monitor the cash flows of politicians to check for abnormal transactions on a regular basis. If the politicians’ connections can be mapped out, the whereabouts of their illegal gains can be tracked down more effectively.
An interpersonal relationship is difficult to trace, and social capital information is hard to collect. This study intends to explore the interpersonal relationship of politicians through public information channels, and to use a news database to extract politicians from each news event to link and quantify their connections in order to answer the following questions: what does the interaction between politicians and social network analysis look like in visual graphics? Do the people who have closer ties to corrupted politicians have higher risks of corruption and money laundering?
en_US
dc.description.tableofcontents 目次
第一章 緒論 1
第一節 研究背景 2
一、 洗錢防制與法令遵循的崛起 2
二、 洗錢防制以風險為本之精神 3
三、 洗錢防制之客戶盡職調查 4
四、 重要政治性職務之人的洗錢風險 4
五、 管控政治人物的挑戰 6
第二節 研究問題 7
第二章 文獻探討 8
第一節 金融業之洗錢風險與洗錢防制 8
一、 洗錢 8
二、 洗錢防制 13
三、 洗錢防制組織 14
四、 小結 16
第二節 政治人物洗錢風險與風險防制 17
一、 政治人物之定義 17
二、 政治人物洗錢風險 20
三、 現行金融業政治人物之洗錢防制相關規範 23
四、 小結 29
第三節 金融業法令遵循現況與挑戰 30
一、 政治人物之客戶審查作業與執行步驟 30
二、 透過人脈圖形偵查金流 32
三、 金融機構面臨的挑戰與困難 36
四、 小結 41
第四節 新聞資料庫於洗錢防制之應用 42
一、 新聞資料庫的演變—從類比到數位 42
二、 文本中政治活動與社會網絡 44
三、 政治人物的人脈與金流 45
四、 視覺化社會網絡分析方法 48
五、 從新聞文本萃取政治人物社會關係線索 49
第五節 小結 57
第三章 研究方法 59
第一節 取樣考量 59
第二節 關聯資料之萃取與網絡分析 61
一、 關聯資料之萃取與文字探勘 63
二、 關聯資料之清理與結構化 63
三、 網絡分析與關聯圖視覺化呈現 64
第三節 研究步驟 67
第四節 小結 68
第四章 政治人物關聯網絡分析 69
第一節 整體網絡概觀 69
第二節 自我中心網絡概觀 74
第三節 案例比較 83
第五章 結論與研究建議 85
第一節 研究發現 85
第二節 研究建議 89
參考文獻 90
附錄……………………………………101
附錄 1本研究縮寫表 101
附錄 2 FATF第12項建議與管控重點 102
附錄 3本研究政治人物關聯分析類型 104
附錄 4本研究Gephi政治人物關聯網絡分析 107

附錄4- 1整體網絡之度數排名(不分職務) 107
附錄4- 2整體網絡之度數排名(立法委員) 108
附錄4- 3整體網絡之度數排名(案例1) 113
附錄4- 4自我中心網絡之度數排名(案例1) 115
附錄4- 5自我中心網絡之度數排名(案例2) 116
附錄4- 6整體網絡-度(Degree) 117
附錄4- 7權重度(Weighted Degree) 118
附錄4- 8圖距離(Graph Distance) 119
附錄4- 9圖形密度(Graph Density) 122
附錄4- 10 HITS度量(Metric) 122
附錄4- 11頁面排名(PageRank) 124
附錄4- 12連結元件(Connected Components) 125
附錄4- 13成熟度(Modularity) 126
附錄4- 14統計推斷報告(Statistical Inference) 127
附錄4- 15聚類係數度量(Clustering Coefficient Metric) 128
附錄4- 16特徵向量中心性報告(Eigenvector Centrality) 129
附錄4- 17圖形距離(Graph Distance) 130
附錄4- 18自我中心網絡 – 度(Degree) 133
附錄4- 19權重度(Weighted Degree) 134
附錄4- 20圖距離(Graph Distance) 135
附錄4- 21圖形密度(Graph Density) 138
附錄4- 22 HITS度量(Metric) 138
附錄4- 23 HITS度量(Metric) 140
附錄4- 24頁面排名(PageRank) 142
附錄4- 25連結元件(Connected Components) 143
附錄4- 26成熟度(Modularity) 144
附錄4- 27統計推斷報告(Statistical Inference) 145
附錄4- 28聚類係數度量(Clustering Coefficient Metric) 146
附錄4-29特徵向量中心性報告(Eigenvector Centrality) 147
zh_TW
dc.format.extent 41478810 bytes-
dc.format.mimetype application/pdf-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0109941008en_US
dc.subject (關鍵詞) 社會網絡分析zh_TW
dc.subject (關鍵詞) 資訊視覺化zh_TW
dc.subject (關鍵詞) 政治人物洗錢風險zh_TW
dc.subject (關鍵詞) Social Network Analysisen_US
dc.subject (關鍵詞) Information Visualizationen_US
dc.subject (關鍵詞) Money Laundering Risk of Politiciansen_US
dc.title (題名) 銀行如何偵測政治人物金流?新聞文本應用於人脈萃取之可行性研究zh_TW
dc.title (題名) How do banks detect money flow from PEPs? A Feasibility Study on News Archives Applied to Network Extractionen_US
dc.type (資料類型) thesisen_US
dc.relation.reference (參考文獻) 王淑美(2018)。〈網路速度與新聞-轉變中的記者時間實踐及價值反思〉,《中華傳播學刊》,33:65-98。
何志欽、蔡群立(2014)。〈臺灣地下經濟規模的估計〉,(臺灣地下經濟之成因研究成果報告)。臺北市:Visa 國際信用卡組織。
吳東野(1999)。〈臺灣立法院全國不分區委員制度之研究〉,《選舉研究》,6(1):143-174。
李政德、張峻銘、劉建邦、陳尚澤、林守德(2008年11月)。〈社會網路之建置、分析與視覺化:以臺灣學術社群網路為例〉,《圖書與資訊學刊》,67:72-87。
沃爾夫斯堡(2008)。〈沃爾夫斯堡關於政治人物的常見問答〉。取自https://www.wolfsberg-principles.com/sites/default/files/wb/pdfs/translations/chinese-traditional/49.%20Wolfsberg-PEP-FAQs-chin-trad.pdf
那福忠(2005)。〈不光是印刷〉,取自http://www.brainnew.com.tw/article/na2005/N_062005.htm
林南(2007)。〈社會資本理論與研究簡介〉,《社會科學論叢》,1:1-32。
林照真(2014)。〈聚合對傳統報紙轉型的衝擊:《紐約時報》與《衛報》的比較研究〉,《新聞學研究》,120:1-45。
法務部(2018)。〈重要政治性職務之人與其家庭成員及有密切關係之人範圍認定標準〉,取自https://mojlaw.moj.gov.tw/LawContent.aspx?LSID=FL085256
法務部調查局洗錢防制處(2019)。〈洗錢防制工作年報〉,取自https://www.mjib.gov.tw/userfiles/files/35-%E6%B4%97%E9%8C%A2%E9%98%B2%E5%88%B6%E8%99%95/files/%E6%B4%97%E9%8C%A2%E9%98%B2%E5%88%B6%E5%B7%A5%E4%BD%9C%E5%B9%B4%E5%A0%B1/annual_109.pdf
金融監督管理委員會銀行局(2016)。〈金管銀法字第10400259730號函: 有關金融控股公司及銀行業內部控制及稽核制度實施辦法(下稱實施辦法)第37條第3款規定與個人資料保護法及洗錢防制法保密規定間之適用疑義一案,釋示如說明,請查照轉知各金融控股公司,並依說明五辦理〉,取自https://www.fsc.gov.tw/ch/home.jsp?id=128&parentpath=0,3&mcustomize=lawnew_view.jsp&dataserno=201603030003&toolsflag=Y&dtable=NewsLaw
金耀基(1992)。〈關係和網絡的建構〉,《中國社會與文化》,香港:牛津大學出版社。
柏保路.博奇科夫斯基、李立峯、崔迪(2013)。〈數位化時代網絡新聞的持續演變〉,《傳播與社會學刊 》,25: 1-26。
陳百齡、李蔡彥(2010)。〈資料庫裡尋人脈:考掘新聞人物的社會網絡〉,(行政院國家科學委員會補助專題研究計畫成果報告)。臺北市:國立政治大學新聞學系。
陳百齡(2000)。〈新聞媒體裡的圖書館〉,《圖書與資訊學刊》,36:15-27。
陳百齡(2015)。〈石碑背後的家族史: 新竹近代社會家族研究〉,新竹: 新竹市文化局。
陳百齡(2016)。〈追分趕秒:新聞組織的時間結構化策略—以報社圖表產製為例〉,《新聞學研究》,127:75-117。
陳百齡、鄭宇君、陳恭(2016)。〈社群媒體資料分析:特性與歷程的初探〉,《傳播文化》,15:48-89。
陳志賢(2017 年 10 月 3 日)。〈吞30億逃14年 劉偉傑不起訴〉,《中時新聞網》。取自https://www.chinatimes.com/newspapers/20171003000423-260106?chdtv
程法彰(2018)。〈洗錢防制與個人資料保護的兩難〉,《全國律師》,22(11):65-69。
葉俊榮(2003)。〈民主轉型與金錢政治的法律因應〉,《國家發展研究》,2:1-29。
劉蕙苓(2006)。〈網路的新聞再現1994 vs 2004 以聯合報為例〉,《資訊社會研究》,12:143-177。
蔣念祖(2019)。〈美國、新加坡及香港洗錢防制國際相互評鑑報告之研析〉,《臺灣法學雜誌》,378:19–54。
鄭宇君、陳百齡(2014)。〈探索2012臺灣總統大選之社交媒體浮現社群:鉅量資料分析取徑〉,《新聞學研究》,120:121-165。
鄭宇君(2016)。〈社交媒體之雙重性:人的連結與技術的連結〉,《 傳播文化與政治》,4:1-25。
錢世傑(2018)。〈重要政治性職務之人(PEPs)規定之合理性及其適用〉,《財產法暨經濟法》,52:139-176。
羅家德(2006)。〈華人的人脈──個人中心信任網絡〉,《關係管理研究》,3:1-24。
羅偉瑄(2013)。《人脈管理行動應用系統之設計》。中興大學資訊管理學系碩士論文。
〈2021國家洗錢資恐及資武擴風險評估報告〉(2021)。取自行政院洗錢防制辦公室網頁https://www.amlo.moj.gov.tw/media/20211299/2021%E5%9C%8B%E5%AE%B6%E6%B4%97%E9%8C%A2%E8%B3%87%E6%81%90%E5%8F%8A%E8%B3%87%E6%AD%A6%E6%93%B4%E9%A2%A8%E9%9A%AA%E8%A9%95%E4%BC%B0%E5%A0%B1%E5%91%8A.pdf?mediaDL=true
〈防制洗錢及打擊資恐查詢系統〉(2022年5月10日)。臺灣集中保管交易結所。取自https://www.tdcc.com.tw/portal/zh/service/laundering
〈臺灣接受亞太防制洗錢組織(APG)第三輪相互評鑑之評鑑報告正式出爐!!〉(2019),取自行政院洗錢防制辦公室https://www.amlo.moj.gov.tw/1506/1507/14969/post
Basel Committee on Banking Supervision. (1998). Prevention of Criminal Use of the Banking System for the purpose of Money-Laundering. Retrieved from https://www.bis.org/publ/bcbsc137.pdf
Bhatia, P. (2019). Data Mining and Data Warehousing: Principles and Practical Techniques, Cambridge, U.K.:Cambridge Univ. Press.
Bowen, R. M, Burgstahler, D.,& Daley L. A., (1986). Evidence on the Relationships between Earnings and Various Measures of Cash Flow. The Accounting Review, 61(4), 713-725, Lakewood Ranch: American Accounting Association.
Boczkowski , P. J. (2005). Digitizing the News:Innovation in Online Newspapers. Massachusetts, Cambridge:The MIT Press.
Coleman, J. S. (1986). Social theory, social research, and a theory of action. American Journal of Sociology, 91(6), 1309–1335.
Debora, C. (2013, August). Text mining newspapers and news content:new trends and research methodologies. IFLA WLIC 2013, Singapore.
Diaz, L. (2022, August 3). Mexico probes former president Pena Nieto for money laundering. Reuters. Retrieved from https://www.reuters.com/
Drucker, P.F. (2001). Management Challenges for the 21st Century, London: Routledge.
Duan, Y., Jatowt, A., Bhowmick S. S., & Yoshikawa, M. (2019). Mapping entity sets in news archives across time. Data Science and Engineering, 4(3):208-222.
Emirbayer, M., Goodwin, J. (1994). Network Analysis, Culture, and the Problem of Agency. American Journal of Sociology, 99(6), 1411-1454.
FATF. (2007). Money Laundering & Terrorist Financing Through The Real Estate Sector. Retrieved from https://www.fatf-gafi.org/media/fatf/documents/reports/ML%20and%20TF%20through%20the%20Real%20Estate%20Sector.pdf
FATF. (2012). The FATF Recommendations-International Standards on Combating Money Laundering and the Financing of Terrorism & Proliferation. Retrieved from https://www.fatf-gafi.org/publications/fatfrecommendations/documents/fatf-recommendations.html
FATF. (2013). FATF Guidance:Politically Exposed Persons. Retrieved from https://www.fatf-gafi.org/documents/documents/peps-r12-r22.html
FATF. (2014). Risk-Based Approach for the Banking Sector. Retrieved from https://www.fatf-gafi.org/documents/riskbasedapproach/documents/risk-based-approach-banking-sector.html?hf=10&b=0&s=desc(fatf_releasedate)
FATF. (2017). FATF Guidance: Private Sector Information Sharing. Retrieved from https://www.fatf-gafi.org/media/fatf/documents/recommendations/Private-Sector-Information-Sharing.pdf
FATF. (2020). FATF Virtual Assets Red Flag Indicators of Money Laundering and Terrorist Financing. Retrieved from https://www.fatf-gafi.org/media/fatf/documents/recommendations/Virtual-Assets-Red-Flag-Indicators.pdf
FATF. (2021). Methodology for Assessing Technical Compliance with the FATF Recommendations and the Effectiveness of AML/CFT Systems . Retrieved from https://www.fatf-gafi.org/media/fatf/documents/methodology/FATF%20Methodology%2022%20Feb%202013.pdf
FFIEC. (last viewed date 2022, March 7). ASSESSING COMPLIANCE WITH BSA REGULATORY REQUIREMENTS. Retrieved from https://bsaaml.ffiec.gov/manual/AssessingComplianceWithBSARegulatoryRequirements/02
Fischer, C.S., Jackson, R.M., Stueve, C.A., Gerson K., Jones, L.M. & Baldassare, M. (1977). Networks and Places:Social Relations in the Urban Setting. New York, NY: Free Press.
Freeman, L.C. (2004). The Development of Social Network Analysis:A Study in the Sociology of Science. Vancouver, BC: Empirical Press.
Fry, B. (2007). Visualizing Data. California, Sebastopol: O`Reilly Media.
Goldberg, Y. (2015). A Primer on Neural Network Models for Natural Language Processing. Journal of Artificial Intelligence Research, 57, 345–420.
Graber, D. A. (2006). Mass media & American politics, Washington, D.C.: CQ Press.
Granovetter, M. (1985). Economic action and social Structure: The problem of embeddedness. American Journal of Sociology, 91(3), 481-510.
Jatowt, A., Kanazawa, K. & Oyama, S. & Tanaka. K. (2009). Supporting analysis of future-related information in news archives and the web. In JCDL, 115-124.
Kilduff, M., & Tsai, W. (2003). Social networks and organizations. London: SAGE.
Knoke, D., Kuklinski, J.H. (1982). Network analysis. California, Newbury park: SAGE Publications.
Lewis, S. C., Guzman, A. L., & Schmidt, T. R. (2019). Automation, Journalism, and Human–Machine Communication: Rethinking Roles and Relationships of Humans and Machines in News. Digital Journalism, 7, 409-427.
Lin, N. (2001). Social capital. A Theory of Social Structure and Action. Cambridge University Press.
Lopes, M. (2017, July 12). Former Brazilian president Lula convicted of corruption and money laundering, The Washington Post. Retrieved from https://www.washingtonpost.com/
Merriam-Webster. (2021, March 10). Retrieved from https://www.merriam-webster.com/dictionary/politician
Milgram, S. (1967). The Small World Problem. Psychology Today, 2, 60-67.
Mitchell, J.C. (1974). The concept and use of social networks. Annual Review of Anthropology, 3, 179-299.
Moody, J. & White, D. R., (2003). Structural Cohesion and Embeddedness: A Hierarchical Concept of Social Groups. American Sociological Review, 68(1), 103-127.
Mugarura, N. (2016). Uncoupling the relationship between corruption and money laundering crimes. Journal of Financial Regulation and Compliance, 24(1), 74-89.
Nations United. (2004). United Nations Convention against Corruption. Retrieved from https://www.unodc.org/unodc/en/treaties/CAC/
New York Times. (2010, March 17). Wachovia and U.S. Settle a Money Laundering Case. The New York Times. Retrieved from https://www.nytimes.com/2010/03/18/business/18launder.html
Pattison, P. (1993). Algebraic Models for Social Networks. Cambridge: Cambridge University Press.
Provan, K. G., Fish, A., & Sydow, J. (2007). Interorganizational Networks at the network level: A review of the empirical literature on whole networks. Journal of Management, 33(3), 479-516.
Saleiro, P., Teixeira, J., Soares, Carlos, S. & Oliveira, E. (2016). Timemachine: Entity-centric search and visualization of news archives. European Conference on Information Retrieval. ECIR 2016, 945-848.
Scott, J. (2017). Social Network Analysis. California, Newbury park: SAGE Publications.
SENACLAFT. (2022, December 24). Lista de Personas Políticamente Expuestas (PEP) - Actualizada al 21 de Diciembre de 2022 con cargos y organismos. Retrieved from https://www.gub.uy/secretaria-nacional-lucha-contra-lavado-activos-
The Egmont Group. (2021). Best Egmont Cases: Financial Analysis Cases 2014–2020. Retrieved from https://egmontgroup.org/wp-content/uploads/2022/01/2021-Financial.Analysis.Cases_.2014-2020-3.pdf
The Wolfsberg Group. (2006). Wolfsberg Statement Guidance on a Risk Based Approach for Managing Money Laundering Risks. Retrieved from https://www.wolfsberg-principles.com/sites/default/files/wb/pdfs/wolfsberg-standards/15.%20Wolfsberg_RBA_Guidance_%282006%29.pdf
The Wolfsberg Group. (2017). Guidance on Politically Exposed Persons(PEPs). Retrieved from https://www.wolfsberg-principles.com/sites/default/files/wb/Wolfsberg-Guidance-on-PEPs-May-2017.pdf
The Wolfsberg Group. (2019). Correspondent Banking Due Diligence Questionnaire (CBDDQ) Capacity Building Guidance. Retrieved from https://wolfsberg-principles.com/sites/default/files/wb/pdfs/CBDDQ-Capacity-Building/Wolfsberg%27s_CBDDQ_Capacity_Building_Guidance_Final%20V1.1.pdf
United Nations Conference on Trade and Development. (2021). Trade and Development Report 2021. Retrieved from https://unctad.org/webflyer/trade-and-development-report-2021
United Nations. (1988). Convention Against Illicit Traffic In Narcotic Drugs And Psychotropic Substances (The Vienna Convention). Retrieved from https://www.unodc.org/pdf/convention_1988_en.pdf
United Nations. (2000). Convention against Transnational Organized Crime and the Protocols Thereto (The Palermo Convention). Retrieved from https://www.unodc.org/documents/treaties/UNTOC/Publications/TOC%20Convention/TOCebook-e.pdf
Wellman, B. (1979). The Community Question: Intimate Networks of East Yorkers. American Journal of Sociology, 84(5), 1201-1231.
Wellman, B. (1983). Network analysis: Some basic principles. Sociological Theory, 1, 155-200.
Yang, C.C., Shi, X. & Wei C-P. (2009). Discovering Event Evolution Graphs from News Corpora. IEEE Transactions on Systems Man and Cybernetics-Part A Systems and Humans, 39(4), 850-863.
Кириленко, A. (2018, March 18). Online dissidents expose the Russian prime minister’s material empire, The Insider. Retrieved from https://theins.ru/
zh_TW