政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/144070
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113648/144635 (79%)
Visitors : 51637355      Online Users : 582
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/144070


    Title: 銀行如何偵測政治人物金流?新聞文本應用於人脈萃取之可行性研究
    How do banks detect money flow from PEPs? A Feasibility Study on News Archives Applied to Network Extraction
    Authors: 黃邦平
    Huang, Pang-Ping
    Contributors: 陳百齡
    Chen, Pai-Lin
    黃邦平
    Huang, Pang-Ping
    Keywords: 社會網絡分析
    資訊視覺化
    政治人物洗錢風險
    Social Network Analysis
    Information Visualization
    Money Laundering Risk of Politicians
    Date: 2023
    Issue Date: 2023-04-06 18:09:54 (UTC+8)
    Abstract: 法令遵循是金融業永續發展的根本,而在金融業務走向國際化的同時,將持續面臨到更高強度之防制洗錢及打擊資恐、反武器擴散與遵循要求。政治人物其政治影響力可能被濫用,故具一定之貪腐與洗錢疑慮,而此類型之客戶需要在建立業務關係時進行客戶識別,並施以相關強化管控。
    金融機構要防範政治人物洗錢並不容易,政治人物的名單持續動態調整,且瞬息萬變,金融機構難以定義出完整名單與明確界定範圍,造成實務上相關資訊收集挑戰。不但相關資料有限,且金融機構要如何取得相關資訊相當具有挑戰性。,通常會透過持續監控政治人物之金流以檢視是否有異常交易,若能掌握政治人物之人脈是否可有效掌握其不法所得之去向。
    人際關係難以界定,其社會資本之資訊不易蒐集,本研究欲透過公開資訊管道探究政治人物之人際關係,並使用新聞資料庫中的新聞資料事件,萃取各新聞事件之政治人物進行連結與量化,並探討政治人物間的互動與社會網絡分析若以視覺化圖形之樣貌為何?又透過曾有相關負面新聞或已知有貪腐洗錢事實之政治人物之新聞關聯網絡中密切往來者,是否其貪腐洗錢之風險亦為較高?
    Compliance is the foundation for financial sustainability in the financial industry. While financial businesses are going international, more internal measures are needed such as higher-intensity prevention and control requirements of AML/CFT (Anti-Money Laundering and Combating the Financing of Terrorism). Politicians may abuse their political power, raising concerns about corruption and money laundering. This type of customer needs to be identified when establishing business relationships with them.
    It is not easy for financial institutions to prevent politicians from laundering money. The list of politicians is dynamic and changes rapidly. It is difficult for financial institutions to define the complete list and to measure the scope, which poses challenges in collecting relevant information. Not only is the relevant information limited, but it is also quite challenging to obtain. Financial institutions usually monitor the cash flows of politicians to check for abnormal transactions on a regular basis. If the politicians’ connections can be mapped out, the whereabouts of their illegal gains can be tracked down more effectively.
    An interpersonal relationship is difficult to trace, and social capital information is hard to collect. This study intends to explore the interpersonal relationship of politicians through public information channels, and to use a news database to extract politicians from each news event to link and quantify their connections in order to answer the following questions: what does the interaction between politicians and social network analysis look like in visual graphics? Do the people who have closer ties to corrupted politicians have higher risks of corruption and money laundering?
    Reference: 王淑美(2018)。〈網路速度與新聞-轉變中的記者時間實踐及價值反思〉,《中華傳播學刊》,33:65-98。
    何志欽、蔡群立(2014)。〈臺灣地下經濟規模的估計〉,(臺灣地下經濟之成因研究成果報告)。臺北市:Visa 國際信用卡組織。
    吳東野(1999)。〈臺灣立法院全國不分區委員制度之研究〉,《選舉研究》,6(1):143-174。
    李政德、張峻銘、劉建邦、陳尚澤、林守德(2008年11月)。〈社會網路之建置、分析與視覺化:以臺灣學術社群網路為例〉,《圖書與資訊學刊》,67:72-87。
    沃爾夫斯堡(2008)。〈沃爾夫斯堡關於政治人物的常見問答〉。取自https://www.wolfsberg-principles.com/sites/default/files/wb/pdfs/translations/chinese-traditional/49.%20Wolfsberg-PEP-FAQs-chin-trad.pdf
    那福忠(2005)。〈不光是印刷〉,取自http://www.brainnew.com.tw/article/na2005/N_062005.htm
    林南(2007)。〈社會資本理論與研究簡介〉,《社會科學論叢》,1:1-32。
    林照真(2014)。〈聚合對傳統報紙轉型的衝擊:《紐約時報》與《衛報》的比較研究〉,《新聞學研究》,120:1-45。
    法務部(2018)。〈重要政治性職務之人與其家庭成員及有密切關係之人範圍認定標準〉,取自https://mojlaw.moj.gov.tw/LawContent.aspx?LSID=FL085256
    法務部調查局洗錢防制處(2019)。〈洗錢防制工作年報〉,取自https://www.mjib.gov.tw/userfiles/files/35-%E6%B4%97%E9%8C%A2%E9%98%B2%E5%88%B6%E8%99%95/files/%E6%B4%97%E9%8C%A2%E9%98%B2%E5%88%B6%E5%B7%A5%E4%BD%9C%E5%B9%B4%E5%A0%B1/annual_109.pdf
    金融監督管理委員會銀行局(2016)。〈金管銀法字第10400259730號函: 有關金融控股公司及銀行業內部控制及稽核制度實施辦法(下稱實施辦法)第37條第3款規定與個人資料保護法及洗錢防制法保密規定間之適用疑義一案,釋示如說明,請查照轉知各金融控股公司,並依說明五辦理〉,取自https://www.fsc.gov.tw/ch/home.jsp?id=128&parentpath=0,3&mcustomize=lawnew_view.jsp&dataserno=201603030003&toolsflag=Y&dtable=NewsLaw
    金耀基(1992)。〈關係和網絡的建構〉,《中國社會與文化》,香港:牛津大學出版社。
    柏保路.博奇科夫斯基、李立峯、崔迪(2013)。〈數位化時代網絡新聞的持續演變〉,《傳播與社會學刊 》,25: 1-26。
    陳百齡、李蔡彥(2010)。〈資料庫裡尋人脈:考掘新聞人物的社會網絡〉,(行政院國家科學委員會補助專題研究計畫成果報告)。臺北市:國立政治大學新聞學系。
    陳百齡(2000)。〈新聞媒體裡的圖書館〉,《圖書與資訊學刊》,36:15-27。
    陳百齡(2015)。〈石碑背後的家族史: 新竹近代社會家族研究〉,新竹: 新竹市文化局。
    陳百齡(2016)。〈追分趕秒:新聞組織的時間結構化策略—以報社圖表產製為例〉,《新聞學研究》,127:75-117。
    陳百齡、鄭宇君、陳恭(2016)。〈社群媒體資料分析:特性與歷程的初探〉,《傳播文化》,15:48-89。
    陳志賢(2017 年 10 月 3 日)。〈吞30億逃14年 劉偉傑不起訴〉,《中時新聞網》。取自https://www.chinatimes.com/newspapers/20171003000423-260106?chdtv
    程法彰(2018)。〈洗錢防制與個人資料保護的兩難〉,《全國律師》,22(11):65-69。
    葉俊榮(2003)。〈民主轉型與金錢政治的法律因應〉,《國家發展研究》,2:1-29。
    劉蕙苓(2006)。〈網路的新聞再現1994 vs 2004 以聯合報為例〉,《資訊社會研究》,12:143-177。
    蔣念祖(2019)。〈美國、新加坡及香港洗錢防制國際相互評鑑報告之研析〉,《臺灣法學雜誌》,378:19–54。
    鄭宇君、陳百齡(2014)。〈探索2012臺灣總統大選之社交媒體浮現社群:鉅量資料分析取徑〉,《新聞學研究》,120:121-165。
    鄭宇君(2016)。〈社交媒體之雙重性:人的連結與技術的連結〉,《 傳播文化與政治》,4:1-25。
    錢世傑(2018)。〈重要政治性職務之人(PEPs)規定之合理性及其適用〉,《財產法暨經濟法》,52:139-176。
    羅家德(2006)。〈華人的人脈──個人中心信任網絡〉,《關係管理研究》,3:1-24。
    羅偉瑄(2013)。《人脈管理行動應用系統之設計》。中興大學資訊管理學系碩士論文。
    〈2021國家洗錢資恐及資武擴風險評估報告〉(2021)。取自行政院洗錢防制辦公室網頁https://www.amlo.moj.gov.tw/media/20211299/2021%E5%9C%8B%E5%AE%B6%E6%B4%97%E9%8C%A2%E8%B3%87%E6%81%90%E5%8F%8A%E8%B3%87%E6%AD%A6%E6%93%B4%E9%A2%A8%E9%9A%AA%E8%A9%95%E4%BC%B0%E5%A0%B1%E5%91%8A.pdf?mediaDL=true
    〈防制洗錢及打擊資恐查詢系統〉(2022年5月10日)。臺灣集中保管交易結所。取自https://www.tdcc.com.tw/portal/zh/service/laundering
    〈臺灣接受亞太防制洗錢組織(APG)第三輪相互評鑑之評鑑報告正式出爐!!〉(2019),取自行政院洗錢防制辦公室https://www.amlo.moj.gov.tw/1506/1507/14969/post
    Basel Committee on Banking Supervision. (1998). Prevention of Criminal Use of the Banking System for the purpose of Money-Laundering. Retrieved from https://www.bis.org/publ/bcbsc137.pdf
    Bhatia, P. (2019). Data Mining and Data Warehousing: Principles and Practical Techniques, Cambridge, U.K.:Cambridge Univ. Press.
    Bowen, R. M, Burgstahler, D.,& Daley L. A., (1986). Evidence on the Relationships between Earnings and Various Measures of Cash Flow. The Accounting Review, 61(4), 713-725, Lakewood Ranch: American Accounting Association.
    Boczkowski , P. J. (2005). Digitizing the News:Innovation in Online Newspapers. Massachusetts, Cambridge:The MIT Press.
    Coleman, J. S. (1986). Social theory, social research, and a theory of action. American Journal of Sociology, 91(6), 1309–1335.
    Debora, C. (2013, August). Text mining newspapers and news content:new trends and research methodologies. IFLA WLIC 2013, Singapore.
    Diaz, L. (2022, August 3). Mexico probes former president Pena Nieto for money laundering. Reuters. Retrieved from https://www.reuters.com/
    Drucker, P.F. (2001). Management Challenges for the 21st Century, London: Routledge.
    Duan, Y., Jatowt, A., Bhowmick S. S., & Yoshikawa, M. (2019). Mapping entity sets in news archives across time. Data Science and Engineering, 4(3):208-222.
    Emirbayer, M., Goodwin, J. (1994). Network Analysis, Culture, and the Problem of Agency. American Journal of Sociology, 99(6), 1411-1454.
    FATF. (2007). Money Laundering & Terrorist Financing Through The Real Estate Sector. Retrieved from https://www.fatf-gafi.org/media/fatf/documents/reports/ML%20and%20TF%20through%20the%20Real%20Estate%20Sector.pdf
    FATF. (2012). The FATF Recommendations-International Standards on Combating Money Laundering and the Financing of Terrorism & Proliferation. Retrieved from https://www.fatf-gafi.org/publications/fatfrecommendations/documents/fatf-recommendations.html
    FATF. (2013). FATF Guidance:Politically Exposed Persons. Retrieved from https://www.fatf-gafi.org/documents/documents/peps-r12-r22.html
    FATF. (2014). Risk-Based Approach for the Banking Sector. Retrieved from https://www.fatf-gafi.org/documents/riskbasedapproach/documents/risk-based-approach-banking-sector.html?hf=10&b=0&s=desc(fatf_releasedate)
    FATF. (2017). FATF Guidance: Private Sector Information Sharing. Retrieved from https://www.fatf-gafi.org/media/fatf/documents/recommendations/Private-Sector-Information-Sharing.pdf
    FATF. (2020). FATF Virtual Assets Red Flag Indicators of Money Laundering and Terrorist Financing. Retrieved from https://www.fatf-gafi.org/media/fatf/documents/recommendations/Virtual-Assets-Red-Flag-Indicators.pdf
    FATF. (2021). Methodology for Assessing Technical Compliance with the FATF Recommendations and the Effectiveness of AML/CFT Systems . Retrieved from https://www.fatf-gafi.org/media/fatf/documents/methodology/FATF%20Methodology%2022%20Feb%202013.pdf
    FFIEC. (last viewed date 2022, March 7). ASSESSING COMPLIANCE WITH BSA REGULATORY REQUIREMENTS. Retrieved from https://bsaaml.ffiec.gov/manual/AssessingComplianceWithBSARegulatoryRequirements/02
    Fischer, C.S., Jackson, R.M., Stueve, C.A., Gerson K., Jones, L.M. & Baldassare, M. (1977). Networks and Places:Social Relations in the Urban Setting. New York, NY: Free Press.
    Freeman, L.C. (2004). The Development of Social Network Analysis:A Study in the Sociology of Science. Vancouver, BC: Empirical Press.
    Fry, B. (2007). Visualizing Data. California, Sebastopol: O`Reilly Media.
    Goldberg, Y. (2015). A Primer on Neural Network Models for Natural Language Processing. Journal of Artificial Intelligence Research, 57, 345–420.
    Graber, D. A. (2006). Mass media & American politics, Washington, D.C.: CQ Press.
    Granovetter, M. (1985). Economic action and social Structure: The problem of embeddedness. American Journal of Sociology, 91(3), 481-510.
    Jatowt, A., Kanazawa, K. & Oyama, S. & Tanaka. K. (2009). Supporting analysis of future-related information in news archives and the web. In JCDL, 115-124.
    Kilduff, M., & Tsai, W. (2003). Social networks and organizations. London: SAGE.
    Knoke, D., Kuklinski, J.H. (1982). Network analysis. California, Newbury park: SAGE Publications.
    Lewis, S. C., Guzman, A. L., & Schmidt, T. R. (2019). Automation, Journalism, and Human–Machine Communication: Rethinking Roles and Relationships of Humans and Machines in News. Digital Journalism, 7, 409-427.
    Lin, N. (2001). Social capital. A Theory of Social Structure and Action. Cambridge University Press.
    Lopes, M. (2017, July 12). Former Brazilian president Lula convicted of corruption and money laundering, The Washington Post. Retrieved from https://www.washingtonpost.com/
    Merriam-Webster. (2021, March 10). Retrieved from https://www.merriam-webster.com/dictionary/politician
    Milgram, S. (1967). The Small World Problem. Psychology Today, 2, 60-67.
    Mitchell, J.C. (1974). The concept and use of social networks. Annual Review of Anthropology, 3, 179-299.
    Moody, J. & White, D. R., (2003). Structural Cohesion and Embeddedness: A Hierarchical Concept of Social Groups. American Sociological Review, 68(1), 103-127.
    Mugarura, N. (2016). Uncoupling the relationship between corruption and money laundering crimes. Journal of Financial Regulation and Compliance, 24(1), 74-89.
    Nations United. (2004). United Nations Convention against Corruption. Retrieved from https://www.unodc.org/unodc/en/treaties/CAC/
    New York Times. (2010, March 17). Wachovia and U.S. Settle a Money Laundering Case. The New York Times. Retrieved from https://www.nytimes.com/2010/03/18/business/18launder.html
    Pattison, P. (1993). Algebraic Models for Social Networks. Cambridge: Cambridge University Press.
    Provan, K. G., Fish, A., & Sydow, J. (2007). Interorganizational Networks at the network level: A review of the empirical literature on whole networks. Journal of Management, 33(3), 479-516.
    Saleiro, P., Teixeira, J., Soares, Carlos, S. & Oliveira, E. (2016). Timemachine: Entity-centric search and visualization of news archives. European Conference on Information Retrieval. ECIR 2016, 945-848.
    Scott, J. (2017). Social Network Analysis. California, Newbury park: SAGE Publications.
    SENACLAFT. (2022, December 24). Lista de Personas Políticamente Expuestas (PEP) - Actualizada al 21 de Diciembre de 2022 con cargos y organismos. Retrieved from https://www.gub.uy/secretaria-nacional-lucha-contra-lavado-activos-
    The Egmont Group. (2021). Best Egmont Cases: Financial Analysis Cases 2014–2020. Retrieved from https://egmontgroup.org/wp-content/uploads/2022/01/2021-Financial.Analysis.Cases_.2014-2020-3.pdf
    The Wolfsberg Group. (2006). Wolfsberg Statement Guidance on a Risk Based Approach for Managing Money Laundering Risks. Retrieved from https://www.wolfsberg-principles.com/sites/default/files/wb/pdfs/wolfsberg-standards/15.%20Wolfsberg_RBA_Guidance_%282006%29.pdf
    The Wolfsberg Group. (2017). Guidance on Politically Exposed Persons(PEPs). Retrieved from https://www.wolfsberg-principles.com/sites/default/files/wb/Wolfsberg-Guidance-on-PEPs-May-2017.pdf
    The Wolfsberg Group. (2019). Correspondent Banking Due Diligence Questionnaire (CBDDQ) Capacity Building Guidance. Retrieved from https://wolfsberg-principles.com/sites/default/files/wb/pdfs/CBDDQ-Capacity-Building/Wolfsberg%27s_CBDDQ_Capacity_Building_Guidance_Final%20V1.1.pdf
    United Nations Conference on Trade and Development. (2021). Trade and Development Report 2021. Retrieved from https://unctad.org/webflyer/trade-and-development-report-2021
    United Nations. (1988). Convention Against Illicit Traffic In Narcotic Drugs And Psychotropic Substances (The Vienna Convention). Retrieved from https://www.unodc.org/pdf/convention_1988_en.pdf
    United Nations. (2000). Convention against Transnational Organized Crime and the Protocols Thereto (The Palermo Convention). Retrieved from https://www.unodc.org/documents/treaties/UNTOC/Publications/TOC%20Convention/TOCebook-e.pdf
    Wellman, B. (1979). The Community Question: Intimate Networks of East Yorkers. American Journal of Sociology, 84(5), 1201-1231.
    Wellman, B. (1983). Network analysis: Some basic principles. Sociological Theory, 1, 155-200.
    Yang, C.C., Shi, X. & Wei C-P. (2009). Discovering Event Evolution Graphs from News Corpora. IEEE Transactions on Systems Man and Cybernetics-Part A Systems and Humans, 39(4), 850-863.
    Кириленко, A. (2018, March 18). Online dissidents expose the Russian prime minister’s material empire, The Insider. Retrieved from https://theins.ru/
    Description: 碩士
    國立政治大學
    傳播學院碩士在職專班
    109941008
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0109941008
    Data Type: thesis
    Appears in Collections:[EMA Program in Communication] Theses

    Files in This Item:

    File Description SizeFormat
    100801.pdf40506KbAdobe PDF2157View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback