Automated Round-trip Detection Based on Data Mining Methodologies
碩士 === 東吳大學 === 資訊管理學系 === 99 === Tax revenue is the major source of government income. However, as information technology is getting advanced, enterprises keep trying to find new methods to evade tax. Current business taxation in Taiwan can be classified to Value-Added and Non-Value-Added types. T...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/56263052743386293456 |
id |
ndltd-TW-099SCU05396034 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099SCU053960342016-04-11T04:22:42Z http://ndltd.ncl.edu.tw/handle/56263052743386293456 Automated Round-trip Detection Based on Data Mining Methodologies 營業稅循環交易自動偵測機制之研究 Wen-Hsiung Wu 吳文雄 碩士 東吳大學 資訊管理學系 99 Tax revenue is the major source of government income. However, as information technology is getting advanced, enterprises keep trying to find new methods to evade tax. Current business taxation in Taiwan can be classified to Value-Added and Non-Value-Added types. The above two types of taxation adopt multi-stage sales tax processes. The former levies the tax based on the amount of added value and can draw up the uniform invoice as the certificate to deduct the drawback. The fictitious company is a major source of business tax evasion. However, the patterns of fictitious companies to evasive tax are varied and complex. The round-trip is the most serious one which has badly affected government's tax revenue. In recent years, there are several corporate fraud cases happened. The round-trip is the most frequent manipulative scheme. It always depends on the experiences of tax inspectors to detect fictitious criminal companies. When inspectors use tax information system to check on the correction of all the detailed purchase-and-sale items of business declaration, most of them could be overwhelmed by the huge amounts of abnormal outputs. It is inefficient and a waste of inspecting labor. The present advanced procedure delivers the possible multi-cycle transaction detailed list by the computer program. However, there are too many suspicious items to find out all of them. Therefore, a well inspection priority for the items will make the efficient inspection and reduce the revenue losses. In this study, we use the income/outgoing tax of business's transactions and characteristics of abnormal fictitious company data to find out suspicious business transactions. The social network analysis is also used to review the behavior of transactions. Moreover, classification algorithms and data mining technology are adopted to identify inspection priorities that will help inspectors to do a full check of the suspected companies. The proposed method in this study can check out many levels of round-trip transaction from criminal fictitious companies, so that the tax auditors can find out the illegal fictitious company to keep business taxation fair. Business tax data, collected from National Tax Administration of Northern Taiwan Province, was used for data mining process. Li-Chen Cheng 鄭麗珍 2011 學位論文 ; thesis 74 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 東吳大學 === 資訊管理學系 === 99 === Tax revenue is the major source of government income. However, as information technology is getting advanced, enterprises keep trying to find new methods to evade tax. Current business taxation in Taiwan can be classified to Value-Added and Non-Value-Added types. The above two types of taxation adopt multi-stage sales tax processes. The former levies the tax based on the amount of added value and can draw up the uniform invoice as the certificate to deduct the drawback. The fictitious company is a major source of business tax evasion. However, the patterns of fictitious companies to evasive tax are varied and complex. The round-trip is the most serious one which has badly affected government's tax revenue.
In recent years, there are several corporate fraud cases happened. The round-trip is the most frequent manipulative scheme. It always depends on the experiences of tax inspectors to detect fictitious criminal companies. When inspectors use tax information system to check on the correction of all the detailed purchase-and-sale items of business declaration, most of them could be overwhelmed by the huge amounts of abnormal outputs. It is inefficient and a waste of inspecting labor. The present advanced procedure delivers the possible multi-cycle transaction detailed list by the computer program. However, there are too many suspicious items to find out all of them. Therefore, a well inspection priority for the items will make the efficient inspection and reduce the revenue losses.
In this study, we use the income/outgoing tax of business's transactions and characteristics of abnormal fictitious company data to find out suspicious business transactions. The social network analysis is also used to review the behavior of transactions. Moreover, classification algorithms and data mining technology are adopted to identify inspection priorities that will help inspectors to do a full check of the suspected companies. The proposed method in this study can check out many levels of round-trip transaction from criminal fictitious companies, so that the tax auditors can find out the illegal fictitious company to keep business taxation fair. Business tax data, collected from National Tax Administration of Northern Taiwan Province, was used for data mining process.
|
author2 |
Li-Chen Cheng |
author_facet |
Li-Chen Cheng Wen-Hsiung Wu 吳文雄 |
author |
Wen-Hsiung Wu 吳文雄 |
spellingShingle |
Wen-Hsiung Wu 吳文雄 Automated Round-trip Detection Based on Data Mining Methodologies |
author_sort |
Wen-Hsiung Wu |
title |
Automated Round-trip Detection Based on Data Mining Methodologies |
title_short |
Automated Round-trip Detection Based on Data Mining Methodologies |
title_full |
Automated Round-trip Detection Based on Data Mining Methodologies |
title_fullStr |
Automated Round-trip Detection Based on Data Mining Methodologies |
title_full_unstemmed |
Automated Round-trip Detection Based on Data Mining Methodologies |
title_sort |
automated round-trip detection based on data mining methodologies |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/56263052743386293456 |
work_keys_str_mv |
AT wenhsiungwu automatedroundtripdetectionbasedondataminingmethodologies AT wúwénxióng automatedroundtripdetectionbasedondataminingmethodologies AT wenhsiungwu yíngyèshuìxúnhuánjiāoyìzìdòngzhēncèjīzhìzhīyánjiū AT wúwénxióng yíngyèshuìxúnhuánjiāoyìzìdòngzhēncèjīzhìzhīyánjiū |
_version_ |
1718221253061378048 |