English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 111283/142199 (78%)
造访人次 : 48182442      在线人数 : 980
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/52753


    题名: 反武器擴散:資料採礦技術於我國戰略性高科技貨品出口管制之應用
    Counter proliferation: the application of data mining technologies in Taiwan strategic high-tech commodities export control management
    作者: 邱建凱
    Chiou, Chien Kai
    贡献者: 冷則剛
    Leng, Tse Kang
    邱建凱
    Chiou, Chien Kai
    关键词: 反武器擴散
    資料採礦
    戰略性高科技貨品
    出口管制
    Counter Proliferation
    Data Mining
    Strategic High-Tech Commodities
    Control Management
    日期: 2011
    上传时间: 2012-04-17 09:13:17 (UTC+8)
    摘要: WMD (weapons of mass destruction) proliferation and nuclear terrorism are the gravest dangers that the world faces. The international society established counter proliferation regimes and export control systems to prevent the proliferators from acquiring WMD and the related commodities that can be used in producing the weapons. However, there are limitations in export control systems. The trade security and facilitation should be both considered, while the proliferators attempt to establish procurement networks to circumvent export control systems and globalization has introduced challenges from the emergence of increasing number of global corpora¬tions and increasing volume of dual-use trade. By using the data mining tool of link analysis, the thesis attempts to develop a methodology to increase the coerciveness and accuracy of detecting problematic shipments from ordinary export activities in order to improve the export control management. From the research, it suggests that data mining is a feasible solution to improve the effectiveness and efficiency of export control. It can be used for discovering entities with not only explicit but also implicit proliferation concerns from a large quantity of datasets and increase the cost and difficulties of circumventing export control so that the proliferation activities are to be contained or hindered. Based on the findings, the thesis established an export control management model with data-mining solutions.
    參考文獻: Albright, David and Corey Hinderstein. "Unraveling the A. Q. Khan and Future Proliferation Networks." THE WASHINGTON QUARTERLY 28:2, (SPRING 2005): 111-128.
    Arquilla, John, David F. Ronfeldt, United States, Dept. of Defense, and Office of the Secretary of Defense. Networks and Netwars: The Future of Terror, Crime, and Militancy. MR / Rand Corporation; MR-1382-OSD; Variation: MR (Series); MR-1382-OSD. Santa Monica, CA: Rand, 2001.
    Beck, Michael D., Richard T. Cupitt, Seema Dahlaut, and Scott A. Jones. To Supply Or to Deny: Comparing Nonproliferation Export Control in Five Key Countries. The Netherlands: Kluwer Law International, 2003.
    Bunn, Matthew, Andrew Newman, Belfer Center for Science and Intergovernmental Affairs, Nuclear Threat Initiative, and Project on Managing the Atom (Harvard University). Preventing Nuclear Terrorism: An Agenda for the Next President. Cambridge, Mass.; Washington, D.C.: Harvard Kennedy School, Belfer Center for Science and International Affairs: Nuclear Threat Initiative, 2008.
    Bureau of Foreign Trade, Ministry of Economic Affairs, ROC. Comprehensive Export Control on Strategic High-Tech Commodities 2011.
    Bush, George W. "Presidential Determination on Major Drug Transit or Major Illicit Drug Producing Countries for Fiscal Year 2007." Presidential Determination 71, no. 189 (September 29, 2006).
    Chipman, John. "Nuclear Black Market: Pakistan, A.Q. Khan and the Rise of Proliferation Networks." The International Institute for Strategic Studies, London, Strategic Dossier (2 May, 2007).
    Cirincione, Joseph, Jon B. Wolfsthal, and Miriam Rajkumar. Deadly Arsenals: Nuclear, Biological, and Chemical Threats. 2nd ed. Washington, D.C: Carnegie Endowment for International Peace, 2005.
    Coll, Steve. "The Unthinkable: Can the United States be made Safe from Nuclear Terrorism?" The New Yorker (March 12, 2007).
    Dietz, Lawrence. "IBM, SAP, and NextLabs Collaborative Effort Yields Export Control Solution." Sageza Group, Inc., IT Analysis Communications Ltd. http://www.it-director.com/business/content.php?cid=9482 (accessed Nov 15, 2011).
    Dunn, Lewis A., National Defense University, and Center for the Study of Weapons of Mass Destruction. Can Al Qaeda be Deterred from Using Nuclear Weapons? Occasional Paper / Center for the Study of Weapons of Mass Destruction; 3; Variation: Occasional Paper (National Defense University. Center for the Study of Weapons of Mass Destruction); 3. Washington, D.C: Center for the Study of Weapons of Mass Destruction, National Defense University, 2005.
    eCustoms. "Visual Compliance – Export Control Compliance, Comprehensive Denied Party Screening, Controlled Goods Classification, Export License Determination and U.S. Munitions List Classification for Your Export Shipments." eCustoms – MSR Inc. http://www.ecustoms.com/vc/vc.cfm (accessed Nov, 15, 2011).
    ExportControl.org. "Overview of the U.S. Export Control System." ExportControl.org. http://exportcontrol.org/links/2081c.aspx (accessed Nov, 12, 2011).
    Fact Sheet on the President`s Export Control Reform Initiative. USA: The White House, Office of the Press Secretary, April 20, 2010.
    Foreign Trade Act, Ministry of Economic Affairs, R.O.C. Public Law Article 13, (2010): (accessed Nov 18, 2011).
    Graham, Bob, Chairman, Jim Talent, Vice-Chairman, and Graham Allison. World at Risk [Electronic Resource]: The Report of the Commission on the Prevention of WMD Proliferation and Terrorism. New York: Vintage Books, 2008.
    Heinz, John. U.S. Strategic Trade: An Export Control System for the 1990s. USA: Westview Press, 1991.
    Kessler, Glenn. "North Korea may have Sent Libya Nuclear Material, U.S. Tells Allies." Washington Post (February 2, 2005, 2005).
    Lai, Kwo Shing. "The Concept of Cooperative State and its Impact on the Regulations for Trade administration-a Focused Examination on Control Over High-Technology Commodities in Taiwan." Master thesis, National Chengchi University, Taiwan, 2008.
    Langewiesche, William. "How to Get a Nuclear Bomb." The Atlantic Online (December, 2006).
    ———. "The Wrath of Khan." The Atlantic Online (November, 2005).
    Obama, Barak. . Obama`s Speech at the Nuclear Security Summit. USA: Council on Foreign Relations, April 2010, http://www.cfr.org/proliferation/obamas-speech-nuclear-security-summit-april-2010/p21889.
    Pietsch, Georg. "End use End-User-Screening." Seventh Annual International Export Control Conference, Stockholm, Federal Office of Economics and Export Control (BAFA) Germany, 20-22 Sep, 2005, 2005.
    Rice, Condoleezza. "Opening Statement in Senate Foreign Relations Committee." (January 18, 2005).
    Robespierre, Norman. "Nuclear Bond for North Korea and Myanmar." Asia Times Online (Oct 4, 2008).
    Roiger, Richard J. and Michael W. Geatz. Data Mining: A Tutorial-Based Primer. Translated by曾新穆 and李建億. 初版四刷 ed. 台北市: 台灣培生教育出版股份有限公司, 2006.
    Ross, Brianand and Dana Hughes. "`Missiles `R` Us,` but would North Korea Sell their Nukes?" ABC News (July 28, 2006).
    Schneider, Barry R. and Jim A. Davis. Avoiding the Abyss: Progress, Shortfalls, and the Way Ahead in Combating the WMD Threat. Westport, Conn: Praeger Security International, 2006.
    Sokolski, Henry. "From Pyongyang with Love." Far Eastern Economic Review (April, 2008).
    Tertrais, Bruno. "Pakistan`s Nuclear Exports: Was there a State Strategy?" Paper Prepared for the Nonproliferation Policy Education Center (20 July, 2006).
    Westphal, Christopher and Teresa Blaxton. Data Mining Solutions: Methods and Tools for Solving Real-World Problems. Vol. 1. USA: Wiley Computer Publishing, 1998.
    Winner, Andrew C. "The Proliferation Security Initiative: The New Face of Interdiction." Washington Quarterly 28, no. 2 (2005): 129-143.
    Wyler, Liana Sun, Library of Congress, and Congressional Research Service. Burma and Transnational Crime. CRS Report for Congress; RL34225. Washington, D.C: Congressional Research Service, Library of Congress, 2007.
    Yusufzai, Rahimullah. "Conversation with Terror." Time (January 11, 1999).
    Zissis, Carin and Jayshree Bajoria. "The Six-Party Talks on North Korea’s Nuclear Program." (October 14, 2008).
    謝邦昌, 蘇志雄, 鄭宇庭, and葉劭緯. 資料採礦與商業智慧SQL Server 2005: Data Mining & Business Intelligence with SQL Server 2005. Taiwan Taipei: 中華資料採礦協會, 2005.
    韋端, 鄭宇庭, 鄧家駒, 匡宏波, and謝邦昌. Data Mining概述: 以Clementine 7.0為例. 初版一刷 ed. 2003.
    虞孝成, 徐振榮, 張世其. "出口管制制度之探討." 科技發展政策報導 no. SR9012 (Dec, 2001).
    描述: 碩士
    國立政治大學
    國際經營管理英語碩士學位學程(IMBA)
    94933021
    100
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0094933021
    数据类型: thesis
    显示于类别:[國際經營管理英語碩士學程IMBA] 學位論文

    文件中的档案:

    档案 大小格式浏览次数
    302101.pdf2060KbAdobe PDF21158检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈