Applied Modeling Techniques and Data Analysis 2. Группа авторов

Applied Modeling Techniques and Data Analysis 2 - Группа авторов


Скачать книгу
kind of information at hand, even because a tax notice can come to an end years after it was sent to the taxpayer (especially when a tax court is addressed).

      By ignoring the collectability aspect of the audit process, the selection processes may not be correctly targeted, or at least, may not satisfy the tax authorities’ needs i.e. relevant evasion phenomena may be discovered, but only little money may be collected.

      Of course, the fight against tax evasion is not only a matter of collecting money, but should also have some other purposes, such as promoting taxpayers’ compliant behavior. Nonetheless, efficient tax bill collection is crucial from the state budget point of view, because public expenditures are strictly connected to public revenues.

      The methodology we suggest here will soon be validated in real cases i.e. a sample of taxpayers will be selected according to the classification criteria developed in this chapter and will subsequently be involved in some audit processes.

      Agenzia delle Entrate e Ministero dell’Economia e delle Finanze (2018). Convenzione triennale per gli esercizi 2018-2020 [Online]. Available at: https://www.finanze.it/export/sites/finanze/.galleries/Documenti/Varie/DF_CONVENZIONE-MEF_ADE_2018.2020_FIRMATA-28_11_2018.pdf.

      Allingham, M.G. and Sandmo, A. (1972). Income tax evasion: A theoretical analysis. Journal of Public Economics, I, 323–338.

      Barone, M., Pisani, S., Spingola, A. (2017). Data mining application issues in income indicators audits. Argomenti di discussione – Agenzia delle Entrate, 2.

      Bonchi, F., Giannotti, F., Mainetto, G., Pedreschi, D. (1999). A classification-based methodology for planning auditing strategies in fraud detection. Proc. of SIGKDD99, 175–184.

      Breiman, L. (1996). Bagging predictors. Machine Learning, 24(2), 123–140.

      Corte dei Conti (2016). Il sistema della riscossione dei tributi erariali al 2015. Deliberazione 20 ottobre 2016, 11/2016/G.

      Gonzalez, P.C. and Velasquez, J.D. (2013). Characterization and detection of taxpayers with false invoices using data mining techniques. Expert Systems with Applications, 40(5), 1427–1436.

      OpenStax (2013). Introductory Statistics. OpenStax, 19 September [Online]. Available at: http://cnx.org/content/col11562/latest/.

      Phua, C., Lee, V., Smith, K., Gayler, R. (2005). A comprehensive survey of data mining-based fraud detection research. Artificial Intelligence Review, submitted.

      de Roux, D., Perez, B., Moreno, A., del Pilar Villamil, M., Figueroa, C. (2018). Tax fraud detection for under-reporting declarations using an unsupervised machine learning approach. KDD 2018, 215–222.

      de Sisti, P. and Pisani, S. (2007). Data mining e analisi del rischio di frode fiscale: il caso dei crediti d’imposta. Documenti di lavoro dell’Ufficio Studi – Agenzia delle Entrate, 4.

      Wu, R., Ou, C.S., Lin, H., Chang, S., Yen, D. (2012). Using data mining technique to enhance tax evasion detection performance. Expert Systems with Applications, 39, 8769–8777.

      1 1 A tax notice is a formal written act through which tax authorities assess a higher due taxable income with respect to the declared one.

      2 2 Data analyses are performed using WEKA – the data mining workbench developed at Waikato University in Hamilton, New Zealand, released under the GNU GPL license.

      3 3 The IRA sent a total of 59,269 tax notices concerning fiscal year 2012 to self-employed individuals allowed to keep simplified registers, so we can manage a quite significant sample.

      Chapter written by Mauro BARONE, Stefano PISANI and Andrea SPINGOLA.

      2

      Asymptotics of Implied Volatility in the Gatheral Double Stochastic Volatility Model

      Gatheral’s (2008) double-mean-reverting model by is motivated by empirical dynamics of the variance of stock price. No closed-form solution for European option exists in the above model. In this chapter, we study the behavior of the implied volatility with respect to the logarithmic strike price and maturity near expiry and at-the-money. Using the method by Pagliarani and Pascucci (2017), we explicitly calculate the first few terms of the asymptotic expansion of the implied volatility within a parabolic region.

      The history of implied volatility can be traced back at least to Latané and Rendleman (1976), where it appeared under the name “implied standard deviation”, i.e. the standard deviation of asset returns, which are implied in actual European call option prices when investors price options according to the Black-Scholes model. For a recent review of different approaches to determine implied volatility, see Orlando and Taglialatela (2017). To give exact definitions, we use Pagliarani and Pascucci (2017).

      On one hand, we have the time t no-arbitrage price of a European call option with strike price K > 0 and maturity T is Ct,T,K = v(t,St,Yt,T,K), where

image

      and where (t, s, y) ∈ [0,T] × (0, ) ×d 1. We change to logarithmic variables and define the option price by

image

      where x is the time t log price of the underlying asset, k is the log strike of the option, and (t,x, y) ∈ [0, T] ××d-1.

      On the other, the Black-Scholes price in logarithmic variables is

      [2.1]image

      and τ = Tt ∈ [0, T], x, k ∈ ℝ, image is the cumulative distribution function of the standard normal random variable.

      DEFINITION 2.1.- The implied volatility σ = σ(t,x, y, T, k) is the unique positive solution of the nonlinear equation


Скачать книгу