:::

詳目顯示

回上一頁
題名:網際網路時代的資訊使用與隱私權保護規範:個人、政府與市場的拔河
書刊名:資訊管理研究. 中央大學
作者:劉靜怡 引用關係
出版日期:2002
卷期:4:3
頁次:頁137-161
主題關鍵詞:網際網路資訊使用與隱私權保護規範
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(7) 博士論文(2) 專書(1) 專書論文(0)
  • 排除自我引用排除自我引用:7
  • 共同引用共同引用:1
  • 點閱點閱:54
期刊論文
1.Dan Burk、Jennifer A. Hess(1994)。Genetic Genetic Privacy:Constitutional Considerations in Forensic DNA Testing。Geo. Mason U. Civ.Rts L.J.,1。  new window
2.Andrea de Gorgey,Comment(1990)。The Advent of DNA Databanks: Implications for Informational Privacy。AM. J.L. & Med.,16,381。  new window
3.M. Nicole van Dam(1990)。The scarlaet letter "A":AIDS in a Computer Society。Computer L.J.,10,233。  new window
4.Lawrence A. Gostin(1995)。Health Information Privacy。Cornell L. Rev.,80,451。  new window
5.(1995)。Symposium: Privacy and ITS。Santa Clara Computer & High Tech. L.J.,11,1。  new window
6.Lillian R. Bevier(1995)。Information About Individuals in the Hands of Government:Some Reflections on Mechanism for Privacy Protection。Wm. & Marry Bill Rts. J.,3,455。  new window
7.Srth Kreimer(1991)。Sunlight, Secrets, and Scarlet Letters: The Tension Between Privacy and Disclosure in Constitutional Law。U. PA. L. Rev.,140,1。  new window
8.Paul M. Schwartz(1992)。Data Processing and Government Adminstration: The Failure of the American Legal Response to the Computer。Hastings L. J.,43,1321。  new window
9.Lillian R. BeVier(1999)。The Communications Assistance for Law Enforcement Act of 1994:A Surprising Sequel to the Break Up of At & T。Stan. L. Rev,51,1049。  new window
10.劉靜怡(19971000)。從Cookies以及類似資訊科技的使用淺論網際網路上的個人資訊隱私保護問題。資訊法務透析,22-37。new window  延伸查詢new window
11.Christopher Burns(1995)。Copyright Management and The NII: Reportto the enabling technologies committee of the association O American Publishers。  new window
12.Cohen, Julie E.(1996)。A right to Read Anonymously: A Closer Look at "Copyright Management" in Cyberspace。Connecticut Law Review,28,981-1039。  new window
13.Cohen, Julie E.(1997)。Some Reflections on Copyright Management Systems and Laws Designed to Protect Them。Berkeley Tech. L. J.,12,161。  new window
14.John Arandeo(1996)。Pandora's (E-mail) Box: E-Mail Monitoring in the Workplace。Hofstra Lab. L. J.,14,339。  new window
15.Elena N. Border,Note(1996)。(NET) worker's Rights: The NLRA and Employee Electronic Communications。Yale L.J.,105,1639。  new window
16.Laurie Thomas Lee(1994)。Watching Your E-Mail:Employee E-Mail Monitoring and Privacy Law in The Age of the "Electronic Sweatshop"。J. Marshall L. Rev.,28,139。  new window
17.David Neil King(1994)。Private-Sector Workshop Workplace: Protection from Electronic Surveillance and the Emerging Privacy Gap。S. Cal. L. Rev,67,441。  new window
18.Priscilla M. Regan(1995)。Legislating Privacy26。  new window
19.Joel R.(1992)。Privacy in the Information Economy: A Fortress of Frontier for Individual Rights?。  new window
20.Alan F. Westin(1996)。Science, Privacy,and Freedom: Issues and Proposals for the 1970's:Part II-Balancing the conflicting Demands of Privacy,Disclosure and Surveillance。  new window
21.Albert W. Alshuler(1983)。Interpersonal Privacy and the Fourth Amendment。N. I11. U. L. Rev.,4,962。  new window
22.Robert C. Post(1991)。Rereading Warren and Brandeis:Privacy,Property and Appropriation。Case Western L. Rev.,41,647。  new window
23.Charles Fried(1969)。Privacy [A moral Analysis]。Yale L. J.,77,475。  new window
24.Edward J. Bloustein。Privacy as an Aspect of Human Dignity。  new window
25.Judith B. Prowda(1995)。A Lawyer's Ramble Down the Information Superhighway: Privacy and Security of Data。Fordham L. Rev.,64,738+742。  new window
26.Oscar H. Grandy, Jr.(1996)。Legitimate Business Interest: No End in Sight? An Inquiry of Privacy in Cyberspace。U. Chi. Legal F.,1996,77。  new window
27.Edward J. Markey(199708-199)。A Privacy Safety Net。Mid Technology Review。  new window
28.Robert M. Gellman(1993)。Fragmented, Incomplete, and Discloures: The Failure of Federal Privacy Regulatory Proposals and Institutions。Sofrware L. J.,6,199。  new window
29.Paul Schwartz(1997)。Privacy and the Economics of Personal Health Care Information。Tex. L. Rev.,76,1。  new window
30.Joel R. Reidenberg、Paul M. Schwartz(1999)。Legal Perspectives on Privacy。  new window
31.Joel R. Reidenberg(1998)。Lex Informatica: The Foundation of Information Policy Rules Through Technology。Tex. L. Rev.,76,553。  new window
32.The Economist(19990501)。The Surveillance Society17-19。  new window
33.Lawrence Lessig(1996)。Reading the Constiturion in Cyberspace。Emory L. J.,45,869。  new window
34.Fred H. Cate(1995)。The RU Data Protection Directive, Information Privacy,and the Public Interest。IOWA L. Rev.,80,431。  new window
35.William A. Hodkowski(1998)。The Future of Internet Security: How New Technologies Will Shape The Internet and Affect the Law。Computer & High Tech. L. J.,13,217。  new window
36.Froomkin, A. Michael(1996)。Flood Control on the Information Ocean: Living with Anonymity, Digital Cash, and Distributed Databases。Journal of Law and Commerce,15,395-507。  new window
37.Lawrence Lessig(1997)。Constitution and Code。Cumb. L. Rev.,27。  new window
38.Reidenberg, Joel R.(1999)。Restoring America’s Privacy in Electronic Commerce。Berkeley Tech. L. J.,14,771-788。  new window
39.Kang, Jerry(1998)。Information Privacy in Cyberspace Transactions。Stanford Law Review,50(4),1193-1294。  new window
40.Hodges, M.(1997)。Is Web Business Good Business?。MIT's Technology Review,100(6),22-28。  new window
41.Warren, Samuel D.、Brandeis, Louis D.(1890)。The Right to Privacy。Harvard Law Review,4(5),193-220。  new window
42.Simitics, S.(1987)。Reviewing Privacy in an Information Society。University of Pennsylvania Law Review,135(3),707-746。  new window
43.Lessig, Lawrence(1996)。Reading the Constitution in Cyberspace。EMORY L.J.,45,869。  new window
會議論文
1.劉靜怡(1997)。資訊科系與法律制度的互動:從網路規範模式看台灣社會面臨的網路言論自由與資訊隱私危機。資訊科技與社會轉型研討會論文集,中央研究院社會學研究所籌備處 (會議日期: 19971218-19971219)。  延伸查詢new window
研究報告
1.(199806)。Federeal Trade Commission of the United States,Privacy Online:A Report to Congress。  new window
2.Federal Trade Commission(1998)。Privacy Online: A Report to Congress。  new window
圖書
1.James Boyle(1996)。Shamans,Software,and Spleens:Law and The Construction of the Information Society。  new window
2.Simon Garfinkel(2000)。Database Nation:The Death of Privacy in the 21th Century 10。  new window
3.David Lyon(1994)。The Electronic Eyes:The Rise of Surveillance State。  new window
4.Jeffrey Rothfeder(1992)。Privacy for Sale:How Computerization has made everyon's life an open Secret。  new window
5.(199704)。A Personalized Web Todd Copilevitz。  new window
6.(19960812)。Oil Change Renews Online Privacy Fears。  new window
7.Mark Stefik(1997)。The Possible : How trusted systems and digital property rights challenge us to rethink digital publishing。  new window
8.Ferdinard D. Schoeman(1984)。Philosophical Dimensions of Privacy。  new window
9.Stefik, Mark(1999)。The Internet Edge: Social,Technical and Legal Challenges for a Networked World。  new window
10.Federal Trade Commission(199804)。Fighting Consumer Fraud: New Tools of The Trade。  new window
11.M. Ethan Katsh。Law in a Digital World。  new window
12.Robert Gellman(1997)。Conflict and Overlap in Privacy Regulation: National International,and Private。Border in Cyberspace。  new window
13.David G.(1995)。Anarchy,State, and the Internet: An Essay on Law-Making in Cyberspace。  new window
14.Radin, Margaret Jane(1996)。Contested Commodities。Cambridge, MA:Harvard UP。  new window
15.Shapiro, Andrew L.(1999)。The Control Revolution—How the Internet is Putting Individuals in Charge and Changing the World We Know。New York, NY:A Century Foundation Book。  new window
16.Tribe, Laurence(1988)。American Constitutional Law。Foundation Press。  new window
17.Lessig, Lawrence(1999)。Code and Other Laws of Cyberspace。Basic Books。  new window
18.Gandy, Oscar H. Jr.(1993)。The Panoptic Sort: A Political Economy of Personal Information。Westview。  new window
19.Linowes, D. F.(1989)。Privacy in America: Is Your Private Life in the Public Eye?。Urbana, IL:University of Illinois Press。  new window
其他
1.Paul M. Schwartz(1995)。Privacy and Participation:Personal Information and Public Sector Regulation in the United States,80 IOWA L. REV.553。  new window
2.Anne Wells Branscomb(1994)。Who Owns Information:From Privacy to Public Access。  new window
3.William H. Minor(1995)。Identity Cards and Database in Health Core:The Need for Federal Privacy Protection。  new window
4.Paul M. Schwartz(1995)。The Protecion of Privacy in Health Card Reform。  new window
5.(19960903)。Htmlscript Implements "Caller ID" Feature; Simplifies Cookies and Allows HEML, Web Developers to Easily Track and Identify Individual Web Beowsers, Bus. Wire Kevib Kelly。  new window
6.Edmund Andrews(19990527)。Europe and U.S. Are Still at Odds over Privacy。  new window
7.Peter Swire,Robert Litan(1998)。None of Your Business:World Data Flows,Electronic Commerce,and The European Privacy Directive。  new window
8.Joel R. Reidenberg,Paul M. Schwartz(1998)。Data Protection Law and Online Service:Regulatory Responses,http://europa.eu.int/comm/dgt15/en/media/datapro/studies/regul.pdf。  new window
9.Steven Lohr(19991011)。Online Industry Seizes the Initiative on Privacy。  new window
10.Robert C. Post(1995)。The Social Foundations of Privacy:Community and Self in the Common Law Tort。  new window
11.Robert Unger(1987)。Social Theory:It's Situation and Its Task。  new window
12.Alan Wexelblat。How Is NII Like Prison?,http://wex.www.media.mit.edu/people/wex/panoptic~paper.html, 19980905。  new window
13.Clinton, W. J.,Gore, A., Jr.(1997)。A Framework for Global Electronic Commerce。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE