:::

詳目顯示

回上一頁
題名:生物辨識技術之運用對隱私權的影響
書刊名:科技法學評論
作者:王郁琦
作者(外文):Wang, Yu-chi
出版日期:2006
卷期:3:2
頁次:頁49-106
主題關鍵詞:生物辨識資訊隱私權身分盜用BiometricsInformation privacyIdentity theft
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(7) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:5
  • 共同引用共同引用:48
  • 點閱點閱:45
期刊論文
1.陳起行(20001200)。資訊隱私權法理探討--以美國法為中心。政大法學評論,64,297-341。new window  延伸查詢new window
2.王郁琦(2004)。資訊時代隱私權基礎理論初探。世新法學,第1期,頁283-305。new window  延伸查詢new window
3.劉靜怡(2002)。資訊隱私保護的國際化爭議⎯⎯從個人資料保護體制的規範協調到國際貿易規範的適用。月旦法學雜誌,第86 期,頁195-205。new window  延伸查詢new window
4.Bennett, Kanya A.(2001)。Can Facial Recognition Technology Be Used to Fight the New War against Terrorism? Examining the Constitutionality of Facial Recognition Surveillance Systems。N.C. J.L. & TECH.,3,151。  new window
5.Brogan, John J.(2002)。Facing the Music: The Dubious Constitutionality of Facial Recognition Technology。HASTINGS COMM. & ENT. L.J.,25,65。  new window
6.Feldman, Robin(2003)。Considerations on the Emerging Implementation of Biometric Technology。HASTINGS COMM. & ENT. L.J.,25,653。  new window
7.Haas, Eric P.(2004)。Back to the Future? The Use of Biometrics, It’s Impact on Airport Security, and How This Technology Should Be Governed。J. AIR L. & COM.,69,459。  new window
8.Iraola, Roberto(2003)。Light, Camera, Action!—Surveillance Cameras, Facial Recognition Systemsand the Constitution。LOY. L. REV.,49,773。  new window
9.Kennedy, Gwen “Wendy”(2004)。Thumbs up for Biometric Authentication!。COMP. L. REV. & TECH.J.,8,379。  new window
10.McCormack, David(2003)。Can Corporate America Secure Our Nation? An Analysis of the Identix Framework for the Regulation and Use of Facial Regulation Technology。B.U. J. SCI. & TECH. L.,9,128。  new window
11.Moo-Young, Robyn(2001)。“Eyeing” the Future: Surviving the Criticisms of Biometric Authentication。N.C. BANKING INST.,5,421。  new window
12.Nguyen, Alexander T(2002)。Here’s Looking at You, Kid: Has Face-Recognition Technology Completely Outflanked the Fourth Amendment?。VA. J.L. & TECH.,7,2。  new window
13.Quarmby, Ben(2003)。Biometrics: The Case for National DNA Identification Cards。DUKE L. &TECH. REV.,2003,2。  new window
14.Rosen, Jeffrey(2004)。The Naked Crowd: Balancing Privacy and Security in an Age of Terror。ARIZ. L. REV.,46,607。  new window
15.Singleton, Solveig(2004)。Privacy and Twenty-First Century Law Enforcement: Accountability for New Techniques。OHIO N.U. L. REV.,30,417,435。  new window
16.Star, Greg(2002)。Airport Security Technology: Is the Use of Biometric Identification Technology Valid under the Fourth Amendment。TEMP. ENVTL. L. & TECH. J.,20,251。  new window
17.Thornburg, Robert H.(2002)。Face Recognition Technology: The Potential Orwellian Implications and Constitutionality of Current Uses under the Fourth Amendment。J. MARSHALL J.COMPUTER & INFO. L.,20,321。  new window
18.Thueson, Sean D.(2002)。Fourth Amendment Search—Fuzzy Shades of Gray: The New “Bright-Line” Rule in Determining When the Use of Technology Constitutes a Search。WYO. L.REV.,2,169。  new window
圖書
1.王郁琦(2004)。資訊、電信與法律。元照出版公司。  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE