:::

詳目顯示

回上一頁
題名:告知後同意與消費者個人資料之保護
書刊名:臺北大學法學論叢
作者:翁清坤 引用關係
作者(外文):Ueng, Ching-kuen
出版日期:2013
卷期:87
頁次:頁217-322
主題關鍵詞:個人資料個人資料保護法歐盟資料保護指令告知後同意資訊不對稱隱私權政策選擇加入選擇退出框架效應欺罔Personal informationPersonal Information Protection LawEU Data Protection DirectiveInformed consentInformation asymmetriesPrivacy policyOpt-inOpt-outFraming effectDeceptive
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(16) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:12
  • 共同引用共同引用:86
  • 點閱點閱:97
期刊論文
1.翁清坤(20080600)。臺灣與美國金融機構分享客戶個人資料之法律界限。輔仁法學,35,69-162。new window  延伸查詢new window
2.Austin, Lisa M.(2006)。Is Consent the Foundation of Fair Information Practices? Canada's Experience under Pipeda。U. TORONTO L. J.,56,181+186-187。  new window
3.Baker, Catherine(2000)。New Data Protection: Act!。Ent. L. R.,11(8),193。  new window
4.Becher, Shmuel I.(2008)。Asymmetric Information in Consumer Contracts: The Challenge That Is Yet to Be Met。Am. Bus. L. J.,45,723-734。  new window
5.Bechtold, Stefan and Hoffler, Felix(2011)。An Economic Analysis of Trade-Secret Protection in Buyer-Seller Relationships。J. L. ECON. and ORG,27,138-139。  new window
6.Bergelson, Vera(2003)。It’s Personal But Is It Mine? Toward Property Rights in Personal Information。U.C. Davis L. Rev.,37,382+384-385。  new window
7.Blanke, Jordan M.(2005)。“Robust Notice” and “Informed Consent: ’’ The Keys to Successful Spyware Legislation。COLUM. SCI. and TECH. L. Rev.,7,2+45-47。  new window
8.Brito, Jerry and、Perraut, Drew(2010)。Transparency and Performance in Government。N. C. J. L. and Tech. On.,11,161-168。  new window
9.Carr, Indira Mahalingam、Williams, Katherine S.(1994)。Electronic Data Interchange, Data Protection and the European Community: Implications for the Banking and Insurance Sectors。J. F. C.,2(1),49-52。  new window
10.Chissick, Michael(1999)。Data Protection in the Electronic Commerce Era。C.T.L.R.,5(4),109-112。  new window
11.Chlapowski, Francis S.(199101)。The Constitutional Protection of Informational Privacy。Boston University Law Review,71,133-152。  new window
12.Craswell, Richard(1993)。Property Rules and Liability Rules in Uneonscionability and Related Doctrines60,1-49。  new window
13.Cuaresma, Jolina C.(2002)。V. Business Law: 1. Financial Services: The Gramm- Leach-Bliley Act。Berkeley Technology Law Journal,17(1),497-518。  new window
14.Dietrich, Dean R.(2007)。Obtaining Informed Consent。SEP WlS. Law.,80,22。  new window
15.Fischer, Jana L.(2002)。hat Constitutes An Invalid “Blanket Consent" Within The Purview Of Illinois’ Mental Health And Developmental Disabilities Confidentiality Act?。N. III. U. L. Rev.,22,535。  new window
16.Garrie, Daniel B.、Wong, Rebecca(2007)。The Future of Consumer Web Data: A European/US Perspective。INT’L J. L. and INFO. Tech.,15,129+148-151。  new window
17.Gertz, Janet Dean(2002)。The Purloined Personality: Consumer Profiling in Financial Services。SAN DlEGO L. Rev.,39,943+1015-1016。  new window
18.Goldman, David(2006)。Always Feel Like Someone is Watching Me: A Technological Solution for Online Privacy。HASTINGS COMM. and Ent L. J.,28,353+375-376。  new window
19.Hotaling, Andrew(2008)。Protecting Personally Identifiable Information on the Internet: Notice and Consent in the Age of Behavioral Targeting。CommLaw Conspectus,16,529+551-553。  new window
20.Hsieh, Alice(2004)。A Nation’s Genes for a Cure to Cancer: Evolving Ethical, Social and Legal Issues Regarding Population Genetic Databases。COLUM. J. L. and Soc. Probs.,37,359+375-376。  new window
21.Janger, Edward J.(2003)。Enforcing Privacy Rights: Agency Enforcement and Private Rights of Action: Privacy Property, Information Costs, and the Anticommons。Hastings L. J.,54,899-916。  new window
22.Janger, Edward J.(2003)。Muddy Property: Generating and Protecting Information Privacy Norms in Bankruptcy。William and Mary Law Review,44(4),1801-1882。  new window
23.Kang, Jerry、Buchner, Benedikt(2004)。Privacy in Atlantis。Harvard Journal of Law & Technology,18(1),229-268。  new window
24.King, Erika、Fuson, John H.(2002)。An Overview of Canadian Privacy Law For Pharmaceutical and Device Manufacturers Operating in Canada。Food and Drug L. J.,57,205-215。  new window
25.Koops, Bert-Jaap(2010)。Law, Technology, and Shifting Power Relations。BERKELEY Tech. L.J.,25,973-1015。  new window
26.Kostritsky, Juliet P.(1993)。Bargaining with Uncertainty, Moral Hazard, and Sunk Costs: A Default Rule for Precontractual Negotiations。HASTINGS L. J.,44,621-669。  new window
27.Kottkamp, Nathan A.(1999)。Finding Clarity in a Gray Opinion: A Critique of Pennsylvania's Informed Consent Doctrine。U. PlTT. L. Rev.,61,241-278。  new window
28.Kroft, Derek(1997)。Informed Consent: A Comparative Analysis。J. Int,L L. and PRAC.,6,457-459。  new window
29.Mayer-Schonberger, Viktor(2008)。Demystifying Lessig。Wis. L. Rev.,713-723。  new window
30.McClurg, Andrew J.(2003)。A Thousand Words are Worth a Picture: A Privacy Tort Response to Consumer Data Profiling。Northwestern University Law Review,98,63-144。  new window
31.McWilliams, Martin C. Jr.(2005)。Applicants Laid Bare: The Privacy Economics of University Application Files。Hofstra Law Review,34,185-228。  new window
32.Miller, Franklin G.(2008)。Research on Medical Records without Informed Consent。J. L. Med. and Ethics,36,560-561。  new window
33.Mock, William(1999)。On the Centrality of Information Law: A Rational Choice Discussion of Information Law and Transparency。J. MARSHALL J. Computer and Info. L.,17,1069-1072。  new window
34.Murphy, Richard S.(1996)。Property Rights in Personal Information: An Economic Defense of Privacy。Georgetown Law Journal,84,2381-2417。  new window
35.Newman, Daniel E.(2008)。European Union and United States Personal Information Privacy, and Human Rights Philosophy- Is There a Match?。Temple International and Comparative Law Journal,22,307-344。  new window
36.Nolan-Haley, Jacqueline M.(1999)。Informed Consent in Mediation: A Guiding Principle for Truly Educateddecisionmaking。NOTRE Dame L. Rev.,74,775+782-783。  new window
37.Radin, Margaret Jane(2000)。Humans, Computers, and Binding Commitment。IND. L.J.,75,1125-1126。  new window
38.Raento, Mika(2006)。The Data Subject’s Right of Access and to be Informed in Finland: An Experimental Study。International Journal of Law and Information technology,14(3),390-391。  new window
39.Rees, Phillip(2007)。Transferring Personal Data outside the EE A: the Least Worst Solution。C. T. L. R.,13(2),66-69。  new window
40.Reidenberg, Joel R.(1995)。Setting Standards for Fair Information Practice in the U.S Private Sector。Iowa L. Rev.,80,497-515。  new window
41.Richards, Neil M.(2006)。The Information Privacy Law Project。Georgetown Law Journal,94(4),1087-1140。  new window
42.Samuelson, Pamela(2000)。Cyberspace and Privacy: A New Legal Paradigm ? Privacy As Intellectual?。STAN. L. Rev.,52,1125-1126。  new window
43.Schuck, Peter H.(1994)。Informed Consent。Yale L. J.,103,899-901。  new window
44.Schwartz, Paul M.(2000)。Beyond Lessig’s Code for Internet Privacy: Cyberspace Filters, Privacy Control, and Fair Information Practices。Wise. L. Rev.,743-766。  new window
45.Sessler, Joshua B.(1997)。Note and Comment, Computer Cookie Control: Transaction Generated Information and Privacy Regulation on the Internet。J. L. and Pol’y,5,627-651。  new window
46.Shaub, Suzanna(2009)。User Privacy and Information Disclosure: The Need for Clarity in "Opt-In " Questions for Consent to Share Personal Information。Shidler J. L. Com. and Tech.,5。  new window
47.Shorr, Scott(1995)。Personal Information Contracts: How to Protect Privacy without Violating the First Amendment。Cornell Law Review,80(6),1756-1850。  new window
48.Spaeth, Juliana M.、Plotkin, Mark J.、Sheets, Sandra C.(2002)。The Impact of Canada's Personal Information Protection and Electronic Documents Act on Transnational Business。VAND. J. Ent. L. and PRAC.,4,28-35。  new window
49.Spencer, Shaun B.(2002)。Reasonable Expectations and the Erosion of Privacy。San Diego Law Review,39,843-893。  new window
50.Strahilevitz, Lior Jacob(2005)。Consent, Aesthetics, and the Boundaries of Sexual Privacy after Lawrence V. Texas。DePaul L. Rev.,54,671+678-679。  new window
51.Teh, Jeanette(2001)。Note, Privacy Wars in Cyberspace: An Examination of the Legal and Business Tensions in Information Privacy。Yale Symp. ON L. and Tech.,4,1-7。  new window
52.Tindall, Craig D.(2003)。Argus Rules: The Commercialization of Personal Information。Illinois Journal of Law, Technology and Policy,2003(1),181-195。  new window
53.Turkington, Richard C.(1990)。Legacy of the Warren and Brandeis Article: The Emerging Unencumbered Constitutional Right to Informational Privacy。Northern Illinois University Law Review,10(3),479-520。  new window
54.Warner, Richard(2005)。Surveillance and the Self: Privacy, Identity, and Technology。DePaul L. Rev.,54,847+852-853。  new window
55.Angwin, Julia、Raice, Shayndi、Ante, Spencer E.(2011)。Facebook Retreats on Privacy。The Wall Street Journal,11。  new window
56.Horn, Charles M.(2001)。Financial Services Privacy at the Start of the 21st Century: A Conceptual Perspective。N.C. BANKING INST.,5,89-105。  new window
57.Grimm, Douglas Andrew(2007)。Informed Consent for All! No Exceptions。N.M. L. Rev.,37,39-41。  new window
58.Nehf, James P.(2005)。Shopping for Privacy Online: Consumer Decision-making Strategies and the Emerging Market for Information Privacy。Journal of Law, Technology & Policy。  new window
59.Shaffer, Gregory(2000)。Globalization and Social Protection: The Impact of EU and International Rules in the Ratcheting Up of U.S. Privacy Standards。Yale Journal of International Law,25,1-88。  new window
60.Kang, Jerry(1998)。Information Privacy in Cyberspace Transactions。Stanford Law Review,50(4),1193-1294。  new window
61.Schwartz, P. M.(2004)。Property, Privacy, and Personal Data。Harvard Law Review,117(7),2056-2128。  new window
62.楊亨利、邱顯貴(20010200)。臺灣地區電子商務隱私權保護之現況探討。中華管理評論,4(1),101-118。  延伸查詢new window
63.Hirsch, Dennis D.(2011)。The Law and Policy of Online Privacy: Regulation, Self-Regulation, or Co-Regulation?。Seattle University Law Review,34(2),439-480。  new window
64.Schwartz, Paul M.(1999)。Privacy and Democracy in Cyberspace。Vanderbilt Law Review,52(6),1607-1702。  new window
65.Rothchild, John(1999)。Protecting the Digital Consumer: The Limits of Cyberspace Utopianism。Indiana Law Journal,74,893-989。  new window
66.Jange, Edward J.、Schwartz, Paul M.(2002)。Modern Studies in Privacy Law: Notice, Autonomy and Enforcement of Data Privacy Legislation: The Gramm- Leach-Bliley Act, Information Privacy, and the Limits of Default Rules。Minnesota Law Review,86,1219-1232。  new window
67.劉靜怡(20100800)。不算進步的立法:「個人資料保護法」初步評析。月旦法學,183,147-164。new window  延伸查詢new window
68.楊秀儀(20070600)。論病人自主權--我國法上「告知後同意」之請求權基礎探討。國立臺灣大學法學論叢,36(2),229-268。new window  延伸查詢new window
69.王澤鑑(20070800)。人格權保護的課題與展望(3)--人格權的具體化及保護範圍(6):隱私權。臺灣本土法學雜誌,97,27-50。  延伸查詢new window
70.Cate, Fred H.(2010)。Protecting Privacy in Health Research: The Limits of Individual Choice。California Law Review,98(6),1765-1803。  new window
71.Nehf, James P.(2005)。Incomparability and the Passive Virtues of Ad Hoc Privacy Policy。University of Colorado Law Review,76,1-56。  new window
72.Brill, Elizabeth K.(2002)。Privacy and Financial Institutions: Current Development Concerning the Gramm-Leach-Bliley Act of 1999。ANN. REV. BANKING L.,21,167。  new window
73.Schiller, Julia C..(2003)。Information Privacy v. The Commercial Speech Doctrine: Can the Gramm-Leach-Bliley Act Provide Adequate Privacy Protection?。COMMLAW CONSPECTUS,11,349。  new window
74.Bradley McMahon(2004)。After Billions Spent to Comply with HIPAA and GLBA Privacy Provisions, Why IS Identity Theft the Most Prevalent Crime in America?。Vill. L. Rev.,49。  new window
75.David A. Tallman(2003)。Financial Institutions and the Safe Harbor Agreement: Securing Cross- Border Financial Data Flows。Law & Pol’y Int’l Bus,34。  new window
76.Reidenberg, Joel R.(2000)。Resolving Conflicting International Data Privacy Rules In Cyberspace。Stan. L. Rev.,52,1315-1320。  new window
77.Karin Retzer、Morrison Cynthia Rich、Foerster LLP(2007)。GLOBAL SOLUTION FOR CROSS-BORDER DATA TRANSFERS: MAKING THE CASE FOR CORPORATE PRIVACY RULES。Geo. J. Int’l L.,38。  new window
78.Lynn Chuang Kramer(2002)。PRIVATE EYES ARE WATCHING YOU: CONSUMER ONLINE PRIVACY PROTECTION-- LESSONS FROM HOME AND ABROAD。Tex. Int’l L.J.,37。  new window
79.Dagan, Hanoch、Heller, Michael A.(2001)。The liberal commons。Yale Law Journal,110,549-623。  new window
80.Cohen, J. E.(2000)。Examined lives: Informational privacy and the subject as object。Stanford Law Review,52,1273-1396。  new window
81.Zarsky, Tal Z.(2004)。Thinking Outside the Box: Considering Transparency, Anonymity, and Pseudonymity as Overall Solutions to the Problems of Information Privacy in the Internet Society。University of Miami Law Review,58,991-1044。  new window
學位論文
1.林建中(2000)。隱私權的概念之再思考(碩士論文)。台灣大學。  延伸查詢new window
圖書
1.林子儀(1992)。基因資訊與基因隱私權--從保障隱私權的觀點論基因資訊的利用與法的規制。當代公法新論(中)一翁岳生教授七秩誕辰祝壽論文集。元照出版有限公司。  延伸查詢new window
2.孫迺翊(2011)。社會給付請求權、當事人協力義務與隱私權保護。司法院大法官--百年度學術研討會「憲法解釋與隱私權之保障」(下冊)。  延伸查詢new window
3.Elkin-Koren, Niva、Salzberger, Eli M.(2004)。Law, Economics And Cyberspace: The Effects Of Cyberspace On The Economic Analysis Of Law。Cheltenham:Edward Elgar Pub.。  new window
4.Hirshleifer, Jack、Hirshleifer, David(1997)。Price Theory And Applications。Justin Kent Emp, L.。  new window
5.Ippolito, Richard A.(2005)。Economics For Lawyers。  new window
6.Kerr, Ian, Lucock(2009)。Carole and Steeves, Valerie, Lessons From The Identity Trail-Anonymity。Privacy And Identity In A Networked Society。  new window
7.Mccarthy, Thomas(2004)。The Rights Of Publicity And Privacy。  new window
8.Soma, John T.、Rynerson, Stephen D.(2008)。Privacy Law。  new window
9.Turkington, Richard C.,Et Al.(1999)。Privacy Law: Cases And Materials。  new window
10.Weaver, Russell L.,Et Al.(2003)。Torts: Cases, Problems, And Exercises。  new window
11.Westby, Jody R.(2004)。International Guide To Privacy。American Bar Association。  new window
12.Westin, Alan F.(1967)。Privacy and Freedom。London。  new window
13.Federal Trade Commission(1998)。Privacy Online: A Report to Congress。  new window
14.Cate, F. H.(1997)。Privacy in the information age。Washington, D.C.:Brookings Institution Press。  new window
15.Kuner, Christopher(2007)。European Data Protection Law: Corporate Compliance and Regulation。Oxford:Oxford University Press。  new window
16.Solove, Daniel J.(2004)。The Digital Person: Technology and Privacy in the Information Age。New York University Press。  new window
17.Cooter, Robert、Ulen, Thomas(2004)。Law and Economics。Pearson:Addison Wesley Longman。  new window
18.許文義(2001)。個人資料保護法論。台北:三民書局。  延伸查詢new window
19.蘆部信喜、李鴻禧(1995)。憲法。月旦。  延伸查詢new window
20.李惠宗(2009)。憲法要義。元照。  延伸查詢new window
21.Solove, Daniel J.、Rotenberg, Marc(2003)。Information Privacy Law。  new window
其他
1.Federal Trade Commission(201012)。Preliminary FTC Staff Report: Protecting Consumer Privacy in an Era of Rapid Change-A Proposed Framework for Business and Policymakers,http://www.ftc.gov/os/2010/12/101201privacyreport.pdf。  new window
2.(20001006)。服務最佳人力網站十大揭曉。  延伸查詢new window
3.(20100205)。防堵駭客Google 與美國安局合作,http://www.libertytimes.com.tw/2010/new/feb/5/today-intl.htm, 2011/10/10。  new window
4.(20001022)。保護網路隱私空口說白話。  延伸查詢new window
5.(20040109)。反恐西北航空洩露旅客資料。  延伸查詢new window
6.陳曉莉(20111125)。Google 揭露各國政府索取個資數據,http://www.ithome.com.tw/ itadmlartic le.php?c=70495, 2011/11/25。  延伸查詢new window
7.(20050328)。亞馬遜蒐集資料過火遭抨擊。  延伸查詢new window
8.(20110713)。Article 29 Data Protection Working Party, Opinion 15/2011 on the definition of consent,http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2011/wp 187_en.pdf, 2011/10/25。  new window
9.Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data,http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri= CELEX:31995L0 046:EN:HTML, 2011/07/03。  new window
10.FTC Charges Deceptive Privacy Practices in Google’s Rollout of Its Buzz Social Network,http://www.ftc.gov/opa/2011/03/ google.shtm, 2011/11/30。  new window
11.FTC’s settlement Agreement with Facebook,http://www.ftc.gov/ os/caselist/092318 4/111129facebookagree.pdf, 2011/11/30。  new window
12.(20091117)。Joint Press Release of “Federal Regulators Issue Final Model Privacy Notice Form”,http://www.sec.gov/news/press/2009/ 2009-248.htm, 2011/11/29。  new window
13.Raice, Shayndi,Angwin, Julia(20111130)。Facebook "Unfair" on Privacy,http://online.wsj.com/article/SB10001424052970203 441704577068400622644374.html#ixzz1fAwiQlu7, 2011/11/30。  new window
14.chedule 1,Part I 及 Schedule 2 of Data Protection Act 1998,http://www.legislation.gov.uk/ukpga/1998/29, 2011/10/03。  new window
圖書論文
1.尤英夫(199703)。新聞媒體與隱私權。現代國家與憲法--李鴻禧教授六秩華誕祝壽論文集。臺北:元照出版有限公司。  延伸查詢new window
2.李震山(2000)。論資訊自決權。人性尊嚴與人權保障。元照。  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE