:::

詳目顯示

回上一頁
題名:SWOT Matrix Enhancement for Online Protection of Personal Information
書刊名:資訊、科技與社會學報
作者:Kao, Da-yu
出版日期:2014
卷期:22
頁次:頁1-15
主題關鍵詞:SWOT analysisSWOT matrixInformation securityPersonal information protection
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:30
Rapid improvements in computing technologies have increased concerns about information privacy. Protecting online information for many organizations may be an impossible task. SWOT is as an acronym for strengths, weaknesses, opportunities, and threats. Reviewing SWOT analyses and its matrix strategies gives a broad overview of the legal and practical issues. The proposed privacy enhancement based on SWOT analysis and its matrix development improves online information privacy. The following strategies are applied to solving personal information processing problems: (1) plan new projects; (2) deploy team leadership; (3) follow suitable procedures; and (4) apply new technologies. Recommendations for privacy and security good practices for information managers are provided. We have applied these strategies to Taiwan government agencies many times, and it has been endured real testifying.
期刊論文
1.Farhangi, A. A.、Far, M. S.、Danaei, A.(2012)。Development SWOT Matrix for Strategic Planning in Media Organizations。International Journal of Business and Commerce,1(5),1-12。  new window
2.Nikolaou, I. E.、Evangelinos, K. I.(2010)。A SWOT Analysis of Environmental Management Practices in Greek Mining and Mineral Industry。Resources Policy,35,226-234。  new window
研究報告
1.Federal Trade Commission(2010)。Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers。  new window
2.Stevens, G.(2011)。Privacy Protections for Personal Information Online。Washington, DC。  new window
圖書
1.Casey, E.(2010)。Handbook of Digital Forensics and Investigation。Burlington:New York:Academic Press:Elsevier Academic Press。  new window
2.Cotter, A. M.(2004)。Law Society of Ireland--Information Technology Law。Cavendish Publishing Limited。  new window
3.National Institute of Justice(2007)。Investigations Involving the Internet and Computer Networks。  new window
4.Jonathan, C.(2010)。Principles of Cybercrime。Cambridge:Cambridge University Press。  new window
5.Jewkes, Y.、Yar, M.(2010)。Handbook of Internet Crime。Willan Publishing。  new window
6.Lenard, T. M.、Rubin, P. H.(2007)。Privacy and the Commercial Use of Personal Information:The Case of Customer Proprietary Network Information。Technology Policy Institute。  new window
7.Marcella, Albert J.、Greenfield, Robert S.(2002)。Cyber Forensics: a field manual for collecting, examining, and preserving evidence of computer crimes。Auerbach Publications。  new window
其他
1.Canada Minister of Justice(2014)。Personal Information Protection and Electronic Documents Act 2000,http://laws-lois.justice.gc.ca/eng/acts/P-8.6/index.html。  new window
2.Baddeley, M.(2014)。A Behavioral Analysis of Online Privacy and Security,http://www.econ.cam.ac.uk/dae/repec/cam/pdf/cwpe1147.pdf。  new window
3.Australia Government (Department of Defense)(2014)。2014 Australian Government Information Security Manual Principles,http://www.asd.gov.au/publications/Information_Security_Manual_2014_Principles.pdf。  new window
4.Ekberg, A. G. S.。Invasion of Privacy: Spam--One Result of Bad Privacy Protection,http://www.essays.se/essay/fe577888cf/。  new window
5.Gross, G.(2009)。FTC Sticks With Online Advertising Selfregulation。  new window
6.TW Ministry of Justice(2014)。Personal Information Protection Act,http://pipa.moj.gov.tw/。  new window
7.USA White House(2014)。National Strategy for Trusted Identities in Cyberspace--Enhancing Online Choice, Efficiency, Security, and Privacy,http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf。  new window
8.AUSTRALIAN LAW REFORM COMMISSION(2008)。For Your Information: Australian Privacy Law and Practice,http://www.alrc.eov.au/publications/report-108, 20111005。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top