:::

詳目顯示

回上一頁
題名:大數據應用下個人資料定義的檢討:以我國法院判決為例
書刊名:資訊社會研究
作者:葉志良 引用關係
作者(外文):Yeh, Chih-liang
出版日期:2016
卷期:31
頁次:頁1-36
主題關鍵詞:巨量資料大數據個人資料保護法個人資料匿名資料去識別化重新識別號碼可攜服務Big dataPersonal data protection lawPersonal dataAnonymous dataDe-identificationRe-identificationNumber portability
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(3) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:3
  • 共同引用共同引用:25
  • 點閱點閱:128
期刊論文
1.范姜真媺(20131200)。個人資料保護法關於「個人資料」保護範圍之檢討。東海大學法學研究,41,91-123。new window  延伸查詢new window
2.邱忠義(20141200)。談個人資料保護法之間接識別。月旦裁判時報,30,95-103。  延伸查詢new window
3.徐仕瑋(20141200)。個資法所保護個人資料之範圍界定--評臺灣臺北地方法院一○三年度北小字第一三六○號小額民事判決。月旦裁判時報,30,123-138。  延伸查詢new window
4.Ybarra, Laura(2011)。The E.U. Model as an Adoptable Approach for U.S. Privacy Laws: A Comparative Analysis of Data Collection Laws in the United Kingdom, Germany and the United States。Loyola of Los Angeles International & Comparative Law Review,34,267-294。  new window
5.Wang(2012)。Understanding Road Usage Patterns in Urban Areas。Nature Scientific Reports,2,1-6。  new window
6.Tsesis, Alexander(2014)。The Right to Erasure: Privacy, Data Brokers, and the Indefinite Retention of Data。Wake Forest Law Review,49(2),433-484。  new window
7.Willis, Lauren E.(2014)。Why Not Privacy by Default?。Berkeley Technology Law Journal,29(1),61-133。  new window
8.Tene, Omer(2011)。The Complexities of Defining Personal Data: Anonymization。Data Protection Law & Policy,8(8),6-7。  new window
9.Tene, Omer、Polonetsky, Jules(2013)。Big Data for All: Privacy and User Control in the Age of Analytics。Northwestern Journal of Technology and Intellectual Property,11(5),239-274。  new window
10.Tene, Omer、Polonetsky, Jules(2012)。Privacy in the Age of Big Data: A Time for Big Decisions。Stanford Law Review,64,63-69。  new window
11.Richards, Neil M.、King, Jonathan H.(2014)。Big Data Ethics。Wake Forest Law Review,49,393-432。  new window
12.Schwartz, Paul M.、Solove, Daniel J.(2011)。The PII Problem: Privacy and a New Concept of Personally Identifiable Information。New York University Law Review,86,1814-1894。  new window
13.Schwartz, Paul M.、Solove, Daniel J.(2014)。Reconciling Personal Information in the United States and European。California Law Review,102(4),877-916。  new window
14.Sloan, Robert H.、Warner, Richard(2014)。Beyond Notice and Choice: Privacy, Norms, and Consent。Journal of High Technology Law,14,370-414。  new window
15.Ohm, Paul(2010)。Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization。UCLA Law Review,57(6),1701-1777。  new window
16.Cukier, Kenneth(20100225)。Data, Data Everywhere。The Economist。  new window
17.Chung, Yuen Yi(2014)。Goodbye PII: Contextual Regulations for Online Behavioral Targeting。Journal of High Technology Law,14,413-450。  new window
18.Cohen, Julie E.(2013)。What Privacy For。Harvard Law Review,126,1904-1933。  new window
19.劉定基(20120500)。個人資料的定義、保護原則與個人資料保護法適用的例外--以監視錄影為例。月旦法學教室,115,42-54。  延伸查詢new window
20.Warren, Samuel D.、Brandeis, Louis D.(1890)。The Right to Privacy。Harvard Law Review,4(5),193-220。  new window
研究報告
1.FTC(2012)。Protecting Consumer Privacy in an Era of Rapid Change, Recommendations for Business and Policymaker。  new window
2.FTC(2015)。Internet of Things: Privacy & Security in a Connected World。  new window
3.FTC(2009)。Self-Regulatory Principle for Online Behavioral Advertisement。  new window
學位論文
1.林錦鴻(2007)。警察運用監視器之法律問題分析--以警察職權行使法為中心(碩士論文)。國立臺灣大學。  延伸查詢new window
圖書
1.Salmon, Paul M.、Stanton, Neville A.、Jenkins, Daniel P.(2009)。Distributed Situation Awareness: Theory, Measurement and Application to Teamwork。  new window
2.Nissenbaum, Helen(2010)。Privacy in Context: Technology, Policy, and the Integrity of Social Life。Stanford, CA:Stanford University Press。  new window
3.Goodman, Marc(2015)。Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It。  new window
其他
1.林其樺(2015)。一般常見把姓名、身分證字號隱碼的做法,其實並不等於將個人資料「去識別化」,http://www.thenewslens.com/article/33049。  延伸查詢new window
2.經濟部標準檢驗局(2016)。「個人資料去識別化」驗證標準規範研訂及推廣,http://www.slideshare.net/vtaiwan/ss-58562437。  延伸查詢new window
3.黃彥棻(201510)。擴大開放資料廣度的關鍵下一步,個資匿名和去識別化也有國家標準,http://www.ithome.com.tw/news/98997。  延伸查詢new window
4.蘇文彬(201509)。Whoscall分享波多野結衣悠遊卡搶購統計數據,因紀錄用戶撥出電話涉隱私爭議,http://www.ithome.com.tw/news/98533。  延伸查詢new window
5.Brill, Julie(20120312)。Remarks at Fordham University School of Law: Big Data, Big Issues,https://www.ftc.gov/sites/default/files/documents/public_statements/big-databig-issues/120228fordhamlawschool.pdf。  new window
6.Zittrain, Johnathan(20120321)。Meme patrol: "When Something Online is Free, You're Not the Customer, You're the Product",http://blogs.law.harvard.edu/futureoftheinternet/2012/03/21/meme-patrol-when-something-online-is-free-youre-not-thecustomer-youre-the-product/。  new window
7.The White House(201405)。Big Data and Privacy: A Technological Perspective,https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy_-_may_2014.pdf。  new window
8.The White House(2014)。Big Data and Privacy: A Technological Perspective,http://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy_-_may_2014.pdf。  new window
9.The White House(2012)。Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy,http://www.whitehouse.gov/sites/default/files/privacy-final.pdf。  new window
10.Ofcom(20150127)。Promoting Investment and Innovation in the Internet of Things: Summary of responses and next steps,http://stakeholders.ofcom.org.uk/binaries/consultations/iot/statement/IoTStatement.pdf。  new window
11.OECD(19800923)。Guidelines on the Protection of Privacy and Transborder Flows of Personal Data,http://www.oecd.org/document/18/0,3343,en_2649_34255_1815186_1_1_1_1,00.html。  new window
12.McCallister(2010)。Guide to Protecting the Confidentiality of Personally Identifiable Information,http://csrc.nist.gov/publications/nistpubs/800-122/sp800-122.pdf。  new window
13.Konkel, Frank(20130426)。Boston Probe's Big Data Use Hints at the Future,http://fcw.com/articles/2013/04/26/big-data-boston-bomb-probe.aspx。  new window
14.Gellman, Robert(20150211)。Fair Information Practice: A Basic History,http://bobgellman.com/rg-docs/rg-FIPShistory.pdf。  new window
15.European Union Agency for Network and Information Security(2014)。Privacy and Data Protection by Design: from policy to engineering,https://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/privacyand-data-protection-by-design/at_download/fullReport。  new window
16.Council of Europe(19900913)。Recommendation No. R (90)19 of the Committee of Ministers to Member States concerning the protection of personal data used for payment and other related operations。  new window
17.European Commission(20141013)。Frequently asked questions: Public-Private Partnership (PPP) for Big Data(Memo IP/14/1129)。,http://europa.eu/rapid/pressrelease_MEMO-14-583_en.htm。  new window
18.Cavoukian, Ann,Castro, Daniel(2014)。Big Data and Innovation, Setting the Record Straight: De-identification Does Work,http://www2.itif.org/2014-big-data-deidentification.pdf。  new window
19.Cavoukian, Ann,Jonas, Jeff(2012)。Privacy by Design in the Age of Big Data,https://privacybydesign.ca/content/uploads/2012/06/pbd-big_data.pdf。  new window
圖書論文
1.Cate, Fred H.(2006)。The Failure of Fair Information Practice Principles。Consumer Protection in the Age of the Information Economy。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE