:::

詳目顯示

回上一頁
題名:大數據時代下隱私權之保護--可能之影響暨對策
書刊名:興大法學
作者:許炳華
作者(外文):Hsu, Pin-hua
出版日期:2016
卷期:20
頁次:頁129-191
主題關鍵詞:大數據隱私權美國聯邦憲法增修條文第四條正當法律程序被遺忘的權利Big dataRight to privacyThe Fourth AmendmentDue processRight to be forgotten
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(2) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:2
  • 共同引用共同引用:142
  • 點閱點閱:140
期刊論文
1.李榮耕(20100600)。論偵查機關對通信紀錄的調取。政大法學評論,115,115-147。new window  延伸查詢new window
2.Kerr, Orin S.(2004)。A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It。George Washington Law Review,72(6),1208-1243。  new window
3.Terry, Nicolas P.(2012)。Protecting Patient Privacy in the Age of Big Data。UMKC L. Rev.,81,385-415。  new window
4.Richards, Neil M.(2013)。The Dangers of Surveillance。Harvard Law Review,126(7),1934-1965。  new window
5.Berk, L. A.(2014)。After Jones, the Deluge: The Fourth Amendment's Treatment of Information, Big Data and the Cloud。The Journal of High Technology Law,14,1-41。  new window
6.CoIb, Sherry F.(2002)。What is a Search? Two Conceptual Flaws in Fourth Amendment Doctrine and Some Hints of a Remedy。Stanford Law Review,55(1),119-190。  new window
7.Gatewood, Jace C.(2014)。District of Columbia Jones and the mosaic theory in search of a public right of privacy: The equilibrium effect of the mosaic theory。Nebraska Law Review,92(3),504-536。  new window
8.Kerr, O. S.(2009)。The case for the third-party doctrine。Michigan Law Review,117,561-601。  new window
9.McNealy, Jasmine(2012)。The Emerging Conflict Between Newsworthiness and the Right to Be Forgotten。N. Ky. L. Rev.,39,119-135。  new window
10.Ambrose, Meg Leta、Ausloos, Jef。The Right to Be Forgotten Across the Pond。Journal of Information Policy,7,1-15。  new window
11.Graux, Hans、Ausloos, Jef、Valcke, Peggy。The Right to Be Forgotten in the Internet Era, Interdisciplinary Centre for Law and ICT。Interdisciplinary Centre for Law and ICT,17,1-20。  new window
12.Joh, Elizabeth E.(2014)。Policing by Numbers: Big Data and the Fourth Amendment。Washington Law Review,89(1),35-68。  new window
13.翁清坤(20130900)。告知後同意與消費者個人資料之保護。臺北大學法學論叢,87,217-322。new window  延伸查詢new window
14.陳起行(20001200)。資訊隱私權法理探討--以美國法為中心。政大法學評論,64,297-341。new window  延伸查詢new window
15.許炳華(20150700)。被遺忘的權利:比較法之觀察。東吳法律學報,27(1),125-163。new window  延伸查詢new window
16.Tene, Omer、Polonetsky, Jules(2013)。Big Data for All: Privacy and User Control in the Age of Analytics。Northwestern Journal of Technology and Intellectual Property,11(5),239-274。  new window
17.Richards, Neil M.、King, Jonathan H.(2014)。Big Data Ethics。Wake Forest Law Review,49,393-432。  new window
18.Ohm, Paul(2010)。Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization。UCLA Law Review,57(6),1701-1777。  new window
19.Abbott, Ryan(2013)。Big Data and Pharmacovigilance: Using Health Information Exchanges to Revolutionize Drug Safety。Iowa Law Review,99,225-292。  new window
20.Allen, Anita L.(2013)。Privacy Law: Positive Theory and Normative Practice。HARV. L. REV. F.,126,241。  new window
21.Aim, Jessica Gutierrez(2014)。The Privacies Life: Automatic License Plate Recognition Is Unconstitutional under the Mosaic Theory of Fourth Amendment Privacy Law。HAMLINE L. REV.,38,127。  new window
22.Ambrose, Meg Leta(2015)。Lessons from the Avalanche of Numbers: Big Data in Historical Perspective。I/S: J.L. & POL ‘Y FOR INFO. SOC ‘Y,11,201。  new window
23.Ashdown, Gerald G.(1981)。The Fourth Amendment and the "Legitimate Expectation of Privacy"。VAND. L. REV.,34,1289。  new window
24.Bambauer, Jane R.(2015)。The Lost Nuanc of Big Data Policing。TEX. L. REV.,94,1。  new window
25.Bedi, Monu(2014)。Social Networks, Government Surveillance, and the Mosaic Theory。B. U. L. REV.,94,1809。  new window
26.Bellovin, Steven M.、Hutchins, Renée M.、Jebara, Tony、Zimmeck, Sebastian(2013)。When Enough is Enough: Location Tracking, Mosaic Theory, and Machine Learning。New York University Journal of Law & Liberty,8,556。  new window
27.Bimhack, Michael(2013)。Reverse Engineering Informational Privacy Law。YALE J.L. & TECH,15,24。  new window
28.Blass, Megan(2015)。The New Data Marketplace: Protecting Personal Data, Electronic Communications, and Individual Privacy in the Age of Mass Surveillance Through a Return to a Property-Based Approach to the Fourth Amendment。Hastings Const. L. Q.,42。  new window
29.MCate, Fred H.(2008)。Government Data Mining: The Need for a Legal Framework。HARV. C. R.- C. L. REV.,43,435。  new window
30.Citron, Danielle Keats(2008)。Technological Due Process。Washington University Law Review,85(6),1249-1314。  new window
31.Crawford, Kate、Schultz, Jason(2014)。Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms。Boston College Law Review,55(1),93-128。  new window
32.Cunningham, H. Bryan(2013)。Tiny Constables in the Mosaic: Modernizing Oversight of Surveillance in the Age of Big Data。RUTGERS L. REV.,65,983。  new window
33.Ferguson, Andrew G.(2014)。Big Data Distortions: Exploring the Limits of the ABA LEATPR Standards。Okla. L. Rev.,66。  new window
34.Ford, Madelaine Virginia(2011)。Mosaic Theory and the Fourth Amendment: How Jones Can Save Privacy in the Fact of Evolving Technology。AM. U. J. GENDER SOC. POLJY & L.,19,1351。  new window
35.Freiwald, Susan(2014)。How the LEATPR Standards Guide Legislators in Regulating Law Enforcement Access to Cell Site Location Records。OKLA. L. REV.,66,875。  new window
36.Garrett, Brandon L.(2014)。Big Data and Due Process。CORNELL L. REV.,99,207。  new window
37.Gray, David C.、Citron, Danielle Keats(2013)。A Shattered Looking Glass: The Pitfalls and Potential of the Mosaic Theory of Fourth Amendment Privacy。N. C. J. L. & TECH.,14,381-430。  new window
38.Gray, David C.(2014)。Law Enforcement Access to Third Party Records: Critical Perspectives from a Technology--Centered Approach to Quantitative Privacy。OKLA. L. REV.,66,919。  new window
39.Henderson, Stephen E.(2007)。Beyond the (Current) Fourth Amendment: Protecting Third-Party Information, Third Parties, and the Rest of Us Too。PEPP. L. REV.,34,975。  new window
40.Henderson, Stephen E.(2014)。Our Records Panopticon and the American Bar Association Standards for Criminal Justice。OKLA. L. REV.,66,699。  new window
41.Hirsch, Dennis D.(2014)。The Glass House Effect: Big Data, the New Oil, and the Power of Analogy。Maine Law Review,66(2),373-395。  new window
42.Hirsch, Dennis D.(2015)。That's Unfair! Or Is It? Big Data, Discrimination and the FTC's Unfairness Authority。KY. L.J.,103,345。  new window
43.Hoofnagle, Chris Jay(2004)。Big Brother's Little Helpers: How Choice Point and Other Commercial Data Brokers Collect and Package Your Data for Law Enforcement。N. C. J. INT'L L. & COM.,29,595。  new window
44.Jerome, Joseph(2014)。Big Data: Catalyst for a Privacy Conversation。IND. L. REV.,48。  new window
45.Koss, Kelly K.(2015)。Leveraging Predictive Policing Algorithms to Restore Fourth Amendment Protections in High-Crime Areas in a Post- Wardlow World。CHI.-KENT L. REV.,90,301-334。  new window
46.Lawless, Matthew D.(2007)。The Third Party Doctrine Redux: Internet Search Records and the Case for a “Crazy Quilt” of Fourth Amendment Protection。UCLA J.L. & TECH,2007,2。  new window
47.Loewy, Arnold H.(1983)。The Fourth Amendment as a Device for Protecting the Innocent。MICH. L. REV.,81,1229。  new window
48.Marcus, Philip H.(1985)。A Fourth Amendment Gag Order--Upholding Third Party Searches at the Expense of First Amendment Freedom of Association Guarantees。U. PITT. L. REV.,47。  new window
49.Mattioli, Michael(2014)。Disclosing Big Data。MINN. L. REV.,99(2),535-583。  new window
50.McMeley, Christin S.(2014)。Protecting Consumer Privacy and Information in the Age of the Internet of Things。ANTITRUST ABA,29,71。  new window
51.Ness, Devin W.(2013)。Information Overload; Why Omnipresent Technology and the Rise of Big Data Shouldn't Spell the End for Privacy as We Know It。CARDOZO ARTS & ENT L.J.,31,925。  new window
52.Ostrander, Benjamin M.(2011)。The Mosaic Theory and Fourth Amendment Law。NOTRE DAME L. REV.,86,1733。  new window
53.Pasquale, Frank、Ragone, Tara Adams(2014)。Protecting Health Privacy in an Era of Big Data Processing and Cloud Computing。STAN. TECH. L. REV.,17,595。  new window
54.Pasquale, Frank(2013)。Grand Bargains for Big Data: The Emerging Law of Health Information。MD. L. REV.,72,682。  new window
55.Richards, Neil M.、King, Jonathan H.(2013)。Three Paradoxes of Big Data。Stanford Law Review Online,66,41-46。  new window
56.Rothstein, Mark A.(2015)。Ethical Issues in Big Data Health Research, Ethical Issues in Big Data Health Research。J. L. MED. & ETHICS,43。  new window
57.Rubinstein, Ira S.(2014)。Voter Privacy in the Age of Big Data。WIS. L. REV.,5,861。  new window
58.Rushin, Stephen(2011)。The Judicial Response to Mass Police Surveillance。U. ILL. JL TECH. & POL'Y,2011,281。  new window
59.Schlabach, Gabriel R.(2015)。Privacy in the Cloud: The Mosaic Theory and the Stored Communications Act。STAN. L. REV.,67,677。  new window
60.Segovia, Stephanie(2015)。Privacy: An Issue of Priority。Hastings Business Law Journal,11,193-224。  new window
61.Slobogin, Christopher(2008)。Government Data Mining and the Fourth Amendment。U. CHI. L. REV.,75,317。  new window
62.Spencer, Shaun B.(2013)。The Surveillance Society and the Third-Party Privacy Problem。S. C. L. REV.,65,373。  new window
63.Tene, Omer(2013)。Privacy Laws Midlife Crisis: A Critical Assessment of the Second Wave of Global Privacy Laws。OHIO ST. L. J.,74,1217。  new window
64.Terry, Nicolas P.(2014)。Big Data Proxies and Health Privacy Exceptionalism。HEALTH MATRIX,21,65。  new window
65.Thai, Joseph T.(1731)。Is Data Mining Ever a Search under Justice Stevens's Fourth Amendment?。FORDHAML. REV.,74,1731。  new window
66.Tucker, Darren S.、Wellford, Hill B.(2014)。Big Mistakes Regarding Big Data。ANTITRUST SRC.,14(2),6。  new window
67.Turner, Brad(2015)。When Big Data Meets Big Brother: Why Courts Should Apply United States v. Jones to Protect People's Data。North Carolina Journal of Law & Technology,16(2),377-434。  new window
68.范姜真媺(2014)。日本個人編號法對我國之借鏡--以個人資料保護監督機制之建立為主。東吳法律學報,26(2),1-33。new window  延伸查詢new window
69.田炎欣(2014)。警察偵査犯罪侵害個人資料保護法「目的拘束原則」之探討。台灣法學雜誌,257,85-94。  延伸查詢new window
70.江守寰(2016)。以大數據探勘技術分析「視覺化管理」在監視錄影系統之運用—臺中市政府警察局為例。犯罪學期刊,18(2),1-29。new window  延伸查詢new window
71.甘炎民、郭士豪、黃冠豪、李承龍(2015)。大數據資料系統分析運用在偵查實務之研究。警察通識期刊,5,140-159。new window  延伸查詢new window
72.莫小春(2009)。消費者隱私權保護的現狀及途徑探究。特區經濟期刊,9,1-25。  延伸查詢new window
73.Boyd, Danah、Crawford, Kate(2012)。Critical Questions for Big Data: Provocations for a Cultural, Technological, and Scholarly Phenomenon。Information, Communication & Society,15(5),662-679。  new window
74.劉宏恩(20040600)。冰島設立全民醫療及基因資料庫之法律政策評析--論其經驗及爭議對我國之啟示。臺北大學法學論叢,54,41-43+45-99。new window  延伸查詢new window
75.Prosser, William L.(1960)。Privacy。California Law Review,48(3),383-423。  new window
76.Kerr, Orin S.(2012)。The Mosaic Theory of the Fourth Amendment。Michigan Law Review,111(3),311-354。  new window
77.蕭奕弘(20120600)。論個人資料保護法的法制性問題。成大法學,23,141-191。new window  延伸查詢new window
78.Ferguson, Andrew Guthrie(2012)。Predictive Policing and Reasonable Suspicion。Emory Law Journal,62(2),259-325。  new window
79.Ferguson, Andrew Guthrie(2015)。Big Data and Predictive Reasonable Suspicion。University of Pennsylvania Law Review,163(2),327-410。  new window
80.Warren, Samuel D.、Brandeis, Louis D.(1890)。The Right to Privacy。Harvard Law Review,4(5),193-220。  new window
81.李惠宗(20130100)。個人資料保護法上的帝王條款--目的拘束原則。法令月刊,64(1),37-61。new window  延伸查詢new window
82.楊智傑(20141000)。美國醫療資訊保護法規之初探--以HIPAA/HITECH之隱私規則與資安規則為中心。軍法專刊,60(5),79-116。new window  延伸查詢new window
83.Solove, Daniel J.(2002)。Digital Dossiers and the Dissipation of Fourth Amendment Privacy。Southern California Law Review,75,1083。  new window
84.Slobogin, Christopher、Schumacher, Joseph E.(1993)。Reasonable Expectations of Privacy and Autonomy in Fourth Amendment Cases: An Empirical Look at “Understandings Recognized and Permitted oy Society"。Duke Law Journal,42(4),727-775。  new window
圖書
1.Pariser, Eli(2012)。The Filter Bubble: How the New Personalized Web Is Changing What We Read and How We Think。Penguin Books。  new window
2.Mayer-Schönberger, Viktor、Cukier, Kenneth(2013)。Big Data: A Revolution that Will Transform Horn We Live, Work and Think。New York:Houghton Mifflin Harcourt。  new window
3.CHEN, MIN、MAOAND, SHIWEN、ZHANG, YIN、LEUNG, VICTORCM(2014)。BIG DATA: RELATED TECHNOLOGIES, CHALLENGES AND FUTURE PROSPECTS。  new window
4.TRIBE, LAURENCE H.(1978)。AMERICAN CONSTITUTIONAL LAW。  new window
5.Nissenbaum, Helen(2009)。Privacy in Context: Technology, Policy, and the Integrity of Social Life。Stanford University Press。  new window
其他
1.Article 29 Data Protection Working Party(2016)。Statement of the WP29 on the Impact of the Development of Big Data on the Protection of Individuals with Regard to the Processing of Their Personal Data in the EU,http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp221_en.pdf。  new window
2.Big Data,http://www.gartner.com/it-glossary/big-data。  new window
3.Bimhack, Michael(2015)。S-M-L-XL Data: Big Data as a New Informational Privacy Paradigm,http://ssm.com/abstract=2310700。  new window
4.He, Zhile,Huang, Daoli,Lei, Yunting。Legislation of "Right to Be Forgotten" in Big Data Environment,http://www.atlantis-press.comphp/pub.php?publication=icssr-14&frame=http%3A//www.atlantis-press。  new window
5.Helbing, Dirk,Balietti, Stefano。Big Data, Privacy, and Trusted Web: What Needs to Be Done,http://ssrn.com/abstract=2322082。  new window
6.Hoffman, Sharona,Podgurski, Andy。Andy, Big Bad Data: Law, Public Policy, and Biomedical Databases,https://www.chrp.org/pdf/HSRO1182013_Abstract.pdf。  new window
7.Hoffman, Sharona。Citizen Science: The Law and Ethics of Public Access to Medical Big Data,http://ssm.com/abstract=2491054。  new window
8.Hoofnagle, Chris Jay(2015)。Big Brother's Little Helpers: How ChoicePoint and Other Commercial Data Brokers Collect and Package Your Data for Law Enforcement,https://epic.org/privacy/choicepoint/cp-article.pdf。  new window
9.Hull, Gordon。Successful Failure: What Foucault Can Teach Us About Privacy Self-Management in a World of Facebook and Big Data,http://ssra.com/abstract=2533057。  new window
10.Holdren, John P.。Big Data: A Technological Perspective, Executive Office of the President,https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and__privacy_-_may_2014.pdf。  new window
11.Kaplan, Bonnie。How Should Health Data Be Used? Privacy, Secondary Use, and Big Data Sales,http://ssm.com/abstract=2510013。  new window
12.Koops, Bert-Jaap。Forgetting Footprints, Shunning Shadows: A Critical Analysis of the ‘Right to Be Forgotten‘ in Big Data Practice,http://ssm.com/abstract=1986719。  new window
13.Podesta, John。Big Data: Seizing Opportunities, Preserving Values, Executive Office of the President,https://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf。  new window
14.Raymond, Anjanette H.。The Dilemma of Private Justice Systems: Big Data Sources, the Cloud and Predictive Analytics,http://www.alsb.org/wp-content/uploads/2015/01 /NP-2014-The-dilemma-of-private-justicesystems-Raymond.pdf。  new window
15.Richards, Neil M.,King, Jonathan H.。Big Data and the Future for Privacy,http://ssm.com/abstract=2512069。  new window
16.Rubinstein, Ira S.。Big Data: The End of Privacy or a New Beginning?,http://lsr.nellco.org/cgi/viewcontent.cgi?article=1359&context=nyu_pll twp。  new window
17.Sprague, Robert。Privacy Implications of Big Data and Predictive Analytics,http://www.alsb.org/wp-content/uploads/2015/01/NP-2014-Privacyimplications-of-big-data-Sprague.pdf。  new window
18.Walsh, Bryan。Google's Flu Project Shows the Failings of Big Data,http://time.com/23782/google-flu-trends-big-data-problems/。  new window
19.Werro, Franz。The Right to Inform v. The Right to Be Forgotten: A Transatlantic Clash,http://ssrn.com/abstract=1401357。  new window
20.What is Big Data,http://www.villanovau.com/resources/bi/what-is-big-data/#.VVhXa2Aw_m4。  new window
圖書論文
1.李震山(1997)。論資訊自決權。現代國家與憲法--李鴻禧教授六秩華誕祝賀論文集。台北:元照出版社。  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE