期刊論文1. | 許恒達(20100100)。通訊隱私與刑法規制--論「通訊保障及監察法」的刑事責任。東吳法律學報,21(3),109-159。 延伸查詢![new window](/gs32/images/newin.png) |
2. | 李榮耕(20100600)。論偵查機關對通信紀錄的調取。政大法學評論,115,115-147。 延伸查詢![new window](/gs32/images/newin.png) |
3. | 李榮耕(20120900)。電磁紀錄的搜索與扣押。國立臺灣大學法學論叢,41(3),1055-1116。 延伸查詢![new window](/gs32/images/newin.png) |
4. | 張麗卿(20140600)。通訊保障及監察法之修正與評析。月旦法學,229,25-45。 延伸查詢![new window](/gs32/images/newin.png) |
5. | 李榮耕(20140400)。簡評二○一四年新修正的通訊保障及監察法--一次不知所為何來的修法。月旦法學,227,148-175。 延伸查詢![new window](/gs32/images/newin.png) |
6. | 朱帥俊(2011)。論電子證據之分類與傳聞法則。司法新聲,99,37-52。 延伸查詢![new window](/gs32/images/newin.png) |
7. | 王兆鵬(20000400)。論汽車之搜索。月旦法學,59,88-107。 延伸查詢![new window](/gs32/images/newin.png) |
8. | 李榮耕(20140900)。刑事審判程序中數位證據的證據能力--以傳聞法則及驗真程序為主。臺北大學法學論叢,91,169-211。 延伸查詢![new window](/gs32/images/newin.png) |
9. | 陳運財(20100800)。附隨於逮捕之身體及攜帶物品之搜索扣押--評日本最高法院平成八年一月二十九日第三小法庭裁定。月旦裁判時報,4,129-136。 延伸查詢![new window](/gs32/images/newin.png) |
10. | 曾財和(20150400)。科技時代下之搜索新觀點--兼論附帶搜索行動電話內之數位證據。法學叢刊,60(2)=238,83-119。 延伸查詢![new window](/gs32/images/newin.png) |
11. | 黃惠婷(20130400)。附帶搜索--評最高法院九十八年度臺上字第三一○號。刑事法雜誌,57(2),81-107。 延伸查詢![new window](/gs32/images/newin.png) |
12. | 溫祖德(20150400)。行動電話內數位資訊與附帶搜索--以美國聯邦最高法院見解之變遷為主。月旦法學,239,198-220。 延伸查詢![new window](/gs32/images/newin.png) |
13. | Gershowitz, Adam M.(2008)。The iPhone Meets the Fourth Amendment。UCLA L. REV.,56,27-58。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
14. | Friedman, Barry(2010)。The Wages of Stealth Overruling (With Particular Attention to Miranda v. Arizona)。GEO. L. J.,99,1-64。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
15. | Clark, Paul A.(2014)。Do Warrantless Breathalyzer Tests Violate the Fourth Amendment?。N. M. L. REV.,44,89-120。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
16. | Bradley, Craig M.(1993)。The Court's "Two Model" Approach to the Fourth Amendment: Carpe Diem。J. CRIM. L. CRIMINOLOGY,84,429-461。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
17. | Amar, Akhil Reed(1994)。Fourth Amendment First Principle。HARV. L. REV.,107,757-757。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
18. | Kerr, Orin S.(2004)。The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution。MICH. L. REV.,102,801-888。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
19. | Kerr, Orin S.(2004)。A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It。GEO. WASH. L. REV.,72,1208-1243。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
20. | Harmon, Rachel(2014)。Harmon on the Fragility of Knowledge in the Riley (Cellphone and 4A) Case。J. L.: PERIODICAL LABORATORY OF LEG. SCHOLARSHIP,4,239-241。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
21. | Hancock, Catherine(1982)。State Court Activism and Search Incident to Arrest。VA. L. REV.,68,1085-1136。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
22. | Gershowitz, Adam M.(2010)。Password Protected? Can a Password Save Your Cell Phone from a Search Incident to Arrest?。IOWA L. REV.,96,1125-1175。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
23. | Kerr, Orin S.(2005)。Digital Evidence and the New Criminal Procedure。Columbia Law Review,105(1),279-318。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
24. | Kerr, Orin S.(2013)。Foreword: Accounting for Technological Change。HARV. J. L. & PUB. POL'Y,36,403-408。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
25. | Kish, Byron(2011)。Cellphones Searches: Works Like a Computer, Protected Like a Pager?。Cath. U. L. Rev.,60,445-474。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
26. | Lamparello, Adam、MacLean, Charles(2014)。Riley v. California: The New Katz Or Chimel?。RICH. J. L. & TECH.,21,1-27。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
27. | Lawton, Margaret M.(2012)。Warrantless Searches and Smartphones: Privacy in the Palm of Your Hand?。U. D. C. L. REV.,16,89-122。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
28. | Robinton, Lily R.(2010)。Courting Chaos: Conflicting Guidance From Courts Highlights the Need for Clearer Rules to Govern the Search and Seizure of Digital Evidence。YALE J. L. & TECH.,12,311-347。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
29. | Rhodes, Charles W.(2011)。"Rocky", What Conservative Constitutional Revolution? Moderating Five Degrees of Judicial Conservatism After Six Years of the Robert Court。RUTGERS L. REV.,64,1-72。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
30. | Picus, Andrew(2014)。Evolving Technology and the Fourth Amendment: The Implications of Riley v. California。CATO SUP. CT. REV.,2014,307-336。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
31. | Orso, Matthew E.(2010)。Cellular Phones, Warrantless Searches, and the New Frontier of Fourth Amendment Jurisprudences。SANTA CLARA L. REV.,50,183-224。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
32. | Mason, Caleb(2012)。New Police Surveillance Technologies and the Good-Faith Exception: Warrantless GPS Tracker Evidence After United States v. Jones。NEV. L. J.,13,60-94。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
33. | Watzel, Ryan(2014)。Riley's Implications for Fourth Amendment Protection in the Cloud。YALE L. J. FORUM,124,73-79。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
34. | Tomkovicz, James J.(2007)。Divining and Designing the Future of the Search incident to Arrest Doctrine: Avoiding Instability。U. ILL. L. REV.,2007,1417-1476。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
35. | Shoebotham, Leslie A.(2014)。The Strife of Riley: The Search-Incident Consequences of Making An Easy Case Simple。LA. L. REV.,75,29-70。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
36. | Scheurer, Derek A.(2014)。Are Courts Phoning It in? Resolving Problematic Reasoning in the Debate Over Warrantless Searches of Cell Phones Incident to Arrest。WASH. J. L. TECH. & ARTS,9,287-330。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
37. | Sacharoff, Laurent(2012)。The Rational Nature of Privacy。LEWIS & CLARK L. REV.,16,1249-1303。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
38. | Wilson, Sarah(2015)。Compelling Passwords From Third Parties: Why the Fourth and Fifth Amendments Do Not Adequately Protect Individuals When Third Parties Are Forced to Hand Over Passwords。BERKELEY TECH. L. J.,30,1-38。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
39. | 李榮耕(20090400)。個人資料外洩及個資外洩通知條款的立法芻議。東吳法律學報,20(4),251-291。 延伸查詢![new window](/gs32/images/newin.png) |
40. | 蔡榮耕(20080400)。I am Listening to You--釋字第六三一號解釋、令狀原則及修正後通訊保障及監察法。臺灣本土法學雜誌,105,43-56。 延伸查詢![new window](/gs32/images/newin.png) |
41. | 法思齊(20110100)。美國法上數位證據之取得與保存。東吳法律學報,22(3),95-147。 延伸查詢![new window](/gs32/images/newin.png) |
42. | 陳運財(20091200)。無令狀之搜索--評最高法院96年臺上5184號判決。法令月刊,60(12),57-70。 延伸查詢![new window](/gs32/images/newin.png) |
43. | 王梅英(20010912)。無令狀搜索(2)--附帶搜索。司法周刊,1048,2。 延伸查詢![new window](/gs32/images/newin.png) |
44. | 劉靜怡(20140900)。只是勉強及格而已--二○一四年通保法修正評析。月旦法學,232,5-17。 延伸查詢![new window](/gs32/images/newin.png) |
45. | 李榮耕(20120600)。通訊監察中之最小侵害原則。臺北大學法學論叢,82,205-244。 延伸查詢![new window](/gs32/images/newin.png) |