期刊論文1. | 李榮耕(20080300)。I am Listening to You--釋字第六三一號解釋、令狀原則及修正後通訊保障及監察法。臺灣本土法學雜誌,104,47-60。 延伸查詢 |
2. | 李榮耕(20120900)。電磁紀錄的搜索與扣押。國立臺灣大學法學論叢,41(3),1055-1116。 延伸查詢 |
3. | 李榮耕(20120400)。特定明確原則與機動性通訊監察。政大法學評論,126,105-153。 延伸查詢 |
4. | 謝碩駿(20150300)。警察機關的駭客任務--論線上搜索在警察法領域內實施的法律問題。臺北大學法學論叢,93,1-78。 延伸查詢 |
5. | 李震山(20070900)。挪動通訊保障與通訊監察天平上的法碼--釋字第六三一號解釋評析。臺灣本土法學雜誌,98,283-291。 延伸查詢 |
6. | 張麗卿(20140600)。通訊保障及監察法之修正與評析。月旦法學,229,25-45。 延伸查詢 |
7. | 李榮耕(20150900)。科技定位監控與犯罪偵查:兼論美國近年GPS追蹤法制及實務之發展。國立臺灣大學法學論叢,44(3),871-969。 延伸查詢 |
8. | 黃惠婷(20130400)。附帶搜索--評最高法院九十八年度臺上字第三一○號。刑事法雜誌,57(2),81-107。 延伸查詢 |
9. | 溫祖德(20150400)。行動電話內數位資訊與附帶搜索--以美國聯邦最高法院見解之變遷為主。月旦法學,239,198-220。 延伸查詢 |
10. | 李榮耕(20090400)。個人資料外洩及個資外洩通知條款的立法芻議。東吳法律學報,20(4),251-291。 延伸查詢 |
11. | 蔡榮耕(20080400)。I am Listening to You--釋字第六三一號解釋、令狀原則及修正後通訊保障及監察法。臺灣本土法學雜誌,105,43-56。 延伸查詢 |
12. | 李榮耕(20161200)。數位資料及附帶搜索--以行動電話內的資訊為例。臺北大學法學論叢,100,245-322。 延伸查詢 |
13. | 陳瑞仁(2001)。搜索票應記載及得記載事項。司法週刊,1043。 延伸查詢 |
14. | Soghoian, Christopher(2010)。Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era。J. Telcomm. & High Tech. L.,8,359。 |
15. | Dix, George E.(1982)。Means of Executing Searches and Seizures as Fourth Amendment Issues。Minn. L. Rev.,67,89。 |
16. | Vaudrey, Ginger(20040101)。The Technology of National Security。Law Tech.,1。 |
17. | Goldsmith, Jack L.(2001)。The Internet and the Legitimacy of Remote Cross-Border Searches。U. Chi. Legal F.,2001,103。 |
18. | Kerr, Orin S.(2003)。The Problem of Perspective in Internet Law。Geo. L. J.,91,357。 |
19. | Brenner, Susan W.、Frederiksen, Barbara A.(2002)。Computer Searches and Seizures: Some Unresolved Issues。Mich. Telecomm. & Tech. L. Rev.,8,39。 |
20. | Brenner, Susan W.、Schwerha, Joseph J. IV(2002)。Transnational Evidence Gathering and Local Prosecution of International Cybercrime。The John Marshall journal of computer & information law,20(3),347-395。 |
21. | Brenner, Susan W.(2007)。"At Light Speed": Attribution and Response to Cybercrime/Terrorism/Warfare。J. Crim. L. & Criminology,97,379。 |
22. | Brenner, Susan W.(2012)。Fourth Amendment Future: Remote Computer Searches and the Use of Virtual Force。Miss. L. J.,81,1229。 |
23. | Brenner, Susan W.(2012)。Law, Dissonance, and Remote Computer Searches。N.C. J. L. & Tech.,41,43。 |
24. | Brenner, Susan W.(2002)。The Privacy Privilege: Law Enforcement, Technology, and the Constitution。J. Tech. L. & Pol'y,7,123。 |
25. | Brenner, Susan W.(2004)。Toward a Criminal Law for Cyberspace: Distributed Security。B. U. J. Sci. & Tech. L.,10,1。 |
26. | Clancy, Thomas L.(2002)。The Effect of Technology on Fourth Amendment Analysis and Individual Rights。Miss. L. J.,72,1。 |
27. | MacDonnell, Timothy C.(2010)。Orwellian Ramifications: The Contraband Exception to the Fourth Amendment。U. Mem. L. Rev.,41。 |
28. | Bunyan, Tony(2009)。EU Agrees Rules for Remote Computer Access by Police Forces--But Fails, as Usual, to Mention--the Security and Intelligence Agencies。Statewatch J.,19。 |
29. | Abel, Wiebke、Schafer, Burkhard(20090502)。The German "Federal Trojan"--Challenges Between law and Technology。TEUTAS L. & TECH.。 |
30. | 陳運財(20041000)。違法證據排除法則之回顧與展望。月旦法學,113,27-50。 延伸查詢 |
31. | 何賴傑(20120900)。論德國刑事程序「線上搜索」與涉及電子郵件之強制處分。月旦法學,208,230-244。 延伸查詢 |
32. | 李榮耕(20120600)。通訊監察中之最小侵害原則。臺北大學法學論叢,82,205-244。 延伸查詢 |
其他1. | Cha, Ariana Eunjung(20030519)。A Tempting Offer for Russian Pair,https://www.washingtonpost.com/archive/politics/2003/05/19/atempting-offer-for-russian-pair/2c6a5407-8378-4939-8491-038efab2c5fb/?utm_term=.d4c534186d09。 |
2. | Krebs, Brian(20090702)。PC Invader Costs Ky. County 415,000,http://voices.washingtonpost.com/securityfix/2009/07/an_odyssey_of_fraud_part_ii.html。 |
3. | Council of the European Union(2008)。Draft Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime,http://register.consilium.europa.eu/pdf/en/08/st15/st15569.en08.pdf,(No. 15569/08)。 |
4. | McCullagh, Declan(20120522)。FBI Quietly Forms Secretive Net-surveillance Unit,http://news.cnet.com/8301-1009_3-57439734-83/fbi-quietlyforms-secretive-net-surveillance-unit/。 |
5. | (20081201)。EU to Search out Cyber Criminals,http://news.bbc.co.uk/2/hi/technology/7758127.stm。 |
6. | Graham, Flora(20090105)。Police 'Encouraged' to Hack More,http://news.bbc.co.Uk/2/hi/7812353.stm。 |
7. | Hentoff, Nat(20020502)。The FBI's Magic Lantern,http://www.villagevoice.eom/2002-05-28/news/the-fbi-s-magic-lantern/l/。 |
8. | Kulish, Nicholas(20111014)。Germans Condemn Police Use of Spyware,http://www.nytimes.com/2011/10/15/world/europe/uproar-in-germany-on-police-use-of-surveillance-software.html。 |
9. | Brenner, Susan W.(20091026)。Copying as Search and Seizure,http://cyb3rcrim3.blogspot.com/2009/10/copying-as-search-and-seizure.html。 |
10. | U.S. Depft of Justice, Nat'l Inst, of Justice(2007)。Investigations Involving the Internet and Computer Networks,https://www.ncjrs.gov/pdffiles1/nij/210798.pdf。 |