:::

詳目顯示

回上一頁
題名:因應物聯網發展資料保護法制的革新--歐盟法制的發展與啟示
書刊名:中原財經法學
作者:葉志良 引用關係
作者(外文):Yeh, Chih-liang
出版日期:2018
卷期:40
頁次:頁61-127
主題關鍵詞:物聯網大數據個人資料保護法從設計著手保護隱私告知同意被遺忘權隱私風險評估Internet of thingsBig dataPersonal Data Protection LawPrivacy by designNotice and consentRight to be forgottenPrivacy impact assessment
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(5) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:5
  • 共同引用共同引用:16
  • 點閱點閱:3
期刊論文
1.蔡博坤(20131000)。智慧聯網時代巨量資料法制議題研析--以美國隱私權保護為核心。科技法律透析,25(10),46-62。  延伸查詢new window
2.翁逸泓(2014)。大資料時代下通訊傳播之個資保護挑戰:以社群網路分析應考量的基本原則為例。NCC NEWS,8(7),32-38。  延伸查詢new window
3.廖淑君(20111100)。智慧聯網之發展與個人資訊隱私保護課題:以歐盟之因應為例。科技法律透析,23(11),18-42。  延伸查詢new window
4.郭戎晉(20130800)。隱私法制新趨勢--從設計著手保護隱私(Privacy by Design)。科技法律透析,25(8),38-44。  延伸查詢new window
5.鄭雅文(2014)。大數據時代下之書面同意取得。NCC News,8(7),23-28。  延伸查詢new window
6.蔡博坤(20141000)。論智慧科技裝置之法律問題--美國資訊隱私法制變革與發展。科技法律透析,26(10),56-72。  延伸查詢new window
7.Hu, Margaret(2015)。Small Data Surveillance v. Big Data Cybersurveillance。PEPP. L. REV.,42,773-844。  new window
8.李科逸(20131200)。國際因應智慧聯網環境重要法制研析--歐盟新近個人資料修法與我國建議。科技法律透析,25(12),41-62。  延伸查詢new window
9.徐彪豪(20131100)。M2M時代下的資料保護權利之進展--歐盟與日本觀察。科技法律透析,25(11),47-62。  延伸查詢new window
10.徐彪豪(20140800)。從歐洲法院實務看資料保護在智慧聯網時代下發展--以資料保存指令無效案和西班牙Google案為例。科技法律透析,26(8),50-70。  延伸查詢new window
11.徐彪豪(20161000)。物聯網時代的資料保護防線--以歐盟GDPR為中心。科技法律透析,28(10),56-71。  延伸查詢new window
12.許慧瑩、葉志良(20171200)。資料經濟趨勢下美國對於資料仲介業規制之研究。科技法學評論,13(2),95-147。new window  延伸查詢new window
13.詹文男(2014)。物聯網成功的關鍵。零組件雜誌,274,16。  延伸查詢new window
14.麥可.波特、詹姆斯.赫普曼(2015)。波特描繪競爭新版圖。哈佛商業評論,2015(9月號),11-35。  延伸查詢new window
15.陳靜怡(2014)。淺談被遺忘權與大數據。NCC News,8(7),16-22。  延伸查詢new window
16.趙志宏、劉川綱、李忠憲(20150800)。物聯網的便利與危機。科學發展月刊,512,10-13。  延伸查詢new window
17.Chen, Brian(2015)。看清物聯網(IOT)本質的6大面向。零組件雜誌,279,24-27。  延伸查詢new window
18.Bennett, Steven C.(2012)。The "Right to Be Forgotten": Reconciling EU and US Perspectives。BERKELEY J. INT'L L.,30,161-195。  new window
19.Bailey, Melissa W.(2016)。Seduction by Technology: Why Consumers Opt Out of Privacy by Buying into the Internet of Things。TEX. L. REV.,94,1023-1054。  new window
20.Bagley, Andrew W.、Brown, Justin S.(2015)。Limited Consumer Privacy Protections Against the Layers of Big Data。Santa Clara High Technology Law Journal,31(3),483-526。  new window
21.Agelidis, Yasmine(2016)。Protecting the Good, the Bad, and the Ugly: "Exposure" Data Breaches and Suggestions for Coping with Them。BERKELEY TECH. L.J.,31,1057-1078。  new window
22.Diker Vanberg, Aysem、Ünver, Mehmet Bilal(2017)。The Right to Data Portability in the GDPR and EU Competition Law: Odd Couple or Dynamic Duo?。European Journal of Law and Technology,8(1),1-22。  new window
23.De Hert, Paul、Papakonstantinou, Vagelis、Malgieri, Gianclaudio、Beslay, Laurent、Sanchez, Ignacio(2018)。The Right to Data Portability in the GDPR: Towards User-Centric Interoperability of Digital Services。Computer Law & Security Review,34(2),193-203。  new window
24.Corken, Erin(2015)。The Changing Expectation of Privacy: Keeping Up with the Millennial Generation and Looking Toward the Future。N. KY. L. REV.,42,287-313。  new window
25.Brill, Julie(2014)。The Internet of Things: Building Trust and Maximizing Benefits Through Consumer Control。FORDHAM L. REV.,83,205-217。  new window
26.Richards, Neil M.(2013)。The Dangers of Surveillance。HARV. L. REV.,126,1934-1965。  new window
27.Poudel, Swaroop(2016)。Internet of Things: Underlying Technologies, Interoperability, and Threats to Privacy and Security。BERKELEY TECH. L.J.,31,997-1021。  new window
28.Peppet, Scott R.(2014)。Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security, and Consent。Texas Law Review,93,85-179。  new window
29.Ilyadis, Nicholas(2015)。物聯網網路再進化。零組件雜誌,279,74-77。  延伸查詢new window
30.Jones, Meg Leta(2015)。Privacy Without Screens & the Internet of Other People's Things。IDAHO L. REV.,51,639-660。  new window
31.Tene, Omer、Polonetsky, Jules(2013)。Big Data for All: Privacy and User Control in the Age of Analytics。Northwestern Journal of Technology and Intellectual Property,11(5),239-273。  new window
32.Tene, Omer、Polonetsky, Jules(2013)。A Theory of Creepy: Technology, Privacy and Shifting Social Norms。YALE J.L. & TECH.,16,59-102。  new window
33.Siry, Lawrence(2014)。Forget Me, Forget Me Not: Reconciling Two Different Paradigms of the Right to Be Forgotten。KY. L.J.,103,311-344。  new window
34.Shelanski, Howard A.(2013)。Information, Innovation, and Competition Policy for the Internet。U. PA. L. REV.,161,1663-1705。  new window
35.Rubinstein, Ira S.(2011)。Regulating Privacy by Design。BERKELEY TECH. L.J.,26,1409-1456。  new window
36.Willis, Lauren E.(2014)。Why Not Privacy by Default?。BERKELEY TECH. L.J.,29,61-133。  new window
37.Westerlund, Magnus、Enkvist, Joachim(2016)。Platform Privacy: The Missing Piece of Data Protection Legislation。J. INTELL. PROP., INFO. TECH. & ELEC. COMM'CE L.,7,2-17。  new window
38.Urquhart, Lachlan、Sailaja, Neelima、McAuley, Derek(2018)。Realising the Right to Data Portability for the Domestic Internet of Things。PERSONAL & UBIQUITOUS COMPUTING,22,317-332。  new window
39.Tsesis, Alexander(2014)。The Right to Erasure: Privacy, Data Brokers, and the Indefinite Retention of Data。WAKE FOREST L. REV.,49,433-484。  new window
40.Zuiderveen Borgesius, F. J.、Kruikemeier, Sanne、Boerman, Sophie C.、Helberger, Natali(2017)。Tracking Walls, Take-It-Or-Leave-It Choices, the GDPR, and the ePrivacy Regulation。EUROPEAN DATA PROTECTION L. REV.,3,353-368。  new window
41.Warren, Samuel D.、Brandeis, Louis D.(1890)。The Right to Privacy。Harvard Law Review,4(5),193-220。  new window
42.劉定基(20130700)。析論個人資料保護法上「當事人同意」的概念。月旦法學,218,146-167。new window  延伸查詢new window
會議論文
1.許炳華(2015)。大數據時代下隱私權之保護--影響暨對策。2015年第十九屆全國科技法律研討會。國立交通大學科技法律學院。717-747。  延伸查詢new window
2.范為(2014)。論巨量資料時代個人資料之定義與去識別化。2014全國科技法律研討會。國立交通大學科技法律學院。685-716。  延伸查詢new window
圖書
1.Miller, Michael(2015)。The Internet of Things: How Smart TVs, Smart Cars, Smart Homes, and Smart Cities Are Changing the World。Que Publishing。  new window
2.WRIGHT, DAVID、DE HERT, PAUL(2012)。PRIVACY IMPACT ASSESSMENT。Springer。  new window
3.WASSOM, BRIAN D.(2014)。AUGMENTED REALITY LAW, PRIVACY, AND ETHICS: LAW, SOCIETY, AND EMERGING AR TECHNOLOGIES。Waltham, MA:Syngress。  new window
4.Mayer-Schönberger, Viktor、林俊宏(2015)。大數據:隱私篇--數位時代,「刪去」是必要的美德。天下文化。  延伸查詢new window
圖書論文
1.Pentland, Alex(2009)。Reality Mining of Mobile Communications: Toward a New Deal on Data。The Global Information Technology Report 2008-2009。Geneva:World Economic Forum and INSEAD。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
無相關點閱
 
QR Code
QRCODE