期刊論文1. | Solove, Daniel J.(2002)。Conceptualizing Privacy。California Law Review,90(4),1086-1155。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
2. | Sweeney, Latanya(2002)。k-anonymity: A model for protecting privacy。International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems,10(5),557-570。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
3. | 林思惟(2016)。歐盟新規:個人資料保護規則--數位防護的新縱深。金融聯合徵信,29,14-22。 延伸查詢![new window](/gs32/images/newin.png) |
4. | Ferdous, Md Sadek、Chowdhury, Soumyadeb、Jose, Joemon M.(2017)。Analysing privacy in visual lifelogging。Pervasive and Mobile Computing,40,430-449。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
5. | 管家娃、張玥、朱慶華、趙宇翔(2016)。國外社交網站隱私悖論問題研究綜述與國內研究建議。圖書情報工作,22,126-134。 延伸查詢![new window](/gs32/images/newin.png) |
6. | 劉世閔(20120500)。我對研究隱私權的見解與評析。臺灣教育評論月刊,1(7),62-65。 延伸查詢![new window](/gs32/images/newin.png) |
7. | Arya, V.、Sethi, D.、Paul, J.(2019)。Does digital footprint act as a digital asset?: Enhancing brand experience through remarketing。International Journal of Information Management,49,142-156。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
8. | Aswani, R.、Kar, A. K.、Ilavarasan, P. V.、Dwivedi, Y. K.(2018)。Search engine marketing is not all gold: Insights from Twitter and SEOClerks。International Journal of Information Management,38(1),107-116。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
9. | Baek, Y. M.、Kim, E.-M.、Bae, Y.(2014)。My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns。Computers in Human Behavior,31,48-56。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
10. | Bandara, R.、Fernando, M.、Akter, S.(2017)。The privacy paradox in the data-driven marketplace: The role of knowledge deficiency and psychological distance。Procedia Computer Science,121,562-567。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
11. | Barclay, C. A.(2013)。A comparison of proposed legislative data privacy protections in the United States。Computer Law & Security Review,29(4),359-367。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
12. | Barth, Susanne、de Jong, Menno D. T.(2017)。The privacy paradox: Investigating discrepancies between expressed privacy concerns and actual online behavior: A systematic literature review。Telematics and Informatics,34(7),1038-1058。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
13. | Beck, E. N.(2015)。The invisible digital identity: Assemblages in digital networks。Computers and Composition,35,125-140。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
14. | Bélanger, F.、Crossler, R. E.、Hiller, J. S.、Park, J.-M.、Hsiao, M. S.(2013)。POCKET: A tool for protecting children's privacy online。Decision Support Systems,54(2),1161-1173。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
15. | Bolognini, L.、Bistolfi , C.(2017)。Pseudonymization and impacts of big (personal/anonymous) data processing in the transition from the Directive 95/46/EC to the new EU General Data Protection Regulation。Computer Law & Security Review,33(2),171-181。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
16. | Cai, X.、Zhao, X.(2013)。Online advertising on popular children's websites: Structural features and privacy issues。Computers in Human Behavior,29(4),1510-1518。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
17. | Camenisch, J.(2012)。Information privacy?!。Computer Networks,56(18),3834-3848。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
18. | Cerrillo-i-Martínez, A.(2018)。How do we provide the digital footprint with eternal rest? Some criteria for legislation regulating digital wills。Computer Law & Security Review,34(5),1119-1130。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
19. | Choi, H.、Park, J.、Jung, Y.(2018)。The role of privacy fatigue in online privacy behavior。Computers in Human Behavior,81,42-51。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
20. | Dempsey, B.(2014)。Band-aid on a bullet wound: Why the email privacy act is necessary triage in federal technology law。Journal of Art, Technology & Intellectual Property Law,24(2),339-365。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |
21. | Weber, R. H.(2015)。The digital future: A challenge for privacy?。Computer Law & Security Review,31(2),234-242。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) |