:::

詳目顯示

回上一頁
題名:使用層級分析法評估大數據對個人隱私的影響
作者:蘇家榮
作者(外文):Chia Rong Su
校院名稱:長庚大學
系所名稱:企業管理研究所博士班
指導教授:張錦特
學位類別:博士
出版日期:2018
主題關鍵詞:大數據物聯網層級分析法個人資料保護法隱私保護Big dataInternet of ThingsAnalytic Hierarchy ProcessPersonal Information Protection ActPrivacy protection
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:10
Abdullah S. Karaman, E. A. (2018). Taking-off corporate social responsibility programs: An AHP application in airline industry. Journal of Air Transport Management, 68, 187-197. doi:10.1016/j.jairtraman.2017.06.012
Ahmed Oussous, F.-Z. B., Ayoub Ait Lahcen,Samir Belfkih. (2017). Big Data technologies: A survey. Journal of King Saud University - Computer and Information Sciences. doi:10.1016/j.jksuci.2017.06.001
Ahmed, E., Yaqoob, I., Hashem, I. A. T., Khan, I., Ahmed, A. I. A., Imran, M., & Vasilakos, A. V. (2017). The role of big data analytics in Internet of Things. Computer Networks, 129, 459-471. doi:10.1016/j.comnet.2017.06.013
Akaa, O. U., Abu, A., Spearpoint, M., & Giovinazzi, S. (2016). A group-AHP decision analysis for the selection of applied fire protection to steel structures. Fire Safety Journal, 86, 95-105. doi:10.1016/j.firesaf.2016.10.005
Alami Merrouni, A., Elwali Elalaoui, F., Ghennioui, A., Mezrhab, A., & Mezrhab, A. (2018). A GIS-AHP combination for the sites assessment of large-scale CSP plants with dry and wet cooling systems. Case study: Eastern Morocco. Solar Energy, 166, 2-12. doi:10.1016/j.solener.2018.03.038
Alemany, J., del Val, E., Alberola, J., & García-Fornes, A. (2018). Estimation of privacy risk through centrality metrics. Future Generation Computer Systems, 82, 63-76. doi:10.1016/j.future.2017.12.030
Ali Kokangül, U. P., Cansu Dag˘suyu. (2017). A new approximation for risk assessment using the AHP and Fine Kinney methodologies. Safety Science, 91, 24-32. doi:10.1016/j.ssci.2016.07.015
Alireza Heravi, S. M., Kim-Kwang Raymond Choo. (2018). Information privacy in online social networks: Uses and gratification perspective. Computers in Human Behavior, 84, 441-459. doi:10.1016/j.chb.2018.03.016
Aşchilean, I., Badea, G., Giurca, I., Naghiu, G. S., & Iloaie, F. G. (2017). Choosing the Optimal Technology to Rehabilitate the Pipes in Water Distribution Systems Using the AHP Method. Energy Procedia, 112, 19-26. doi:10.1016/j.egypro.2017.03.1109
Awanthika R. Senarath, N. A. G. A. (2018). Understanding user privacy expectations: A software developer’s perspective. Telematics and Informatics. doi:10.1016/j.tele.2018.05.012
Azimifard, A., Moosavirad, S. H., & Ariafar, S. (2018). Selecting sustainable supplier countries for Iran's steel industry at three levels by using AHP and TOPSIS methods. Resources Policy, 57, 30-44. doi:10.1016/j.resourpol.2018.01.002
Azzone, G. (2018). Big data and public policies: Opportunities and challenges. Statistics & Probability Letters, 136, 116-120. doi:10.1016/j.spl.2018.02.022
Broeders, D., Schrijvers, E., van der Sloot, B., van Brakel, R., de Hoog, J., & Hirsch Ballin, E. (2017). Big Data and security policies: Towards a framework for regulating the phases of analytics and use of Big Data. Computer Law & Security Review, 33(3), 309-323. doi:10.1016/j.clsr.2017.03.002
Brynjolfsson, A. M. E. (2012). Big data_the management revolution. Harvard Business Review.
Carlos Ulloa, J. M. N. n., Chengxian Lin,Guillermo Rey. (2018). AHP-based design method of a lightweight, portable and flexible air-based PV-T module for UAV shelter hangars. Renewable Energy, 123, 767-780. doi:10.1016/j.renene.2018.02.099
Danah boyd, K. C. (2012). Critical questions for big data_ Provocations for a cultural, technological, and scholarly phenomenon. Information, Communication & Society, 15(5).
Dimitris Potoglou, N. R., Chong W. Kim,Peter Burge,Richard Warnes. (2010). Quantifying individuals’ trade-offs between privacy, liberty and security: The case of rail travel in UK. Transportation Research Part A: Policy and Practice, 44(3), 169-181. doi:10.1016/j.tra.2009.12.006
Dragan Pamučar, Z. S., Edmundas Kazimieras Zavadskas. (2018). Integration of interval rough AHP and interval rough MABAC methods for evaluating university web pages. Applied Soft Computing, 67, 141-163. doi:10.1016/j.asoc.2018.02.057
Esra Ilbahar, A. K., Selcuk Cebi,Cengiz Kahraman. (2018). A novel approach to risk assessment for occupational health and safety using Pythagorean fuzzy AHP & fuzzy inference system. Safety Science, 103, 124-136. doi:10.1016/j.ssci.2017.10.025
France Bélanger, R. E. C. (2011). Privacy in the Digital Age. ACM Digital Library, 35(4), 1017-1042.
Geoffrey R. Stone. (2017). Sex and the Constitution.
Giovanni Improta, M. A. R., Maria Triassi,Giuseppe Converso,Teresa Murino,Liberatina Carmela Santillo. (2018). Use of the AHP methodology in system dynamics: Modelling and simulation for health technology assessments to determine the correct prosthesis choice for hernia diseases. Math Biosci, 299, 19-27. doi:10.1016/j.mbs.2018.03.004
Hongliang Chen, C. E. B., Traci Hong. (2017). Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors. Computers in Human Behavior, 70, 291-302. doi:10.1016/j.chb.2017.01.003
Hui-Ping Ho. (2009). House Selection in Internet Environment: A Fuzzy Multi-choice Goal Programming Approach. (Ph. D.), National Chung Cheng University.
Javier Lopez, R. R., Feng Bao,Guilin Wang. (2017). Evolving privacy: From sensors to the Internet of Things. Future Generation Computer Systems, 75, 46-57. doi:10.1016/j.future.2017.04.045
Ji Jia, J. Y., Raghavendra Sirigeri Hanumesh,Stephen Xia,Peter Wei,Hyunmi Choi,Xiaofan Jiang. (2018). Intelligent and Privacy-Preserving Medication Adherence System. Smart Health. doi:10.1016/j.smhl.2018.07.012
Kai Dong, T. G., Haibo Ye, Xuansong Li,Zhen Ling. (2018). On the limitations of existing notions of location privacy. Future Generation Computer Systems, 86, 1513-1522. doi:10.1016/j.future.2017.05.045
Karim Abouelmehdi, A. B.-H., Hayat KHALOUFI,Mostafa SAADI. (2017). Big-data-security-and-privacy-in-healthcare--A-R_2017_Procedia-Computer-Scie. Procedia Computer Science, 113, 73-80.
Kshetri, N. (2014). Big data׳s impact on privacy, security and consumer welfare. Telecommunications Policy, 38(11), 1134-1145. doi:10.1016/j.telpol.2014.10.002
Laxman Prasad Ghimire, Y. K. (2018). An analysis on barriers to renewable energy development in the context of Nepal using AHP. Renewable Energy, 129, 446-456. doi:10.1016/j.renene.2018.06.011
Leon Michael Caesarius, J. H. (2018). Searching for big data. Scandinavian Journal of Management, 34(2), 129-140. doi:10.1016/j.scaman.2017.12.002
Luca Di Angelo, P. D. S., Luciano Fratocchi,Antonio Marzola. (2018). An AHP-based method for choosing the best 3D scanner for cultural heritage applications. Journal of Cultural Heritage. doi:10.1016/j.culher.2018.03.026
Mandeep Kaur Saggi, S. J. (2018). A survey towards an integration of big data analytics to big insights for value-creation. Information Processing & Management, 54(5), 758-790. doi:10.1016/j.ipm.2018.01.010
Md Sadek Ferdous, S. C., Joemon M. Jose. (2017). Analysing privacy in visual lifelogging. Pervasive and Mobile Computing, 40, 430-449. doi:10.1016/j.pmcj.2017.03.003
Min-chih Hsieh, E. M.-y. W., Wui-chiang Lee,Lun-wen Li,Chin-yi Hsieh,Weide Tsai,Chih-ping Wang,Ju-li Huang,Te-chu Liu. (2018). Application of HFACS, fuzzy TOPSIS, and AHP for identifying important human error factors in emergency departments in Taiwan. International Journal of Industrial Ergonomics, 67, 171-179. doi:10.1016/j.ergon.2018.05.004
Mirjam P. Fransen, E. D., Daniëlle R.M. Timmermans, Ellen Uiters, Marie-Louise Essink-Bot. (2017). Accessibility of standardized information of a national colorectal cancer screening program for low health literate screening invitees: A mixed method study. Patient Educ Couns, 100(2), 327-336. doi:10.1016/j.pec.2016.09.004
Morgan, R. (2017). An investigation of constraints upon fisheries diversification using the Analytic Hierarchy Process (AHP). Marine Policy, 86, 24-30. doi:10.1016/j.marpol.2017.05.037
Mouzhi Ge, H. B., Barbora Buhnova. (2018). Big Data for Internet of Things: A Survey. Future Generation Computer Systems, 87, 601-614. doi:10.1016/j.future.2018.04.053
Nancy K. Lankton, D. H. M., John F. Tripp. (2017). Facebook privacy management strategies: A cluster analysis of user privacy behaviors. Computers in Human Behavior, 76, 149-163. doi:10.1016/j.chb.2017.07.015
Oliver Gottfried, D. D. C., Elena Blair,Xin Weng,Can Wang. (2018). SWOT-AHP-TOWS analysis of private investment behavior in the Chinese biogas sector. Journal of Cleaner Production, 184, 632-647. doi:10.1016/j.jclepro.2018.02.173
Pankaj Gupta, M. K. M., Usha Aggarwal,V. Charles. (2018). An integrated AHP-DEA multi-objective optimization model for sustainable transportation in mining industry. Resources Policy. doi:10.1016/j.resourpol.2018.04.007
Paul Quinn, L. Q. (2018). Big genetic data and its big data protection challenges. Computer Law & Security Review. doi:10.1016/j.clsr.2018.05.028
Pornwasin Sirisawat, T. K. (2018). Fuzzy AHP-TOPSIS approaches to prioritizing solutions for reverse logistics barriers. Computers & Industrial Engineering, 117, 303-318. doi:10.1016/j.cie.2018.01.015
Provost, F., & Fawcett, T. (2013). Data Science and its Relationship to Big Data and Data-Driven Decision Making. Big Data, 1(1), 51-59. doi:10.1089/big.2013.1508
Qingchen Zhang, L. T. Y., Zhikui Chen,Peng Li. (2018). A survey on deep learning for big data. Information Fusion, 42, 146-157. doi:10.1016/j.inffus.2017.10.006
Qingxing Dong, O. (2016). An orders-of-magnitude AHP supply chain risk assessment framework. International Journal of Production Economics, 182, 144-156. doi:10.1016/j.ijpe.2016.08.021
Raman Kumar Goyal, S. K., Arun Kumar Sangaiah. (2018). The utility based non-linear fuzzy AHP optimization model for network selection in heterogeneous wireless networks. Applied Soft Computing, 67, 800-811. doi:10.1016/j.asoc.2017.05.026
Ryan H.L. Ip, L.-M. A., Kah Phooi Seng,J.C. Broster,J.E. Pratley. (2018). Big data and machine learning for crop protection. Computers and Electronics in Agriculture, 151, 376-383. doi:10.1016/j.compag.2018.06.008
Saaty Thomas L.(1990),Decision Making For Leaders-the analytic hierarchy process for decisions in a complex world,Pittsburgh, PA: RWS Publications.
Saaty Thomas L.(1994),Fundamentals of decision making with the analytic hierarchy process,PA: RWS Publications
Samiya Khan, X. L., Kashish A. Shakil,Mansaf Alam. (2017). A survey on scholarly data: From big data perspective. Information Processing & Management, 53(4), 923-944. doi:10.1016/j.ipm.2017.03.006
Samuel D. Warren, L. D. B. (1890). The Right to Privacy. JSTOR, 4, 193-220.
Sancheng Peng, S. Y., Peter Mueller. (2018). Social networking big data: Opportunities, solutions, and challenges. Future Generation Computer Systems, 86, 1456-1458. doi:10.1016/j.future.2018.05.040
Santanen, E. (2018). The value of protecting privacy. Business Horizons. doi:10.1016/j.bushor.2018.04.004
Schneier, Bruce. (2013) . Carry On: Sound Advice from Schneier on Security. Wiley.
Seda Ozdemir, G. S. (2018). Multi-criteria decision-making in the Location Selection for a Solar PV Power Plant using AHP. Measurement. doi:10.1016/j.measurement.2018.07.020
Shabnam Shadroo, A. M. R. (2018). Systematic survey of big data and data mining in internet of things. Computer Networks, 139, 19-47. doi:10.1016/j.comnet.2018.04.001
Shaher H. Zyoud, D. F.-H. (2017). A bibliometric-based survey on AHP and TOPSIS techniques. Expert Systems with Applications, 78, 158-181. doi:10.1016/j.eswa.2017.02.016
Slavica Dožić, T. L., Milica Kali . (2018). Fuzzy AHP approach to passenger aircraft type selection. Journal of Air Transport Management, 68, 165-175. doi:10.1016/j.jairtraman.2017.08.003
Stanislav Mamonov, R. B.-F. (2018). The impact of information security threat awareness on privacy-protective behaviors. Computers in Human Behavior, 83, 32-44. doi:10.1016/j.chb.2018.01.028
Tiago Hillerman, J. C. F. S., Ana Carla B. Reis,Rommel N. Carvalho. (2017). Applying clustering and AHP methods for evaluating suspect healthcare claims. Journal of Computational Science, 19, 97-111. doi:10.1016/j.jocs.2017.02.007
Trevor Braun, B. C. M. F., Farkhund Iqbal,Babar Shah. (2018). Security and privacy challenges in smart cities. Sustainable Cities and Society, 39, 499-507. doi:10.1016/j.scs.2018.02.039
Verena M. Wottrich, E. A. v. R., Edith G. Smit. (2018). The privacy trade-off for mobile app downloads: The roles of app value, intrusiveness, and privacy concerns. Decision Support Systems, 106, 44-52. doi:10.1016/j.dss.2017.12.003
Wei Fan, A. B. (2015). Mining_Big_Data_Current_Status_and_Forec. Archana.M.et. al. International Journal of Technology and Engineering Science [IJTES]T, 3(9), 5004-5008.
Wenhua Li, S. Y., Huining Pei,Chuan Zhao,Baozhen Tian. (2017). A hybrid approach based on fuzzy AHP and 2-tuple fuzzy linguistic method for evaluation in-flight service quality. Journal of Air Transport Management, 60, 49-64. doi:10.1016/j.jairtraman.2017.01.006
Xinghui Zhang, J. Y., Xudong Zhao. (2018). Optimal study of the rural house space heating systems employing the AHP and FCE methods. Energy, 150, 631-641. doi:10.1016/j.energy.2018.03.007
Yong Jin Park, J. E. C. (2017). Health privacy as sociotechnical capital. Computers in Human Behavior, 76, 227-236. doi:10.1016/j.chb.2017.07.025
Yunfei Meng, Z. H., Yu Zhou,Changbo Ke. (2018). Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities. Future Generation Computer Systems, 86, 1-11. doi:10.1016/j.future.2018.03.013
大數據隱私問題與挑戰. (2016).
王宇航, 張., 余翔湛. (2015). 移動互聯網中的位置隱私保護研究. doi:10.11959/j.issn.1000-436x.2015167
王郁琦. (2006). 生物辨識技術之運用對隱私權的影響. 科技法學評論, 3(2), 49.
朱光, 張., 朱曉東. (2016). 圖書館用戶隱私風險的模糊評估研究.
李永正. (2017). 如何在大數據時代發揮開放資料的社會價值. 台灣經濟研究月刊.
沈瑞棋、施東河 (1998) 應用灰關聯分析於旅遊風險評估模式之研究 高雄餐旅學報第一期 pp. 93-106
吳其勲. (2013). 個資法的第1年. Retrieved from https://www.ithome.com.tw/node/82899
林雅惠. (2004). 資訊隱私權之重塑.
翁加偉. (2014). 個資法施行後對組織之衝擊與因應. (碩士), 中央大學.
個人資料保護法. (2010).
曾龍. (2016). 大數據與巨量資料分析. 科學發展, 524.
張文貴. (2013). 積極面對大數據時代的變革趨勢. Quality Magazine.Chinese Society for Quality, 49, 11.
陳舜伶, 林林珈宏, 莊庭瑞. (2013). 公開透明報告. Retrieved from
陳邦正. (2008). 從資安看如何防止.
陳南樺. (2007). 基於小波與支持向量機演算法之人臉偵測研究. (碩士), 大葉大學.
黃惠滿, 高家常, 孫凡軻,侯佩儀. (2010). 隱私權及隱私權之概念與法律規範. 長庚護理, 21(3), 314-322.
黃登淵, 莊., 楊晏和,陳南樺,王嘉宏. (2007). 以追蹤眼睛狀態為基礎之駕駛者疲勞偵測系統. 科學與工程技術期刊, 3(3), 35-43.
彭金隆, 陳., 孫群. (2017). 巨量資料應用在台灣個資法架構下的法律風險. doi:10.6226/NTUMR.2017.JUL.F104-009
葉志良. (2017). 巨量資料的趨勢與應用-大數據應用下個人資料的法律保護.
葉志良. (2016). 大數據應用下個人資料定義的檢討:以我國法院判決為例.
程瑤、應凌云. (2014). 移動社交應用的隱私洩漏問題研究. 計自機學報, 37(1).
楊亨利、邱顯貴. (2003) 電子商務網站的隱私權揭露與其決策因素之探討 中山管理評論 第十一卷 第三期 頁 489-532,2003。
楊亨利、邱顯貴 (2001) 台灣地區電子商務隱私權保護之現況探討 中華管理評論 Vol.4, No.1, pp.101~118.
劉嘉薇. (2017). 統獨的聲量研究. 政治科學論叢, 71. doi:10.6166/TJPS.71(113-166)
劉佐國. (2005). 個人資料保護法之立法與修法過程. 法學期刊_律師雜誌, 307, 42-51.
廖建彰,王心怡,林瑞雄,謝長堯,宋鴻樟 (2005). 台灣地區大腸癌篩檢狀況. 台灣衛誌.
蔡佳翰. (2010). 警察對人口身份查訪,辨識,通報. (碩士), 南華大學.
樓一琳, 何之行 (2017). 個人資料保護於雲端運算時代之法律爭議初探暨比較法分析. doi:10.6199/NTULJ.2017.46.02.01
鄧振源、曾國雄 (1989) 層級分析法(AHP)的內涵特性與應用(上) 中國統計學報 27(6):5-22
鄧振源、曾國雄 (1989) 層級分析法(AHP)的內涵特性與應用(下) 中國統計學報 27(7):1-20
鍾乘文. (2012). 虛擬社群信任、隱私風險與使用意圖關係之探討. Retrieved from
警政統計通報. (2016). Retrieved from
亞馬遜AWS免費方案網站(2018),https://aws.amazon.com/tw/free/
Google街景裸女風波 (2010),http://www.is-law.com/post/4/448
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
無相關點閱
 
QR Code
QRCODE