:::

詳目顯示

回上一頁
題名:社群網路時代的隱私困境:以Facebook為討論對象
書刊名:國立臺灣大學法學論叢
作者:劉靜怡 引用關係
作者(外文):Liu, Ching-yi
出版日期:2012
卷期:41:1
頁次:頁1-70
主題關鍵詞:社群網站資訊隱私權理論言論自由臉書個人資料保護資訊隱私情境脈絡完整性被遺忘的權利Social network sitesInformation privacy theoriesFreedom of speechFacebookProtection of personal informationInformation privacyContextual integrityRight to be forgotten
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(23) 博士論文(4) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:23
  • 共同引用共同引用:69
  • 點閱點閱:254
〈摘要〉 本文探討社群網路時代所帶來的隱私困境。隨著網路科技所創造的環境日新月異,「線上書寫」的型態也不斷改變,網路使用者在網路上揭露和分享私人故事的現象,幾乎成了社群網路的常態,因此,本文將以Facebook所引發的隱私爭議為例,分析此一隱私困境的面貌,並探索其解決之道。本文首先介紹社群網路的特徵,做為探討社群網路所衍生之隱私爭議的基礎,其次,本文將說明社群網路對使用者帶來的隱私風險為何,並且以Helen Nissenbaum強調情境脈絡完整性的資訊隱私權理論,來說明這些爭議的癥結之處,以探討社群網站隱私爭議的解決方向。
Abstract This article explores the privacy dilemma in the social networking age. It provides an analysis of the law and policy of privacy on social network sites, using Facebook as its principal example. It first explains the features of social network sites and how Facebook users socialize on the site. Secondly, it analyzes how and why Facebook users misunderstand the risks involved, and how their privacy suffers as a result. This article further tries to apply Nissenbaum’s “contextual integrity” theory of privacy to understand the privacy issues arising from Facebook platform and how policymakers can help preserve user privacy on social network sites.
期刊論文
1.李榮耕(20100600)。論偵查機關對通信紀錄的調取。政大法學評論,115,115-147。new window  延伸查詢new window
2.Strahilevitz, Lior Jacob(2005)。A social networks theory of privacy。University of Chicago Law Review,72(3),919-988。  new window
3.Abril, P. S.(2007)。A (My)Space of one's own: On privacy and online social networks。Northwestern Journal of Technology and Intellectual Property,6(1),73-88。  new window
4.Hashemi, Y.(2009)。Facebook's privacy policy and its third-party partnerships: Lucrativity and liability。Boston University Journal of Science & Technology Law,15,140-161。  new window
5.Lee, E.(2009)。Developing copyright practices for user-generated content。Journal of Internet Law,13,1-21。  new window
6.Rodrigues, R.(2008)。You've been poked: Privacy in the era of Facebook。The SciTech Lawyer,5(1),18-19。  new window
7.Benkler, Y.(2001)。Siren songs and Amish children: Autonomy, information, and law。New York University Law Review,76(1),23-113。  new window
8.Cohen, Julie E.(2005)。The Place of the User in Copyright Law。Fordham Law Review,74,347-347。  new window
9.McClurg, A. J.(1995)。Bringing privacy law out of the closet: A tort theory of liability for intrusions in public places。North Carolina Law Review,73,989-1089。  new window
10.Nissenbaum, Helen(1998)。Protecting privacy in an information age: The problem of privacy in public。Law and Philosophy,17(5/6),559-596。  new window
11.Picker, Randal C.(2008)。Competition and privacy in web 2.0 and the cloud。Northwestern University Law Review,103(1),1-12。  new window
12.Richards, N. M.(2005)。Reconciling data privacy and the first amendment。UCLA Law Review,52(4),1149-1222。  new window
13.Solove, Daniel J.(2006)。A taxonomy of privacy。University of Pennsylvania Law Review,154(3),477-560。  new window
14.Samuelson, Pamela(2009)。Unbundling fair uses。Fordham Law Review,77(5),2537-2622。  new window
15.Kerr, O. S.(2009)。The case for the third-party doctrine。Michigan Law Review,117,561-601。  new window
16.Post, Robert C.(2001)。Three Concepts of Privacy。Georgetown Law Journal,89(6),2087-2098。  new window
17.Whitman, James Q.(2004)。The Two Western Cultures of Privacy: Dignity Versus Liberty。Yale Law Journal,113(6),1151-1221。  new window
18.Ciocchetti, C. A.(2007)。E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors。American Business Law Journal,44,55-126。  new window
19.劉靜怡(20100800)。不算進步的立法:「個人資料保護法」初步評析。月旦法學,183,147-164。new window  延伸查詢new window
20.邱文聰(20090500)。從資訊自決與資訊隱私的概念區分--評「電腦處理個人資料保護法修正草案」的結構性問題。月旦法學,168,172-189。new window  延伸查詢new window
21.Boyd, Danah M.、Ellison, Nicole B.(2007)。Social Network Sites: Definition, History, and Scholarship。Journal of Computer-Mediated Communication,13(1),210-230。  new window
22.Zittrain, Jonathan L.(2006)。The Generative Internet。Harvard Law Review,119(7),1974-2040。  new window
23.Kahan, Dan M.、Slovic, Paul、Braman, Donald、Gastil, John(2006)。Fear of Democracy: A Cultural Evaluation of Sunsteinon Risk。Harvard Law Review,119(4),1071-1076。  new window
24.Benkler, Y.(2002)。Coase's Penguin, or Linux and the Nature of the Firm。Yale Law Journal,112,369-369。  new window
25.Allen, Anita L.(2008)。Dredging up the past lifelogging memory, and surveillance。University of Chicago Law Review,75(1),47-74。  new window
26.Bellia, P. L.、Freiwald, S.(2008)。Fourth amendment protection for stored e-mail。University of Chicago Legal Forum,2008,121-178。  new window
27.Blackman, J.(2009)。Omniveillance, Google, privacy in public, and the right to your digital identity: A tort for recording and disseminating an individual's image over the Internet。Santa Clara Law Review,49,313-392。  new window
28.Carroll, M. W.(2006)。Creative commons and the new intermediaries。Michigan State Law Review,45(1),45-65。  new window
29.Cohen, Julie E.(2007)。Cyberspace as/and space。Columbia Law Review,107(1),210-256。  new window
30.Cote, M.(2007)。Note, getting dooced: Employee blogs and employer blogging policies under the national Labor Relations Act。Washington Law Review,82(1),121-148。  new window
31.Dreyfuss, R. C.(1999)。Warren and Brandeis Redux: Finding (more) privacy protection in intellectual property lore。Stanford Technology Law Review,1999,8。  new window
32.Freiwald, S.(2001)。Comparative institutional analysis in cyberspace: The case of intermediary liability for defamation。Harvard Journal of Law & Technology,14,569-655。  new window
33.Freiwald, S.(2009)。A comment on James Grimmelmann's saving facebook。Iowa Law Review Bulletin,95,5-11。  new window
34.Gajda, Amy(2009)。Judging journalism: The turn toward privacy and judicial regulation of the press。California Law Review,97,1039-1106。  new window
35.Gelman, L.(2009)。Privacy, free speech, and “blurry-edged” social networks。Boston College Law Review,50(5),1315-1344。  new window
36.Goldman, E.(2006)。A coasean analysis of marketing。Wisconsin Law Review,2006,1151-1221。  new window
37.Grimmelmann, J.(2009)。Saving facebook。Iowa Law Review,94,1137-1206。  new window
38.Kesan, J. P.、Shah, R. C.(2006)。Setting software defaults: Perspectives from law, computer science and behavioral economics。Notre Dame Law Review,82,583-634。  new window
39.Kriescher, M.(2009)。Professional benefits of online social networking。The Colorado Lawyer,38(2),61-64。  new window
40.Mcgeveran, W.(2009)。Disclosure, endorsement, and identity in social marketing。University of Illinois Law Review,2009(4),1105-1166。  new window
41.Mulligan, D. K.、Perzanowski, A. K.(2007)。The magnificence of the disaster: Reconstructing the Sony BMG rootkit incident。Berkeley Technology Law Journal,22,1157-1232。  new window
42.Nissenbaum, Helen(2004)。Privacy as contextual integrity。Washington Law Review,79(1),119-158。  new window
43.Richards, N. M.、Solove, D. J.(2007)。Privacy's other path: Recovering the law of confidentiality。Georgetown Law Journal,96(1),123-182。  new window
44.Rubenfeld, J.(2008)。The end of privacy。Stanford Law Review,61(1),101-162。  new window
45.Solove, D. J.(2006)。A tale of two bloggers: Free speech and privacy in the blogosphere。Washington University Law Review,84,1195。  new window
46.Sprague, R.(2007)。Fired for blogging: Are there legal protections for employees who blog?。University of Pennsylvania Journal of Labor and Employment Law,9(2),355-387。  new window
47.Sprague, R.(2008)。Rethinking information privacy in an age of online transparency。Hofstra Labor and Employment Law Journal,25(2),395-417。  new window
48.Tien, L.(2004)。Architectural regulation and the evolution of social norms。Yale Journal of Law & Technology,7,1-22。  new window
49.Zimmer, M.(2008)。Privacy on planet Google: Using the theory of “contextual integrity” to clarify the privacy threats of Google’s quest for the perfect search engine。Journal of Business & Technology Law,3(1),109-126。  new window
會議論文
1.Barth, A.、Datta, A.、Mitchell, J. C.、Nissenbaum, H.(2006)。Privacy and contextual integrity: Framework and applications。2006 IEEE Symposium on Security and Privacy。  new window
2.Boyd, D. M.(2004)。Friendster and publicly articulated social networks。ACM conference on human factors in computing systems。New York。  new window
圖書
1.Solove, Daniel J.(2007)。The Future of Reputation: Gossip, Rumor, and Privacy on the Internet。Yale University Press。  new window
2.Grossman, W. M.(1998)。Net. wars。New York:New York University Press。  new window
3.Levmore, S.(2010)。The offensive Internet: speech, privacy, and reputation。Cambridge:Harvard University Press。  new window
4.Nissenbaum, H.(2010)。Privacy in context: Technology, policy, and the integrity of social life。Stanford, Calif:Stanford Law Books。  new window
5.Zittrain, J.(2009)。The future of the Internet - And how to stop it。New Haven:Yale University Press。  new window
6.顏厥安、林鈺雄(2010)。人權跨國性司法實踐:歐洲人權裁判研究。台北:元照。  延伸查詢new window
7.Komesar, Neil K.(1994)。Imperfect alternatives: Choosing institutions in law, economics, and public policy。Chicago, Illinois:The University of Chicago Press。  new window
8.Solove, Daniel J.(2008)。Understanding Privacy。Harvard University Press。  new window
9.Sunstein, Cass R.(2005)。Laws of fear: Beyond the precautionary principle。Cambridge University Press。  new window
10.Slobogin, Christopher(2007)。Privacy at Risk: The New Government Surveillance and the Fourth Amendment。University of Chicago Press。  new window
11.Lessig, Lawrence(1999)。Code and Other Laws of Cyberspace。Basic Books。  new window
12.Wallace, Patricia M.(1999)。The psychology of the internet。Cambridge University Press。  new window
13.Shirky, Clay(2008)。Here Comes Everybody: The Power of Organizing Without Organizations。Penguin。  new window
14.Turner, Fred(2008)。From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network and the Rise of Digital Utopianism。Chicago:University of Chicago Press。  new window
15.Benkler, Yochai(2006)。The Wealth of Networks: How Social Production Transforms Markets and Freedom。Yale University Press。  new window
16.Putnam, Robert D.(2000)。Bowling Alone: The Collapse and Revival of American Community。Simon & Schuster。  new window
17.Gilmor, Dan(2004)。We the Media: Grassroots Journalism by the People, for the People。O'Reilly Media, Inc.。  new window
18.Brin, D.(1999)。Transparent society: Will technology force us to choose between privacy and freedom?。New York:Basic Books。  new window
19.Jones, S.(2003)。Encyclopedia of new media: An essential reference to communication and technology。Thousand Oaks:Sage Publications。  new window
20.Keen, A.(2008)。The cult of the amateur: How blogs, Myspace, Youtube, and the rest of today’s user-generated media are destroying our economy, our culture, and our values。New York:Doubleday。  new window
21.Mayer-Schönberger, V.(2009)。Delete: The virtue of forgetting in the digital age。Princeton:Princeton University Press。  new window
22.Solove, D. J.(2004)。The digital person。New York:New York University Press。  new window
其他
1.EUROPA(20111207)。Viviane reding vice-president of the european commission, EU justice commissioner independent data protection authorities: indispensable watchdogs of the digital age meeting of the article 29 working party Brussels,http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/11/863&format=HTML&aged=0&language=EN&guiLanguage=en。  new window
2.Gonsalves, A.(2006)。8). Facebook founder apologizes in privacy flap: Users given more control,http://www.informationweek.com/news/192700574。  new window
3.Nick O'Neill, N.(20080729)。Facebook starts recommending friends not on site,http://www.allfacebook.com/2008/07/facebook-starts-recommending-friends-not-on-site/。  new window
4.UK Information Commissioner's Office(20110114)。The Information Commissioner's response to a comprehensive approach on personal data protection in the European Union,http://www.ico.gov.uk/SearchResultAsHtml.aspx?cid=WIFIMCxWbrYJ&page=http://www.ico.gov.uk/news/current_topics/~/media/documents/library/Data_Protection/Detailed_specialist_guides/european_commission_dp_strategy_response.ashx&keywords=right to be forg。  new window
5.Gould, E.(20080525)。Exposed,http://www.nytimes.com/2008/05/25/magazine/25internet-t.html。  new window
6.Jones, T.(20080110)。A deadly web of deceit: A teen's online "friend" proved false, snd cyber-vigilantes are avenging her。  new window
7.Williams, A.(20061015)。Planet Google wants you,New York Times。  new window
8.O'Reilly, Tim(20050930)。That Is Web 2.0 Design Patterns and Business Models for the Next Generation of Software,http://www.oreillynet.com/lpt/ a/6228, 2010/08/19。  new window
9.Postman, N.(1990)。Informing ourselves to death, address before the German informatics society。  new window
10.Collins, L.(20080121)。Friend game。  new window
11.Markoff, J.(20070901)。Who found the bright idea?。  new window
12.Stone, B.(20070806)。A mystery solved: 'Fake Steve' is an editor。  new window
13.Stone, B(20100422)。For web's new wave, sharing details is the point。  new window
14.Swartz, J.(20070912)。Soon millions of Facebookers wonrt be incognito。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE