| 期刊論文1. | 李榮耕(20100600)。論偵查機關對通信紀錄的調取。政大法學評論,115,115-147。 延伸查詢 | 2. | Strahilevitz, Lior Jacob(2005)。A social networks theory of privacy。University of Chicago Law Review,72(3),919-988。 | 3. | Abril, P. S.(2007)。A (My)Space of one's own: On privacy and online social networks。Northwestern Journal of Technology and Intellectual Property,6(1),73-88。 | 4. | Hashemi, Y.(2009)。Facebook's privacy policy and its third-party partnerships: Lucrativity and liability。Boston University Journal of Science & Technology Law,15,140-161。 | 5. | Lee, E.(2009)。Developing copyright practices for user-generated content。Journal of Internet Law,13,1-21。 | 6. | Rodrigues, R.(2008)。You've been poked: Privacy in the era of Facebook。The SciTech Lawyer,5(1),18-19。 | 7. | Benkler, Y.(2001)。Siren songs and Amish children: Autonomy, information, and law。New York University Law Review,76(1),23-113。 | 8. | Cohen, Julie E.(2005)。The Place of the User in Copyright Law。Fordham Law Review,74,347-347。 | 9. | McClurg, A. J.(1995)。Bringing privacy law out of the closet: A tort theory of liability for intrusions in public places。North Carolina Law Review,73,989-1089。 | 10. | Nissenbaum, Helen(1998)。Protecting privacy in an information age: The problem of privacy in public。Law and Philosophy,17(5/6),559-596。 | 11. | Picker, Randal C.(2008)。Competition and privacy in web 2.0 and the cloud。Northwestern University Law Review,103(1),1-12。 | 12. | Richards, N. M.(2005)。Reconciling data privacy and the first amendment。UCLA Law Review,52(4),1149-1222。 | 13. | Solove, Daniel J.(2006)。A taxonomy of privacy。University of Pennsylvania Law Review,154(3),477-560。 | 14. | Samuelson, Pamela(2009)。Unbundling fair uses。Fordham Law Review,77(5),2537-2622。 | 15. | Kerr, O. S.(2009)。The case for the third-party doctrine。Michigan Law Review,117,561-601。 | 16. | Post, Robert C.(2001)。Three Concepts of Privacy。Georgetown Law Journal,89(6),2087-2098。 | 17. | Whitman, James Q.(2004)。The Two Western Cultures of Privacy: Dignity Versus Liberty。Yale Law Journal,113(6),1151-1221。 | 18. | Ciocchetti, C. A.(2007)。E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors。American Business Law Journal,44,55-126。 | 19. | 劉靜怡(20100800)。不算進步的立法:「個人資料保護法」初步評析。月旦法學,183,147-164。 延伸查詢 | 20. | 邱文聰(20090500)。從資訊自決與資訊隱私的概念區分--評「電腦處理個人資料保護法修正草案」的結構性問題。月旦法學,168,172-189。 延伸查詢 | 21. | Boyd, Danah M.、Ellison, Nicole B.(2007)。Social Network Sites: Definition, History, and Scholarship。Journal of Computer-Mediated Communication,13(1),210-230。 | 22. | Zittrain, Jonathan L.(2006)。The Generative Internet。Harvard Law Review,119(7),1974-2040。 | 23. | Kahan, Dan M.、Slovic, Paul、Braman, Donald、Gastil, John(2006)。Fear of Democracy: A Cultural Evaluation of Sunsteinon Risk。Harvard Law Review,119(4),1071-1076。 | 24. | Benkler, Y.(2002)。Coase's Penguin, or Linux and the Nature of the Firm。Yale Law Journal,112,369-369。 | 25. | Allen, Anita L.(2008)。Dredging up the past lifelogging memory, and surveillance。University of Chicago Law Review,75(1),47-74。 | 26. | Bellia, P. L.、Freiwald, S.(2008)。Fourth amendment protection for stored e-mail。University of Chicago Legal Forum,2008,121-178。 | 27. | Blackman, J.(2009)。Omniveillance, Google, privacy in public, and the right to your digital identity: A tort for recording and disseminating an individual's image over the Internet。Santa Clara Law Review,49,313-392。 | 28. | Carroll, M. W.(2006)。Creative commons and the new intermediaries。Michigan State Law Review,45(1),45-65。 | 29. | Cohen, Julie E.(2007)。Cyberspace as/and space。Columbia Law Review,107(1),210-256。 | 30. | Cote, M.(2007)。Note, getting dooced: Employee blogs and employer blogging policies under the national Labor Relations Act。Washington Law Review,82(1),121-148。 | 31. | Dreyfuss, R. C.(1999)。Warren and Brandeis Redux: Finding (more) privacy protection in intellectual property lore。Stanford Technology Law Review,1999,8。 | 32. | Freiwald, S.(2001)。Comparative institutional analysis in cyberspace: The case of intermediary liability for defamation。Harvard Journal of Law & Technology,14,569-655。 | 33. | Freiwald, S.(2009)。A comment on James Grimmelmann's saving facebook。Iowa Law Review Bulletin,95,5-11。 | 34. | Gajda, Amy(2009)。Judging journalism: The turn toward privacy and judicial regulation of the press。California Law Review,97,1039-1106。 | 35. | Gelman, L.(2009)。Privacy, free speech, and “blurry-edged” social networks。Boston College Law Review,50(5),1315-1344。 | 36. | Goldman, E.(2006)。A coasean analysis of marketing。Wisconsin Law Review,2006,1151-1221。 | 37. | Grimmelmann, J.(2009)。Saving facebook。Iowa Law Review,94,1137-1206。 | 38. | Kesan, J. P.、Shah, R. C.(2006)。Setting software defaults: Perspectives from law, computer science and behavioral economics。Notre Dame Law Review,82,583-634。 | 39. | Kriescher, M.(2009)。Professional benefits of online social networking。The Colorado Lawyer,38(2),61-64。 | 40. | Mcgeveran, W.(2009)。Disclosure, endorsement, and identity in social marketing。University of Illinois Law Review,2009(4),1105-1166。 | 41. | Mulligan, D. K.、Perzanowski, A. K.(2007)。The magnificence of the disaster: Reconstructing the Sony BMG rootkit incident。Berkeley Technology Law Journal,22,1157-1232。 | 42. | Nissenbaum, Helen(2004)。Privacy as contextual integrity。Washington Law Review,79(1),119-158。 | 43. | Richards, N. M.、Solove, D. J.(2007)。Privacy's other path: Recovering the law of confidentiality。Georgetown Law Journal,96(1),123-182。 | 44. | Rubenfeld, J.(2008)。The end of privacy。Stanford Law Review,61(1),101-162。 | 45. | Solove, D. J.(2006)。A tale of two bloggers: Free speech and privacy in the blogosphere。Washington University Law Review,84,1195。 | 46. | Sprague, R.(2007)。Fired for blogging: Are there legal protections for employees who blog?。University of Pennsylvania Journal of Labor and Employment Law,9(2),355-387。 | 47. | Sprague, R.(2008)。Rethinking information privacy in an age of online transparency。Hofstra Labor and Employment Law Journal,25(2),395-417。 | 48. | Tien, L.(2004)。Architectural regulation and the evolution of social norms。Yale Journal of Law & Technology,7,1-22。 | 49. | Zimmer, M.(2008)。Privacy on planet Google: Using the theory of “contextual integrity” to clarify the privacy threats of Google’s quest for the perfect search engine。Journal of Business & Technology Law,3(1),109-126。 | 會議論文1. | Barth, A.、Datta, A.、Mitchell, J. C.、Nissenbaum, H.(2006)。Privacy and contextual integrity: Framework and applications。2006 IEEE Symposium on Security and Privacy。 | 2. | Boyd, D. M.(2004)。Friendster and publicly articulated social networks。ACM conference on human factors in computing systems。New York。 | 圖書1. | Solove, Daniel J.(2007)。The Future of Reputation: Gossip, Rumor, and Privacy on the Internet。Yale University Press。 | 2. | Grossman, W. M.(1998)。Net. wars。New York:New York University Press。 | 3. | Levmore, S.(2010)。The offensive Internet: speech, privacy, and reputation。Cambridge:Harvard University Press。 | 4. | Nissenbaum, H.(2010)。Privacy in context: Technology, policy, and the integrity of social life。Stanford, Calif:Stanford Law Books。 | 5. | Zittrain, J.(2009)。The future of the Internet - And how to stop it。New Haven:Yale University Press。 | 6. | 顏厥安、林鈺雄(2010)。人權跨國性司法實踐:歐洲人權裁判研究。台北:元照。 延伸查詢 | 7. | Komesar, Neil K.(1994)。Imperfect alternatives: Choosing institutions in law, economics, and public policy。Chicago, Illinois:The University of Chicago Press。 | 8. | Solove, Daniel J.(2008)。Understanding Privacy。Harvard University Press。 | 9. | Sunstein, Cass R.(2005)。Laws of fear: Beyond the precautionary principle。Cambridge University Press。 | 10. | Slobogin, Christopher(2007)。Privacy at Risk: The New Government Surveillance and the Fourth Amendment。University of Chicago Press。 | 11. | Lessig, Lawrence(1999)。Code and Other Laws of Cyberspace。Basic Books。 | 12. | Wallace, Patricia M.(1999)。The psychology of the internet。Cambridge University Press。 | 13. | Shirky, Clay(2008)。Here Comes Everybody: The Power of Organizing Without Organizations。Penguin。 | 14. | Turner, Fred(2008)。From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network and the Rise of Digital Utopianism。Chicago:University of Chicago Press。 | 15. | Benkler, Yochai(2006)。The Wealth of Networks: How Social Production Transforms Markets and Freedom。Yale University Press。 | 16. | Putnam, Robert D.(2000)。Bowling Alone: The Collapse and Revival of American Community。Simon & Schuster。 | 17. | Gilmor, Dan(2004)。We the Media: Grassroots Journalism by the People, for the People。O'Reilly Media, Inc.。 | 18. | Brin, D.(1999)。Transparent society: Will technology force us to choose between privacy and freedom?。New York:Basic Books。 | 19. | Jones, S.(2003)。Encyclopedia of new media: An essential reference to communication and technology。Thousand Oaks:Sage Publications。 | 20. | Keen, A.(2008)。The cult of the amateur: How blogs, Myspace, Youtube, and the rest of today’s user-generated media are destroying our economy, our culture, and our values。New York:Doubleday。 | 21. | Mayer-Schönberger, V.(2009)。Delete: The virtue of forgetting in the digital age。Princeton:Princeton University Press。 | 22. | Solove, D. J.(2004)。The digital person。New York:New York University Press。 | 其他1. | EUROPA(20111207)。Viviane reding vice-president of the european commission, EU justice commissioner independent data protection authorities: indispensable watchdogs of the digital age meeting of the article 29 working party Brussels,http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/11/863&format=HTML&aged=0&language=EN&guiLanguage=en。 | 2. | Gonsalves, A.(2006)。8). Facebook founder apologizes in privacy flap: Users given more control,http://www.informationweek.com/news/192700574。 | 3. | Nick O'Neill, N.(20080729)。Facebook starts recommending friends not on site,http://www.allfacebook.com/2008/07/facebook-starts-recommending-friends-not-on-site/。 | 4. | UK Information Commissioner's Office(20110114)。The Information Commissioner's response to a comprehensive approach on personal data protection in the European Union,http://www.ico.gov.uk/SearchResultAsHtml.aspx?cid=WIFIMCxWbrYJ&page=http://www.ico.gov.uk/news/current_topics/~/media/documents/library/Data_Protection/Detailed_specialist_guides/european_commission_dp_strategy_response.ashx&keywords=right to be forg。 | 5. | Gould, E.(20080525)。Exposed,http://www.nytimes.com/2008/05/25/magazine/25internet-t.html。 | 6. | Jones, T.(20080110)。A deadly web of deceit: A teen's online "friend" proved false, snd cyber-vigilantes are avenging her。 | 7. | Williams, A.(20061015)。Planet Google wants you,New York Times。 | 8. | O'Reilly, Tim(20050930)。That Is Web 2.0 Design Patterns and Business Models for the Next Generation of Software,http://www.oreillynet.com/lpt/ a/6228, 2010/08/19。 | 9. | Postman, N.(1990)。Informing ourselves to death, address before the German informatics society。 | 10. | Collins, L.(20080121)。Friend game。 | 11. | Markoff, J.(20070901)。Who found the bright idea?。 | 12. | Stone, B.(20070806)。A mystery solved: 'Fake Steve' is an editor。 | 13. | Stone, B(20100422)。For web's new wave, sharing details is the point。 | 14. | Swartz, J.(20070912)。Soon millions of Facebookers wonrt be incognito。 | |
| |