| 期刊論文1. | Parker, D.(2002)。Economic Regulation: A Review of Issues。Annals of Public and Cooperative Economics,73(4),493-519。 | 2. | Djankov, S.、La Porta, R.、Lopez-de-Silanes, F.、Shleifer, A.(2002)。The Regulation of Entry。Quarterly Journal of Economics,117(1),1-37。 | 3. | Guasch, J. L.、Hahn, R. W.(1999)。The Costs and Benefits of Regulation: Implications for Developing Countries。World Bank Research Observer,14(1),137-158。 | 4. | 張其祿(20060700)。政府管制政策績效評估--以OECD國家經驗為例。經社法制論叢,38,49-97。 延伸查詢 | 5. | Posner, Richard A.(1974)。Theories of Economic Regulation。Bell Journal of Economics and Management Science,5(2),335-358。 | 6. | Stigler, George J.(1971)。The Theory of Economic Regulation。The Bell Journal of Economics and Management Science,2(1),1-21。 | 7. | Peltzman, Sam(1976)。Toward a More General Theory of Regulation。Journal of Law and Economics,19(2),211-240。 | 研究報告1. | 江惠華(2012)。先進製造夥伴策略訪問團。臺北。 延伸查詢 | 2. | NASICO(2012)。State Identity Credential and Access Management (SICAM) Guidance and Roadmap。NASICO。 | 3. | ICAM(2012)。Personal Identity Verification (PIV) in Enterprise Physical Access Control Systems(E-PACS。Draft。 | 4. | JinSoo Lim(2009)。KISA: Korea National PKI Status and Directions for Market Promotion。 | 5. | Chung, Chanjoo(2007)。Identity Management across the Public and Private Sectors in Korea。OECD。 | 圖書1. | Levy, J. M.(1995)。Essential Microeconomics for Public Policy Analysis。Westport, Connecticut:Praeger。 | 2. | The White House(2011)。Nation Strategy for Trusted Identities in Cyberspace。Washington。 | 3. | OECD(2011)。National Strategies and Policies for Digital Identity Management。 | 4. | Federal CIO Council(2011)。Open Identity Solutions Trust Frameworks。 | 5. | MIC(2007)。i-PIN (Internet Personal Identification Number)。Korea。 | 6. | Youm, Heung-Youl(2007)。i-PIN (Internet Personal Identification Number)。Korea。 | 7. | Levy, B.、Spiller, P.(1996)。Regulations, Institutions and Commitment。Cambridge:Cambridge University Press。 | 8. | 丘昌泰(1995)。台灣環境管制政策。台北:淑馨出版社。 延伸查詢 | 9. | 吳定(2003)。公共政策。台北:國立空中大學。 延伸查詢 | 其他1. | (2013)。NPO,http://www.nist.gov/nstic/npo.html, 20130307。 | 2. | (20130307)。HSPD-12,http://www.idmanagement.gov/documents/H SPD-12.htm, 20130307。 | 3. | (20130307)。ICAM,http://www.idmanagement.gov/pages.cfm/pa ge/IDManagement-support-ICAM-adopted-s chemes, 20130307。 | 4. | 陳慶立(2010)。韓國廣播通訊委員會初探,http://rnd.pts.org.tw/p1/2010/10/KCC.pdf, 20130220。 延伸查詢 | 5. | (2013)。韓國網路實名制興廢始末,http://game.163.com/special/jianzheng_44/#04.html, 2013/04/08。 | 圖書論文1. | McChesney, Fred S.(1989)。Regulation, Taxes, and Political Extortion。Regulation and the Reagan Era。New York:Holmes and Meier。 | |