:::

詳目顯示

回上一頁
題名:大數據資料發布系統要求事項標準化初論:根基於ISO/IEC 27009與個人資料匿名化、去識別化驗證之議題
書刊名:前瞻科技與管理
作者:蔡昀臻樊國楨
作者(外文):Tsai, Yun-chenFarn, Kwo-jean
出版日期:2016
卷期:6:2
頁次:頁1-61
主題關鍵詞:個人可識別資訊去識別化個人資料管理系統資訊安全管理系統標準化驗證Personally identifiable information de-identificationPII de-identificationpersonally information management systemPIMSInformation security management systemISMSStandardizationCertification
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:4
  • 點閱點閱:27
期刊論文
1.樊國楨、韓宜蓁、黃健誠(20140100)。資訊安全管理系統要求事項初探:根基於ISO/IEC 27001:2013(E)新版之脈胳及其變更。標準與檢驗,181,62-90。  延伸查詢new window
2.樊國楨、黃健誠、林樹國(20150500)。《個人資料保護法施行細則》第17條實作初論:根基於ISO/IEC 29100:2011-12-15標準系列。前瞻科技與管理,5(1),43-83。new window  延伸查詢new window
3.廖益均(2015)。從環境及能源管理談企業社會責任。貨幣觀測與信用評等,116,46-62。  延伸查詢new window
圖書
1.Rannenberg, K.(2015)。Standards Contributing to the Protection of Consumers' Privacy and Personal Data (ISO/COPOLCO)。Geneve:International Organization for Standardization。  new window
2.McCallister, Erika、Grance, Tim、Scarfone, Karen A.(2010)。Guide to protecting the confidentiality of Personally Identifiable Information (PII)。U.S. Dept. of Commerce, National Institute of Standards and Technology。  new window
其他
1.林安妮(20150717)。大數據發展訂國家標準。  延伸查詢new window
2.經濟部(20150714)。個人資料去識別化之運作機制,臺北:經濟部標準檢驗局。  延伸查詢new window
3.經濟部標準檢驗局(2015)。資訊技術--安全技術--部分匿名部分去連結鑑別之要求事項(CNS29191)。,臺北:經濟部標準檢驗局。  延伸查詢new window
4.經濟部標準檢驗局(20160223)。「個人資料去識別化」驗證標準規範研訂及推廣,http://vtaiwan.tw/personal-data-protection/。  延伸查詢new window
5.丁麗萍,盧國慶(2014)。基於關聯規則滿足用戶隱私保護的個性化推薦方法及系統(104050267)。  延伸查詢new window
6.International Organization for Standardization(2008)。2008-07-01 Health Informatics- Information Security Management in Health Using ISO/IEC 27002(ISO 27799)。,Geneva:International Organization for Standardization。  new window
7.International Organization for Standardization(2008)。Information Technology- Security Techniques- Evaluation Criteria for IT Security(ISO/IEC 15408)。,Geneva:International Organization for Standardization。  new window
8.International Organization for Standardization(2008)。2008-12-01 Health Informatics- Pseudonymization(ISO/TS 25237)。,Geneva:International Organization for Standardization。  new window
9.International Organization for Standardization(2010)。2010-09-22 Modelling Cloud Computing Architecture without Compromising Privacy(ISO/IEC JTC 1/SC 27 N9326)。,Geneva:International Organization for Standardization。  new window
10.International Organization for Standardization(2013)。2013-10-15 Information Technology- Security Techniques- Privacy Architecture Framework(ISO/IEC 29101)。,Geneva:International Organization for Standardization。  new window
11.International Organization for Standardization(2013)。2013 Information Technology- Security Techniques- Code of Practice for Information Security Controls ( Technical Corrigendum 1: 2014-09-15, Technical Corrigendum 2: 2015-11-15 )(ISO/IEC 27002)。,Geneva:International Organization for Standardization。  new window
12.International Organization for Standardization(2013)。2013 Information technology- Security Techniques- Information Security Management Systems-Requirements ( Technical Corrigendum 1: 2014-09-15, Technical Corrigndum 2: 2015-12-01 )(ISO/IEC 27001)。,Geneva:International Organization for Standardization。  new window
13.International Organization for Standardization(2013)。2013 Information technology- Security Techniques- Information Security for Supplier Relationships- Part 3: Guidelines for Information and Communication Technology Supply Chain Security(ISO/IEC 27036-3)。,Geneva:International Organization for Standardization。  new window
14.International Organization for Standardization(20150727)。Information Technology-Security Techniques-Sector-Specific Application of ISO/IEC 27001-Requirements(ISO/IEC DIS 27009)。,Geneva:International Organization for Standardization。  new window
15.International Organization for Standardization(2013)。2013-12-15 Information Technology- Security Techniques- Anonymous Digital Signatures- Part 1: General(ISO/IEC 20008-1)。,Geneva:International Organization for Standardization。  new window
16.International Organization for Standardization(20150630)。WG5 Standing Document(SD5)--Guidelines on the Application of ISMS in the Area of Privacy(ISO/IEC JTC 1/SC 27/WG 5 N110)。,Geneva:International Organization for Standardization。  new window
17.International Organization for Standardization(2014)。2014-04-09 WG 5 Standing Document 4 (SD4)--Standard Privacy Assessment (SPA)(ISO/IEC JTC 1/SC 27 N14174)。,Geneva:International Organization for Standardization。  new window
18.International Organization for Standardization(2014)。2014-03-01 Information Technology--Security Techniques- Information Security Management--Organization Economics(ISO/IEC TR 27016)。,Geneva:International Organization for Standardization。  new window
19.International Organization for Standardization(2014)。Information technology--Security techniques--Information security for supplier relationships--Part 1: Overview and concepts(ISO/IEC 27036-1)。,Geneva:International Organization for Standardization。  new window
20.Pfitzmann, A.,Hansen, M.(20100810)。A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management,http://dud.inf.ru-dresden.de/literatur/Anon_Termindogy-vo.34/pdf。  new window
21.International Organization for Standardization(20160530)。Information Technology- Security Technology- Privacy Enhancing Data De- Identification Techniques, Annex B(ISO/IEC 2nd WD 20889)。,Geneva:International Organization for Standardization。  new window
22.(20150806)。PRepairing Industry to Privacy-by-Design by Spporting Its Application in Research (PRIPARE)(ISO/IEC JTC 1/SC 27/WG 5)。,Geneva:International Organization for Standardization。  new window
23.ISO,TMB,JTCG(2013)。N360 JTCG Concept Document to Support Annex SL,Geneva:ISO:TMB:JTCG。(ISO/TMB/JTCG N 360)。  new window
24.Malin, B.(2013)。A De-Identification Strategy Used for Sharing One Data Provider's Oncology Trials Data through the Project Daya Sphere® Repository,http://www.projectdatasphere.org/projectdatasphere/html/resources/PDF/DEIDENTIFICATION。  new window
25.National Institute of Standards and Technology(20121015)。Summary of the Workshop on Information and Technologies Supply Chain Risk Management,Gaithersburg, MD:National Institute of Standards and Technology。  new window
圖書論文
1.International Organization for Standardization(2015)。Proposal for Management System Standards。ISO/IEC Directives, Part 1: Consolidated ISO Supplement-Procedures Specific to ISO。Geneva:International Organization for Standardization。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關書籍
 
無相關著作
 
QR Code
QRCODE