學術產出-Theses
Article View/Open
Publication Export
-
題名 軍人身分證晶片化之決策分析
Decision Analysis of Military eID Development作者 鄭棟元
Cheng, Dung-Yuan貢獻者 蕭乃沂
Hsiao, Naiyi
鄭棟元
Cheng, Dung-Yuan關鍵詞 決策分析
軍人身分證
深度訪談
模糊層級分析法
Decision analysis
Military Identification
in-depth interview
fuzzy AHP日期 2020 上傳時間 6-Apr-2020 14:47:14 (UTC+8) 摘要 隨者科技發展至今,晶片卡在生活中已受廣泛應用;我國全民晶片健保卡於2003 年完成換發作業,政府亦將於2020 年10 月起推動換發晶片國民身分證,積極推展電子化服務。美軍自1999 年起即依國會要求換發晶片軍人身分證,將智慧卡科技融入、整合軍事管理作為,國軍軍人身分證假使能順應晶片化「多卡合一」進步趨勢,勢必能增進內、外部單位鏈結與國防事務發展,契合國防施政作為並強化與國際鏈結交流。本研究彙整深度訪談專家意見,以「整合效益」、「可能風險」與「推動成本」為評估構面,運用模糊層級分析法探討國軍相關決策者、使用者,對現行紙本軍人身分證朝向晶片化發展的決策分析,比較個人、群體決策各項權重數值,結合組織文化差異觀點詮釋,求得「證件晶片化」的最大可能行動方案,確認晶片軍人身分證發展決策。晶片軍人身分證的群體決策研究發現,提供國軍未來多卡整合、風險管控、發展方向與政策擘劃之實務展望。相信未來晶片軍人身分證統合發展後,可有效啟迪思維、強化內部公共管理,並間接提升軍人於社會上的形象地位。值得探討的是,證件晶片化的弊端思慮,並不代表會成為停止進步的組織承諾,除卻證件形式上的轉變,更可深化國軍全體官兵對未來發展的肯定,幫助建立其實務認知與未來願景。本研究建議國軍可結合國家電子化政府政策推動,進行證件晶片化相關規範與配套之政策設計探究;透過完善而嚴謹的政策法制,清楚明定將傳統證件轉換後,如何循序建置、推展,逐步擴大內部應用數位服務範圍,或許更能夠加速政策推行,提升國軍內部驅動公共治理與改善精進政策。
With the development of science and technology nowadays, Integrated Circuit Cards (ICC) become widely used in our lives. Since 2003, National Health Insurance Card had fully reissued operations to chip cards. The government will start to facilitate transferring National Identity Chip Cards in order to promote electronic services actively. The U.S. military had improved paper identity cards to chip eID followed the Congress’ guidance to merge ICC technology and application with military management. If R.O.C. military identity can follow the trend to integrate multiple functions into one card, it will surely enhance the link of units with national defense affairs in all aspects, combine national defense policy, and build up international engagements strengthening with other countries.This research gathers expert opinions from in-depth interviews to adopt and acquire “integrated benefits, possible risks, and transformed costs” as assessed evaluation, using fuzzy AHP to study on two groups as decision makers and pure users in the Ministry of National Defense (MND), then develop decision analysis of transforming to military eID of current paper ID. The comparison will be held with individuals and groups with the same or different types of values, in order to address small, partial difference caused by organization cultures. Then the research acquires all values needed to illustrate the result of most possible course of action, as the possible reference for future potential decision development.The result of group decision making in this study provides possible integration of multiple cards, risk management, developed direction, and future policy planning of the practical prospect. I believe that after military eID integrated development in the future, it will efficiently enlighten thinking, strengthen internal public management, and enhance the status of soldiers in society indirectly. It is worth exploring that disadvantages thinking of eID development will not stop the improving progress of organizational commitment. Eliminating just looking at the changes in the form of ID cards in appearance, it will deepen the acknowledge to the future development and assist establishing practical cognition and vision of the armed forces.The research provides suggestion for the Armed Forces to follow the Electronic Government trend and to draft policies related to military eID development. Onlyconsolidated policy and regulation design assists to facilitate expanding digital service range of inter-organization step-by-step. This could also accelerate theimplementation of policies improving public governance in the Armed Force.參考文獻 中文部分內政部(2019)。數位身分識別證(New eID)簡易問答集。取自https://www.ris.gov.tw /app/portal/789內政部(2007)。全面換發國民身分證大事紀。臺北:內政部。內政部戶政司(2017)。「晶片國民身分證?」開放決策工作坊議題手冊。臺北:內政部。內政部戶政司(2019)。New eID資訊公開專區。取自內政部戶政司官方網站 https://www.ris.gov.tw/app/ portal/789王嘉斌(2011)。晶片IC卡的應用。科學研習月刊,48-8,2-5。朱豔芳、謝復剛(2005)。國防實務研究方法。臺北:前程文化總經銷。江妙瑩(2004)。健保IC卡上路,你憂心隱私全都露嗎?。取自 http://forum.yam.org.tw/bongchhi/old/tv/tv152.htm行政院研究發展考核委員會(2016)。第五階段電子化政府計畫(106年至109年)。取自研考會官方網站https://www.ndc.gov.tw/ cp.aspx?n=67F4A482298C5D8E&s= EEBA8192E3AA2670吳怡瑾、林書偉(2010)。基於專案屬性資訊之知識探勘與再利用平台發展。圖書資訊學刊,8(1),97-136。https://doi.org/10.6182 /jlis.2010.8(1).097李興緯、洪上修、李翔祖(2009)。防僞安全技術運用於識別證件之研究。中華印刷科技年報,138-152。https://doi.org/10.30153/ JCAGST.200903.0011周立平、楊博宏(2011)。晶片卡安全之探討-離線攻擊Mifare Classic。前瞻科技與管理,1(2),97-111。周冠汝、何明諠(2019)。一人一號的身分制度是必要的嗎?討論晶片身分證的隱私資安風險前,得先思考這個根本問題。取自Medium https://medium.com/@tahr1984林子鈞(2018)。為什麼台灣人需要一張晶片身份證?讓我用五分鐘解釋給你聽。取自 https://buzzorange.com/techorange/2018/06/12/ idrntify-resign/林政宏(2011)。智慧卡的科技。科學研習月刊,44-2,4-7。林淑馨(2018)。公共管理概論。高雄:巨流圖書股份有限公司。范麗娟(1994)。深度訪談簡介。戶外遊憩研究,7(2),頁25-35。徐村和(1998)。模糊德菲層級分析法。模糊系統學刊,4(1),59-72。秦大智(2013)。反擊階段打擊旅火力支援方案之研究-以層級分析法為例。黃埔學報,69,74-86。國史館檔案史料文物(1940)。國民兵身分證暫行條例。取自史料文物查詢系統https://ahonline.drnh.gov.tw/index.php?act=Display /image /53537257Yz=00#0eF國防部(2019)。中華民國108年國防報告書。臺北:國防部。國防部(2017)。中華民國106年國防報告書。臺北:國防部。國防部(2016)。國軍人員身分證明管理要點。臺北:國防部。國家發展委員會資訊管理處(2018)。數位治國的愛沙尼亞,數位公民獨步全球。政府機關資訊通報,351,1-3。張紹勳(2012)。模糊多準則評估法及統計。臺北:五南圖書出版股份有限公司。張毓騰、吳杰修 (2016)。應用層級分析法探討空軍志願役人員留任的因素之研究。管理資訊計算,5(2),79-84。doi: 10.6285/MIC.5(2).07莊庭瑞(2017)。全面換發晶片身分證?歷史共業下的台灣戶籍制度。民主視野,20,13-16。許家瑜、張文馨、程平、林鎮西、李彦民(2018)。健保卡前世今生比一比 未來「摸不到」。取自 https://theme.udn.com/theme/story/ 6774/3297813陳敦源、李仲彬、黃東益(2007)。應用資訊通訊科技可以改善“公眾接觸”嗎?台灣個案的分析。東吳政治學報,25(3),51-92。陳蔚菁(2019)。介紹德國eID政策法制-從德國身分證及電子識別法出發。科技法律透析,31-3,31-37。黃東益、蕭乃沂(2014)。電子治理與資訊產業發展。公共治理季刊,2(2),51-57。黃彥鈞(2018)。愛沙尼亞前總統訪台,直言數位化需要的是政治決心。取自 http://technews.tw/2018/07/19/estonia-former-president-toomas-hendrik-ilves-digitalization/萬文隆(2004)。深度訪談在質性研究中的應用。生活科技教育,37(4), 17-23. https://doi.org/10.6232/LTE.2004.37(4).4葉俊榮(2005)。電子化政府資通安全發展策略與展望。研考雙月刊,29(1),20-34。董信煌、陸曉曦(2017)。雲端電子病歷使用意圖之探討。Electronic Commerce Studies,15(2),167-208。廖泓瑋(2010)。大學經營環境衝擊下學院因應策略之研究。華梵大學工業工程與經營資訊學系碩士班碩士論文。褚志鵬(2009)。層級分析法(AHP)理論與實作。取自http://faculty.ndhu.edu.tw/~chpchu/ POMR_Taipei_2009/AHP2009. pdf鄧振源、曾國雄(1989)。層級分析法(AHP)的內涵特性與應用(下)。中國統計學報,27(7),1-20。鄧振源(2005)。計畫評估:方法與應用。基隆:國立臺灣海洋大學運籌規劃與管理研究中心出版。鄭景俗、廖述賢、張自立 (2003)。基於模糊層級分析觀念及距離法模糊數排序評估武器系統。中華管理學報,4(2),1-18。doi:10. 30053/chjm.200307.0001鄭棟元(2019)。美國陸軍網路戰概念發展之探討。陸軍學術雙月刊,55(568),4-23。蕭乃沂、朱斌妤(2018)。資料驅動創新的跨域公共治理。國土及公共治理季刊,6(4),74-85。 英文部分Albrecht, K. (2008). RFID TAG-YOU’RE IT. Scientific American, 299(3), 72-77. https://doi.org/10.1038/scientificamerican0908-72Ardiley, Stephane (2012). History of the Common Access Card (CAC). Security Technology Executive, 22.Ariton-Gelan, C. (2015). CREATING ELECTRONIC IDENTITY - FUNDAMENTAL OBJECTIVE OF E-GOVERNMENT. Romanian Review of Social Sciences, (8), n/a. Retrieved from http://search.proquest.com/docview/1748576210/Buckley, J. J. (1985). Ranking alternatives using fuzzy numbers. Fuzzy sets and systems, 15(1), 21-31.Carr, M. R. (2002). Smart card technology with case studies. In Proceedings. 36th Annual 2002 International Carnahan Conference on Security Technology (pp. 158-159). IEEE.CEF Digital (2019).What are the benefits of eID? Retrieved from https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/Benefits+of+eIDChadwick, D. (1999). Smart cards aren’t always the smart choice. Computer, 32(12), 142-143. https://doi.org/10.1109/2.809256Chih, M. Y., Shih, J. R., Yang, B. Y., Ding, J. T., & Cheng, C. M. (2010). MIFARE Classic: Practical attacks and defenses. In 全國資訊安全會議 (pp. 126-132). 中華民國資訊安全學會.Culnan, M. J., Armstrong, P. K. (1999). Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science, 10(1), 104–115. https://doi. org/10.1287/orsc.10.1.104de Andrade, N., Chen-Wilson, L., Argles, D., Wills, G., Schiano Di Zenise, M., Gaycken, S., … Cova, M. (2014). Electronic Identity (2014 ed.). https://doi.org/10.1007/978-1-4471-6449-4DMDC (2002). DoD Introduces a New ID Card: The Common Access Card. Retrieved from https://www.dmdc.osd.mil/smartcard/owa/Show Page?p=indexDubois, D., & Prade, H. (1978). Operations on fuzzy numbers. International Journal of Systems Science, 9(6), 613-626.Forman, E., Saaty, T., Shvartsman, A., Forman, M., Korpics, M., Zottola, J. (2000). Expert Choice 2000. Inc., Pittsburgh.Gage, T. (1999). Just the FAQS--Smart card. Air Force Journal of Logistics, 23(2), 18–21. Retrieved from http://search.proquest.com /docview/196451526/Gustafsson, M., Hedström, K., Söderström, F., & Wihlborg, E. (2015). Constructing identities – professional use of eID in public organizations. Transforming Government: People, Process and Policy, 9(2), 143–158. https://doi.org/10.1108/TG-11-2013-0049Pardalos, P., Du, D., & Kahraman, C. (2008). Fuzzy Multi-Criteria Decision Making: Theory and Applications with Recent Developments (Vol. 16). https://doi.org/10.1007/978-0-387-76813-7Meadows, D., & Wright, D. (2009). Thinking in systems : a primer / Donella H. Meadows ; edited by Diana Wright. London ;: Earthscan.Murdoch, S. J., Drimer, S., Anderson, R., & Bond, M. (2010, May). Chip and PIN is Broken. In 2010 IEEE Symposium on Security and Privacy (pp. 433-446). IEEE.Norris, P. (2001). Digital divide: Civic engagement, information poverty, and the Internet worldwide. Cambridge university press.Pesonen, L. (2003). Meeting governments’ demands for secure ID documents. (2003). Card Technology Today, 15(4), 8–8. https://doi.org/10.1016/S0965-2590(03)00416-XPlyler, K. I. (2002). Common Access Card: Mission E-Possible, Retrieved from CHIPS, U.S. Navy website. https://www.doncio.navy.mil/chips/ArticleDetails.aspx?ID=3624Poller, A., Waldmann, U., Vowé, S., & Türpe, S. (2012). Electronic identity cards for user authentication—promise and practice. IEEE Security & Privacy, (1), 46-54.Rissanen, T. (2010). Electronic identity in Finland: ID cards vs. bank IDs. Identity in the Information Society, 3(1), 175-194. https://doi.org/10.1007/s12394-010-0049-8Saaty, T. L. (1980). The Analytic Hierarchy Process. New York: McGraw-Hill.U.S. Army (2016). Army Cyber Command leader: protecting systems, networks vital for Army readiness. Retrieved from https://www.army.mil/article/164788/army_cyber_command_leader_protecting_systems_networks_vital_for_army_readinessU.S. DoD (2018). Common Access Card. Retrieved from https://www.cac.mil/common-access-card/Villasenor, J. (2012). A Hacker-Ready Chip. Scientific American, 307(2), 29. https://doi.org/10.1038/scientificamerican0812-29aVOA (2019). US Says Taiwan Defense Spending to Rise with China Threat. Retrieved from https://www.voanews.com/east-asia-pacific/us-says-taiwan-defense-spending-rise-china-threatWang, Y., Xu, L., & Solangi, Y. (2020). Strategic renewable energy resources selection for Pakistan: Based on SWOT-Fuzzy AHP approach. Sustainable Cities and Society, 52. https://doi.org/10.1016/j.scs.2019.101861Zadeh, L. A. (1965). Fuzzy sets. Information and control, 8(3), 338-353. 描述 碩士
國立政治大學
行政管理碩士學程
107921302資料來源 http://thesis.lib.nccu.edu.tw/record/#G0107921302 資料類型 thesis dc.contributor.advisor 蕭乃沂 zh_TW dc.contributor.advisor Hsiao, Naiyi en_US dc.contributor.author (Authors) 鄭棟元 zh_TW dc.contributor.author (Authors) Cheng, Dung-Yuan en_US dc.creator (作者) 鄭棟元 zh_TW dc.creator (作者) Cheng, Dung-Yuan en_US dc.date (日期) 2020 en_US dc.date.accessioned 6-Apr-2020 14:47:14 (UTC+8) - dc.date.available 6-Apr-2020 14:47:14 (UTC+8) - dc.date.issued (上傳時間) 6-Apr-2020 14:47:14 (UTC+8) - dc.identifier (Other Identifiers) G0107921302 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/129227 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 行政管理碩士學程 zh_TW dc.description (描述) 107921302 zh_TW dc.description.abstract (摘要) 隨者科技發展至今,晶片卡在生活中已受廣泛應用;我國全民晶片健保卡於2003 年完成換發作業,政府亦將於2020 年10 月起推動換發晶片國民身分證,積極推展電子化服務。美軍自1999 年起即依國會要求換發晶片軍人身分證,將智慧卡科技融入、整合軍事管理作為,國軍軍人身分證假使能順應晶片化「多卡合一」進步趨勢,勢必能增進內、外部單位鏈結與國防事務發展,契合國防施政作為並強化與國際鏈結交流。本研究彙整深度訪談專家意見,以「整合效益」、「可能風險」與「推動成本」為評估構面,運用模糊層級分析法探討國軍相關決策者、使用者,對現行紙本軍人身分證朝向晶片化發展的決策分析,比較個人、群體決策各項權重數值,結合組織文化差異觀點詮釋,求得「證件晶片化」的最大可能行動方案,確認晶片軍人身分證發展決策。晶片軍人身分證的群體決策研究發現,提供國軍未來多卡整合、風險管控、發展方向與政策擘劃之實務展望。相信未來晶片軍人身分證統合發展後,可有效啟迪思維、強化內部公共管理,並間接提升軍人於社會上的形象地位。值得探討的是,證件晶片化的弊端思慮,並不代表會成為停止進步的組織承諾,除卻證件形式上的轉變,更可深化國軍全體官兵對未來發展的肯定,幫助建立其實務認知與未來願景。本研究建議國軍可結合國家電子化政府政策推動,進行證件晶片化相關規範與配套之政策設計探究;透過完善而嚴謹的政策法制,清楚明定將傳統證件轉換後,如何循序建置、推展,逐步擴大內部應用數位服務範圍,或許更能夠加速政策推行,提升國軍內部驅動公共治理與改善精進政策。 zh_TW dc.description.abstract (摘要) With the development of science and technology nowadays, Integrated Circuit Cards (ICC) become widely used in our lives. Since 2003, National Health Insurance Card had fully reissued operations to chip cards. The government will start to facilitate transferring National Identity Chip Cards in order to promote electronic services actively. The U.S. military had improved paper identity cards to chip eID followed the Congress’ guidance to merge ICC technology and application with military management. If R.O.C. military identity can follow the trend to integrate multiple functions into one card, it will surely enhance the link of units with national defense affairs in all aspects, combine national defense policy, and build up international engagements strengthening with other countries.This research gathers expert opinions from in-depth interviews to adopt and acquire “integrated benefits, possible risks, and transformed costs” as assessed evaluation, using fuzzy AHP to study on two groups as decision makers and pure users in the Ministry of National Defense (MND), then develop decision analysis of transforming to military eID of current paper ID. The comparison will be held with individuals and groups with the same or different types of values, in order to address small, partial difference caused by organization cultures. Then the research acquires all values needed to illustrate the result of most possible course of action, as the possible reference for future potential decision development.The result of group decision making in this study provides possible integration of multiple cards, risk management, developed direction, and future policy planning of the practical prospect. I believe that after military eID integrated development in the future, it will efficiently enlighten thinking, strengthen internal public management, and enhance the status of soldiers in society indirectly. It is worth exploring that disadvantages thinking of eID development will not stop the improving progress of organizational commitment. Eliminating just looking at the changes in the form of ID cards in appearance, it will deepen the acknowledge to the future development and assist establishing practical cognition and vision of the armed forces.The research provides suggestion for the Armed Forces to follow the Electronic Government trend and to draft policies related to military eID development. Onlyconsolidated policy and regulation design assists to facilitate expanding digital service range of inter-organization step-by-step. This could also accelerate theimplementation of policies improving public governance in the Armed Force. en_US dc.description.tableofcontents 第壹章 緒論 1第一節 研究背景與動機 1第二節 研究目的與問題 5第三節 研究範圍 5第四節 研究流程 6第五節 概念界定 8第貳章 文獻探討 10第一節 證件晶片化定義 10第二節 證件晶片化效益 11第三節 證件晶片化風險 15第四節 證件晶片化成本與配套 18第參章 研究設計 22第一節 專家訪談 22第二節 研究方法 24第三節 研究架構 34第肆章 層級權重比較 37第一節 樣本結構分析 37第二節 傳統層級分析法分析結果 39第三節 模糊層級分析法分析結果 45第四節 傳統AHP與FAHP成果比較 60第伍章 結論與建議 63第一節 研究發現 63第二節 實務展望與建議 64第三節 研究限制與後續研究建議 68參考文獻 71附錄一 層級分析法問卷 77 zh_TW dc.format.extent 1629681 bytes - dc.format.mimetype application/pdf - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0107921302 en_US dc.subject (關鍵詞) 決策分析 zh_TW dc.subject (關鍵詞) 軍人身分證 zh_TW dc.subject (關鍵詞) 深度訪談 zh_TW dc.subject (關鍵詞) 模糊層級分析法 zh_TW dc.subject (關鍵詞) Decision analysis en_US dc.subject (關鍵詞) Military Identification en_US dc.subject (關鍵詞) in-depth interview en_US dc.subject (關鍵詞) fuzzy AHP en_US dc.title (題名) 軍人身分證晶片化之決策分析 zh_TW dc.title (題名) Decision Analysis of Military eID Development en_US dc.type (資料類型) thesis en_US dc.relation.reference (參考文獻) 中文部分內政部(2019)。數位身分識別證(New eID)簡易問答集。取自https://www.ris.gov.tw /app/portal/789內政部(2007)。全面換發國民身分證大事紀。臺北:內政部。內政部戶政司(2017)。「晶片國民身分證?」開放決策工作坊議題手冊。臺北:內政部。內政部戶政司(2019)。New eID資訊公開專區。取自內政部戶政司官方網站 https://www.ris.gov.tw/app/ portal/789王嘉斌(2011)。晶片IC卡的應用。科學研習月刊,48-8,2-5。朱豔芳、謝復剛(2005)。國防實務研究方法。臺北:前程文化總經銷。江妙瑩(2004)。健保IC卡上路,你憂心隱私全都露嗎?。取自 http://forum.yam.org.tw/bongchhi/old/tv/tv152.htm行政院研究發展考核委員會(2016)。第五階段電子化政府計畫(106年至109年)。取自研考會官方網站https://www.ndc.gov.tw/ cp.aspx?n=67F4A482298C5D8E&s= EEBA8192E3AA2670吳怡瑾、林書偉(2010)。基於專案屬性資訊之知識探勘與再利用平台發展。圖書資訊學刊,8(1),97-136。https://doi.org/10.6182 /jlis.2010.8(1).097李興緯、洪上修、李翔祖(2009)。防僞安全技術運用於識別證件之研究。中華印刷科技年報,138-152。https://doi.org/10.30153/ JCAGST.200903.0011周立平、楊博宏(2011)。晶片卡安全之探討-離線攻擊Mifare Classic。前瞻科技與管理,1(2),97-111。周冠汝、何明諠(2019)。一人一號的身分制度是必要的嗎?討論晶片身分證的隱私資安風險前,得先思考這個根本問題。取自Medium https://medium.com/@tahr1984林子鈞(2018)。為什麼台灣人需要一張晶片身份證?讓我用五分鐘解釋給你聽。取自 https://buzzorange.com/techorange/2018/06/12/ idrntify-resign/林政宏(2011)。智慧卡的科技。科學研習月刊,44-2,4-7。林淑馨(2018)。公共管理概論。高雄:巨流圖書股份有限公司。范麗娟(1994)。深度訪談簡介。戶外遊憩研究,7(2),頁25-35。徐村和(1998)。模糊德菲層級分析法。模糊系統學刊,4(1),59-72。秦大智(2013)。反擊階段打擊旅火力支援方案之研究-以層級分析法為例。黃埔學報,69,74-86。國史館檔案史料文物(1940)。國民兵身分證暫行條例。取自史料文物查詢系統https://ahonline.drnh.gov.tw/index.php?act=Display /image /53537257Yz=00#0eF國防部(2019)。中華民國108年國防報告書。臺北:國防部。國防部(2017)。中華民國106年國防報告書。臺北:國防部。國防部(2016)。國軍人員身分證明管理要點。臺北:國防部。國家發展委員會資訊管理處(2018)。數位治國的愛沙尼亞,數位公民獨步全球。政府機關資訊通報,351,1-3。張紹勳(2012)。模糊多準則評估法及統計。臺北:五南圖書出版股份有限公司。張毓騰、吳杰修 (2016)。應用層級分析法探討空軍志願役人員留任的因素之研究。管理資訊計算,5(2),79-84。doi: 10.6285/MIC.5(2).07莊庭瑞(2017)。全面換發晶片身分證?歷史共業下的台灣戶籍制度。民主視野,20,13-16。許家瑜、張文馨、程平、林鎮西、李彦民(2018)。健保卡前世今生比一比 未來「摸不到」。取自 https://theme.udn.com/theme/story/ 6774/3297813陳敦源、李仲彬、黃東益(2007)。應用資訊通訊科技可以改善“公眾接觸”嗎?台灣個案的分析。東吳政治學報,25(3),51-92。陳蔚菁(2019)。介紹德國eID政策法制-從德國身分證及電子識別法出發。科技法律透析,31-3,31-37。黃東益、蕭乃沂(2014)。電子治理與資訊產業發展。公共治理季刊,2(2),51-57。黃彥鈞(2018)。愛沙尼亞前總統訪台,直言數位化需要的是政治決心。取自 http://technews.tw/2018/07/19/estonia-former-president-toomas-hendrik-ilves-digitalization/萬文隆(2004)。深度訪談在質性研究中的應用。生活科技教育,37(4), 17-23. https://doi.org/10.6232/LTE.2004.37(4).4葉俊榮(2005)。電子化政府資通安全發展策略與展望。研考雙月刊,29(1),20-34。董信煌、陸曉曦(2017)。雲端電子病歷使用意圖之探討。Electronic Commerce Studies,15(2),167-208。廖泓瑋(2010)。大學經營環境衝擊下學院因應策略之研究。華梵大學工業工程與經營資訊學系碩士班碩士論文。褚志鵬(2009)。層級分析法(AHP)理論與實作。取自http://faculty.ndhu.edu.tw/~chpchu/ POMR_Taipei_2009/AHP2009. pdf鄧振源、曾國雄(1989)。層級分析法(AHP)的內涵特性與應用(下)。中國統計學報,27(7),1-20。鄧振源(2005)。計畫評估:方法與應用。基隆:國立臺灣海洋大學運籌規劃與管理研究中心出版。鄭景俗、廖述賢、張自立 (2003)。基於模糊層級分析觀念及距離法模糊數排序評估武器系統。中華管理學報,4(2),1-18。doi:10. 30053/chjm.200307.0001鄭棟元(2019)。美國陸軍網路戰概念發展之探討。陸軍學術雙月刊,55(568),4-23。蕭乃沂、朱斌妤(2018)。資料驅動創新的跨域公共治理。國土及公共治理季刊,6(4),74-85。 英文部分Albrecht, K. (2008). RFID TAG-YOU’RE IT. Scientific American, 299(3), 72-77. https://doi.org/10.1038/scientificamerican0908-72Ardiley, Stephane (2012). History of the Common Access Card (CAC). Security Technology Executive, 22.Ariton-Gelan, C. (2015). CREATING ELECTRONIC IDENTITY - FUNDAMENTAL OBJECTIVE OF E-GOVERNMENT. Romanian Review of Social Sciences, (8), n/a. Retrieved from http://search.proquest.com/docview/1748576210/Buckley, J. J. (1985). Ranking alternatives using fuzzy numbers. Fuzzy sets and systems, 15(1), 21-31.Carr, M. R. (2002). Smart card technology with case studies. In Proceedings. 36th Annual 2002 International Carnahan Conference on Security Technology (pp. 158-159). IEEE.CEF Digital (2019).What are the benefits of eID? Retrieved from https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/Benefits+of+eIDChadwick, D. (1999). Smart cards aren’t always the smart choice. Computer, 32(12), 142-143. https://doi.org/10.1109/2.809256Chih, M. Y., Shih, J. R., Yang, B. Y., Ding, J. T., & Cheng, C. M. (2010). MIFARE Classic: Practical attacks and defenses. In 全國資訊安全會議 (pp. 126-132). 中華民國資訊安全學會.Culnan, M. J., Armstrong, P. K. (1999). Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science, 10(1), 104–115. https://doi. org/10.1287/orsc.10.1.104de Andrade, N., Chen-Wilson, L., Argles, D., Wills, G., Schiano Di Zenise, M., Gaycken, S., … Cova, M. (2014). Electronic Identity (2014 ed.). https://doi.org/10.1007/978-1-4471-6449-4DMDC (2002). DoD Introduces a New ID Card: The Common Access Card. Retrieved from https://www.dmdc.osd.mil/smartcard/owa/Show Page?p=indexDubois, D., & Prade, H. (1978). Operations on fuzzy numbers. International Journal of Systems Science, 9(6), 613-626.Forman, E., Saaty, T., Shvartsman, A., Forman, M., Korpics, M., Zottola, J. (2000). Expert Choice 2000. Inc., Pittsburgh.Gage, T. (1999). Just the FAQS--Smart card. Air Force Journal of Logistics, 23(2), 18–21. Retrieved from http://search.proquest.com /docview/196451526/Gustafsson, M., Hedström, K., Söderström, F., & Wihlborg, E. (2015). Constructing identities – professional use of eID in public organizations. Transforming Government: People, Process and Policy, 9(2), 143–158. https://doi.org/10.1108/TG-11-2013-0049Pardalos, P., Du, D., & Kahraman, C. (2008). Fuzzy Multi-Criteria Decision Making: Theory and Applications with Recent Developments (Vol. 16). https://doi.org/10.1007/978-0-387-76813-7Meadows, D., & Wright, D. (2009). Thinking in systems : a primer / Donella H. Meadows ; edited by Diana Wright. London ;: Earthscan.Murdoch, S. J., Drimer, S., Anderson, R., & Bond, M. (2010, May). Chip and PIN is Broken. In 2010 IEEE Symposium on Security and Privacy (pp. 433-446). IEEE.Norris, P. (2001). Digital divide: Civic engagement, information poverty, and the Internet worldwide. Cambridge university press.Pesonen, L. (2003). Meeting governments’ demands for secure ID documents. (2003). Card Technology Today, 15(4), 8–8. https://doi.org/10.1016/S0965-2590(03)00416-XPlyler, K. I. (2002). Common Access Card: Mission E-Possible, Retrieved from CHIPS, U.S. Navy website. https://www.doncio.navy.mil/chips/ArticleDetails.aspx?ID=3624Poller, A., Waldmann, U., Vowé, S., & Türpe, S. (2012). Electronic identity cards for user authentication—promise and practice. IEEE Security & Privacy, (1), 46-54.Rissanen, T. (2010). Electronic identity in Finland: ID cards vs. bank IDs. Identity in the Information Society, 3(1), 175-194. https://doi.org/10.1007/s12394-010-0049-8Saaty, T. L. (1980). The Analytic Hierarchy Process. New York: McGraw-Hill.U.S. Army (2016). Army Cyber Command leader: protecting systems, networks vital for Army readiness. Retrieved from https://www.army.mil/article/164788/army_cyber_command_leader_protecting_systems_networks_vital_for_army_readinessU.S. DoD (2018). Common Access Card. Retrieved from https://www.cac.mil/common-access-card/Villasenor, J. (2012). A Hacker-Ready Chip. Scientific American, 307(2), 29. https://doi.org/10.1038/scientificamerican0812-29aVOA (2019). US Says Taiwan Defense Spending to Rise with China Threat. Retrieved from https://www.voanews.com/east-asia-pacific/us-says-taiwan-defense-spending-rise-china-threatWang, Y., Xu, L., & Solangi, Y. (2020). Strategic renewable energy resources selection for Pakistan: Based on SWOT-Fuzzy AHP approach. Sustainable Cities and Society, 52. https://doi.org/10.1016/j.scs.2019.101861Zadeh, L. A. (1965). Fuzzy sets. Information and control, 8(3), 338-353. zh_TW dc.identifier.doi (DOI) 10.6814/NCCU202000395 en_US