Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/137152
題名: 被遺忘權與資料留存的悖論—以區塊鏈技術為中心
The Paradox of ‘the Right to be Forgotten’ and ‘Data Retention’: A focus on Blockchain Technology
作者: 林宛誼
Lin, Wan-Yi
貢獻者: 鄭菀瓊
Cheng, Wan-Chiung
林宛誼
Lin, Wan-Yi
關鍵詞: 區塊鏈
側鏈
一般資料保護規範
個人資料保護
隱私權
刪除權
被遺忘權
Blockchain
Sidechain
General Data Protection Regulation(GDPR)
Personal information protection
The Right of privacy
The right to erasure
The right to be forgotten(RtbF)
日期: 2021
上傳時間: 2-Sep-2021
摘要: 生物辨識技術及資訊科技的提升使數位足跡逐漸與個人身分合一,個人資料保護議題中被遺忘權(The right to be forgotten,RtbF)以及其下所關連之刪除權(The right to erasure)、刪除連結權(The right to de-listing)議題已受到多國重視;然而在實務運用中,資料留存基於產業分析、復盤、稽核、偵測、控管、舉證、法遵等原因,仍扮演舉足輕重的角色;兩者間的拮抗關係應如何取得衡平,值得研究。\n\n分散式帳本、共識機制的運作模式,賦予區塊鏈(blockchain)技術去中心化、難以竄改且高度透明等特質,有利各種資料的紀錄及查驗、取代第三方公證、直接證明真實性的潛能,在數位證據的資料留存顯有助益。但也因此,區塊鏈技術的運用不免產生與資料保護互為拮抗的疑慮,如被遺忘權及跨境傳輸議題等。\n\n被遺忘權概念可回溯自二戰時期,各國也逐步肯認其權利地位,其中,歐盟於1995年所制定的個人資料保護綱領(Data Protection Directive),及2016年所通過取代前述規範的一般資料保護規範(General Data Protection Regulation,GDPR)因具備高度監理性質及域外效力,而深刻影響其他國家對個人資料保護的立法趨勢。本研究將以歐盟、美國、中國、我國之法規及實務進行分析。\n\n綜上,在巨量資料、高度重視個人資料安全的時代,企業如何在發展區塊鏈商業運用時確保被遺忘權合規將成為重要課題。而先前研究多建議採用「脫鏈儲存方式」解套;惟本研究以為,「脫鏈儲存」無法根本性處理此悖論問題,且此法將無法完整發揮區塊鏈優勢。故本研究嘗試以區塊鏈的「側鏈技術」作為悖論的解方,盼能為區塊鏈架構人員及企業(尤指易被認定為資料控管者(data controller)之類型)內部法遵人員及行銷人員提供建議。
As biometrics and information technology advancements gradually integrate digital footprints with individual identities, the right to be forgotten (RtbF) and its associated rights such as the right to erasure or the right to de-listing, have received significant attention among many countries. Yet, data retention still plays a crucial role in practice for industrial analysis, retrieval, auditing, detection, control, prosecution, and legal compliance reasons. How to balance the antagonistic relationship between the two is worth studying.\n\nThe decentralized ledger and the consensus mechanism have given blockchain technology a decentralized, hardly manipulate, and a high degree of transparency characteristic, thereby greatly contributing to the data retention of digital evidence. Consequently, the application of blockchain technology raises the concern that it may be incompatible with data protection, particularly concerning the right to be forgotten and cross-border transmission issues.\n\nThe concept of the right to be forgotten can be traced back to the WWII Era and has been progressively recognized as a right in different countries. The European Union General Data Protection Regulation (GDPR), which was adopted in 2016, has profoundly influenced the development of legislation on personal data protection by other countries owing to its extraterritorial effects. In this study, we will analyze the legal regulations as well as legal practices of the EU, the US, China, and Taiwan.\n\nIn sum, in the era of big data and heightened emphasis on personal data protection, it will be a crucial issue for enterprises to ensure oblivion compliance while developing commercial applications of the blockchain. Earlier studies have proposed the adoption of "off-chain storage" to solve this paradox, whereas, in this study, we believe that "off-chain storage" fails to fundamentally solve the paradox, nor can it fully exploit the strengths of blockchain. Hence, this study attempts to solve the paradox by considering the "sidechain technology" of the blockchain, with the hope of offering suggestions to both blockchain architects and in-house legal practitioners as well as marketing staff of enterprises (particularly of the type that would be considered as data controllers).
參考文獻: 中文文獻\n\n(一)專書\n1.田篭 照博著、朱浚賢譯,《區塊鏈智慧合約開發與安全防護實作》,旗標科技股份有限公司(2018)。\n2.龔鳴,《寫給未來社會的新帳本—區塊鏈:人類的新型貨幣、終極信任機器與分散治理革命》,大寫出版(2017)。\n\n(二)期刊論文\n1.江義平、楊絜雲、江孟璇,〈固定及行動裝置使用者社群資訊行為探勘〉,《東吳經濟商學學報》,第96期(2018)。\n2.林育賢、段可芳,〈言論自由與名譽保護—從釋字第509號出發對誹謗言論不罰之再思考〉,《司法新聲 Judicial Aspirations》,第129期(2019)。\n3.范姜真媺,〈網路時代個人資料保護之強化—被遺忘權利之主張〉,《興大法學》,第19期(2016)。\n4.洪國峻、蕭培均,〈數位時代中的多贏策略-Open API 讓所有人幫你創新服務〉,《財金資訊季刊》,第97期,(2020)。\n5.陳恭,〈智能合約的發展與應用〉,《財金資訊季刊》,第90期(2017)。\n6.陳恭、蕭婕,〈運用區塊鏈打造公共治理新局面〉,《國土及公共治理季刊》,第6卷第4期(2018)。\n7.陳靜怡,〈隱私權新觀點:走過不留下痕跡?淺談被遺忘權與大數據〉,《NCC NEWS》,第8卷第7期,11月號(2014)。\n8.葉羅堯,〈國網中心區塊鏈創新應用服務〉,《國土及公共治理季刊》,第六卷第四期(2018)。\n9.陳璽煌、洪詮盛,〈應用車上診斷系統與區塊鏈技術在機車保險系統實作之研究〉,《2019全國計算機會議》(2019)。\n10.刘文杰,〈被遗忘权:传统元素、新语境与利益衡量〉,《法学研究》,2018年第2期(2018)。\n11.刘泽刚,〈过度互联时代被遗忘权保护与自由的代价〉,《当代法学》,2019年第1期(2019)。\n12.刘雁鹏,〈被遗忘权中国化的路径与反思〉,《人权》,第4期(2018)。\n13.吴伟光,〈从隐私利益的产生和本质来理解中国隐私权制度的特殊性〉,《当代法学》2017年第4期,(2017)。\n14.袁勇、王飞跃,〈可编辑区块链:模型、技术与方法〉,《自动化学报》,2020年第46卷第5期,(2020)。\n15.靳世雄、张潇丹、葛敬国、史洪彬、孙毅、李鸣、林业明、姚忠将,〈区块链共识算法研究综述〉,《信息安全学报》,第6卷第2期(2021)。\n\n(三)法規範及各國官方意見\n1.中華人民共和國《民法通則》第134條。\n2.中華人民共和國《民法典》第179條、第1195條。\n3.中華人民共和國《侵權責任法》第36條。\n4.中華人民共和國《全國人民代表大會常務委員會關於加強網絡信息保護的決定》第8條。\n5.中華人民共和國《信息安全技術公共及商用服務信息系統個人信息保護指南》3.9、4.2. (b)、5.2.3、5.5。\n6.中華人民共和國《最高人民法院關於審理利用信息網絡侵害人身權益民事糾紛案件適用法律若干問題的規定》第5條、第6條、第7條、第8條。\n7.中華人民共和國《網絡安全法》第41條、第43條。\n8.中華人民共和國《信息安全技術個人信息安全規範》國家標準(GB/T 35273-2020)第8.3條、第3.10條。\n9.中華人民共和國《信息網絡傳播權保護條例》第22條。\n10.中華人民共和國《個人信息保護法(草案)》(二次審議稿)第3條、第38條-第42條、第47條、第57條、第65條、第71條。\n11.中華人民共和國《消費者權益保護法》第26條、第29條。\n12.中華人民共和國《侵害消費者權益行為處罰辦法》第5條、第16條。\n13.中國國務院〈國務院關於印發社會信用體系建設規劃綱要(2014—2020年)的通知〉國發〔2014〕21號,索引號:000014349/2014-00072。\n14.中華民國《憲法》第22條、第23條。\n15.中華民國《刑法》第310條。\n16.中華民國《民法》第18條、第195條。\n17.中華民國《電腦處理個人資料保護法》第4條。\n18.中華民國《個人資料保護法》第2條、第3條、第11條、第19條、第25條。\n19.中華民國《個人資料保護法施行細則》第6條、第8條、第20條、第21條、第28條。\n20.司法院大法官解釋第293號、第509號、第585號、第586號、第603號。\n21.保險業辦理「保全/理賠聯盟鏈」業務應遵循事項規範第7條。\n\n(四)司法實務暨判決\n1.任甲玉與北京百度網訊科技有限公司人格權糾紛,(2015)海民初字第17417號。\n2.任甲玉與北京百度網訊科技有限公司名譽權糾紛,(2015)一中民終字第09558號。\n3.郭兵訴杭州野生動物世界有限公司服務合同糾紛案,(2019)浙0111民初6971號。\n4.楊澧群與北京微夢創科網絡技術有限公司、北京新浪互聯資訊服務有限公司名譽權糾紛,(2019)浙0192民初2948號。\n5.楊澧群與北京微夢創科網絡技術有限公司、北京新浪互聯資訊服務有限公司名譽權糾紛,(2020)浙01民終4126號。\n6.蘇用和訴北京搜狐互聯網資訊服務有限公司名譽權糾紛案,(2014)佛順法民一初字第332號。\n7.王順與深圳市騰訊電腦系統有限公司等網絡侵權責任糾紛,(2020)京0491民初140號。\n8.PTT網站案,臺灣臺北地方法院105年度訴字第3517號判決。\n9.PTT網站案,臺灣高等法院106年度上字第1164號判決。\n10.PTT網站案,最高法院108年度台上字第198號判決。\n11.PTT網站案,臺灣高等法院108年度上更一字第38號判決。\n12.假球自由時報案,臺灣士林地方法院103年度訴字第541號判決。\n13.假球自由時報案,臺灣高等法院104年度上字第1084號判決。\n14.假球自由時報案,最高法院106年度台上字第2652號判決。\n15.假球美商科高案,臺灣臺北地方法院103年度訴字第2976號判決。\n16.假球美商科高案,臺灣高等法院104年度上字第389號判決。\n17.假球GOOGLE INC案,臺灣臺北地方法院104年度訴更一字第31號判決。\n18.假球GOOGLE INC案,臺灣高等法院106年度上字第1160號判決。\n19.Yahoo !奇摩案,臺灣臺中地方法院103年度訴字第1594號判決。\n20.Yahoo !奇摩案,臺灣高等法院臺中分院104年度上字第62號判決。\n21.不當交往案,臺灣臺南地方法院108年度訴字第165號判決。\n22.高雄市政府社會局案,高雄高等行政法院108年度訴字第327號判決。\n23.行車糾紛公審案,臺灣士林地方法院108年度湖簡字第1768號判決。\n24.法務部法律字第10203513000號函復。\n\n(五)網路資源\n1.〈未來是公有鏈還是聯盟鏈會成功?〉,NervosNetwork, https://www.chainnews.com/zh-hant/articles/078718484499.htm (最後瀏覽日:2021年2月21日)。\n2.〈「人脸识别第一案」原告上诉个人信息保护诸多难题待解〉,中國青年報,https://finance.sina.com.cn/china/gncj/2020-12-21/doc-iiznctke7581460.shtml (最後瀏覽日:2021年5月14日)。\n3.〈「人脸识别第一案」二审宣判 杭州中院增判删除指纹识别信息〉,人民法院报,https://www.chinacourt.org/article/detail/2021/04/id/5956124.shtml (最後瀏覽日:2021年5月14日)。\n4.〈人脸识别第一案落锤 如何拒绝「丢脸」「偷脸」待解〉,工人日报,https://jingji.cctv.com/2021/04/15/ARTIZLFbIjmIfuvxOxBbJ2hR210415.shtml(最後瀏覽日:2021年5月14日)。\n5.〈「人脸识别第一案」终审判决来了!〉,新华社,https://www.sohu.com/a/459869251_267106 (最後瀏覽日:2021年5月14日)。\n6.〈被遺忘權的中國情境及司法展開——從國內首例「被遺忘權案」切入〉,網絡犯罪工作坊,https://www.secrss.com/articles/5812 (最後瀏覽日:2021年5月31日)。\n7.〈論述中國內地引入「被遺忘權」的可能性〉,香港《傳媒透視》,https://app3.rthk.hk/mediadigest/content.php?aid=2076 (最後瀏覽日:2021年5月31日) 。\n8.〈API新經濟 帶你去看更大的世界〉,AI金融科技協會,https://aifinpitchtw.com/article?article=6 (最後瀏覽日:2021年4月11日) 。\n9.〈微軟也在做!使用區塊鏈令個人資料更安全!〉,Medium,https://medium.com/redso/%E5%BE%AE%E8%BB%9F%E4%B9%9F%E5%9C%A8%E5%81%9A-%E4%BD%BF%E7%94%A8%E5%8D%80%E5%A1%8A%E9%8F%88%E4%BB%A4%E5%80%8B%E4%BA%BA%E8%B3%87%E6%96%99%E6%9B%B4%E5%AE%89%E5%85%A8-545510ad6578 (最後瀏覽日:2021年6月22日)。\n10.〈信任的時刻:區塊鏈對全球經濟影響報告〉,PwC, https://www.pwc.tw/zh/publications/global-insights/time-for-trust.html (最後瀏覽日:2021年4月9日)。\n11.〈區塊鏈擴展技術—側鏈Sidechain〉,Medium,https://weicheng-hsieh.medium.com/%E5%8D%80%E5%A1%8A%E9%8F%88%E6%93%B4%E5%B1%95%E6%8A%80%E8%A1%93-%E5%81%B4%E9%8F%88-sidechain-730300701948 (最後瀏覽日:2021年7月6日)。\n12.〈以太坊太慢了?Blockstream推出「Liquid Security」:在比特幣區塊鏈上以「側鏈發行STO」〉,動區動趨BlockTempo,https://www.blocktempo.com/blockstream-launches-security-token-platform-on-bitcoin-sidechain/ (最後瀏覽日:2021年7月6日) 。\n \n外文文獻\n\n(一)專書\n1.Jozef Cupa, The Media Freedom to Inform V. Celebrities`` Personality Rights: a Comparative Study of the U.S. and German Approach, VDM Verlag Dr. Müller, (first ed. 2010).\n2.V. Mayer-Schönberger, Delete: The Virtue of Forgetting in the Digital Age, Princeton, New Jersey, USA: Princeton University Press (2009, 2011 Revised).\n\n(二)期刊論文\n1.Adam Back, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Timón, and Pieter Wuille∗†. Enabling Blockchain Innovations with Pegged Sidechains (2014).\n2.Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov, Deanonymisation of clients in Bitcoin P2P network, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2014).\n3.Amritraj Singh, Kelly Click, Reza M. Parizi, Qi Zhang, Ali Dehghantanha, Kim-Kwang Raymond Choo, Sidechain technologies in blockchain networks: An examination and state-of-the-art review, Journal of Network and Computer Applications, Volume 149 (2020).\n4.Androulaki E., Karame G.O., Roeschlin M., Scherer T., Capkun S., Evaluating User Privacy in Bitcoin. In: Sadeghi AR. (eds) Financial Cryptography and Data Security. FC 2013. Lecture Notes in Computer Science, vol 7859 (2013).\n5.Antoon De Baets, A historian`s view on the right to be forgotten, International Review of Law, Computers & Technology, Vol. 30 (2016).\n6.Bennett, Steven C., The "Right to Be Forgotten": Reconciling EU and US Perspectives, Berkeley Journal of International Law 30 (2012).\n7.Cesare Bartolini, Lawrence Siry, The right to be forgotten in the light of the consent of the data subject, Computer Law & Security Review, Volume 32 (2016).\n8.Christopher Lytras, Right to be Forgotten: Europe`s Cutting Edge Weapon to fight Google?, European Public Law: EU eJournal Vol 12, Issue 106 (2015).\n9.Deshpande A., Herlihy M., Privacy-Preserving Cross-Chain Atomic Swaps, Bernhard M. et al. (eds) Financial Cryptography and Data Security (2020) Lecture Notes in Computer Science, vol 12063.\n10.Eugenia Politou, Alexandra Michota, Efthimios Alepis, Matthias Pocs, Constantinos Patsakis, Backups and the right to be forgotten in the GDPR: An uneasy relationship, Computer Law & Security Review, Volume 34, Issue 6 (2018).\n11.Eugenia Politou, Efthimios Alepis, Constantinos Patsakis, Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions, Journal of Cybersecurity, Volume 4, Issue 1 (2018).\n12.G. Ateniese, B. Magri, D. Venturi and E. Andrade, Redactable Blockchain – or – Rewriting History in Bitcoin and Friends, 2017 IEEE European Symposium on Security and Privacy (EuroS&P) (2017).\n13.Gavin Phillipson, Press freedom, the public interest and privacy, In A. Kenyon (Ed.), Comparative Defamation and Privacy Law, Cambridge: Cambridge University Press (2016).\n14.Giovanni Iachello, Protecting personal data: can IT security management standards help?, 19th Annual Computer Security Applications Conference (ACSAC `03), Proceedings (2003).\n15.Gorzeman, L., Korenhof, P. Escaping the Panopticon Over Time, Philosophy & Technology vol 30 (2017).\n16.Guo J., Gai K., Zhu L., Zhang Z., An Approach of Secure Two-Way-Pegged Multi-sidechain, Wen S., Zomaya A., Yang L. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2019. Lecture Notes in Computer Science, vol 11945. Springer, Cham (2020).\n17.Henry Chang, Is Distributed Ledger Technology Built for Personal Data?, Journal of Data Protection & Privacy, Volume 1, Number 4, 2018, University of Hong Kong Faculty of Law Research Paper No. 2018/016 (2018).\n18.Hany F. Atlam, Gary B. Wills, Technical aspects of blockchain and IoT, Advances in Computers, Elsevier, Volume 115 (2018).\n19.Jeffrey Rosen, The Right to Be Forgotten, 64 Stan. L. REV. ONLINE 88 (2012).\n20.Jiang Y, Wang C, Wang Y, Gao L. A Cross-Chain Solution to Integrating Multiple Blockchains for IoT Data Management. Sensors; 19(9):2042 (2019).\n21.Joe Abou Jaoude, Raafat George Saade, Blockchain Applications – Usage in Different Domains, IEEE, vol. 7 (2019)\n22.Johnny Dilley, Andrew Poelstra, Jonathan Wilkins, Marta Piekarska, Ben Gorlick, Mark Friedenbach. Strong Federations: An Interoperable Blockchain Solution to Centralized Third Party Risks, ArXiv abs/1612.05491 (2016).\n23.Juhász, P. L., Stéger, J., Kondor, D., & Vattay, G., A Bayesian approach to identify Bitcoin users, PloS one, 13(12), e0207000 (2018).\n24.Justin Kwik, In Light of the Technical Impracticality of the Right to Erasure, What Answers Can Actor-Network Theories Provide, 2019 Sing. COMP. L. REV. 48 (2019).\n25.Mahdi H. Miraz, Maaruf Ali. Applications of Blockchain Technology beyond Cryptocurrency, Annals of Emerging Technologies in Computing (AETiC) (2018).\n26.Mary Samonte, Google v. CNIL: The Territorial Scope of the Right to Be Forgotten Under EU Law, European Papers, Vol. 4, 2019, No 3, European Forum, Insight of 27 January 2020 (2020).\n27.Mayer- Schönberger, Viktor, Useful Void: The Art of Forgetting in the Age of Ubiquitous Computing, KSG Working Paper No. RWP07-022 (2007).\n28.Monika and R. Bhatia, Interoperability Solutions for Blockchain, 2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE) (2020).\n29.M. Florian, S. Henningsen, S. Beaucamp and B. Scheuermann, Erasing Data from Blockchain Nodes, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (2019).\n30.M. Kuperberg, Towards Enabling Deletion in Append-Only Blockchains to Support Data Growth Management and GDPR Compliance, 2020 IEEE International Conference on Blockchain (Blockchain) (2020).\n31.Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System (2008a).\n32.N Purtova, Do property rights in personal data make sense after the Big Data turn? Individual control and transparency, 10(2) Journal of Law and Economic Regulation November 2017, Tilburg Law School Research Paper No. 2017/21 (2017).\n33.N. -Y. Lee, J. Yang, M. M. H. Onik and C. -S. Kim, Modifiable Public Blockchains Using Truncated Hashing and Sidechains, IEEE Access, vol. 7 (2019).\n34.Peguera, Miquel, The Right to Be Forgotten in the European Union, in: Giancarlo Frosio (ed.), The Oxford Handbook of Online Intermediary Liability (2019).\n35.Pino, Giorgio, The Right to Personal Identity in Italian Private Law: Constitutional Interpretation and Judge-Made Rights, The Harmonization Of Private Law In Europe, M. Van Hoecke and F. Ost, eds., Hart Publishing, Oxford (2000).\n36.R. M. Parizi, S. Homayoun, A. Yazdinejad, A. Dehghantanha and K. -K. R. Choo, Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains, 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE) (2019).\n37.Robinson, P., The merits of using Ethereum MainNet as a Coordination Blockchain for Ethereum Private Sidechains, The Knowledge Engineering Review, Volume 35 (2020).\n38.Ray Oshikawa, Jing Qian, William Yang Wang, A Survey on Natural Language Processing for Fake News Detection, Proceedings of the 12th Language Resources and Evaluation Conference, European Language Resources Association (2020).\n39.Schnitzler, T., Mirza, S., Dürmuth, M., and Pöpper, C., SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data, Proceedings on Privacy Enhancing Technologies 2021 (1) (2021).\n40.Siry, L. and Schmitz, S., ‘A Right to Be Forgotten? - How Recent Developments in Germany May Affect the Internet Publishers in the US’, European Journal for Law and Technology, Vol. 3, No.1 (2012).\n41.T. Ncube, N. Dlodlo and A. Terzoli, Private Blockchain Networks: A Solution for Data Privacy, 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC) (2020).\n42.V. Agarwal and S. Pal, Blockchain meets IoT: A Scalable Architecture for Security and Maintenance, 2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) (2020).\n43.Warren, Samuel D., and Louis D. Brandeis, The Right to Privacy, Harvard Law Review 4, no. 5 (1890).\n44.W Voss, W. Gregory & Castets-Renard, Céline, Proposal for an International Taxonomy on the Various Forms of the Right to Be Forgotten: A Study on the Convergence of Norms, 14 Colorado Technology Law Journal 281 (2016).\n45.Yan Meining, Protecting the right to be forgotten: Is mainland China ready?, 3 European Data Protection Law Review, Volume 1, Issue 3 (2015).\n46.Zeller, Bruno and Trakman, Leon and Walters, Robert and Rosadi, Sinta Dewl, The Right to be Forgotten—The EU and Asia Pacific Experience (Australia, Indonesia, Japan and Singapore) , European Human Rights Law Review 23, UNSW Law Research Paper No. 19-2 (2019).\n\n(三)學位論文\n1.Ivan Belic, Data Protection Challenges of public permissionles blockchains in relation to the GDPR, Tilburg University Master Law & Technology (2018).\n\n(四)法規範及各國官方意見\n1.OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980 version), OECD, https://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm (last visited: Mar. 28, 2021).\n2.Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995), https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:31995L0046 (last visited: Mar. 12, 2021).\n3.Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services, in particular electronic commerce, in the internal market,Directive on electronic commerce (2000), https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=celex%3A32000L0031 (last visited: Mar. 31, 2021).\n4.REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance) (2016), http://data.europa.eu/eli/reg/2016/679/oj (last visited: Mar. 31, 2021).\n5.REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (2016), https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:02016R0679-20160504 (last visited: Mar. 12, 2021).\n6.REGULATION (EU) 2018/1725 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 October 2018 on the protection of natural persons with regard to the processing of personal data by the Union institutions, bodies, offices and agencies and on the free movement of such data, and repealing Regulation (EC) No 45/2001 and Decision No 1247/2002/EC (2018), https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:02016R0679-20160504 (last visited: Mar. 12, 2021)\n7.Article 29 Data Protection Working Party, Guidelines On The Implementation Of The Court Of Justice Of The European Union Judgment On “Google Spain And Inc V. Agencia Española De Protección De Datos (AEPD) And Mario Costeja González” C-131/12 (2014), https://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2014/wp225_en.pdf (last visited: Mar. 8, 2021).\n8.Article 29 Data Protection Working Party, Opinion 1/2008 on data protection issues related to search engines (2008), https://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2008/wp148_en.pdf (last visited: Mar. 8, 2021).\n9.Article 29 Data Protection Working Party, Opinion 05/2012 on Cloud Computing (2012),\nhttps://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2012/wp196_en.pdf (last visited: Apr. 17, 2021).\n10.Article 29 Data Protection Working Party, Opinion 05/2014 on Anonymisation Techniques (2014),\nhttps://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2014/wp216_en.pdf (last visited: Apr. 17, 2021).\n11.Article 29 Data Protection Working Party, Update of Opinion 8/2010 on applicable law in light of the CJEU judgement in Google Spain (2015), https://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2015/wp179_en_update.pdf (last visited: Mar. 8, 2021).\n12.Loi n° 78-17 du 6 janvier 1978 relative à l`informatique, aux fichiers et aux libertés (Dernière mise à jour des données de ce texte : 01 janvier 2020 (Jan. 1, 2020 version)), https://www.legifrance.gouv.fr/loda/id/JORFTEXT000000886460/ (last visited: Mar. 28, 2021).\n13.Commission Nationale Informatique et Libertés, Premiers Éléments d’analyse de la CNIL: Blockchain (2018), https://www.cnil.fr/sites/default/files/atoms/files/la_blockchain.pdf (last visited: Apr. 17, 2021).\n14.47 U.S. Code § 230, https://www.law.cornell.edu/uscode/text/47/230 (last visited: Jun. 9, 2021).\n15.Department of Justice, The Justice Department Unveils Proposed Section 230 Legislation (2020), https://www.justice.gov/opa/pr/justice-department-unveils-proposed-section-230-legislation (last visited: Jun. 12, 2021).\n16.Department of Justice, Department Of Justice’s Review Of Section 230 Of The Communications Decency Act Of 1996, Office of the Attorney General, https://www.justice.gov/archives/ag/department-justice-s-review-section-230-communications-decency-act-1996 (last visited: Jun. 12, 2021).\n17.Children`s Online Privacy Protection Act of 1998, 15 U.S.C. 6501–6505., https://www.law.cornell.edu/uscode/text/15/chapter-91 (last visited: Jun. 12, 2021).\n18.16 CFR Part 312 (Children’s Online Privacy Protection Rule; Final Rule), https://www.law.cornell.edu/cfr/text/16/part-312 (last visited: Jun. 12, 2021).\n19.Privacy Rights for California Minors in the Digital World [22580 - 22582], https://leginfo.legislature.ca.gov/faces/codes_displayText.xhtml?lawCode=BPC&division=8.&chapter=22.1. (last visited: Jun. 12, 2021).\n20.Conn. Gen. Stat. § 54-142a, https://casetext.com/statute/general-statutes-of-connecticut/title-54-criminal-procedure/chapter-961a-criminal-records/part-i-erasure/section-54-142a-formerly-sec-54-90-erasure-of-criminal-records (last visited: Jun. 12, 2021).\n21.Europol, Wasabi Wallet Report (2020), https://www.tbstat.com/wp/uploads/2020/06/Europol-Wasabi-Wallet-Report.pdf (last visited: Apr. 17, 2021).\n22.Europol, Internet Organised Crime Threat Assessment (IOCTA) 2020, IOCTA (2020), https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2020?fbclid=IwAR1yK3aQINAdyBRAFtpBb774ACuHhZzIGZb_th5I0hzx5N-Oh0tsLSXYOOE (last visited: Apr. 17, 2021).\n23.FinCEN, First Bitcoin “Mixer” Penalized by FinCEN for Violating Anti-Money Laundering Laws (2020), https://www.fincen.gov/news/news-releases/first-bitcoin-mixer-penalized-fincen-violating-anti-money-laundering-laws (last visited: Apr. 17, 2021).\n24.European Parliament, Blockchain and the General Data Protection Regulation, PE 634.445 (2019), https://www.europarl.europa.eu/RegData/etudes/STUD/2019/634445/EPRS_STU(2019)634445_EN.pdf (last visited: Apr. 17, 2021).\n\n(五)司法實務暨判決\n1.CJEU Judgment of the Court (Grand Chamber) Case number:C-131/12 (2014), https://curia.europa.eu/juris/document/document.jsf?text=&docid=152065&pageIndex=0&doclang=en&mode=lst&dir=&occ=first&part=1&cid=22361009 (last visited: Mar. 8, 2021).\n2.CJEU C 131/12 Opinion of Advocate General JÄÄSKINEN, https://curia.europa.eu/juris/document/document.jsf?docid=138782&doclang=EN (last visited: Mar. 8, 2021).\n3.CJEU Judgment of the Court (Grand Chamber) Case number:C‑362/14 (2015),https://curia.europa.eu/juris/document/document.jsf?text=&docid=169195&pageIndex=0&doclang=EN&mode=lst&dir=&occ=first&part=1&cid=14227328 (last visited: Jun. 9, 2021).\n4.CJEU Judgment of the Court (Grand Chamber) Case number:C-507/17 (2019), http://curia.europa.eu/juris/document/document.jsf?text=&docid=218105&pageIndex=0&doclang=en&mode=lst&dir=&occ=first&part=1&cid=7136850 (last visited: Mar. 12, 2021).\n5.CJEU Judgment of the Court (Grand Chamber) Case number:C-18/18 (2019), http://curia.europa.eu/juris/document/document.jsf?text=&docid=218621&pageIndex=0&doclang=EN&mode=lst&dir=&occ=first&part=1&cid=6546747 (last visited: Mar. 27, 2021).\n6.Melvin v. Reid, 112 Cal.App. 285, 297 P. 91 (Cal. Ct. App. 1931), https://casetext.com/case/melvin-v-reid?PHONE_NUMBER_GROUP=C&q=Melvin%20v.%20Reid&sort=relevance&p=1&type=case (last visited: Apr. 9, 2021).\n7.Briscoe v. Reader`s Digest Association, Inc., 4 Cal.3d 529, 93 Cal. Rptr. 866, 483 P.2d 34 (Cal. 1971), https://casetext.com/case/briscoe-v-readers-digest-association-inc?PHONE_NUMBER_GROUP=C&q=Briscoe%20v.%20Reader%27s%20Digest%20Association,%20Inc.&sort=relevance&p=1&type=case (last visited: Apr. 9, 2021).\n8.Cubby, Inc. v. CompuServe Inc., 776 F. Supp. 135 (S.D.N.Y. 1991) https://casetext.com/case/cubby-inc-v-compuserve-inc?PHONE_NUMBER_GROUP=C&q=Cubby,%20Inc.%20v.%20CompuServe%20Inc&sort=relevance&p=1&type=case (last visited: Jun. 9, 2021).\n9.Stratton Oakmont, Inc. v. Prodigy Services Co., 23 Media L. Rep. 1794 (N.Y. Sup. Ct. 1995), https://casetext.com/case/stratton-oakmont-inc-v-prodigy-servs?PHONE_NUMBER_GROUP=C&q=Stratton%20Oakmont,%20Inc.%20v.%20Prodigy%20Services&sort=relevance&p=1&type=case&tab=keyword&jxs= (last visited: Jun. 9, 2021).\n10.The European Court of Human Rights (Fifth Section), CASE OF M.L. AND W.W. v. GERMANY, http://hudoc.echr.coe.int/eng?i=001-183947 (last visited: Jun. 16, 2021).\n11.The European Court of Human Rights (Fifth Section), CASE OF M.L. AND W.W. v. GERMANY, Legal Summary, http://hudoc.echr.coe.int/eng?i=002-12041 (last visited: Jun. 16, 2021).\n12.Mosha v. Yandex Inc., 18 Civ. 5444 (ER) (S.D.N.Y. Sep. 30, 2019), https://casetext.com/case/mosha-v-yandex-inc/?PHONE_NUMBER_GROUP=C (last visited: Jun. 16, 2021).\n13.Cullen v. Margiotta, 811 F.2d 698, 732 (2d Cir. 1987), cert. denied, 483 U.S. 1021 (1987), https://casetext.com/case/cullen-v-margiotta-2?q=Cullen%20v.%20Margiotta&PHONE_NUMBER_GROUP=C&sort=relevance&p=1&type=case (last visited: Jun. 16, 2021).\n14.Murawski v. Pataki, 514 F. Supp. 2d 577, 591 (S.D.N.Y. 2007), https://casetext.com/case/murawski-v-pataki?q=Murawski%20v.%20Pataki,&PHONE_NUMBER_GROUP=C&sort=relevance&p=1&type=case&tab=keyword&jxs= (last visited: Jun. 16, 2021).\n15.Kevin P. Cloukey v. Robert C. Leuba, Chief Court Administrator, Et Al, 2000 Ct. Sup. 12383, 28 CLR 299, 47 Conn. Supp. 263 (Conn. Super. Ct. 2000), https://casetext.com/case/cloukey-v-leuba (last visited: Jun. 16, 2021).\n16.Kevin P. Cloukey v. Robert C. Leuba, Chief Court Administrator, Et Al, 67 Conn. App. 221, 786 A.2d 1182 (Conn. App. Ct. 2000), https://casetext.com/case/cloukey-v-leuba-1?PHONE_NUMBER_GROUP=C&sort=relevance&resultsNav=false&q= (last visited: Jun. 16, 2021)\n17.State v. West, 192 Conn. 488, 472 A.2d 775 (Conn. 1984), https://casetext.com/case/state-v-west-241 (last visited: Jun. 18, 2021)\n18.Martin v. Hearst Corp., 777 F.3d 546 (2d Cir. 2015), https://casetext.com/case/martin-v-hearst-corp?PHONE_NUMBER_GROUP=C&sort=relevance&resultsNav=false&q= (last visited: Jun. 18, 2021).\n19.Manchanda v. Google, 16-CV-3350 (JPO) (S.D.N.Y. Nov. 16, 2016), https://casetext.com/case/manchanda-v-google (last visited: Jun. 20, 2021).\n20.Garcia v. Google, Inc., 786 F.3d 733, 114 U.S.P.Q.2d 1607 (9th Cir. 2015), https://casetext.com/case/garcia-v-google-inc-6 (last visited: Jun. 20, 2021).\n\n(六)網路資源\n1.About Hyperledger, Hyperledger Fabric, https://www.hyperledger.org/about (last visited: May. 29, 2021).\n2.A country`s worth of power, no more! , Ethereum Foundation Blog, https://blog.ethereum.org/2021/05/18/country-power-no-more/ (last visited: May. 29, 2021).\n3.A European Court Decision May Usher In Global Censorship, A fight over a mean Facebook post about an Austrian politician will have worldwide consequences, Future Tense, https://slate.com/technology/2019/10/european-court-justice-glawischnig-piesczek-facebook-censorship.html (last visited: Mar. 31, 2021).\n4.Anonymity, Privacy, and Security Online, Pew Research Center, https://www.pewresearch.org/internet/2013/09/05/anonymity-privacy-and-security-online/ (last visited: Mar 29, 2021).\n5.BCDiploma WhitePaper v2.2, BCD,\nhttps://www.evidenz.io/img/pdf/BCD-WhitePaper_last.pdf (last visited: Jun. 15, 2021).\n6.Bitcoin soars on crypto love from Mastercard and BNY Mellon, Fortune, https://fortune.com/2021/02/11/bitcoin-price-mastercard-bny-mellon-crypto/ (last visited: Feb. 21, 2021).\n7.Blockchain and GDPR - How blockchain could address five areas associated with GDPR compliance, IBM Security White paper, https://iapp.org/media/pdf/resource_center/blockchain_and_gdpr.pdf (last visited: Apr. 17, 2021).\n8.Blockchain Trilemma: Explained, CRYPTOTICKER, https://cryptoticker.io/en/blockchain-trilemma-explained/ (last visited: Feb. 21, 2021).\n9.Constitution Annotated, https://constitution.congress.gov/about/constitution-annotated/ (last visited: Mar. 8, 2021).\n10.Decentralized Identity, Microsoft, https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2DjfY (last visited: Jun. 22, 2021).\n11.DeleteMe, https://joindeleteme.com/ (last visited: May. 9, 2021)\n12.Data Backup Options, Carnegie Mellon University produced for US-CERT, https://us-cert.cisa.gov/sites/default/files/publications/data_backup_options.pdf (last visited: Apr. 24, 2021).\n13.Deploying a smart contract to a channel, Hyperledger Fabric, https://hyperledger-fabric.readthedocs.io/en/latest/deploy_chaincode.html (last visited: May. 29, 2021)\n14.Enterprise Blockchain Platforms — A Comparison, Medium, https://medium.com/blackinsurance/enterprise-blockchain-platforms-a-comparison-d58f1227ce70 (last visited: May. 29, 2021).\n15.Ethereum founder Vitalik Buterin says long-awaited shift to ‘proof-of-stake’ could solve environmental woes, Fortune, https://fortune.com/2021/05/27/ethereum-founder-vitalik-buterin-proof-of-stake-environment-carbon/ (last visited: May. 29, 2021).\n16.EU Court of Justice Advocate-General Issues Opinion in Google Search Case, Behavioral Advertising, Enforcement, European Union, International, Marketing, Online Privacy, https://www.huntonprivacyblog.com/2013/07/16/eu-court-of-justice-advocate-general-issues-opinion-in-google-search-case/ (last visited: Mar. 8, 2021).\n17.Everything you need to know about the “Right to be forgotten”, GDPR.EU, https://gdpr.eu/right-to-be-forgotten/ (last visited: Mar. 31, 2021).\n18.Exploring the different types of blockchain, Modex, https://blog.modex.tech/exploring-the-different-types-of-blockchain-10395da93a51(last visited: Feb. 28, 2021).\n19.Fake News Detection using NLP techniques, Analytics Vidhya, https://medium.com/analytics-vidhya/fake-news-detection-using-nlp-techniques-c2dc4be05f99 (last visited: Apr. 9, 2021).\n20.GDPR does not (yet) give right to global oblivion, euobserver, digital agenda, https://euobserver.com/digital/141891 (last visited: Mar. 8, 2021).\n21.GDPR FOR MARKETING: THE DEFINITIVE GUIDE FOR 2021, SuperOffice, https://www.superoffice.com/blog/gdpr-marketing/ (last visited: Apr. 7, 2021).\n22.Google appeals French order for global `right to be forgotten`, Reuters, https://www.reuters.com/article/us-google-france-privacy-idUSKCN0YA1D8 (last visited: Mar. 28, 2021).\n23.Google wins `right to be forgotten` case against France, IT PRO, https://www.itpro.co.uk/general-data-protection-regulation-gdpr/34477/google-wins-right-to-be-forgotten-case-against-france (last visited: Mar. 8, 2021).\n24.Here`s what could happen to Section 230 – the internet law Donald Trump hates – now the Democrats have both Houses, Insider, https://www.businessinsider.com/future-of-section-230-democrats-both-houses-2021-1(last visited: Jun. 12, 2021).\n25.How does a transaction get into the blockchain?, Euromoney Learning, https://www.euromoney.com/learning/blockchain-explained/how-transactions-get-into-the-blockchain (last visited: May. 29, 2021).\n26.Is Data Really the New Oil in the 21st Century?, Towards Data Science, https://towardsdatascience.com/is-data-really-the-new-oil-in-the-21st-century-17d014811b88 (last visited: Apr. 23, 2021).\n27.Leveraging Machine Learning for Game Development, Google AI Blog, https://ai.googleblog.com/2021/03/leveraging-machine-learning-for-game.html (last visited: Apr. 9, 2021).\n28.Liquid Network, https://blockstream.com/liquid/ (last visited: Feb. 21, 2021).\n29.LuxTrust and Cambridge Blockchain Announce Private Beta for Privacy-Protecting Identity Platform IDKEEP, Business Wire, https://www.businesswire.com/news/home/20190716005351/en/LuxTrust-and-Cambridge-Blockchain-Announce-Private-Beta-for-Privacy-Protecting-Identity-Platform-IDKEEP (last visited: Jun. 22, 2021).\n30.Mining, Ethereum.org, https://ethereum.org/en/developers/docs/consensus-mechanisms/pow/mining/ (last visited: May. 29, 2021).\n31.Most Americans support right to have some personal info removed from online searches, Pew Research Center, https://www.pewresearch.org/fact-tank/2020/01/27/most-americans-support-right-to-have-some-personal-info-removed-from-online-searches/ (last visited: Mar. 29, 2021).\n32.Uses and Limitations of Blockchain in the Public Sector, OECD, https://www.oecd.org/parliamentarians/meetings/gpn-meeting-october-2018/OPSI-Blockchain-Presentation-for-Global-Parliamentary-Network.pdf (last visited: Jun. 22, 2021).\n33.OneRep, https://onerep.com/ (last visited: May. 9, 2021).\n34.Prepare For Decentralized Digital Identity: Security SWOT, Forrester, https://www.forrester.com/report/Prepare+For+Decentralized+Digital+Identity+Security+SWOT/-/E-RES159143 (last visited: Jun. 22, 2021).\n35.PrivacyDuck, https://www.privacyduck.com/ (last visited: May. 9, 2021).\n36.Proof-Of-Work (POW), Ethereum.org, https://ethereum.org/en/developers/docs/consensus-mechanisms/pow/ (last visited: May. 29, 2021).\n37.Proof-Of-Stake (POS), Ethereum.org, https://ethereum.org/en/developers/docs/consensus-mechanisms/pos/ (last visited: May. 29, 2021).\n38.Protect your privacy, Bitcoin.org, https://bitcoin.org/en/protect-your-privacy (last visited: Apr. 9, 2021).\n39.Public vs. Private Blockchain: A Comprehensive Comparison, Blockchain Council, https://www.blockchain-council.org/blockchain/public-vs-private-blockchain-a-comprehensive-comparison/ (last visited: May. 29, 2021).\n40.Regulation (EU) 2016/679 (General Data Protection Regulation) recitals, Intersoft Consulting services AG, https://gdpr-info.eu/recitals/ (last visited: May. 10, 2021).\n41.Regulation (EU) 2016/679 (General Data Protection Regulation), Intersoft Consulting services AG, https://gdpr-info.eu/ (last visited: May. 10, 2021).\n42.ReputationDefender, https://www.reputationdefender.com/ (last visited: May. 9, 2021).\n43.Safe Shepherd, https://www.safeshepherd.com/ (last visited: May. 9, 2021).\n44.Section 230 Helps Search Engine Defeat “Right to Be Forgotten” Lawsuit–Mosha v. Yandex, Technology & Marketing Law Blog, https://blog.ericgoldman.org/archives/2019/10/section-230-helps-search-engine-defeat-right-to-be-forgotten-lawsuit-mosha-v-yandex.htm (last visited: Jun. 16, 2021).\n45.Sundar Pichai makes case for a potential move into China by saying Google already censors information elsewhere, CNBC, https://www.cnbc.com/2018/11/08/pichai-makes-case-for-move-into-china-says-google-censors-elsewhere.html (last visited: Jun. 9, 2021).\n46.Sundar Pichai of Google: ‘Technology Doesn’t Solve Humanity’s Problems’, The New York Times,  https://www.nytimes.com/2018/11/08/business/sundar-pichai-google-corner-office.html (last visited: Jun. 9, 2021).\n47.Symantec’s State of European Privacy Report in 2016, Symantec, https://www.slideshare.net/symantec/symantec-state-of-european-data-privacy (last visited: Apr. 7, 2021).\n48.The Challenges of Data Governance in EU: Two Years into GDPR, Management Events, https://managementevents.com/news/the-challenges-of-data-governance-in-eu-two-years-into-gdpr/ (last visited: Apr. 7, 2021).\n49.The Court of Justice invalidates Decision 2016/1250 on the adequacy of the protection provided by the EU-US Data Protection Shield, Court of Justice of the European Union, https://curia.europa.eu/jcms/upload/docs/application/pdf/2020-07/cp200091en.pdf (last visited: Jun. 9, 2021).\n50.The Realistic Lucrative Case of Ethereum Classic attack — Today, Husam ABBOUD, https://medium.com/@HusamABBOUD/the-realistic-lucrative-case-of-ethereum-classic-attack-with-1mm-today-8fa0430a7c25 (last visited: Feb. 21, 2021).\n51.The Story of JPMorgan’s Blockchain Initiative Quorum, DeFi Republic, https://defirepublic.com/jpmorgan-blockchain-initiative-quorum/ (last visited: May. 29, 2021).\n52.Time for trust: How blockchain will transform business and the economy, PwC, https://www.pwc.com/hu/en/kiadvanyok/assets/pdf/Time_for_Trust_The%20trillion-dollar_reasons_to_rethink_blockchain.pdf (last visited: Feb. 21, 2021).\n53.Structured vs. Unstructured Data, Datamation, https://www.datamation.com/big-data/structured-vs-unstructured-data/ (last visited: Jun. 9, 2021).\n54.Top 5 Privacy Services to Remove Information from the Internet, OneRep, https://onerep.com/blog/top-5-privacy-services-to-remove-information-from-the-internet (last visited: May. 9, 2021).\n55.The 80% Blind Spot: Are You Ignoring Unstructured Organizational Data?, Forbes Technology Council Post, https://www.forbes.com/sites/forbestechcouncil/2019/01/29/the-80-blind-spot-are-you-ignoring-unstructured-organizational-data/?sh=6c3c07f1211c (last visited: Jun. 9, 2021)\n56.Two German Killers Demanding Anonymity Sue Wikipedia’s Parent, The New York Times, https://www.nytimes.com/2009/11/13/us/13wiki.html (last visited: Jun. 16, 2021).\n57.The right to be forgotten - between expectations and practice, The European Union Agency for Cybersecurity (ENISA), https://www.enisa.europa.eu/publications/the-right-to-be-forgotten (last visited: Apr. 7, 2021).\n58.When a Politician Is Called a ‘Lousy Traitor,’ Should Facebook Censor It?, The New York Times Opinion, https://www.nytimes.com/2019/06/27/opinion/facebook-censorship-speech-law.html (last visited: Mar. 31, 2021).\n59.Why ConsenSys bought J.P. Morgan’s Quorum, DigFin, https://www.digfingroup.com/consensys-quorum/ (last visited: May. 29, 2021).\n 
描述: 碩士
國立政治大學
科技管理與智慧財產研究所
108364215
資料來源: http://thesis.lib.nccu.edu.tw/record/#G0108364215
資料類型: thesis
Appears in Collections:學位論文

Files in This Item:
File Description SizeFormat
421501.pdf9.5 MBAdobe PDF2View/Open
Show full item record

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.