Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/61477
題名: 行動應用軟體隱私保護標準研究
Study on Mobile Application Privacy Protection Standards
作者: 郭淑儀
Kuo, Shu Yi
貢獻者: 陳起行
Chen, Chi Shing
郭淑儀
Kuo, Shu Yi
關鍵詞: 資訊隱私
行動應用軟體
隱私標準
Information Privacy
Mobile Applications
Mobile Apps
Privacy Standards
日期: 2012
上傳時間: 1-Nov-2013
摘要: 行動應用軟體具備適地性、即時性、主動性,可以提供個人化的便利服務。智慧手機普及率上升,亦將帶動行動電子商務風潮,但是消費者對於隱私安全方面的顧慮,卻是推動之阻力。行動應用軟體暗藏隱私隱憂,可能輕易截取隱私資料,包括行動裝置代碼、帳號密碼、文字訊息、照片、影音、連絡資料、行事曆資料、歷史接聽紀錄、網路使用習慣、地理定位資料等。這些隱私資料是屬於我國個資法第二條「其他得以直接或間接方式識別該個人之資料」,為個資法保護之範圍。\n\n手機用戶隱私資訊外洩問題層出不窮,歐盟和美國之爭議案例頻仍,遂於近年陸續提出相關法案和隱私保護措施。歐盟為全方位式立法,著重政府主導功能;美國是部門式規範模式,尊重產業自律。為解決各國或國際組織之個資隱私保護規範不一致問題,透過信賴標章的產業自律規範,發展成為具有效力之民間保護標準,甚至是國家標準,進而與國際標準接軌,至少可為企業降低遵守法規所投入之成本。\n\n標準是可以用來捍衛國內產業競爭力,在國際市場競爭具有相當之重要性。國際標準組織的運作通常採共識決,強調嚴謹和透明化;需要在產業和政府支持下,累積國際標準制定經驗,長期堅持投入,始得取得領先主導標準之先機。最受到矚目的行動軟體隱私標準「不被追蹤」,因與廣告商利益衝突,W3C遲遲不能通過標準定案。在各國行動應用軟體隱私保護規範尚未完備之際,透過國際標準組織、區域組織和產業組織等自律發展,形成隱私保護標準,可彌補相關法令規範未及之處。\n\n建議自法規、隱私標準和隱私標章認證方面推動個資與隱私保護,朝向政府管制和產業自律併進之模式發展。國際行動應用軟體標準發展雖尚在萌芽階段,相關產業仍須密切關注。在科技推陳出新的時代中,個資和隱私保護法制總是趕不上科技變遷,為避免問題反覆發生,標準制定推動者、立法者和執法者皆需與時俱進。
Mobile applications featured with localization, instant responsiveness and proactivenss can provide convenient and personalized services. The widespread adoption of smart phones may drive the next wave of m-commerce(mobile e-commerce), and however, consumer privacy fears limit the growth of m-commerce.\n\nThere are concerns over privacy leaks that mobile applications can easily access to privacy-sensitive data, such as UDID, ID/password, text messages, photos, videos, address book, calendar, historical phone records, on-line behavior, geolocation, etc. The privacy information mentioned above should have been covered under Article 2 of Taiwan Personal Information Protection Act “other information which may be used to identify a natural person, both directly and indirectly”.\n\nIn response to the increasing privacy leaks in mobile devices and law disputes, privacy protection measures and regulations have been proposed or enforced these years in European Union countries and the United States. European Union establishes a comprehensive legislation focused on government-centric functions, while the United States uses a sectoral approach that relies on industry self-regulation. In order to solve the inconsistent privacy regulations within countries and international organizations, one effective way is to promote privacy seals certified through industry self-regulation, and furthermore, develop to be industry standards, and national standards in line with international standards, and that can at least help enterprises reduce costs for responses to the mandatory regulations.\n\nStandards can be a means to safeguard industrial competitiveness, and are considered to be critically important to outcompete international trade markets. International standard bodies normally use consensus-building process, highlighted with impartiality and transparency. With supports from industry and government on accumulating experiences in international standard setting, and long-term inputs in participation, aim at competing for market dominance. The catching debate over digital advertisers interests to nail down the long overdue Do Not Track standard continues at W3C. While awaiting privacy regulations for mobile applications, self-regulation can be developed within international standard bodies, regional organizations, industry consortia, and privacy protection standards can help patch up the inadequacy of existing regulations.\n\nIt is recommended to promote protection of personal data and privacy from aspects of regulations, privacy standards, and privacy seal certification, toward a model combined with government regulation and industry self-regulation. Mobile apps standards are still at the initiative stage, and therefore, the related industries should watch closely. Following by the advancement of technology with each passing day, personal data regulations and privacy laws are in danger of lagging behind technological change. In order to prevent recurring problems, standard setters, regulators, and executors should keep pace with the times.
參考文獻: 英文文獻\n1.Abdelmounaam Rezgui, Mourad Ouzzani, Athman Bouguettaya, Brahim Medjahed, Preserving Privacy in Web Services, Proceedings of the 4th international workshop on Web information and data management, November 2002\n2.Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, David Wagner, Android Permissions:User Attention, Comprehension, and Behavior, Proceedings of the Eighth Symposium on Usable Privacy and Security, July 2012\n3.Ali Grami and Bernadette H. Schell, Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges, Proceedings Second Annual Conference on Privacy, Security and Trust, October 13~15, 2004\n4.Andre Charland, Brian LeRoux, Mobile Application Development: Web vs. Native, Association for Computing Machinery, Volume 9, Issue 4, April 2011\n5.A standard for standards – Principles of standardization, http://www.bsigroup.com/Documents/standards/bs0-pas0/BSI-BS0-Standard-for-Standards-UK-EN.pdf, BSI Standards Publication, 2011\n6.Biometrics and Standards, ITU-T Technology Watch Report, December 2009\n7.Bob Toth, Putting the U.S. standardization system into perspective: new insights, StandardView Vol. 4, No. 4, December 1996\n8.D. Cracker , "Making standards the IETF Way" in ACM StandardView, Vol.1, No.1, September 1993\n9.David Wright, Should privacy impact assessments be mandatory?, Communications of the ACM , Volume 54 Issue 8, August 2011\n10.Davies, Simon,“Monitor: Extinguishing Privacy on the Information Superhighway”, Pan Macmillan, Sydney, 1996\n11.E-health Standards and Interoperability, ITU-T Technology Watch Report, April 2012\n12.Emre Yildirim, Mobile Privacy: Is There An App For That? On smart mobile devices, apps and data protection, 2012\n13.Hans Löhr, Ahmad-Reza Sadeghi, Marcel WinandySecuring the E-Health Cloud, IHI `10 Proceedings of the 1st ACM International Health Informatics Symposium, 2010\n14.Haris Hamidovic, JOnline: An Introduction to the Privacy Impact Assessment Based on ISO 223, ISACA, Volume 4, 2010, http://www.isaca.org/Journal/Past-Issues/2010/Volume-4/Pages/JOnline-An-Introduction-to-the-Privacy-Impact-Assessment-Based-on-ISO22307.aspx\n15.Heejin Lee, Sangjo Oh, The political economy of standards setting by newcomers:China’s WAPI and South Korea’s WIPI, Telecommunication Policy 32, ScienceDirect, 2008\n16.HL7 Europe Newsletter , May 2013\n17.Ian Reay, Scott Dick, and James Muller, A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations, Transactions on the Web (TWEB) , Volume 3 Issue 2, Article 6, April 2009\n18.Ivo Salmre, Writing Mobile Code: Essential Software Engineering for Building Mobile Applications, Addison-Wesley Professional, 2005\n19.John Martin Ferris, Privacy Impact Assessment, The ISO PIA Standard for Financial Services, Law, Governance and Technology Series , Volume 6, Springer Netherland, 2012\n20.Jonathan A. Morell and Selden Stewart, Standards Development for Information Technology: Best Practices for the United States, StandardView Vol. 4, No. 1, March 1996\n21.Kobayashi, M. and Takeda, K, Information retrieval on the web, ACM Computing Surveys (ACM Press) 32 (2), 2000\n22.Matthias Finkbeiner, Atsushi Inaba, Reginald Tan, Kim Christiansen, Hans-Jürgen Klüppel, The New International Standards for Life Cycle Assessment: ISO 14040 and ISO 14044, The International Journal of Life Cycle Assessment, Volume 11, Issue 2, March 2006\n23.Mobile Applications, ITU-T TechWatch Alert, 1, July 2009\n24.Robert M. Gellman, Can Privacy Be Requlated Effectively on a National Level? Thoughts on the Possible Need for International Privacy Rules, Villanova Law Review, Vol. 41, Iss. 1, Art. 2, 1996\n25.Robert P. Minch, Privacy Issues in Location-Aware Mobile Devices, Proceedings of the 37th Hawaii International Conference on System Sciences, 2004\n26.Ronald Dworkin, Liberty and Liberalism, In Taking Rights Seriously, Cambridge, NA:Harvard University Press, 1977\n27.Serge Egelman, Lorrie Faith Cranor, Abdur Chowdhury, An analysis of P3P-enabled web sites among top-20 search results, August 2006\n28.Shane Greenstein, Victor Stango, Standards and Public Policy, Cambridge University Press, 2007\n29.Shirley Chan, Heejin Lee, Sangjo Oh, An International Mobile Security Standard Dispute: From the Actor—Network Perspective, Designing Ubiquitous Information Environments: Socio-Technical Issues and Challenges, IFIP — The International Federation for Information Processing Volume 185, 2005\n30.Stephen T. Kent, Internet Privacy Enhanced Mail, Communications of the ACM , Volume 36 Issue 8, August 1993\n31.The Inadequacy of Self Regulation within the Internet Behavioral Advertising Industry, Brooklyn Journal of Corporate, Financial & Commercial Law, 7 Brook. J. Corp. Fin. & Com. L. 277, Fall 2012\n32.Warren and Brandeis,“The Right to Privacy”, Harvard Law Review, Vol. IV, December 15, 1890\n33.Warwick Ford, Advances in Public-key Certificate Standards, SIGSAC Review , Volume 13 Issue 3, July 1995\n\n中文文獻\n1.Web Services的應用與省思,鼎新電腦企業通電子報,第46期,2003年8月。\n2.刁仁國,淺論美國與歐盟《乘客姓名記錄(PNR)協議》對我國國境執法的啟示第一屆「國境安全與人口移動」學術研討會,2007年。\n3.立法院三讀通過「個人資料保護法」,法務部新聞稿,法務部法律事務司,2010年4月27日。\n4.行動上網將成主流,比PC革命更偉大,遠見雜誌2011年1月號 第295期。\n5.李兆國,標準制定組織及標準專利權之爭議,2003年12月。\n6.李震山,電腦處理個人資料保護法之回顧與前瞻,中正法學集刊第14期,2003年12月。\n7.周慧蓮,隱私標準保護爭議之國際化,月旦法學雜誌第104期,2004年1月。\n8.邱文聰,從資訊自決與資訊隱私的概念區分 - 評「電腦處理個人資料保護法修正草案」的結構性問題,月旦法學雜誌No.168,2009年5月。\n9.翁清坤,論個人資料保護標準之全球化,東吳法律學報第22卷第1期,2010年。\n10.財團法人工業技術研究院,經濟部商業交易安全認證前瞻技術研發與應用委外案 網路交易安全問題及企業應變架構之研究期末報告,2009年12月。\n11.財團法人中華民國國家資訊基本建設產業發展協進會,深入國際標準化組織,產業技術標準活絡及推廣委辦計畫,經濟部標準檢驗局,2009年6月。\n12.財團法人資訊工業策進會,符合W3C標準之網頁製作基本指引結構篇 - XHTML1.0,2006年10月。\n13.許孝萱,行動RFID私密性研究,2008年6月。\n14.陳起行,資訊隱私法理探討 - 以美國法為中心,政大法學評論,第64期,2000年12月。\n15.湯亦敏,標準制定組織之智慧財產保護政策及競爭法問題探討,2006年6月。\n16.葉英秋,論個人隱私與公共利益-以警察資料之取得與運用為中心,2008年。\n17.詹文男暨MIC研究團隊,2012資通訊產業發展十大趨勢,財團法人資訊工業策進會產業情報研究所(MIC),2012年。\n18.廖緯民,論搜尋引擎的隱私權威脅,月旦民商法雜誌第24期。\n19.劉靜怡,資訊隱私權保護的國際化爭議 – 從個資保護體制的規範到國際貿易規範的適用,月旦法學雜誌,第86期,2002年。\n20.劉靜怡,網際網路時代的資訊使用與隱私權保護規範:個人、政府與市場的拔河,資訊管理研究第四卷第三期,2002年11月。\n21.樊國禎、黃健誠,「後檯實名,前檯匿名」與隱私架構初探:根基於ISO/IEC 29100:2011-12-15 標準系列,網路通訊國家型科技計畫簡訊,第50期,2013年4月。\n22.蕭文生譯,關於「1983年人口普查法」之判決 - 聯邦憲法法院判決第65輯第1頁以下,西德聯邦憲法法院裁判選輯(一),司法院,1990年10月。\n\n中文網站部份\n1."金錢損失"和"隱私洩露" 網路安全亂象如何治?,解放日報,2013年2月13日,http://www.ce.cn/cysc/tech/07hlw/guonei/201302/13/t20130213_21336538.shtml。\n2.10萬隱私地雷!近三成Android應用程式越矩取個資,2012年11月5日 ,http://news.cnyes.com/Content/20121105/KFNV4RYTE6QW7.shtml。\n3.2012中華民國電子商務年鑑:環境篇,http://eccommerceenvironment.blogspot.tw/2012/11/blog-post_9665.html。\n4.BS 10012個資保護標準的10大實務作法,http://www.ithome.com.tw/itadm/article.php?c=62797&s=4。\n5.Continua Health Alliance,360°科技,2008年8月4日, http://www.digitimes.com.tw/tw/dt/n/shwnws.asp?CnlID=10&Cat=20&Cat1=&id=100637#ixzz2VE8jkR1D。\n6.Gartner選出2012年十大消費性無線行動應用,2009年12月24日, http://www.ctimes.com.tw/DispNews/tw/LBS/NFC/Gartner/0911241813BO.shtml。\n7.GSMA行動經濟報告:全球行動數據營收於2017年超越語音營收,數位時代網站,2012年2月26日, http://www.bnext.com.tw/article/view/cid/128/id/26698http://www.bnext.com.tw/article/view/cid/128/id/26698。\n8.LBS結合多元行動應用 再創「打卡」新商機,DIGITIMES中文網,2012年1月18日, http://www.digitimes.com.tw/tw/things/shwnws.asp?cnlid=15&cat=10&cat1=15&id=0000268484_MMX5XIBW715TLV5CCR8QW#ixzz2VKFekulW。\n9.TSM平台過關,五銀行卡位搶手機信用卡商機,MoneyDJ 財經知識庫,2013年1月24日,http://www.moneydj.com/kmdj/news/NewsViewer.aspx?a=81b2d9a1-786c-45a2-96b8-d08b5726b294#ixzz2cOJlNSuI。\n10.プライバシーマーク制度,http://privacymark.jp/privacy_mark/about/outline_and_purpose.html。\n11.中美就WAPI申請國際標準達成一致,2009年6月16日,http://news.mydrivers.com/1/137/137274.htm。\n12.王忠,美國網路隱私保護框架之啟示,中國科學基金第2期,頁99~100,http://pub.nsfc.gov.cn/sficcn/ch/reader/view_abstract.aspx?file_no=201302099&flag=1。\n13.加拿大與荷蘭指控WhatsApp侵犯個人隱私,2013年1月29日,http://www.ithome.com.tw/itadm/article.php?c=78611。\n14.行動支付產業鏈 安全環環相扣,2013年4月9日,http://www.informationsecurity.com.tw/article/article_detail.aspx?aid=7393。\n15.洪羿漣,透過認證標章減輕法律風險 因應個資規定 適法性最要緊,2012年9月3日, http://www.netadmin.com.tw/article_content.aspx?sn=1208280009\n16.面對個資風暴 善設資訊管理機制,DAF 2012 個資防護與網路安全應用研討會,2012年8月27日, http://www.digitimes.com.tw/tw/b2b/Seminar/shwnws_new.asp?CnlID=18&cat=99&product_id=051A10816&id=0000299295_IFS1RCXBL6BR1O4ZCN1QZ。\n17.個人資料保護法Q&A-從NFC手機談個人資料的管制(上),2011年10月1日,http://www.is-law.com/post/4/765;個人資料保護法Q&A-從NFC手機談個人資料的管制(中),2011年10月4日,http://www.is-law.com/post/4/766;個人資料保護法Q&A-從NFC手機談個人資料的管制(下),2011年10月7日,http://www.is-law.com/post/4/767。\n18.個資法兩階段施行,經建會網站,2012年10月24日,http://www.cepd.gov.tw/m1.aspx?sNo=0017751&ex=2。\n19.個資法通過 誰有可能成為受惠產業?資安人科技網,2010年6月28日, http://www.informationsecurity.com.tw/article/article_detail.aspx?aid=5786。\n20.財團法人台灣網路資訊中心,2011年IETF第82次台北會議活動說明書, http://www.ietf82.tw/2011_IETF82_Taipei-final-chn.pdf,2011年。\n21.財團法人臺灣網路資訊中心新聞稿,2012年7月9日,http://www.twnic.net.tw/NEWS4/119.pdf。\n22.高易中,以Web技術建立跨行動平台APP, RUN!PC網站,2013年1月9日,http://www.runpc.com.tw/content/content.aspx?id=109324。\n23.許舜喨,以新修正個人資料保護法探討病歷資料之保護,2013年02月18日,http://www.ibmi.org.tw/client/ReportDetail.php?REFDOCTYPID=0lgfj8ve17pfj9w5&REFDOCID=0miejmapz7bntxai。\n24.國家資通安全會報,國際個資保護發展趨勢與標準規範,2012年4月,http://www.icst.org.tw/docs/Fup/%E8%AD%B0%E9%A1%8C%E4%B8%80%EF%BC%9A%E5%9C%8B%E9%9A%9B%E5%80%8B%E8%B3%87%E4%BF%9D%E8%AD%B7%E7%99%BC%E5%B1%95%E8%B6%A8%E5%8B%A2%E8%88%87%E6%A8%99%E6%BA%96%E8%A6%8F%E7%AF%84-%E6%9B%B4%E6%96%B0%E7%89%88.pdf。\n25.許多安卓手機軟體 竊用戶隱私,中央社,2013年3月16日,http://tw.news.yahoo.com/%E8%A8%B1%E5%A4%9A%E5%AE%89%E5%8D%93%E6%89%8B%E6%A9%9F%E8%BB%9F%E9%AB%94-%E7%AB%8A%E7%94%A8%E6%88%B6%E9%9A%B1%E7%A7%81-124426037--finance.html。\n26.虛實緊密結合的SoLoMo時代來臨,你準備好了嗎?http://emf.migosoft.com/case/case122.html。\n27.新版個資法預計10月正式上路,資訊工業策進會新聞中心,2012年8月8日,http://www.iii.org.tw/service/3_1_1_c.aspx?id=1037。\n28.運用個資遮罩,為重要個資穿上金鐘罩- 既保護個資,也讓作業流程不打結,2012年12月19日,http://www.ithome.com.tw/privacylaw/article/77886。\n29.廖珮君,TPIPAS開放輔導權 未來有機會成為國家標準?! 資安人,2012年10月8日, http://www.informationsecurity.com.tw/article/article_detail.aspx?aid=7087。\n30.簡榮宗,追蹤式廣告與個人資料保護的分界,台灣法律網,http://www.lawtw.com/article.php?template=article_content&area=free_browse&parent_path=,1,561,&job_id=186137&article_category_id=200&article_id=107773。\n\n英文網站部份\n1.A High Level Reference Architecture for Mobile Health, GSMA, March 29, 2012, http://www.gsma.com/connectedliving/wp-content/uploads/2012/03/mobilearchitectureinteractive241111.pdf\n2.Alex Simonelis, A Concise Guide to the Major Internet Bodies, Magazine Ubiquity, Feburary 2005, http://ubiquity.acm.org.autorpa.lib.nccu.edu.tw/article.cfm?id=1071915http://ubiquity.acm.org.autorpa.lib.nccu.edu.tw/article.cfm?id=1071915\n3.Anderson, Chris, The Long Tail, Wired Magazine, 12.10, October 2004, http://www.thelongtail.com/about.html \n4.Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper, On the deployment of Mobile Trusted Modules, http://sit.sit.fraunhofer.de/smv/publications/download/MTM_deployment_paper.pdf\n5.Apple Accused in Suit of Tracking IPad, IPhone User Location , April 26, 2011, http://www.bloomberg.com/news/2011-04-25/apple-accused-in-suit-of-tracking-ipad-iphone-user-location-1-.html\n6.Apple Beefs Up Privacy Protections In iOS 7, June13, 2013, http://www.mediapost.com/publications/article/202222/apple-beefs-up-privacy-protections-in-ios-7.html#ixzz2W4zRaWQr\n7.Apple Sneaks A Big Change Into iOS 5: Phasing Out Developer Access To The UDID, August 19, 2011, http://techcrunch.com/2011/08/19/apple-ios-5-phasing-out-udid/\n8.Armin Hornung, Gleb Krivosheev, Noor Singh, Jeff Bilger, Standards War, CSEP 590A: History of Computing, Autumn 2006, http://www.cs.washington.edu/education/courses/csep590/06au/projects/standards-wars.pdf\n9.Bill would put mobile app vendors on the hook for privacy in US, May 10, 2013, http://www.computerworlduk.com/news/networking/3446597/bill-would-put-mobile-app-vendors-on-the-hook-for-privacy/\n10.Boris Segalis, Mobile Location Privacy Opinion Adopted by Europe’s WP29, May 19, 2011, http://www.infolawgroup.com/2011/05/articles/data-privacy-law-or-regulation/mobile-location-privacy-opinion-adopted-by-europes-wp29/\n11.CEN BOSS(Business Operations Support System), http://www.cen.eu/boss/supporting/Guidance%20documents/GD026%20-%20Standards%20and%20Regulations/Pages/default.aspxhttp://www.ithome.com.tw/itadm/article.php?c=78611\n12.Chantal Tode, FTC wants mobile firms to do more to protect consumer privacy, February 5, 2013, http://www.mobilemarketer.com/cms/news/legal-privacy/14723.html\n13.Chris Brook, FTC Endorses New Privacy Guidelines, Do Not Track for Mobile Apps, Devices, February 4, 2013 , http://threatpost.com/ftc-endorses-new-privacy-guidelines-do-not-track-mobile-apps-devices-020413/\n14.http://clicktoverify.truste.com/pvr.php?page=validate&url=www.travelzoo.com&sealid=102&lang=zh-tw \n15.Cloud Security Alliance Announces Key Initiative in Development of Cloud Security Standards in Partnership with ISO/IEC, 2011 CSA Press Release, April 20, 2011, https://cloudsecurityalliance.org/csa-news/key-initiative-in-development-of-cloud-security-standards-in-partnership-with-isoiec/\n16.Colin Bennett, An International Standard for Privacy Protection: Objections to the Objections, Jurisdiction II: Global Networks/Local Rules, Internet Law and Policy Forum, September 11~12, 2000, http://www.ilpf.org/events/jurisdiction2/presentations/bennett_pr/#f2\n17.Colleen Frye, A look at the W3C’s mobile Web application best practices, January 2011, http://searchsoa.techtarget.com/tip/A-look-at-the-W3Cs-mobile-Web-application-best-practices\n18.Daneil Castro, Benefits and Limitations of Industry Self-Regulation for Online Behavioral Advertising, The Information Technology & Innovation Fundation, December 2011, http://www.ntia.doc.gov/files/ntia/2011-self-regulation-online-behavioral-advertising.pdf\n19.Durlak, Jerry, “Privacy and Security”, Communication for Tomorrow, http://renda.colunato. yorku.ca/com4tomo/1296.html\n20.European data protection authorities publish their joint opinion on mobile apps, Press Release, ARTICLE 29 DATA PROTECTION WORKING PARTY, 14 March, 2013, http://ec.europa.eu/justice/data-protection/article-29/press-material/press-release/art29_press_material/20130314_pr_apps_mobile_en.pdf\n21.First California lawsuit over mobile privacy issues crashes, May14, 2013, http://www.computerworlduk.com/news/public-sector/3447146/first-california-lawsuit-over-mobile-privacy-issues-crashes/?intcmp=rel_articles;ntwrkng;link_1\n22.First FTC Privacy Action Against Mobile App Publisher Alleging COPPA Violation Results in $50,000 Settlement, August 2011, http://digilaw.edwardswildman.com/blog.aspx?entry=3813 15\n23.FTC Staff Issues Privacy Report, Offers Framework for Consumers, Businesses, and Policymakers, December 1, 2010, http://www.ftc.gov/opa/2010/12/privacyreport.shtm\n24.FTC Staff Report Recommends Ways to Improve Mobile Privacy Disclosures, Released by FTC, Feburary 1, 2013, http://www.ftc.gov/opa/2013/02/mobileprivacy.shtm\n25.Galen Gruman, http://www.infoworld.com/d/mobile-technology/3-easy-steps-more-secure-iphone-or-ipad-204930, October 16, 2012\n26.Gartner Highlights Top Consumer Mobile Applications and Services for Digital Marketing Leaders, October 11, 2012, http://www.gartner.com/newsroom/id/2194115\n27.Geolocation API Specification, http://dev.w3.org/geo/api/spec-source.html#security\n28.Geolocation Privacy Legislation, April 10, 2013, http://www.gps.gov/policy/legislation/gps-act/\n29.GlobalPlatform and TCG to work on mobile security standards, July 3, 2012 http://www.nfcworld.com/2012/07/03/316640/globalplatform-and-tcg-to-work-on-mobile-security-standards/\n30.Google Calls for International Standards on Internet Privacy, September 15, 2007, http://www.washingtonpost.com/wp-dyn/content/article/2007/09/13/AR2007091302248.html\n31.Hannes Tschofenig, Henning Schulzrinne, Andrew Newton, Jon Peterson, Allison Mankin, Siemens Networks GmbH Co KG, The IETF Geopriv and Presence Architecture Focusing on Location Privacy, October 18, 2006, http://www.w3.org/2006/07/privacy-ws/papers/26-tschofening-geopriv/\nHans J. Kleinsteuber, Self-regulation, Co-regulation, State Regulation, http://www.osce.org/fom/13844\n34.How Mobile Apps are Invading Your Privacy Infographic, May 31, 2012, http://www.veracode.com/blog/2012/05/how-mobile-apps-are-invading-your-privacy-infographic/\n35.How secure is your personal health information? ISO provides guidelines for health care organizations, ISO news, September 29, 2004, http://www.iso.org/iso/home/news_index/news_archive/news.htm?refid=Ref934\n36.http://ec.europa.eu/justice/data-protection/document/international-transfers/binding-corporate-rules/index_en.htm \n37.http://en.wikipedia.org/wiki/Privatus\n38.http://isotc.iso.org/livelink/livelink?func=ll&objId=8862396&objAction=browse&sort=name\n39.http://standards.ieee.org/develop/\n40.http://uddi.xml.org\n41.http://welcome.hp.com/country/tw/zh/privacy/p3p_popup.html\n42.http://www.bsigroup.tw/;http://www.bsigroup.com\n43.http://www.cgmopen.org\n44.http://www.dcml.org\n45.http://www.ehealth.scot.nhs.uk/\n46.http://www.gs1tw.org/twct/web/gs1_wordshowdetail.jsp?MID=DT200606068\n47.http://www.gsma.com\n48.http://www.hl7.org.tw/about.htm\n49.http://www.hl7.org/implement/standards/index.cfm?ref=nav\n50.http://www.hl7.org/implement/standards/nocost.cfm\n51.http://www.ietf.org\n52.http://www.iso.org\n53.http://www.iso.org/iso/home/standards_development/list_of_iso_technical_committees/jtc1_home/jtc1_sc37_home.htm\n54.http://www.itu.int\n55.http://www.itu.int/en/ITU-T/about/groups/Pages/sg17.aspx\n56.http://www.legalxml.org\n57.http://www.mefmobile.org/about-mef\n58.http://www.mefmobile.org/activities-and-analytics/analytics/global-privacy-survey-2013\n59.http://www.mefmobile.org/Regions/north-america/MEF_NA_mcommerce_Steering_Committee/ASC_X9\n60.http://www.mefmobile.org/Regions/north-america/MEF_NA_mcommerce_Steering_Committee/webinar-driving-mobile-security-standards-in-m-commerce\n61.http://www.oasis-pki.org/\n62.http://www.rsa.com/rsalabs/node.asp?id=2306\n63.http://www.tpipas.org.tw\n64.http://www.truste.com/consumer-privacy/about-oba/\n65.http://www.trustedcomputinggroup.org/about_tcg\n66.http://www.w3.org/\n67.http://www.w3.org/2005/10/Process-20051014/tr\n68.http://www.w3.org/TR/mwabp/\n69.http://www.w3.org/TR/ws-arch/#whatis\n70.https://cloudsecurityalliance.org/research/mobile/\n71.https://www.oasis-open.org\n72.https://www.pcisecuritystandards.org\n73.https://www.x9.org/about/\n74.Industry Renews Plea To Keep "Do Not Track" Off By Default, April 29, 2013, http://www.adexchanger.com/online-advertising/industry-renews-plea-to-set-do-not-track-off-by-default/ \n75.Inside iOS 5: privacy change kills app developers` access to UDID, 19 August, 2011, http://appleinsider.com/articles/11/08/19/inside_ios_5_privacy_change_kills_app_developers_access_to_udid\n76.ISO 22857:2004, http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=36522\n77.ISO/IEC 15944-8:2012(E) Information technology — Business Operational View — Part 8: Identification of privacy protection requirements as external constraints on business transactions, first edition 2012/04/01\n78.ISO/IEC 24745:2011, http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=52946\n79.ISO/IEC 24760, first Edition 2011/12/15, http://webstore.iec.ch/preview/info_isoiec24760-1%7Bed1.0%7Den.pdf\n80.ISO/IEC 24760-1:2011, http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=57914\n81.ISO/IEC 27018, http://www.iso27001security.com/html/27018.html\n82.ISO/IEC 29100:2011, http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=45123\n83.ISO/IEC 29176 Information technology — Mobile item identification and management — Consumer privacy-protection protocol for Mobile RFID services, first edition 2011/10/15\n84.ISO/IEC 29176:2011, http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=45255\n85.ISO/IEC 29187-1 ed1.0, Information technology -- Identification of privacy protection requirements pertaining to learning, education and training (LET) -- Part 1: Framework and reference model\n86.ISO/IEC 29187-1:2013, http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=45266\n87.ISO/IEC Directives Supplement — Procedures specific to JTC 1, First edition, 2010\n88.ISO/IEC Directives, Part 1, Ninth edition, 2012, http://www.iec.ch/members_experts/refdocs/iec/isoiecdir-1%7Bed9.0%7Den.pdf\n89.ISO/IEC JTC 1/SC 6 Telecommunications and information exchange between systems\n90.ISO/TC 68 Financial services, http://www.iso.org/iso/iso_technical_committee.html?commid=49650\n91.ISO/TR 12859:2009, http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=52052\n92.ISO/TS 13582:2013, http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=54037\n93.ISO/TS 21547:2010, http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=44479\n94.ISO/TS 25237:2008, http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=42807\n95.Jason Cipriani, How to control Your Privacy Settings on iOS 6, http://howto.cnet.com/8301-11310_39-57507698-285/how-to-control-your-privacy-settings-on-ios-6/, September 19, 2012\n96.Jim Brock, Do Not Track arrives for mobile apps, courtesy of Apple and Google (really) , September 27, 2012 , http://blog.privacychoice.org/2012/09/27/do-not-track-arrives-for-mobile-apps-courtesy-of-apple-and-google-really/\n97.John J. Altorelli and Amy L. Rosenberg , California Enacts Nation’s First State Online Privacy Protection Act, December 2003, http://www.paulhastings.com/Resources/Upload/Publications/256.pdf\n98.Kai Rannenberg , A framework for identity management (ISO/IEC 24760) , Mobile Business & Multilateral Security, June 2006, http://fg-secmgt.gi.de/fileadmin/gliederungen/fb-sec/Workshops_neu/WS_2012-06_IdentityMgmt/6_Rannenberg_framework_for_identity_management.pdf\nKaty Bachman, What Exactly Does `Do Not Track` Mean? Digital Advertising Alliance is fighting misinformation, May 6, 2013, http://www.adweek.com/news/technology/what-exactly-does-do-not-track-mean-149149\n99.Location-based mobile services are profiting but need to do more to ease privacy fears, March 22, 2013, http://www.computerworlduk.com/news/mobile-wireless/3346389/location-based-mobile-services-are-profiting-but-need-ease-privacy-fears/\nMathew J. Schwartz, W3C Proposes Do Not Track Privacy Standard, November 14, 2011, http://www.informationweek.com/security/privacy/w3c-proposes-do-not-track-privacy-standa/231902974\n100.MEF joins ASC X9 to develop essential standards for advancing Mobile Commerce (M-Commerce) in the US, May 10, 2011, http://www.mefmobile.org/News/mef-news/21/mef-joins-asc-x9-to-develop-essential-standards-for-advancing-mobile-commerce-m-commerce-in-the-us\n101.MEF launches App Privacy Initiative to build Consumer Trust around User Data Collection , April 25, 2012, http://www.mefmobile.org/News/mef-news/197/mef-launches-app-privacy-initiative-to-build-consumer-trust-around-user-data-collection\n102.MEF tackles Mobile Threats and Security implications as next phase of its m-Commerce Initiative, May 14, 2012, http://internetretailing.net/2012/05/mef-tackles-mobile-threats-and-security-implications-as-next-phase-of-its-m-commerce-initiative/\n103.Mike Clendenin, ISO rejects China`s WLAN standard, December 3, 2006, http://www.eetimes.com/electronics-news/4059133/ISO-rejects-China-s-WLAN-standard\n104.Minutes of JTC1 Ad Hoc Meeting, January 19, 2012, https://mentor.ieee.org/802.11/dcn/12/11-12-0199-00-0jtc-jacksonville-minutes-jan-2012.doc\n105.Mobile and Privacy, GSM Association 2012, February 2012, http://www.gsma.com/publicpolicy/wp-content/uploads/2012/03/gsmaprivacydesignguidelinesformobileapplicationdevelopmentv1.pdf\nMobile App Developers: Start with Security, February 2013,\n http://business.ftc.gov/documents/bus83-mobile-app-developers-start-security\n106.Mobile Apps Developer Settles FTC Charges It Violated Children`s Privacy Rule, August 15, 2011, http://www.ftc.gov/opa/2011/08/w3mobileapps.shtm\n107.Mobile Privacy Disclosures:Building Trust Through Transparency , FTC Staff Report, February 2013, http://www.ftc.gov/os/2013/02/130201mobileprivacyreport.pd\n108.Mobile Web Standards (OMA, BONDI, GSMA OneAPI, HTML5), https://developer.att.com/developer/tierNpage.jsp?passedItemId=2400412\n109.Opinion 02/2013 on apps on smart devices, ARTICLE 29 DATA PROTECTION WORKING PARTY, Adopted on February27, 2013, http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp202_en.pdf\n110.P3P and Privacy:An Update for the Privacy Community, March 2009, http://www.ipc.on.ca/images/Resources/p3p.pdf\n111.Paper, Plastic... or Mobile? An FTC Workshop on Mobile, March 2013, Paymentshttp://www.ftc.gov/os/2013/03/130306mobilereport.pdf\n112.Pareto principle, http://www.businessdictionary.com/definition/Pareto-principle.html\n113.PCI Mobile Payment Acceptance Security Guidelines for Developers, September 2012, https://www.pcisecuritystandards.org/documents/Mobile_Payment_Security_Guidelines_Developers_v1.pdf\n114.PCI Security Standards Council Releases Gudiance for Merchants on Mobile Payment Acceptance Security, February 14, 2013, https://www.pcisecuritystandards.org/pdfs/13_02_13_Mobile_Press_Release.pdf\n115.Peter Fleischer , The need for global privacy standards, September 14, 2007, http://portal.unesco.org/ci/fr/files/25452/11909026951Fleischer-Peter.pdf/Fleischer-Peter.pdf\n116.Privacy Requirements for Mobile Services, Approved Version 1.0.1 – 07 Aug 2007, http://technical.openmobilealliance.org/technical/release_program/docs/Privacy/V1_0-20070807-A/OMA-RD-Privacy-V_1_0_1-20070807-A.pdf\n117.Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), Brussels, 25.1.2012, COM(2012) 11 final, http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf\n118.Rockefeller Reintroduces, Do Not Track Act Privacy heats up again in Congress , Febuary 28, 2013, http://www.adweek.com/news/technology/rockefeller-reintroduces-do-not-track-act-147610\n119.Ron Kim, Trusted Platform Module and Privacy:Promises and Limitations, http://www.cs.auckland.ac.nz/compsci725s2c/archive/termpapers/skim.pdf\n120.Rajnish Tiwari1, Stephan Buse and Cornelius Herstatt, From Electronic to Mobile Commerce: Technology Convegence Enables Innovative Business Services, http://www.mobile-prospects.com/publications/files/E2M-Commerce.pdf\n121.Richard Santalesa , W3C Publishes Draft “Do-Not-Track” Standard, November 18, 2011, http://www.infolawgroup.com/2011/11/articles/privacy-law/w3c-publishes-draft-donottrack-standards/\n122.S. Thrum and Y. Kane, Your Apps are Watching You, Wall Street Journal, http://online.wsj.com/, 2010\n123.Scott Bradner, IETF Structure and Internet Standards Process, 62nd IETF, March 2005, http://www.ietf.org/newcomers.html\n124.Standards for Web Applications on Mobile: current state and roadmap, May 2012, http://www.w3.org/2012/05/mobile-web-app-state/\n125.The History of the Do Not Track Header, January 21, 2011, http://paranoia.dubfire.net/2011/01/history-of-do-not-track-header.html\n126.TECH SENSE: What “Do Not Track” Means for Advertisers, February 21, 2013, http://blog.pointroll.com/aducation/tech-sense-what-do-not-track-means-for-advertisers/ \n127.ITU-T Report, “Measuring and Reducing the Standards Gap” , December 4, 2009, http://itu.int/en/ITU-T/gap\n128.The Application Privacy, Protection, and Security (APPS) Act of 2013 (Discussion Draft), http://hankjohnson.house.gov/sites/hankjohnson.house.gov/files/documents/APPS_Act_Key_Provisions.pdf \n129.The APPS Act – a proposal to protect users’ mobile privacy, May 17, 2013, http://www.infosecurity-magazine.com/view/32482/the-apps-act-a-proposal-to-protect-users-mobile-privacy/\n130.The New Firefox Cookie Policy, Feburary 22, 2013, http://webpolicy.org/2013/02/22/the-new-firefox-cookie-policy/\n131.The Rise of China in Technology Standards: New Norms in Old Institutions, January 16, 2013, http://origin.www.uscc.gov/sites/default/files/Research/RiseofChinainTechnologyStandards.pdf\n132.Tracking Preference Expression (DNT), W3C Working Draft, April 30, 2013, http://www.w3.org/TR/2013/WD-tracking-dnt-20130430/\n133.United States of America (For the Federal Trade Commission), Plaintiff, v. Path, Inc., Defendant (United States District Court for the Northern District of California, San Francisco Division), Case No. C 13 0448, FTC File No. 122 3158, http://www.ftc.gov/opa/2013/02/path.shtm\n134.United States of America, Plaintiff v. W3 Innovations, LLC, also d/b/a Broken Thumbs Apps, and Justin Maples, individually and as an officer of W3 Innovations, LLC, Defendants (United States District Court for the Northern District of California) Case No. CV-11-03958-PSG, FTC File No. 102 3251, http://ftc.gov/os/caselist/1023251/\n135.US regulators probe mobile app developing firms over violation of children`s privacy, http://appdev.cbronline.com/news/us-regulators-probe-mobile-app-developing-firms-over-violation-of-childrens-privacy-111212, December 11, 2012\n136.W3C Workshop: Do Not Track and Beyond, November 26~27, 2012, http://www.w3.org/2012/dnt-ws/report\n137.Why Europe’s Do Not Track stance could spark a trade war, March 22, 2013, http://lastwatchdog.com/europes-track-stance-spark-trade-war/ \n138.http://www.sans.org/reading-room/whitepapers/privacy/comparison-online-privacy-seal-programs-685 \n139.Xinwen Zhang, Onur Acıiçmez, and Jean-Pierre Seifert, A Trusted Mobile Phone Reference Architecture via Secure Kernel, 2007, http://profsandhu.com/zhang/pub/zhang-stc07.pdf
描述: 碩士
國立政治大學
法學院碩士在職專班
99961011
101
資料來源: http://thesis.lib.nccu.edu.tw/record/#G0099961011
資料類型: thesis
Appears in Collections:學位論文

Files in This Item:
File SizeFormat
101101.pdf1.19 MBAdobe PDF2View/Open
Show full item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.