學術產出-學位論文

文章檢視/開啟

書目匯出

Google ScholarTM

政大圖書館

引文資訊

TAIR相關學術產出

題名 巨量資料與隱私權─個人資料保護機制的再思考
Big data and privacy: Rethinking personal data protection mechanisms
作者 鍾孝宇
Chung, Hsiao Yu
貢獻者 陳起行
Chen, Chi Shing
鍾孝宇
Chung, Hsiao Yu
關鍵詞 巨量資料
演算法
隱私權
個人主體性發展空間
公民社會
監控
監控資本主義
全景敞視治理
調控治理
個人資料保護機制
GDPR
日期 2017
上傳時間 13-九月-2017 14:56:49 (UTC+8)
摘要 本文主張,隱私是公民社會的構成元素,它保障個人在社會建構的形塑之下,保有日常行為實踐的能動性,得在自我自主經驗與社會建構的來回探索之間,生成個人的主體性。這個動態的主體性發展空間,使我們得以開拓環境中的意外發現並建立心智的批判獨立性,具備如此公民特質的社會,才有能力促進自我決定、創新、人際交往互動等實踐可能性,形塑健全的公民社會。

然而,巨量資料在數位環境中,正全面影響我們日常行為實踐的模式。巨量資料以統計相關性的知識論與方法論,形成不同的洞察與價值,其以資料驅動技術所辨識出的現象模式,建立其宣稱的客觀性優勢。巨量資料脈絡下的數位技術物,不僅是日常生活的輔助工具,而毋寧是我們個人感官的延伸,其精巧的影響我們與周遭世界的關係,積極介入、給予指示、引導行為,甚至定義我們的身分,調整、調控我們的行為。作為一種知識生產與治理模式,巨量資料的監控本質對於個人或群體所加諸的權力作用,將削弱個人主體性的發展空間,進而影響健全的公民社會發展,形成新型態的、難以察覺的隱私權侵害風險。並且,本文認為,商業監控結合監控資本主義邏輯的調控治理,對於公民社會的傷害更鉅。

面臨如此的風險,本文指出作為資訊社會產物的現行個人資料保護機制,無法回應數位環境中巨量資料隱私威脅的三個因素:個人資料性質的改變、告知與同意機制的失敗、資料汙染。並在奠基於隱私權的社會價值理論之上,提出三種原則性建議:巨量資料的應用倫理、巨量資料利用的正當程序原則、社會責任與自律規範。在原則性建議以外,亦將視角拉回我國的個人資料保護機制,參考歐盟一般資料保護規則的相關立法,建議我國應盡速設置專責之資料保護監管機構,並提供具體的個人資料保護規範修法方向:創設涵蓋資料保護影響評估的資料管理機制、建置組織內部資料利用監督機制、以及創設使用者的資料可攜權。
參考文獻 壹、 中文參考文獻

一、 書籍
江宜樺(2001),自由民主的理路,聯經。
李偉俠(2005),知識與權力:對科學主義的反思,揚智文化。
涂子沛(2013),大數據:數據革命如何改變政府、商業與我們的生活,香港中和。

二、 翻譯書
Aldous Lenrard Huxley著,黎陽譯(1973),美麗新世界,志文出版社。
Anthony Giddens著,簡惠美譯(1991),資本主義與現代社會理論:馬克思、涂爾幹、韋伯,遠流。
Michel Foucault著,劉北成、楊遠嬰譯(1992),規訓的懲罰:監獄的誕生,桂冠。
Herbert I. Schiller著,王怡紅譯(1996),思想管理者,遠流。
Andrew L. Shapiro著,劉靜怡譯(2001),控制權革命,臉譜出版。
Lawrence Lessig著,劉靜怡譯(2002),網路自由與法律,商周。
Erving Goffman著,徐江敏等譯(2011),日常生活中的自我表演,桂冠。
Eli Pariser著,宋瑛堂譯(2012),搜尋引擎沒告訴你的事,左岸文化。
Tim Wu著,顧佳、陳正芬、周佳欣譯(2013),誰控制了總開關?,行人文化。
Glenn Greenwald著,林添貴譯(2014),政府正在監控你:史諾登揭密,時報。
Christopher Steiner著,陳正芬譯(2014),演算法統治世界,行人文化實驗室。
城田真琴(Makoto Shirota)著,鐘慧真、梁世英譯(2014),Big Data 大數據的獲利模式:圖解‧案例‧策略‧實戰,經濟新潮社。
Viktor Mayer-Schönberger &Kenneth Cukier著,林俊宏譯(2014),大數據: 「數位革命」之後,「資料革命」登場:巨量資料掀起生活、工作和思考方式的全面革新,天下遠見文化,2版。
Viktor Mayor Schönberger著,林俊宏譯(2015),大數據:隱私篇─數位時代,「刪去」是必要的美德,遠見天下文化。
Nicholas Carr著,王年愷譯(2015),網路讓我們變笨?,貓頭鷹出版。
Manfred Spitzer著,李中文譯(2015),數位癡呆症:我們如何戕害自己和子女的大腦,暖暖書屋文化事業。
Robert Scheer著,林麗雪譯(2016),誰買走我的個資?,好優文化。
Bruce Schneier著,韓沁林譯(2016),隱形帝國,如果出版。
Nicholas Carr著,楊柳譯(2016),被科技綁架的世界,行人文化實驗室。
Marc Goodman著,林俊宏譯(2016),未來的犯罪,木馬文化。

三、 專書論文
林子儀,公共隱私權,載:第五屆馬漢寶講座論文彙編,頁7-62,2015年12月。
許華孚,大數據發展趨勢以及在犯罪防治領域之應用,載:刑事政策與犯罪研究論文集,頁341-376,2016年11月。

四、 期刊論文
翁望回、黃俊英、劉水深(1988),企業正當性之實證研究─社會責任的觀點,管理評論,第7卷,頁155-172。
廖緯民(1996),論資訊時代的隱私權保護─以「資訊隱私權」為中心,資訊法務透析,第8卷11期,頁20-27。
孫秀蕙(1998),台灣網際網路發展與問題初探,廣播與電視,第三卷4期,頁1-20。
陳起行(2000),資訊隱私權法理探討─以美國法為中心,政大法學評論,第64期,頁297-341。
劉靜怡(2002),網際網路時代的資訊使用與隱私權保護規範:個人、政府與市場的拔河,資訊管理研究,第四卷3期,頁137-161。
王振寰(2003),知識經濟時代的社會資本,科學發展,第362期,頁52-56。
許清琦、曾淑芬、劉靜怡、吳鴻喣(2003),公元二○一○年台灣網路化社會之發展策略,國家政策季刊,第二卷第1期,頁71-90。
陸洛(2003),人我關係之界定─「折衷自我」的現身,本土心理學研究,第20期,頁139-207。
曾國祥(2004),憲政主義與民主的衝突:美國政治思想的一個側面,政治與社會哲學評論,第11期,頁35-82。
胡憲倫、許家偉、蒲彥潁(2006),策略的企業社會責任:企業永續發展的新課題,應用倫理研究通訊,第40期,頁37-50。
李震山(2007),政府資訊公開法與資訊隱私權保障,研考雙月刊,第31卷3期,頁50-60。
黃朝盟、吳濟安(2007),電子化政府影響評估,研考雙月刊,第31卷1期,頁76-85。
邱文聰(2008),人權災難的開始─論「個人資料保護法」之修正,台灣人權促進會季刊,頁2-5。
廖緯民(2009),論搜尋引擎的隱私權威脅,月旦民商法雜誌,第24期,頁23-39。
魏文欽、莊怡萱(2009),企業社會責任、企業形象、消費者態度與行為意向關係之實證研究,International Journal of LISREL,第2卷2期,頁1-21。
劉平君(2011),資訊社會的解構實踐:Derrida、Foucault和Baudrillard的觀點,資訊社會研究,第20卷3期,頁83-108。
江玉林(2012),《性事的歷史‧卷一:求知的意志》導讀─傅柯的權力分析與對現代法學的權力批判,台灣法學雜誌,第207期,頁114-129。
劉定基(2013),析論個人資料保護法上「當事人同意」的概念,月旦法學雜誌,第218期,頁146-167。
翁清坤(2013),告知後同意與消費者個人資料之保護,臺北大學法學論叢,第87期,頁1-106。
呂宗學、蘇慧貞(2013),海量資料分析在醫療照護領域的應用,台灣醫學,第17卷6期,頁652-661。
鐘嘉德、柴惠珍、高崎均、曹元良(2015),我國大數據政策推動現況,國土及公共治理季刊,第3卷4期,頁77-84。
李榮耕(2015),科技定位監控與犯罪偵查:兼論美國近年GPS追蹤法制及實務之發展,臺大法學論叢,第44卷3期,頁871-969。
國發會經濟發展處(2015),ide@ Taiwan 2020(創意臺灣)政策白皮書,台灣經濟論衡,第13卷2期,頁17-44。
葉志良(2016),大數據應用下個人資料定義的檢討:以我國法院為例,資訊社會研究,第31卷,頁1-36。
曾龍(2016),大數據與巨量資料分析,科學發展月刊,524期,頁66-71。
許炳華(2016),大數據時代下隱私權之保護─可能之影響暨對策,興大法學,20期,頁129-191。
張心玲(2016),Open Data、Big Data等資料經濟發展現況與趨勢探討,電工通訊,第2季,頁16-28。
劉宗熹(2016),公務機關巨量資料分析應用推動簡介,政府機關資訊通報,第341期,頁5-13。
劉靜怡(2017),通訊監察與民主監督:歐美爭議發展趨勢之反思,歐美研究,第47卷1期,頁43-106。

五、 研討會論文
劉靜怡(2001),資訊社會的規範困境:台灣網際網路法律發展的歷史考察,第四屆資訊科技與社會轉型研討會,中央研究院社會學研究所。

六、 碩博士論文
藍培青(1997),隱私權在美國演進歷程之研究,淡江大學美國研究所博士論文。
詹文凱(1998),隱私權之研究,國立台灣大學法律學研究所博士論文。
林建中(1999),隱私權概念之再思考─關於概念範圍、定義及權力形成方法,國立台灣大學法律學研究所碩士論文。
簡榮宗(2000),網路上資訊隱私權保護問題之研究,東吳大學法律學系研究所。
劉得為(2008),個人資料庫的隱私保護─以我國戶籍制度為例,國立台灣大學法律學研究所碩士論文。
龔俊哲(2010),維基百科知識建構的正當化過程,南華大學社會學研究所碩士論文。
余瑞陞(2014),權利化的隱私─反思現代國家法律下的個人隱私,國立政治大學法律學研究所。
丁冠齊(2015),巨量資料與個人資料保護法之研究,世新大學法學院。

七、 官方資料
「歐盟及日本個人資料保護立法最新發展之分析報告」委託研究案成果報告,法務部。

八、 其他資料
司法院大法官釋字第585號解釋(2004)。
司法院大法官釋字第603號解釋(2005)。
許宗力、曾有田(2005),司法院大法官釋字第603號解釋協同意見書。
林子儀(2005),司法院大法官釋字第603號解釋協同意見書。
司法院大法官釋字第689號解釋(2011)。
台灣高等法院高雄分院,105年度上易字第604號判決。

九、 網頁資料
教育部異體字字典,http://dict2.variants.moe.edu.tw/variants/rbt/home.do。
教育部重編國語辭典修訂本,http://dict.revised.moe.edu.tw/cgi-bin/cbdic/gsweb.cgi?ccd=OZifKr&o=e0&sec=sec1&index=1。
國家教育研究院雙語詞彙、學術名詞暨辭書資訊網,http://terms.naer.edu.tw/detail/1304758/?index=3。
李科逸,網際網路時代個人隱私應如何保障?,http://www.thjh.ylc.edu.tw/t2/interlaw.htm。
高宣揚(2010),論消費文化與權力的交錯影響,愛思想,http://www.aisixiang.com/data/33591.html。
Bluxfox(2010),最近熱門的蘋果梗:永遠的1984,INSIDE,https://www.inside.com.tw/2010/05/27/1984-forever-apple。
呂紹玉(2013),看懂Data在說什麼,你就是下個有錢人!,商周.com,http://www.businessweekly.com.tw/article.aspx?id=5782&type=Blog。
David Carr著,陶夢縈、陳柳譯(2013),大數據在手,沒人比Netflix更了解觀眾,紐約時報中文網,https://cn.nytimes.com/business/20130301/c01carr/zh-hant/。
張進福(2014),大數據革命 匯流大未來,大數據匯流電子報,http://innobic.blogspot.com/2014/07/blog-post_8406.html。
朱小朱(2015),Citizen EX:斯諾登、蘇獨公投和沒有國家的人,豆瓣電影,https://movie.douban.com/review/7602712/。
Jewel(2015),巨量資料的時代,用「大、快、雜、疑」四字箴言帶你認識大數據,INSIDE 硬塞的網路趨勢觀察,https://www.inside.com.tw/2015/02/06/big-data-1-origin-and-4vs。
黃彥棻(2015),落實毛式三箭打造施政新藍圖 國發會成為數位政府大腦,iThome,http://www.ithome.com.tw/people/97634。
林妍溱(2016),Yahoo坦承兩年前遭駭客入侵,至少5億用戶帳號被竊,iThome,http://www.ithome.com.tw/news/108625。
高敬原(2016),Uber再爆隱私爭議!傳員工濫用權限,追蹤包括碧昂絲等名人乘車資訊,數位時代, https://www.bnext.com.tw/article/42306/uber-employees-tracking-celebrities-security-lawsuit。
蘇文彬(2016),Airbnb新隱私條款犯眾怒,中午緊急更正:臺灣用戶不屬中國,iThome,http://www.ithome.com.tw/news/109357。
辜騰玉(2016),政府大資料應用初步成果揭露,靠大資料預防犯罪再往前邁進一步,iThome,http://www.ithome.com.tw/news/103813。
李宣緯(2017),社群觀點-:大數據的陰暗面─談演算法的社會監理,FinTech Taiwan,http://fintechtaiwan.blogspot.tw/2017/03/blog-post.html。
黃哲斌(2017),為何網路像蝨子一樣咬我的背?──美好科技年代的四個恐怖故事,天下獨立評論,http://opinion.cw.com.tw/blog/profile/51/article/5520。
李寧怡(2017),Google和臉書 吸走全球2成廣告收入,蘋果日報, http://www.appledaily.com.tw/realtimenews/article/new/20170502/1109603/。
翁書婷(2017),王道銀行機器人理財服務將上線,投資門檻僅1,000元,數位時代,https://www.bnext.com.tw/article/44343/o-bank-robo-advisor-fintech。
張君豪(2017),警砸4千萬用eTag查車輛 刑事局:依法辦理,蘋果日報,http://www.appledaily.com.tw/realtimenews/article/new/20170424/1104598/。
何明諠(2017),舉國盡是潛在吸毒者:雲端科技打造的瘋狂驗尿小便斗,火箭科技評論,http://rocket.cafe/talks/81849。
廖緯民(2017),數位國家 個資法卻陷牛步,聯合報,https://udn.com/news/story/7339/2204810。
鍾孝宇(2017),發展數位國家,應同時保障公民隱私權,火箭科技評論,https://rocket.cafe/talks/82628。
回味1984!兩支蘋果電腦超經典廣告帶你重溫「賈伯斯精神」,癮科技,https://www.cool3c.com/article/68043。
陳昇瑋,資料科學往前看-從大數據到人工智慧,http://www.iis.sinica.edu.tw/~swc/talk/data_science_overview.html。
邱祐瑋,數據科學入門─讓數據思維成為生活的一部分,http://s.itho.me/techtalk/2017/20170116_datascience.pdf。
Google、Facebook 佔美數位廣告市場過半,商智謀略,https://www.bqjournal.com/google-facebook-command-51-per-cent-of-digital-display-advertising。
台北市 犯罪地圖(市民安心地圖),https://www.google.com/maps/d/viewer?mid=1O4CTdBEU7gSV8mZFPQN7Ykv5-Pc&hl=en_US。

貳、 英文參考文獻

一、 專書
Walker, John, (1761) A Critical Pronouncing Dictionary, And Expositor Of The English Language. London: G. G. J. and J. Robinson.
Stephen, James Fitzjames, (1873) Liberty, Equality, Fraternity. E-book: The Online Library Of Liberty.
Cooley, Thomas M., (1879) Treatise on the Law Of Torts or the Wrongs Which Arise Independent of Contract. Chicago: Callaghan.
T. H. Marshall, (1950) Citizenship and Social Class. London: The Cambridge University Press.
Imrie, John, (1960) The Burgh Court Book Of Selkirk: 1503-1545. Scottish Record Society.
Westin, Alan F., (1967) Privacy and Freedom. New York: Atheneum.
Rule, James B., (1974) Private Lives and Public Surveillance. London: Allen lane.
Gandy, Jr., Oscar H., (1993) The Panoptic Sort: A Political Economy Of Personal Information. Colorado: Westview Press.
Mcluhan, Marshall, (1994) Understanding Media: The Extensions Of Man. Cambridge, Massachusetts: The MIT Press.
Lyon, David, (1994) The Electronic Eye: The Rise Of Surveillance Society. Minneapolis: Polity Press.
Regan, Priscilla M., (1995) Legislating Privacy: Technology, Social Values, And Public Policy. London: The University of North Carolina Press.
Orwell, George, (2004) 1984. UK: Penguin.
Rössler, Beate, (2005) The Value of Privacy. Cambridge, UK: Polity Press.
Solove, Daniel J., (2009) Understanding Privacy. Cambridge, Massachusetts: Harvard University Press.
Pariser, Eli, (2011) The Filter Bubble: What the Internet Is Hiding From You, Newyork: The Penguin Press.
Payton, Theresa & Claypoole, Ted & Schmidt, Hon.Howard A., (2014) Privacy In The Age Of Big Data: Recognizing Threats, Defending Your Rights, And Protecting Your Family. Maryland: Rowman & Littlefield.
Richards, Neil, (2015) Intellectual Privacy: Rethinking Civil Liberties in the Digital Age. New York: Oxford University Press.
Ezrachi, Ariel & Stucke, Maurice E., (2016) Virtual Competition: The Promise and Perils of the Algorithm-Driven Economy. Cambridge, Massachusetts: Harvard University Press.
Sevignani, Sebastian, (2016) Privacy and Capitalism in the Age of Social Media. New York & London: Routledge.
David Vincent, (2016) Privacy: A Short History. Cambridge: Polity Press.
O’Neil, Cathy, (2016) Weapons Of Math Destruction: How Big Data Increases Inequality And Threatens Democracy. United States: Crown.

二、 專書論文
Diebold, Francis X., (2003) Big Data" Dynamic Factor Models for Macroeconomic Measurement and Forecasting: A Discussion of the Papers by Lucrezia Reichlin and by Mark W. Watson. Pp. 115-122 in Advances in Economics and Econometrics, Eighth World Congress of the Econometric Society edited by Mathias Dewatripont & Lars Peter Hansen & S.Turnovsky, Cambridge: Cambridge University Press.
Cate, Fred H., (2006) The Failure of Fair Information Practice Principles. Pp. 344-379 in Consumer Protection in the Age of the Information Economy, edited by Jane K. Winn, USA: Ashgate.
Holvast, Jan, (2009) History of Privacy. Pp. 13-42 in The Future of Identity in the Information Society: IFIP Advances in Information and Communication Technology, edited by Vashek Matyáš & Simone Fischer-Hübner & Daniel Cvrcek & Petr Švenda, Berlin: Springer.
Steeves, Valerie, (2009) Reclaiming the Social Value of Privacy. Pp. 191-208 in,: Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Network Society, edited by Valerie Steeves & Carole Lucock & Ian Kerr, Newyork: Oxford University Press.
Ohm, Paul, (2014) General Principles for Data Use and Analysis. Pp. 96-111 in Privacy, Big Data, and the Public Good: Frameworks for Engagement, edited by Julia Lane & Victoria Stodden & Stefan Bender & Helen Nissenbaum. New York: The Cambridge Press.
Forcese, Craig. (2015) Law, Logarithes, and Liberties: Legal Issues Arising from CSE’s Metadata Collection Initiatives. Pp. 127-160 in Law, Privacy and Surveillance in Canada in The Post-Snowden Era, edited by Michael Geist. Canada: University of Ottawa Press.
Cate, Fred H., (2016) Big Data, Consent, and the Future of Data Protection. Pp. 1-19 in Big Data is Not A Monolith, edited by Cassidy R. Sugimoto & Hamid R. Ekbia & Michael Mattioli. London & Cambridge, Massachusetts: The MIT Press.

三、 期刊論文
Warren, Samuel D. and Brandeis, Louis D., (1890) The Right to Privacy, Harvard Law Review 4: 193-220.
Prosser, William L., (1960) Privacy, California Law Review 48: 383-423.
Bloustein, Edward J., (1964) Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser, New York University Law Review 39; 962-1007.
Reiman, Jeffrey H., (1976) Privacy, Intimacy, and Personhood, Philosophy & Public Affairs 6: 26-44.
Winner, Langdon, (1980) Do Artifacts Have Politics, Modern Technology: Problem or Opportunity 109: 121-136.
Tilly, Charles, (1980) The Old New Social History and the New Old Social History, Csro Working Paper 218: 1-50.
Parent, W. A., Privacy, (1983) Morality, and the Law, Philosophy & Public Affairs 12: 269-288.
BeVier, Lillian R., Information about Individuals in the Hands of Government: Some Reflections on Mechanisms for Privacy Protection, (1995) William & Mary Bill of Rights Journal 4: 455-506.
Haggerty, Kevin D. and Ericson, Richard V., (2000) The surveillant Assemblage, BRIT. J. SOC 51, 605-622.
Cohen, Julie E., (2000) Examined Lives: Information Privacy and the Subject as Object, Stanford Law Review 52: 1373-1438.
Solove, Daniel J., (2006) A Taxonomy of Privacy, University of Pennsylvania Law Review 154: 477-560.
Balkin, Jack M., (2008) The Constitution in the National Surveillance State, Minnesota Law Review 93:1-25.
Cate, Fred H. (2008) Government Data Mining: The Need for A Legal Framework, Harvard Civil Rights-Civil Liberties Law Review 43: 435-489.
Ohm, Paul, (2010) Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, UCLA Law Review 57: 1701-1777.
Caluya, Gilbert, (2010) The Post-Panoptic Society? Reassessing Foucault in Surveillance Studies, Social Identities 16: 621-633.
Schwartz, Paul M. and Solove, Daniel J. (2011) The PII Problem: Privacy and A New Concept of Personally Identifiable Information, New York University Law Review 86: 1814-1894.
Cheney-Lippold, John, (2011) A New Algorithmic Identity: Soft Biopolitics and the Modulation of Control, THEORY, CULTURE & SOCIETY 28, 164-181.
Boyd, danah, and Crawford, Kate (2012) Critical Questions for Big Data, Information, Communication & Society 15:5: 662-679.
Calo, M. Ryan, (2012) Against Notice Skepticism in Privacy (and Elsewhere), Notre Dame Law Review 87: 1027-1072.
Fan, Wei and Bifet, Albert, (2012) Mining Big Data: Current Status, and Forecast to the Future, ACM SIGKDD Explorations Newsletter 14: 1-5.
Diebold, Francis X., (2012) On The Origin(s) and Development of the Term "Big Data", Working Paper: 1-6.
Davenport, Thomas H., and Patil, D.J., (2012) Data Scientist: The Sexiest Job of the 21st Century, Harvard Business Review 90: 70-76.
Krishnan, S. Shunmuga and Sitaraman, Ramesh K., (2013) Video Stream Quality Impacts Viewer Behavior: Inferring Causality Using Quasi-Experimental Designs, IEEE/ACM Transactions on Networking 21: 2001-2014.
Cate, Fred H. and Mayer-Schönberger, Viktor, (2013) Notice and Consent in A World of Big Data, International Data Privacy Law 3: 67-73.
Ohm, Paul, (2013) Branding Privacy, Minnesota Law Review 97:907-989.
Tene, Omer and Polonetsky, Jules, (2013) Big Data For All: Privacy and User Control in the Age of Analytics, Northwestern. Jouranl Technology and Intellectual Property 11: 239-273.
Rubinstein, (2013) Ira S., Big Data: The End of Privacy Or A New Beginning?, International Data Privacy Law 3 : 74-87.
Solove, Daniel J., (2013) Privacy Self-Management and the Consent Dilemma, Harvard Law Review 126: 1880-1903.
Waller, Matthew A. and Fawcett, Stanley E., (2013) Data Science, Predictive Analytics, and Big Data: A Revolution That Will Transform Supply Chain Design and Management, Journal of Business Logistics 34: 77-84.
Cohen, Julie E., (2013) What Privacy Is For, Harvard Law Review 126: 1904, 1933 .
Richards, Neil M., and King, Jonathan H., (2013) Three Paradoxes of Big Data, Stanford Law Review Online 66: 41-46.
Lerman, Jonas, (2013) Big Data and Its Exclusions, Stanford Law Review Online 66: 55-63.
kerr, Ian, and Earle, Jessica, (2013) Prediction, Preemption, Presumption: How Big Data Threatens Big Picture Privacy, Stanford Law Review Online 66: 65, 71.
Richards, Neil M., (2013) The Dangers of Surveillance, Harvard Law Review 126: 1934-1965.
Richards, Neil M., The Perils of Social Reading, The Georgetown Law Journal 101: 689-724.
Barnes, Trevor J, Big Data, Little History, Dialogues in Human Geography 3: 297-302.
Lazer, David and Kennedy, Ryan and King, Gary & Vespignani, Alessandro, (2014) The Parable of Google Flu: Traps in Big Data Analysis, Science 343: 1203-1205.
Richards, Neil and King, Jonathan H., (2014) Big Data Ethics, Wake Forest Law Review 49, 393-432.
Kitchin, Rob, (2014) The Real-Time City? Big Data and Smart Urbanism, Geojournal 79: 1-14.
Crawford, Kate, and Schultz, Jason, (2014) Big Data and Due Process: Toward A Framework to Redress Predictive Privacy Harms, Boston College Law Review 55: 93-128.
Citron, Danielle Keats, and Pasquale, Frank, (2014) The Scored Society: Due Process for Automated Predictions, Washington Law Review 89: 1-33.
Steeves, Valerie, and Regan, Priscilla, (2014) Young People Online and Social Value of Privacy, Journal of Information, Communication and Ethics in Society 12: 298-313.
Poulin, Chris, (2014) Big Data Custodianship in a Global Society, Sais Review of International Affairs 34: 109-1136.
Fairfield, Joshua A.T., and Engel, Christoph, (2015) Privacy as A Public Good, Duke Law Journal 65: 385, 457.
Reidenberg, Joel R. and Russell, N. Cameron and Callen, Alexander J., and Qasir, Sophia and Norton, Thomas B., (2015) Privacy Harms and the Effectiveness of the Notice and Choice Framework, A Journal of Law and Policy for the Information Society 11: 485-524.
Zuboff, Shoshana, Big Other: (2015) Surveillance Capitalism and the Prospects of an Information Civilization, Journal of Information Technology 30:75-89.
Mauro, Andrea De and Marco Greco and Grimaldi, Michele, (2015) What Is Big Data? A Consensual Definition and a Review of Key Research Topics, Aip Conference Proceedings 1644: 97-104.
Ferguson, Andrew G., (2015) Big Data and Predictive Reasonable Suspicion, University of Penn Law Review 163: 327-410.
Samuelson, Pamela, (2016) Freedom to Tinker, Theoretical Inquires in Law 17: 563- 600.
Campbell, D. Grant and Cowan, Scott R., (2016) The Paradox of Privacy: Revisiting a Core Library Value in an Age of Big Data and Linked Data, Library Trends 64: 492-511.
Rich, Michael, (2016) Machine Learning, Automated Suspicion Algorithms, and the Fourth Amendment, University of Penn Law Review 164: 871-929.

四、 其他資料
Griswold v. Connecticut, 381 U.S. 479 (1965).
Roe v. Wade, 410 U.S. 113 (1973).
Whalen v. Roe, 429 U.S. 589 (1977).
Cate, Fred H., and Cullen, Peter and Mayer-Schönberger, Viktor, (2014) Data Protection Principles for the 21st Century: Revising the 1980 OECD Guidelines.
European Commission, (2014) Towards A Thriving Data-Driven Economy. https://www.kowi.de/de/Portaldata/2/Resources/fp/2014-COM-Big-Data.pdf.
Podesta, John and Pritzker, Penny and Moniz, Ernest J. and Holdren, John and Zients, Jeffrey, (2014) Big Data: Seizing Opportunities, Preserving Values, Executive Office Of The President.
The Right to Privacy in the Digital Age, (2014) Report of the Office of the United Nations High Commissioner for Human Rights. http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf.
Big Data and Privacy: A Technological Perspective, Executive Office of the President. https://bigdatawg.nist.gov/pdf/pcast_big_data_and_privacy_-_may_2014.pdf.
Munoz, Cecilia and Smith, Megan and Patil, Dj, (2016) Big Data: A Report on Algorithmic Systems, Opportunity, and Civil Rights, Executive Office Of The President.
European Commission, (2016) Big Data and Data Analytics: The Potential for Innovation and Growth. http://www.europarl.europa.eu/RegData/etudes/BRIE/2016/589801/EPRS_BRI(2016)589801_EN.pdf.
Microsoft Corporation v. United States of America, No. 14-2985 (2d Cir. 2016).

五、 網頁資料
White, Gregory L. and Zimbardo, Philip G., (1975) The Chilling Effects of Surveillance: Deindividuation and Reactance, Stanford University, Office Of Naval Research. http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA013230.
Mashey, John, (1999) Big Data and the Next Wave of InfraStress Problems, Solutions, Opportunities, USENIX. https://www.usenix.org/conference/1999-usenix-annual-technical-conference/big-data-and-next-wave-infrastress-problems.
Sprenger, Polly, (1999) Sun on Privacy: “Get Over It”, Wired. https://www.wired.com/1999/01/sun-on-privacy-get-over-it/.
Doug Laney, (2001) 3-D Data Management: Controlling Data Volume, Velocity and Variety, Meta Group. http://blogs.gartner.com/doug-laney/deja-vvvue-others-claiming-gartners-volume-velocity-variety-construct-for-big-data/.
1984 Apple`s First Macintosh Commercial (2005). https://www.youtube.com/watch?v=OYecfV3ubP8.
Barnes, Susan B., (2006) A Privacy Paradox: Social Networking in the United States, Peer-Reviewed Journal On The Internet, First Monday 11. http://firstmonday.org/issues/issue11_9/barnes/index.html.
Anderson, Chris, (2008) The End of Theory: The Data Deluge Makes the deluge makes the scientific method obsolete, Wired. https://www.wired.com/2008/06/pb-theory/.
Mckinsey Global Institute, (2011) Big Data: The Next Frontier for Innovation, Competition, and Productivity. https://bigdatawg.nist.gov/pdf/MGI_big_data_full_report.pdf.
General Data Protection Regulation. http://eur-lex.europa.eu/eli/reg/2016/679/oj.
Lohr, Steve, (2012) How Big Data Became So Big, The New York Times. http://www.nytimes.com/2012/08/12/business/how-big-data-became-so-big-unboxed.html.
Lohr, Steve, (2012) The Age of Big Data, The New York Times. http://www.nytimes.com/2012/02/12/sunday-review/big-datas-impact-in-the-world.html.
Diebold, Francis X, (2012) On The Origin(s) and Development of the Term "Big Data", WORKING PAPER. https://economics.sas.upenn.edu/pier/working-paper/2012/origins-and-development-term-%E2%80%9Cbig-data.
Press, Gil, (2013) The OED, Big Data, and Crowdsourcing, What’S The Big Data?. https://whatsthebigdata.com/2013/08/17/the-oed-big-data-and-crowdsourcing/.
Lohr, Steve, (2013) The Origins of "Big Data": An Etymological Detective Story, Bits Blog. https://bits.blogs.nytimes.com/2013/02/01/the-origins-of-big-data-an-etymological-detective-story/.
Normandeau, Kevin, (2013) Big Data Volume, Variety, Velocity and Veracity, insideBIGDATA. http://insidebigdata.com/2013/09/12/beyond-volume-variety-velocity-issue-big-data-veracity/.
Leonard, Andrew, (2013) How Netflix Is Turning Viewers into Puppets, SALON. http://www.salon.com/2013/02/01/how_netflix_is_turning_viewers_into_puppets/.
Whltney, Lance, (2013) Vint Cerf: “Privacy May Be An Anomaly”, CNET. https://www.cnet.com/news/vint-cerf-privacy-may-be-an-anomaly/.
Felten, Edward, The New Freedom to Tinker Movement, Freedom to Tinker. https://freedom-to-tinker.com/2013/03/21/the-new-freedom-to-tinker-movement/.
Sullivan, John L., (2013) Uncovering The Data Panopticon: The Urgent Need for Critical Scholarship in an Era of Corporate and Government Surveillance, The Political Economy of Communication 1. http://www.polecom.org/index.php/polecom/article/view/23/192.
Kramer, Adam D I. and Guillory, Jamie E. and Hancock, Jeffrey T., (2014) Experimental evidence of massive-scale emotional contagion through social networks, PNAS 111. http://www.pnas.org/content/111/24/8788.full.
Rushe, Dominic, (2014) Facebook Sorry – Almost – For Secret Psychological Experiment on Users, Guardian. https://www.theguardian.com/technology/2014/oct/02/facebook-sorry-secret-psychological-experiment-users.
Marr, Bernard, (2015) How Big Data Is Changing Insurance Forever, Forbes. https://www.forbes.com/sites/bernardmarr/2015/12/16/how-big-data-is-changing-the-insurance-industry-forever/#7076ba6d289b.
Marr, Bernard, (2015) A Brief History of Big Data Everyone Should Read, BusinessIntelligence.com. https://businessintelligence.com/bi-insights/big-data-briefish-history-everyone-read/.
Noyes, Katherine, (2015) Scott McNealy on privacy: You still don’t have any, PCWorld. http://www.pcworld.com/article/2941052/scott-mcnealy-on-privacy-you-still-dont-have-any.html.
Chambers, Chris, (2015) The Psychology of Mass Government Surveillance: How Do the Public Respond and Is It Changing Our Behaviour? , Guardian. https://www.theguardian.com/science/head-quarters/2015/mar/18/the-psychology-of-mass-government-surveillance-how-do-the-public-respond-and-is-it-changing-our-behaviour.
Mcmullan,Thomas, (2015) What Does the Panopticon Mean in the Age of Digital Surveillance, The Guardian. https://www.theguardian.com/technology/2015/jul/23/panopticon-digital-surveillance-jeremy-bentham.
Lazer, David and Kennedy, Ryan, (2015) What We Can Learn from the Epic Failure of Google Flu Trends, Wired. https://www.wired.com/2015/10/can-learn-epic-failure-google-flu-trends/.
Schuster, Mike and Johnson, Melvin and Thorat, Nikhil, (2016) Zero-Shot Translation with Google’s Multilingual Neural Machine Translation System, Google Research Blog, https://research.googleblog.com/2016/11/zero-shot-translation-with-googles.html.
MCKINSEY GLOBAL INSTITUTE, (2016) The Age of Analytics: Competing in a Data-Driven World, Executive Summary. http://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/the-age-of-analytics-competing-in-a-data-driven-world.
Bellis, Rich, (2016) Six Very Clear Signs That Your Job Is Due to be Automated, Fast Company. https://www.fastcompany.com/3062739/six-very-clear-signs-that-your-job-is-due-to-be-automated.
Nutley, Michael, (2016) Privacy and Innovation Are Not Mutually Exclusive, CMO. http://www.cmo.com/features/articles/2016/10/31/privacy-and-innovation-are-not-mutually-exclusive.html#gs.MlhqfwQ.
Munn, Nathan, (2016) How Mass Surveillance Harms Societies and Individuals- and What You Can Do about It, CJFE. http://www.cjfe.org/how_mass_surveillance_harms_societies_and_individuals_and_what_you_can_do_about_it.
Zuboff, Shoshana, (2016) The Secrets of Surveillance Capitalism, Frankfurter Allgemeine. http://www.faz.net/aktuell/feuilleton/debatten/the-digital-debate/shoshana-zuboff-secrets-of-surveillance-capitalism-14103616.html.
Zook, Matthew and Barocas, Solon and boyd, danah and Crawford, Kate,
Keller E, Gangadharan SP, et al., (2017) Ten Simple Rules for Responsible Big Data Research. PLoS Comput Biol 13(3): e1005399. https://doi.org/10.1371/journal.pcbi.1005399.
Athey, Susan and Catalini, Christian and Tucker, Catherine, (2017) The Digital Privacy Paradox: Small Money, Small Costs, Small Talk, MIT SLOAN RESEARCH PAPER 5196-17: 1-26. https://ssrn.com/abstract=2916489.
Mikhail, Nader, (2017) Why Big Data Kills Businesses, Fortune. http://fortune.com/2017/02/28/why-big-data-kills-businesses/.
Knaus, Christopher, (2017) Federal Police Admit to Accessing Journalist`s Metadata Without a Warrant, Guardian. https://www.theguardian.com/australia-news/2017/apr/28/federal-police-admit-accessing-journalists-metadata-without-a-warrant.
The Guardian View on Big Data: The Danger ss Less Democracy, (2017) Guardian. https://www.theguardian.com/commentisfree/2017/feb/26/the-guardian-view-on-big-data-the-danger-is-less-democracy.
Cadwalladr, Carole, (2017) Revealed: How US Billionaire Helped to Back Brexit, Guardian. https://www.theguardian.com/politics/2017/feb/26/us-billionaire-mercer-helped-back-brexit.
Big Data Definitions, Nist Big Data Program. https://bigdatawg.nist.gov/.
By Bisk, What Is Big Data, Villanova University, https://www.villanovau.com/resources/bi/what-is-big-data/.
The Four Vs of Big Data, IBM. http://www.ibmbigdatahub.com/sites/default/files/infographic_file/4-Vs-of-big-data.jpg.
Soubra, Diya, The 3Vs That Define Big Data, Data Science Central. http://www.datasciencecentral.com/forum/topics/the-3vs-that-define-big-data.
Big Data and Business Analytics Revenues Forecast to Reach $150.8 Billion This Year, Led by Banking and Manufacturing Investments, According to IDC, IDC. http://www.idc.com/getdoc.jsp?containerId=prUS42371417.
50 Best Jobs in America, Glassdoor. https://www.glassdoor.com/List/Best-Jobs-in-America-LST_KQ0,20.htm.
Data Scientist’ Job Trends, Indeed. http://www.indeed.com/jobtrends/q-%22Data-Scientist%22.html.
Google Transparency Report. https://www.google.com/transparencyreport/. Microsoft Transparency Report. https://www.microsoft.com/en-us/about/corporate-responsibility/reports-hub.
Twitter Transparency Report. https://transparency.twitter.com/.
Facebook Transparency Report. https://govtrequests.facebook.com/.
Line Transparency Report. https://linecorp.com/en/security/article/92.
描述 碩士
國立政治大學
法律學系
101651059
資料來源 http://thesis.lib.nccu.edu.tw/record/#G1016510592
資料類型 thesis
dc.contributor.advisor 陳起行zh_TW
dc.contributor.advisor Chen, Chi Shingen_US
dc.contributor.author (作者) 鍾孝宇zh_TW
dc.contributor.author (作者) Chung, Hsiao Yuen_US
dc.creator (作者) 鍾孝宇zh_TW
dc.creator (作者) Chung, Hsiao Yuen_US
dc.date (日期) 2017en_US
dc.date.accessioned 13-九月-2017 14:56:49 (UTC+8)-
dc.date.available 13-九月-2017 14:56:49 (UTC+8)-
dc.date.issued (上傳時間) 13-九月-2017 14:56:49 (UTC+8)-
dc.identifier (其他 識別碼) G1016510592en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/112702-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 法律學系zh_TW
dc.description (描述) 101651059zh_TW
dc.description.abstract (摘要) 本文主張,隱私是公民社會的構成元素,它保障個人在社會建構的形塑之下,保有日常行為實踐的能動性,得在自我自主經驗與社會建構的來回探索之間,生成個人的主體性。這個動態的主體性發展空間,使我們得以開拓環境中的意外發現並建立心智的批判獨立性,具備如此公民特質的社會,才有能力促進自我決定、創新、人際交往互動等實踐可能性,形塑健全的公民社會。

然而,巨量資料在數位環境中,正全面影響我們日常行為實踐的模式。巨量資料以統計相關性的知識論與方法論,形成不同的洞察與價值,其以資料驅動技術所辨識出的現象模式,建立其宣稱的客觀性優勢。巨量資料脈絡下的數位技術物,不僅是日常生活的輔助工具,而毋寧是我們個人感官的延伸,其精巧的影響我們與周遭世界的關係,積極介入、給予指示、引導行為,甚至定義我們的身分,調整、調控我們的行為。作為一種知識生產與治理模式,巨量資料的監控本質對於個人或群體所加諸的權力作用,將削弱個人主體性的發展空間,進而影響健全的公民社會發展,形成新型態的、難以察覺的隱私權侵害風險。並且,本文認為,商業監控結合監控資本主義邏輯的調控治理,對於公民社會的傷害更鉅。

面臨如此的風險,本文指出作為資訊社會產物的現行個人資料保護機制,無法回應數位環境中巨量資料隱私威脅的三個因素:個人資料性質的改變、告知與同意機制的失敗、資料汙染。並在奠基於隱私權的社會價值理論之上,提出三種原則性建議:巨量資料的應用倫理、巨量資料利用的正當程序原則、社會責任與自律規範。在原則性建議以外,亦將視角拉回我國的個人資料保護機制,參考歐盟一般資料保護規則的相關立法,建議我國應盡速設置專責之資料保護監管機構,並提供具體的個人資料保護規範修法方向:創設涵蓋資料保護影響評估的資料管理機制、建置組織內部資料利用監督機制、以及創設使用者的資料可攜權。
zh_TW
dc.description.tableofcontents 第一章 緒論 1
第一節 問題意識與研究動機 1
第二節 研究範圍與方法 4
第一項 文獻研究 5
第一款 古典文獻研究 5
第二款 專書、論文、期刊、政府文件 5
第三款 網路文本 6
第二項 比較法研究 6
第三節 研究架構 6
第二章 巨量資料的定義、發展與應用模式 8
第一節 何謂巨量資料 8
第一項 巨量資料之字源與發展 8
第二項 巨量資料之定義 13
第一款 容量(volume) 14
第二款 速度(velocity) 15
第三款 多樣性(variety) 16
第四款 其他定義 17
第三項 巨量資料之發展現況 19
第一款 產業現況 19
第二款 各國政策發展現況 23
1. 美國 23
2. 歐盟 24
3. 我國 25
第二節 巨量資料的商業應用 26
第三節 巨量資料與公共治理 31
第一項 城市治理 32
第二項 醫療 33
第三項 犯罪預防 34
第三章 隱私與隱私權的社會價值 37
第一節 隱私及(資訊)隱私權的發展─歷史、概念與定義 37
第一項 隱私的歷史考察簡述與隱私權的起源 37
第一款 隱私的歷史考察簡述 37
第二款 隱私權的起源 40
第二項 隱私權的承認與概念形塑 43
第三項 資訊隱私權的提出 51
第四項 小結 53
第二節 隱私已死?─重探隱私權的價值 54
第一項 隱私與個人主體性發展「空間」 55
第二項 隱私的社會價值 61
第一款 隱私與民主體制 64
第二款 隱私與創新 66
第三款 隱私與人際交往互動 69
第三項 本文對於當代隱私權價值的理解 74
第四章 巨量資料監控對於隱私權的系統性挑戰 78
第一節 巨量資料的政府監控與商業監控 78
第一項 政府監控 78
第一款 公私部門相互交織的權力體系 83
第二款 監控作為治理技術的全面日常生活化 85
第三款 新型態的隱私侵害 88
1. 先發預測(preemptive predictions) 89
2. 資料歧視(data discrimination) 91
3. 錯誤分類(missorting) 95
第二項 商業監控 96
第一款 個人資料的價值與商品化 96
第二款 監控資本主義 98
第二節 知識、權力與看不見的社會傷害 104
第一項 「全景敞視」治理 105
第一款 自我監控的寒蟬效應 113
第二款 分類的客觀性迷思 116
第二項 超越「全景敞視」─調控治理 118
第一款 自我決定與民主體制 126
第二款 意外發現與創新 130
第五章 個人資料保護機制的再思考 134
第一節 現行個人資料保護機制因應巨量資料挑戰的困境 134
第一項 個人資料性質的改變 134
第二項 告知與同意機制的失敗 139
第三項 資料汙染 149
第二節 個人資料保護機制的再思考 150
第一項 巨量資料的應用倫理 153
第二項 建立巨量資料利用的正當程序原則 158
第三項 社會責任與自律規範 162
第四項 我國個人資料保護機制之修正建議 165
第一款 盡速設置專責的資料保護監管機構 166
第二款 個人資料保護法的建議修正方向 169
1. 資料管理機制 169
2. 內部監督機制 171
3. 使用者自主權與資料可攜權 173
第六章 結論 175
參考文獻 178
壹、 中文參考文獻 178
貳、 英文參考文獻 185
zh_TW
dc.format.extent 3928672 bytes-
dc.format.mimetype application/pdf-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G1016510592en_US
dc.subject (關鍵詞) 巨量資料zh_TW
dc.subject (關鍵詞) 演算法zh_TW
dc.subject (關鍵詞) 隱私權zh_TW
dc.subject (關鍵詞) 個人主體性發展空間zh_TW
dc.subject (關鍵詞) 公民社會zh_TW
dc.subject (關鍵詞) 監控zh_TW
dc.subject (關鍵詞) 監控資本主義zh_TW
dc.subject (關鍵詞) 全景敞視治理zh_TW
dc.subject (關鍵詞) 調控治理zh_TW
dc.subject (關鍵詞) 個人資料保護機制zh_TW
dc.subject (關鍵詞) GDPRen_US
dc.title (題名) 巨量資料與隱私權─個人資料保護機制的再思考zh_TW
dc.title (題名) Big data and privacy: Rethinking personal data protection mechanismsen_US
dc.type (資料類型) thesisen_US
dc.relation.reference (參考文獻) 壹、 中文參考文獻

一、 書籍
江宜樺(2001),自由民主的理路,聯經。
李偉俠(2005),知識與權力:對科學主義的反思,揚智文化。
涂子沛(2013),大數據:數據革命如何改變政府、商業與我們的生活,香港中和。

二、 翻譯書
Aldous Lenrard Huxley著,黎陽譯(1973),美麗新世界,志文出版社。
Anthony Giddens著,簡惠美譯(1991),資本主義與現代社會理論:馬克思、涂爾幹、韋伯,遠流。
Michel Foucault著,劉北成、楊遠嬰譯(1992),規訓的懲罰:監獄的誕生,桂冠。
Herbert I. Schiller著,王怡紅譯(1996),思想管理者,遠流。
Andrew L. Shapiro著,劉靜怡譯(2001),控制權革命,臉譜出版。
Lawrence Lessig著,劉靜怡譯(2002),網路自由與法律,商周。
Erving Goffman著,徐江敏等譯(2011),日常生活中的自我表演,桂冠。
Eli Pariser著,宋瑛堂譯(2012),搜尋引擎沒告訴你的事,左岸文化。
Tim Wu著,顧佳、陳正芬、周佳欣譯(2013),誰控制了總開關?,行人文化。
Glenn Greenwald著,林添貴譯(2014),政府正在監控你:史諾登揭密,時報。
Christopher Steiner著,陳正芬譯(2014),演算法統治世界,行人文化實驗室。
城田真琴(Makoto Shirota)著,鐘慧真、梁世英譯(2014),Big Data 大數據的獲利模式:圖解‧案例‧策略‧實戰,經濟新潮社。
Viktor Mayer-Schönberger &Kenneth Cukier著,林俊宏譯(2014),大數據: 「數位革命」之後,「資料革命」登場:巨量資料掀起生活、工作和思考方式的全面革新,天下遠見文化,2版。
Viktor Mayor Schönberger著,林俊宏譯(2015),大數據:隱私篇─數位時代,「刪去」是必要的美德,遠見天下文化。
Nicholas Carr著,王年愷譯(2015),網路讓我們變笨?,貓頭鷹出版。
Manfred Spitzer著,李中文譯(2015),數位癡呆症:我們如何戕害自己和子女的大腦,暖暖書屋文化事業。
Robert Scheer著,林麗雪譯(2016),誰買走我的個資?,好優文化。
Bruce Schneier著,韓沁林譯(2016),隱形帝國,如果出版。
Nicholas Carr著,楊柳譯(2016),被科技綁架的世界,行人文化實驗室。
Marc Goodman著,林俊宏譯(2016),未來的犯罪,木馬文化。

三、 專書論文
林子儀,公共隱私權,載:第五屆馬漢寶講座論文彙編,頁7-62,2015年12月。
許華孚,大數據發展趨勢以及在犯罪防治領域之應用,載:刑事政策與犯罪研究論文集,頁341-376,2016年11月。

四、 期刊論文
翁望回、黃俊英、劉水深(1988),企業正當性之實證研究─社會責任的觀點,管理評論,第7卷,頁155-172。
廖緯民(1996),論資訊時代的隱私權保護─以「資訊隱私權」為中心,資訊法務透析,第8卷11期,頁20-27。
孫秀蕙(1998),台灣網際網路發展與問題初探,廣播與電視,第三卷4期,頁1-20。
陳起行(2000),資訊隱私權法理探討─以美國法為中心,政大法學評論,第64期,頁297-341。
劉靜怡(2002),網際網路時代的資訊使用與隱私權保護規範:個人、政府與市場的拔河,資訊管理研究,第四卷3期,頁137-161。
王振寰(2003),知識經濟時代的社會資本,科學發展,第362期,頁52-56。
許清琦、曾淑芬、劉靜怡、吳鴻喣(2003),公元二○一○年台灣網路化社會之發展策略,國家政策季刊,第二卷第1期,頁71-90。
陸洛(2003),人我關係之界定─「折衷自我」的現身,本土心理學研究,第20期,頁139-207。
曾國祥(2004),憲政主義與民主的衝突:美國政治思想的一個側面,政治與社會哲學評論,第11期,頁35-82。
胡憲倫、許家偉、蒲彥潁(2006),策略的企業社會責任:企業永續發展的新課題,應用倫理研究通訊,第40期,頁37-50。
李震山(2007),政府資訊公開法與資訊隱私權保障,研考雙月刊,第31卷3期,頁50-60。
黃朝盟、吳濟安(2007),電子化政府影響評估,研考雙月刊,第31卷1期,頁76-85。
邱文聰(2008),人權災難的開始─論「個人資料保護法」之修正,台灣人權促進會季刊,頁2-5。
廖緯民(2009),論搜尋引擎的隱私權威脅,月旦民商法雜誌,第24期,頁23-39。
魏文欽、莊怡萱(2009),企業社會責任、企業形象、消費者態度與行為意向關係之實證研究,International Journal of LISREL,第2卷2期,頁1-21。
劉平君(2011),資訊社會的解構實踐:Derrida、Foucault和Baudrillard的觀點,資訊社會研究,第20卷3期,頁83-108。
江玉林(2012),《性事的歷史‧卷一:求知的意志》導讀─傅柯的權力分析與對現代法學的權力批判,台灣法學雜誌,第207期,頁114-129。
劉定基(2013),析論個人資料保護法上「當事人同意」的概念,月旦法學雜誌,第218期,頁146-167。
翁清坤(2013),告知後同意與消費者個人資料之保護,臺北大學法學論叢,第87期,頁1-106。
呂宗學、蘇慧貞(2013),海量資料分析在醫療照護領域的應用,台灣醫學,第17卷6期,頁652-661。
鐘嘉德、柴惠珍、高崎均、曹元良(2015),我國大數據政策推動現況,國土及公共治理季刊,第3卷4期,頁77-84。
李榮耕(2015),科技定位監控與犯罪偵查:兼論美國近年GPS追蹤法制及實務之發展,臺大法學論叢,第44卷3期,頁871-969。
國發會經濟發展處(2015),ide@ Taiwan 2020(創意臺灣)政策白皮書,台灣經濟論衡,第13卷2期,頁17-44。
葉志良(2016),大數據應用下個人資料定義的檢討:以我國法院為例,資訊社會研究,第31卷,頁1-36。
曾龍(2016),大數據與巨量資料分析,科學發展月刊,524期,頁66-71。
許炳華(2016),大數據時代下隱私權之保護─可能之影響暨對策,興大法學,20期,頁129-191。
張心玲(2016),Open Data、Big Data等資料經濟發展現況與趨勢探討,電工通訊,第2季,頁16-28。
劉宗熹(2016),公務機關巨量資料分析應用推動簡介,政府機關資訊通報,第341期,頁5-13。
劉靜怡(2017),通訊監察與民主監督:歐美爭議發展趨勢之反思,歐美研究,第47卷1期,頁43-106。

五、 研討會論文
劉靜怡(2001),資訊社會的規範困境:台灣網際網路法律發展的歷史考察,第四屆資訊科技與社會轉型研討會,中央研究院社會學研究所。

六、 碩博士論文
藍培青(1997),隱私權在美國演進歷程之研究,淡江大學美國研究所博士論文。
詹文凱(1998),隱私權之研究,國立台灣大學法律學研究所博士論文。
林建中(1999),隱私權概念之再思考─關於概念範圍、定義及權力形成方法,國立台灣大學法律學研究所碩士論文。
簡榮宗(2000),網路上資訊隱私權保護問題之研究,東吳大學法律學系研究所。
劉得為(2008),個人資料庫的隱私保護─以我國戶籍制度為例,國立台灣大學法律學研究所碩士論文。
龔俊哲(2010),維基百科知識建構的正當化過程,南華大學社會學研究所碩士論文。
余瑞陞(2014),權利化的隱私─反思現代國家法律下的個人隱私,國立政治大學法律學研究所。
丁冠齊(2015),巨量資料與個人資料保護法之研究,世新大學法學院。

七、 官方資料
「歐盟及日本個人資料保護立法最新發展之分析報告」委託研究案成果報告,法務部。

八、 其他資料
司法院大法官釋字第585號解釋(2004)。
司法院大法官釋字第603號解釋(2005)。
許宗力、曾有田(2005),司法院大法官釋字第603號解釋協同意見書。
林子儀(2005),司法院大法官釋字第603號解釋協同意見書。
司法院大法官釋字第689號解釋(2011)。
台灣高等法院高雄分院,105年度上易字第604號判決。

九、 網頁資料
教育部異體字字典,http://dict2.variants.moe.edu.tw/variants/rbt/home.do。
教育部重編國語辭典修訂本,http://dict.revised.moe.edu.tw/cgi-bin/cbdic/gsweb.cgi?ccd=OZifKr&o=e0&sec=sec1&index=1。
國家教育研究院雙語詞彙、學術名詞暨辭書資訊網,http://terms.naer.edu.tw/detail/1304758/?index=3。
李科逸,網際網路時代個人隱私應如何保障?,http://www.thjh.ylc.edu.tw/t2/interlaw.htm。
高宣揚(2010),論消費文化與權力的交錯影響,愛思想,http://www.aisixiang.com/data/33591.html。
Bluxfox(2010),最近熱門的蘋果梗:永遠的1984,INSIDE,https://www.inside.com.tw/2010/05/27/1984-forever-apple。
呂紹玉(2013),看懂Data在說什麼,你就是下個有錢人!,商周.com,http://www.businessweekly.com.tw/article.aspx?id=5782&type=Blog。
David Carr著,陶夢縈、陳柳譯(2013),大數據在手,沒人比Netflix更了解觀眾,紐約時報中文網,https://cn.nytimes.com/business/20130301/c01carr/zh-hant/。
張進福(2014),大數據革命 匯流大未來,大數據匯流電子報,http://innobic.blogspot.com/2014/07/blog-post_8406.html。
朱小朱(2015),Citizen EX:斯諾登、蘇獨公投和沒有國家的人,豆瓣電影,https://movie.douban.com/review/7602712/。
Jewel(2015),巨量資料的時代,用「大、快、雜、疑」四字箴言帶你認識大數據,INSIDE 硬塞的網路趨勢觀察,https://www.inside.com.tw/2015/02/06/big-data-1-origin-and-4vs。
黃彥棻(2015),落實毛式三箭打造施政新藍圖 國發會成為數位政府大腦,iThome,http://www.ithome.com.tw/people/97634。
林妍溱(2016),Yahoo坦承兩年前遭駭客入侵,至少5億用戶帳號被竊,iThome,http://www.ithome.com.tw/news/108625。
高敬原(2016),Uber再爆隱私爭議!傳員工濫用權限,追蹤包括碧昂絲等名人乘車資訊,數位時代, https://www.bnext.com.tw/article/42306/uber-employees-tracking-celebrities-security-lawsuit。
蘇文彬(2016),Airbnb新隱私條款犯眾怒,中午緊急更正:臺灣用戶不屬中國,iThome,http://www.ithome.com.tw/news/109357。
辜騰玉(2016),政府大資料應用初步成果揭露,靠大資料預防犯罪再往前邁進一步,iThome,http://www.ithome.com.tw/news/103813。
李宣緯(2017),社群觀點-:大數據的陰暗面─談演算法的社會監理,FinTech Taiwan,http://fintechtaiwan.blogspot.tw/2017/03/blog-post.html。
黃哲斌(2017),為何網路像蝨子一樣咬我的背?──美好科技年代的四個恐怖故事,天下獨立評論,http://opinion.cw.com.tw/blog/profile/51/article/5520。
李寧怡(2017),Google和臉書 吸走全球2成廣告收入,蘋果日報, http://www.appledaily.com.tw/realtimenews/article/new/20170502/1109603/。
翁書婷(2017),王道銀行機器人理財服務將上線,投資門檻僅1,000元,數位時代,https://www.bnext.com.tw/article/44343/o-bank-robo-advisor-fintech。
張君豪(2017),警砸4千萬用eTag查車輛 刑事局:依法辦理,蘋果日報,http://www.appledaily.com.tw/realtimenews/article/new/20170424/1104598/。
何明諠(2017),舉國盡是潛在吸毒者:雲端科技打造的瘋狂驗尿小便斗,火箭科技評論,http://rocket.cafe/talks/81849。
廖緯民(2017),數位國家 個資法卻陷牛步,聯合報,https://udn.com/news/story/7339/2204810。
鍾孝宇(2017),發展數位國家,應同時保障公民隱私權,火箭科技評論,https://rocket.cafe/talks/82628。
回味1984!兩支蘋果電腦超經典廣告帶你重溫「賈伯斯精神」,癮科技,https://www.cool3c.com/article/68043。
陳昇瑋,資料科學往前看-從大數據到人工智慧,http://www.iis.sinica.edu.tw/~swc/talk/data_science_overview.html。
邱祐瑋,數據科學入門─讓數據思維成為生活的一部分,http://s.itho.me/techtalk/2017/20170116_datascience.pdf。
Google、Facebook 佔美數位廣告市場過半,商智謀略,https://www.bqjournal.com/google-facebook-command-51-per-cent-of-digital-display-advertising。
台北市 犯罪地圖(市民安心地圖),https://www.google.com/maps/d/viewer?mid=1O4CTdBEU7gSV8mZFPQN7Ykv5-Pc&hl=en_US。

貳、 英文參考文獻

一、 專書
Walker, John, (1761) A Critical Pronouncing Dictionary, And Expositor Of The English Language. London: G. G. J. and J. Robinson.
Stephen, James Fitzjames, (1873) Liberty, Equality, Fraternity. E-book: The Online Library Of Liberty.
Cooley, Thomas M., (1879) Treatise on the Law Of Torts or the Wrongs Which Arise Independent of Contract. Chicago: Callaghan.
T. H. Marshall, (1950) Citizenship and Social Class. London: The Cambridge University Press.
Imrie, John, (1960) The Burgh Court Book Of Selkirk: 1503-1545. Scottish Record Society.
Westin, Alan F., (1967) Privacy and Freedom. New York: Atheneum.
Rule, James B., (1974) Private Lives and Public Surveillance. London: Allen lane.
Gandy, Jr., Oscar H., (1993) The Panoptic Sort: A Political Economy Of Personal Information. Colorado: Westview Press.
Mcluhan, Marshall, (1994) Understanding Media: The Extensions Of Man. Cambridge, Massachusetts: The MIT Press.
Lyon, David, (1994) The Electronic Eye: The Rise Of Surveillance Society. Minneapolis: Polity Press.
Regan, Priscilla M., (1995) Legislating Privacy: Technology, Social Values, And Public Policy. London: The University of North Carolina Press.
Orwell, George, (2004) 1984. UK: Penguin.
Rössler, Beate, (2005) The Value of Privacy. Cambridge, UK: Polity Press.
Solove, Daniel J., (2009) Understanding Privacy. Cambridge, Massachusetts: Harvard University Press.
Pariser, Eli, (2011) The Filter Bubble: What the Internet Is Hiding From You, Newyork: The Penguin Press.
Payton, Theresa & Claypoole, Ted & Schmidt, Hon.Howard A., (2014) Privacy In The Age Of Big Data: Recognizing Threats, Defending Your Rights, And Protecting Your Family. Maryland: Rowman & Littlefield.
Richards, Neil, (2015) Intellectual Privacy: Rethinking Civil Liberties in the Digital Age. New York: Oxford University Press.
Ezrachi, Ariel & Stucke, Maurice E., (2016) Virtual Competition: The Promise and Perils of the Algorithm-Driven Economy. Cambridge, Massachusetts: Harvard University Press.
Sevignani, Sebastian, (2016) Privacy and Capitalism in the Age of Social Media. New York & London: Routledge.
David Vincent, (2016) Privacy: A Short History. Cambridge: Polity Press.
O’Neil, Cathy, (2016) Weapons Of Math Destruction: How Big Data Increases Inequality And Threatens Democracy. United States: Crown.

二、 專書論文
Diebold, Francis X., (2003) Big Data" Dynamic Factor Models for Macroeconomic Measurement and Forecasting: A Discussion of the Papers by Lucrezia Reichlin and by Mark W. Watson. Pp. 115-122 in Advances in Economics and Econometrics, Eighth World Congress of the Econometric Society edited by Mathias Dewatripont & Lars Peter Hansen & S.Turnovsky, Cambridge: Cambridge University Press.
Cate, Fred H., (2006) The Failure of Fair Information Practice Principles. Pp. 344-379 in Consumer Protection in the Age of the Information Economy, edited by Jane K. Winn, USA: Ashgate.
Holvast, Jan, (2009) History of Privacy. Pp. 13-42 in The Future of Identity in the Information Society: IFIP Advances in Information and Communication Technology, edited by Vashek Matyáš & Simone Fischer-Hübner & Daniel Cvrcek & Petr Švenda, Berlin: Springer.
Steeves, Valerie, (2009) Reclaiming the Social Value of Privacy. Pp. 191-208 in,: Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Network Society, edited by Valerie Steeves & Carole Lucock & Ian Kerr, Newyork: Oxford University Press.
Ohm, Paul, (2014) General Principles for Data Use and Analysis. Pp. 96-111 in Privacy, Big Data, and the Public Good: Frameworks for Engagement, edited by Julia Lane & Victoria Stodden & Stefan Bender & Helen Nissenbaum. New York: The Cambridge Press.
Forcese, Craig. (2015) Law, Logarithes, and Liberties: Legal Issues Arising from CSE’s Metadata Collection Initiatives. Pp. 127-160 in Law, Privacy and Surveillance in Canada in The Post-Snowden Era, edited by Michael Geist. Canada: University of Ottawa Press.
Cate, Fred H., (2016) Big Data, Consent, and the Future of Data Protection. Pp. 1-19 in Big Data is Not A Monolith, edited by Cassidy R. Sugimoto & Hamid R. Ekbia & Michael Mattioli. London & Cambridge, Massachusetts: The MIT Press.

三、 期刊論文
Warren, Samuel D. and Brandeis, Louis D., (1890) The Right to Privacy, Harvard Law Review 4: 193-220.
Prosser, William L., (1960) Privacy, California Law Review 48: 383-423.
Bloustein, Edward J., (1964) Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser, New York University Law Review 39; 962-1007.
Reiman, Jeffrey H., (1976) Privacy, Intimacy, and Personhood, Philosophy & Public Affairs 6: 26-44.
Winner, Langdon, (1980) Do Artifacts Have Politics, Modern Technology: Problem or Opportunity 109: 121-136.
Tilly, Charles, (1980) The Old New Social History and the New Old Social History, Csro Working Paper 218: 1-50.
Parent, W. A., Privacy, (1983) Morality, and the Law, Philosophy & Public Affairs 12: 269-288.
BeVier, Lillian R., Information about Individuals in the Hands of Government: Some Reflections on Mechanisms for Privacy Protection, (1995) William & Mary Bill of Rights Journal 4: 455-506.
Haggerty, Kevin D. and Ericson, Richard V., (2000) The surveillant Assemblage, BRIT. J. SOC 51, 605-622.
Cohen, Julie E., (2000) Examined Lives: Information Privacy and the Subject as Object, Stanford Law Review 52: 1373-1438.
Solove, Daniel J., (2006) A Taxonomy of Privacy, University of Pennsylvania Law Review 154: 477-560.
Balkin, Jack M., (2008) The Constitution in the National Surveillance State, Minnesota Law Review 93:1-25.
Cate, Fred H. (2008) Government Data Mining: The Need for A Legal Framework, Harvard Civil Rights-Civil Liberties Law Review 43: 435-489.
Ohm, Paul, (2010) Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, UCLA Law Review 57: 1701-1777.
Caluya, Gilbert, (2010) The Post-Panoptic Society? Reassessing Foucault in Surveillance Studies, Social Identities 16: 621-633.
Schwartz, Paul M. and Solove, Daniel J. (2011) The PII Problem: Privacy and A New Concept of Personally Identifiable Information, New York University Law Review 86: 1814-1894.
Cheney-Lippold, John, (2011) A New Algorithmic Identity: Soft Biopolitics and the Modulation of Control, THEORY, CULTURE & SOCIETY 28, 164-181.
Boyd, danah, and Crawford, Kate (2012) Critical Questions for Big Data, Information, Communication & Society 15:5: 662-679.
Calo, M. Ryan, (2012) Against Notice Skepticism in Privacy (and Elsewhere), Notre Dame Law Review 87: 1027-1072.
Fan, Wei and Bifet, Albert, (2012) Mining Big Data: Current Status, and Forecast to the Future, ACM SIGKDD Explorations Newsletter 14: 1-5.
Diebold, Francis X., (2012) On The Origin(s) and Development of the Term "Big Data", Working Paper: 1-6.
Davenport, Thomas H., and Patil, D.J., (2012) Data Scientist: The Sexiest Job of the 21st Century, Harvard Business Review 90: 70-76.
Krishnan, S. Shunmuga and Sitaraman, Ramesh K., (2013) Video Stream Quality Impacts Viewer Behavior: Inferring Causality Using Quasi-Experimental Designs, IEEE/ACM Transactions on Networking 21: 2001-2014.
Cate, Fred H. and Mayer-Schönberger, Viktor, (2013) Notice and Consent in A World of Big Data, International Data Privacy Law 3: 67-73.
Ohm, Paul, (2013) Branding Privacy, Minnesota Law Review 97:907-989.
Tene, Omer and Polonetsky, Jules, (2013) Big Data For All: Privacy and User Control in the Age of Analytics, Northwestern. Jouranl Technology and Intellectual Property 11: 239-273.
Rubinstein, (2013) Ira S., Big Data: The End of Privacy Or A New Beginning?, International Data Privacy Law 3 : 74-87.
Solove, Daniel J., (2013) Privacy Self-Management and the Consent Dilemma, Harvard Law Review 126: 1880-1903.
Waller, Matthew A. and Fawcett, Stanley E., (2013) Data Science, Predictive Analytics, and Big Data: A Revolution That Will Transform Supply Chain Design and Management, Journal of Business Logistics 34: 77-84.
Cohen, Julie E., (2013) What Privacy Is For, Harvard Law Review 126: 1904, 1933 .
Richards, Neil M., and King, Jonathan H., (2013) Three Paradoxes of Big Data, Stanford Law Review Online 66: 41-46.
Lerman, Jonas, (2013) Big Data and Its Exclusions, Stanford Law Review Online 66: 55-63.
kerr, Ian, and Earle, Jessica, (2013) Prediction, Preemption, Presumption: How Big Data Threatens Big Picture Privacy, Stanford Law Review Online 66: 65, 71.
Richards, Neil M., (2013) The Dangers of Surveillance, Harvard Law Review 126: 1934-1965.
Richards, Neil M., The Perils of Social Reading, The Georgetown Law Journal 101: 689-724.
Barnes, Trevor J, Big Data, Little History, Dialogues in Human Geography 3: 297-302.
Lazer, David and Kennedy, Ryan and King, Gary & Vespignani, Alessandro, (2014) The Parable of Google Flu: Traps in Big Data Analysis, Science 343: 1203-1205.
Richards, Neil and King, Jonathan H., (2014) Big Data Ethics, Wake Forest Law Review 49, 393-432.
Kitchin, Rob, (2014) The Real-Time City? Big Data and Smart Urbanism, Geojournal 79: 1-14.
Crawford, Kate, and Schultz, Jason, (2014) Big Data and Due Process: Toward A Framework to Redress Predictive Privacy Harms, Boston College Law Review 55: 93-128.
Citron, Danielle Keats, and Pasquale, Frank, (2014) The Scored Society: Due Process for Automated Predictions, Washington Law Review 89: 1-33.
Steeves, Valerie, and Regan, Priscilla, (2014) Young People Online and Social Value of Privacy, Journal of Information, Communication and Ethics in Society 12: 298-313.
Poulin, Chris, (2014) Big Data Custodianship in a Global Society, Sais Review of International Affairs 34: 109-1136.
Fairfield, Joshua A.T., and Engel, Christoph, (2015) Privacy as A Public Good, Duke Law Journal 65: 385, 457.
Reidenberg, Joel R. and Russell, N. Cameron and Callen, Alexander J., and Qasir, Sophia and Norton, Thomas B., (2015) Privacy Harms and the Effectiveness of the Notice and Choice Framework, A Journal of Law and Policy for the Information Society 11: 485-524.
Zuboff, Shoshana, Big Other: (2015) Surveillance Capitalism and the Prospects of an Information Civilization, Journal of Information Technology 30:75-89.
Mauro, Andrea De and Marco Greco and Grimaldi, Michele, (2015) What Is Big Data? A Consensual Definition and a Review of Key Research Topics, Aip Conference Proceedings 1644: 97-104.
Ferguson, Andrew G., (2015) Big Data and Predictive Reasonable Suspicion, University of Penn Law Review 163: 327-410.
Samuelson, Pamela, (2016) Freedom to Tinker, Theoretical Inquires in Law 17: 563- 600.
Campbell, D. Grant and Cowan, Scott R., (2016) The Paradox of Privacy: Revisiting a Core Library Value in an Age of Big Data and Linked Data, Library Trends 64: 492-511.
Rich, Michael, (2016) Machine Learning, Automated Suspicion Algorithms, and the Fourth Amendment, University of Penn Law Review 164: 871-929.

四、 其他資料
Griswold v. Connecticut, 381 U.S. 479 (1965).
Roe v. Wade, 410 U.S. 113 (1973).
Whalen v. Roe, 429 U.S. 589 (1977).
Cate, Fred H., and Cullen, Peter and Mayer-Schönberger, Viktor, (2014) Data Protection Principles for the 21st Century: Revising the 1980 OECD Guidelines.
European Commission, (2014) Towards A Thriving Data-Driven Economy. https://www.kowi.de/de/Portaldata/2/Resources/fp/2014-COM-Big-Data.pdf.
Podesta, John and Pritzker, Penny and Moniz, Ernest J. and Holdren, John and Zients, Jeffrey, (2014) Big Data: Seizing Opportunities, Preserving Values, Executive Office Of The President.
The Right to Privacy in the Digital Age, (2014) Report of the Office of the United Nations High Commissioner for Human Rights. http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf.
Big Data and Privacy: A Technological Perspective, Executive Office of the President. https://bigdatawg.nist.gov/pdf/pcast_big_data_and_privacy_-_may_2014.pdf.
Munoz, Cecilia and Smith, Megan and Patil, Dj, (2016) Big Data: A Report on Algorithmic Systems, Opportunity, and Civil Rights, Executive Office Of The President.
European Commission, (2016) Big Data and Data Analytics: The Potential for Innovation and Growth. http://www.europarl.europa.eu/RegData/etudes/BRIE/2016/589801/EPRS_BRI(2016)589801_EN.pdf.
Microsoft Corporation v. United States of America, No. 14-2985 (2d Cir. 2016).

五、 網頁資料
White, Gregory L. and Zimbardo, Philip G., (1975) The Chilling Effects of Surveillance: Deindividuation and Reactance, Stanford University, Office Of Naval Research. http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA013230.
Mashey, John, (1999) Big Data and the Next Wave of InfraStress Problems, Solutions, Opportunities, USENIX. https://www.usenix.org/conference/1999-usenix-annual-technical-conference/big-data-and-next-wave-infrastress-problems.
Sprenger, Polly, (1999) Sun on Privacy: “Get Over It”, Wired. https://www.wired.com/1999/01/sun-on-privacy-get-over-it/.
Doug Laney, (2001) 3-D Data Management: Controlling Data Volume, Velocity and Variety, Meta Group. http://blogs.gartner.com/doug-laney/deja-vvvue-others-claiming-gartners-volume-velocity-variety-construct-for-big-data/.
1984 Apple`s First Macintosh Commercial (2005). https://www.youtube.com/watch?v=OYecfV3ubP8.
Barnes, Susan B., (2006) A Privacy Paradox: Social Networking in the United States, Peer-Reviewed Journal On The Internet, First Monday 11. http://firstmonday.org/issues/issue11_9/barnes/index.html.
Anderson, Chris, (2008) The End of Theory: The Data Deluge Makes the deluge makes the scientific method obsolete, Wired. https://www.wired.com/2008/06/pb-theory/.
Mckinsey Global Institute, (2011) Big Data: The Next Frontier for Innovation, Competition, and Productivity. https://bigdatawg.nist.gov/pdf/MGI_big_data_full_report.pdf.
General Data Protection Regulation. http://eur-lex.europa.eu/eli/reg/2016/679/oj.
Lohr, Steve, (2012) How Big Data Became So Big, The New York Times. http://www.nytimes.com/2012/08/12/business/how-big-data-became-so-big-unboxed.html.
Lohr, Steve, (2012) The Age of Big Data, The New York Times. http://www.nytimes.com/2012/02/12/sunday-review/big-datas-impact-in-the-world.html.
Diebold, Francis X, (2012) On The Origin(s) and Development of the Term "Big Data", WORKING PAPER. https://economics.sas.upenn.edu/pier/working-paper/2012/origins-and-development-term-%E2%80%9Cbig-data.
Press, Gil, (2013) The OED, Big Data, and Crowdsourcing, What’S The Big Data?. https://whatsthebigdata.com/2013/08/17/the-oed-big-data-and-crowdsourcing/.
Lohr, Steve, (2013) The Origins of "Big Data": An Etymological Detective Story, Bits Blog. https://bits.blogs.nytimes.com/2013/02/01/the-origins-of-big-data-an-etymological-detective-story/.
Normandeau, Kevin, (2013) Big Data Volume, Variety, Velocity and Veracity, insideBIGDATA. http://insidebigdata.com/2013/09/12/beyond-volume-variety-velocity-issue-big-data-veracity/.
Leonard, Andrew, (2013) How Netflix Is Turning Viewers into Puppets, SALON. http://www.salon.com/2013/02/01/how_netflix_is_turning_viewers_into_puppets/.
Whltney, Lance, (2013) Vint Cerf: “Privacy May Be An Anomaly”, CNET. https://www.cnet.com/news/vint-cerf-privacy-may-be-an-anomaly/.
Felten, Edward, The New Freedom to Tinker Movement, Freedom to Tinker. https://freedom-to-tinker.com/2013/03/21/the-new-freedom-to-tinker-movement/.
Sullivan, John L., (2013) Uncovering The Data Panopticon: The Urgent Need for Critical Scholarship in an Era of Corporate and Government Surveillance, The Political Economy of Communication 1. http://www.polecom.org/index.php/polecom/article/view/23/192.
Kramer, Adam D I. and Guillory, Jamie E. and Hancock, Jeffrey T., (2014) Experimental evidence of massive-scale emotional contagion through social networks, PNAS 111. http://www.pnas.org/content/111/24/8788.full.
Rushe, Dominic, (2014) Facebook Sorry – Almost – For Secret Psychological Experiment on Users, Guardian. https://www.theguardian.com/technology/2014/oct/02/facebook-sorry-secret-psychological-experiment-users.
Marr, Bernard, (2015) How Big Data Is Changing Insurance Forever, Forbes. https://www.forbes.com/sites/bernardmarr/2015/12/16/how-big-data-is-changing-the-insurance-industry-forever/#7076ba6d289b.
Marr, Bernard, (2015) A Brief History of Big Data Everyone Should Read, BusinessIntelligence.com. https://businessintelligence.com/bi-insights/big-data-briefish-history-everyone-read/.
Noyes, Katherine, (2015) Scott McNealy on privacy: You still don’t have any, PCWorld. http://www.pcworld.com/article/2941052/scott-mcnealy-on-privacy-you-still-dont-have-any.html.
Chambers, Chris, (2015) The Psychology of Mass Government Surveillance: How Do the Public Respond and Is It Changing Our Behaviour? , Guardian. https://www.theguardian.com/science/head-quarters/2015/mar/18/the-psychology-of-mass-government-surveillance-how-do-the-public-respond-and-is-it-changing-our-behaviour.
Mcmullan,Thomas, (2015) What Does the Panopticon Mean in the Age of Digital Surveillance, The Guardian. https://www.theguardian.com/technology/2015/jul/23/panopticon-digital-surveillance-jeremy-bentham.
Lazer, David and Kennedy, Ryan, (2015) What We Can Learn from the Epic Failure of Google Flu Trends, Wired. https://www.wired.com/2015/10/can-learn-epic-failure-google-flu-trends/.
Schuster, Mike and Johnson, Melvin and Thorat, Nikhil, (2016) Zero-Shot Translation with Google’s Multilingual Neural Machine Translation System, Google Research Blog, https://research.googleblog.com/2016/11/zero-shot-translation-with-googles.html.
MCKINSEY GLOBAL INSTITUTE, (2016) The Age of Analytics: Competing in a Data-Driven World, Executive Summary. http://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/the-age-of-analytics-competing-in-a-data-driven-world.
Bellis, Rich, (2016) Six Very Clear Signs That Your Job Is Due to be Automated, Fast Company. https://www.fastcompany.com/3062739/six-very-clear-signs-that-your-job-is-due-to-be-automated.
Nutley, Michael, (2016) Privacy and Innovation Are Not Mutually Exclusive, CMO. http://www.cmo.com/features/articles/2016/10/31/privacy-and-innovation-are-not-mutually-exclusive.html#gs.MlhqfwQ.
Munn, Nathan, (2016) How Mass Surveillance Harms Societies and Individuals- and What You Can Do about It, CJFE. http://www.cjfe.org/how_mass_surveillance_harms_societies_and_individuals_and_what_you_can_do_about_it.
Zuboff, Shoshana, (2016) The Secrets of Surveillance Capitalism, Frankfurter Allgemeine. http://www.faz.net/aktuell/feuilleton/debatten/the-digital-debate/shoshana-zuboff-secrets-of-surveillance-capitalism-14103616.html.
Zook, Matthew and Barocas, Solon and boyd, danah and Crawford, Kate,
Keller E, Gangadharan SP, et al., (2017) Ten Simple Rules for Responsible Big Data Research. PLoS Comput Biol 13(3): e1005399. https://doi.org/10.1371/journal.pcbi.1005399.
Athey, Susan and Catalini, Christian and Tucker, Catherine, (2017) The Digital Privacy Paradox: Small Money, Small Costs, Small Talk, MIT SLOAN RESEARCH PAPER 5196-17: 1-26. https://ssrn.com/abstract=2916489.
Mikhail, Nader, (2017) Why Big Data Kills Businesses, Fortune. http://fortune.com/2017/02/28/why-big-data-kills-businesses/.
Knaus, Christopher, (2017) Federal Police Admit to Accessing Journalist`s Metadata Without a Warrant, Guardian. https://www.theguardian.com/australia-news/2017/apr/28/federal-police-admit-accessing-journalists-metadata-without-a-warrant.
The Guardian View on Big Data: The Danger ss Less Democracy, (2017) Guardian. https://www.theguardian.com/commentisfree/2017/feb/26/the-guardian-view-on-big-data-the-danger-is-less-democracy.
Cadwalladr, Carole, (2017) Revealed: How US Billionaire Helped to Back Brexit, Guardian. https://www.theguardian.com/politics/2017/feb/26/us-billionaire-mercer-helped-back-brexit.
Big Data Definitions, Nist Big Data Program. https://bigdatawg.nist.gov/.
By Bisk, What Is Big Data, Villanova University, https://www.villanovau.com/resources/bi/what-is-big-data/.
The Four Vs of Big Data, IBM. http://www.ibmbigdatahub.com/sites/default/files/infographic_file/4-Vs-of-big-data.jpg.
Soubra, Diya, The 3Vs That Define Big Data, Data Science Central. http://www.datasciencecentral.com/forum/topics/the-3vs-that-define-big-data.
Big Data and Business Analytics Revenues Forecast to Reach $150.8 Billion This Year, Led by Banking and Manufacturing Investments, According to IDC, IDC. http://www.idc.com/getdoc.jsp?containerId=prUS42371417.
50 Best Jobs in America, Glassdoor. https://www.glassdoor.com/List/Best-Jobs-in-America-LST_KQ0,20.htm.
Data Scientist’ Job Trends, Indeed. http://www.indeed.com/jobtrends/q-%22Data-Scientist%22.html.
Google Transparency Report. https://www.google.com/transparencyreport/. Microsoft Transparency Report. https://www.microsoft.com/en-us/about/corporate-responsibility/reports-hub.
Twitter Transparency Report. https://transparency.twitter.com/.
Facebook Transparency Report. https://govtrequests.facebook.com/.
Line Transparency Report. https://linecorp.com/en/security/article/92.
zh_TW