學術產出-Theses

Article View/Open

Publication Export

Google ScholarTM

政大圖書館

Citation Infomation

題名 以商業生態系統理論之觀點探討身份自主權的發展
Using Business Ecosystem Perspective to Analyze the Development of Self Sovereign Identity
作者 林陽
Lin, Yang
貢獻者 鄭至甫
Jeng, Jyh-Fu
林陽
Lin, Yang
關鍵詞 身份自主權
商業生態系統
創新擴散理論
行為者網路理論
Self Sovereign Identity
Business Ecosystem
Diffusion of Innovation
Actor Network Theory
日期 2021
上傳時間 2-Mar-2021 14:21:36 (UTC+8)
摘要 由於全球大多數地區的網際網路基礎建設及行動通訊網路日臻成熟發達,無論是個人、組織、機構、企業、政府等個體(entity),每日都在網路世界大量產生與其相關的數據或資料。過去,個體均需仰賴其他可以取信於公眾的其他個體之電腦資訊軟硬體系統及通訊設備,來對個體的身份及其所產生的數據或資料加以管理、進而控制。這些管理及控制身份與資料的個體,已經被證實無法安全保護所轄個體的身份隱私權、或是以壟斷資料所有權的方式來進行不公平的市場競爭。因此,身份自主權(self sovereign identity)的思潮運動已經從萌芽進入到成長階段,雖然尚未啟迪所有公民的自主意識,但是藉由區塊鏈技術的發展及採用,讓身份自主權已開始步入到實際應用上;而以身份自主權為基礎的資訊科技未來顛覆人類的生活方式實屬可期。

本文採用商業生態系統觀點為基礎,採用內容資料分析法,探討產業中主要領導的廠商、組織及團體,在自主權應用的發展所扮演的角色;並透過問卷調查進行量化分析方法,了解顧客群體從其他生態系統遷移到身份自主權生態系統的支持意願。冀望從資料整理分析之後,得出台灣地區從事業者進軍世界其他地區的發展策略。
With the advent of the construction maturity of Internet infrastructure and mobile telecommunication networks in the world, entities, whether individuals, organizations, institutions, enterprises, or governments, create tons of data and information in the cyberspace day by day. Before, entities need to rely on others’ computers as well as information software and hardware systems which are trusted by the public to manage and control their identities and related private data and information. However, some means of facilitating the management and controlling mechanisms of others’ identities and data have been proven incapable of securing the privacy of data or information kept in their hands. Others even corner the whole market by monopolizing the ownership of collected data. The ideological trend to adapt self sovereign identity has been rapidly burgeoned although the perception of it has not thoroughly known by all the citizens yet. However, the development of blockchain technologies propelling the according applications to the real world has been practiced and deployed . The information technologies building on self sovereign identity will definitely re-shape and innovate our future life.

On the basis of Business Ecosystem perspective, this study explores the roles of leading vendors, organizations, and groups playing in the development of Self Sovereign Identity by employing the methodology of content analysis. Via collecting questionnaires on the Internet and analyzing the data by a quantitative approach, we try to understand end users’ willingness to support the migration from other ecosystems to SSI. After the sight of the data analysis result, we expect to propose some development strategies to assist the engaged Taiwan vendors and operators in their entrance to international markets.
參考文獻 中文參考文獻:
Botsman, R., (2018)。信任革命:信任的轉移與科技所扮演的角色(林添貴譯)。台北市:遠流出版事業股份有限公司(原著出版於2017)
King, B., (2018)。Bank 4.0金融常在,銀行不再?(孫一仕、周群英、林凱雄譯)。台北市:台灣金融研訓院。(原著出版於2018)
Latour, B., (2016)。巴斯德的實驗室-細菌的戰爭與和平(伍啟鴻、陳榮泰譯)。新北市:群學出版有限公司。(原著出版於2011)
Latour, B., (2017)。激情的經濟學(陳榮泰、伍啟鴻譯)。新北市:群學出版有限公司。(原著出版於2008)
Moore, James F. (1999)。競爭的衰亡-商業生態系統時代的領導與戰略(梁駿譯)。北京市:北京出版社。(原著出版於1996)
Rogers, E.M., (2016)。創新的擴散(唐興通、鄭常青、張延臣譯)。北京市:電子工業出版社。(原著出版於1983)
Scheer R., (2016)。誰買走我的個資? 當你一上網, 就等於宣告我自願出賣關於我的所有資料, 且分文不取, 以使企業獲得最大利益的時代來臨。為什麼? 該如何遏止?(林麗雪譯)。新北市:好優文化出版有限公司。(原著出版於2015)
吳思慧(2013)。社交網站之社群信任、成員關係信任與訊息信任對購買意願影響研究。未出版之碩士論文,南臺科技大學,資訊傳播系碩士班,台南市。
教育部重編國語辭典修訂本,【主權】檢索結果。檢自http://dict.revised.moe.edu.tw/cgi-bin/cbdic/gsweb.cgi?o=dcbdic&searchid=Z00000118380 (May 14, 2020)
郭國泰、司徒達賢、于卓民(2008)。商業生態系統之變遷:以軟體產業為例。創新與管理,6(1),1-27。doi:10.30118/JIM.200811.0001
陳怡心(2018)。從行動者網絡理論觀點探究水資源課程的生成與轉譯歷程。未出版之碩士論文,國立臺灣師範大學,教育學系,台北市。
盧希鵬-商業周刊 (2017)。C2B逆商業時代。台北市:城邦文化事業股份有限公司-商業周刊
蕭余芷(2020)。區塊鏈及數位加密貨幣的應用範例及挑戰。未出版之碩士論文,元智大學,經營管理碩士班,桃園市。
资武成(2013)。“大数据”时代企业生态系统的演化与建构. 社会科学, (12), 55-62。

英文參考文獻:
Allen, C., (2016). The Path to Self-Sovereign Identity. Retrieved April 18, 2020 from http://www.lifewithalacrity. com/2016/04/the-path-to-self-soverereign-identity.html
Ferdous, M. Chowdhury, F. & Alassafi, M.(2019). In Search of Self-Sovereign Identity Leveraging Blockchain Technology. IEEE Access.
Arenas, R., & Fernandez, P. (2018). CredenceLedger: A Permissioned Blockchain for Verifiable Academic Credentials. In 2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings. Retrieved April 18, 2020 from https://doi.org/10.1109/ICE.2018.8436324
Baars, D. (2016). Towards Self-Sovereign Identity using Blockchain Technology. University of Twente.
Blockchainhub Berlin (2018). Self Sovereign – Identity vs Data?. Retrieved May 1, 2020 from https://blockchainhub.net/blog/blog/self-sovereign-identity-vs-data/
Callon, M. (1984). Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay. The Sociological Review, 32(1_suppl), 196–233.
Di Francesco Maesa, D., & Mori, P. (2020). Blockchain 3.0 applications survey. Journal of Parallel and Distributed Computing. Retrieved April 18, 2020 from https://doi.org/10.1016/j.jpdc.2019.12.019
Facebook (2020). FACEBOOK for Developers. Retrieved Aug. 23 from https://developers.facebook.com/docs/facebook-login/web/
Google (2020). Auth Protocols. Retrieved Aug. 23 from https://developers.google.com/identity
IETF (2012). RFC 6749: The OAuth 2.0 Authorization Framework. Retrieved Aug. 23 from https://tools.ietf.org/html/rfc6749
ISO (2019). ISO/IEC 24760-1:2019 IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts. Retrieved Aug. 23 from https://www.iso.org/standard/77582.html
Lagutin, D., Kortesniemi, Y., Fotiou, N., & Siris, V. A. (2019). Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT Devices using OAuth-based Delegation. Retrieved April 18, 2020 from https://doi.org/10.14722/diss.2019.23005
Latour, B(1993). We have never been modern. Harvester Wheatsheaf, Hemel Hempstead.
Latour, B. (1984). The Powers of Association. The Sociological Review, 32(1_suppl), 264–280.
OpenID (2020). Specifications. Retrieved Aug. 23 from https://openid.net/developers/specs/
Risk Based Security (2020). 2020 Q1 Report Data Breach QuickView. Retrieved May 22 from https://pages.riskbasedsecurity.com/hubfs/Reports/2020/2020%20Q1%20Data%20Breach%20QuickView%20Report.pdf?hsCtaTracking=5d936f78-de69-45a4-9ba5-03c2e9f20952%7C617588df-ee05-4a00-bbb1-191d6888f519
Seuwou, P., Banissi, E., Ubakanma, G., Sharif, M. S., & Healey, A. (2017). Actor-network theory as a framework to analyse technology acceptance model’s external variables: the case of autonomous vehicles. In International Conference on Global Security, Safety, and Sustainability (pp. 305-320). Springer, Cham.
Tatnall, A. & Gilding, A. (1999). Actor-Network Theory and Information Systems Research. Victoria University of Technology, Melbourne, Australia.
Tobin, A., & Reed, D. (2016). The inevitable rise of self-sovereign identity. The Sovrin Foundation, 29(2016).
Uwe Der, Stefan Jähnichen, Jan Sürmelif (2017). Self-sovereign Identity − Opportunities and Challenges for the Digital Revolution. Retrieved May 4, 2020 from https://arxiv.org/abs/1712.01767
Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 157-178.
W3C-did-core (2020). Decentralized Identifiers (DIDs) v1.0. Retrieved May 16, 2020 from https://w3c.github.io/did-core/
W3C-did-use-cases (2020). Use Cases and Requirements for Decentralized Identifiers. Retrieved May 4, 2020 from https://www.w3.org/TR/did-use-cases/
W3C-use-cases(2017). Verifiable Claims Use Cases 1.0. Retrieved April 18, 2020 from https://www.w3.org/2017/05/vc-use-cases/CGFR/2017-05-01/
W3C-vc-data-model (2019). Verifiable Credentials Data Model 1.0. Retrieved April 18, 2020 from https://www.w3.org/TR/vc-data-model/
W3C-vc-use-cases (2019). Verifiable Credentials Use Cases. Retrieved April 18, 2020 from https://www.w3.org/TR/vc-use-cases/
描述 碩士
國立政治大學
經營管理碩士學程(EMBA)
105932072
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0105932072
資料類型 thesis
dc.contributor.advisor 鄭至甫zh_TW
dc.contributor.advisor Jeng, Jyh-Fuen_US
dc.contributor.author (Authors) 林陽zh_TW
dc.contributor.author (Authors) Lin, Yangen_US
dc.creator (作者) 林陽zh_TW
dc.creator (作者) Lin, Yangen_US
dc.date (日期) 2021en_US
dc.date.accessioned 2-Mar-2021 14:21:36 (UTC+8)-
dc.date.available 2-Mar-2021 14:21:36 (UTC+8)-
dc.date.issued (上傳時間) 2-Mar-2021 14:21:36 (UTC+8)-
dc.identifier (Other Identifiers) G0105932072en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/134033-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 經營管理碩士學程(EMBA)zh_TW
dc.description (描述) 105932072zh_TW
dc.description.abstract (摘要) 由於全球大多數地區的網際網路基礎建設及行動通訊網路日臻成熟發達,無論是個人、組織、機構、企業、政府等個體(entity),每日都在網路世界大量產生與其相關的數據或資料。過去,個體均需仰賴其他可以取信於公眾的其他個體之電腦資訊軟硬體系統及通訊設備,來對個體的身份及其所產生的數據或資料加以管理、進而控制。這些管理及控制身份與資料的個體,已經被證實無法安全保護所轄個體的身份隱私權、或是以壟斷資料所有權的方式來進行不公平的市場競爭。因此,身份自主權(self sovereign identity)的思潮運動已經從萌芽進入到成長階段,雖然尚未啟迪所有公民的自主意識,但是藉由區塊鏈技術的發展及採用,讓身份自主權已開始步入到實際應用上;而以身份自主權為基礎的資訊科技未來顛覆人類的生活方式實屬可期。

本文採用商業生態系統觀點為基礎,採用內容資料分析法,探討產業中主要領導的廠商、組織及團體,在自主權應用的發展所扮演的角色;並透過問卷調查進行量化分析方法,了解顧客群體從其他生態系統遷移到身份自主權生態系統的支持意願。冀望從資料整理分析之後,得出台灣地區從事業者進軍世界其他地區的發展策略。
zh_TW
dc.description.abstract (摘要) With the advent of the construction maturity of Internet infrastructure and mobile telecommunication networks in the world, entities, whether individuals, organizations, institutions, enterprises, or governments, create tons of data and information in the cyberspace day by day. Before, entities need to rely on others’ computers as well as information software and hardware systems which are trusted by the public to manage and control their identities and related private data and information. However, some means of facilitating the management and controlling mechanisms of others’ identities and data have been proven incapable of securing the privacy of data or information kept in their hands. Others even corner the whole market by monopolizing the ownership of collected data. The ideological trend to adapt self sovereign identity has been rapidly burgeoned although the perception of it has not thoroughly known by all the citizens yet. However, the development of blockchain technologies propelling the according applications to the real world has been practiced and deployed . The information technologies building on self sovereign identity will definitely re-shape and innovate our future life.

On the basis of Business Ecosystem perspective, this study explores the roles of leading vendors, organizations, and groups playing in the development of Self Sovereign Identity by employing the methodology of content analysis. Via collecting questionnaires on the Internet and analyzing the data by a quantitative approach, we try to understand end users’ willingness to support the migration from other ecosystems to SSI. After the sight of the data analysis result, we expect to propose some development strategies to assist the engaged Taiwan vendors and operators in their entrance to international markets.
en_US
dc.description.tableofcontents 第一章 緒論 8
第一節 研究背景 8
第二節 研究動機 14
第三節 研究問題 15
第四節 研究目的 16
第五節 研究流程 17
第二章 文獻探討 18
第一節 身份自主權 18
第二節 商業生態系統 26
第三節 創新擴散理論 31
第四節 行為者網路理論 34
第三章 研究方法 39
第一節 研究架構 39
第二節 問卷設計 43
第三節 研究對象與蒐集方法 44
第四章 研究發現 45
第一節 以身份自主權所建構之商業生態系統 45
第二節 顧客選擇遷移到以身份自主權商業生態系統的意願 57
第五章 結論與建議 72
參考文獻 75
附錄一:調查問卷 79
zh_TW
dc.format.extent 5738822 bytes-
dc.format.mimetype application/pdf-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0105932072en_US
dc.subject (關鍵詞) 身份自主權zh_TW
dc.subject (關鍵詞) 商業生態系統zh_TW
dc.subject (關鍵詞) 創新擴散理論zh_TW
dc.subject (關鍵詞) 行為者網路理論zh_TW
dc.subject (關鍵詞) Self Sovereign Identityen_US
dc.subject (關鍵詞) Business Ecosystemen_US
dc.subject (關鍵詞) Diffusion of Innovationen_US
dc.subject (關鍵詞) Actor Network Theoryen_US
dc.title (題名) 以商業生態系統理論之觀點探討身份自主權的發展zh_TW
dc.title (題名) Using Business Ecosystem Perspective to Analyze the Development of Self Sovereign Identityen_US
dc.type (資料類型) thesisen_US
dc.relation.reference (參考文獻) 中文參考文獻:
Botsman, R., (2018)。信任革命:信任的轉移與科技所扮演的角色(林添貴譯)。台北市:遠流出版事業股份有限公司(原著出版於2017)
King, B., (2018)。Bank 4.0金融常在,銀行不再?(孫一仕、周群英、林凱雄譯)。台北市:台灣金融研訓院。(原著出版於2018)
Latour, B., (2016)。巴斯德的實驗室-細菌的戰爭與和平(伍啟鴻、陳榮泰譯)。新北市:群學出版有限公司。(原著出版於2011)
Latour, B., (2017)。激情的經濟學(陳榮泰、伍啟鴻譯)。新北市:群學出版有限公司。(原著出版於2008)
Moore, James F. (1999)。競爭的衰亡-商業生態系統時代的領導與戰略(梁駿譯)。北京市:北京出版社。(原著出版於1996)
Rogers, E.M., (2016)。創新的擴散(唐興通、鄭常青、張延臣譯)。北京市:電子工業出版社。(原著出版於1983)
Scheer R., (2016)。誰買走我的個資? 當你一上網, 就等於宣告我自願出賣關於我的所有資料, 且分文不取, 以使企業獲得最大利益的時代來臨。為什麼? 該如何遏止?(林麗雪譯)。新北市:好優文化出版有限公司。(原著出版於2015)
吳思慧(2013)。社交網站之社群信任、成員關係信任與訊息信任對購買意願影響研究。未出版之碩士論文,南臺科技大學,資訊傳播系碩士班,台南市。
教育部重編國語辭典修訂本,【主權】檢索結果。檢自http://dict.revised.moe.edu.tw/cgi-bin/cbdic/gsweb.cgi?o=dcbdic&searchid=Z00000118380 (May 14, 2020)
郭國泰、司徒達賢、于卓民(2008)。商業生態系統之變遷:以軟體產業為例。創新與管理,6(1),1-27。doi:10.30118/JIM.200811.0001
陳怡心(2018)。從行動者網絡理論觀點探究水資源課程的生成與轉譯歷程。未出版之碩士論文,國立臺灣師範大學,教育學系,台北市。
盧希鵬-商業周刊 (2017)。C2B逆商業時代。台北市:城邦文化事業股份有限公司-商業周刊
蕭余芷(2020)。區塊鏈及數位加密貨幣的應用範例及挑戰。未出版之碩士論文,元智大學,經營管理碩士班,桃園市。
资武成(2013)。“大数据”时代企业生态系统的演化与建构. 社会科学, (12), 55-62。

英文參考文獻:
Allen, C., (2016). The Path to Self-Sovereign Identity. Retrieved April 18, 2020 from http://www.lifewithalacrity. com/2016/04/the-path-to-self-soverereign-identity.html
Ferdous, M. Chowdhury, F. & Alassafi, M.(2019). In Search of Self-Sovereign Identity Leveraging Blockchain Technology. IEEE Access.
Arenas, R., & Fernandez, P. (2018). CredenceLedger: A Permissioned Blockchain for Verifiable Academic Credentials. In 2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings. Retrieved April 18, 2020 from https://doi.org/10.1109/ICE.2018.8436324
Baars, D. (2016). Towards Self-Sovereign Identity using Blockchain Technology. University of Twente.
Blockchainhub Berlin (2018). Self Sovereign – Identity vs Data?. Retrieved May 1, 2020 from https://blockchainhub.net/blog/blog/self-sovereign-identity-vs-data/
Callon, M. (1984). Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay. The Sociological Review, 32(1_suppl), 196–233.
Di Francesco Maesa, D., & Mori, P. (2020). Blockchain 3.0 applications survey. Journal of Parallel and Distributed Computing. Retrieved April 18, 2020 from https://doi.org/10.1016/j.jpdc.2019.12.019
Facebook (2020). FACEBOOK for Developers. Retrieved Aug. 23 from https://developers.facebook.com/docs/facebook-login/web/
Google (2020). Auth Protocols. Retrieved Aug. 23 from https://developers.google.com/identity
IETF (2012). RFC 6749: The OAuth 2.0 Authorization Framework. Retrieved Aug. 23 from https://tools.ietf.org/html/rfc6749
ISO (2019). ISO/IEC 24760-1:2019 IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts. Retrieved Aug. 23 from https://www.iso.org/standard/77582.html
Lagutin, D., Kortesniemi, Y., Fotiou, N., & Siris, V. A. (2019). Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT Devices using OAuth-based Delegation. Retrieved April 18, 2020 from https://doi.org/10.14722/diss.2019.23005
Latour, B(1993). We have never been modern. Harvester Wheatsheaf, Hemel Hempstead.
Latour, B. (1984). The Powers of Association. The Sociological Review, 32(1_suppl), 264–280.
OpenID (2020). Specifications. Retrieved Aug. 23 from https://openid.net/developers/specs/
Risk Based Security (2020). 2020 Q1 Report Data Breach QuickView. Retrieved May 22 from https://pages.riskbasedsecurity.com/hubfs/Reports/2020/2020%20Q1%20Data%20Breach%20QuickView%20Report.pdf?hsCtaTracking=5d936f78-de69-45a4-9ba5-03c2e9f20952%7C617588df-ee05-4a00-bbb1-191d6888f519
Seuwou, P., Banissi, E., Ubakanma, G., Sharif, M. S., & Healey, A. (2017). Actor-network theory as a framework to analyse technology acceptance model’s external variables: the case of autonomous vehicles. In International Conference on Global Security, Safety, and Sustainability (pp. 305-320). Springer, Cham.
Tatnall, A. & Gilding, A. (1999). Actor-Network Theory and Information Systems Research. Victoria University of Technology, Melbourne, Australia.
Tobin, A., & Reed, D. (2016). The inevitable rise of self-sovereign identity. The Sovrin Foundation, 29(2016).
Uwe Der, Stefan Jähnichen, Jan Sürmelif (2017). Self-sovereign Identity − Opportunities and Challenges for the Digital Revolution. Retrieved May 4, 2020 from https://arxiv.org/abs/1712.01767
Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 157-178.
W3C-did-core (2020). Decentralized Identifiers (DIDs) v1.0. Retrieved May 16, 2020 from https://w3c.github.io/did-core/
W3C-did-use-cases (2020). Use Cases and Requirements for Decentralized Identifiers. Retrieved May 4, 2020 from https://www.w3.org/TR/did-use-cases/
W3C-use-cases(2017). Verifiable Claims Use Cases 1.0. Retrieved April 18, 2020 from https://www.w3.org/2017/05/vc-use-cases/CGFR/2017-05-01/
W3C-vc-data-model (2019). Verifiable Credentials Data Model 1.0. Retrieved April 18, 2020 from https://www.w3.org/TR/vc-data-model/
W3C-vc-use-cases (2019). Verifiable Credentials Use Cases. Retrieved April 18, 2020 from https://www.w3.org/TR/vc-use-cases/
zh_TW
dc.identifier.doi (DOI) 10.6814/NCCU202100236en_US