學術產出-Theses
Article View/Open
Publication Export
-
題名 以商業生態系統理論之觀點探討身份自主權的發展
Using Business Ecosystem Perspective to Analyze the Development of Self Sovereign Identity作者 林陽
Lin, Yang貢獻者 鄭至甫
Jeng, Jyh-Fu
林陽
Lin, Yang關鍵詞 身份自主權
商業生態系統
創新擴散理論
行為者網路理論
Self Sovereign Identity
Business Ecosystem
Diffusion of Innovation
Actor Network Theory日期 2021 上傳時間 2-Mar-2021 14:21:36 (UTC+8) 摘要 由於全球大多數地區的網際網路基礎建設及行動通訊網路日臻成熟發達,無論是個人、組織、機構、企業、政府等個體(entity),每日都在網路世界大量產生與其相關的數據或資料。過去,個體均需仰賴其他可以取信於公眾的其他個體之電腦資訊軟硬體系統及通訊設備,來對個體的身份及其所產生的數據或資料加以管理、進而控制。這些管理及控制身份與資料的個體,已經被證實無法安全保護所轄個體的身份隱私權、或是以壟斷資料所有權的方式來進行不公平的市場競爭。因此,身份自主權(self sovereign identity)的思潮運動已經從萌芽進入到成長階段,雖然尚未啟迪所有公民的自主意識,但是藉由區塊鏈技術的發展及採用,讓身份自主權已開始步入到實際應用上;而以身份自主權為基礎的資訊科技未來顛覆人類的生活方式實屬可期。本文採用商業生態系統觀點為基礎,採用內容資料分析法,探討產業中主要領導的廠商、組織及團體,在自主權應用的發展所扮演的角色;並透過問卷調查進行量化分析方法,了解顧客群體從其他生態系統遷移到身份自主權生態系統的支持意願。冀望從資料整理分析之後,得出台灣地區從事業者進軍世界其他地區的發展策略。
With the advent of the construction maturity of Internet infrastructure and mobile telecommunication networks in the world, entities, whether individuals, organizations, institutions, enterprises, or governments, create tons of data and information in the cyberspace day by day. Before, entities need to rely on others’ computers as well as information software and hardware systems which are trusted by the public to manage and control their identities and related private data and information. However, some means of facilitating the management and controlling mechanisms of others’ identities and data have been proven incapable of securing the privacy of data or information kept in their hands. Others even corner the whole market by monopolizing the ownership of collected data. The ideological trend to adapt self sovereign identity has been rapidly burgeoned although the perception of it has not thoroughly known by all the citizens yet. However, the development of blockchain technologies propelling the according applications to the real world has been practiced and deployed . The information technologies building on self sovereign identity will definitely re-shape and innovate our future life.On the basis of Business Ecosystem perspective, this study explores the roles of leading vendors, organizations, and groups playing in the development of Self Sovereign Identity by employing the methodology of content analysis. Via collecting questionnaires on the Internet and analyzing the data by a quantitative approach, we try to understand end users’ willingness to support the migration from other ecosystems to SSI. After the sight of the data analysis result, we expect to propose some development strategies to assist the engaged Taiwan vendors and operators in their entrance to international markets.參考文獻 中文參考文獻:Botsman, R., (2018)。信任革命:信任的轉移與科技所扮演的角色(林添貴譯)。台北市:遠流出版事業股份有限公司(原著出版於2017)King, B., (2018)。Bank 4.0金融常在,銀行不再?(孫一仕、周群英、林凱雄譯)。台北市:台灣金融研訓院。(原著出版於2018)Latour, B., (2016)。巴斯德的實驗室-細菌的戰爭與和平(伍啟鴻、陳榮泰譯)。新北市:群學出版有限公司。(原著出版於2011)Latour, B., (2017)。激情的經濟學(陳榮泰、伍啟鴻譯)。新北市:群學出版有限公司。(原著出版於2008)Moore, James F. (1999)。競爭的衰亡-商業生態系統時代的領導與戰略(梁駿譯)。北京市:北京出版社。(原著出版於1996)Rogers, E.M., (2016)。創新的擴散(唐興通、鄭常青、張延臣譯)。北京市:電子工業出版社。(原著出版於1983)Scheer R., (2016)。誰買走我的個資? 當你一上網, 就等於宣告我自願出賣關於我的所有資料, 且分文不取, 以使企業獲得最大利益的時代來臨。為什麼? 該如何遏止?(林麗雪譯)。新北市:好優文化出版有限公司。(原著出版於2015)吳思慧(2013)。社交網站之社群信任、成員關係信任與訊息信任對購買意願影響研究。未出版之碩士論文,南臺科技大學,資訊傳播系碩士班,台南市。教育部重編國語辭典修訂本,【主權】檢索結果。檢自http://dict.revised.moe.edu.tw/cgi-bin/cbdic/gsweb.cgi?o=dcbdic&searchid=Z00000118380 (May 14, 2020)郭國泰、司徒達賢、于卓民(2008)。商業生態系統之變遷:以軟體產業為例。創新與管理,6(1),1-27。doi:10.30118/JIM.200811.0001陳怡心(2018)。從行動者網絡理論觀點探究水資源課程的生成與轉譯歷程。未出版之碩士論文,國立臺灣師範大學,教育學系,台北市。盧希鵬-商業周刊 (2017)。C2B逆商業時代。台北市:城邦文化事業股份有限公司-商業周刊蕭余芷(2020)。區塊鏈及數位加密貨幣的應用範例及挑戰。未出版之碩士論文,元智大學,經營管理碩士班,桃園市。资武成(2013)。“大数据”时代企业生态系统的演化与建构. 社会科学, (12), 55-62。英文參考文獻:Allen, C., (2016). The Path to Self-Sovereign Identity. Retrieved April 18, 2020 from http://www.lifewithalacrity. com/2016/04/the-path-to-self-soverereign-identity.htmlFerdous, M. Chowdhury, F. & Alassafi, M.(2019). In Search of Self-Sovereign Identity Leveraging Blockchain Technology. IEEE Access.Arenas, R., & Fernandez, P. (2018). CredenceLedger: A Permissioned Blockchain for Verifiable Academic Credentials. In 2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings. Retrieved April 18, 2020 from https://doi.org/10.1109/ICE.2018.8436324Baars, D. (2016). Towards Self-Sovereign Identity using Blockchain Technology. University of Twente.Blockchainhub Berlin (2018). Self Sovereign – Identity vs Data?. Retrieved May 1, 2020 from https://blockchainhub.net/blog/blog/self-sovereign-identity-vs-data/Callon, M. (1984). Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay. The Sociological Review, 32(1_suppl), 196–233.Di Francesco Maesa, D., & Mori, P. (2020). Blockchain 3.0 applications survey. Journal of Parallel and Distributed Computing. Retrieved April 18, 2020 from https://doi.org/10.1016/j.jpdc.2019.12.019Facebook (2020). FACEBOOK for Developers. Retrieved Aug. 23 from https://developers.facebook.com/docs/facebook-login/web/Google (2020). Auth Protocols. Retrieved Aug. 23 from https://developers.google.com/identityIETF (2012). RFC 6749: The OAuth 2.0 Authorization Framework. Retrieved Aug. 23 from https://tools.ietf.org/html/rfc6749ISO (2019). ISO/IEC 24760-1:2019 IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts. Retrieved Aug. 23 from https://www.iso.org/standard/77582.htmlLagutin, D., Kortesniemi, Y., Fotiou, N., & Siris, V. A. (2019). Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT Devices using OAuth-based Delegation. Retrieved April 18, 2020 from https://doi.org/10.14722/diss.2019.23005Latour, B(1993). We have never been modern. Harvester Wheatsheaf, Hemel Hempstead.Latour, B. (1984). The Powers of Association. The Sociological Review, 32(1_suppl), 264–280.OpenID (2020). Specifications. Retrieved Aug. 23 from https://openid.net/developers/specs/Risk Based Security (2020). 2020 Q1 Report Data Breach QuickView. Retrieved May 22 from https://pages.riskbasedsecurity.com/hubfs/Reports/2020/2020%20Q1%20Data%20Breach%20QuickView%20Report.pdf?hsCtaTracking=5d936f78-de69-45a4-9ba5-03c2e9f20952%7C617588df-ee05-4a00-bbb1-191d6888f519Seuwou, P., Banissi, E., Ubakanma, G., Sharif, M. S., & Healey, A. (2017). Actor-network theory as a framework to analyse technology acceptance model’s external variables: the case of autonomous vehicles. In International Conference on Global Security, Safety, and Sustainability (pp. 305-320). Springer, Cham.Tatnall, A. & Gilding, A. (1999). Actor-Network Theory and Information Systems Research. Victoria University of Technology, Melbourne, Australia.Tobin, A., & Reed, D. (2016). The inevitable rise of self-sovereign identity. The Sovrin Foundation, 29(2016).Uwe Der, Stefan Jähnichen, Jan Sürmelif (2017). Self-sovereign Identity − Opportunities and Challenges for the Digital Revolution. Retrieved May 4, 2020 from https://arxiv.org/abs/1712.01767Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 157-178.W3C-did-core (2020). Decentralized Identifiers (DIDs) v1.0. Retrieved May 16, 2020 from https://w3c.github.io/did-core/W3C-did-use-cases (2020). Use Cases and Requirements for Decentralized Identifiers. Retrieved May 4, 2020 from https://www.w3.org/TR/did-use-cases/W3C-use-cases(2017). Verifiable Claims Use Cases 1.0. Retrieved April 18, 2020 from https://www.w3.org/2017/05/vc-use-cases/CGFR/2017-05-01/W3C-vc-data-model (2019). Verifiable Credentials Data Model 1.0. Retrieved April 18, 2020 from https://www.w3.org/TR/vc-data-model/W3C-vc-use-cases (2019). Verifiable Credentials Use Cases. Retrieved April 18, 2020 from https://www.w3.org/TR/vc-use-cases/ 描述 碩士
國立政治大學
經營管理碩士學程(EMBA)
105932072資料來源 http://thesis.lib.nccu.edu.tw/record/#G0105932072 資料類型 thesis dc.contributor.advisor 鄭至甫 zh_TW dc.contributor.advisor Jeng, Jyh-Fu en_US dc.contributor.author (Authors) 林陽 zh_TW dc.contributor.author (Authors) Lin, Yang en_US dc.creator (作者) 林陽 zh_TW dc.creator (作者) Lin, Yang en_US dc.date (日期) 2021 en_US dc.date.accessioned 2-Mar-2021 14:21:36 (UTC+8) - dc.date.available 2-Mar-2021 14:21:36 (UTC+8) - dc.date.issued (上傳時間) 2-Mar-2021 14:21:36 (UTC+8) - dc.identifier (Other Identifiers) G0105932072 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/134033 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 經營管理碩士學程(EMBA) zh_TW dc.description (描述) 105932072 zh_TW dc.description.abstract (摘要) 由於全球大多數地區的網際網路基礎建設及行動通訊網路日臻成熟發達,無論是個人、組織、機構、企業、政府等個體(entity),每日都在網路世界大量產生與其相關的數據或資料。過去,個體均需仰賴其他可以取信於公眾的其他個體之電腦資訊軟硬體系統及通訊設備,來對個體的身份及其所產生的數據或資料加以管理、進而控制。這些管理及控制身份與資料的個體,已經被證實無法安全保護所轄個體的身份隱私權、或是以壟斷資料所有權的方式來進行不公平的市場競爭。因此,身份自主權(self sovereign identity)的思潮運動已經從萌芽進入到成長階段,雖然尚未啟迪所有公民的自主意識,但是藉由區塊鏈技術的發展及採用,讓身份自主權已開始步入到實際應用上;而以身份自主權為基礎的資訊科技未來顛覆人類的生活方式實屬可期。本文採用商業生態系統觀點為基礎,採用內容資料分析法,探討產業中主要領導的廠商、組織及團體,在自主權應用的發展所扮演的角色;並透過問卷調查進行量化分析方法,了解顧客群體從其他生態系統遷移到身份自主權生態系統的支持意願。冀望從資料整理分析之後,得出台灣地區從事業者進軍世界其他地區的發展策略。 zh_TW dc.description.abstract (摘要) With the advent of the construction maturity of Internet infrastructure and mobile telecommunication networks in the world, entities, whether individuals, organizations, institutions, enterprises, or governments, create tons of data and information in the cyberspace day by day. Before, entities need to rely on others’ computers as well as information software and hardware systems which are trusted by the public to manage and control their identities and related private data and information. However, some means of facilitating the management and controlling mechanisms of others’ identities and data have been proven incapable of securing the privacy of data or information kept in their hands. Others even corner the whole market by monopolizing the ownership of collected data. The ideological trend to adapt self sovereign identity has been rapidly burgeoned although the perception of it has not thoroughly known by all the citizens yet. However, the development of blockchain technologies propelling the according applications to the real world has been practiced and deployed . The information technologies building on self sovereign identity will definitely re-shape and innovate our future life.On the basis of Business Ecosystem perspective, this study explores the roles of leading vendors, organizations, and groups playing in the development of Self Sovereign Identity by employing the methodology of content analysis. Via collecting questionnaires on the Internet and analyzing the data by a quantitative approach, we try to understand end users’ willingness to support the migration from other ecosystems to SSI. After the sight of the data analysis result, we expect to propose some development strategies to assist the engaged Taiwan vendors and operators in their entrance to international markets. en_US dc.description.tableofcontents 第一章 緒論 8第一節 研究背景 8第二節 研究動機 14第三節 研究問題 15第四節 研究目的 16第五節 研究流程 17第二章 文獻探討 18第一節 身份自主權 18第二節 商業生態系統 26第三節 創新擴散理論 31第四節 行為者網路理論 34第三章 研究方法 39第一節 研究架構 39第二節 問卷設計 43第三節 研究對象與蒐集方法 44第四章 研究發現 45第一節 以身份自主權所建構之商業生態系統 45第二節 顧客選擇遷移到以身份自主權商業生態系統的意願 57第五章 結論與建議 72參考文獻 75附錄一:調查問卷 79 zh_TW dc.format.extent 5738822 bytes - dc.format.mimetype application/pdf - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0105932072 en_US dc.subject (關鍵詞) 身份自主權 zh_TW dc.subject (關鍵詞) 商業生態系統 zh_TW dc.subject (關鍵詞) 創新擴散理論 zh_TW dc.subject (關鍵詞) 行為者網路理論 zh_TW dc.subject (關鍵詞) Self Sovereign Identity en_US dc.subject (關鍵詞) Business Ecosystem en_US dc.subject (關鍵詞) Diffusion of Innovation en_US dc.subject (關鍵詞) Actor Network Theory en_US dc.title (題名) 以商業生態系統理論之觀點探討身份自主權的發展 zh_TW dc.title (題名) Using Business Ecosystem Perspective to Analyze the Development of Self Sovereign Identity en_US dc.type (資料類型) thesis en_US dc.relation.reference (參考文獻) 中文參考文獻:Botsman, R., (2018)。信任革命:信任的轉移與科技所扮演的角色(林添貴譯)。台北市:遠流出版事業股份有限公司(原著出版於2017)King, B., (2018)。Bank 4.0金融常在,銀行不再?(孫一仕、周群英、林凱雄譯)。台北市:台灣金融研訓院。(原著出版於2018)Latour, B., (2016)。巴斯德的實驗室-細菌的戰爭與和平(伍啟鴻、陳榮泰譯)。新北市:群學出版有限公司。(原著出版於2011)Latour, B., (2017)。激情的經濟學(陳榮泰、伍啟鴻譯)。新北市:群學出版有限公司。(原著出版於2008)Moore, James F. (1999)。競爭的衰亡-商業生態系統時代的領導與戰略(梁駿譯)。北京市:北京出版社。(原著出版於1996)Rogers, E.M., (2016)。創新的擴散(唐興通、鄭常青、張延臣譯)。北京市:電子工業出版社。(原著出版於1983)Scheer R., (2016)。誰買走我的個資? 當你一上網, 就等於宣告我自願出賣關於我的所有資料, 且分文不取, 以使企業獲得最大利益的時代來臨。為什麼? 該如何遏止?(林麗雪譯)。新北市:好優文化出版有限公司。(原著出版於2015)吳思慧(2013)。社交網站之社群信任、成員關係信任與訊息信任對購買意願影響研究。未出版之碩士論文,南臺科技大學,資訊傳播系碩士班,台南市。教育部重編國語辭典修訂本,【主權】檢索結果。檢自http://dict.revised.moe.edu.tw/cgi-bin/cbdic/gsweb.cgi?o=dcbdic&searchid=Z00000118380 (May 14, 2020)郭國泰、司徒達賢、于卓民(2008)。商業生態系統之變遷:以軟體產業為例。創新與管理,6(1),1-27。doi:10.30118/JIM.200811.0001陳怡心(2018)。從行動者網絡理論觀點探究水資源課程的生成與轉譯歷程。未出版之碩士論文,國立臺灣師範大學,教育學系,台北市。盧希鵬-商業周刊 (2017)。C2B逆商業時代。台北市:城邦文化事業股份有限公司-商業周刊蕭余芷(2020)。區塊鏈及數位加密貨幣的應用範例及挑戰。未出版之碩士論文,元智大學,經營管理碩士班,桃園市。资武成(2013)。“大数据”时代企业生态系统的演化与建构. 社会科学, (12), 55-62。英文參考文獻:Allen, C., (2016). The Path to Self-Sovereign Identity. Retrieved April 18, 2020 from http://www.lifewithalacrity. com/2016/04/the-path-to-self-soverereign-identity.htmlFerdous, M. Chowdhury, F. & Alassafi, M.(2019). In Search of Self-Sovereign Identity Leveraging Blockchain Technology. IEEE Access.Arenas, R., & Fernandez, P. (2018). CredenceLedger: A Permissioned Blockchain for Verifiable Academic Credentials. In 2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings. Retrieved April 18, 2020 from https://doi.org/10.1109/ICE.2018.8436324Baars, D. (2016). Towards Self-Sovereign Identity using Blockchain Technology. University of Twente.Blockchainhub Berlin (2018). Self Sovereign – Identity vs Data?. Retrieved May 1, 2020 from https://blockchainhub.net/blog/blog/self-sovereign-identity-vs-data/Callon, M. (1984). Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay. The Sociological Review, 32(1_suppl), 196–233.Di Francesco Maesa, D., & Mori, P. (2020). Blockchain 3.0 applications survey. Journal of Parallel and Distributed Computing. Retrieved April 18, 2020 from https://doi.org/10.1016/j.jpdc.2019.12.019Facebook (2020). FACEBOOK for Developers. Retrieved Aug. 23 from https://developers.facebook.com/docs/facebook-login/web/Google (2020). Auth Protocols. Retrieved Aug. 23 from https://developers.google.com/identityIETF (2012). RFC 6749: The OAuth 2.0 Authorization Framework. Retrieved Aug. 23 from https://tools.ietf.org/html/rfc6749ISO (2019). ISO/IEC 24760-1:2019 IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts. Retrieved Aug. 23 from https://www.iso.org/standard/77582.htmlLagutin, D., Kortesniemi, Y., Fotiou, N., & Siris, V. A. (2019). Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT Devices using OAuth-based Delegation. Retrieved April 18, 2020 from https://doi.org/10.14722/diss.2019.23005Latour, B(1993). We have never been modern. Harvester Wheatsheaf, Hemel Hempstead.Latour, B. (1984). The Powers of Association. The Sociological Review, 32(1_suppl), 264–280.OpenID (2020). Specifications. Retrieved Aug. 23 from https://openid.net/developers/specs/Risk Based Security (2020). 2020 Q1 Report Data Breach QuickView. Retrieved May 22 from https://pages.riskbasedsecurity.com/hubfs/Reports/2020/2020%20Q1%20Data%20Breach%20QuickView%20Report.pdf?hsCtaTracking=5d936f78-de69-45a4-9ba5-03c2e9f20952%7C617588df-ee05-4a00-bbb1-191d6888f519Seuwou, P., Banissi, E., Ubakanma, G., Sharif, M. S., & Healey, A. (2017). Actor-network theory as a framework to analyse technology acceptance model’s external variables: the case of autonomous vehicles. In International Conference on Global Security, Safety, and Sustainability (pp. 305-320). Springer, Cham.Tatnall, A. & Gilding, A. (1999). Actor-Network Theory and Information Systems Research. Victoria University of Technology, Melbourne, Australia.Tobin, A., & Reed, D. (2016). The inevitable rise of self-sovereign identity. The Sovrin Foundation, 29(2016).Uwe Der, Stefan Jähnichen, Jan Sürmelif (2017). Self-sovereign Identity − Opportunities and Challenges for the Digital Revolution. Retrieved May 4, 2020 from https://arxiv.org/abs/1712.01767Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 157-178.W3C-did-core (2020). Decentralized Identifiers (DIDs) v1.0. Retrieved May 16, 2020 from https://w3c.github.io/did-core/W3C-did-use-cases (2020). Use Cases and Requirements for Decentralized Identifiers. Retrieved May 4, 2020 from https://www.w3.org/TR/did-use-cases/W3C-use-cases(2017). Verifiable Claims Use Cases 1.0. Retrieved April 18, 2020 from https://www.w3.org/2017/05/vc-use-cases/CGFR/2017-05-01/W3C-vc-data-model (2019). Verifiable Credentials Data Model 1.0. Retrieved April 18, 2020 from https://www.w3.org/TR/vc-data-model/W3C-vc-use-cases (2019). Verifiable Credentials Use Cases. Retrieved April 18, 2020 from https://www.w3.org/TR/vc-use-cases/ zh_TW dc.identifier.doi (DOI) 10.6814/NCCU202100236 en_US