學術產出-學位論文

文章檢視/開啟

書目匯出

Google ScholarTM

政大圖書館

引文資訊

TAIR相關學術產出

題名 網站隱私權政策分析-以台灣網站為例
網站隱私權政策分析-以台灣網站為例
作者 李俊磊
Li , Chun-Lei
貢獻者 湯宗益
李俊磊
Li , Chun-Lei
關鍵詞 網站
網站
個人資訊
個人資訊
公平資訊實施
公平資訊實施
隱私權政策
隱私權政策
Website
Website
Personal Information
Personal Information
Fair Information Practice
Fair Information Practice
Privacy Policy
Privacy Policy
日期 2003
上傳時間 14-九月-2009 09:12:14 (UTC+8)
摘要 個人資料的資料流(Data Flows)在網路上的擴散,造成對個人隱私權的威脅,逐漸已經成為社會大眾所關注的議題。在過去幾年中,網站逐漸被要求制定相關的規範以符合大眾的期待。然而,隨著網際網路環境的快速變遷,網站的規範是否提供適當的個人隱私權保護,將會成為社會大眾持續討論的問題。
      部分的網站已經滿足隱私權到某種程度。這些網站開始採用一些普遍性的實作。在某些程度上,這些實作依循由隱私權規範創立者所推動的公平資訊實施原則(Fair Information Practice Principle)(FTC,1998a)。
      本研究根據文獻探討提及的公平資訊實施原則:告知(notice)、選擇(choice)、存取(access)、與安全(security),對個人使用者感興趣的台灣地區網站進行網站隱私權政策分析與調查研究,探討其對個人隱私揭露的程度。
      研究結果指出,樣本中84.1%的網站收集至少一種形式的個人識別資訊(例如:姓名,e-mail address,郵政地址),72.3%收集至少一種形式的人口統計學資訊(例如:性別,喜好,郵遞區號),71.8%的網站兩者接收集,而15.4%的網站兩者皆不收集。隱私揭露方面,67.7%(390個樣本中的264個)刊載至少一種形式的隱私揭露(一個隱私權政策的告示或是一個資訊實施聲明),50.5%這兩種形式的隱私揭露都刊載,有32.3%個網站這兩種形式的隱私揭露皆不刊載。觀察隱私揭露反映公平資訊實施的程度,在264個有收集個人資訊與刊載隱私揭露的網站中,92.8%包含至少一種關於(告知)的調查項目,70.8%包含至少一種關於(選擇)的調查項目,80.7%包含至少一種關於(存取)的調查項目,43.9%包含至少一種關於(安全)的調查項目,以及26.9%包含關於(聯絡資訊)的調查項目。
      在本研究中,看待這些網站樣本所得出的結果,應特別注意那些較不滿足公平資訊實施原則的部分,包括對Cookies使用的告知、告知關於外界第三者的相關資訊、選擇、安全以及聯絡資訊等部份所表現出來的結果,而實際上所有台灣網站所表現出的結果,很可能比本研究所得出的結果來得更為不理想,網站若要更能滿足使用者對隱私權保護的期待,就必須更正視這些部份的隱私揭露保護。
      資料的收集與使用對網路環境的發展影響甚鉅,網站營運者在思考如何使資料的利用最大化時,必須兼顧使用者的隱私權。唯有在合理,相互尊重的架構下,才能替彼此創造出長遠的利益。本研究的結果希望能對台灣在檢討、發展、建立符合台灣環境及與世界接軌的網路隱私權保護環境上,作出些許的貢獻。
The spreading of personal data flows over the Internet has threatened many online individuals’ privacy, which also becomes a noticeable topic among the society. For the past few years, there were norms applied to websites in order to protect online users’ privacy. However, could norms provide proper protections along with the rapid improvement of Internet technology? This topic will remain among society’s discussion.
      Some websites provide certain amount of protections by using popular practices. On a certain level, these practices follow the Fair Information Practice Principle that was supported by the Privacy Norm Entrepreneurs (FTC, 1998).
      This research is based on the four main elements of Fair Information Practice Principle: Notice, Choice, Access, and Security. The thesis concentrates on analyzing and researching the privacy policy about privacy disclosure provided by websites that were directed and interested to individual user within Taiwan.
      Based on the result of this research, 84.1% of the sampled websites collected at least one type of personal identifying information (e.g. name, e-mail address, postal address). 72.3% of the sampled websites collected at least one type of demographic information (e.g. gender, preferences, Zip code). 71.8% of the websites collected both types of personal information, and 15.4% collected neither type of personal information. As for privacy disclosure, 67.7% of the websites (264 out of 390 sampled websites) provided at least one type of privacy disclosures (a privacy policy notice or an information practice statement). 50.5% of the websites provided both types of disclosures; and 32.3% of the websites provided none of the above. By studying the researched websites along with the Fair Information Practice Principle, Of the 264 websites that collected personal information and posted a privacy disclosure, 92.8% included at least one survey item for notice, 70.8% contained at least one survey item for choice, 80.7% contained at least one survey item for access, 43.9% contained at least one survey item for security, and 26.9% contained at least one survey item for contact information.
      While studying the research result, it is important to concentrate on the websites that did not follow the Fair Information Practice Principle. The result includes websites’ notice of Cookies usage, and providing third party related information, choice, security, and contact information, etc. However, the result in reality could be a lot worse than the research result. In order to fulfill online users’ anticipation, websites should pay more attention on privacy policy of these parts.
      Colleting and using users’data influence the development of online environment greatly. Web owners should consider their customers’ privacy rights while trying to capitalize customers’ information. The only way to generate long and stable benefit for both provider and user is with respect. Hopefully the result of this research will contribute some amount of consideration and development of privacy protection that works for websites and users in Taiwan.
參考文獻 中文部分
中文部分
王郁琦(1996),「網路上的隱私權問題」,資訊法務透析,1996年10月號。
王郁琦(1996),「網路上的隱私權問題」,資訊法務透析,1996年10月號。
尤英夫(1997),「新聞媒體與隱私權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。
尤英夫(1997),「新聞媒體與隱私權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。
朱柏松(1989),「隱私權概念的衍變及其損害防止立法之動向」,法學叢刊,第134期。
朱柏松(1989),「隱私權概念的衍變及其損害防止立法之動向」,法學叢刊,第134期。
李震山(1997),「論資訊自決權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。
李震山(1997),「論資訊自決權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。
呂雅雯(2000),「探討通訊隱私範圍之變遷-以美國、德國和台灣法規為例」,中正電傳所碩士論文。
呂雅雯(2000),「探討通訊隱私範圍之變遷-以美國、德國和台灣法規為例」,中正電傳所碩士論文。
林建中(1999),「隱私權概念的再思考一關於概念範圍、定義及權利形成方法」,台大法研所碩士論文。
林建中(1999),「隱私權概念的再思考一關於概念範圍、定義及權利形成方法」,台大法研所碩士論文。
林育廷(2000),「行政動態-美國提出規則P草案保護消費者金融資訊隱私權」,科技法律透析,2000年4月,pp.22-23。
林育廷(2000),「行政動態-美國提出規則P草案保護消費者金融資訊隱私權」,科技法律透析,2000年4月,pp.22-23。
邱建動(2000),「從電子商務的面向探討網路資訊隱私權」,2000網路與社會研討會,新竹:清大社會所。
邱建動(2000),「從電子商務的面向探討網路資訊隱私權」,2000網路與社會研討會,新竹:清大社會所。
邱建勳(2001),「電子商務環境中「個人資料財產權」之探討─以著作權為主」,國立中正大學電訊傳播研究所碩士論文。
邱建勳(2001),「電子商務環境中「個人資料財產權」之探討─以著作權為主」,國立中正大學電訊傳播研究所碩士論文。
邱顯貴(2002),「電子商務網站信任管理之研究」,政大資管所博士論文。
邱顯貴(2002),「電子商務網站信任管理之研究」,政大資管所博士論文。
洪榮彬(1993),「資訊時代之資料處理與資料保護-以德國聯邦個人資料保護法為中心」,輔大法研所碩士論文。
洪榮彬(1993),「資訊時代之資料處理與資料保護-以德國聯邦個人資料保護法為中心」,輔大法研所碩士論文。
洪順慶(1998),「淺談關係行銷」,http://www.ba.nccu.edu.tw/schoolfellow/1998/199812-3.htm.
洪順慶(1998),「淺談關係行銷」,http://www.ba.nccu.edu.tw/schoolfellow/1998/199812-3.htm.
許宗力譯(1988),「德國行政法在立法、學說與審判實務上之最新發展」,台大法學論叢,第17期2卷。
許宗力譯(1988),「德國行政法在立法、學說與審判實務上之最新發展」,台大法學論叢,第17期2卷。
黃三榮(1998),「個人資料之保護-兼評我國電腦處理個人資料保護法」,資訊法務透析,1998年1月號,p.40。
黃三榮(1998),「個人資料之保護-兼評我國電腦處理個人資料保護法」,資訊法務透析,1998年1月號,p.40。
郭恬如(1998),「虛擬社區顧客輪廓資料、關係行銷及其隱私權議題」,政大企研所碩士論文。
郭恬如(1998),「虛擬社區顧客輪廓資料、關係行銷及其隱私權議題」,政大企研所碩士論文。
詹文凱(1998),「隱私權的研究」,台大法研所博士論文。
詹文凱(1998),「隱私權的研究」,台大法研所博士論文。
葉重新(1999),「心理測驗」,台北:三民書局。
葉重新(1999),「心理測驗」,台北:三民書局。
葉俊榮與許宗力主持(1996):「政府資訊公開制度之研究」,台北:行政院研考會,p.l0。
葉俊榮與許宗力主持(1996):「政府資訊公開制度之研究」,台北:行政院研考會,p.l0。
資策會科技法律中心,「美國全球電子商業綱要與我國因應之道」,http://stlc.iii.org.tw/articles/Netlaw/860927t.htm.
資策會科技法律中心,「美國全球電子商業綱要與我國因應之道」,http://stlc.iii.org.tw/articles/Netlaw/860927t.htm.
廖緯民(1996),「論資訊時代的隱私權保護-以「資訊隱私權」為中心」,資訊法務透析,1996年11月號,p.22。
廖緯民(1996),「論資訊時代的隱私權保護-以「資訊隱私權」為中心」,資訊法務透析,1996年11月號,p.22。
數位週刊 e business weekly,(2000),「台灣500大受歡迎網站」,2000年11月號,p.44-61。
數位週刊 e business weekly,(2000),「台灣500大受歡迎網站」,2000年11月號,p.44-61。
劉靜怡(1997),「資訊科技與隱私權焦慮-誰有權塑造我的網路形象?」,當代雜誌,第124期,p.80。
劉靜怡(1997),「資訊科技與隱私權焦慮-誰有權塑造我的網路形象?」,當代雜誌,第124期,p.80。
劉靜怡(2000),「網際網路時代的資訊使用與隱私權保護規範:個人、政府與市場的拔河」,(2000年網際空間:資訊、法律與社會)研討會,桃園:警大。
劉靜怡(2000),「網際網路時代的資訊使用與隱私權保護規範:個人、政府與市場的拔河」,(2000年網際空間:資訊、法律與社會)研討會,桃園:警大。
顏厥安(2000),「財產、人格、還是資訊?論人類基因的法律地位」,2000基因科技之法律管制體系與社會衝擊研究研討會,台北:台灣大學。
顏厥安(2000),「財產、人格、還是資訊?論人類基因的法律地位」,2000基因科技之法律管制體系與社會衝擊研究研討會,台北:台灣大學。
權平法律資訊網,「網路上資訊隱私權保障問題之研究」,http://www.cyberlawyer.com.tw/alan4-0801.html.
權平法律資訊網,「網路上資訊隱私權保障問題之研究」,http://www.cyberlawyer.com.tw/alan4-0801.html.
英文部分
英文部分
Baker, Stewart (1999), Regulating Technology for Law Enforcement, 4 TEX. REV. L. & POL’Y. 53, 53.
Baker, Stewart (1999), Regulating Technology for Law Enforcement, 4 TEX. REV. L. & POL’Y. 53, 53.
Banisar, D.(2000), Privacy & Human Rights 2000, http://www.privacyinternational.org/survey/index2000.html.
Banisar, D.(2000), Privacy & Human Rights 2000, http://www.privacyinternational.org/survey/index2000.html.
Berman, A. S.(2001), Reports of Gates’ Death Greatly E-xaggerated, USA TODAY.
Berman, A. S.(2001), Reports of Gates’ Death Greatly E-xaggerated, USA TODAY.
Berry, L.L.(1995), Relationship marketing of services-growing interest, emerging perspectivies, Journal of the Academy of Marketing Science, 23(4), 236.
Berry, L.L.(1995), Relationship marketing of services-growing interest, emerging perspectivies, Journal of the Academy of Marketing Science, 23(4), 236.
Borrus , Amy(2001), The Stage Seems Set for Net Privacy Rules this Year, BUSINESS WEEK, at 51.
Borrus , Amy(2001), The Stage Seems Set for Net Privacy Rules this Year, BUSINESS WEEK, at 51.
Clark, Drew(2001), Activists Unite To Push For Stronger Privacy Laws, NAT’L J. TECH. DAILY.
Clark, Drew(2001), Activists Unite To Push For Stronger Privacy Laws, NAT’L J. TECH. DAILY.
Clausing, Jeri(2000),Can Internet Advertisers Police Themselves? Washington Remains Unconvinced, N.Y. TIMES, at C10.
Clausing, Jeri(2000),Can Internet Advertisers Police Themselves? Washington Remains Unconvinced, N.Y. TIMES, at C10.
Culnan, M.(1999a), Georgetown Internet Privacy Policy Survey:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html.
Culnan, M.(1999a), Georgetown Internet Privacy Policy Survey:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html.
Culnan, M.(1999b), Privacy and the Top 100 Web Sites:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html.
Culnan, M.(1999b), Privacy and the Top 100 Web Sites:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html.
Davidson, Paul(2001a), Marketing Gurus Clash on Internet Privacy Rules, USA TODAY, at 2B.
Davidson, Paul(2001a), Marketing Gurus Clash on Internet Privacy Rules, USA TODAY, at 2B.
Davidson, Paul(2001b), Capitol Hill Support Brews for Internet Privacy Laws, USA TODAY, at 3B.
Davidson, Paul(2001b), Capitol Hill Support Brews for Internet Privacy Laws, USA TODAY, at 3B.
DuPont, Randall(1998), Relationship marketing:A strategy for consumer-owned utilities in a restructured industry, Management Quarterly 38(4), 12.
DuPont, Randall(1998), Relationship marketing:A strategy for consumer-owned utilities in a restructured industry, Management Quarterly 38(4), 12.
Ellickson, Robert C. (1991), Order Without Law: How Neighbors Settle Disputes 213–15.
Ellickson, Robert C. (1991), Order Without Law: How Neighbors Settle Disputes 213–15.
Federal Trade Commission (1998a), Privacy Online: A Report to Congress, http://www.ftc.gov/reports/privacy3/priv-23.htm.
Federal Trade Commission (1998a), Privacy Online: A Report to Congress, http://www.ftc.gov/reports/privacy3/priv-23.htm.
Federal Trade Commission(1998b), Internet site agrees to settle FTC charges of deceptively collecting personal information in Agency’s first internet privacy case, http://www.ftc.gov/opa/1998/08/geocitie.htm.
Federal Trade Commission(1998b), Internet site agrees to settle FTC charges of deceptively collecting personal information in Agency’s first internet privacy case, http://www.ftc.gov/opa/1998/08/geocitie.htm.
Federal Trade Commission(1998c), The FTC announced the following actions, http://www.ftc.gov/opa/1999/02/petapp4.99htm.
Federal Trade Commission(1998c), The FTC announced the following actions, http://www.ftc.gov/opa/1999/02/petapp4.99htm.
Federal Trade Commission (2000a), Privacy Online: Fair Information Practices in the Electronic Marketplace: A Federal Trade Commission Report to Congress, http://www.ftc.gov/reports/#2000.
Federal Trade Commission (2000a), Privacy Online: Fair Information Practices in the Electronic Marketplace: A Federal Trade Commission Report to Congress, http://www.ftc.gov/reports/#2000.
Federal Trade Commission (2000b), Privacy Online: Fair Information Practices in the Electronic Marketplace, A Federal Trade Commission Report to Congress 10.
Federal Trade Commission (2000b), Privacy Online: Fair Information Practices in the Electronic Marketplace, A Federal Trade Commission Report to Congress 10.
Federal Trade Commission(2000c), FTC sues failed website, Toysmart.com for deceptively offering for sale personal information of website visitors, http://www.ftc.gov/opa/2000/07/toysmart.htm.
Federal Trade Commission(2000c), FTC sues failed website, Toysmart.com for deceptively offering for sale personal information of website visitors, http://www.ftc.gov/opa/2000/07/toysmart.htm.
Federal Trade Commission(2000d), FTC v. Toysmart.com, LLC, and Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartcmp.htm.
Federal Trade Commission(2000d), FTC v. Toysmart.com, LLC, and Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartcmp.htm.
Federal Trade Commission(2000e), Dissenting statement of commissioner Orson Swindle in Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartswindlestatement.htm.
Federal Trade Commission(2000e), Dissenting statement of commissioner Orson Swindle in Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartswindlestatement.htm.
Flaherty, David H. (1989), Protecting Privacy in Surveillance Societies, 306–08.
Flaherty, David H. (1989), Protecting Privacy in Surveillance Societies, 306–08.
Gibbons, Llewellyn Joseph (1997), No Regulation or Self-Regulation: Social Enforcement or Social Contracting for Governance in Cyberspace, 6 CORNELL J.L. & PUB. POL’Y 475.
Gibbons, Llewellyn Joseph (1997), No Regulation or Self-Regulation: Social Enforcement or Social Contracting for Governance in Cyberspace, 6 CORNELL J.L. & PUB. POL’Y 475.
Givens, B.(1997), A Review of State and Federal Privacy Laws, http://www.privacyrights.org/ar/jttaskap.htm.
Givens, B.(1997), A Review of State and Federal Privacy Laws, http://www.privacyrights.org/ar/jttaskap.htm.
Glancy, Dorothy(2000), At the Intersection of Visible and Invisible Worlds: United States Privacy Law and the Internet, 16 SANTA CLARA COMPUTER & HIGHTECH. L.J. 357, 370.
Glancy, Dorothy(2000), At the Intersection of Visible and Invisible Worlds: United States Privacy Law and the Internet, 16 SANTA CLARA COMPUTER & HIGHTECH. L.J. 357, 370.
Gonzalez, Jason(2001), Better Business Bureau Gives Nod to Lowe’s, NATIONAL HOME CENTER NEWS, at 7.
Gonzalez, Jason(2001), Better Business Bureau Gives Nod to Lowe’s, NATIONAL HOME CENTER NEWS, at 7.
Graubert, John & Coleman, Jill(1999), Consumer Protection and Antitrust Enforcement at the Speed of Light: The FTC Meets the Internet, 25 CAN.-U.S. L.J. 275, 290.
Graubert, John & Coleman, Jill(1999), Consumer Protection and Antitrust Enforcement at the Speed of Light: The FTC Meets the Internet, 25 CAN.-U.S. L.J. 275, 290.
Hafner, Katie(1999),Do You Know Who’s Watching You? Do You Care? , N.Y. TIMES, at G1.
Hafner, Katie(1999),Do You Know Who’s Watching You? Do You Care? , N.Y. TIMES, at G1.
Hamilton, David P.(2001), The Gadfly: Privacy Cop Richard Smith Is Out to Keep Companies Honest – Whether They Like It Or Not, WALL ST. J., at R10.
Hamilton, David P.(2001), The Gadfly: Privacy Cop Richard Smith Is Out to Keep Companies Honest – Whether They Like It Or Not, WALL ST. J., at R10.
Hetcher, Steven(2000), The Law and Economics of Intellectual Property Rights:The FTC as Internet Norm Entrepreneur, 53 Vand. L. Rev. 2041.
Hetcher, Steven(2000), The Law and Economics of Intellectual Property Rights:The FTC as Internet Norm Entrepreneur, 53 Vand. L. Rev. 2041.
Hetcher, Steven(2001a), Changing the Social Meaning of Privacy in Cyberspace, Harvard Journal of Law & Technology Volume 15, Number 1.
Hetcher, Steven(2001a), Changing the Social Meaning of Privacy in Cyberspace, Harvard Journal of Law & Technology Volume 15, Number 1.
Hetcher, Steven (2001b), Norm Proselytizers Create a Privacy Entitlement in Cyberspace, 16 BERKELEY TECH. L.J. 877.
Hetcher, Steven (2001b), Norm Proselytizers Create a Privacy Entitlement in Cyberspace, 16 BERKELEY TECH. L.J. 877.
Jacobus, Patricia (2000), Privacy groups call Amazon policy "deceptive", http://news.com.com/2100-1017_3-249376.html.
Jacobus, Patricia (2000), Privacy groups call Amazon policy "deceptive", http://news.com.com/2100-1017_3-249376.html.
Kalish, David E.(2000), Online Ad Agency Gives Up Plan To Sell Data; DoubleClick Bows to Privacy Advocates, ST. LOUIS POST-DISPATCH, at C6.
Kalish, David E.(2000), Online Ad Agency Gives Up Plan To Sell Data; DoubleClick Bows to Privacy Advocates, ST. LOUIS POST-DISPATCH, at C6.
Killingsworth, Scott(1999), Minding Your Own Business: Privacy Policies in Principle and in Practice, J. INTERNET L., at 12.
Killingsworth, Scott(1999), Minding Your Own Business: Privacy Policies in Principle and in Practice, J. INTERNET L., at 12.
Kluger , Jeffrey(2000,), Extortion on the Internet; A daring hacker tries to blackmail an e-tailer — and sparks new worries about credit-card cybertheft, TIME, at 56.
Kluger , Jeffrey(2000,), Extortion on the Internet; A daring hacker tries to blackmail an e-tailer — and sparks new worries about credit-card cybertheft, TIME, at 56.
Kramer, L.C.(2002), Private Eyes Are Watching You:Consumer Online Privacy Protection-Lessons from Home and Abroad, Texas International Law Journal, 37(2), 387-420.
Kramer, L.C.(2002), Private Eyes Are Watching You:Consumer Online Privacy Protection-Lessons from Home and Abroad, Texas International Law Journal, 37(2), 387-420.
Lemley, Mark A.(1998), Symposium on the Internet and Legal Theory: The Law and Economics of Internet Norms, 73 CHI.-KENT L. REV. 1257, 1276.
Lemley, Mark A.(1998), Symposium on the Internet and Legal Theory: The Law and Economics of Internet Norms, 73 CHI.-KENT L. REV. 1257, 1276.
Lesser, Seth R.(2001), Privacy Law in the Internet Era: New Developments and Directions, in SECOND ANNUAL INSTITUTE ON PRIVACY LAW 2001, at 187, 217–18.
Lesser, Seth R.(2001), Privacy Law in the Internet Era: New Developments and Directions, in SECOND ANNUAL INSTITUTE ON PRIVACY LAW 2001, at 187, 217–18.
Lessig, Lawrence(1999), The Architecture of Privacy, 1 VAND. J. ENT. L. & PRAC. 56, 63.
Lessig, Lawrence(1999), The Architecture of Privacy, 1 VAND. J. ENT. L. & PRAC. 56, 63.
Litman, Jessica (2000), Information Privacy/Information Property, 52 STAN. L. REV. 1283, 1283–88.
Litman, Jessica (2000), Information Privacy/Information Property, 52 STAN. L. REV. 1283, 1283–88.
MacMillan , Robert(2000), Congress to Air Public Concerns Over Privacy, NEWSBYTES.
MacMillan , Robert(2000), Congress to Air Public Concerns Over Privacy, NEWSBYTES.
Online Privacy Alliance, http://www.privacyalliance.org/resources/ppguidelines.shtml.
Online Privacy Alliance, http://www.privacyalliance.org/resources/ppguidelines.shtml.
Privacy Policy of 1800flowers.com, http://www.1800flowers.com/flowers/ security/index.asp.
Privacy Policy of 1800flowers.com, http://www.1800flowers.com/flowers/ security/index.asp.
Privacy Policy of barnesandnoble.com, http://www.barnesandnoble.com/help/nc_privacy_policy.asp?userid=2X1GTGUA5H&cds2Pid=946.
Privacy Policy of barnesandnoble.com, http://www.barnesandnoble.com/help/nc_privacy_policy.asp?userid=2X1GTGUA5H&cds2Pid=946.
Privacy Policy of disney.go.com, http://disney.go.com/corporate/legal/wdig_privacy.html.
Privacy Policy of disney.go.com, http://disney.go.com/corporate/legal/wdig_privacy.html.
Privacy Policy of hallmark.com, http://www.hallmark.com/Website/hallmark_home.html.
Privacy Policy of hallmark.com, http://www.hallmark.com/Website/hallmark_home.html.
Privacy Policy of jcrew.com, http://jcrew.com/help.sniplets/privacynew.jhtml.
Privacy Policy of jcrew.com, http://jcrew.com/help.sniplets/privacynew.jhtml.
Privacy Policy of kinkos.com, http://www.kinkos.com/global_assets/docs/privacy.php.
Privacy Policy of kinkos.com, http://www.kinkos.com/global_assets/docs/privacy.php.
Privacy Policy of madonnafanclub.com, http://www.madonnafanclub.com/ privacy.html.
Privacy Policy of madonnafanclub.com, http://www.madonnafanclub.com/ privacy.html.
Privacy Policy of microsoft.com, http://www.microsoft.com/info/privacy.mspx.
Privacy Policy of microsoft.com, http://www.microsoft.com/info/privacy.mspx.
Privacy Policy of motorola.com, http://www.motorola.com/content/0,,3,00.html.
Privacy Policy of motorola.com, http://www.motorola.com/content/0,,3,00.html.
Privacy Policy of niketown.nike.com, http://niketown.nike.com/info/privacy.jhtml.
Privacy Policy of niketown.nike.com, http://niketown.nike.com/info/privacy.jhtml.
Privacy Policy of nokia.com, http://www.nokia.com/nokia/0,1522,,00.html?orig=/privacy.html.
Privacy Policy of nokia.com, http://www.nokia.com/nokia/0,1522,,00.html?orig=/privacy.html.
Privacy Policy of sears.com, http://www.sears.com/sr/framework/home.jsp?BV_UseBVCookie=Yes&vertical=SEARS&targetPage=%2Fmisc%2Fsears%2Fpolicy%2Fprivacy.jsp.
Privacy Policy of sears.com, http://www.sears.com/sr/framework/home.jsp?BV_UseBVCookie=Yes&vertical=SEARS&targetPage=%2Fmisc%2Fsears%2Fpolicy%2Fprivacy.jsp.
Privacy Policy of sun.com, http://www.sun.com/privacy/.
Privacy Policy of sun.com, http://www.sun.com/privacy/.
Privacy Policy of toyota.com, http://www.toyota.com/html/privacy/index.html.
Privacy Policy of toyota.com, http://www.toyota.com/html/privacy/index.html.
Privacy Policy of walmart.com, http://www.walmart.com/catalog/catalog.gsp?cat=120621&path=0:5436:120160:119833:120621.
Privacy Policy of walmart.com, http://www.walmart.com/catalog/catalog.gsp?cat=120621&path=0:5436:120160:119833:120621.
Privacy Policy of weather.com, http://www.weather.com/common/home/privacy.html?from=footer.
Privacy Policy of weather.com, http://www.weather.com/common/home/privacy.html?from=footer.
Rohlmeier, Jeff & Yue, William, THE SAFE HARBOR PRIVACY FRAMEWORK, U.S. Department of Commerce, http://www.ita.doc.gov/exportamerica/NewOpportunities/NO_safeharbor.htm.
Rohlmeier, Jeff & Yue, William, THE SAFE HARBOR PRIVACY FRAMEWORK, U.S. Department of Commerce, http://www.ita.doc.gov/exportamerica/NewOpportunities/NO_safeharbor.htm.
Roston, Eric(2001), How to Opt Out of Database Sharing; Who’s Got Your Number? TIME, at 46.
Roston, Eric(2001), How to Opt Out of Database Sharing; Who’s Got Your Number? TIME, at 46.
Safire, William(2000), Stalking the Internet, N.Y. TIMES, at A15.
Safire, William(2000), Stalking the Internet, N.Y. TIMES, at A15.
Sandberg , Jared(1999),Losing Your Good Name Online, NEWSWEEK, at 56.
Sandberg , Jared(1999),Losing Your Good Name Online, NEWSWEEK, at 56.
Simpson, Glenn R.(2000), E-Commerce Firms Start to Rethink Opposition to Privacy Regulation as Abuses, Anger Rise, WALL ST. J., at A24.
Simpson, Glenn R.(2000), E-Commerce Firms Start to Rethink Opposition to Privacy Regulation as Abuses, Anger Rise, WALL ST. J., at A24.
Stimson, Dan(1999), Internet Security an Issue for Telemedicine Success, ALBUQUERQUE TRIB., at A6.
Stimson, Dan(1999), Internet Security an Issue for Telemedicine Success, ALBUQUERQUE TRIB., at A6.
Tan, Domingo R.(1999), Personal Privacy in the Information Age: Comparison of Internet Data Protection Regulations in the United States and the European Union, 21 LOY. L.A. INT’L & COMP. L.J. 661, 664-65.
Tan, Domingo R.(1999), Personal Privacy in the Information Age: Comparison of Internet Data Protection Regulations in the United States and the European Union, 21 LOY. L.A. INT’L & COMP. L.J. 661, 664-65.
TRUSTe, http://www.truste.org/consumers/users_faqs.html.
TRUSTe, http://www.truste.org/consumers/users_faqs.html.
Weiss, Todd R.(2001), Bush Faces His First Privacy Challenge: Proposals from Industry, Advocates Differ, COMPUTERWORLD, at Williams, Fred O.(2000), Area Man Wins Cybercash, BUFFALO NEWS, at C1.
Weiss, Todd R.(2001), Bush Faces His First Privacy Challenge: Proposals from Industry, Advocates Differ, COMPUTERWORLD, at Williams, Fred O.(2000), Area Man Wins Cybercash, BUFFALO NEWS, at C1.
描述 碩士
國立政治大學
資訊管理研究所
91356032
92
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0091356032
http://thesis.lib.nccu.edu.tw/record/#G0091356032
資料類型 thesis
thesis
dc.contributor.advisor 湯宗益zh_TW
dc.contributor.author (作者) 李俊磊zh_TW
dc.contributor.author (作者) Li , Chun-Leien_US
dc.creator (作者) 李俊磊zh_TW
dc.creator (作者) Li , Chun-Leien_US
dc.date (日期) 2003en_US
dc.date.accessioned 14-九月-2009 09:12:14 (UTC+8)-
dc.date.available 14-九月-2009 09:12:14 (UTC+8)-
dc.date.issued (上傳時間) 14-九月-2009 09:12:14 (UTC+8)-
dc.identifier (其他 識別碼) G0091356032en_US
dc.identifier (其他 識別碼) G0091356032en_US
dc.identifier.uri (URI) https://nccur.lib.nccu.edu.tw/handle/140.119/31073-
dc.identifier.uri (URI) https://nccur.lib.nccu.edu.tw/handle/140.119/31073-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊管理研究所zh_TW
dc.description (描述) 91356032zh_TW
dc.description (描述) 92zh_TW
dc.description.abstract (摘要) 個人資料的資料流(Data Flows)在網路上的擴散,造成對個人隱私權的威脅,逐漸已經成為社會大眾所關注的議題。在過去幾年中,網站逐漸被要求制定相關的規範以符合大眾的期待。然而,隨著網際網路環境的快速變遷,網站的規範是否提供適當的個人隱私權保護,將會成為社會大眾持續討論的問題。
      部分的網站已經滿足隱私權到某種程度。這些網站開始採用一些普遍性的實作。在某些程度上,這些實作依循由隱私權規範創立者所推動的公平資訊實施原則(Fair Information Practice Principle)(FTC,1998a)。
      本研究根據文獻探討提及的公平資訊實施原則:告知(notice)、選擇(choice)、存取(access)、與安全(security),對個人使用者感興趣的台灣地區網站進行網站隱私權政策分析與調查研究,探討其對個人隱私揭露的程度。
      研究結果指出,樣本中84.1%的網站收集至少一種形式的個人識別資訊(例如:姓名,e-mail address,郵政地址),72.3%收集至少一種形式的人口統計學資訊(例如:性別,喜好,郵遞區號),71.8%的網站兩者接收集,而15.4%的網站兩者皆不收集。隱私揭露方面,67.7%(390個樣本中的264個)刊載至少一種形式的隱私揭露(一個隱私權政策的告示或是一個資訊實施聲明),50.5%這兩種形式的隱私揭露都刊載,有32.3%個網站這兩種形式的隱私揭露皆不刊載。觀察隱私揭露反映公平資訊實施的程度,在264個有收集個人資訊與刊載隱私揭露的網站中,92.8%包含至少一種關於(告知)的調查項目,70.8%包含至少一種關於(選擇)的調查項目,80.7%包含至少一種關於(存取)的調查項目,43.9%包含至少一種關於(安全)的調查項目,以及26.9%包含關於(聯絡資訊)的調查項目。
      在本研究中,看待這些網站樣本所得出的結果,應特別注意那些較不滿足公平資訊實施原則的部分,包括對Cookies使用的告知、告知關於外界第三者的相關資訊、選擇、安全以及聯絡資訊等部份所表現出來的結果,而實際上所有台灣網站所表現出的結果,很可能比本研究所得出的結果來得更為不理想,網站若要更能滿足使用者對隱私權保護的期待,就必須更正視這些部份的隱私揭露保護。
      資料的收集與使用對網路環境的發展影響甚鉅,網站營運者在思考如何使資料的利用最大化時,必須兼顧使用者的隱私權。唯有在合理,相互尊重的架構下,才能替彼此創造出長遠的利益。本研究的結果希望能對台灣在檢討、發展、建立符合台灣環境及與世界接軌的網路隱私權保護環境上,作出些許的貢獻。
zh_TW
dc.description.abstract (摘要) The spreading of personal data flows over the Internet has threatened many online individuals’ privacy, which also becomes a noticeable topic among the society. For the past few years, there were norms applied to websites in order to protect online users’ privacy. However, could norms provide proper protections along with the rapid improvement of Internet technology? This topic will remain among society’s discussion.
      Some websites provide certain amount of protections by using popular practices. On a certain level, these practices follow the Fair Information Practice Principle that was supported by the Privacy Norm Entrepreneurs (FTC, 1998).
      This research is based on the four main elements of Fair Information Practice Principle: Notice, Choice, Access, and Security. The thesis concentrates on analyzing and researching the privacy policy about privacy disclosure provided by websites that were directed and interested to individual user within Taiwan.
      Based on the result of this research, 84.1% of the sampled websites collected at least one type of personal identifying information (e.g. name, e-mail address, postal address). 72.3% of the sampled websites collected at least one type of demographic information (e.g. gender, preferences, Zip code). 71.8% of the websites collected both types of personal information, and 15.4% collected neither type of personal information. As for privacy disclosure, 67.7% of the websites (264 out of 390 sampled websites) provided at least one type of privacy disclosures (a privacy policy notice or an information practice statement). 50.5% of the websites provided both types of disclosures; and 32.3% of the websites provided none of the above. By studying the researched websites along with the Fair Information Practice Principle, Of the 264 websites that collected personal information and posted a privacy disclosure, 92.8% included at least one survey item for notice, 70.8% contained at least one survey item for choice, 80.7% contained at least one survey item for access, 43.9% contained at least one survey item for security, and 26.9% contained at least one survey item for contact information.
      While studying the research result, it is important to concentrate on the websites that did not follow the Fair Information Practice Principle. The result includes websites’ notice of Cookies usage, and providing third party related information, choice, security, and contact information, etc. However, the result in reality could be a lot worse than the research result. In order to fulfill online users’ anticipation, websites should pay more attention on privacy policy of these parts.
      Colleting and using users’data influence the development of online environment greatly. Web owners should consider their customers’ privacy rights while trying to capitalize customers’ information. The only way to generate long and stable benefit for both provider and user is with respect. Hopefully the result of this research will contribute some amount of consideration and development of privacy protection that works for websites and users in Taiwan.
en_US
dc.description.tableofcontents 第一章 緒論 ………………………………………………………………1
      第一節 研究動機…………………………………………………………1
      第二節 研究目的…………………………………………………………3
      第三節 研究範圍…………………………………………………………4
      第四節 研究限制…………………………………………………………5
      第五節 研究流程與論文架構……………………………………………6
     
     第二章 文獻探討 …………………………………………………………8
      第一節 個人資料的商業價值 …………………………………………8
      第二節 隱私權的發展…………………………………………………17
      第三節 網站隱私權政策………………………………………………28
      第四節 對網路資訊隱私權的關注-以美國社會為例………………38
     
     第三章 研究方法 …………………………………………………………45
      第一節 研究架構………………………………………………………45
      第二節 樣本選擇與蒐集………………………………………………49
      第三節 問卷設計………………………………………………………50
      第四節 調查工作………………………………………………………53
     
     第四章 研究結果 …………………………………………………………54
      第一節 網站調查結果…………………………………………………54
      第二節 調查結果比較…………………………………………………84
     
     第五章 討論與建議 ………………………………………………………94
      第一節 研究討論 ……………………………………………………94
      第二節 研究貢獻與建議 …………………………………………100
     
     參考文獻 ………………………………………………………………102
     附錄一 研究問卷 ………………………………………………………108
     附錄二 問卷執行基本原則 ……………………………………………112
     附錄三 調查樣本(有效樣本網站名單) …………………………116
zh_TW
dc.description.tableofcontents 第一章 緒論 ………………………………………………………………1
      第一節 研究動機…………………………………………………………1
      第二節 研究目的…………………………………………………………3
      第三節 研究範圍…………………………………………………………4
      第四節 研究限制…………………………………………………………5
      第五節 研究流程與論文架構……………………………………………6
     
     第二章 文獻探討 …………………………………………………………8
      第一節 個人資料的商業價值 …………………………………………8
      第二節 隱私權的發展…………………………………………………17
      第三節 網站隱私權政策………………………………………………28
      第四節 對網路資訊隱私權的關注-以美國社會為例………………38
     
     第三章 研究方法 …………………………………………………………45
      第一節 研究架構………………………………………………………45
      第二節 樣本選擇與蒐集………………………………………………49
      第三節 問卷設計………………………………………………………50
      第四節 調查工作………………………………………………………53
     
     第四章 研究結果 …………………………………………………………54
      第一節 網站調查結果…………………………………………………54
      第二節 調查結果比較…………………………………………………84
     
     第五章 討論與建議 ………………………………………………………94
      第一節 研究討論 ……………………………………………………94
      第二節 研究貢獻與建議 …………………………………………100
     
     參考文獻 ………………………………………………………………102
     附錄一 研究問卷 ………………………………………………………108
     附錄二 問卷執行基本原則 ……………………………………………112
     附錄三 調查樣本(有效樣本網站名單) …………………………116
zh_TW
dc.language.iso en_US-
dc.language.iso en_US-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0091356032en_US
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0091356032en_US
dc.subject (關鍵詞) 網站zh_TW
dc.subject (關鍵詞) 網站zh_TW
dc.subject (關鍵詞) 個人資訊zh_TW
dc.subject (關鍵詞) 個人資訊zh_TW
dc.subject (關鍵詞) 公平資訊實施zh_TW
dc.subject (關鍵詞) 公平資訊實施zh_TW
dc.subject (關鍵詞) 隱私權政策zh_TW
dc.subject (關鍵詞) 隱私權政策zh_TW
dc.subject (關鍵詞) Websiteen_US
dc.subject (關鍵詞) Websiteen_US
dc.subject (關鍵詞) Personal Informationen_US
dc.subject (關鍵詞) Personal Informationen_US
dc.subject (關鍵詞) Fair Information Practiceen_US
dc.subject (關鍵詞) Fair Information Practiceen_US
dc.subject (關鍵詞) Privacy Policyen_US
dc.subject (關鍵詞) Privacy Policyen_US
dc.title (題名) 網站隱私權政策分析-以台灣網站為例zh_TW
dc.title (題名) 網站隱私權政策分析-以台灣網站為例zh_TW
dc.type (資料類型) thesisen
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) 中文部分zh_TW
dc.relation.reference (參考文獻) 中文部分zh_TW
dc.relation.reference (參考文獻) 王郁琦(1996),「網路上的隱私權問題」,資訊法務透析,1996年10月號。zh_TW
dc.relation.reference (參考文獻) 王郁琦(1996),「網路上的隱私權問題」,資訊法務透析,1996年10月號。zh_TW
dc.relation.reference (參考文獻) 尤英夫(1997),「新聞媒體與隱私權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。zh_TW
dc.relation.reference (參考文獻) 尤英夫(1997),「新聞媒體與隱私權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。zh_TW
dc.relation.reference (參考文獻) 朱柏松(1989),「隱私權概念的衍變及其損害防止立法之動向」,法學叢刊,第134期。zh_TW
dc.relation.reference (參考文獻) 朱柏松(1989),「隱私權概念的衍變及其損害防止立法之動向」,法學叢刊,第134期。zh_TW
dc.relation.reference (參考文獻) 李震山(1997),「論資訊自決權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。zh_TW
dc.relation.reference (參考文獻) 李震山(1997),「論資訊自決權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。zh_TW
dc.relation.reference (參考文獻) 呂雅雯(2000),「探討通訊隱私範圍之變遷-以美國、德國和台灣法規為例」,中正電傳所碩士論文。zh_TW
dc.relation.reference (參考文獻) 呂雅雯(2000),「探討通訊隱私範圍之變遷-以美國、德國和台灣法規為例」,中正電傳所碩士論文。zh_TW
dc.relation.reference (參考文獻) 林建中(1999),「隱私權概念的再思考一關於概念範圍、定義及權利形成方法」,台大法研所碩士論文。zh_TW
dc.relation.reference (參考文獻) 林建中(1999),「隱私權概念的再思考一關於概念範圍、定義及權利形成方法」,台大法研所碩士論文。zh_TW
dc.relation.reference (參考文獻) 林育廷(2000),「行政動態-美國提出規則P草案保護消費者金融資訊隱私權」,科技法律透析,2000年4月,pp.22-23。zh_TW
dc.relation.reference (參考文獻) 林育廷(2000),「行政動態-美國提出規則P草案保護消費者金融資訊隱私權」,科技法律透析,2000年4月,pp.22-23。zh_TW
dc.relation.reference (參考文獻) 邱建動(2000),「從電子商務的面向探討網路資訊隱私權」,2000網路與社會研討會,新竹:清大社會所。zh_TW
dc.relation.reference (參考文獻) 邱建動(2000),「從電子商務的面向探討網路資訊隱私權」,2000網路與社會研討會,新竹:清大社會所。zh_TW
dc.relation.reference (參考文獻) 邱建勳(2001),「電子商務環境中「個人資料財產權」之探討─以著作權為主」,國立中正大學電訊傳播研究所碩士論文。zh_TW
dc.relation.reference (參考文獻) 邱建勳(2001),「電子商務環境中「個人資料財產權」之探討─以著作權為主」,國立中正大學電訊傳播研究所碩士論文。zh_TW
dc.relation.reference (參考文獻) 邱顯貴(2002),「電子商務網站信任管理之研究」,政大資管所博士論文。zh_TW
dc.relation.reference (參考文獻) 邱顯貴(2002),「電子商務網站信任管理之研究」,政大資管所博士論文。zh_TW
dc.relation.reference (參考文獻) 洪榮彬(1993),「資訊時代之資料處理與資料保護-以德國聯邦個人資料保護法為中心」,輔大法研所碩士論文。zh_TW
dc.relation.reference (參考文獻) 洪榮彬(1993),「資訊時代之資料處理與資料保護-以德國聯邦個人資料保護法為中心」,輔大法研所碩士論文。zh_TW
dc.relation.reference (參考文獻) 洪順慶(1998),「淺談關係行銷」,http://www.ba.nccu.edu.tw/schoolfellow/1998/199812-3.htm.zh_TW
dc.relation.reference (參考文獻) 洪順慶(1998),「淺談關係行銷」,http://www.ba.nccu.edu.tw/schoolfellow/1998/199812-3.htm.zh_TW
dc.relation.reference (參考文獻) 許宗力譯(1988),「德國行政法在立法、學說與審判實務上之最新發展」,台大法學論叢,第17期2卷。zh_TW
dc.relation.reference (參考文獻) 許宗力譯(1988),「德國行政法在立法、學說與審判實務上之最新發展」,台大法學論叢,第17期2卷。zh_TW
dc.relation.reference (參考文獻) 黃三榮(1998),「個人資料之保護-兼評我國電腦處理個人資料保護法」,資訊法務透析,1998年1月號,p.40。zh_TW
dc.relation.reference (參考文獻) 黃三榮(1998),「個人資料之保護-兼評我國電腦處理個人資料保護法」,資訊法務透析,1998年1月號,p.40。zh_TW
dc.relation.reference (參考文獻) 郭恬如(1998),「虛擬社區顧客輪廓資料、關係行銷及其隱私權議題」,政大企研所碩士論文。zh_TW
dc.relation.reference (參考文獻) 郭恬如(1998),「虛擬社區顧客輪廓資料、關係行銷及其隱私權議題」,政大企研所碩士論文。zh_TW
dc.relation.reference (參考文獻) 詹文凱(1998),「隱私權的研究」,台大法研所博士論文。zh_TW
dc.relation.reference (參考文獻) 詹文凱(1998),「隱私權的研究」,台大法研所博士論文。zh_TW
dc.relation.reference (參考文獻) 葉重新(1999),「心理測驗」,台北:三民書局。zh_TW
dc.relation.reference (參考文獻) 葉重新(1999),「心理測驗」,台北:三民書局。zh_TW
dc.relation.reference (參考文獻) 葉俊榮與許宗力主持(1996):「政府資訊公開制度之研究」,台北:行政院研考會,p.l0。zh_TW
dc.relation.reference (參考文獻) 葉俊榮與許宗力主持(1996):「政府資訊公開制度之研究」,台北:行政院研考會,p.l0。zh_TW
dc.relation.reference (參考文獻) 資策會科技法律中心,「美國全球電子商業綱要與我國因應之道」,http://stlc.iii.org.tw/articles/Netlaw/860927t.htm.zh_TW
dc.relation.reference (參考文獻) 資策會科技法律中心,「美國全球電子商業綱要與我國因應之道」,http://stlc.iii.org.tw/articles/Netlaw/860927t.htm.zh_TW
dc.relation.reference (參考文獻) 廖緯民(1996),「論資訊時代的隱私權保護-以「資訊隱私權」為中心」,資訊法務透析,1996年11月號,p.22。zh_TW
dc.relation.reference (參考文獻) 廖緯民(1996),「論資訊時代的隱私權保護-以「資訊隱私權」為中心」,資訊法務透析,1996年11月號,p.22。zh_TW
dc.relation.reference (參考文獻) 數位週刊 e business weekly,(2000),「台灣500大受歡迎網站」,2000年11月號,p.44-61。zh_TW
dc.relation.reference (參考文獻) 數位週刊 e business weekly,(2000),「台灣500大受歡迎網站」,2000年11月號,p.44-61。zh_TW
dc.relation.reference (參考文獻) 劉靜怡(1997),「資訊科技與隱私權焦慮-誰有權塑造我的網路形象?」,當代雜誌,第124期,p.80。zh_TW
dc.relation.reference (參考文獻) 劉靜怡(1997),「資訊科技與隱私權焦慮-誰有權塑造我的網路形象?」,當代雜誌,第124期,p.80。zh_TW
dc.relation.reference (參考文獻) 劉靜怡(2000),「網際網路時代的資訊使用與隱私權保護規範:個人、政府與市場的拔河」,(2000年網際空間:資訊、法律與社會)研討會,桃園:警大。zh_TW
dc.relation.reference (參考文獻) 劉靜怡(2000),「網際網路時代的資訊使用與隱私權保護規範:個人、政府與市場的拔河」,(2000年網際空間:資訊、法律與社會)研討會,桃園:警大。zh_TW
dc.relation.reference (參考文獻) 顏厥安(2000),「財產、人格、還是資訊?論人類基因的法律地位」,2000基因科技之法律管制體系與社會衝擊研究研討會,台北:台灣大學。zh_TW
dc.relation.reference (參考文獻) 顏厥安(2000),「財產、人格、還是資訊?論人類基因的法律地位」,2000基因科技之法律管制體系與社會衝擊研究研討會,台北:台灣大學。zh_TW
dc.relation.reference (參考文獻) 權平法律資訊網,「網路上資訊隱私權保障問題之研究」,http://www.cyberlawyer.com.tw/alan4-0801.html.zh_TW
dc.relation.reference (參考文獻) 權平法律資訊網,「網路上資訊隱私權保障問題之研究」,http://www.cyberlawyer.com.tw/alan4-0801.html.zh_TW
dc.relation.reference (參考文獻) 英文部分zh_TW
dc.relation.reference (參考文獻) 英文部分zh_TW
dc.relation.reference (參考文獻) Baker, Stewart (1999), Regulating Technology for Law Enforcement, 4 TEX. REV. L. & POL’Y. 53, 53.zh_TW
dc.relation.reference (參考文獻) Baker, Stewart (1999), Regulating Technology for Law Enforcement, 4 TEX. REV. L. & POL’Y. 53, 53.zh_TW
dc.relation.reference (參考文獻) Banisar, D.(2000), Privacy & Human Rights 2000, http://www.privacyinternational.org/survey/index2000.html.zh_TW
dc.relation.reference (參考文獻) Banisar, D.(2000), Privacy & Human Rights 2000, http://www.privacyinternational.org/survey/index2000.html.zh_TW
dc.relation.reference (參考文獻) Berman, A. S.(2001), Reports of Gates’ Death Greatly E-xaggerated, USA TODAY.zh_TW
dc.relation.reference (參考文獻) Berman, A. S.(2001), Reports of Gates’ Death Greatly E-xaggerated, USA TODAY.zh_TW
dc.relation.reference (參考文獻) Berry, L.L.(1995), Relationship marketing of services-growing interest, emerging perspectivies, Journal of the Academy of Marketing Science, 23(4), 236.zh_TW
dc.relation.reference (參考文獻) Berry, L.L.(1995), Relationship marketing of services-growing interest, emerging perspectivies, Journal of the Academy of Marketing Science, 23(4), 236.zh_TW
dc.relation.reference (參考文獻) Borrus , Amy(2001), The Stage Seems Set for Net Privacy Rules this Year, BUSINESS WEEK, at 51.zh_TW
dc.relation.reference (參考文獻) Borrus , Amy(2001), The Stage Seems Set for Net Privacy Rules this Year, BUSINESS WEEK, at 51.zh_TW
dc.relation.reference (參考文獻) Clark, Drew(2001), Activists Unite To Push For Stronger Privacy Laws, NAT’L J. TECH. DAILY.zh_TW
dc.relation.reference (參考文獻) Clark, Drew(2001), Activists Unite To Push For Stronger Privacy Laws, NAT’L J. TECH. DAILY.zh_TW
dc.relation.reference (參考文獻) Clausing, Jeri(2000),Can Internet Advertisers Police Themselves? Washington Remains Unconvinced, N.Y. TIMES, at C10.zh_TW
dc.relation.reference (參考文獻) Clausing, Jeri(2000),Can Internet Advertisers Police Themselves? Washington Remains Unconvinced, N.Y. TIMES, at C10.zh_TW
dc.relation.reference (參考文獻) Culnan, M.(1999a), Georgetown Internet Privacy Policy Survey:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html.zh_TW
dc.relation.reference (參考文獻) Culnan, M.(1999a), Georgetown Internet Privacy Policy Survey:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html.zh_TW
dc.relation.reference (參考文獻) Culnan, M.(1999b), Privacy and the Top 100 Web Sites:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html.zh_TW
dc.relation.reference (參考文獻) Culnan, M.(1999b), Privacy and the Top 100 Web Sites:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html.zh_TW
dc.relation.reference (參考文獻) Davidson, Paul(2001a), Marketing Gurus Clash on Internet Privacy Rules, USA TODAY, at 2B.zh_TW
dc.relation.reference (參考文獻) Davidson, Paul(2001a), Marketing Gurus Clash on Internet Privacy Rules, USA TODAY, at 2B.zh_TW
dc.relation.reference (參考文獻) Davidson, Paul(2001b), Capitol Hill Support Brews for Internet Privacy Laws, USA TODAY, at 3B.zh_TW
dc.relation.reference (參考文獻) Davidson, Paul(2001b), Capitol Hill Support Brews for Internet Privacy Laws, USA TODAY, at 3B.zh_TW
dc.relation.reference (參考文獻) DuPont, Randall(1998), Relationship marketing:A strategy for consumer-owned utilities in a restructured industry, Management Quarterly 38(4), 12.zh_TW
dc.relation.reference (參考文獻) DuPont, Randall(1998), Relationship marketing:A strategy for consumer-owned utilities in a restructured industry, Management Quarterly 38(4), 12.zh_TW
dc.relation.reference (參考文獻) Ellickson, Robert C. (1991), Order Without Law: How Neighbors Settle Disputes 213–15.zh_TW
dc.relation.reference (參考文獻) Ellickson, Robert C. (1991), Order Without Law: How Neighbors Settle Disputes 213–15.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission (1998a), Privacy Online: A Report to Congress, http://www.ftc.gov/reports/privacy3/priv-23.htm.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission (1998a), Privacy Online: A Report to Congress, http://www.ftc.gov/reports/privacy3/priv-23.htm.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission(1998b), Internet site agrees to settle FTC charges of deceptively collecting personal information in Agency’s first internet privacy case, http://www.ftc.gov/opa/1998/08/geocitie.htm.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission(1998b), Internet site agrees to settle FTC charges of deceptively collecting personal information in Agency’s first internet privacy case, http://www.ftc.gov/opa/1998/08/geocitie.htm.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission(1998c), The FTC announced the following actions, http://www.ftc.gov/opa/1999/02/petapp4.99htm.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission(1998c), The FTC announced the following actions, http://www.ftc.gov/opa/1999/02/petapp4.99htm.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission (2000a), Privacy Online: Fair Information Practices in the Electronic Marketplace: A Federal Trade Commission Report to Congress, http://www.ftc.gov/reports/#2000.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission (2000a), Privacy Online: Fair Information Practices in the Electronic Marketplace: A Federal Trade Commission Report to Congress, http://www.ftc.gov/reports/#2000.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission (2000b), Privacy Online: Fair Information Practices in the Electronic Marketplace, A Federal Trade Commission Report to Congress 10.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission (2000b), Privacy Online: Fair Information Practices in the Electronic Marketplace, A Federal Trade Commission Report to Congress 10.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission(2000c), FTC sues failed website, Toysmart.com for deceptively offering for sale personal information of website visitors, http://www.ftc.gov/opa/2000/07/toysmart.htm.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission(2000c), FTC sues failed website, Toysmart.com for deceptively offering for sale personal information of website visitors, http://www.ftc.gov/opa/2000/07/toysmart.htm.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission(2000d), FTC v. Toysmart.com, LLC, and Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartcmp.htm.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission(2000d), FTC v. Toysmart.com, LLC, and Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartcmp.htm.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission(2000e), Dissenting statement of commissioner Orson Swindle in Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartswindlestatement.htm.zh_TW
dc.relation.reference (參考文獻) Federal Trade Commission(2000e), Dissenting statement of commissioner Orson Swindle in Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartswindlestatement.htm.zh_TW
dc.relation.reference (參考文獻) Flaherty, David H. (1989), Protecting Privacy in Surveillance Societies, 306–08.zh_TW
dc.relation.reference (參考文獻) Flaherty, David H. (1989), Protecting Privacy in Surveillance Societies, 306–08.zh_TW
dc.relation.reference (參考文獻) Gibbons, Llewellyn Joseph (1997), No Regulation or Self-Regulation: Social Enforcement or Social Contracting for Governance in Cyberspace, 6 CORNELL J.L. & PUB. POL’Y 475.zh_TW
dc.relation.reference (參考文獻) Gibbons, Llewellyn Joseph (1997), No Regulation or Self-Regulation: Social Enforcement or Social Contracting for Governance in Cyberspace, 6 CORNELL J.L. & PUB. POL’Y 475.zh_TW
dc.relation.reference (參考文獻) Givens, B.(1997), A Review of State and Federal Privacy Laws, http://www.privacyrights.org/ar/jttaskap.htm.zh_TW
dc.relation.reference (參考文獻) Givens, B.(1997), A Review of State and Federal Privacy Laws, http://www.privacyrights.org/ar/jttaskap.htm.zh_TW
dc.relation.reference (參考文獻) Glancy, Dorothy(2000), At the Intersection of Visible and Invisible Worlds: United States Privacy Law and the Internet, 16 SANTA CLARA COMPUTER & HIGHTECH. L.J. 357, 370.zh_TW
dc.relation.reference (參考文獻) Glancy, Dorothy(2000), At the Intersection of Visible and Invisible Worlds: United States Privacy Law and the Internet, 16 SANTA CLARA COMPUTER & HIGHTECH. L.J. 357, 370.zh_TW
dc.relation.reference (參考文獻) Gonzalez, Jason(2001), Better Business Bureau Gives Nod to Lowe’s, NATIONAL HOME CENTER NEWS, at 7.zh_TW
dc.relation.reference (參考文獻) Gonzalez, Jason(2001), Better Business Bureau Gives Nod to Lowe’s, NATIONAL HOME CENTER NEWS, at 7.zh_TW
dc.relation.reference (參考文獻) Graubert, John & Coleman, Jill(1999), Consumer Protection and Antitrust Enforcement at the Speed of Light: The FTC Meets the Internet, 25 CAN.-U.S. L.J. 275, 290.zh_TW
dc.relation.reference (參考文獻) Graubert, John & Coleman, Jill(1999), Consumer Protection and Antitrust Enforcement at the Speed of Light: The FTC Meets the Internet, 25 CAN.-U.S. L.J. 275, 290.zh_TW
dc.relation.reference (參考文獻) Hafner, Katie(1999),Do You Know Who’s Watching You? Do You Care? , N.Y. TIMES, at G1.zh_TW
dc.relation.reference (參考文獻) Hafner, Katie(1999),Do You Know Who’s Watching You? Do You Care? , N.Y. TIMES, at G1.zh_TW
dc.relation.reference (參考文獻) Hamilton, David P.(2001), The Gadfly: Privacy Cop Richard Smith Is Out to Keep Companies Honest – Whether They Like It Or Not, WALL ST. J., at R10.zh_TW
dc.relation.reference (參考文獻) Hamilton, David P.(2001), The Gadfly: Privacy Cop Richard Smith Is Out to Keep Companies Honest – Whether They Like It Or Not, WALL ST. J., at R10.zh_TW
dc.relation.reference (參考文獻) Hetcher, Steven(2000), The Law and Economics of Intellectual Property Rights:The FTC as Internet Norm Entrepreneur, 53 Vand. L. Rev. 2041.zh_TW
dc.relation.reference (參考文獻) Hetcher, Steven(2000), The Law and Economics of Intellectual Property Rights:The FTC as Internet Norm Entrepreneur, 53 Vand. L. Rev. 2041.zh_TW
dc.relation.reference (參考文獻) Hetcher, Steven(2001a), Changing the Social Meaning of Privacy in Cyberspace, Harvard Journal of Law & Technology Volume 15, Number 1.zh_TW
dc.relation.reference (參考文獻) Hetcher, Steven(2001a), Changing the Social Meaning of Privacy in Cyberspace, Harvard Journal of Law & Technology Volume 15, Number 1.zh_TW
dc.relation.reference (參考文獻) Hetcher, Steven (2001b), Norm Proselytizers Create a Privacy Entitlement in Cyberspace, 16 BERKELEY TECH. L.J. 877.zh_TW
dc.relation.reference (參考文獻) Hetcher, Steven (2001b), Norm Proselytizers Create a Privacy Entitlement in Cyberspace, 16 BERKELEY TECH. L.J. 877.zh_TW
dc.relation.reference (參考文獻) Jacobus, Patricia (2000), Privacy groups call Amazon policy "deceptive", http://news.com.com/2100-1017_3-249376.html.zh_TW
dc.relation.reference (參考文獻) Jacobus, Patricia (2000), Privacy groups call Amazon policy "deceptive", http://news.com.com/2100-1017_3-249376.html.zh_TW
dc.relation.reference (參考文獻) Kalish, David E.(2000), Online Ad Agency Gives Up Plan To Sell Data; DoubleClick Bows to Privacy Advocates, ST. LOUIS POST-DISPATCH, at C6.zh_TW
dc.relation.reference (參考文獻) Kalish, David E.(2000), Online Ad Agency Gives Up Plan To Sell Data; DoubleClick Bows to Privacy Advocates, ST. LOUIS POST-DISPATCH, at C6.zh_TW
dc.relation.reference (參考文獻) Killingsworth, Scott(1999), Minding Your Own Business: Privacy Policies in Principle and in Practice, J. INTERNET L., at 12.zh_TW
dc.relation.reference (參考文獻) Killingsworth, Scott(1999), Minding Your Own Business: Privacy Policies in Principle and in Practice, J. INTERNET L., at 12.zh_TW
dc.relation.reference (參考文獻) Kluger , Jeffrey(2000,), Extortion on the Internet; A daring hacker tries to blackmail an e-tailer — and sparks new worries about credit-card cybertheft, TIME, at 56.zh_TW
dc.relation.reference (參考文獻) Kluger , Jeffrey(2000,), Extortion on the Internet; A daring hacker tries to blackmail an e-tailer — and sparks new worries about credit-card cybertheft, TIME, at 56.zh_TW
dc.relation.reference (參考文獻) Kramer, L.C.(2002), Private Eyes Are Watching You:Consumer Online Privacy Protection-Lessons from Home and Abroad, Texas International Law Journal, 37(2), 387-420.zh_TW
dc.relation.reference (參考文獻) Kramer, L.C.(2002), Private Eyes Are Watching You:Consumer Online Privacy Protection-Lessons from Home and Abroad, Texas International Law Journal, 37(2), 387-420.zh_TW
dc.relation.reference (參考文獻) Lemley, Mark A.(1998), Symposium on the Internet and Legal Theory: The Law and Economics of Internet Norms, 73 CHI.-KENT L. REV. 1257, 1276.zh_TW
dc.relation.reference (參考文獻) Lemley, Mark A.(1998), Symposium on the Internet and Legal Theory: The Law and Economics of Internet Norms, 73 CHI.-KENT L. REV. 1257, 1276.zh_TW
dc.relation.reference (參考文獻) Lesser, Seth R.(2001), Privacy Law in the Internet Era: New Developments and Directions, in SECOND ANNUAL INSTITUTE ON PRIVACY LAW 2001, at 187, 217–18.zh_TW
dc.relation.reference (參考文獻) Lesser, Seth R.(2001), Privacy Law in the Internet Era: New Developments and Directions, in SECOND ANNUAL INSTITUTE ON PRIVACY LAW 2001, at 187, 217–18.zh_TW
dc.relation.reference (參考文獻) Lessig, Lawrence(1999), The Architecture of Privacy, 1 VAND. J. ENT. L. & PRAC. 56, 63.zh_TW
dc.relation.reference (參考文獻) Lessig, Lawrence(1999), The Architecture of Privacy, 1 VAND. J. ENT. L. & PRAC. 56, 63.zh_TW
dc.relation.reference (參考文獻) Litman, Jessica (2000), Information Privacy/Information Property, 52 STAN. L. REV. 1283, 1283–88.zh_TW
dc.relation.reference (參考文獻) Litman, Jessica (2000), Information Privacy/Information Property, 52 STAN. L. REV. 1283, 1283–88.zh_TW
dc.relation.reference (參考文獻) MacMillan , Robert(2000), Congress to Air Public Concerns Over Privacy, NEWSBYTES.zh_TW
dc.relation.reference (參考文獻) MacMillan , Robert(2000), Congress to Air Public Concerns Over Privacy, NEWSBYTES.zh_TW
dc.relation.reference (參考文獻) Online Privacy Alliance, http://www.privacyalliance.org/resources/ppguidelines.shtml.zh_TW
dc.relation.reference (參考文獻) Online Privacy Alliance, http://www.privacyalliance.org/resources/ppguidelines.shtml.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of 1800flowers.com, http://www.1800flowers.com/flowers/ security/index.asp.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of 1800flowers.com, http://www.1800flowers.com/flowers/ security/index.asp.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of barnesandnoble.com, http://www.barnesandnoble.com/help/nc_privacy_policy.asp?userid=2X1GTGUA5H&cds2Pid=946.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of barnesandnoble.com, http://www.barnesandnoble.com/help/nc_privacy_policy.asp?userid=2X1GTGUA5H&cds2Pid=946.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of disney.go.com, http://disney.go.com/corporate/legal/wdig_privacy.html.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of disney.go.com, http://disney.go.com/corporate/legal/wdig_privacy.html.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of hallmark.com, http://www.hallmark.com/Website/hallmark_home.html.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of hallmark.com, http://www.hallmark.com/Website/hallmark_home.html.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of jcrew.com, http://jcrew.com/help.sniplets/privacynew.jhtml.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of jcrew.com, http://jcrew.com/help.sniplets/privacynew.jhtml.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of kinkos.com, http://www.kinkos.com/global_assets/docs/privacy.php.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of kinkos.com, http://www.kinkos.com/global_assets/docs/privacy.php.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of madonnafanclub.com, http://www.madonnafanclub.com/ privacy.html.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of madonnafanclub.com, http://www.madonnafanclub.com/ privacy.html.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of microsoft.com, http://www.microsoft.com/info/privacy.mspx.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of microsoft.com, http://www.microsoft.com/info/privacy.mspx.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of motorola.com, http://www.motorola.com/content/0,,3,00.html.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of motorola.com, http://www.motorola.com/content/0,,3,00.html.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of niketown.nike.com, http://niketown.nike.com/info/privacy.jhtml.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of niketown.nike.com, http://niketown.nike.com/info/privacy.jhtml.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of nokia.com, http://www.nokia.com/nokia/0,1522,,00.html?orig=/privacy.html.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of nokia.com, http://www.nokia.com/nokia/0,1522,,00.html?orig=/privacy.html.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of sears.com, http://www.sears.com/sr/framework/home.jsp?BV_UseBVCookie=Yes&vertical=SEARS&targetPage=%2Fmisc%2Fsears%2Fpolicy%2Fprivacy.jsp.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of sears.com, http://www.sears.com/sr/framework/home.jsp?BV_UseBVCookie=Yes&vertical=SEARS&targetPage=%2Fmisc%2Fsears%2Fpolicy%2Fprivacy.jsp.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of sun.com, http://www.sun.com/privacy/.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of sun.com, http://www.sun.com/privacy/.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of toyota.com, http://www.toyota.com/html/privacy/index.html.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of toyota.com, http://www.toyota.com/html/privacy/index.html.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of walmart.com, http://www.walmart.com/catalog/catalog.gsp?cat=120621&path=0:5436:120160:119833:120621.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of walmart.com, http://www.walmart.com/catalog/catalog.gsp?cat=120621&path=0:5436:120160:119833:120621.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of weather.com, http://www.weather.com/common/home/privacy.html?from=footer.zh_TW
dc.relation.reference (參考文獻) Privacy Policy of weather.com, http://www.weather.com/common/home/privacy.html?from=footer.zh_TW
dc.relation.reference (參考文獻) Rohlmeier, Jeff & Yue, William, THE SAFE HARBOR PRIVACY FRAMEWORK, U.S. Department of Commerce, http://www.ita.doc.gov/exportamerica/NewOpportunities/NO_safeharbor.htm.zh_TW
dc.relation.reference (參考文獻) Rohlmeier, Jeff & Yue, William, THE SAFE HARBOR PRIVACY FRAMEWORK, U.S. Department of Commerce, http://www.ita.doc.gov/exportamerica/NewOpportunities/NO_safeharbor.htm.zh_TW
dc.relation.reference (參考文獻) Roston, Eric(2001), How to Opt Out of Database Sharing; Who’s Got Your Number? TIME, at 46.zh_TW
dc.relation.reference (參考文獻) Roston, Eric(2001), How to Opt Out of Database Sharing; Who’s Got Your Number? TIME, at 46.zh_TW
dc.relation.reference (參考文獻) Safire, William(2000), Stalking the Internet, N.Y. TIMES, at A15.zh_TW
dc.relation.reference (參考文獻) Safire, William(2000), Stalking the Internet, N.Y. TIMES, at A15.zh_TW
dc.relation.reference (參考文獻) Sandberg , Jared(1999),Losing Your Good Name Online, NEWSWEEK, at 56.zh_TW
dc.relation.reference (參考文獻) Sandberg , Jared(1999),Losing Your Good Name Online, NEWSWEEK, at 56.zh_TW
dc.relation.reference (參考文獻) Simpson, Glenn R.(2000), E-Commerce Firms Start to Rethink Opposition to Privacy Regulation as Abuses, Anger Rise, WALL ST. J., at A24.zh_TW
dc.relation.reference (參考文獻) Simpson, Glenn R.(2000), E-Commerce Firms Start to Rethink Opposition to Privacy Regulation as Abuses, Anger Rise, WALL ST. J., at A24.zh_TW
dc.relation.reference (參考文獻) Stimson, Dan(1999), Internet Security an Issue for Telemedicine Success, ALBUQUERQUE TRIB., at A6.zh_TW
dc.relation.reference (參考文獻) Stimson, Dan(1999), Internet Security an Issue for Telemedicine Success, ALBUQUERQUE TRIB., at A6.zh_TW
dc.relation.reference (參考文獻) Tan, Domingo R.(1999), Personal Privacy in the Information Age: Comparison of Internet Data Protection Regulations in the United States and the European Union, 21 LOY. L.A. INT’L & COMP. L.J. 661, 664-65.zh_TW
dc.relation.reference (參考文獻) Tan, Domingo R.(1999), Personal Privacy in the Information Age: Comparison of Internet Data Protection Regulations in the United States and the European Union, 21 LOY. L.A. INT’L & COMP. L.J. 661, 664-65.zh_TW
dc.relation.reference (參考文獻) TRUSTe, http://www.truste.org/consumers/users_faqs.html.zh_TW
dc.relation.reference (參考文獻) TRUSTe, http://www.truste.org/consumers/users_faqs.html.zh_TW
dc.relation.reference (參考文獻) Weiss, Todd R.(2001), Bush Faces His First Privacy Challenge: Proposals from Industry, Advocates Differ, COMPUTERWORLD, at Williams, Fred O.(2000), Area Man Wins Cybercash, BUFFALO NEWS, at C1.zh_TW
dc.relation.reference (參考文獻) Weiss, Todd R.(2001), Bush Faces His First Privacy Challenge: Proposals from Industry, Advocates Differ, COMPUTERWORLD, at Williams, Fred O.(2000), Area Man Wins Cybercash, BUFFALO NEWS, at C1.zh_TW