政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/119919
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113392/144379 (79%)
Visitors : 51229597      Online Users : 896
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大典藏 > College of Law > Department of Law > Theses >  Item 140.119/119919
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/119919


    Title: 刑事偵查「第三人原則」與「隱私之合理期待」─以偵查機關向網路服務提供者調取非內容性通訊資料為例
    ‘’Third Party Doctrine’’and ‘’Reasonable Expectation of Privacy’’ ─ The Law Enforcement`s Acquisition of Non-Content Communication from Internet Service Providers.
    Authors: 陳妏瑄
    Chen, Wun-Syuan
    Contributors: 何賴傑
    He, Lai-Jier
    陳妏瑄
    Chen,Wun-Syuan
    Keywords: 非內容性通訊資料
    第三人原則
    合理隱私期待
    同意原則
    自願性揭露
    使用限制
    定量隱私權
    馬賽克理論
    執法機關取得第三人紀錄標準
    人際交往隱私權
    Non-content communication
    Third-Party doctrine
    Reasonable eXpectation of privacy
    Consent
    Voluntary disclosure of information
    Use restrictions
    Quantitative privacy
    The Mosaic theory
    LEATPR standards
    Interpersonal privacy
    Date: 2018
    Issue Date: 2018-09-03 15:53:36 (UTC+8)
    Abstract: 隨著資訊科技設備彙整、分析數據的能力逐漸成形,「非內容性通訊資料」的使用價值逐步提升,足以描繪個人完整生活圖像而成為偵查取證的指向,反映在取證問題上,如何平衡犯罪訴追與被告、犯罪嫌疑人隱私權保障,即是法律所面臨的極大挑戰。本文為了釐清我國通保法規範通信紀錄內涵的妥適性,由通保法所保障之「合理隱私期待」角度切入,就偵查機關向網路服務提供者調取非內容性通訊資料的議題,納入「網路服務提供者」與「非內容性通訊資料」元素後,刑事偵查中被告「合理隱私期待」之保障範圍應透過哪些「要素」作為判準。基此,「合理隱私期待」既為我國繼受美國法制觀點所生概念,故借助美國法院實務與學理之發展,作為議題討論之方向。

    以第三人為平台取證的案件中,受美國第三人原則影響甚深,本文考察該原則歷史生成與理論適用之困境,透過學理與實務所提出的各種方法論,試圖修正該原則,分由「合理隱私期待」之「主觀」、「客觀」面相,重新剖析、檢討其內涵,並提出可供參考之指標性要素,藉此反思台灣通信紀錄法制規範。
    Nowadays, science and technology are making huge strides every day. The ability of collecting and analyzing data is taking shape. The value of "non-content communication " has gradually increased, which is enough to depict a complete life image of a person. Finally, it becomes the target of the law enforcement agency to collect evidence. How to balance the goal of chasing crime and defending the defendant’s privacy is the great challenge. In order to clarify the appropriateness of the Taiwan’s Communication Security and Surveillance Act about regulating non-content communication, this article discussed from the perspective of "reasonable expectation of privacy " guaranteed by Communication Security and Surveillance Act. After joining ‘’internet service providers’’ and ‘’non-content communication’’ in the issue of the law enforcement`s acquisition of non-content communication from internet service providers, what new elements would be in the reasonable expectation of privacy in criminal investigation is really a difficult question. In the view of the "reasonable expectation of privacy " is not only the concept of Taiwan`s legal system, but also the development of the US court practice and academics. Therefore, this article based on the foundation of American law perspective.

    In the case of collecting evidence through a third party, deeply influenced by the Third-Party Doctrine of the United States. This article examined the historical contex and dilemma of theoretical application of Third-Party Doctrine. Trying to correct this principle through various methodologies proposed by theory and practice. Reanalyzing and reviewing the "subjective" and "objective" aspects of "reasonable expectation of privacy " and proposing new elements for reference, thereby rethinking the legal norms of Taiwan`s Communication Security and Surveillance Act about regulating non-content communication.
    Reference: 參考文獻
    英文
    一、 專書
    1. Oliver Wendell Holmes Jr. 1881. The Common Law.
    2. Cooley, Thomas M. 1888. The Law Of Torts 29(2d Ed.).
    3. Simmel, Arnold.1971. Privacy Is Not An Isolated Freedom, In PRIVACY. Nomos XIII 71 .J. Penncok & J. Chapman.
    4. Solove, Daniel J.2010. Understanding Privacy, Harvard University Press.
    5. Solove, Daniel J.2004. The Digital Person: Technology And Privacy In The Information Age. New York University.
    6. Slobogin, Christopher. 2007. Privacy At Risk: The New Government Surveillance And The Fourth Amendment. University Of Chicago Press.
    二、 期刊
    1. A Reconsideration of the Katz Expectation of Privacy Test. 1977. Michigan Law Review 76: 154-183.
    2. Amsterdam, Anthony G. 1974. Perspectives On The Fourth Amendment. Minnesota Law Review 58: 349-478.
    3. Burger, Warren E. 1974. The ABA Standards For Criminal Justice. American Criminal Law Review 12: 251-254.
    4. Balkin, Jack M. 2008. The Constitution In The National Surveillance State.Minnesota Law Review 93: 1-25.
    5. Blumenthal, Jeremy A. & Adya, Meera & Mogle, Jacqueline. 2009. The Multiple Dimensions Of Privacy: Testing Lay Expectations Of Privacy. University Of Pennsylvania Journal Of Constitutional Law 11: 331-374.
    6. Bedi, Monu. 2013. Facebook and Interpersonal Privacy: Why the Third Party Doctrine Should Not Apply.Boston College Law Review 54: 1-72.
    7. Brennan-Marquez, Kiel & Henderson, Stephen E. 2018. Fourth Amendment Anxiety. American Criminal Law Review 55: 1-36.
    8. Coombs, Mary I. 1987. Shared Privacy And The Fourth Amendment, Or The Right Of Relationships. California Law Review 75: 1593-1664.
    9. Cloud, Morgan. 2002. Rube Goldberg Meets The Constitution: The Supreme Court, Technology And The Fourth Amendment. Mississippi Law Journal 72: 5-50.
    10. Colb, Sherry F. 2002.What Is A Search ? Two Conceptual Flaws In Fourth Amendment Doctrine And Some Hints Of A Remedy. Stanford Law Review 55: 119 -190.
    11. Crocker, Thomas P. 2009. From Privacy To Liberty: The Fourth Amendment After Lawrence. UCLA Law Review 57: 1-70.
    12. Citron, Danielle Keats & Pasquale, Frank. 2010. Network Accountability For The Domestic Intelligence Apparatus.Hastings Law Journal 62: 1441-1494.
    13. Citron, Danielle Keats. 2010. Mainstreaming Privacy Torts. California Law Review 98:1805-1852.
    14. Covey, Russell D. 2011. Pervasive Surveillance And The Future Of The Fourth Amendment. Mississippi Law Journal 80: 1289-1318.
    15. Crowther, Brandon T. 2012. (Un)Reasonable Expectation Of Digital Privacy. Brigham Young University Law Review 2012: 343-370.
    16. Cukier, Kenneth & Mayer-Schoenberger, Viktor. 2013. The Rise Of Big Data: How It`s Changing The Way We Think About The World, Foreign Affairs 92: 28-40.
    17. Conley, Chris. 2014. Non-Content Is Not Non-Sensitive: Moving Beyond The Content/Non-Content Distinction. Santa Clara Law Review 54: 821-842.
    18. Cuellar, Mariano-Florentino. 2018. Adaptation Nation: Three Pivotal Transitions In American Law & Society Since 1886. Oklahoma Law Review 70: 321-358.
    19. Diez, Eric R. 2006. "One Click, You`re Guilty": A Troubling Precedent For Internet Child Pornography And The Fourth Amendment. Catholic University Law Review 55: 759-794.
    20. Dennis, Erin Smith. 2011. A Mosaic Shield: Maynard, The Fourth Amendment, And Privacy Rights In The Digital Age. Cardozo Law Review 33: 737-772.
    21. Dixon, Herbert B. Jr. 2012. Cloud Computing. Judges` Journal 51: 36-39.
    22. Erickson, William H. & Jameson, William J. 1974. Monitoring And Updating The Standards. American Criminal Law Review 12: 469-476.
    23. Epstein, Richard A. 2009. Privacy And The Third Hand: Lessons From The Common Law Of Reasonable Expectations. Berkeley Technology Law Journal 24: 1199-1228.
    24. Freiwald, Susan. 1996. Uncertain Privacy: Communication Attributes After The Digital Telephony Act. Southern California Law Review 69: 949-1020.
    25. Freiwald, Susan. 2007. First Principles Of Communications Privacy. Stanford Technology Law Review 2007: 3-2.
    26. Ferguson, Andrew Guthrie. 2017. The Smart Fourth Amendment. Cornell Law Review 102: 547-632.
    27. Gerber, D. 1976. Types Of Property Seizable Under The Fourth Amendment. UCLA Law Review 23: 963-987.
    28. George, B. J. Jr. 1985. American Bar Association`s Mental Health Standards: An Overview. George Washington Law Review 53: 338-374.
    29. Grimmelmann, James. 2009. Saving Facebook. Iowa Law Review 94:1137-1206.
    30. Gray, David& Citron, Danielle. 2013. The Right To Quantitative Privacy. Minnesota Law Review 98: 62-144.
    31. Hodson, Kenneth J. 1981. The American Bar Association Standards For Cirminal Justice: Their Development, Evolution And Future. Denver Law Journal 59: 3-24.
    32. Haynes, Allyson W. 2012. Virtual Blinds:Finding Online Privacy In Offline Precedents. Vanderbilt Journal Of Entertainment And Technology Law 14: 603-648.
    33. Harris, David A. 2016. Riley v. California and the Beginning of the End for the Third-Party Search Doctrine. University of Pennsylvania Journal of Constitutional Law 18: 895-932.
    34. Hosein, Gus & Palow, Caroline Wilson. 2013. Modern Safeguards For Modern Surveillance: An Analysis Of Innovations In Communications Surveillance Techniques. Ohio State Law Journal 74 : 1071-1104.
    35. Henderson, Stephen E. 2006. Learning From All Fifty States: How To Apply The Fourth Amendment And Its State Analogs To Protect Third Party Information From Unreasonable Search. Catholic University Law Review 55: 373-438.
    36. Henderson, Stephen E. 2013. After United States v. Jones, after the Fourth Amendment Third Party Doctrine. North Carolina Journal of Law & Technology 14: 431-460.
    37. Henderson, Stephen E. 2014. Our Records Panopticon And The American Bar Association Standards For Criminal Justice. Oklahoma Law Review 66: 699-724.
    38. Joh, Elizabeth E. 2014. Policing By Numbers: Big Data And The Fourth Amendment. Washington Law Review 89: 35-68.
    39. Krent, Harold J. 1995. Of Diaries And Data Banks: Use Restrictions Under The Fourth Amendment. Texas Law Review 74: 49-100.
    40. Kerr, Orin S. 2002. Internet Surveillance Law After The USA Patriot Act: The Big Brother That Isn`t. Northwestern University Law Review 97: 607-674.
    41. Kerr, Orin S. 2002. Lifting The Fog Of Internet Surveillance: How A Suppression Remedy Would Change Computer Crime Law.Hastings Law Journal 54: 805-846.
    42. Kerr, Orin S. 2004.A User`s Guide To The Stored Communications Act, And A Legislator`s Guide To Amending It. George Washington Law Review 72: 1208-1243.
    43. Kerr, Orin S. 2004. The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution. Michigan Law Review 102: 801-888.
    44. Kerr, Orin S. 2007. Four Models Of Fourth Amendment Protection. Stanford Law Review 60: 503-552.
    45. Kerr, Orin S. 2009. The Case For The Third-Party Doctrine. Michigan Law Review 107: 561-602.
    46. Kerr, Orin S.2009. Defending The Third-Party Doctrine: A Response To Epstein And Murphy. Berkeley Technology Law Journal 24: 1229-1238.
    47. Kerr, Orin S. 2010. Applying The Fourth Amendment To The Internet: A General Approach. Stanford Law Review 62: 1005-1050.
    48. Kerr, Orin S. 2010.Ex Ante Regulation Of Computer Search And Seizure. Virginia Law Review 96: 1241-1294.
    49. Kerr, Orin S. 2012. The Mosaic Theory Of The Fourth Amendment. Michigan Law Review 111: 311-354.
    50. Kerr, Orin S. 2014. The Next Generation Communications Privacy Act. University Of Pennsylvania Law Review 162: 373-420.
    51. Kerr, Orin S. 2015. Executing Warrants For Digital Evidence: The Case For Use Restrictions On Nonresponsive Data. Texas Tech Law Review 48: 1-36.
    52. Kerr, Orin S. 2015. Katz Has Only One Step: The Irrelevance Of Subjective Expectations University Of Chicago Law Review 82: 113-134.
    53. Logan, Wayne A. 2012. Policing Identity. Boston University Law Review 92: 1561-1612.
    54. Mulligan, Deirdre K. 2004. Reasonable Expectations In Electronic Communications: A Critical Perspective On The Electronic Communications Privacy Act. George Washington Law Review 72: 1557-1598.
    55. Murphy, Erin. 2009. The Case Against The Case For Third-Party Doctrine: A Response To Epstein And Kerr. Berkeley Technology Law Journal 24: 1241-1254.
    56. Marcus, Martin. 2009. The Making Of The ABA Criminal Justice Standards - Forty Years Of Excellence. Criminal Justice 23: 10-15.
    57. O`Brien, David M. 1978. Reasonable Expectations Of Privacy: Principles And Policies Of Fourth Amendment-Protected Privacy. New England Law Review 13: 662-738.
    58. Oza, Achal. 2008. Amend The ECPA: Fourth Amendment Protection Erodes As E-Mails Get Dusty. Boston University Law Review 88: 1043-1074.
    59. Ohm, Paul. 2011. Massive Hard Drives, General Warrants, And The Power Of Magistrate Judges. Virginia Law Review In Brief 97: 1-12.
    60. Posner, Richard A. 2006. Not A Suicide Pact: The Constitution In A Time Of National Emergency. Oxford University Press.
    61. Palmer, Vernon Valentine. 2011. Three Milestones In The History Of Privacy In The United States. Tulane European And Civil Law Forum 26: 67-98.
    62. Price, Michael M. 2016. Rethinking Privacy: Fourth Amendment Papers And The Third-Party Doctrine. Journal Of National Security Law And Policy 8: 247-300.
    63. Rubinstein, Ira S. 2013. Big Data: The End Of Privacy Or A New Beginning? International Data Privacy Law 3: 74-87.
    64. Richard, Neil M. 2013. The Dangers Of Surveillance. Harvard Law Review 126: 1934-1965.
    65. Richards, Neil M. & King, Jonathan H. 2014. Big Data Ethics. Wake Forest Law Review 49: 393-432.
    66. Reid, Blake Ellis. 2010. Substitution Effects: A Problematic Justification for the Third-Party Doctrine of the Fourth Amendment. Journal on Telecommunications and High Technology Law 8: 613-630.
    67. Serr, Brian J. 1988. Great Expectations of Privacy: A New Model for Fourth Amendment Protection.Minnesota Law Review 73: 583-642.
    68. Slobogin, Christopher & Schumacher, Joseph E. 1993. Reasonable Expectations of Privacy and Autonomy in Fourth Amendment Cases: An Empirical Look at Understandings Recognized and Permitted by Society. Duke Law Journal 42: 727-775.
    69. Slobogin, Christopher. 2012. Making The Most Of United States V. Jones In A Surveillance Society: A Statutory Implementation Of Mosaic Theory. Duke Journal Of Constitutional Law & Public Policy 8: 1-38.
    70. Solove, Daniel J. 2002. Conceptualizing Privacy. California Law Review 90: 1087-1156.
    71. Solove, Daniel J. 2002. Digital Dossiers And The Dissipation Of Fourth Amendment Privacy. Southern California Law Review 75: 1083-1168.
    72. Solove, Daniel J. 2004. Reconstructing Electronic Surveillance Law. George Washington Law Review 72: 1264-1305.
    73. Solove, Daniel J. 2005. A Taxonomy Of Privacy.University Of Pennsylvania Law Review 154: 477-564.
    74. Solove, Daniel J. 2005. Fourth Amendment Codification And Professor Kerr`s Misguided Call For Judicial Deference. Fordham Law Review 74: 747-778.
    75. Solove, Daniel J. & Richards, Neil M. 2007. Privacy`s Other Path: Recovering The Law Of Confidentiality. Georgetown Law Journal 96: 123-182.
    76. Solove, Daniel J. 2013. Introduction: Privacy Self-Management And The Consent Dilemma. Harvard Law Review 126: 1880-1903.
    77. Solove, Daniel J. & Citron, Danielle Keats. 2018. Risk And Anxiety: A Theory Of Data-Breach Harms. Texas Law Review 96: 737-786.
    78. Sommer, Kyle. 2009. Riding The Wave: The Uncertain Future Of RFID Legislation. Journal Of Legislation 35: 48-75.
    79. Soghoian, Christopher. 2010. Caught In The Cloud: Privacy, Encryption, And Government Backdoors On The Web 2.0 Era. Journal On Telecommunications And High Technology Law 8: 359-424.
    80. Semitsu, Junichi P. 2011. From Facebook To Mug Shot: How The Dearth Of Social Networking Privacy Rights Revolutionized Online Government Surveillance. Pace Law Review 31: 291-381.
    81. Schwartz, Paul M. & Solove, Daniel J. 2011. The P1 Problem: Privacy And A New Concept Of Personally Identifiable Information. New York University Law Review 86: 1814-1894.
    82. Swan, Melanie. 2012.Sensor Mania! The Internet Of Things, Wearable Computing, Objective Metrics, And The Quantified Self 2.0.J. SENSOR & ACTUATOR NETWORKS 1: 217-253.
    83. Simmons, Ric. 2014. The Missed Opportunity Of Riley V. California. Ohio State Journal Of Criminal Law 12: 253-266.
    84. Simmons, Ric. 2018. The Mirage Of Use Restrictions. North Carolina Law Review 96: 133-199.
    85. Sheehan, Tim. 2015. Taking The Third-Party Doctrine Too Far: Why Cell Phone Tracking Data Deserves Fourth Amendment Protection. Georgetown Journal Of Law & Public Policy 13: 181-202.
    86. Strandburg, Katherine J. 2011. Home, Home On The Web And Other Fourth Amendment Implications Of Technosocial Change. Maryland Law Review 70: 614-680.
    87. Tomkovicz, James J. 1985. Beyond Secrecy for Secrecy`s Sake: Toward an Expanded Vision of the Fourth Amendment Privacy Province.Hastings Law Journal 36: 645-738.
    88. Tokson, Matthew. 2011. Automation And The Fourth Amendment. Iowa Law Review 96: 581-648.
    89. Tene, Omer & Polonetsky, Jules. 2013. Big Data For All: Privacy And User Control In The Age Of Analytics. Northwestern Journal Of Technology And Intellectual Property 11: 239-274.
    90. Thierer, Adam D. 2015. The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation. Richmond Journal Of Law & Technology 21: 1-118.
    91. Warren, Samuel D. & Brandeis, Louis D. 1890. Right To Privacy, Harvard Law Review 4: 193-220.
    92. Winn, Peter. 2009. Katz And The Origins Of The Reasonable Expectation Of Privacy Test. Mcgeorge Law Review 40: 1-12.
    三、 其他資料
    1. ABA Standards For Criminal Justice: Law Enforcement Access To Third Party Records(3d Ed. 2013). https://www.americanbar.org/content/dam/aba/publications/criminal_justice_standards/third_party_access.authcheckdam.pdf
    2. Acessnow,Transparency Reporting Index, https://www.accessnow.org/transparency-reporting-index/
    3. Airbnbcitizen:https://www.airbnbcitizen.com/transparency/
    4. Apple:https://www.apple.com/privacy/transparency-reports/
    5. Dreamhost,We Fight For The Users,August 14, 2017:https://www.dreamhost.com/blog/we-fight-for-the-users/
    6. EDD DUMBILL, What Is Big Data?: An Introduction To The Big Data Landscape, O`REILLY (Jan. 11, 2012), https://www.oreilly.com/ideas/what-is-big-data
    7. Facebook:https://govtrequests.facebook.com/country/Taiwan/2016-H2/
    8. Google:https://www.google.com/transparencyreport/userdatarequests/TW/
    9. ITU Internet Reports 2005: The Internet Of Things : https://www.itu.int/pub/S-POL-IR.IT-2005/e
    10. 國際電信聯盟(ITU)官方網站: http://life.itu.int/radioclub/rr/art1.pdf
    11. In Re Application Of The FBI For An Order Requiring The Production Of Tangible Things From Verizon Bus. Network Svcs., Secondary Order, BR 13-80, At 2 (FISA Ct. Apr. 25, 2013), https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order?guni=Article:in%20body%201ink
    12. John Markoff. Mar. 3, 1999. Growing Compatibility Issue: Computers And User Privacy, New York Times.
    13. Kerr, Orin S. Amicus Brief In The Fourth Amendment Cell-Site Case, WHASHINGTON POST,Oct.5, 2017 https://www.washingtonpost.com/news/volokh-conspiracy/wp/2017/10/05/amicus-brief-in-the-fourth-amendment-cell-site-case/?utm_term=.e2d8a029eb4b
    14. Kerr, Orin S. Use Restrictions And The Future Of Surveillance Law, FUTURE OF THE CONST., Apr. 2011, https://www.brookings.edu/research/use-restrictions-and-the-future-of-surveillance-law/
    15. Kerr, Orin S. A Closer Look At DOJ’s Warrant To Collect Website Records,WASHINGTON POST, August 15, 2017:https://www.washingtonpost.com/news/volokh-conspiracy/wp/2017/08/15/a-closer-look-at-dojs-warrant-to-collect-website-records/?utm_term=.62de3a487518
    16. Line:https://linecorp.com/en/security/tr_report_2016_2
    17. Microsoft:https://www.microsoft.com/en-us/about/corporate-responsibility/lerr/
    18. NET MARKETSHARE:http://bit.ly/2Mc1Hqy
    19. Peter Mell & Timothy Grance, The NIST Definition Of Cloud Computing, NIST.GOV(Sep. 2011). http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf.
    20. Richard M. Thompson II,Cong. Research Serv., R43586,The Fourth Amendment Third-Party Doctrine 12,15(June 5,2014), http://bit.ly/2K7GxgW
    21. Statcounter: http://gs.statcounter.com/
    22. Siobhan Gorman Et Al., U.S. Collects Vast Data Trove, WALL ST. J., June 7, 2013, https://www.wsj.com/articles/SB10001424127887324299104578529112289298922
    23. Schneier, Bruce. How The Supreme Court Could Keep Police From Using Your Cellphone To Spy On You, WHASHINGTON POST, Nov.27, 2017 https://www.washingtonpost.com/news/posteverything/wp/2017/11/27/how-the-supreme-court-could-keep-police-from-using-your-cellphone-to-spy-on-you/?utm_term=.fd4065484ce5
    24. Sullivan, Margaret. If Cops Can Get Phone Data Without A Warrant, It Could Be A Nightmare For Journalists — And Sources,WHASHINGTON POST, Nov.26, 2017 https://www.washingtonpost.com/lifestyle/style/if-cops-can-get-phone-data-without-a-warrant-confidential-newsgathering-becomes-mission-impossible/2017/11/24/eaf83e7a-cedd-11e7-81bc-c55a220c8cbe_story.html?noredirect=on&utm_term=.7c3a81aabd6a
    25. Standard For Criminal Justice:Law Enforcement Access To Third Party Records §1.1(E)(3d Ed.2013), http://bit.ly/2KaS4vR
    26. White House官網,https://obamawhitehouse.archives.gov/the-press-office/2012/02/23/we-can-t-wait-obama-administration-unveils-blueprint-privacy-bill-rights
    27. Understanding Road Usage Patterns In Urban Areas. Nature Scientific Reports 2: 1-6.( December 20, 2012) http://www.nature.com/articles/srep01001
    28. Yahoo:https://transparency.yahoo.com/government-data-requests

    中文
    一、 書籍
    1. Frank Pasquale著,趙亞男譯(2015),黑箱社會(The Black Box Society)─控制金錢和信息的數據法則,北京:中信出版社。﹝Pasquale ,Frank . 2015.The Black Box Society: the secret algorithms that control money and information. Harvard University Press.﹞
    2. Glenn Greenwald著,林添貴譯(2014),政府正在監控你,台北:時報。﹝Greenwald,Glenn. 2014. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Picador; Reprint edition.﹞
    3. Jeremy Rifkin著,陳儀、陳琇玲譯(2014),物聯網革命:改寫市場經濟,顛覆產業運行,你我的生活即將面臨巨變,台北:商周。〔Rifkin,Jeremy .2015.The Zero Marginal Cost Society: The Internet of Things, the Collaborative Commons, and the Eclipse of Capitalism. St. Martin`s Griffin; Reprint edition〕
    4. Viktor Mayer-Schönberger&Kenneth Cukier著,林俊宏譯(2013),大數據─「數位革命」之後,「資料革命」登場:巨量資料掀起生活、工作和思考方式的全面革新,台北:天下文化。﹝Schonberger, Viktor Mayer&Cukier,Kenneth.2014.Big Data: A Revolution That Will Transform How We Live, Work, and Think. Mariner Books.﹞
    5. 王澤鑑(2012),人格權法,台北:自版。
    6. 王兆鵬,重新定義高科技時代下的搜索,收於:王兆鵬著(2007),美國刑事訴訟法,台北:元照。
    7. 林子儀,公共隱私權,收於:國立臺灣大學法律學院、財團法人馬氏思上文教基金會編(2015),第五屆馬漢寶講座論文彚編,台北:臺灣大學。
    8. 江耀國等(2017),電信法,台北:新學林。
    9. 林建廷、李元生(2012),行動商務概論實務與應用 : 無所不在的雲端運算、行動裝置、RFID與物聯網,台北:碁峰。
    10. 河村雅人等著;吳嘉芳譯(2015),圖解物聯網 : 感測器的架構與運用,台北:碁峰。
    11. 周洪波、李吉生、趙曉波(2010),輕鬆讀懂物聯網技術、應用、標準和商業模式,台北:博碩。
    12. 財團法人資訊工業策進會科技法律研究所編著(2013),走入生活的智慧聯網─匯流科技、政策與產業,台北:五南。
    13. 孫駿榮、蘇海永著(2015),用Arduino全面打造物聯網,台北:碁峰。
    14. 連孟琦譯(2016),德國刑事訴訟法附德國法院組織法選譯,臺北:元照。
    15. 張尼、張雲勇等著(2015),雲端運算安全技術與應用,台北:博碩文化。
    16. 張尼、張雲勇等著(2015),巨量資料安全技術與應用,台北:博碩文化。
    17. 黃朝義(2017),刑事訴訟法,5版,臺北:新學林。
    18. 臺灣網路資訊中心(TWNIC)編著(2016),2016台灣ISP年鑑,臺北:財團法人台灣網路資訊中心出版。
    19. 趙國棟、易歡歡、糜萬軍、鄂維南(2014),大數據時代,台北:五南圖書出版有限公司。

    二、 期刊
    1. 王士帆(2015),偵查機關木馬程式:秘密線上搜索─德國聯邦最高法院刑事裁判BGHSt 51,211譯介,司法周刊,1779期,頁2-3。
    2. 王士帆(2016),網路之刑事追訴─科技與法律的較勁,政大法學評論,145期,頁339-390。
    3. 朱志平(2017),GPS定位追蹤於刑事偵查程序之運用及其授權基礎--從臺灣高等法院高雄分院105年度上易字第604號刑事判決出發,法令月刊,68卷,9期,頁93-133。
    4. 何賴傑(2012),論德國刑事程序「線上搜索」與涉及電子郵件之強制處分,月旦法學雜誌,208期,頁230-244。
    5. 何信慶(2014),從立法審議過程談新修正通訊保障及監察法,司法新聲,第111期,頁27-50。
    6. 李榮耕(2010),論偵查機關對通信紀錄的調取,政大法學評論,115卷,頁115-147。
    7. 李榮耕(2012),電磁紀錄的搜索及扣押,國立臺灣大學法學論叢,41卷,3期,頁1055-1116。
    8. 李榮耕(2014),簡評二○一四新修正的通訊保障及監察法─一次不知所為何來的修法,月旦法學雜誌,227期,頁148-174。
    9. 李榮耕(2015),科技定位監控與犯罪偵查─兼論美國近年GPS追蹤法制及實務之發展,臺大法學論叢,44卷,3期,頁871-969。
    10. 李榮耕(2016),電信事業對於通訊監察的協助義務,月旦刑事法評論,1期,頁29-46。
    11. 李榮耕(2016),數位資料及附帶搜索-以行動電話內的資訊為例,臺北大學法學論叢,100 期,頁245-322。
    12. 李震山(2007),挪動通訊保障與通訊監察天平上的法碼─釋字第六三一號解釋評析,臺灣本土法學雜誌,98卷,頁283-291。
    13. 李萬明(2008),昨日法制與今日科技─通訊保障及監察法於網路監察客體適用之探討,法學新論,2期,頁87-117。
    14. 李惠宗(2008),裁判書上網公開與個人資訊自決權的衝突,月旦法學雜誌,第154期,頁21-34。
    15. 李惠宗(2013),個人資料保護法上的帝王條款─目的拘束原則,法令月刊,64卷,1期,頁37-61。
    16. 李治安(2010),當法律漫步在雲端,法學新論,25期,頁49-65。
    17. 李寧修(2015),防性通信資料存取之憲法界限─以歐盟儲備性資料存取指令(2006/24/EG)之發展為借鏡,興大法學17卷,頁87-140。
    18. 法思齊(2011),美國法上數位證據之取得與保存,東吳法律學報,22 卷,3 期,頁95-147。
    19. 林鈺雄(2004),從基本權體系論身體檢查處分,臺大法學論叢,33,卷3期,頁149-200。
    20. 林鈺雄(2007),干預保留與門檻理論─司法警察(官)一般調查權限之理論檢討,政大法學評論,96期,頁189-232。
    21. 林鈺雄(2008),論通訊之監察─評析歐洲人權法院相關裁判之發展與影響,東吳法律學報,19卷,4 期,頁109 - 152。
    22. 林鈺雄(2013),通訊監察之修法芻議——通訊保障及監察法之部分修正條文一,萬國法律,192卷,頁25-39。
    23. 林裕順(2018),GPS 偵查法治化研究,月旦裁判時報,68 期,頁12-23。
    24. 吳志強(2013),全面鎖定之監聽偵蒐─從制度面尋求犯罪偵查與維護秘密通信、隱私權平衡,萬國法律,192期,頁2-24。
    25. 邱文聰(2009),從資訊自決與資訊隱私的概念區分─評「電腦處理個人資料保護法修正草案的結構性問題」,月旦法學雜誌,168期,頁172-189。
    26. 施育傑(2017),強制處分庭的若干問題──兼論將來修正建議,月旦裁判時報,55期,頁47-58。
    27. 許恒達(2013),GPS抓姦與行動隱私的保護界限──評臺灣高等法院一○○年度上易字第二四○七號刑事判決,月旦裁判時報,24卷,頁59-78。
    28. 莊佳瑋(2014),含基地台地址之通聯紀錄是否屬於合理隱私之期待?─美國第五巡迴上訴法院裁定(724 F.3d 600),檢察新論,16卷,頁190-202。
    29. 張麗卿(2014),通訊保障及監察法之修正與評析,月旦法學雜誌,229期,頁25-45。
    30. 張陳弘(2016),已公開個人資料之隱私保護可能─司法陽光網引發的隱私保護爭議,法令月刊,67卷,9期,頁143-164。
    31. 張陳弘(2018),新興科技下的資訊隱私保護:「告知後同意」原則的侷限性與修正方法之提出,臺大法學論叢,47卷,1期,頁201-297。
    32. 溫祖德(2015),行動電話內數位資訊與附帶搜索-以美國聯邦最高法院見解之變遷為主,月旦法學雜誌,239期,頁198-220。
    33. 楊雲驊(2007),二十四小時之計算,月旦法學教室,53期,頁22-23。
    34. 劉定基(2014),雲端運算與個人資料保護─以台灣個人資料保護法與歐盟個人資料保護指令的比較為中心,東海大學法學研究,42期,頁53-106。
    35. 劉靜怡(2010),雲端運算趨勢與個人資訊隱私保護,全國律師,14卷,2期,頁39-52。
    36. 劉靜怡(2012),政府長期追蹤與隱私保障,月旦法學教室,116期,頁9-11。
    37. 劉靜怡(2013),通保法究竟保護了誰?司法改革雜誌,99卷,頁30-33。
    38. 劉靜怡(2014),只是勉強及格而已─二○一四年通保法修正評析,月旦法學雜誌,232期,頁5-17。
    39. 劉靜怡(2015),違規取締與個人資訊自決權─桃園地方法院行政訴訟一○三年度交字第五四號判決,月旦裁判時報,37期,頁5-12。
    40. 劉靜怡(2000),網際網路時代的資訊使用與隱私權保護規範:個人、政府與市場的拔河,資訊管理研究,4卷,3期,頁137-161。
    41. 劉靜怡(2017),通訊監察與民主監督:歐美爭議發展趨勢之反思,《歐美研究》47卷,1期,頁43-106。
    42. 劉芳伶(2016),遠距搜索扣押與令狀之明示特定,東海大學法學研究,49期,頁45-96。
    43. 劉孔中;趙晞華(2014),通訊保障及監察法修正意旨之辯證與再修正方向之檢視,軍法專刊,60卷,3期,頁37-48。
    44. 鄭逸哲、黃沛文(2014),動機雖屬正當,立法未免粗糙─簡評通保法關於「調取行為」之修正,月旦法學雜誌,232期,頁18-27。
    45. 蔡彩貞( 2017),定位科技在刑事司法程序之運用與人權保障─以利用GPS追蹤為中心,月旦裁判時報,65卷,頁62-78。
    46. 鍾安(2015),美國法對網路匿名表意者的身分揭露程序,憲政時代,41卷,1期,頁 103-144。
    47. 陳運財(2014),偵查法體系的基礎理論,月旦法學雜誌,229期,頁5-24。
    48. 陳重言(2014),刑事追訴目的之通信(通聯)紀錄調取與使用─兼評2014年初通保修法,檢察新論,16期,頁40-59。
    49. 陳起行,資訊隱私權法理探討─以美國法為中心,政大法學評論,64期,頁299(2000年)。
    50. 謝碩駿(2012),論私人參與國家機關之資訊蒐集活動─以線民之遴選應用及電信業者之協力義務為中心,高大法學論叢,7卷,2期,頁145-204.
    51. 謝志明(2014),從美國法觀點看通聯記錄的調閱─兼評我國新修正通訊保障及監察法第11條之1,檢協會訊,99期,頁9-12。
    52. 蕭奕弘(2012),論個人資料保護法的法制性問題,成大法學,23期,頁141-191。
    三、 碩論
    1. 鍾孝宇(2017),巨量資料與隱私權─個人資料保護機制的再思考,國立政治大學法律學系碩士班論文。
    2. 錢世傑(2002),網路通訊監察法制與相關問題研究,中原大學財經法律學系碩士學位論文。
    3. 張本立(2012),資訊時代下個人資料保護法益之研究─以我國個人資料保護法為中心,台灣大學科際整合法律學研究所碩士論文。
    四、 其他資料
     Dr. J,頻寬的定義,科技台灣,2012年09月30日,http://hightech.nccu.edu.tw/index.php?option=com_content&view=article&id=304:access-network&catid=20:2010-06-13-14-30-05&Itemid=13
     FBI為調查斯諾登 曾迫加密電郵公司交出密鑰,關鍵評論網,2016年03月21日,https://www.thenewslens.com/article/38598
     司法院官網,http://www.judicial.gov.tw/juds/
     余至浩,邊緣運算會顛覆雲端運算嗎?,iThome,2017年06月08日,http://www.ithome.com.tw/news/114625
     行政院官網,智慧聯網https://www.bost.ey.gov.tw/News_Content.aspx?n=FDCD0AE1B7596F11&sms=8470D4E99B0FB08E&s=E20C76D2B1B65345
     薛智仁(2018),GPS跟監、隱私權與刑事法─評最高法院106年度台上字第3788號刑事判決,第二屆《公法學與刑事法學之交錯》研討會,中原大學財經法律學系主辦,2018年03月16日。
     黃哲翰,數位利維坦君臨的前夕,端傳媒,2016年06月17日:https://theinitium.com/article/20160617-opinion-huangdschergan-digital/
     關貿第46期電子報,巨量資料新生活:http://www.tradevan.com.tw/wpm/DownloadFiles/07-Finance/report/1400205067726.pdf
    Description: 碩士
    國立政治大學
    法律學系
    1036510581
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G1036510581
    Data Type: thesis
    DOI: 10.6814/THE.NCCU.LAW.027.2018.F10
    Appears in Collections:[Department of Law] Theses

    Files in This Item:

    File SizeFormat
    058101.pdf15312KbAdobe PDF2973View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback