Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/129227
|
Title: | 軍人身分證晶片化之決策分析 Decision Analysis of Military eID Development |
Authors: | 鄭棟元 Cheng, Dung-Yuan |
Contributors: | 蕭乃沂 Hsiao, Naiyi 鄭棟元 Cheng, Dung-Yuan |
Keywords: | 決策分析 軍人身分證 深度訪談 模糊層級分析法 Decision analysis Military Identification in-depth interview fuzzy AHP |
Date: | 2020 |
Issue Date: | 2020-04-06 14:47:14 (UTC+8) |
Abstract: | 隨者科技發展至今,晶片卡在生活中已受廣泛應用;我國全民晶片健保卡於2003 年完成換發作業,政府亦將於2020 年10 月起推動換發晶片國民身分證,積極推展電子化服務。美軍自1999 年起即依國會要求換發晶片軍人身分證,將智慧卡科技融入、整合軍事管理作為,國軍軍人身分證假使能順應晶片化「多卡合一」進步趨勢,勢必能增進內、外部單位鏈結與國防事務發展,契合國防施政作為並強化與國際鏈結交流。 本研究彙整深度訪談專家意見,以「整合效益」、「可能風險」與「推動成本」為評估構面,運用模糊層級分析法探討國軍相關決策者、使用者,對現行紙本軍人身分證朝向晶片化發展的決策分析,比較個人、群體決策各項權重數值,結合組織文化差異觀點詮釋,求得「證件晶片化」的最大可能行動方案,確認晶片軍人身分證發展決策。 晶片軍人身分證的群體決策研究發現,提供國軍未來多卡整合、風險管控、發展方向與政策擘劃之實務展望。相信未來晶片軍人身分證統合發展後,可有效啟迪思維、強化內部公共管理,並間接提升軍人於社會上的形象地位。值得探討的是,證件晶片化的弊端思慮,並不代表會成為停止進步的組織承諾,除卻證件形式上的轉變,更可深化國軍全體官兵對未來發展的肯定,幫助建立其實務認知與未來願景。 本研究建議國軍可結合國家電子化政府政策推動,進行證件晶片化相關規範與配套之政策設計探究;透過完善而嚴謹的政策法制,清楚明定將傳統證件轉換後,如何循序建置、推展,逐步擴大內部應用數位服務範圍,或許更能夠加速政策推行,提升國軍內部驅動公共治理與改善精進政策。 With the development of science and technology nowadays, Integrated Circuit Cards (ICC) become widely used in our lives. Since 2003, National Health Insurance Card had fully reissued operations to chip cards. The government will start to facilitate transferring National Identity Chip Cards in order to promote electronic services actively. The U.S. military had improved paper identity cards to chip eID followed the Congress’ guidance to merge ICC technology and application with military management. If R.O.C. military identity can follow the trend to integrate multiple functions into one card, it will surely enhance the link of units with national defense affairs in all aspects, combine national defense policy, and build up international engagements strengthening with other countries. This research gathers expert opinions from in-depth interviews to adopt and acquire “integrated benefits, possible risks, and transformed costs” as assessed evaluation, using fuzzy AHP to study on two groups as decision makers and pure users in the Ministry of National Defense (MND), then develop decision analysis of transforming to military eID of current paper ID. The comparison will be held with individuals and groups with the same or different types of values, in order to address small, partial difference caused by organization cultures. Then the research acquires all values needed to illustrate the result of most possible course of action, as the possible reference for future potential decision development. The result of group decision making in this study provides possible integration of multiple cards, risk management, developed direction, and future policy planning of the practical prospect. I believe that after military eID integrated development in the future, it will efficiently enlighten thinking, strengthen internal public management, and enhance the status of soldiers in society indirectly. It is worth exploring that disadvantages thinking of eID development will not stop the improving progress of organizational commitment. Eliminating just looking at the changes in the form of ID cards in appearance, it will deepen the acknowledge to the future development and assist establishing practical cognition and vision of the armed forces. The research provides suggestion for the Armed Forces to follow the Electronic Government trend and to draft policies related to military eID development. Only consolidated policy and regulation design assists to facilitate expanding digital service range of inter-organization step-by-step. This could also accelerate the implementation of policies improving public governance in the Armed Force. |
Reference: | 中文部分 內政部(2019)。數位身分識別證(New eID)簡易問答集。取自https://www.ris.gov.tw /app/portal/789 內政部(2007)。全面換發國民身分證大事紀。臺北:內政部。 內政部戶政司(2017)。「晶片國民身分證?」開放決策工作坊議題手冊。臺北:內政部。 內政部戶政司(2019)。New eID資訊公開專區。取自內政部戶政司官方網站 https://www.ris.gov.tw/app/ portal/789 王嘉斌(2011)。晶片IC卡的應用。科學研習月刊,48-8,2-5。 朱豔芳、謝復剛(2005)。國防實務研究方法。臺北:前程文化總經銷。 江妙瑩(2004)。健保IC卡上路,你憂心隱私全都露嗎?。取自 http://forum.yam.org.tw/bongchhi/old/tv/tv152.htm 行政院研究發展考核委員會(2016)。第五階段電子化政府計畫(106年至109年)。取自研考會官方網站https://www.ndc.gov.tw/ cp.aspx?n=67F4A482298C5D8E&s= EEBA8192E3AA2670 吳怡瑾、林書偉(2010)。基於專案屬性資訊之知識探勘與再利用平台發展。圖書資訊學刊,8(1),97-136。https://doi.org/10.6182 /jlis.2010.8(1).097 李興緯、洪上修、李翔祖(2009)。防僞安全技術運用於識別證件之研究。中華印刷科技年報,138-152。https://doi.org/10.30153/ JCAGST.200903.0011 周立平、楊博宏(2011)。晶片卡安全之探討-離線攻擊Mifare Classic。前瞻科技與管理,1(2),97-111。 周冠汝、何明諠(2019)。一人一號的身分制度是必要的嗎?討論晶片身分證的隱私資安風險前,得先思考這個根本問題。取自Medium https://medium.com/@tahr1984 林子鈞(2018)。為什麼台灣人需要一張晶片身份證?讓我用五分鐘解釋給你聽。取自 https://buzzorange.com/techorange/2018/06/12/ idrntify-resign/ 林政宏(2011)。智慧卡的科技。科學研習月刊,44-2,4-7。 林淑馨(2018)。公共管理概論。高雄:巨流圖書股份有限公司。 范麗娟(1994)。深度訪談簡介。戶外遊憩研究,7(2),頁25-35。 徐村和(1998)。模糊德菲層級分析法。模糊系統學刊,4(1),59-72。 秦大智(2013)。反擊階段打擊旅火力支援方案之研究-以層級分析法為例。黃埔學報,69,74-86。 國史館檔案史料文物(1940)。國民兵身分證暫行條例。取自史料文物查詢系統https://ahonline.drnh.gov.tw/index.php?act=Display /image /53537257Yz=00#0eF 國防部(2019)。中華民國108年國防報告書。臺北:國防部。 國防部(2017)。中華民國106年國防報告書。臺北:國防部。 國防部(2016)。國軍人員身分證明管理要點。臺北:國防部。 國家發展委員會資訊管理處(2018)。數位治國的愛沙尼亞,數位公民獨步全球。政府機關資訊通報,351,1-3。 張紹勳(2012)。模糊多準則評估法及統計。臺北:五南圖書出版股份有限公司。 張毓騰、吳杰修 (2016)。應用層級分析法探討空軍志願役人員留任的因素之研究。管理資訊計算,5(2),79-84。doi: 10.6285/MIC. 5(2).07 莊庭瑞(2017)。全面換發晶片身分證?歷史共業下的台灣戶籍制度。民主視野,20,13-16。 許家瑜、張文馨、程平、林鎮西、李彦民(2018)。健保卡前世今生比一比 未來「摸不到」。取自 https://theme.udn.com/theme/story/ 6774/3297813 陳敦源、李仲彬、黃東益(2007)。應用資訊通訊科技可以改善“公眾接觸”嗎?台灣個案的分析。東吳政治學報,25(3),51-92。 陳蔚菁(2019)。介紹德國eID政策法制-從德國身分證及電子識別法出發。科技法律透析,31-3,31-37。 黃東益、蕭乃沂(2014)。電子治理與資訊產業發展。公共治理季刊,2(2),51-57。 黃彥鈞(2018)。愛沙尼亞前總統訪台,直言數位化需要的是政治決心。取自 http://technews.tw/2018/07/19/estonia-former-president-toomas-hendrik-ilves-digitalization/ 萬文隆(2004)。深度訪談在質性研究中的應用。生活科技教育,37(4), 17-23. https://doi.org/10.6232/LTE.2004.37(4).4 葉俊榮(2005)。電子化政府資通安全發展策略與展望。研考雙月刊,29(1),20-34。 董信煌、陸曉曦(2017)。雲端電子病歷使用意圖之探討。Electronic Commerce Studies,15(2),167-208。 廖泓瑋(2010)。大學經營環境衝擊下學院因應策略之研究。華梵大學工業工程與經營資訊學系碩士班碩士論文。 褚志鵬(2009)。層級分析法(AHP)理論與實作。取自http://faculty.ndhu.edu.tw/~chpchu/ POMR_Taipei_2009/AHP2009. pdf 鄧振源、曾國雄(1989)。層級分析法(AHP)的內涵特性與應用(下)。中國統計學報,27(7),1-20。 鄧振源(2005)。計畫評估:方法與應用。基隆:國立臺灣海洋大學運籌規劃與管理研究中心出版。 鄭景俗、廖述賢、張自立 (2003)。基於模糊層級分析觀念及距離法模糊數排序評估武器系統。中華管理學報,4(2),1-18。doi:10. 30053/chjm.200307.0001 鄭棟元(2019)。美國陸軍網路戰概念發展之探討。陸軍學術雙月刊,55(568),4-23。 蕭乃沂、朱斌妤(2018)。資料驅動創新的跨域公共治理。國土及公共治理季刊,6(4),74-85。 英文部分 Albrecht, K. (2008). RFID TAG-YOU’RE IT. Scientific American, 299(3), 72-77. https://doi.org/10.1038/scientificamerican0908-72 Ardiley, Stephane (2012). History of the Common Access Card (CAC). Security Technology Executive, 22. Ariton-Gelan, C. (2015). CREATING ELECTRONIC IDENTITY - FUNDAMENTAL OBJECTIVE OF E-GOVERNMENT. Romanian Review of Social Sciences, (8), n/a. Retrieved from http://search.proquest.com/docview/1748576210/ Buckley, J. J. (1985). Ranking alternatives using fuzzy numbers. Fuzzy sets and systems, 15(1), 21-31. Carr, M. R. (2002). Smart card technology with case studies. In Proceedings. 36th Annual 2002 International Carnahan Conference on Security Technology (pp. 158-159). IEEE. CEF Digital (2019).What are the benefits of eID? Retrieved from https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/Benefits+of+eID Chadwick, D. (1999). Smart cards aren’t always the smart choice. Computer, 32(12), 142-143. https://doi.org/10.1109/2.809256 Chih, M. Y., Shih, J. R., Yang, B. Y., Ding, J. T., & Cheng, C. M. (2010). MIFARE Classic: Practical attacks and defenses. In 全國資訊安全會議 (pp. 126-132). 中華民國資訊安全學會. Culnan, M. J., Armstrong, P. K. (1999). Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science, 10(1), 104–115. https://doi. org/10.1287/orsc.10.1.104 de Andrade, N., Chen-Wilson, L., Argles, D., Wills, G., Schiano Di Zenise, M., Gaycken, S., … Cova, M. (2014). Electronic Identity (2014 ed.). https://doi.org/10.1007/978-1-4471-6449-4 DMDC (2002). DoD Introduces a New ID Card: The Common Access Card. Retrieved from https://www.dmdc.osd.mil/smartcard/owa/Show Page?p=index Dubois, D., & Prade, H. (1978). Operations on fuzzy numbers. International Journal of Systems Science, 9(6), 613-626. Forman, E., Saaty, T., Shvartsman, A., Forman, M., Korpics, M., Zottola, J. (2000). Expert Choice 2000. Inc., Pittsburgh. Gage, T. (1999). Just the FAQS--Smart card. Air Force Journal of Logistics, 23(2), 18–21. Retrieved from http://search.proquest.com /docview/196451526/ Gustafsson, M., Hedström, K., Söderström, F., & Wihlborg, E. (2015). Constructing identities – professional use of eID in public organizations. Transforming Government: People, Process and Policy, 9(2), 143–158. https://doi.org/10.1108/TG-11-2013-0049 Pardalos, P., Du, D., & Kahraman, C. (2008). Fuzzy Multi-Criteria Decision Making: Theory and Applications with Recent Developments (Vol. 16). https://doi.org/10.1007/978-0-387-76813-7 Meadows, D., & Wright, D. (2009). Thinking in systems : a primer / Donella H. Meadows ; edited by Diana Wright. London ;: Earthscan. Murdoch, S. J., Drimer, S., Anderson, R., & Bond, M. (2010, May). Chip and PIN is Broken. In 2010 IEEE Symposium on Security and Privacy (pp. 433-446). IEEE. Norris, P. (2001). Digital divide: Civic engagement, information poverty, and the Internet worldwide. Cambridge university press. Pesonen, L. (2003). Meeting governments’ demands for secure ID documents. (2003). Card Technology Today, 15(4), 8–8. https://doi.org/10.1016/S0965-2590(03)00416-X Plyler, K. I. (2002). Common Access Card: Mission E-Possible, Retrieved from CHIPS, U.S. Navy website. https://www.doncio.navy.mil/chips/ArticleDetails.aspx?ID=3624 Poller, A., Waldmann, U., Vowé, S., & Türpe, S. (2012). Electronic identity cards for user authentication—promise and practice. IEEE Security & Privacy, (1), 46-54. Rissanen, T. (2010). Electronic identity in Finland: ID cards vs. bank IDs. Identity in the Information Society, 3(1), 175-194. https://doi. org/10.1007/s12394-010-0049-8 Saaty, T. L. (1980). The Analytic Hierarchy Process. New York: McGraw-Hill. U.S. Army (2016). Army Cyber Command leader: protecting systems, networks vital for Army readiness. Retrieved from https://www. army.mil/article/164788/army_cyber_command_leader_protecting_systems_networks_vital_for_army_readiness U.S. DoD (2018). Common Access Card. Retrieved from https://www.cac.mil/common-access-card/ Villasenor, J. (2012). A Hacker-Ready Chip. Scientific American, 307(2), 29. https://doi.org/10.1038/scientificamerican0812-29a VOA (2019). US Says Taiwan Defense Spending to Rise with China Threat. Retrieved from https://www.voanews.com/east-asia-pacific/us-says-taiwan-defense-spending-rise-china-threat Wang, Y., Xu, L., & Solangi, Y. (2020). Strategic renewable energy resources selection for Pakistan: Based on SWOT-Fuzzy AHP approach. Sustainable Cities and Society, 52. https://doi.org/10.1016/j.scs.2019.101861 Zadeh, L. A. (1965). Fuzzy sets. Information and control, 8(3), 338-353. |
Description: | 碩士 國立政治大學 行政管理碩士學程 107921302 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0107921302 |
Data Type: | thesis |
DOI: | 10.6814/NCCU202000395 |
Appears in Collections: | [Master for Eminent Public Administrators] Theses
|
Files in This Item:
File |
Description |
Size | Format | |
130201.pdf | | 1591Kb | Adobe PDF2 | 716 | View/Open |
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|