政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/134033
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文筆數/總筆數 : 113324/144300 (79%)
造訪人次 : 51151641      線上人數 : 878
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/134033


    題名: 以商業生態系統理論之觀點探討身份自主權的發展
    Using Business Ecosystem Perspective to Analyze the Development of Self Sovereign Identity
    作者: 林陽
    Lin, Yang
    貢獻者: 鄭至甫
    Jeng, Jyh-Fu
    林陽
    Lin, Yang
    關鍵詞: 身份自主權
    商業生態系統
    創新擴散理論
    行為者網路理論
    Self Sovereign Identity
    Business Ecosystem
    Diffusion of Innovation
    Actor Network Theory
    日期: 2021
    上傳時間: 2021-03-02 14:21:36 (UTC+8)
    摘要: 由於全球大多數地區的網際網路基礎建設及行動通訊網路日臻成熟發達,無論是個人、組織、機構、企業、政府等個體(entity),每日都在網路世界大量產生與其相關的數據或資料。過去,個體均需仰賴其他可以取信於公眾的其他個體之電腦資訊軟硬體系統及通訊設備,來對個體的身份及其所產生的數據或資料加以管理、進而控制。這些管理及控制身份與資料的個體,已經被證實無法安全保護所轄個體的身份隱私權、或是以壟斷資料所有權的方式來進行不公平的市場競爭。因此,身份自主權(self sovereign identity)的思潮運動已經從萌芽進入到成長階段,雖然尚未啟迪所有公民的自主意識,但是藉由區塊鏈技術的發展及採用,讓身份自主權已開始步入到實際應用上;而以身份自主權為基礎的資訊科技未來顛覆人類的生活方式實屬可期。

    本文採用商業生態系統觀點為基礎,採用內容資料分析法,探討產業中主要領導的廠商、組織及團體,在自主權應用的發展所扮演的角色;並透過問卷調查進行量化分析方法,了解顧客群體從其他生態系統遷移到身份自主權生態系統的支持意願。冀望從資料整理分析之後,得出台灣地區從事業者進軍世界其他地區的發展策略。
    With the advent of the construction maturity of Internet infrastructure and mobile telecommunication networks in the world, entities, whether individuals, organizations, institutions, enterprises, or governments, create tons of data and information in the cyberspace day by day. Before, entities need to rely on others’ computers as well as information software and hardware systems which are trusted by the public to manage and control their identities and related private data and information. However, some means of facilitating the management and controlling mechanisms of others’ identities and data have been proven incapable of securing the privacy of data or information kept in their hands. Others even corner the whole market by monopolizing the ownership of collected data. The ideological trend to adapt self sovereign identity has been rapidly burgeoned although the perception of it has not thoroughly known by all the citizens yet. However, the development of blockchain technologies propelling the according applications to the real world has been practiced and deployed . The information technologies building on self sovereign identity will definitely re-shape and innovate our future life.

    On the basis of Business Ecosystem perspective, this study explores the roles of leading vendors, organizations, and groups playing in the development of Self Sovereign Identity by employing the methodology of content analysis. Via collecting questionnaires on the Internet and analyzing the data by a quantitative approach, we try to understand end users’ willingness to support the migration from other ecosystems to SSI. After the sight of the data analysis result, we expect to propose some development strategies to assist the engaged Taiwan vendors and operators in their entrance to international markets.
    參考文獻: 中文參考文獻:
    Botsman, R., (2018)。信任革命:信任的轉移與科技所扮演的角色(林添貴譯)。台北市:遠流出版事業股份有限公司(原著出版於2017)
    King, B., (2018)。Bank 4.0金融常在,銀行不再?(孫一仕、周群英、林凱雄譯)。台北市:台灣金融研訓院。(原著出版於2018)
    Latour, B., (2016)。巴斯德的實驗室-細菌的戰爭與和平(伍啟鴻、陳榮泰譯)。新北市:群學出版有限公司。(原著出版於2011)
    Latour, B., (2017)。激情的經濟學(陳榮泰、伍啟鴻譯)。新北市:群學出版有限公司。(原著出版於2008)
    Moore, James F. (1999)。競爭的衰亡-商業生態系統時代的領導與戰略(梁駿譯)。北京市:北京出版社。(原著出版於1996)
    Rogers, E.M., (2016)。創新的擴散(唐興通、鄭常青、張延臣譯)。北京市:電子工業出版社。(原著出版於1983)
    Scheer R., (2016)。誰買走我的個資? 當你一上網, 就等於宣告我自願出賣關於我的所有資料, 且分文不取, 以使企業獲得最大利益的時代來臨。為什麼? 該如何遏止?(林麗雪譯)。新北市:好優文化出版有限公司。(原著出版於2015)
    吳思慧(2013)。社交網站之社群信任、成員關係信任與訊息信任對購買意願影響研究。未出版之碩士論文,南臺科技大學,資訊傳播系碩士班,台南市。
    教育部重編國語辭典修訂本,【主權】檢索結果。檢自http://dict.revised.moe.edu.tw/cgi-bin/cbdic/gsweb.cgi?o=dcbdic&searchid=Z00000118380 (May 14, 2020)
    郭國泰、司徒達賢、于卓民(2008)。商業生態系統之變遷:以軟體產業為例。創新與管理,6(1),1-27。doi:10.30118/JIM.200811.0001
    陳怡心(2018)。從行動者網絡理論觀點探究水資源課程的生成與轉譯歷程。未出版之碩士論文,國立臺灣師範大學,教育學系,台北市。
    盧希鵬-商業周刊 (2017)。C2B逆商業時代。台北市:城邦文化事業股份有限公司-商業周刊
    蕭余芷(2020)。區塊鏈及數位加密貨幣的應用範例及挑戰。未出版之碩士論文,元智大學,經營管理碩士班,桃園市。
    资武成(2013)。“大数据”时代企业生态系统的演化与建构. 社会科学, (12), 55-62。

    英文參考文獻:
    Allen, C., (2016). The Path to Self-Sovereign Identity. Retrieved April 18, 2020 from http://www.lifewithalacrity. com/2016/04/the-path-to-self-soverereign-identity.html
    Ferdous, M. Chowdhury, F. & Alassafi, M.(2019). In Search of Self-Sovereign Identity Leveraging Blockchain Technology. IEEE Access.
    Arenas, R., & Fernandez, P. (2018). CredenceLedger: A Permissioned Blockchain for Verifiable Academic Credentials. In 2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings. Retrieved April 18, 2020 from https://doi.org/10.1109/ICE.2018.8436324
    Baars, D. (2016). Towards Self-Sovereign Identity using Blockchain Technology. University of Twente.
    Blockchainhub Berlin (2018). Self Sovereign – Identity vs Data?. Retrieved May 1, 2020 from https://blockchainhub.net/blog/blog/self-sovereign-identity-vs-data/
    Callon, M. (1984). Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay. The Sociological Review, 32(1_suppl), 196–233.
    Di Francesco Maesa, D., & Mori, P. (2020). Blockchain 3.0 applications survey. Journal of Parallel and Distributed Computing. Retrieved April 18, 2020 from https://doi.org/10.1016/j.jpdc.2019.12.019
    Facebook (2020). FACEBOOK for Developers. Retrieved Aug. 23 from https://developers.facebook.com/docs/facebook-login/web/
    Google (2020). Auth Protocols. Retrieved Aug. 23 from https://developers.google.com/identity
    IETF (2012). RFC 6749: The OAuth 2.0 Authorization Framework. Retrieved Aug. 23 from https://tools.ietf.org/html/rfc6749
    ISO (2019). ISO/IEC 24760-1:2019 IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts. Retrieved Aug. 23 from https://www.iso.org/standard/77582.html
    Lagutin, D., Kortesniemi, Y., Fotiou, N., & Siris, V. A. (2019). Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT Devices using OAuth-based Delegation. Retrieved April 18, 2020 from https://doi.org/10.14722/diss.2019.23005
    Latour, B(1993). We have never been modern. Harvester Wheatsheaf, Hemel Hempstead.
    Latour, B. (1984). The Powers of Association. The Sociological Review, 32(1_suppl), 264–280.
    OpenID (2020). Specifications. Retrieved Aug. 23 from https://openid.net/developers/specs/
    Risk Based Security (2020). 2020 Q1 Report Data Breach QuickView. Retrieved May 22 from https://pages.riskbasedsecurity.com/hubfs/Reports/2020/2020%20Q1%20Data%20Breach%20QuickView%20Report.pdf?hsCtaTracking=5d936f78-de69-45a4-9ba5-03c2e9f20952%7C617588df-ee05-4a00-bbb1-191d6888f519
    Seuwou, P., Banissi, E., Ubakanma, G., Sharif, M. S., & Healey, A. (2017). Actor-network theory as a framework to analyse technology acceptance model’s external variables: the case of autonomous vehicles. In International Conference on Global Security, Safety, and Sustainability (pp. 305-320). Springer, Cham.
    Tatnall, A. & Gilding, A. (1999). Actor-Network Theory and Information Systems Research. Victoria University of Technology, Melbourne, Australia.
    Tobin, A., & Reed, D. (2016). The inevitable rise of self-sovereign identity. The Sovrin Foundation, 29(2016).
    Uwe Der, Stefan Jähnichen, Jan Sürmelif (2017). Self-sovereign Identity − Opportunities and Challenges for the Digital Revolution. Retrieved May 4, 2020 from https://arxiv.org/abs/1712.01767
    Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 157-178.
    W3C-did-core (2020). Decentralized Identifiers (DIDs) v1.0. Retrieved May 16, 2020 from https://w3c.github.io/did-core/
    W3C-did-use-cases (2020). Use Cases and Requirements for Decentralized Identifiers. Retrieved May 4, 2020 from https://www.w3.org/TR/did-use-cases/
    W3C-use-cases(2017). Verifiable Claims Use Cases 1.0. Retrieved April 18, 2020 from https://www.w3.org/2017/05/vc-use-cases/CGFR/2017-05-01/
    W3C-vc-data-model (2019). Verifiable Credentials Data Model 1.0. Retrieved April 18, 2020 from https://www.w3.org/TR/vc-data-model/
    W3C-vc-use-cases (2019). Verifiable Credentials Use Cases. Retrieved April 18, 2020 from https://www.w3.org/TR/vc-use-cases/
    描述: 碩士
    國立政治大學
    經營管理碩士學程(EMBA)
    105932072
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0105932072
    資料類型: thesis
    DOI: 10.6814/NCCU202100236
    顯示於類別:[經營管理碩士學程EMBA] 學位論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    207201.pdf5604KbAdobe PDF2170檢視/開啟


    在政大典藏中所有的資料項目都受到原著作權保護.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋