Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/31073
|
Title: | 網站隱私權政策分析-以台灣網站為例 網站隱私權政策分析-以台灣網站為例 |
Authors: | 李俊磊 Li , Chun-Lei |
Contributors: | 湯宗益 李俊磊 Li , Chun-Lei |
Keywords: | 網站 網站 個人資訊 個人資訊 公平資訊實施 公平資訊實施 隱私權政策 隱私權政策 Website Website Personal Information Personal Information Fair Information Practice Fair Information Practice Privacy Policy Privacy Policy |
Date: | 2003 |
Issue Date: | 2009-09-14 09:12:14 (UTC+8) |
Abstract: | 個人資料的資料流(Data Flows)在網路上的擴散,造成對個人隱私權的威脅,逐漸已經成為社會大眾所關注的議題。在過去幾年中,網站逐漸被要求制定相關的規範以符合大眾的期待。然而,隨著網際網路環境的快速變遷,網站的規範是否提供適當的個人隱私權保護,將會成為社會大眾持續討論的問題。
部分的網站已經滿足隱私權到某種程度。這些網站開始採用一些普遍性的實作。在某些程度上,這些實作依循由隱私權規範創立者所推動的公平資訊實施原則(Fair Information Practice Principle)(FTC,1998a)。
本研究根據文獻探討提及的公平資訊實施原則:告知(notice)、選擇(choice)、存取(access)、與安全(security),對個人使用者感興趣的台灣地區網站進行網站隱私權政策分析與調查研究,探討其對個人隱私揭露的程度。
研究結果指出,樣本中84.1%的網站收集至少一種形式的個人識別資訊(例如:姓名,e-mail address,郵政地址),72.3%收集至少一種形式的人口統計學資訊(例如:性別,喜好,郵遞區號),71.8%的網站兩者接收集,而15.4%的網站兩者皆不收集。隱私揭露方面,67.7%(390個樣本中的264個)刊載至少一種形式的隱私揭露(一個隱私權政策的告示或是一個資訊實施聲明),50.5%這兩種形式的隱私揭露都刊載,有32.3%個網站這兩種形式的隱私揭露皆不刊載。觀察隱私揭露反映公平資訊實施的程度,在264個有收集個人資訊與刊載隱私揭露的網站中,92.8%包含至少一種關於(告知)的調查項目,70.8%包含至少一種關於(選擇)的調查項目,80.7%包含至少一種關於(存取)的調查項目,43.9%包含至少一種關於(安全)的調查項目,以及26.9%包含關於(聯絡資訊)的調查項目。
在本研究中,看待這些網站樣本所得出的結果,應特別注意那些較不滿足公平資訊實施原則的部分,包括對Cookies使用的告知、告知關於外界第三者的相關資訊、選擇、安全以及聯絡資訊等部份所表現出來的結果,而實際上所有台灣網站所表現出的結果,很可能比本研究所得出的結果來得更為不理想,網站若要更能滿足使用者對隱私權保護的期待,就必須更正視這些部份的隱私揭露保護。
資料的收集與使用對網路環境的發展影響甚鉅,網站營運者在思考如何使資料的利用最大化時,必須兼顧使用者的隱私權。唯有在合理,相互尊重的架構下,才能替彼此創造出長遠的利益。本研究的結果希望能對台灣在檢討、發展、建立符合台灣環境及與世界接軌的網路隱私權保護環境上,作出些許的貢獻。 The spreading of personal data flows over the Internet has threatened many online individuals’ privacy, which also becomes a noticeable topic among the society. For the past few years, there were norms applied to websites in order to protect online users’ privacy. However, could norms provide proper protections along with the rapid improvement of Internet technology? This topic will remain among society’s discussion.
Some websites provide certain amount of protections by using popular practices. On a certain level, these practices follow the Fair Information Practice Principle that was supported by the Privacy Norm Entrepreneurs (FTC, 1998).
This research is based on the four main elements of Fair Information Practice Principle: Notice, Choice, Access, and Security. The thesis concentrates on analyzing and researching the privacy policy about privacy disclosure provided by websites that were directed and interested to individual user within Taiwan.
Based on the result of this research, 84.1% of the sampled websites collected at least one type of personal identifying information (e.g. name, e-mail address, postal address). 72.3% of the sampled websites collected at least one type of demographic information (e.g. gender, preferences, Zip code). 71.8% of the websites collected both types of personal information, and 15.4% collected neither type of personal information. As for privacy disclosure, 67.7% of the websites (264 out of 390 sampled websites) provided at least one type of privacy disclosures (a privacy policy notice or an information practice statement). 50.5% of the websites provided both types of disclosures; and 32.3% of the websites provided none of the above. By studying the researched websites along with the Fair Information Practice Principle, Of the 264 websites that collected personal information and posted a privacy disclosure, 92.8% included at least one survey item for notice, 70.8% contained at least one survey item for choice, 80.7% contained at least one survey item for access, 43.9% contained at least one survey item for security, and 26.9% contained at least one survey item for contact information.
While studying the research result, it is important to concentrate on the websites that did not follow the Fair Information Practice Principle. The result includes websites’ notice of Cookies usage, and providing third party related information, choice, security, and contact information, etc. However, the result in reality could be a lot worse than the research result. In order to fulfill online users’ anticipation, websites should pay more attention on privacy policy of these parts.
Colleting and using users’data influence the development of online environment greatly. Web owners should consider their customers’ privacy rights while trying to capitalize customers’ information. The only way to generate long and stable benefit for both provider and user is with respect. Hopefully the result of this research will contribute some amount of consideration and development of privacy protection that works for websites and users in Taiwan. |
Reference: | 中文部分 中文部分 王郁琦(1996),「網路上的隱私權問題」,資訊法務透析,1996年10月號。 王郁琦(1996),「網路上的隱私權問題」,資訊法務透析,1996年10月號。 尤英夫(1997),「新聞媒體與隱私權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。 尤英夫(1997),「新聞媒體與隱私權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。 朱柏松(1989),「隱私權概念的衍變及其損害防止立法之動向」,法學叢刊,第134期。 朱柏松(1989),「隱私權概念的衍變及其損害防止立法之動向」,法學叢刊,第134期。 李震山(1997),「論資訊自決權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。 李震山(1997),「論資訊自決權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。 呂雅雯(2000),「探討通訊隱私範圍之變遷-以美國、德國和台灣法規為例」,中正電傳所碩士論文。 呂雅雯(2000),「探討通訊隱私範圍之變遷-以美國、德國和台灣法規為例」,中正電傳所碩士論文。 林建中(1999),「隱私權概念的再思考一關於概念範圍、定義及權利形成方法」,台大法研所碩士論文。 林建中(1999),「隱私權概念的再思考一關於概念範圍、定義及權利形成方法」,台大法研所碩士論文。 林育廷(2000),「行政動態-美國提出規則P草案保護消費者金融資訊隱私權」,科技法律透析,2000年4月,pp.22-23。 林育廷(2000),「行政動態-美國提出規則P草案保護消費者金融資訊隱私權」,科技法律透析,2000年4月,pp.22-23。 邱建動(2000),「從電子商務的面向探討網路資訊隱私權」,2000網路與社會研討會,新竹:清大社會所。 邱建動(2000),「從電子商務的面向探討網路資訊隱私權」,2000網路與社會研討會,新竹:清大社會所。 邱建勳(2001),「電子商務環境中「個人資料財產權」之探討─以著作權為主」,國立中正大學電訊傳播研究所碩士論文。 邱建勳(2001),「電子商務環境中「個人資料財產權」之探討─以著作權為主」,國立中正大學電訊傳播研究所碩士論文。 邱顯貴(2002),「電子商務網站信任管理之研究」,政大資管所博士論文。 邱顯貴(2002),「電子商務網站信任管理之研究」,政大資管所博士論文。 洪榮彬(1993),「資訊時代之資料處理與資料保護-以德國聯邦個人資料保護法為中心」,輔大法研所碩士論文。 洪榮彬(1993),「資訊時代之資料處理與資料保護-以德國聯邦個人資料保護法為中心」,輔大法研所碩士論文。 洪順慶(1998),「淺談關係行銷」,http://www.ba.nccu.edu.tw/schoolfellow/1998/199812-3.htm. 洪順慶(1998),「淺談關係行銷」,http://www.ba.nccu.edu.tw/schoolfellow/1998/199812-3.htm. 許宗力譯(1988),「德國行政法在立法、學說與審判實務上之最新發展」,台大法學論叢,第17期2卷。 許宗力譯(1988),「德國行政法在立法、學說與審判實務上之最新發展」,台大法學論叢,第17期2卷。 黃三榮(1998),「個人資料之保護-兼評我國電腦處理個人資料保護法」,資訊法務透析,1998年1月號,p.40。 黃三榮(1998),「個人資料之保護-兼評我國電腦處理個人資料保護法」,資訊法務透析,1998年1月號,p.40。 郭恬如(1998),「虛擬社區顧客輪廓資料、關係行銷及其隱私權議題」,政大企研所碩士論文。 郭恬如(1998),「虛擬社區顧客輪廓資料、關係行銷及其隱私權議題」,政大企研所碩士論文。 詹文凱(1998),「隱私權的研究」,台大法研所博士論文。 詹文凱(1998),「隱私權的研究」,台大法研所博士論文。 葉重新(1999),「心理測驗」,台北:三民書局。 葉重新(1999),「心理測驗」,台北:三民書局。 葉俊榮與許宗力主持(1996):「政府資訊公開制度之研究」,台北:行政院研考會,p.l0。 葉俊榮與許宗力主持(1996):「政府資訊公開制度之研究」,台北:行政院研考會,p.l0。 資策會科技法律中心,「美國全球電子商業綱要與我國因應之道」,http://stlc.iii.org.tw/articles/Netlaw/860927t.htm. 資策會科技法律中心,「美國全球電子商業綱要與我國因應之道」,http://stlc.iii.org.tw/articles/Netlaw/860927t.htm. 廖緯民(1996),「論資訊時代的隱私權保護-以「資訊隱私權」為中心」,資訊法務透析,1996年11月號,p.22。 廖緯民(1996),「論資訊時代的隱私權保護-以「資訊隱私權」為中心」,資訊法務透析,1996年11月號,p.22。 數位週刊 e business weekly,(2000),「台灣500大受歡迎網站」,2000年11月號,p.44-61。 數位週刊 e business weekly,(2000),「台灣500大受歡迎網站」,2000年11月號,p.44-61。 劉靜怡(1997),「資訊科技與隱私權焦慮-誰有權塑造我的網路形象?」,當代雜誌,第124期,p.80。 劉靜怡(1997),「資訊科技與隱私權焦慮-誰有權塑造我的網路形象?」,當代雜誌,第124期,p.80。 劉靜怡(2000),「網際網路時代的資訊使用與隱私權保護規範:個人、政府與市場的拔河」,(2000年網際空間:資訊、法律與社會)研討會,桃園:警大。 劉靜怡(2000),「網際網路時代的資訊使用與隱私權保護規範:個人、政府與市場的拔河」,(2000年網際空間:資訊、法律與社會)研討會,桃園:警大。 顏厥安(2000),「財產、人格、還是資訊?論人類基因的法律地位」,2000基因科技之法律管制體系與社會衝擊研究研討會,台北:台灣大學。 顏厥安(2000),「財產、人格、還是資訊?論人類基因的法律地位」,2000基因科技之法律管制體系與社會衝擊研究研討會,台北:台灣大學。 權平法律資訊網,「網路上資訊隱私權保障問題之研究」,http://www.cyberlawyer.com.tw/alan4-0801.html. 權平法律資訊網,「網路上資訊隱私權保障問題之研究」,http://www.cyberlawyer.com.tw/alan4-0801.html. 英文部分 英文部分 Baker, Stewart (1999), Regulating Technology for Law Enforcement, 4 TEX. REV. L. & POL’Y. 53, 53. Baker, Stewart (1999), Regulating Technology for Law Enforcement, 4 TEX. REV. L. & POL’Y. 53, 53. Banisar, D.(2000), Privacy & Human Rights 2000, http://www.privacyinternational.org/survey/index2000.html. Banisar, D.(2000), Privacy & Human Rights 2000, http://www.privacyinternational.org/survey/index2000.html. Berman, A. S.(2001), Reports of Gates’ Death Greatly E-xaggerated, USA TODAY. Berman, A. S.(2001), Reports of Gates’ Death Greatly E-xaggerated, USA TODAY. Berry, L.L.(1995), Relationship marketing of services-growing interest, emerging perspectivies, Journal of the Academy of Marketing Science, 23(4), 236. Berry, L.L.(1995), Relationship marketing of services-growing interest, emerging perspectivies, Journal of the Academy of Marketing Science, 23(4), 236. Borrus , Amy(2001), The Stage Seems Set for Net Privacy Rules this Year, BUSINESS WEEK, at 51. Borrus , Amy(2001), The Stage Seems Set for Net Privacy Rules this Year, BUSINESS WEEK, at 51. Clark, Drew(2001), Activists Unite To Push For Stronger Privacy Laws, NAT’L J. TECH. DAILY. Clark, Drew(2001), Activists Unite To Push For Stronger Privacy Laws, NAT’L J. TECH. DAILY. Clausing, Jeri(2000),Can Internet Advertisers Police Themselves? Washington Remains Unconvinced, N.Y. TIMES, at C10. Clausing, Jeri(2000),Can Internet Advertisers Police Themselves? Washington Remains Unconvinced, N.Y. TIMES, at C10. Culnan, M.(1999a), Georgetown Internet Privacy Policy Survey:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html. Culnan, M.(1999a), Georgetown Internet Privacy Policy Survey:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html. Culnan, M.(1999b), Privacy and the Top 100 Web Sites:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html. Culnan, M.(1999b), Privacy and the Top 100 Web Sites:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html. Davidson, Paul(2001a), Marketing Gurus Clash on Internet Privacy Rules, USA TODAY, at 2B. Davidson, Paul(2001a), Marketing Gurus Clash on Internet Privacy Rules, USA TODAY, at 2B. Davidson, Paul(2001b), Capitol Hill Support Brews for Internet Privacy Laws, USA TODAY, at 3B. Davidson, Paul(2001b), Capitol Hill Support Brews for Internet Privacy Laws, USA TODAY, at 3B. DuPont, Randall(1998), Relationship marketing:A strategy for consumer-owned utilities in a restructured industry, Management Quarterly 38(4), 12. DuPont, Randall(1998), Relationship marketing:A strategy for consumer-owned utilities in a restructured industry, Management Quarterly 38(4), 12. Ellickson, Robert C. (1991), Order Without Law: How Neighbors Settle Disputes 213–15. Ellickson, Robert C. (1991), Order Without Law: How Neighbors Settle Disputes 213–15. Federal Trade Commission (1998a), Privacy Online: A Report to Congress, http://www.ftc.gov/reports/privacy3/priv-23.htm. Federal Trade Commission (1998a), Privacy Online: A Report to Congress, http://www.ftc.gov/reports/privacy3/priv-23.htm. Federal Trade Commission(1998b), Internet site agrees to settle FTC charges of deceptively collecting personal information in Agency’s first internet privacy case, http://www.ftc.gov/opa/1998/08/geocitie.htm. Federal Trade Commission(1998b), Internet site agrees to settle FTC charges of deceptively collecting personal information in Agency’s first internet privacy case, http://www.ftc.gov/opa/1998/08/geocitie.htm. Federal Trade Commission(1998c), The FTC announced the following actions, http://www.ftc.gov/opa/1999/02/petapp4.99htm. Federal Trade Commission(1998c), The FTC announced the following actions, http://www.ftc.gov/opa/1999/02/petapp4.99htm. Federal Trade Commission (2000a), Privacy Online: Fair Information Practices in the Electronic Marketplace: A Federal Trade Commission Report to Congress, http://www.ftc.gov/reports/#2000. Federal Trade Commission (2000a), Privacy Online: Fair Information Practices in the Electronic Marketplace: A Federal Trade Commission Report to Congress, http://www.ftc.gov/reports/#2000. Federal Trade Commission (2000b), Privacy Online: Fair Information Practices in the Electronic Marketplace, A Federal Trade Commission Report to Congress 10. Federal Trade Commission (2000b), Privacy Online: Fair Information Practices in the Electronic Marketplace, A Federal Trade Commission Report to Congress 10. Federal Trade Commission(2000c), FTC sues failed website, Toysmart.com for deceptively offering for sale personal information of website visitors, http://www.ftc.gov/opa/2000/07/toysmart.htm. Federal Trade Commission(2000c), FTC sues failed website, Toysmart.com for deceptively offering for sale personal information of website visitors, http://www.ftc.gov/opa/2000/07/toysmart.htm. Federal Trade Commission(2000d), FTC v. Toysmart.com, LLC, and Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartcmp.htm. Federal Trade Commission(2000d), FTC v. Toysmart.com, LLC, and Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartcmp.htm. Federal Trade Commission(2000e), Dissenting statement of commissioner Orson Swindle in Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartswindlestatement.htm. Federal Trade Commission(2000e), Dissenting statement of commissioner Orson Swindle in Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartswindlestatement.htm. Flaherty, David H. (1989), Protecting Privacy in Surveillance Societies, 306–08. Flaherty, David H. (1989), Protecting Privacy in Surveillance Societies, 306–08. Gibbons, Llewellyn Joseph (1997), No Regulation or Self-Regulation: Social Enforcement or Social Contracting for Governance in Cyberspace, 6 CORNELL J.L. & PUB. POL’Y 475. Gibbons, Llewellyn Joseph (1997), No Regulation or Self-Regulation: Social Enforcement or Social Contracting for Governance in Cyberspace, 6 CORNELL J.L. & PUB. POL’Y 475. Givens, B.(1997), A Review of State and Federal Privacy Laws, http://www.privacyrights.org/ar/jttaskap.htm. Givens, B.(1997), A Review of State and Federal Privacy Laws, http://www.privacyrights.org/ar/jttaskap.htm. Glancy, Dorothy(2000), At the Intersection of Visible and Invisible Worlds: United States Privacy Law and the Internet, 16 SANTA CLARA COMPUTER & HIGHTECH. L.J. 357, 370. Glancy, Dorothy(2000), At the Intersection of Visible and Invisible Worlds: United States Privacy Law and the Internet, 16 SANTA CLARA COMPUTER & HIGHTECH. L.J. 357, 370. Gonzalez, Jason(2001), Better Business Bureau Gives Nod to Lowe’s, NATIONAL HOME CENTER NEWS, at 7. Gonzalez, Jason(2001), Better Business Bureau Gives Nod to Lowe’s, NATIONAL HOME CENTER NEWS, at 7. Graubert, John & Coleman, Jill(1999), Consumer Protection and Antitrust Enforcement at the Speed of Light: The FTC Meets the Internet, 25 CAN.-U.S. L.J. 275, 290. Graubert, John & Coleman, Jill(1999), Consumer Protection and Antitrust Enforcement at the Speed of Light: The FTC Meets the Internet, 25 CAN.-U.S. L.J. 275, 290. Hafner, Katie(1999),Do You Know Who’s Watching You? Do You Care? , N.Y. TIMES, at G1. Hafner, Katie(1999),Do You Know Who’s Watching You? Do You Care? , N.Y. TIMES, at G1. Hamilton, David P.(2001), The Gadfly: Privacy Cop Richard Smith Is Out to Keep Companies Honest – Whether They Like It Or Not, WALL ST. J., at R10. Hamilton, David P.(2001), The Gadfly: Privacy Cop Richard Smith Is Out to Keep Companies Honest – Whether They Like It Or Not, WALL ST. J., at R10. Hetcher, Steven(2000), The Law and Economics of Intellectual Property Rights:The FTC as Internet Norm Entrepreneur, 53 Vand. L. Rev. 2041. Hetcher, Steven(2000), The Law and Economics of Intellectual Property Rights:The FTC as Internet Norm Entrepreneur, 53 Vand. L. Rev. 2041. Hetcher, Steven(2001a), Changing the Social Meaning of Privacy in Cyberspace, Harvard Journal of Law & Technology Volume 15, Number 1. Hetcher, Steven(2001a), Changing the Social Meaning of Privacy in Cyberspace, Harvard Journal of Law & Technology Volume 15, Number 1. Hetcher, Steven (2001b), Norm Proselytizers Create a Privacy Entitlement in Cyberspace, 16 BERKELEY TECH. L.J. 877. Hetcher, Steven (2001b), Norm Proselytizers Create a Privacy Entitlement in Cyberspace, 16 BERKELEY TECH. L.J. 877. Jacobus, Patricia (2000), Privacy groups call Amazon policy "deceptive", http://news.com.com/2100-1017_3-249376.html. Jacobus, Patricia (2000), Privacy groups call Amazon policy "deceptive", http://news.com.com/2100-1017_3-249376.html. Kalish, David E.(2000), Online Ad Agency Gives Up Plan To Sell Data; DoubleClick Bows to Privacy Advocates, ST. LOUIS POST-DISPATCH, at C6. Kalish, David E.(2000), Online Ad Agency Gives Up Plan To Sell Data; DoubleClick Bows to Privacy Advocates, ST. LOUIS POST-DISPATCH, at C6. Killingsworth, Scott(1999), Minding Your Own Business: Privacy Policies in Principle and in Practice, J. INTERNET L., at 12. Killingsworth, Scott(1999), Minding Your Own Business: Privacy Policies in Principle and in Practice, J. INTERNET L., at 12. Kluger , Jeffrey(2000,), Extortion on the Internet; A daring hacker tries to blackmail an e-tailer — and sparks new worries about credit-card cybertheft, TIME, at 56. Kluger , Jeffrey(2000,), Extortion on the Internet; A daring hacker tries to blackmail an e-tailer — and sparks new worries about credit-card cybertheft, TIME, at 56. Kramer, L.C.(2002), Private Eyes Are Watching You:Consumer Online Privacy Protection-Lessons from Home and Abroad, Texas International Law Journal, 37(2), 387-420. Kramer, L.C.(2002), Private Eyes Are Watching You:Consumer Online Privacy Protection-Lessons from Home and Abroad, Texas International Law Journal, 37(2), 387-420. Lemley, Mark A.(1998), Symposium on the Internet and Legal Theory: The Law and Economics of Internet Norms, 73 CHI.-KENT L. REV. 1257, 1276. Lemley, Mark A.(1998), Symposium on the Internet and Legal Theory: The Law and Economics of Internet Norms, 73 CHI.-KENT L. REV. 1257, 1276. Lesser, Seth R.(2001), Privacy Law in the Internet Era: New Developments and Directions, in SECOND ANNUAL INSTITUTE ON PRIVACY LAW 2001, at 187, 217–18. Lesser, Seth R.(2001), Privacy Law in the Internet Era: New Developments and Directions, in SECOND ANNUAL INSTITUTE ON PRIVACY LAW 2001, at 187, 217–18. Lessig, Lawrence(1999), The Architecture of Privacy, 1 VAND. J. ENT. L. & PRAC. 56, 63. Lessig, Lawrence(1999), The Architecture of Privacy, 1 VAND. J. ENT. L. & PRAC. 56, 63. Litman, Jessica (2000), Information Privacy/Information Property, 52 STAN. L. REV. 1283, 1283–88. Litman, Jessica (2000), Information Privacy/Information Property, 52 STAN. L. REV. 1283, 1283–88. MacMillan , Robert(2000), Congress to Air Public Concerns Over Privacy, NEWSBYTES. MacMillan , Robert(2000), Congress to Air Public Concerns Over Privacy, NEWSBYTES. Online Privacy Alliance, http://www.privacyalliance.org/resources/ppguidelines.shtml. Online Privacy Alliance, http://www.privacyalliance.org/resources/ppguidelines.shtml. Privacy Policy of 1800flowers.com, http://www.1800flowers.com/flowers/ security/index.asp. Privacy Policy of 1800flowers.com, http://www.1800flowers.com/flowers/ security/index.asp. Privacy Policy of barnesandnoble.com, http://www.barnesandnoble.com/help/nc_privacy_policy.asp?userid=2X1GTGUA5H&cds2Pid=946. Privacy Policy of barnesandnoble.com, http://www.barnesandnoble.com/help/nc_privacy_policy.asp?userid=2X1GTGUA5H&cds2Pid=946. Privacy Policy of disney.go.com, http://disney.go.com/corporate/legal/wdig_privacy.html. Privacy Policy of disney.go.com, http://disney.go.com/corporate/legal/wdig_privacy.html. Privacy Policy of hallmark.com, http://www.hallmark.com/Website/hallmark_home.html. Privacy Policy of hallmark.com, http://www.hallmark.com/Website/hallmark_home.html. Privacy Policy of jcrew.com, http://jcrew.com/help.sniplets/privacynew.jhtml. Privacy Policy of jcrew.com, http://jcrew.com/help.sniplets/privacynew.jhtml. Privacy Policy of kinkos.com, http://www.kinkos.com/global_assets/docs/privacy.php. Privacy Policy of kinkos.com, http://www.kinkos.com/global_assets/docs/privacy.php. Privacy Policy of madonnafanclub.com, http://www.madonnafanclub.com/ privacy.html. Privacy Policy of madonnafanclub.com, http://www.madonnafanclub.com/ privacy.html. Privacy Policy of microsoft.com, http://www.microsoft.com/info/privacy.mspx. Privacy Policy of microsoft.com, http://www.microsoft.com/info/privacy.mspx. Privacy Policy of motorola.com, http://www.motorola.com/content/0,,3,00.html. Privacy Policy of motorola.com, http://www.motorola.com/content/0,,3,00.html. Privacy Policy of niketown.nike.com, http://niketown.nike.com/info/privacy.jhtml. Privacy Policy of niketown.nike.com, http://niketown.nike.com/info/privacy.jhtml. Privacy Policy of nokia.com, http://www.nokia.com/nokia/0,1522,,00.html?orig=/privacy.html. Privacy Policy of nokia.com, http://www.nokia.com/nokia/0,1522,,00.html?orig=/privacy.html. Privacy Policy of sears.com, http://www.sears.com/sr/framework/home.jsp?BV_UseBVCookie=Yes&vertical=SEARS&targetPage=%2Fmisc%2Fsears%2Fpolicy%2Fprivacy.jsp. Privacy Policy of sears.com, http://www.sears.com/sr/framework/home.jsp?BV_UseBVCookie=Yes&vertical=SEARS&targetPage=%2Fmisc%2Fsears%2Fpolicy%2Fprivacy.jsp. Privacy Policy of sun.com, http://www.sun.com/privacy/. Privacy Policy of sun.com, http://www.sun.com/privacy/. Privacy Policy of toyota.com, http://www.toyota.com/html/privacy/index.html. Privacy Policy of toyota.com, http://www.toyota.com/html/privacy/index.html. Privacy Policy of walmart.com, http://www.walmart.com/catalog/catalog.gsp?cat=120621&path=0:5436:120160:119833:120621. Privacy Policy of walmart.com, http://www.walmart.com/catalog/catalog.gsp?cat=120621&path=0:5436:120160:119833:120621. Privacy Policy of weather.com, http://www.weather.com/common/home/privacy.html?from=footer. Privacy Policy of weather.com, http://www.weather.com/common/home/privacy.html?from=footer. Rohlmeier, Jeff & Yue, William, THE SAFE HARBOR PRIVACY FRAMEWORK, U.S. Department of Commerce, http://www.ita.doc.gov/exportamerica/NewOpportunities/NO_safeharbor.htm. Rohlmeier, Jeff & Yue, William, THE SAFE HARBOR PRIVACY FRAMEWORK, U.S. Department of Commerce, http://www.ita.doc.gov/exportamerica/NewOpportunities/NO_safeharbor.htm. Roston, Eric(2001), How to Opt Out of Database Sharing; Who’s Got Your Number? TIME, at 46. Roston, Eric(2001), How to Opt Out of Database Sharing; Who’s Got Your Number? TIME, at 46. Safire, William(2000), Stalking the Internet, N.Y. TIMES, at A15. Safire, William(2000), Stalking the Internet, N.Y. TIMES, at A15. Sandberg , Jared(1999),Losing Your Good Name Online, NEWSWEEK, at 56. Sandberg , Jared(1999),Losing Your Good Name Online, NEWSWEEK, at 56. Simpson, Glenn R.(2000), E-Commerce Firms Start to Rethink Opposition to Privacy Regulation as Abuses, Anger Rise, WALL ST. J., at A24. Simpson, Glenn R.(2000), E-Commerce Firms Start to Rethink Opposition to Privacy Regulation as Abuses, Anger Rise, WALL ST. J., at A24. Stimson, Dan(1999), Internet Security an Issue for Telemedicine Success, ALBUQUERQUE TRIB., at A6. Stimson, Dan(1999), Internet Security an Issue for Telemedicine Success, ALBUQUERQUE TRIB., at A6. Tan, Domingo R.(1999), Personal Privacy in the Information Age: Comparison of Internet Data Protection Regulations in the United States and the European Union, 21 LOY. L.A. INT’L & COMP. L.J. 661, 664-65. Tan, Domingo R.(1999), Personal Privacy in the Information Age: Comparison of Internet Data Protection Regulations in the United States and the European Union, 21 LOY. L.A. INT’L & COMP. L.J. 661, 664-65. TRUSTe, http://www.truste.org/consumers/users_faqs.html. TRUSTe, http://www.truste.org/consumers/users_faqs.html. Weiss, Todd R.(2001), Bush Faces His First Privacy Challenge: Proposals from Industry, Advocates Differ, COMPUTERWORLD, at Williams, Fred O.(2000), Area Man Wins Cybercash, BUFFALO NEWS, at C1. Weiss, Todd R.(2001), Bush Faces His First Privacy Challenge: Proposals from Industry, Advocates Differ, COMPUTERWORLD, at Williams, Fred O.(2000), Area Man Wins Cybercash, BUFFALO NEWS, at C1. |
Description: | 碩士 國立政治大學 資訊管理研究所 91356032 92 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0091356032 http://thesis.lib.nccu.edu.tw/record/#G0091356032 |
Data Type: | thesis thesis |
Appears in Collections: | [資訊管理學系] 學位論文
|
Files in This Item:
File |
Size | Format | |
index.html | 0Kb | HTML2 | 243 | View/Open |
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|