政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/31073
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 113318/144297 (79%)
造访人次 : 50986091      在线人数 : 896
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/31073


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/31073


    题名: 網站隱私權政策分析-以台灣網站為例
    網站隱私權政策分析-以台灣網站為例
    作者: 李俊磊
    Li , Chun-Lei
    贡献者: 湯宗益
    李俊磊
    Li , Chun-Lei
    关键词: 網站
    網站
    個人資訊
    個人資訊
    公平資訊實施
    公平資訊實施
    隱私權政策
    隱私權政策
    Website
    Website
    Personal Information
    Personal Information
    Fair Information Practice
    Fair Information Practice
    Privacy Policy
    Privacy Policy
    日期: 2003
    上传时间: 2009-09-14 09:12:14 (UTC+8)
    摘要: 個人資料的資料流(Data Flows)在網路上的擴散,造成對個人隱私權的威脅,逐漸已經成為社會大眾所關注的議題。在過去幾年中,網站逐漸被要求制定相關的規範以符合大眾的期待。然而,隨著網際網路環境的快速變遷,網站的規範是否提供適當的個人隱私權保護,將會成為社會大眾持續討論的問題。
    部分的網站已經滿足隱私權到某種程度。這些網站開始採用一些普遍性的實作。在某些程度上,這些實作依循由隱私權規範創立者所推動的公平資訊實施原則(Fair Information Practice Principle)(FTC,1998a)。
    本研究根據文獻探討提及的公平資訊實施原則:告知(notice)、選擇(choice)、存取(access)、與安全(security),對個人使用者感興趣的台灣地區網站進行網站隱私權政策分析與調查研究,探討其對個人隱私揭露的程度。
    研究結果指出,樣本中84.1%的網站收集至少一種形式的個人識別資訊(例如:姓名,e-mail address,郵政地址),72.3%收集至少一種形式的人口統計學資訊(例如:性別,喜好,郵遞區號),71.8%的網站兩者接收集,而15.4%的網站兩者皆不收集。隱私揭露方面,67.7%(390個樣本中的264個)刊載至少一種形式的隱私揭露(一個隱私權政策的告示或是一個資訊實施聲明),50.5%這兩種形式的隱私揭露都刊載,有32.3%個網站這兩種形式的隱私揭露皆不刊載。觀察隱私揭露反映公平資訊實施的程度,在264個有收集個人資訊與刊載隱私揭露的網站中,92.8%包含至少一種關於(告知)的調查項目,70.8%包含至少一種關於(選擇)的調查項目,80.7%包含至少一種關於(存取)的調查項目,43.9%包含至少一種關於(安全)的調查項目,以及26.9%包含關於(聯絡資訊)的調查項目。
    在本研究中,看待這些網站樣本所得出的結果,應特別注意那些較不滿足公平資訊實施原則的部分,包括對Cookies使用的告知、告知關於外界第三者的相關資訊、選擇、安全以及聯絡資訊等部份所表現出來的結果,而實際上所有台灣網站所表現出的結果,很可能比本研究所得出的結果來得更為不理想,網站若要更能滿足使用者對隱私權保護的期待,就必須更正視這些部份的隱私揭露保護。
    資料的收集與使用對網路環境的發展影響甚鉅,網站營運者在思考如何使資料的利用最大化時,必須兼顧使用者的隱私權。唯有在合理,相互尊重的架構下,才能替彼此創造出長遠的利益。本研究的結果希望能對台灣在檢討、發展、建立符合台灣環境及與世界接軌的網路隱私權保護環境上,作出些許的貢獻。
    The spreading of personal data flows over the Internet has threatened many online individuals’ privacy, which also becomes a noticeable topic among the society. For the past few years, there were norms applied to websites in order to protect online users’ privacy. However, could norms provide proper protections along with the rapid improvement of Internet technology? This topic will remain among society’s discussion.
    Some websites provide certain amount of protections by using popular practices. On a certain level, these practices follow the Fair Information Practice Principle that was supported by the Privacy Norm Entrepreneurs (FTC, 1998).
    This research is based on the four main elements of Fair Information Practice Principle: Notice, Choice, Access, and Security. The thesis concentrates on analyzing and researching the privacy policy about privacy disclosure provided by websites that were directed and interested to individual user within Taiwan.
    Based on the result of this research, 84.1% of the sampled websites collected at least one type of personal identifying information (e.g. name, e-mail address, postal address). 72.3% of the sampled websites collected at least one type of demographic information (e.g. gender, preferences, Zip code). 71.8% of the websites collected both types of personal information, and 15.4% collected neither type of personal information. As for privacy disclosure, 67.7% of the websites (264 out of 390 sampled websites) provided at least one type of privacy disclosures (a privacy policy notice or an information practice statement). 50.5% of the websites provided both types of disclosures; and 32.3% of the websites provided none of the above. By studying the researched websites along with the Fair Information Practice Principle, Of the 264 websites that collected personal information and posted a privacy disclosure, 92.8% included at least one survey item for notice, 70.8% contained at least one survey item for choice, 80.7% contained at least one survey item for access, 43.9% contained at least one survey item for security, and 26.9% contained at least one survey item for contact information.
    While studying the research result, it is important to concentrate on the websites that did not follow the Fair Information Practice Principle. The result includes websites’ notice of Cookies usage, and providing third party related information, choice, security, and contact information, etc. However, the result in reality could be a lot worse than the research result. In order to fulfill online users’ anticipation, websites should pay more attention on privacy policy of these parts.
    Colleting and using users’data influence the development of online environment greatly. Web owners should consider their customers’ privacy rights while trying to capitalize customers’ information. The only way to generate long and stable benefit for both provider and user is with respect. Hopefully the result of this research will contribute some amount of consideration and development of privacy protection that works for websites and users in Taiwan.
    參考文獻: 中文部分
    中文部分
    王郁琦(1996),「網路上的隱私權問題」,資訊法務透析,1996年10月號。
    王郁琦(1996),「網路上的隱私權問題」,資訊法務透析,1996年10月號。
    尤英夫(1997),「新聞媒體與隱私權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。
    尤英夫(1997),「新聞媒體與隱私權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。
    朱柏松(1989),「隱私權概念的衍變及其損害防止立法之動向」,法學叢刊,第134期。
    朱柏松(1989),「隱私權概念的衍變及其損害防止立法之動向」,法學叢刊,第134期。
    李震山(1997),「論資訊自決權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。
    李震山(1997),「論資訊自決權」,現代國家與憲法一李鴻禧教授六伕華誕祝壽論文集,台北:月旦。
    呂雅雯(2000),「探討通訊隱私範圍之變遷-以美國、德國和台灣法規為例」,中正電傳所碩士論文。
    呂雅雯(2000),「探討通訊隱私範圍之變遷-以美國、德國和台灣法規為例」,中正電傳所碩士論文。
    林建中(1999),「隱私權概念的再思考一關於概念範圍、定義及權利形成方法」,台大法研所碩士論文。
    林建中(1999),「隱私權概念的再思考一關於概念範圍、定義及權利形成方法」,台大法研所碩士論文。
    林育廷(2000),「行政動態-美國提出規則P草案保護消費者金融資訊隱私權」,科技法律透析,2000年4月,pp.22-23。
    林育廷(2000),「行政動態-美國提出規則P草案保護消費者金融資訊隱私權」,科技法律透析,2000年4月,pp.22-23。
    邱建動(2000),「從電子商務的面向探討網路資訊隱私權」,2000網路與社會研討會,新竹:清大社會所。
    邱建動(2000),「從電子商務的面向探討網路資訊隱私權」,2000網路與社會研討會,新竹:清大社會所。
    邱建勳(2001),「電子商務環境中「個人資料財產權」之探討─以著作權為主」,國立中正大學電訊傳播研究所碩士論文。
    邱建勳(2001),「電子商務環境中「個人資料財產權」之探討─以著作權為主」,國立中正大學電訊傳播研究所碩士論文。
    邱顯貴(2002),「電子商務網站信任管理之研究」,政大資管所博士論文。
    邱顯貴(2002),「電子商務網站信任管理之研究」,政大資管所博士論文。
    洪榮彬(1993),「資訊時代之資料處理與資料保護-以德國聯邦個人資料保護法為中心」,輔大法研所碩士論文。
    洪榮彬(1993),「資訊時代之資料處理與資料保護-以德國聯邦個人資料保護法為中心」,輔大法研所碩士論文。
    洪順慶(1998),「淺談關係行銷」,http://www.ba.nccu.edu.tw/schoolfellow/1998/199812-3.htm.
    洪順慶(1998),「淺談關係行銷」,http://www.ba.nccu.edu.tw/schoolfellow/1998/199812-3.htm.
    許宗力譯(1988),「德國行政法在立法、學說與審判實務上之最新發展」,台大法學論叢,第17期2卷。
    許宗力譯(1988),「德國行政法在立法、學說與審判實務上之最新發展」,台大法學論叢,第17期2卷。
    黃三榮(1998),「個人資料之保護-兼評我國電腦處理個人資料保護法」,資訊法務透析,1998年1月號,p.40。
    黃三榮(1998),「個人資料之保護-兼評我國電腦處理個人資料保護法」,資訊法務透析,1998年1月號,p.40。
    郭恬如(1998),「虛擬社區顧客輪廓資料、關係行銷及其隱私權議題」,政大企研所碩士論文。
    郭恬如(1998),「虛擬社區顧客輪廓資料、關係行銷及其隱私權議題」,政大企研所碩士論文。
    詹文凱(1998),「隱私權的研究」,台大法研所博士論文。
    詹文凱(1998),「隱私權的研究」,台大法研所博士論文。
    葉重新(1999),「心理測驗」,台北:三民書局。
    葉重新(1999),「心理測驗」,台北:三民書局。
    葉俊榮與許宗力主持(1996):「政府資訊公開制度之研究」,台北:行政院研考會,p.l0。
    葉俊榮與許宗力主持(1996):「政府資訊公開制度之研究」,台北:行政院研考會,p.l0。
    資策會科技法律中心,「美國全球電子商業綱要與我國因應之道」,http://stlc.iii.org.tw/articles/Netlaw/860927t.htm.
    資策會科技法律中心,「美國全球電子商業綱要與我國因應之道」,http://stlc.iii.org.tw/articles/Netlaw/860927t.htm.
    廖緯民(1996),「論資訊時代的隱私權保護-以「資訊隱私權」為中心」,資訊法務透析,1996年11月號,p.22。
    廖緯民(1996),「論資訊時代的隱私權保護-以「資訊隱私權」為中心」,資訊法務透析,1996年11月號,p.22。
    數位週刊 e business weekly,(2000),「台灣500大受歡迎網站」,2000年11月號,p.44-61。
    數位週刊 e business weekly,(2000),「台灣500大受歡迎網站」,2000年11月號,p.44-61。
    劉靜怡(1997),「資訊科技與隱私權焦慮-誰有權塑造我的網路形象?」,當代雜誌,第124期,p.80。
    劉靜怡(1997),「資訊科技與隱私權焦慮-誰有權塑造我的網路形象?」,當代雜誌,第124期,p.80。
    劉靜怡(2000),「網際網路時代的資訊使用與隱私權保護規範:個人、政府與市場的拔河」,(2000年網際空間:資訊、法律與社會)研討會,桃園:警大。
    劉靜怡(2000),「網際網路時代的資訊使用與隱私權保護規範:個人、政府與市場的拔河」,(2000年網際空間:資訊、法律與社會)研討會,桃園:警大。
    顏厥安(2000),「財產、人格、還是資訊?論人類基因的法律地位」,2000基因科技之法律管制體系與社會衝擊研究研討會,台北:台灣大學。
    顏厥安(2000),「財產、人格、還是資訊?論人類基因的法律地位」,2000基因科技之法律管制體系與社會衝擊研究研討會,台北:台灣大學。
    權平法律資訊網,「網路上資訊隱私權保障問題之研究」,http://www.cyberlawyer.com.tw/alan4-0801.html.
    權平法律資訊網,「網路上資訊隱私權保障問題之研究」,http://www.cyberlawyer.com.tw/alan4-0801.html.
    英文部分
    英文部分
    Baker, Stewart (1999), Regulating Technology for Law Enforcement, 4 TEX. REV. L. & POL’Y. 53, 53.
    Baker, Stewart (1999), Regulating Technology for Law Enforcement, 4 TEX. REV. L. & POL’Y. 53, 53.
    Banisar, D.(2000), Privacy & Human Rights 2000, http://www.privacyinternational.org/survey/index2000.html.
    Banisar, D.(2000), Privacy & Human Rights 2000, http://www.privacyinternational.org/survey/index2000.html.
    Berman, A. S.(2001), Reports of Gates’ Death Greatly E-xaggerated, USA TODAY.
    Berman, A. S.(2001), Reports of Gates’ Death Greatly E-xaggerated, USA TODAY.
    Berry, L.L.(1995), Relationship marketing of services-growing interest, emerging perspectivies, Journal of the Academy of Marketing Science, 23(4), 236.
    Berry, L.L.(1995), Relationship marketing of services-growing interest, emerging perspectivies, Journal of the Academy of Marketing Science, 23(4), 236.
    Borrus , Amy(2001), The Stage Seems Set for Net Privacy Rules this Year, BUSINESS WEEK, at 51.
    Borrus , Amy(2001), The Stage Seems Set for Net Privacy Rules this Year, BUSINESS WEEK, at 51.
    Clark, Drew(2001), Activists Unite To Push For Stronger Privacy Laws, NAT’L J. TECH. DAILY.
    Clark, Drew(2001), Activists Unite To Push For Stronger Privacy Laws, NAT’L J. TECH. DAILY.
    Clausing, Jeri(2000),Can Internet Advertisers Police Themselves? Washington Remains Unconvinced, N.Y. TIMES, at C10.
    Clausing, Jeri(2000),Can Internet Advertisers Police Themselves? Washington Remains Unconvinced, N.Y. TIMES, at C10.
    Culnan, M.(1999a), Georgetown Internet Privacy Policy Survey:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html.
    Culnan, M.(1999a), Georgetown Internet Privacy Policy Survey:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html.
    Culnan, M.(1999b), Privacy and the Top 100 Web Sites:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html.
    Culnan, M.(1999b), Privacy and the Top 100 Web Sites:Report to the Federal Trade Commission, http://www.msb.edu/faculty/culnanm/gippshome.html.
    Davidson, Paul(2001a), Marketing Gurus Clash on Internet Privacy Rules, USA TODAY, at 2B.
    Davidson, Paul(2001a), Marketing Gurus Clash on Internet Privacy Rules, USA TODAY, at 2B.
    Davidson, Paul(2001b), Capitol Hill Support Brews for Internet Privacy Laws, USA TODAY, at 3B.
    Davidson, Paul(2001b), Capitol Hill Support Brews for Internet Privacy Laws, USA TODAY, at 3B.
    DuPont, Randall(1998), Relationship marketing:A strategy for consumer-owned utilities in a restructured industry, Management Quarterly 38(4), 12.
    DuPont, Randall(1998), Relationship marketing:A strategy for consumer-owned utilities in a restructured industry, Management Quarterly 38(4), 12.
    Ellickson, Robert C. (1991), Order Without Law: How Neighbors Settle Disputes 213–15.
    Ellickson, Robert C. (1991), Order Without Law: How Neighbors Settle Disputes 213–15.
    Federal Trade Commission (1998a), Privacy Online: A Report to Congress, http://www.ftc.gov/reports/privacy3/priv-23.htm.
    Federal Trade Commission (1998a), Privacy Online: A Report to Congress, http://www.ftc.gov/reports/privacy3/priv-23.htm.
    Federal Trade Commission(1998b), Internet site agrees to settle FTC charges of deceptively collecting personal information in Agency’s first internet privacy case, http://www.ftc.gov/opa/1998/08/geocitie.htm.
    Federal Trade Commission(1998b), Internet site agrees to settle FTC charges of deceptively collecting personal information in Agency’s first internet privacy case, http://www.ftc.gov/opa/1998/08/geocitie.htm.
    Federal Trade Commission(1998c), The FTC announced the following actions, http://www.ftc.gov/opa/1999/02/petapp4.99htm.
    Federal Trade Commission(1998c), The FTC announced the following actions, http://www.ftc.gov/opa/1999/02/petapp4.99htm.
    Federal Trade Commission (2000a), Privacy Online: Fair Information Practices in the Electronic Marketplace: A Federal Trade Commission Report to Congress, http://www.ftc.gov/reports/#2000.
    Federal Trade Commission (2000a), Privacy Online: Fair Information Practices in the Electronic Marketplace: A Federal Trade Commission Report to Congress, http://www.ftc.gov/reports/#2000.
    Federal Trade Commission (2000b), Privacy Online: Fair Information Practices in the Electronic Marketplace, A Federal Trade Commission Report to Congress 10.
    Federal Trade Commission (2000b), Privacy Online: Fair Information Practices in the Electronic Marketplace, A Federal Trade Commission Report to Congress 10.
    Federal Trade Commission(2000c), FTC sues failed website, Toysmart.com for deceptively offering for sale personal information of website visitors, http://www.ftc.gov/opa/2000/07/toysmart.htm.
    Federal Trade Commission(2000c), FTC sues failed website, Toysmart.com for deceptively offering for sale personal information of website visitors, http://www.ftc.gov/opa/2000/07/toysmart.htm.
    Federal Trade Commission(2000d), FTC v. Toysmart.com, LLC, and Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartcmp.htm.
    Federal Trade Commission(2000d), FTC v. Toysmart.com, LLC, and Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartcmp.htm.
    Federal Trade Commission(2000e), Dissenting statement of commissioner Orson Swindle in Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartswindlestatement.htm.
    Federal Trade Commission(2000e), Dissenting statement of commissioner Orson Swindle in Toysmart.com, Inc., http://www.ftc.gov/os/2000/07/toysmartswindlestatement.htm.
    Flaherty, David H. (1989), Protecting Privacy in Surveillance Societies, 306–08.
    Flaherty, David H. (1989), Protecting Privacy in Surveillance Societies, 306–08.
    Gibbons, Llewellyn Joseph (1997), No Regulation or Self-Regulation: Social Enforcement or Social Contracting for Governance in Cyberspace, 6 CORNELL J.L. & PUB. POL’Y 475.
    Gibbons, Llewellyn Joseph (1997), No Regulation or Self-Regulation: Social Enforcement or Social Contracting for Governance in Cyberspace, 6 CORNELL J.L. & PUB. POL’Y 475.
    Givens, B.(1997), A Review of State and Federal Privacy Laws, http://www.privacyrights.org/ar/jttaskap.htm.
    Givens, B.(1997), A Review of State and Federal Privacy Laws, http://www.privacyrights.org/ar/jttaskap.htm.
    Glancy, Dorothy(2000), At the Intersection of Visible and Invisible Worlds: United States Privacy Law and the Internet, 16 SANTA CLARA COMPUTER & HIGHTECH. L.J. 357, 370.
    Glancy, Dorothy(2000), At the Intersection of Visible and Invisible Worlds: United States Privacy Law and the Internet, 16 SANTA CLARA COMPUTER & HIGHTECH. L.J. 357, 370.
    Gonzalez, Jason(2001), Better Business Bureau Gives Nod to Lowe’s, NATIONAL HOME CENTER NEWS, at 7.
    Gonzalez, Jason(2001), Better Business Bureau Gives Nod to Lowe’s, NATIONAL HOME CENTER NEWS, at 7.
    Graubert, John & Coleman, Jill(1999), Consumer Protection and Antitrust Enforcement at the Speed of Light: The FTC Meets the Internet, 25 CAN.-U.S. L.J. 275, 290.
    Graubert, John & Coleman, Jill(1999), Consumer Protection and Antitrust Enforcement at the Speed of Light: The FTC Meets the Internet, 25 CAN.-U.S. L.J. 275, 290.
    Hafner, Katie(1999),Do You Know Who’s Watching You? Do You Care? , N.Y. TIMES, at G1.
    Hafner, Katie(1999),Do You Know Who’s Watching You? Do You Care? , N.Y. TIMES, at G1.
    Hamilton, David P.(2001), The Gadfly: Privacy Cop Richard Smith Is Out to Keep Companies Honest – Whether They Like It Or Not, WALL ST. J., at R10.
    Hamilton, David P.(2001), The Gadfly: Privacy Cop Richard Smith Is Out to Keep Companies Honest – Whether They Like It Or Not, WALL ST. J., at R10.
    Hetcher, Steven(2000), The Law and Economics of Intellectual Property Rights:The FTC as Internet Norm Entrepreneur, 53 Vand. L. Rev. 2041.
    Hetcher, Steven(2000), The Law and Economics of Intellectual Property Rights:The FTC as Internet Norm Entrepreneur, 53 Vand. L. Rev. 2041.
    Hetcher, Steven(2001a), Changing the Social Meaning of Privacy in Cyberspace, Harvard Journal of Law & Technology Volume 15, Number 1.
    Hetcher, Steven(2001a), Changing the Social Meaning of Privacy in Cyberspace, Harvard Journal of Law & Technology Volume 15, Number 1.
    Hetcher, Steven (2001b), Norm Proselytizers Create a Privacy Entitlement in Cyberspace, 16 BERKELEY TECH. L.J. 877.
    Hetcher, Steven (2001b), Norm Proselytizers Create a Privacy Entitlement in Cyberspace, 16 BERKELEY TECH. L.J. 877.
    Jacobus, Patricia (2000), Privacy groups call Amazon policy "deceptive", http://news.com.com/2100-1017_3-249376.html.
    Jacobus, Patricia (2000), Privacy groups call Amazon policy "deceptive", http://news.com.com/2100-1017_3-249376.html.
    Kalish, David E.(2000), Online Ad Agency Gives Up Plan To Sell Data; DoubleClick Bows to Privacy Advocates, ST. LOUIS POST-DISPATCH, at C6.
    Kalish, David E.(2000), Online Ad Agency Gives Up Plan To Sell Data; DoubleClick Bows to Privacy Advocates, ST. LOUIS POST-DISPATCH, at C6.
    Killingsworth, Scott(1999), Minding Your Own Business: Privacy Policies in Principle and in Practice, J. INTERNET L., at 12.
    Killingsworth, Scott(1999), Minding Your Own Business: Privacy Policies in Principle and in Practice, J. INTERNET L., at 12.
    Kluger , Jeffrey(2000,), Extortion on the Internet; A daring hacker tries to blackmail an e-tailer — and sparks new worries about credit-card cybertheft, TIME, at 56.
    Kluger , Jeffrey(2000,), Extortion on the Internet; A daring hacker tries to blackmail an e-tailer — and sparks new worries about credit-card cybertheft, TIME, at 56.
    Kramer, L.C.(2002), Private Eyes Are Watching You:Consumer Online Privacy Protection-Lessons from Home and Abroad, Texas International Law Journal, 37(2), 387-420.
    Kramer, L.C.(2002), Private Eyes Are Watching You:Consumer Online Privacy Protection-Lessons from Home and Abroad, Texas International Law Journal, 37(2), 387-420.
    Lemley, Mark A.(1998), Symposium on the Internet and Legal Theory: The Law and Economics of Internet Norms, 73 CHI.-KENT L. REV. 1257, 1276.
    Lemley, Mark A.(1998), Symposium on the Internet and Legal Theory: The Law and Economics of Internet Norms, 73 CHI.-KENT L. REV. 1257, 1276.
    Lesser, Seth R.(2001), Privacy Law in the Internet Era: New Developments and Directions, in SECOND ANNUAL INSTITUTE ON PRIVACY LAW 2001, at 187, 217–18.
    Lesser, Seth R.(2001), Privacy Law in the Internet Era: New Developments and Directions, in SECOND ANNUAL INSTITUTE ON PRIVACY LAW 2001, at 187, 217–18.
    Lessig, Lawrence(1999), The Architecture of Privacy, 1 VAND. J. ENT. L. & PRAC. 56, 63.
    Lessig, Lawrence(1999), The Architecture of Privacy, 1 VAND. J. ENT. L. & PRAC. 56, 63.
    Litman, Jessica (2000), Information Privacy/Information Property, 52 STAN. L. REV. 1283, 1283–88.
    Litman, Jessica (2000), Information Privacy/Information Property, 52 STAN. L. REV. 1283, 1283–88.
    MacMillan , Robert(2000), Congress to Air Public Concerns Over Privacy, NEWSBYTES.
    MacMillan , Robert(2000), Congress to Air Public Concerns Over Privacy, NEWSBYTES.
    Online Privacy Alliance, http://www.privacyalliance.org/resources/ppguidelines.shtml.
    Online Privacy Alliance, http://www.privacyalliance.org/resources/ppguidelines.shtml.
    Privacy Policy of 1800flowers.com, http://www.1800flowers.com/flowers/ security/index.asp.
    Privacy Policy of 1800flowers.com, http://www.1800flowers.com/flowers/ security/index.asp.
    Privacy Policy of barnesandnoble.com, http://www.barnesandnoble.com/help/nc_privacy_policy.asp?userid=2X1GTGUA5H&cds2Pid=946.
    Privacy Policy of barnesandnoble.com, http://www.barnesandnoble.com/help/nc_privacy_policy.asp?userid=2X1GTGUA5H&cds2Pid=946.
    Privacy Policy of disney.go.com, http://disney.go.com/corporate/legal/wdig_privacy.html.
    Privacy Policy of disney.go.com, http://disney.go.com/corporate/legal/wdig_privacy.html.
    Privacy Policy of hallmark.com, http://www.hallmark.com/Website/hallmark_home.html.
    Privacy Policy of hallmark.com, http://www.hallmark.com/Website/hallmark_home.html.
    Privacy Policy of jcrew.com, http://jcrew.com/help.sniplets/privacynew.jhtml.
    Privacy Policy of jcrew.com, http://jcrew.com/help.sniplets/privacynew.jhtml.
    Privacy Policy of kinkos.com, http://www.kinkos.com/global_assets/docs/privacy.php.
    Privacy Policy of kinkos.com, http://www.kinkos.com/global_assets/docs/privacy.php.
    Privacy Policy of madonnafanclub.com, http://www.madonnafanclub.com/ privacy.html.
    Privacy Policy of madonnafanclub.com, http://www.madonnafanclub.com/ privacy.html.
    Privacy Policy of microsoft.com, http://www.microsoft.com/info/privacy.mspx.
    Privacy Policy of microsoft.com, http://www.microsoft.com/info/privacy.mspx.
    Privacy Policy of motorola.com, http://www.motorola.com/content/0,,3,00.html.
    Privacy Policy of motorola.com, http://www.motorola.com/content/0,,3,00.html.
    Privacy Policy of niketown.nike.com, http://niketown.nike.com/info/privacy.jhtml.
    Privacy Policy of niketown.nike.com, http://niketown.nike.com/info/privacy.jhtml.
    Privacy Policy of nokia.com, http://www.nokia.com/nokia/0,1522,,00.html?orig=/privacy.html.
    Privacy Policy of nokia.com, http://www.nokia.com/nokia/0,1522,,00.html?orig=/privacy.html.
    Privacy Policy of sears.com, http://www.sears.com/sr/framework/home.jsp?BV_UseBVCookie=Yes&vertical=SEARS&targetPage=%2Fmisc%2Fsears%2Fpolicy%2Fprivacy.jsp.
    Privacy Policy of sears.com, http://www.sears.com/sr/framework/home.jsp?BV_UseBVCookie=Yes&vertical=SEARS&targetPage=%2Fmisc%2Fsears%2Fpolicy%2Fprivacy.jsp.
    Privacy Policy of sun.com, http://www.sun.com/privacy/.
    Privacy Policy of sun.com, http://www.sun.com/privacy/.
    Privacy Policy of toyota.com, http://www.toyota.com/html/privacy/index.html.
    Privacy Policy of toyota.com, http://www.toyota.com/html/privacy/index.html.
    Privacy Policy of walmart.com, http://www.walmart.com/catalog/catalog.gsp?cat=120621&path=0:5436:120160:119833:120621.
    Privacy Policy of walmart.com, http://www.walmart.com/catalog/catalog.gsp?cat=120621&path=0:5436:120160:119833:120621.
    Privacy Policy of weather.com, http://www.weather.com/common/home/privacy.html?from=footer.
    Privacy Policy of weather.com, http://www.weather.com/common/home/privacy.html?from=footer.
    Rohlmeier, Jeff & Yue, William, THE SAFE HARBOR PRIVACY FRAMEWORK, U.S. Department of Commerce, http://www.ita.doc.gov/exportamerica/NewOpportunities/NO_safeharbor.htm.
    Rohlmeier, Jeff & Yue, William, THE SAFE HARBOR PRIVACY FRAMEWORK, U.S. Department of Commerce, http://www.ita.doc.gov/exportamerica/NewOpportunities/NO_safeharbor.htm.
    Roston, Eric(2001), How to Opt Out of Database Sharing; Who’s Got Your Number? TIME, at 46.
    Roston, Eric(2001), How to Opt Out of Database Sharing; Who’s Got Your Number? TIME, at 46.
    Safire, William(2000), Stalking the Internet, N.Y. TIMES, at A15.
    Safire, William(2000), Stalking the Internet, N.Y. TIMES, at A15.
    Sandberg , Jared(1999),Losing Your Good Name Online, NEWSWEEK, at 56.
    Sandberg , Jared(1999),Losing Your Good Name Online, NEWSWEEK, at 56.
    Simpson, Glenn R.(2000), E-Commerce Firms Start to Rethink Opposition to Privacy Regulation as Abuses, Anger Rise, WALL ST. J., at A24.
    Simpson, Glenn R.(2000), E-Commerce Firms Start to Rethink Opposition to Privacy Regulation as Abuses, Anger Rise, WALL ST. J., at A24.
    Stimson, Dan(1999), Internet Security an Issue for Telemedicine Success, ALBUQUERQUE TRIB., at A6.
    Stimson, Dan(1999), Internet Security an Issue for Telemedicine Success, ALBUQUERQUE TRIB., at A6.
    Tan, Domingo R.(1999), Personal Privacy in the Information Age: Comparison of Internet Data Protection Regulations in the United States and the European Union, 21 LOY. L.A. INT’L & COMP. L.J. 661, 664-65.
    Tan, Domingo R.(1999), Personal Privacy in the Information Age: Comparison of Internet Data Protection Regulations in the United States and the European Union, 21 LOY. L.A. INT’L & COMP. L.J. 661, 664-65.
    TRUSTe, http://www.truste.org/consumers/users_faqs.html.
    TRUSTe, http://www.truste.org/consumers/users_faqs.html.
    Weiss, Todd R.(2001), Bush Faces His First Privacy Challenge: Proposals from Industry, Advocates Differ, COMPUTERWORLD, at Williams, Fred O.(2000), Area Man Wins Cybercash, BUFFALO NEWS, at C1.
    Weiss, Todd R.(2001), Bush Faces His First Privacy Challenge: Proposals from Industry, Advocates Differ, COMPUTERWORLD, at Williams, Fred O.(2000), Area Man Wins Cybercash, BUFFALO NEWS, at C1.
    描述: 碩士
    國立政治大學
    資訊管理研究所
    91356032
    92
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0091356032
    http://thesis.lib.nccu.edu.tw/record/#G0091356032
    数据类型: thesis
    thesis
    显示于类别:[資訊管理學系] 學位論文

    文件中的档案:

    档案 大小格式浏览次数
    index.html0KbHTML2243检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈