政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/129227
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文筆數/總筆數 : 113648/144635 (79%)
造訪人次 : 51680883      線上人數 : 574
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/129227


    題名: 軍人身分證晶片化之決策分析
    Decision Analysis of Military eID Development
    作者: 鄭棟元
    Cheng, Dung-Yuan
    貢獻者: 蕭乃沂
    Hsiao, Naiyi
    鄭棟元
    Cheng, Dung-Yuan
    關鍵詞: 決策分析
    軍人身分證
    深度訪談
    模糊層級分析法
    Decision analysis
    Military Identification
    in-depth interview
    fuzzy AHP
    日期: 2020
    上傳時間: 2020-04-06 14:47:14 (UTC+8)
    摘要: 隨者科技發展至今,晶片卡在生活中已受廣泛應用;我國全民晶片健保卡於2003 年完成換發作業,政府亦將於2020 年10 月起推動換發晶片國民身分證,積極推展電子化服務。美軍自1999 年起即依國會要求換發晶片軍人身分證,將智慧卡科技融入、整合軍事管理作為,國軍軍人身分證假使能順應晶片化「多卡合一」進步趨勢,勢必能增進內、外部單位鏈結與國防事務發展,契合國防施政作為並強化與國際鏈結交流。
    本研究彙整深度訪談專家意見,以「整合效益」、「可能風險」與「推動成本」為評估構面,運用模糊層級分析法探討國軍相關決策者、使用者,對現行紙本軍人身分證朝向晶片化發展的決策分析,比較個人、群體決策各項權重數值,結合組織文化差異觀點詮釋,求得「證件晶片化」的最大可能行動方案,確認晶片軍人身分證發展決策。
    晶片軍人身分證的群體決策研究發現,提供國軍未來多卡整合、風險管控、發展方向與政策擘劃之實務展望。相信未來晶片軍人身分證統合發展後,可有效啟迪思維、強化內部公共管理,並間接提升軍人於社會上的形象地位。值得探討的是,證件晶片化的弊端思慮,並不代表會成為停止進步的組織承諾,除卻證件形式上的轉變,更可深化國軍全體官兵對未來發展的肯定,幫助建立其實務認知與未來願景。
    本研究建議國軍可結合國家電子化政府政策推動,進行證件晶片化相關規範與配套之政策設計探究;透過完善而嚴謹的政策法制,清楚明定將傳統證件轉換後,如何循序建置、推展,逐步擴大內部應用數位服務範圍,或許更能夠加速政策推行,提升國軍內部驅動公共治理與改善精進政策。
    With the development of science and technology nowadays, Integrated Circuit Cards (ICC) become widely used in our lives. Since 2003, National Health Insurance Card had fully reissued operations to chip cards. The government will start to facilitate transferring National Identity Chip Cards in order to promote electronic services actively. The U.S. military had improved paper identity cards to chip eID followed the Congress’ guidance to merge ICC technology and application with military management. If R.O.C. military identity can follow the trend to integrate multiple functions into one card, it will surely enhance the link of units with national defense affairs in all aspects, combine national defense policy, and build up international engagements strengthening with other countries.
    This research gathers expert opinions from in-depth interviews to adopt and acquire “integrated benefits, possible risks, and transformed costs” as assessed evaluation, using fuzzy AHP to study on two groups as decision makers and pure users in the Ministry of National Defense (MND), then develop decision analysis of transforming to military eID of current paper ID. The comparison will be held with individuals and groups with the same or different types of values, in order to address small, partial difference caused by organization cultures. Then the research acquires all values needed to illustrate the result of most possible course of action, as the possible reference for future potential decision development.
    The result of group decision making in this study provides possible integration of multiple cards, risk management, developed direction, and future policy planning of the practical prospect. I believe that after military eID integrated development in the future, it will efficiently enlighten thinking, strengthen internal public management, and enhance the status of soldiers in society indirectly. It is worth exploring that disadvantages thinking of eID development will not stop the improving progress of organizational commitment. Eliminating just looking at the changes in the form of ID cards in appearance, it will deepen the acknowledge to the future development and assist establishing practical cognition and vision of the armed forces.
    The research provides suggestion for the Armed Forces to follow the Electronic Government trend and to draft policies related to military eID development. Only
    consolidated policy and regulation design assists to facilitate expanding digital service range of inter-organization step-by-step. This could also accelerate the
    implementation of policies improving public governance in the Armed Force.
    參考文獻: 中文部分
    內政部(2019)。數位身分識別證(New eID)簡易問答集。取自https://www.ris.gov.tw /app/portal/789
    內政部(2007)。全面換發國民身分證大事紀。臺北:內政部。
    內政部戶政司(2017)。「晶片國民身分證?」開放決策工作坊議題手冊。臺北:內政部。
    內政部戶政司(2019)。New eID資訊公開專區。取自內政部戶政司官方網站 https://www.ris.gov.tw/app/ portal/789
    王嘉斌(2011)。晶片IC卡的應用。科學研習月刊,48-8,2-5。
    朱豔芳、謝復剛(2005)。國防實務研究方法。臺北:前程文化總經銷。
    江妙瑩(2004)。健保IC卡上路,你憂心隱私全都露嗎?。取自 http://forum.yam.org.tw/bongchhi/old/tv/tv152.htm
    行政院研究發展考核委員會(2016)。第五階段電子化政府計畫(106年至109年)。取自研考會官方網站https://www.ndc.gov.tw/ cp.aspx?n=67F4A482298C5D8E&s= EEBA8192E3AA2670
    吳怡瑾、林書偉(2010)。基於專案屬性資訊之知識探勘與再利用平台發展。圖書資訊學刊,8(1),97-136。https://doi.org/10.6182 /jlis.2010.8(1).097
    李興緯、洪上修、李翔祖(2009)。防僞安全技術運用於識別證件之研究。中華印刷科技年報,138-152。https://doi.org/10.30153/ JCAGST.200903.0011
    周立平、楊博宏(2011)。晶片卡安全之探討-離線攻擊Mifare Classic。前瞻科技與管理,1(2),97-111。
    周冠汝、何明諠(2019)。一人一號的身分制度是必要的嗎?討論晶片身分證的隱私資安風險前,得先思考這個根本問題。取自Medium https://medium.com/@tahr1984
    林子鈞(2018)。為什麼台灣人需要一張晶片身份證?讓我用五分鐘解釋給你聽。取自 https://buzzorange.com/techorange/2018/06/12/ idrntify-resign/
    林政宏(2011)。智慧卡的科技。科學研習月刊,44-2,4-7。
    林淑馨(2018)。公共管理概論。高雄:巨流圖書股份有限公司。
    范麗娟(1994)。深度訪談簡介。戶外遊憩研究,7(2),頁25-35。
    徐村和(1998)。模糊德菲層級分析法。模糊系統學刊,4(1),59-72。
    秦大智(2013)。反擊階段打擊旅火力支援方案之研究-以層級分析法為例。黃埔學報,69,74-86。
    國史館檔案史料文物(1940)。國民兵身分證暫行條例。取自史料文物查詢系統https://ahonline.drnh.gov.tw/index.php?act=Display /image /53537257Yz=00#0eF
    國防部(2019)。中華民國108年國防報告書。臺北:國防部。
    國防部(2017)。中華民國106年國防報告書。臺北:國防部。
    國防部(2016)。國軍人員身分證明管理要點。臺北:國防部。
    國家發展委員會資訊管理處(2018)。數位治國的愛沙尼亞,數位公民獨步全球。政府機關資訊通報,351,1-3。
    張紹勳(2012)。模糊多準則評估法及統計。臺北:五南圖書出版股份有限公司。
    張毓騰、吳杰修 (2016)。應用層級分析法探討空軍志願役人員留任的因素之研究。管理資訊計算,5(2),79-84。doi: 10.6285/MIC.
    5(2).07
    莊庭瑞(2017)。全面換發晶片身分證?歷史共業下的台灣戶籍制度。民主視野,20,13-16。
    許家瑜、張文馨、程平、林鎮西、李彦民(2018)。健保卡前世今生比一比 未來「摸不到」。取自 https://theme.udn.com/theme/story/ 6774/3297813
    陳敦源、李仲彬、黃東益(2007)。應用資訊通訊科技可以改善“公眾接觸”嗎?台灣個案的分析。東吳政治學報,25(3),51-92。
    陳蔚菁(2019)。介紹德國eID政策法制-從德國身分證及電子識別法出發。科技法律透析,31-3,31-37。
    黃東益、蕭乃沂(2014)。電子治理與資訊產業發展。公共治理季刊,2(2),51-57。
    黃彥鈞(2018)。愛沙尼亞前總統訪台,直言數位化需要的是政治決心。取自 http://technews.tw/2018/07/19/estonia-former-president-toomas-hendrik-ilves-digitalization/
    萬文隆(2004)。深度訪談在質性研究中的應用。生活科技教育,37(4), 17-23. https://doi.org/10.6232/LTE.2004.37(4).4
    葉俊榮(2005)。電子化政府資通安全發展策略與展望。研考雙月刊,29(1),20-34。
    董信煌、陸曉曦(2017)。雲端電子病歷使用意圖之探討。Electronic Commerce Studies,15(2),167-208。
    廖泓瑋(2010)。大學經營環境衝擊下學院因應策略之研究。華梵大學工業工程與經營資訊學系碩士班碩士論文。
    褚志鵬(2009)。層級分析法(AHP)理論與實作。取自http://faculty.ndhu.edu.tw/~chpchu/ POMR_Taipei_2009/AHP2009. pdf
    鄧振源、曾國雄(1989)。層級分析法(AHP)的內涵特性與應用(下)。中國統計學報,27(7),1-20。
    鄧振源(2005)。計畫評估:方法與應用。基隆:國立臺灣海洋大學運籌規劃與管理研究中心出版。
    鄭景俗、廖述賢、張自立 (2003)。基於模糊層級分析觀念及距離法模糊數排序評估武器系統。中華管理學報,4(2),1-18。doi:10. 30053/chjm.200307.0001
    鄭棟元(2019)。美國陸軍網路戰概念發展之探討。陸軍學術雙月刊,55(568),4-23。
    蕭乃沂、朱斌妤(2018)。資料驅動創新的跨域公共治理。國土及公共治理季刊,6(4),74-85。

    英文部分
    Albrecht, K. (2008). RFID TAG-YOU’RE IT. Scientific American, 299(3), 72-77. https://doi.org/10.1038/scientificamerican0908-72
    Ardiley, Stephane (2012). History of the Common Access Card (CAC). Security Technology Executive, 22.
    Ariton-Gelan, C. (2015). CREATING ELECTRONIC IDENTITY - FUNDAMENTAL OBJECTIVE OF E-GOVERNMENT. Romanian Review of Social Sciences, (8), n/a. Retrieved from http://search.proquest.com/docview/1748576210/
    Buckley, J. J. (1985). Ranking alternatives using fuzzy numbers. Fuzzy sets and systems, 15(1), 21-31.
    Carr, M. R. (2002). Smart card technology with case studies. In Proceedings. 36th Annual 2002 International Carnahan Conference on Security Technology (pp. 158-159). IEEE.
    CEF Digital (2019).What are the benefits of eID? Retrieved from https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/Benefits+of+eID
    Chadwick, D. (1999). Smart cards aren’t always the smart choice. Computer, 32(12), 142-143. https://doi.org/10.1109/2.809256
    Chih, M. Y., Shih, J. R., Yang, B. Y., Ding, J. T., & Cheng, C. M. (2010). MIFARE Classic: Practical attacks and defenses. In 全國資訊安全會議 (pp. 126-132). 中華民國資訊安全學會.
    Culnan, M. J., Armstrong, P. K. (1999). Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science, 10(1), 104–115. https://doi. org/10.1287/orsc.10.1.104
    de Andrade, N., Chen-Wilson, L., Argles, D., Wills, G., Schiano Di Zenise, M., Gaycken, S., … Cova, M. (2014). Electronic Identity (2014 ed.). https://doi.org/10.1007/978-1-4471-6449-4
    DMDC (2002). DoD Introduces a New ID Card: The Common Access Card. Retrieved from https://www.dmdc.osd.mil/smartcard/owa/Show Page?p=index
    Dubois, D., & Prade, H. (1978). Operations on fuzzy numbers. International Journal of Systems Science, 9(6), 613-626.
    Forman, E., Saaty, T., Shvartsman, A., Forman, M., Korpics, M., Zottola, J. (2000). Expert Choice 2000. Inc., Pittsburgh.
    Gage, T. (1999). Just the FAQS--Smart card. Air Force Journal of Logistics, 23(2), 18–21. Retrieved from http://search.proquest.com /docview/196451526/
    Gustafsson, M., Hedström, K., Söderström, F., & Wihlborg, E. (2015). Constructing identities – professional use of eID in public organizations. Transforming Government: People, Process and Policy, 9(2), 143–158. https://doi.org/10.1108/TG-11-2013-0049
    Pardalos, P., Du, D., & Kahraman, C. (2008). Fuzzy Multi-Criteria Decision Making: Theory and Applications with Recent Developments (Vol. 16). https://doi.org/10.1007/978-0-387-76813-7
    Meadows, D., & Wright, D. (2009). Thinking in systems : a primer / Donella H. Meadows ; edited by Diana Wright. London ;: Earthscan.
    Murdoch, S. J., Drimer, S., Anderson, R., & Bond, M. (2010, May). Chip and PIN is Broken. In 2010 IEEE Symposium on Security and Privacy (pp. 433-446). IEEE.
    Norris, P. (2001). Digital divide: Civic engagement, information poverty, and the Internet worldwide. Cambridge university press.
    Pesonen, L. (2003). Meeting governments’ demands for secure ID documents. (2003). Card Technology Today, 15(4), 8–8. https://doi.org/10.1016/S0965-2590(03)00416-X
    Plyler, K. I. (2002). Common Access Card: Mission E-Possible, Retrieved from CHIPS, U.S. Navy website. https://www.doncio.navy.mil/chips/ArticleDetails.aspx?ID=3624
    Poller, A., Waldmann, U., Vowé, S., & Türpe, S. (2012). Electronic identity cards for user authentication—promise and practice. IEEE Security & Privacy, (1), 46-54.
    Rissanen, T. (2010). Electronic identity in Finland: ID cards vs. bank IDs. Identity in the Information Society, 3(1), 175-194. https://doi.
    org/10.1007/s12394-010-0049-8
    Saaty, T. L. (1980). The Analytic Hierarchy Process. New York: McGraw-Hill.
    U.S. Army (2016). Army Cyber Command leader: protecting systems, networks vital for Army readiness. Retrieved from https://www.
    army.mil/article/164788/army_cyber_command_leader_protecting_systems_networks_vital_for_army_readiness
    U.S. DoD (2018). Common Access Card. Retrieved from https://www.cac.mil/common-access-card/
    Villasenor, J. (2012). A Hacker-Ready Chip. Scientific American, 307(2), 29. https://doi.org/10.1038/scientificamerican0812-29a
    VOA (2019). US Says Taiwan Defense Spending to Rise with China Threat. Retrieved from https://www.voanews.com/east-asia-pacific/us-says-taiwan-defense-spending-rise-china-threat
    Wang, Y., Xu, L., & Solangi, Y. (2020). Strategic renewable energy resources selection for Pakistan: Based on SWOT-Fuzzy AHP approach. Sustainable Cities and Society, 52. https://doi.org/10.1016/j.scs.2019.101861
    Zadeh, L. A. (1965). Fuzzy sets. Information and control, 8(3), 338-353.
    描述: 碩士
    國立政治大學
    行政管理碩士學程
    107921302
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0107921302
    資料類型: thesis
    DOI: 10.6814/NCCU202000395
    顯示於類別:[行政管理碩士學程(MEPA)] 學位論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    130201.pdf1591KbAdobe PDF2716檢視/開啟


    在政大典藏中所有的資料項目都受到原著作權保護.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋