English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113822/144841 (79%)
Visitors : 51801379      Online Users : 254
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/35685


    Title: 工作場所勞動者資訊隱私權之初探性研究
    Authors: 洪敦彥
    Contributors: 韓志翔
    洪敦彥
    Keywords: 代理理論
    資訊生命週期
    隱私權
    隱私侵擾行為
    組織控制
    Date: 2004
    Issue Date: 2009-09-18 15:43:09 (UTC+8)
    Abstract: 代理理論認為,雇主對勞動者,有減低資訊不對稱之需求,從而避免勞動者之任何投機行為與偏差行為損及其利益。不過,雇主為減低資訊不對稱所為之隱私侵擾行為,卻涉及到勞動者資訊生命週期的各個階段,從資訊的獲得、處理、儲存、散播與利用等,皆與隱私權的爭議密不可分,並且同時與管理效能息息相關。

    本文以當代之隱私權理論為經,以工作場所中勞動者資訊生命週期的各階段為緯,配合我國法律現況與國際保障趨勢,透過文獻分析法,以及訪談研究後發現:1. 國內雇主的隱私侵擾行為以行為監督、資料監控為主,實施檢測之隱私侵擾行為不若國外發達;2.國內缺少對工作場所隱私侵擾行為之相關立法規範;3.國內雇主實施組織控制的方式有直接與間接兩者;4.隱私侵擾行為同時會為組織帶來正功能與負功能;5. 雇主隱私侵擾行為之動機乃是透過瞭解員工的勞動過程、本身條件,以減低其資訊不對稱的劣勢,目的是為了發揮組織控制之管理功能;6.組織取得臨時員工之個人資料項目較正式員工少,而離職員工的個人資料管理較模糊。最後,本文分別對政府管制、人力資源主管/雇主與勞動者等三方面提供不同之建議,並指出後續研究方向。
    Reference: 一、中文部分
    王佳煌
    民90「資訊科技與監視宇宙」,東吳社會學報,第十期,頁1-35。
    王郁琦
    民89「工作場所中電子郵件隱私權之研究」,2000網路與社會研討會論文,國立清華大學社會學研究所主辦。
    江岷欽
    民74 「組織控制的類型分析」,公共行政學報,第一期,頁81-116。
    民82 組織分析,台北:五南圖書。
    李誠主編
    民90高科技產業人力資源管理,台北:天下文化。
    吳懿婷譯(Ellen Alderman & Caroline Kennedy原著)
    民90隱私的權利,台北:商周。
    吳瓊恩
    民85行政學,台北:三民書局。
    吳信如譯(Reinhard K. Sprenger原著)
    民92個體的崛起,台北:時報。
    林杏子
    民91資訊倫理,台北:華泰。
    周文祥、慕心編譯(Peter E. Drucker原著)
    民87,巨變時代的管理,台北:商周。
    周鴻玲譯(Charles Perrow原著)
    民77組織社會學,台北:桂冠。
    周慧蓮
    民93 「資訊隱私保護爭議之國際化」,月旦法學雜誌,第一0四期,頁112-132。
    席汝楫
    民86 社會與行為科學研究方法,台北:五南。
    紀佳伶
    民89「資訊隱私權之探討—以國民卡所引發的爭議為例」,公共行政學報,第四期,頁289-322。
    洪敦彥
    民92「工作場所隱私權之初探性研究」,第七屆公共行政博碩士論文研討會,政大公共行政系主辦。
    除曉慧譯(Joseph L. Badaracco, Jr.原著)
    民88 對與對的抉擇,台北:臉譜文化。
    郭貞伶、陳雅汝譯(Ronald Dworkin原著)
    民91生命的自主權,台北:商周。
    郭煌發
    民84犯罪預防,桃園:中央警察大學。
    陳月霞譯(Anne Wells Branscomb原著)
    民85出賣資訊,台北:時報文化。
    陳瑤華
    民92「自主與民主」,人文及社會科學集刊,第十五卷,第二期,頁339-363.。
    許文義
    民90個人資料保護法論,台北:三民。
    葉玟妤
    民92科技人的法律保護,台北:商周。
    詹文凱
    民87隱私權之研究,台灣大學法律研究所博士論文。
    劉昭博
    民87資訊不對稱與政府投機行為之研究,政治大學公共行政研究所碩士論文。
    焦興鎧
    民92「工作場所規範之最新發展趨勢—美國之經驗(上)」,萬國法律,第一二九期,頁83-94。
    民92「工作場所規範之最新發展趨勢—美國之經驗(下)」,萬國法律,第一三0期,頁103-108。
    曾隆興
    民89「隱私權之公法上保護及其界限」,台灣行政法學會主編,行政法爭議問題研究(上),頁679-718,台北:五南。
    劉士豪
    民91「網路資訊社會勞工人格權的保護」,政大勞動學報,第十二期,頁187-218。
    劉尚志主編
    民92「2003網路法制與犯罪偵防研討會論文集」,國立交通大學科技法律研究所。
    劉靜怡譯(Lawrence Lessig原著)
    民86「資訊科技與隱私權焦慮—誰有權塑造我的網路形象」,當代,第六卷,頁78-91。
    民91網路自由與法律,台北:商周。
    歐陽敏,陳永芳譯(Peter W. F. Davies主編)
    民90企業倫理,台北:韋伯文化。
    蔡明興譯(Archie B. Carroll原著)
    民77企業與社會,台北:桂冠。
    蕭美惠譯(David Brin原著)
    民88透明社會:個人隱私vs.資訊自由,台北:先覺出版。
    藍培青
    民86隱私權在美國演進歷程之研究,淡江大學美國研究所博士論文。
    謝清佳、吳琮璠
    民92資訊管理:理論與實務,台北:智勝文化。
    謝國雄
    民86純勞動:台灣勞動體制諸論,台北:中研院社研所籌備處。
    二、英文部分
    ACLU Special Report.
    1997 “Surveillance Incorporated: American Workers Forfeit Privacy for a Paycheck,” Rights to Privacy. Robert Emmet Long, Ed. New York: The H. W. Wilson Co..
    Addley, Ken
    1997 Occupational Stress-a practical approach, Reed Educational and Professional.
    Ambrose, Maureen L. and G. Stoney Alder
    2000“Designing, Implementing, and Utilizing Computerized Performance Monitoring: Enhancing Organizational Justice”, Research in Personnel and Human Resources Management, Vol.18, pp.187-219.
    Alderman, Ellen & Caroline Kennedy
    1997, The Right to Privacy, Business Weekly Publications, Inc. Published by arrangement with International Creative Management, Inc.
    Alfino, Mark & G. Randolph Mayes
    2003, “Reconstructing the Right to Privacy”, Social Theory and Practice, Vol.29, No1.
    Altman, I.,
    1975 ,Environment and social behavior: Privacy, personal space, territory, and crowding. Pacific Grove, CA: Brooks/Cole.
    1977 Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33, pp.66-83.
    Barnard, Chester
    1938, The Function of the Executive, Cambridge, Mass: Harvard University Press.
    Bogart, Dood H.
    1980“Feedback, Feedforword, and Feedwithin: Strategic Information in System.”Behavioral Science, Vol.25, No.4.
    Braverman, H.
    1974 Labor and Monopoly Capital. New York: Monthly Review.
    Brown, E.L
    1997“The myth of E-mail privacy”, Fortune, February 3, p.66.
    Brown, Marvin T.
    1990 Working Ethics: strategies for decision making and organizational responsibility, Jossey-Bass Inc.
    Brown, W. S.
    1997“Eye spy: Businesses keeping tabs on workers”.The Sunday Gazette Mail, p.1B.
    Bylinsky, G.
    1991“How companies spy on employees”,Fortune, Nov. 4, p131-140.
    Cain, Rita Marie
    2002“Global Privacy Concerns and Regulation-Is the United States a World Apart?,International Review of Law Computers & Technology, Vol.16, pp.23-34.
    Cozzetto, Don A. and B. Pedeliski Theodore
    1997 “Privacy and the Workplace: Technology and Public Employment.” Public Personnel Management, Vol.26, No.4, Dec.22, , p.515.
    Dyer, Barbara
    1979 Personnel systems and records. Gower Press.
    Eisenhardt, K. M.
    1989“Agency Theory: An Assessment and Review,”Academy of Management Review, Vol.14, No.1, pp.57-74.
    Goffman, E.
    1959 The presentation of self in everyday life. Garden City, NY: Doubleday.
    Halpern, S.
    1992 Big boss is watching you, Details, April, pp.18-23.
    Hartman, Laura P.
    2001“Technology and Ethics: Privacy in the Workplace”Business and Society Review, 106:1, p.1-27.
    Hoffman, W. Michael, Laura P. Hartman and Mark Rowe
    2003“You"ve Got Mail...And the Boss Knows: A Survey by the Center for Business Ethics and Internet Monitoring”, Business and Society Review, Vol.108, No,3, pp.285-307.
    Hubbard, Joan C., Karen A. Forcht and Daphyne S. Thomas
    1998“Human Resource Information Systems: An Overview of Current Ethical and Legal Issues”, Journal of Business Ethics, Vol.17, 1319-1323.
    Hubbartt, William S.
    1998 The New Battle Over Workplace Privacy. New York: AMACOM, American Management Association.
    Inness, Julie C.
    1992 Privacy, Intimacy and Isolation, Oxford University Press
    John D. R. Craig
    1999, Privacy and Employment Law, Hart Publishing Co., Oxford and Portland, Oregin.
    Jourard, S. M.
    1966. Some psychological aspects of privacy. Law and Contemporary Problems, 31, 307-318.
    Kelvin, P.
    1973“A social-psychological examination of privacy”. British Journal of Social Clinical Psychology, 12, pp.248-261.
    Kovach, Kenneth A., Jennifer Jordan, Karen Tansey and Eve Framinan
    2000“The Balance Between Employee Privacy And Employer Interests”, Business and Social Review, Vol.105, pp.289-298.
    Laufer, R. S. & Wolfe, M.
    1977“Privacy as a concept and a social issue: A multidimensional developmental theory”Journal of Social Issues, 33, pp.22-41.
    Lawler, Edward E.
    1976 Information and control in organizations, Pacific Palisades, Calif. : Goodyear Pub.
    Linowes, D.
    1996 A research survey of privacy in the workplace. Urbana, IL: The University of Illionis.
    Lyon, David
    1993 “An Electronic Panoption?—A Sociological Critique of Surveillance Theory.” The Sociological Review. 41(4)(November):653-678.
    1994 The Electronic Eye—The Rise of Surveillance Society. Oxford: Polity Press.
    1998 “The World Wide Web of Surveillance—The Internet and Off-World Power-Flows.”Information, Communication & Society. 1(1) (Spring): 91-105.
    Margulis, Stephen T.
    2003,“ Privacy as a Social Issue and Behavioral Concept”, Journal of Social Issues, Vol.59, No.2, pp.243-261.
    Mason, Richard O., Florence M. Mason, and Mary J. Culnan
    1995, Ethics of Information Management, Sage Publications.
    Miller, Seumas & John Weckert
    2000, “Pricacy, the Workplace and the Internet”, Journal of Business Ethics, Vol.28, pp.255-265.
    Mishra, Jitendra M. & Suzanne M. Crampton.
    1998 “Employee Monitoring: Privacy In The Workplace?”S.A.M. Advanced Management Journal, Vol.63, No.3, Summer, pp.4-14.
    Perrow, C.
    1986 Complex Organization: A Critical Essay, 3rd ed., New York: Random House.
    Persson, Anders J. and Sven Ove Hansson
    2003, “Privacy at Work-Ethical Criteria”, Journal of Business Ethics. Vol 42, 59-70,
    Poster, Mark
    1989 “Critical Theory and Poststructuralism—In Search of a Context.”Ithach and London: Cornell University Press.
    Rosenberg, Richard S.
    1999“The Workplace on the Verge of the 21th Century”,Journal of Business Ethics, Vol.22, pp.3-14.
    Rowan, John R.
    2000“The Moral Foundation of Employee Rights”,Journal of Business Ethics, Vol.24,pp355-361.
    Rule, James B.
    1996 “High-Tech Workplace Surveillance: What’s Really New?”In David Lyon and Elia Zureik. Eds. Computers, Surveillance, and Privacy. Minneapolis and London: University of Minnesota Press: 66-76.
    Sarathy, Ravi and Christopher J. Robertson
    2003“Strategic and Ethical Considerations in Managing Digital Privacy”, Journal of Business Ethics, Vol. 46, pp.111-126.
    Simon, Herbert A.
    1957, Administration Behavior, 2nd ed., New York: Macmillan.
    Stone, Eugene F. and Dianna L. Stone
    1990“Privacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms”, Research in Personnel and Human Resources Management, Vol.8, pp.349-411.
    Vredenburgh, Donald and Yael Brender
    1998“The Hierarchical Abuse of Power in Work Organizations”, Journal of Business Ethics, Vol.17, pp.1337-1347.
    Warren, Samuel D. and Brandeis, Louis D.
    1890, “The Right to Privacy”, Harvard Law Review, No.4, pp.193-220.
    Westin, Alan F.
    1968 Privacy and Freedom. London: Bodley Head.
    1979“The Problem of Employee Privacy Still Troubles Management,”Fortune, June 4, pp.120-126.
    2003 “Social and Political Dimensions of Privacy”, Journal of Social Issues, Vol.59, No.2, pp.431-453.
    Will, Ian
    1983 The Big Brother Society. London: Harrap.
    Zuboff, Shoshana
    1988 In the Age of the Smart Machine—The Future of Work and Power. New York: Basic Books.
    Description: 碩士
    國立政治大學
    公共行政研究所
    90256001
    93
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0902560011
    Data Type: thesis
    Appears in Collections:[公共行政學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    56001101.pdf15KbAdobe PDF2761View/Open
    56001102.pdf16KbAdobe PDF2793View/Open
    56001103.pdf31KbAdobe PDF2831View/Open
    56001104.pdf214KbAdobe PDF21051View/Open
    56001105.pdf343KbAdobe PDF22646View/Open
    56001106.pdf292KbAdobe PDF27723View/Open
    56001107.pdf196KbAdobe PDF2981View/Open
    56001108.pdf160KbAdobe PDF21048View/Open
    56001109.pdf108KbAdobe PDF21051View/Open
    56001110.pdf61KbAdobe PDF21001View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback