透過您的圖書館登入
IP:18.117.172.251
  • 學位論文

數位足跡之發展及運用與對隱私權的威脅

The Development of Digital Footprint and the threats to privacy

指導教授 : 葛祥林

摘要


科技發展大幅提升資訊的流通與使用,而帶來我們目前生活便利性與管理系統運作的效率,但資訊科技對於個人同樣帶來反噬的效果,科技助長公私部門深入我們日常活動軌跡的能力。 隨著電子監控和追蹤頻繁和資訊系統的規模比往日更龐大,隱私權受到威脅。 本文將分為六章。第一章是本文的緒論。第二章討論隱私權概念的發展,隱私在美國和台灣的發展脈絡以及隱私必須在社會、文化脈絡下理解及其所連結的價值。第三章是公權力運用科技偵審犯罪與對隱私權的威脅,討論公權力作為主體對人民作電子監控和追蹤產生的隱私問題,過去的文獻,大部分僅論及美國為國土安全而建立的大型資訊系統,本文將論及近兩年誕生的本土案例,台灣新北市的「科技防衛城」計劃與內容,及其在整合建置完善的警政科技與管理系統之外,對於相應的隱私規劃是如何的缺乏。第四章是工作場域監視與隱私權,當雇主作為主體以「電子績效監視」、「企業保密」、「員工已同意」為理由,對員工作電子監控和追蹤產生時,產生的隱私困境。第五章是網路資訊社會中消費者隱私權益保護。業者提供免費服務,而作為交換,用戶在有知或無知提供有關個人生活、友誼、興趣和活動的詳細信息,業者再借助這類信息吸引廣告主、應用開發者和其他商業機遇。如此簡單地獲取大規模的個人信息是最近幾年才剛剛實現的。該章節以資料探勘作為「行銷方法」時,分別於蒐集、處理、利用三個階段的可能遇到隱私問題。 第六章為結論。

並列摘要


Technological development has significantly improved the flow and the use of information, bringing our present lives more conveniences and systems to manage operational efficiency. However, information technology has also brought negative effects for individuals. It has spurred the public and private sectors ability to deeply track our daily activities, possibly revealing the most intimate of details. With electronic monitoring, frequent tracking and information systems becoming more massive in scale, privacy is threatened. This article will be divided into six chapters. The first chapter is the introduction. The second chapter is the development of the concept of privacy. The 2nd chapter discusses the historical development of privacy rights in United States and Taiwan. The value of privacy must be understood through social and cultural context. The second chapter will examine public authorities that are using technology in criminal investigations and its use in trials, detailing possible privacy threat implications. A discussion will examine the public authority’s electronic monitoring and tracking of people and its related privacy issues. When the majority of domestic literature only addresses the U.S. Department of Homeland Security’s establishment of several large-scale information systems, this paper will address the local case that has originated in the past two years concerning Taiwan’s New Taipei City "Defense Science and Technology City" program and its content. While integrating information systems and constructing policing technology and management systems, we will scrutinize how there is a lack of consideration in the corresponding planning for privacy. The third chapter will cover surveillance in the workplace and its threat to privacy. The employers justify their electronic monitoring and tracking with "Electronic Performance Monitoring", "Enterprise Confidential", "Employees’ Consent" reasoning. This reasoning has been resulting in a dilemma for privacy. The fifth chapter investigates consumer privacy protection in a network information society. Industry provides free services, and in exchange, the user provides relevant personal information on friendships, interests and activities. The industry, then using this information, attracts advertisers, application developers and other commercial entities that see opportunities. Access to large-scale personal information has been so simple in recent years. This chapter, examines how data mining is now commonly used "marketing approach" and discuses the collection, processing, and its using of the three stages respectively for what privacy issues may encounter. Last, chapter six will conlcude.

參考文獻


李婉萍(2012),〈個人資料保護脈絡下的綑綁式同意〉,《科技法律透析》,第24卷第1期。
李榮耕(2010), <論偵查機關對通信紀錄的調取>,《政大法學評論》,第 115期。
李榮耕(2012),通訊監察中之最小侵害原則, 臺北大學法學論叢,82期
吳兆琰(2007),〈論政府資料探勘應用之個人資料保護爭議〉,《科技法律透析》,第19卷第11期。
周桂田(2008),〈全球在地化風險典範之衝突──生物特徵辨識作為全球鐵的牢籠政治與社會哲學評論〉,第24 期。

延伸閱讀