透過您的圖書館登入
IP:3.21.76.0

並列摘要


For some purposes, such as benefits, requirement-fitted services and management, enterprises regularly ask customers, employees, and business partner to provide relevance data including sensitive personal information. However, transparent information bring the infringement of privacy and threats of living security to the data providers. Recently, enterprises have suffered from the loss of potential customers and benefits because of the rise of privacy protection consciousness. Therefore, this article researches in the solutions of data privacy protection in enterprises, and classifies into three categories, ”Role-based”, ”Purpose-based”, and ”Extension”. Furthermore, we define three criterions which should be achieved when an enterprise wants to implement a data access system with privacy protection mechanism. We hope it is helpful for enterprises to strengthen privacy protection depending on their own characteristics and requirements.

被引用紀錄


Liao, P. L. (2015). 基於直接分享訊息模式推論多個傳遞網路 [master's thesis, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2015.02260
Yang, M. H. (2012). 應用密度估計演算法分析大型醫學資料庫 [doctoral dissertation, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2012.00469
Chen, Y. H. (2008). 高畫質可調式視訊影像編碼之分析與積體電路架構設計 [doctoral dissertation, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2008.00079
Ou, Y. Y. (2005). 以RBF類神經網路為基礎之機器學習演算法研究 [doctoral dissertation, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2005.00509
Rao, A. S. K. A. V. P. (2014). Impacts of GPS Radio Occultation Data on Severe Weather Prediction [doctoral dissertation, National Central University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0031-0605201417535202

延伸閱讀