Responsive image
博碩士論文 etd-0921114-172126 詳細資訊
Title page for etd-0921114-172126
論文名稱
Title
臉書全都露?臉書使用者隱私權保護之研究
Facebook overexposure?Privacy protection for Facebook users
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
193
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2014-09-20
繳交日期
Date of Submission
2014-10-21
關鍵字
Keywords
臉書、隱私權、社群媒體、個人資料保護、隱私之合理期待
Facebook, personal information protection, privacy, reasonable expectation of privacy, social media
統計
Statistics
本論文已被瀏覽 5737 次,被下載 115
The thesis/dissertation has been browsed 5737 times, has been downloaded 115 times.
中文摘要
本研究主要目的為透過分析美國與歐盟的隱私權法律及規範,瞭解臉書使用者被侵害隱私權的行為態樣,並以「隱私權情境脈絡完整性理論」分析隱私權法規範不足之處。本研究採用之研究方法為比較法學,以比較法學觀點檢視美國與歐盟的隱私權法規範之內涵與適用關係,進一步比較我國法制之共同性與相異點,探尋不足及可取之處。過去研究顯少探尋法律應用於社群媒體之適用性,與使用者在社群媒體上是否有「隱私之合理期待」,究其原因乃在於臉書上的個人資訊無法被清楚分辨為「公開」、「非公開」,因此以現行之法規範並無法妥善保護臉書使用者的隱私權。本研究試圖解決法規範不足以保護社群媒體臉書使用者之問題,透過美國與歐盟隱私權相關法制之探討,並以情境脈絡完整性理論分析國內外隱私權法律,期待本研究結果可以提供未來修正或制訂保護社群媒體使用者的隱私權法規範建議。
Abstract
The study mainly focuses on exploring the behavior and reaction of Facebook users encountering invasion of privacy via analyzing Amarican and European Union (EU) privacy law and regulation and analyzing the shortcomings of privacy regulation by contextual integrity theory of privacy. Comparative jurisprudence was used as the research method in the study. We examined the meaning and applicability of American and EU privacy regulation from the perspective of comparative jurisprudence. Furthermore, the commonality and difference between the privacy regulation of Taiwan and America and EU are investigated to explore the weakness and strength of ours. Existing literatures rarely stuided the applicability of applying law to social media and the range of reasonable user expectation of privacy on social media. The reason of that could be that the privacy status of the personal information on Facebook, e.g. public or private, is unclear. Therefore, the current regulation cannot properly secure privacy of Facebook users. The study aims to make up for the shortcomings of the current regulations/law through investigating American and EU privacy regulations as well as analyzing both domestic and international privacy law by contextual integrity theory in order to address the privacy dilemma involved between Facebook users. It is expected that the result of the study can provide valuable guidance and suggestion for the future amendment and legislation of the privacy law for social media users.
目次 Table of Contents
論文審定書 i
誌謝 ii
摘要 iii
Abstract iv
目錄 v
圖次 vii
表次 vii
第壹章 緒論1
第一節 研究背景與動機1
第二節 研究目的4
第三節 研究流程5
第貳章 文獻探討6
第一節 臉書的隱私權概念與侵害分析6
一、 臉書6
二、 臉書上的隱私侵害7
第二節 隱私權保護理論18
第參章 研究方法29
第一節 比較法方法論29
第二節 比較法學於我國之應用30
第三節 結論31
第肆章 隱私權保護相關法制規範33
第一節 隱私權保護相關法制規範33
一、 歐盟34
二、 美國46
三、 我國56
第二節 相關研究67
第伍章 分析與討論73
第一節 各國法律應用於臉書隱私權疑慮的分析73
第二節 刪除權105
第三節 綜合評析107
第陸章 我國隱私權保護法制修訂之建議133
第一節 業者自律與保護政策133
第二節 法制規範138
第柒章 研究結論與建議143
第一節 研究結論143
第二節 研究貢獻145
第三節 研究限制與建議148

參考文獻149

附錄:臉書資料使用政策167
參考文獻 References
中文部分

Monkey (2007年,11月8日)。Facebook 推出 Social Ads : 廣告界的聖杯。 MMdays。線上檢索日期:2013年8月10日。取自http://mmdays.wordpress.com/2007/11/08/facebook_social_ads/

Sina News (2009年,12月4日)。Facebook公佈Beacon廣告和解方案細節。線上檢索日期:2013年8月5日。取自http://dailynews.sina.com/bg/news/usa/ussiliconvalley/sinacn/20091204/0242931745.html

TWNIC (2010)。財團法人台灣網路資訊中心網域名稱爭議處理辦法。線上檢索日期:2014年8月20日。取自http://www.twnic.net.tw/dn/dn_h_02.htm#2

TWNIC (2014)。域名爭議處理機構。線上檢索日期:2014年8月20日。取自http://www.twnic.net.tw/dn/dn_h_07.htm

丁俊和(2011)。論社群網站資訊隱私權保護之法律分析。東吳大學法律學系碩士論文,台北。

中華民國青年創業協會總會(2012)。電子商務交易紛爭解決機制之研究。行政院研究發展考核委員會委託研究計畫。

王珮儀、林懿萱、鍾詩敏(2007。談創用CC授權(進階篇)。律師雜誌,328,34-47。

田育菁(2010)。社群網站於我國隱私權保障之研究。國立東華大學財經法律研究所碩士論文,花蓮。

台灣創用CC計畫 (2014)。線上檢索日期:2014年8月20日。取自http://creativecommons.tw/twcc

呂丁旺 (2010)。淺析修正個人資料保護法。月旦法學,183,131-146。

呂雅惠 (2008)。企業內電子郵件監控與隱私權保護爭議之探討。政治大學法學院碩士在職專班論文,臺北。

李沃牆 (2013年08月13日)。時論─個資外流助長詐騙經濟。中國時報。線上檢索日期:2013年8月20日。取自http://www.chinatimes.com/newspapers/時論─個資外流-助長詐騙經濟-20130813000499-260109

李振瑋、江耀國(2009)。英國資料保護法中資料所有人權利之研究-兼論我國個資法之相關範例及案例。中原財經法學,24,29-79。

李震山 (2001)。論資訊時代下隱私權入憲之芻議。律師雜誌,207,23。

余啟民、徐志明 (2013)。電子商務交易紛爭解決機制之研究。行政院消費者保護處。

周慧蓮 (2003)。論行動化生活之資訊隱私侵害-以定位服務為例。月旦法學,99,152-165。

邱文聰 (2009)。從資訊自決與資訊隱私的概念區分-評「電腦處理個人資料保護法修正草案」的結構性問題。月旦法學雜誌,168,172-189。

林秀蓮 (2011)。個人資料保護法初探。萬國法律,176,4-12。

林東清 (2010)。資訊管理:e化企業的核心競爭能力。臺北市:智勝文化,13。

林玟君 (2010)。Facebook使用者對資訊隱私態度之研究。中國文化大學新聞系暨新聞研究所碩士論文,臺北。

林佩琪 (2010)。不能說的秘密:臉書上的隱私管理與友情滿意度。世新大學新聞傳播學院傳播研究所學生學術研討論論文,臺北。

林建中(1999)。隱私權概念之再思考─關於概念範圍,定義及權利形成方法。國立臺灣大學法律學研究所碩士論文,臺北。

林桓(2009)。政府機關強化個人資料保護措施之研究。行政院研究發展考核委員會。

郭戎晉 (2006)。數位時代下的電子商務交易紛爭解決機制。2006數位科技與創新管理國際研討會論文,臺北。

施明賢(2011)。論雲端服務的資訊安全法律議題-以隱私保護為中心。國立清華大學科技法律研究所碩士論文,新竹。

孫世昌 (2012)。生物辨識須兼顧隱私權及資訊自決權。生技與醫療器材報導,151,48-51。

高慕嘉 (2011)。社群網站使用者隱私保護之研究:以Facebook為例。國立交通大學科技法律研究所碩士論文,新竹。

徐新隆(2005)。數位時代下資訊隱私權問題之研究-以個人資料保護為中心。國立臺北大學法律學院法學系研究所,臺北。

陳人傑 (2006)。世界智慧財產權組織執行ICANN/UDRP決定之趨勢分析。科技法律透析,18(5),13-19。

陳文淦 (2006)。旅遊電子商務應用Web 2.0之策略分析。臺灣大學資訊管理研究所碩士論文,臺北。

陳向明(2009)。社會科學質的研究。台北:五南。

陳秀峰 (2002)。線上個人隱私之保護。月旦法學雜誌,82,208-216。

陳起行 (2002)。資訊隱私權法理探討-以美國法為中心。政大法學評論,64,297-341。

陳煌勳(2005)。網路隱私權保護之研究。國立臺灣大學國家發展研究所碩士論文,臺北。

陳裕涵(2013)。網路空間中之隱私權保障 ─以社群網站為中心。國立臺灣大學法律學研究所碩士論文,臺北。

陳維練、柴惠玲、鄭輝彬、胡美蓁、鄭其昀 (2012年9月17日)。考察歐盟、比利時與德國個人資料保護法規之規劃及施行情形報告。行政院科技會報辦公室、法務部。線上檢索日期:2013年8月20日。取自http://www.moj.gov.tw/public/Attachment/212313571523.pdf

張英磊(2009)。多元移植與民主轉型過程中我國環評司法審查之發展-一個以回應本土發展脈絡為目的之比較法分析論社群網站資訊隱私權保護之法律分析。台灣大學法律學院法律學研究所博士論文,台北。

張純富(2009)。社交網站人際關係維繫之研究-以Facebook為例。台北:致知學術。

翁岳生 (2003)。比較法學之理念與實踐。月旦法學雜誌,98,1-2。

翁清坤 (2010)。論個人資料保護標準之全球化。東吳法律學報,22(1),11-26。

許瓊文 (2005)。創造無資訊濫用的網路環境︰從使用者對網路隱私權的態度與其行為差異談起。行政院國家科學委員會專題研究計畫,3-4。

黃子恬 (2003)。從來電顯示論隱私權保護。月旦法學雜誌,101,205-216。

黃國書 (2008)。WEB 2.0之網路平台資訊分析-以Social Network Service為例。臺灣大學商學研究所碩士論文,臺北。

創世際市場研究顧問 (2013)。ARO/MMX公佈2013年4月Media Metrix網路流量報告。線上檢索日期:2013年7月20日。取自http://www.insightxplorer.com/news/news_05_22_13.html

電腦處理個人資料保護法 (1995)。

詹文凱(1998)。隱私權之研究。國立臺灣大學法律學研究所博士論文,臺北。

劉定基(2009)。欺罔與不公平資訊行為之規範-以美國聯邦交易委員會的管制案例為中心。公平交易季刊,17(4),57-91。

劉定基(2010)。個人資料保護法初論。台灣法學雜誌,159,5-6。

劉定基(2013)。請求刪除之權利與歐盟資料保護指令修正趨勢之研究。行政院國家科學委員會專題研究計畫,1-2。

劉定基(2013)。析論個人資料保護法上「當事人同意」的概念。月旦法學雜誌,218,146-167。

劉靜怡(2007)。隱私權保障與數位資訊社會。月旦法學教室,51,39-50。

劉靜怡(2010)。雲端運算趨勢與個人資訊隱私保護。全國律師,12(2),39-52。

劉靜怡(2010)。不算進步的立法:個人資料保護法初步評析。月旦法學,183,152-164。

劉靜怡 (2010)。數位時代中的創用CC與公共領域。建立數位公共領域論文集,59-60。

劉靜怡(2012)。社群網路時代的隱私困境—以Facebook為例。臺大法學論叢,41(1),1-70。

蔡志宏 (2012)。關於UDRP決定司法效力之研究-以海峽兩岸法院裁判為中心。科技法學評論,9(1),236。

蔡季勳 (2012)。萬洞穿心的《個資法》。線上檢索日期:2013年7月20日。取自http://www.appledaily.com.tw/appledaily/article/headline/20121019/34584591/

蔡秉錡 (2012)。敏感性個人資料保護之研究。國立臺灣大學國家發展研究所碩士論文,臺北。

蔡家玲 (2002)。網路隱私權保護系列之國際網路隱私權保護組織與其推廣現況。資策會。

蔡達智 (2007)。開放空間中的隱私權保障。月旦法學,145,127-146。

臉書 (2014)。動態時報上線了。線上檢索日期:2014年8月3日。取自https://www.facebook.com/about/timeline

蕭美惠 (1999)。透明社會:個人隱私V.S資訊自由。台北:先覺。

簡郁庭 (2008)。個人資料揭露案例之研究-以隱私權保障為中心。國立臺灣大學社會科學院國家發展研究所碩士論文,臺北。

鍾佩君 (2010)。有影無隱?影音傳播隱私管理測量研究:以影音社交網站YouTube為例。國立政治大學新聞研究所碩士論文,臺北。

英文部分

Acohido, B. , &Swartz, J. (2010). Usa Today. Do Not Track could revolutionize online ad industry. Retrieved Sep. 14, 2013, from http://www.usatoday.com/tech/news/2010-12-13-1Adonottrack13_CV_N.htm

Alexa. (2014). How engaged are visitors to facebook. com?Retrieved Aug. 3, 2014, from http://www.alexa.com/siteinfo/facebook.com.

Allen, A. L. (1988). Uneasy Access: Privacy for Women in a Free Society. Totowa, NJ: Rowman & Littlefield Pub Incorporated.

Article 29 Working Party. (2013). Retrieved Aug. 20, 2013, from http://ec.europa.eu/justice/data-protection/article-29/index_en.htm

Berger v. New York(1967). 388 U. S. 41.

Birkenstock, G. (2012). Face recognition threatens anonymity in public. DW. Retrieved Aug. 20, 2014, from http://www.dw.de/face-recognition-threatens-anonymity-in-public/a-16431905

Bok, S. (1983). Secrets: On the ethics of concealment and revelation. New York: Pantheon books.

Bowers v. Hardwick(1986). 478 U. S. 186.

Brownlee, C. & Waleski, B. D. (2008). Privacy Law. Law Journal Press.

Boyle, J. (1996). Shamans, Software and Spleens :Law and the Construction of the Information Society, Massachusetts: Harvard University Press.

California v. Ciraolo(1986). 476 U. S. 207.

Campbell, L. M. (2011). Internet Intermediaries, Cloud Computing and Geospatial Data: How Competition and Privacy Converge in the Mobile Environment. Competition Law International, 7(2), 60.

Carey v. Population Service International(1977). 431 U. S. 678.

Castro-Edwards, J. (2013). The Proposed European Data Protection Regulation. Journal of Internet Law, 17(3), 3.

Cate , F. H. (1999). The Changing Face of Privacy Protection in the European Union and the United States. Indiana Law Review, 33, 173.

Cate, F. H. (2001). Privacy In Perspective. USA: Aei Press.

Cavoukian, A. (2009). The 7 Foundational Principles, Privacy by Design. Retrieved Aug. 20, 2014 from http://www.ipc.on.ca/images/resources/7foundationalprinciples.pdf.

Cohen, J. S. (2006). Cop Snares College Pals in Own Web. Chicago Tribune. Retrieved Aug. 20, 2014 from http://articles.chicagotribune.com/2006-08-03/news/0608030264_1_facebook-friends-profil

COM. (2012). Proposal for a Regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). Retrieved Dec. 10, 2013, from http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52012PC0011:en:NOT

Constine, J. (2011). Facebook’s Settlement With FTC Confirmed: Privacy Changes Must Be Opt In – UPDATED. TechCrunch. Retrieved Aug. 10, 2014, from http://techcrunch.com/2011/11/29/zuckerberg-ftc-settlement/

Convention for the Protection of Human Rights and Fundamental Freedoms. (2010). Retrieved Aug. 20, 2013, from http://conventions.coe.int/TREATY/EN/TREATIES/HTML/005.HTML

Coudert, F. & Werkers, E. (2010). In the Aftermath of the Promusicae Case: How to Strike the Balance. International Journal of Law and Information Technology, 18(1), 50-71.

Daley, M. J. (2011). Information Age Catch 22: The Challenge of Technology toCross-Border Disclosure & Data Privacy. The Sedona Conference Journal, 12, 121.

DeAndrea, D. C. , & Walther, J. B. (2011). Attributions for inconsistencies betweenonline and offline self-presentations. Communication Research, 38(6), 805-825.

DiNucci, D. (1999). Fragmented Future. Print, 53(4), 2-32.

Donath, J. & Boyd, D. (2004). Public displays of connection. BT Technology Journal, 22(4), 71-82.

Dutch DPA. (2013). Dutch DPA: privacy policy Google in breach of data protection law. Retrieved Mar. 2, 2014, from http://www.dutchdpa.nl/Pages/pb_20131128-google-privacypolicy.aspx

Edwards, L. & Brown, I. (2009). Data Control and Social Networking: Irreconcilable Ideas? Harboring data information security law and the corporation. USA: Stanford University Press.

EEtechnews. (2012). EPIC: Facebook Timeline Violates FTC Settlement. Retrieved Mar. 2, 2014, from http://blog.experts-exchange.com/ee-tech-news/epic-facebook-timeline-violates-ftc-settlement/

ENISA (2013). The European Network and Information Security Agency. Retrieved Jul. 20, 2013, from http://www.enisa.europa.eu/.

European Commission. (2010). A Comprehensive Approach on Personal Data Protection in the European Union, 609, 7-8. Retrieved Jul. 20, 2013, from http://ec.europa.eu/justice/news/consulting_public/0006/com_2010_609_en.pdf

European Commission. (2010). Protection of personal data. Retrieved Sep. 12, 2013, from http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2010/wp171_en.pdf

European Commission. (2010). Opinion 8/2010 on applicable law. Retrieved Sep 14, 2013, from http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp179_en.pdf

European Commission. (2011). General Data Protection Regulation. Retrieved Sep. 14, 2013, from http://epic.org/privacy/intl/EU-Privacy-Regulation-29-11-2011.pdf

European Commission. (2014). Data Protection Day 2014: EU Data Protection Reform. Retrieved Mar. 14, 2014, from http://europa.eu/rapid/press-release_IP-14-70_en.htm

Farivar, C. (2011). Hamburg considers suing Facebook over facial recognition feature. DW. Retrieved Jul. 20, 2013, from http://www.dw.de/hamburg-considers-suing-facebook-over-facial-recognition-feature/a-15523030-1

Fazlioglu, M. (2013). Forget Me Not: The Clash of the Right to be Forgotten and Freedom of Expression on the Internet. International Data Privacy Law, 3, 149.

Felt, A. , & Evans, D. (2008). Privacy Protection for Social Networking APIs. CiteSeer. Retrieved Mar. 14, 2014, from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.211.7503

Finley, K. (2014). EU Rules That Google Must Honor Your ‘Right to be Forgotten’. Retrieved Aug. 20, 2014, from http://www.wired.com/2014/05/europe-google-eu-search/

Fletcher, D. (2010). How Facebook Is Redefining Pivacy. Time. Retrieved Jul. 20, 2013, from http://www.time.com/time/magazine/article/0,9171,1990798,00.html

Fradella, H. F. (2011). Quantifying Katz: Empirically Measuring "Reasonable Expectations of Privacy" in the Fourth Amendment Context. American Journal of Criminal Law, 38, 289.

Freeman, K. (2012). Does Facebook's Timeline Violate Its FTC Settlement? Social Media. Retrieved Sep. 14, 2013, from http://mashable.com/2012/01/06/facebook-timeline-epic/

Fried, C. (1968). Privacy. The Yale Low Journal, 77, 475-493.

FTC Website. (2011). FTC Charges Deceptive Privacy Practices in Google's Rollout of Its Buzz Social Network. Retrieved Sep. 14, 2013, from http://www.ftc.gov/opa/2011/03/google.shtm

Gerstein, R. (1978). Intimacy and privacy. Ethics, 89, 76-81.

Gilbert, F. (2011). European Data Protection 2. 0: New Compliance Requirement inSight—What the Proposed EU Data Protection Regulation Means for U. S. Companies. Santa Clara High Technology Law Journal, 28, 815.

Goldman, E. (2002). The Privacy Hoax, Forbes. Retrieved Aug. 24, 2013 from http://www.forbes.com/forbes/2002/1014/042.html

Goldman, E. (2006). A Coasean Analysis of Marketing. Wisconsin Law Review, 1151, 1213-1218.

Griswold v. Connecticut(1965). 381 U. S. 479

Grimmelmann, J. (2009). Saving Facebook. IOWA Law Review, 94, 1137.

Gross, R. , Acquisti, A. (2005) ‘Information revelation and privacy in online social networks’, in Proceedings of the 2005 ACM workshop on Privacy in the Electronic Society. New York: ACM Press.

Haag, V. D. (1971). On Privacy, in Privacy.

Hashemi, Y. (2009). Facebook’s privacy policy and its third-party partnerships: Lucrativity and liability. Boston University Journal of Science & Technology Law, 15, 140-161.

Helfi, M. (2010). Marketers Can Glean Private Data on Facebook, N. Y. Times. Retrieved Jul. 20, 2013, from http://www.nytimes.com/2010/10/23/technology/23facebook.html?_r=0

Hinnant, L. (2013). AP News. Google and privacy: 6 EU countries take action. Retrieved Sep. 14, 2013, from http://www.businessweek.com/ap/2013-04-02/google-and-privacy-6-eu-countries-take-action

ICANN. (1999). Uniform Domain Name Dispute Resolution Policy. Retrieved Aug. 14, 2014, from http://archive.icann.org/en/udrp/udrp-policy-24oct99.htm

Information Commissioner’s Office. (2013). Report highlights uncertainty on cost of EU data protection reform Watch. Retrieved Dec. 14, 2013, from http://www.ico.org.uk/news/latest_news/2013/report-highlights-uncertainty-on-cost-of-eu-data-protection-reform-14052013

Inness, J. (1992). Privacy, intimacy and isolation. Oxford:Oxford University Press.

Jensen, C. , Potts, C. , & Jensen, C. (2005). Privacy practices of Internet users:Self-reportsversus observed behavior. International Journal of Human-Computer Studies, 63, 203-227.

Jobvite. (2012). Jobvite Social Recruiting Survey Finds Over 90% of Employers Will Use Social Recruiting in 2012. Retrieved May 18, 2014, from http://recruiting.jobvite.com/company/press-releases/2012/jobvite-social-recruiting-survey-2012/

Justia. Com. (2010). Lane et al v. Facebook, Inc. et al, see generally1. Retrieved Jul. 20, 2013, from http://dockets.justia.com/docket/califomia/candce/5:2008cv03845/206085/

Judicibus, D. (2008). World 2. 0. Retrieved Jul. 20, 2013, from http://jerry-7.blogspot.tw/2009/03/world-20-dr-dario-de-judicibus.html

Katz v. United States, 389 U. S. 347, 361(1967). Harlan, J., concurring.

Kesan, J. , P. & Shah, R. , C. (2006). Setting Software Defaults: Perspectives from Law, Computer Science and Behavioral Economics. Notre Dame Law Review, 82, 583.

Kim, Y. , Sohn, D. , & Choi, S. M. (2011). Cultural difference in motivations for usingsocial network sites: A comparative study of American and Korean collegestudents. Computers in Human Behavior, 27, 365–372.

Kirkpatrick, M. (2010). Facebook's Zuckerberg Says The Age of Privacy is Over. Readwriteweb. Retrieved Jul. 30, 2013, from http://readwrite.com/2010/01/09/facebooks_zuckerberg_says_the_age_of_privacy_is_ov#awesm=~odbJH5vurCkwzi

Kyllo v. United States(2001). 533 U. S. 27.

Lane et al. v. Facebook, Inc et al. , (2011).

Lawrence v. Texas(2003)539 U. S. 558.

Lessig, L. (2007). The Vision for the Creative Commons: What are we and where are we headed? Free Culture. USA: Sydney University Press.

Levin, A. & Abril, P. S. (2009). Patricia, Two Notions of Privacy Online. Vanderbilt Journal of Entertainment & Technology Law, 11, 1001-1005.

Levmore, S. & Nussbaum, M. C. (2011). The Offensive Internet: Speech, Privacy, and Reputation. USA: Harvard University Press.

Mayer-Schonberger, V. (2009). Delete: The Virtue of Forgetting in the Digital Age. USA: Princeton University Press.

Murray, R. (2012). Maryland bill bans employers from asking for Facebook, social media passwords. New York Daily News.

Musser, J. & O'Reilly, T. (2006). Web 2. 0: Principles and best practices. Sebastopol, CA: O'Reilly Media Inc.

Meyer v. Nebraska(1923). 260 U. S. 390.

Missouri v. Danforth(1976). 428 U. S. 52.

Moreno v. Hanford Sentinel (2009). Inc. , 91 Cal. Rptr. 3d 858.

Nader v. General Motors Corp. , 255 N. E. 2d 765 (N. Y. 1970).

Navetta, D. (2011). Infosec Island website, FTC Privacy Enforcement and the Google Buzz Settlement. Retrieved Sep. 14, 2013, from https://www.infosecisland.com/blogview/12823-FTC-Privacy-Enforcement-and-the- Google-Buzz-Settlement.html

Nissenbaum, H. (2004). Privacy as Contextual Integrity, Washington Law Review, 79, 119.

Nissenbaum, H. (2010), Privacy In Context: Technology, Policy, And The Integrity Of Social Life. USA: Stanford Law Books.

OUT-LAW News. (2010). Cookie consent can't be implied from browser settings, say privacy watchdogs. Retrieved Sep. 20, 2013, from http://www.out-law.com/page-11176.

OUT-LAW News. (2011). Government working on browser solution for new cookie law, says spokesman. Retrieved Sep. 20, 2013, from http://www.out-law.com/page-11807

Out-LawNews. (2013). Telecoms companies now subject to new personal data breach notification rules. Retrieved Dec. 20, 2013, from http://www.out-law.com/en/articles/2013/august/telecoms-companies-now-subject-to-new-personal-data-breach-notification-rules/

Opsahl, K. (2010). Facebook's Eroding Privacy Policy: A Timeline. Retrieved Aug. 24, 2013 from https://www. eff. org/deeplinks/2010/04/facebook-timeline

Opsahl, K. (2010). A Bill of Privacy Rights for Social Network Users. Retrieved Aug. 24, 2013 from https://www.eff.org/deeplinks/2010/05/bill-privacy-rights-social-network-users

Opsahl, K. (2010). Facebook Moves Closer to EFF Bill of Privacy Rights. Retrieved Aug. 24, 2013 from https://www.eff.org/deeplinks/2010/10/facebook-moves-closer-eff-bill-privacy-rights

O'Reilly, T. (2005). What is web 2. 0? Retrieved Jul. 20, 2013, from http://oreilly.com/web2/archive/what-is-web-20.html

O'Reilly , T. (2006). Web 2. 0 Compact Definition: Trying Again. Retrieved Aug. 9, 2013, from http://radar.oreilly.com/2006/12/web-20-compact-definition-tryi.html.

Patton, M. Q. (1990). Qualitative evaluation and researchmethods. London: Sage Publications.

Pearson, B. (2013). B. 2. C. , Protecting Privacy in a Smartphone World. Retrieved Jul. 20, 2013, from http://www.business2community.com/mobile-apps/protecting-privacy-smartphone-world-0621988

Peters, D. (2013). CC’s Next Generation Licenses- Welcome Version 4.0. Retrieved Aug. 20, 2014, from http://creativecommons.org/weblog/entry/40768

Posner, R. A. (1981). The Economics Of Justice.

Reding, V. (2011). EUJustice Commissioner Independent Data Protection Authorities:IndispensableWatchdogs of the Digital Age Meeting of the Article 29 Working Party Brussels. Retrieved Jul. 20, 2013, from http://europa.eu/rapid/press-release_SPEECH-11-863_en.htm

Prosser, W. L. (1960). Privacy. California Law Review, 48(3), 386-388.

Quinlan, I. (1976). 70 N. J. 10, 355 A. 2d 647, cert. denied, 429 U. S. 922.

Ramirez, E. (2013). The Privacy Challenges of Big Data: A View From the Lifeguard's Chair. Technology Policy Institute Aspen Forum.

Reiman, J. H. (1976). Privacy, intimacy, personhood. Philosophy & Public Affairs, 6(1), 26-44.

Richards, J. (2008). Fake Facebook profile’ victim awarded £22, 000. Retrieved Aug. 3, 2014 from http://www.thetimes.co.uk/tto/technology/article1858981.ece

Riles, A. (1999). Wiginore Treasure Box: Comparative Law in the Era of Information. Harvard International Law Journal, 40(3), 231-241.

Roe v. Wade(1973). 410 U. S. 113.

Romer v. Evans(1996). 517 U. S. 620.

Rosen, J. (2011). Free Speech, Privacy, and the Web that Never Forgets. Journal on Telecommunications & High Technology Law, 9(2), 345.

Rosen, J. (2012). The Right to Be Forgotten. Stanford Law Review Online, 64, 88.

Ross, C. , Orr, E. S. , Sisic, M. , Arseneault, J. M. , Simmering, M. G. &; Orr, R. R. (2009). Personality and motivations associated with facebook use. Computer in Human Behavior, 25(2), 578-586.

Rubinstein, I. (2011). Regulating Privacy by Design, Berkeley Technology Law Journal, 26, 1409-1422.

Schmidt, T. S. (2006). Inside the Backlash Against Facebook. Retrieved Aug. 3, 2014 from http://content.time.com/time/nation/article/0,8599,1532225,00.html

Schoeman, F., D. (1984). Privacy philosophical dimensions of the literature. In Schoeman F. D. (Eds.), Philosophical dimensions of privacy:An anthology, 1-33. New York: Cambridge University Press.

Selbst, A. D. (2013). Contextual Expectations of Privacy. Cardozo Law Review, 35, 643.

Sibble, J. (2011). Recent Developments in Internet Law. Intellectual Property & Technology Law Journal,23(4), 12.

Simon, D. A. (2011). An Empirical Analysis of Fair Use Decisions under the Uniform Domain-Name Dispute-Resolution Policy. Boston College Law Review, 53(1), 65-71.

Slobogin, C. & Schumacher, J. E. (1993). Resonable Expectations of Privacy and Autonomy in Forth Amendment cases: An Empirical Look at “Understandings Recognized and Permitted by Society ”. Duke Law Journal, 42, 727.

Smith v. Maryland(1979). 422 U. S. 735.

Solove, D. J. (2004). The Digital Person: Technology And Privacy In The Information Age. USA: New York University Press.

Solove, D. J. (2007). The future of reputation gossip, rumor, and privacy on the internet. USA: Yale University Press.

Solove, D. J. (2008). Understanding Privacy. USA: Harvard University Press.

Simitis, S. (1999). Revisiting Sensitive Data, 1 Review of the answers to the Questionnaire of the Consultative Committee of the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data. Retrieved Aug. 20, 2013, from http://www.coe.int/t/dghl/standardsetting/dataprotection/Reports/Report_Simitis_1999.pdf

Sipple v. Chronicles Publ’g Co. (Cal. Ct. App. 1984).

Steven Musil.(2011). C/NET, Facebook faces lawsuit over facial-recognition feature. Retrieved Jul. 20, 2013, from http://news.cnet.com/8301-1023_3-57322815-93/facebook-faces-lawsuit-over-facial-recognition-feature/

Swartz, J. (2007). Soon Millions of Facebookers Won't Be Incognito. Usa Today.

Tene, O. (2011). You've Been Tagged, Center for Internet and Society. Retrieved Sep. 20, 2013, from http://cyberlaw.stanford.edu/node/6642

United States v. Miller, 425 U. S. 435 (1976).

United States v. Walser, 275 F. 3d. 981 (10th Cir. 2001).

Vacco v. Quill(1997). 521 U. S. 793.

Voss, W. G. (2012). Preparing for the Proposed EU General Data ProtectionRegulation: With or Without Amendments. Business Law Today. Retrieved Jul. 20, 2013, from http://www.americanbar.org/publications/blt/2012/11/01_voss.html

Walker L. A. (2000). ICANN’s Uniform Domain Name Dispute Resolution Policy. Berkeley Technology Law Journal, 15, 289-291.

Washington v. Glucksberg(1997). 521 U. S. 702.

Westin, A. (1967). Privacy and Freedom.

Whitman, J. Q. (2004). The Two Western Cultures of Privacy: Dignity versus Liberty. The Yale Low Journal, 113, 1151-1219.

Wikipedia. (2013). Social Networking Services. Retrieved Jul. 20, 2013, from http://en.wikipedia.org/wiki/Social_network_services.

Wikipedia. (2013). facebook. Retrieved Jul. 20, 2013, from http://en.wikipedia.org/wiki/Facebook.

William H. M. (1995). Identity Cards and Databases in Health Core: The Need for FederalPrivacy Protection, 28 COLUM. J. L. & SOC. PROBS. 253 (1995);Paul M. Schwartz, The Protection ofPrivacy in Health Care Reform. Vanderbilt Law. Review, 48, 295.

Wilson v. Harvey, 164 Ohio App. 3d 278.

WIPO. (2014). Curu Denim Inc.v. Abu-Harb. Harvard Law Review, 127, 2130.

WIPO. (2014). Total Number of Cases per Year. Retrieved Aug. 20, 2014, from http://www.wipo.int/amc/en/domains/statistics/cases.jsp

Wisconsin v. Yoder(1972). 406 U. S. 205.

Wong, R. (2007). Date Protection Online: Alternative Approaches to Sensitive Data, Journal of International Commercial Law and Technology, 2(1), 9.

Zeller, T. (2006). AOL Executive Quits After Posting of Search Data, International Herald Tribune. Retrieved Mar. 2, 2014, from http://www.nytimes.com/2006/08/22/technology/22iht-aol.2558731.html

Zuckerberg, M. (2006) . An Open Letter from Mark Zuckerberg. Retrieved Aug. 3, 2014, from https://www.facebook.com/notes/facebook/an-open-letter-from-mark-zuckerberg/2208562130
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code