参考文献
|
-
陳志誠、林淑瓊、李興漢、許派立(2009)。資訊資產分類與風險評鑑之研究─以銀行業為例。資訊管理學報,16(3),55-84。
連結:
-
NII(2011),校務行政與個人資料保護。NII產業發展協進會。
-
Information Commissioners Office (2009). Privacy Impact Handbook. http://www.ico.gov.uk/handbook/June.2009. Accessed Dec. 2, 2011.
-
Cavoukian, A.(2008).Privacy in the clouds.Springer Identity in the Information Society,2008(18 December)
-
Chen, P. S.,Lin, S. C.,Li, S. -H.,Shi, P.(2011).The Classification of Information Assets and Risk Assessment Using the Banking Industry as an Example.Computers and Security
-
El Masri, A. A.,Sousa, J. P.(2009).Limiting Privacy Exposure in Online Transaction-A User-based Online Privacy Assurance Model.2009 International Conference on Computational Science and Engineering
-
Gellman, R.(2009).,未出版
-
Itani, W.,Kayssi, A.,Chehab, A.(2009).Privacy as a Service: Privacy-aware Data Storage and Processing in Cloud Computing Architectures.2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
-
Krukow, K.,Twigg, A.(2005).Distributed Approximation of Fixed-Points in Trust Structures.25th IEEE International Conference on Distributed Computing Systems
-
Pearson, S.(2009).Taking Account of Privacy when Designing Colud Computing Services.Proceedings of ICSE-Cloud'09,Vancouver:
-
Pearson, S.,Charlesworth, A.(2009).HP Labs Technical ReportHP Labs Technical Report,HP Labs.
-
Robinson, P.,Vogt, H.,Wagealla, W.(2005).Privacy, security, and trust within the context of pervasive computing.Springer Verlag.
-
Solove, D. J.(2005).Taxonomy of Privacy.University of Pennsylvania Law Review,154(3),477.
-
Tancock, D.,Person, S.,Charlesworth, A.(2010).,未出版
-
White, S. R.,Weingart, S. H.,Arnold, W. C.,Palmer, E. R.(1991).Technical ReportTechnical Report,IBM T. J. Watson Research Center.
-
王瀞慧、陳志誠(2011)。金融機構雲端運算架構下客戶資料防護之探討。2011產業資訊研討會暨個案競賽
-
陳志誠(2011)。國科會研究專題結案報告國科會研究專題結案報告,未出版
-
黃荷婷(2011)。個人資料保護業務公開作業範本說明。法務部100年度公務機關辦理個人資料保護業務公開作業研習會資料
|