题名

電子商業交易的爭議解決機制

并列篇名

Dispute Resolution Mechanism for Electronic Transaction

DOI

10.6382/JIM.200201.0107

作者

黃景彰(Jing-Jang Hwang);沈曉芸(Hsiao-Yun Shen)

关键词

電子交易爭議解決機制 ; 不可否認服務 ; 證據 ; 資訊安全 ; 網路證券 ; disputes resolution ; non-repudiation service ; evidence ; information security ; on-line trading on securities

期刊名称

資訊管理學報

卷期/出版年月

8卷2期(2002 / 01 / 01)

页次

107 - 119

内容语文

繁體中文

中文摘要

電子商務是在二十世紀末期出現的新的商業活動方式,正如同傳統的商業活動,商業交易的「爭議」是無可避免的。因此,一個可以解決交易爭議的機制,是電子商務的環境所必須建立的。由於「證據」是解決爭議的關鍵要素,故爭議解決機制必須能夠在交易事件發生時,產生、記錄、傳遞、儲存與檢驗證據,並在有爭議發生時,取出證據以為依循。本文以相關的國際標準與學術文獻為理論背景,依據所應用的密碼學方法環境??對稱式與非對稱式密碼方法??歸納得到二類電子商業交易中爭議解決機制的一般模型(generic model)。此外,基於該模型,以臺灣網路證券交易市場為例,並以現行契約準則及正在立法院審議的電子簽章法草案為依據,設計適用的交易爭議解決機制。

英文摘要

Closing to the end of last century, electronic commerce emerged as a new way of doing business. As in the old commerce, disputes are inevitable; therefore, mechanisms for disputes resolution are essential even in the world of cyberspace. Since evidence is the key to resolve disputes, those mechanisms must entail procedures defining the generation, record, transfer and verification of evidence about the occurrence of an e-commerce event, and the retrieval of this evidence if disputes arise later on. Generalized from relevant international standards, two generic models are proposed in this paper for disputes resolution. The models are classified according to their underlying cryptography-symmetric or asymmetric cryptography. Then the models are applied to define a scheme that would help to resolve disputes arising from on-line trading in the Taiwan securities market. The scheme complies with the current regulations and the draft of the digital-signature law, which is now under review in the Legislative Yuan of the government.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 管理學
参考文献
  1. (1999)。電子簽章法草案。
  2. Coffey, T.,Saidha, P.(1996).Nonrepudiation with mandatory proof of receipt.Computer Communication Review,26(1)
  3. International Organization for Standardization/ International Electrotechnical Commission(1997).Information Technology - Security Techniques - Non-repudiation Part 2: Mechanisms using symmetric techniques.
  4. International Organization for Standardization/ International Electrotechnical Commission(1997).Information Technology - Security Techniques - Non-repudiation Part 1: General.
  5. International Organization for Standardization/ International Electrotechnical Commission(1997).Information Technology - Open Systems Interconnection - Security frameworks for open system: Non-repudiation framework.
  6. International Organization for Standardization/ International Electrotechnical Commission(1997).Information Technology - Security Techniques - Non-repudiation Part 3: Mechanisms using asymmetric techniques.
  7. McCullagh, A.,Caelli, W.(2000).Nonrepudiation in the digital environment.First Monday,5(8)
  8. You, Cheng Hwee,Zhou, Jianying,Lam, Kwok Yan(1998).On the efficient implementation of fair non-repudiation.Computer Communication Review,28(5)
  9. Zhou, J.,Gollmann, D.(1997).Proceedings of 10th IEEE Computer Security Foundations Workshop.
  10. Zhou, Jianying,Gollmann, D.(1997).Evidence and non-repudiation.Journal of Network and Computer Applications,20(3)
  11. 黃景彰 Hwang, Jing-Jang(2001)。資訊安全?電子商務之基礎。華泰書局。
被引用次数
  1. 黃景彰、邵敏華、吳壽山(2003)。解析及建立電子商務中價值移轉週期的證據責任鏈。資訊管理學報,9(2),109-128。