参考文献
|
-
江淑琳(2014)。流動的空間,液態的隱私:再思考社交媒體的隱私意涵。傳播研究與實踐,4(1),85-104。
連結:
-
郭戎晉(2013)。論個人資料保護法制中「技術設計」入法趨勢—以歐盟為觀察對象。Communications of the CCISA,19(3),65-79。
連結:
-
郭明煌、廖鴻圖、蕭麗齡、王亭雅(2014)。資訊隱私顧慮對社群網站使用者使用意圖影響之研究—以Facebook為例。中華民國資訊管理學報,21(4),341-364。
連結:
-
黃聖峯、鄒仁淳、林娟娟(2014)。社群網站之使用行為研究—以Facebook為例。電子商務研究,12(2),201-234。
連結:
-
黃筱鈞、莊文勝(2012)。社交網站安全且有效率之擁護隱私保護機制。電子商務研究,10(3),257-268。
連結:
-
劉靜怡(2012)。社群網路時代的隱私困境:以Facebook為討論對象。台大法學論叢,41(1),1-70。
連結:
-
Agar, N.(2014).Truly human enhancement: A philosophical defense of limits.Cambridge, Massachusetts:The MIT Press.
-
Agre, P. E.(Ed.),Rotenberg, M.(Ed.)(1998).Technology and privacy: The new landscape.Cambridge, Massachusetts:The MIT Press.
-
Baecker, D.(Ed.)(1999).Problems of form.Stanford, California:Stanford University Press.
-
Bauman, Z.(2004).Liquid modernity.Cambridge:Polity Press.
-
Bauman, Z.、張君玫譯(1998)。全球化:對人類的深遠影響。台北市:群學。
-
Blackman, J.(2009).Omniveillance, Google, privacy in public, and the right to your digital identity: A tort for recording and disseminating an individual's image over theinternet.Santa Clara Law Review,49(2),313-392.
-
Blatterer, H.(ed.),Johnson, P.(ed.),Markus, M. R.(ed.)(2010).Modern privacy: Shifting boundaries.New Forms. UK:Palgrave Macmillan.
-
Blatterer, H.(Ed.),Johnson, P.(Ed.),Markus, M. R.(Ed.)(2010).Modern privacy: Shifting boundaries, new forms.UK:Palgrave Macmillan.
-
Bostrom, N.(2014).Superintelligence: Paths, dangers, strategies.Oxford, UK:Oxford University Press.
-
Broek, L. J. v. d.,Bergers, L. I. J. C.,Reijnders, C. M. A.,Gibbscorresponding, S.(2017).Progress and future prospectives in skin-on-chip development with emphasis on the use of different cell types and technical challenges.Stem Cell Reviews,13(3),418-429.
-
Cabrera, L. Y.(2015).Rethinking human enhancement: Social enhancement and emergent technologies.Hampshire, UK:Palgrave Macmillan.
-
Calvert, C.、林惠娸譯、陳雅汝譯(2000)。偷窺狂國家。台北:商周。
-
Castells, M.(2000).The rise of the network society.Oxford, U.K.:Blackwell Publishers.
-
Christin, D.,Reinhardt, A.,Kanhere, S. S.,Hollick, M.(2011).A survey on privacy in mobile participatory sensing applications.The Journal of Systems and Software,84,1928-1946.
-
Craig, T.(ed.),Ludloff, M. E.(ed.)(2011).Privacy and big data.Sebastopol, CA:O'Reilly.
-
Dijk, J. A. G. M. v.(2006).The network society: Social aspects of new media.London:SAGE Publications.
-
Dwyer, T.(2015).Convergent media and privacy.Hampshire, UK:Palgrave Macmillan.
-
Eilers, M.(ed.),Grüber, K.(ed.),Rehmann-Sutter, C.(ed.)(2014).The human enhancement debate and disability: New bodies for a better life.Hampshire, UK:Palgrave Macmillan.
-
Fiore-Gartland, B.,Neff, G.(2015).Communication, mediation, and the expectations of data: Data valences across health and wellness communities.International Journal of Communication,9,1466-1484.
-
Fortunati, L.(2003).Real people, artificial bodies.Mediating the human body: Technology, communication, and fashion,New Jersey:
-
Frye, C. D.(2001).Privacy-enhanced business.Westport, Connecticut:Quorum Books.
-
Garfinkel, H.(1992).Studies in ethnomethodology.Cambridge:Polity Press.
-
Gavison, R.(1980).Privacy and the limits of the law.Yale Law Journal,89,421-471.
-
Hassan, R.(2009).Empires of speed: Time and the acceleration of politics and society.Leiden:Brill.
-
Hauskeller, M.(2013).Better human? Understanding the enhancement project.Durham, UK:Acumen.
-
Heidegger, M.(1992).Basic writings: Ten key essays, plus the Introduction to Being and Time.San Francisco:
-
Hoyle, R.,Templeman, R.,Armes, S.,Anthony, D.,Crandall, D.,Kapadia, A.(2014).Privacy behaviors of lifeloggers using weearable cameras.UbiComp '14 Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing,Seattle, Washington:
-
Ihde, D.(1990).Technology and the lifeworld.Bloomington:Indiana University Press.
-
Katherine, A.(2013).Boundaries in an overconnected world.Novato, California:New World Library.
-
Katz, J. E.(Ed.)(2003).Machines that becomes us.New Brunswick:Transaction Publishers.
-
Lane, J.(Ed.),Stodden, V.(Ed.),Bender, S.(Ed.),Nissenbaum, H.(Ed.)(2014).Privacy, big data, and the public good: Frameworks for engagement.Cambridge:Cambridge University Press.
-
Lash, S.(2002).Critique of information.London:Sage.
-
Levmore, S.(Ed.),Nussbaum, M. C.(Ed.)(2010).The offensive internet: Speech, privacy, and reputation.Cambridge, Massachusetts:Harvard University Press.
-
Levy, S.(2001).Crypto.New York:Viking Penguin.
-
Lilley, S.(2013).Transhumanism and society: The social debate over human enhancement.New York:Springer.
-
Longo, G. O.(2003).Body and technology: Continuity or discontinuity.Mediating the human body: Technology, communication, and fashion,New Jersey:
-
Luhmann, N.(1984).The self-description of society: Crisis fashion and sociological theory.International Journal of Comparative Sociology,25(1-2),59-72.
-
Luhmann, N.(1995).The paradoxy of observing systems.Cultural critique: The politics of systems and environments, Part II,31,37-55.
-
Luhmann, N.,Fuchs, S.(1988).Tautology and paradox in the self-descriptions of modern society.Sociological Theory,6(1),21-37.
-
Lupton, D.(2014).Digital sociology.London:Routledge.
-
Lyon, D.(Ed.),Zureik, E.(Ed.)(1996).Computers, surveillance, and privacy.Minneapolis:University of Minneapolis Press.
-
Madden, M. (2012). Privacy management on social media sites. Retrieved from Washington, D.C.:
-
Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., & Beaton, M. (2013). Teens, social media, and privacy. Retrieved from Washington, D.C.
-
Maldonado, T.(2003).The body: Artificialization and transparency.Mediating the human body: Technology, communication, and fashion,New Jersey:
-
Marwick, A. E.,boyd, d.(2014).Networked privacy: How teenagers negociate context in social media.New Media & Society,16(7),1051-1067.
-
Mason, P.(2015).Postcapitalism: A guild to our future.UK:Penguin.
-
Mauss, M.(1973).Techniques of the body.Economy and Society,2(1),70-88.
-
McLuhan, M.(1994).Understanding media: The extension of man.Cambridge, Massachusetts:The MIT Press.
-
Moore, B.(1984).Privacy: Studies in social and cultural history.Armonk, New York:M. E. Sharpe, INC..
-
Nemati, H. R.(Ed.)(2009).Techniques and applications for advanced information privacy and security.New York:IGI Global.
-
Nissenbaum, H.(2010).Privacy in context: Technology, policy, and the integrity of social life.Stanford, California:Stanford University Press.
-
O'Hara, K.,Shadbolt, N.(2008).The spy in the coffee machine: The end of privacy as we know it.London:Oneworld Publications.
-
Preneel, B.(Ed.),Ikonomou, D.(Ed.)(2014).Privacy technologies and policy.Switzerland:Springer International Publishing.
-
Rainie, L., Kiesler, S., Kang, R., & Madden, M. (2013). Anonymity, privacy, and security online. Retrieved from http://www.pewinternet.org/2013/09/05/anonymity-privacyand-security-online/
-
RocketFuel. (2014). “Quantified self” digital tools: A CPG marketing opportunity. Retrieved from http://quantifiedself.com/docs/RocketFuel_Quantified_Self_Research.pdf
-
Rosa, H.(2003).Social acceleration: Ethical and political consequences of a desycchronized high-speed society.Constellations,10(1),3-33.
-
Rosa, H.(Ed.)(2009).High-speed society.University Park, Pennsylvania:The Pennsylvania State University Press.
-
Rosa, H.,Trejo-Mathys, J.(Trans.)(2013).Social acceleration: A new theory of modernity.New York:Columbia University Press.
-
Rudder, C.(2014).Dataclysm: Who we are.New York:Crown Publishers.
-
Schiphorst, T.(2009).Body matters: The palpability of invisible computing.Leonardo,42(3),225-230.
-
Selke, S.(Ed.)(2016).Lifelogging: digital self-tracking and lifelogging - between disruptive technology and cultural transformation.Wiesbaden:VS Verlag fur Sozialwissenschaften.
-
Solove, D. J.(2007)."I've got nothing to hide" and other misunderstanding of privacy.San Diego Law Review,44,745-772.
-
Solove, D. J.(2004).The digital person.New York:New York University.
-
Spencer-Brown, G.(1969).Laws of form.London:Geroge Allen and Unwin Ltd..
-
Stiegler, B.,Beardsworth, R.(Trans.) ,Collins, G.(Trans.)(1998).Technics and time.Stanford, California:Stanford University Press.
-
Strandburg, K. J.(Ed.),Raicu, D. S.(Ed.)(2006).Privacy and technologies of identity.New York:Springer.
-
Virilio, P.,Turner, C.(Trans.)(2005).The information bomb.London:Verso.
-
Wajcman, J.(2014).Pressed for time: The acceleration of life in digital capitalism.Chicago:The University of Chicago Press.
-
Waldo, J.,Lin, H. S.,Millett, L. I.(2007).Engaging privacy and information technology in a Digital age.
-
West, C.,Fenstermaker, S.(1995).Doing difference.Gender & Society,9(1),8-37.
-
West, C.,Zimmerman, D. H.(1987).Doing gender.Gender & Society,1(2),125-151.
-
West, C.,Zimmerman, D. H.(2009).Accounting for doing gender.Gender & Society,23(1),112-122.
-
Wufuer, M.,Lee, G.,Hur, W.,Jeon, B.,Kim, B. J.,Choi, T. H.,Lee, S.(2016).Skin-ona-chip model simulating inflammation, edema and drug-based treatment.Scientific Reports,6(37471),1-12.
-
Yu-cheng, L.(2012).Ethnomethodology reconsidered: The practical logic of systems theory.Current Sociology,60(5),581-598.
-
王俊程、李宜昌、洪銘建(2002)。隱私市場—數位商品分享之價值。資訊管理研究,4(3),119-136。
-
邢姍姍、閻瑞彥、蔡馨瑩、張家菱(2013)。隱私或人氣?隱私態度與個人因素對社群網站後續使用行為之影響。北商學報,24,71-92。
|