题名

社群網路時代的隱私困境:以Facebook為討論對象

并列篇名

The Privacy Dilemma in the Social Networking Age: With a Focus on Facebook

DOI

10.6199/NTULJ.2012.41.01.01

作者

劉靜怡(Ching-Yi Liu)

关键词

社群網站 ; 資訊隱私權理論 ; 言論自由 ; 臉書 ; 個人資料保護 ; 資訊隱私 ; 情境脈絡完整性 ; 被遺忘的權利 ; social network sites ; information privacy theories ; freedom of speech ; Facebook ; protection of personal information ; information privacy ; contextual integrity ; right to be forgotten

期刊名称

臺大法學論叢

卷期/出版年月

41卷1期(2012 / 03 / 01)

页次

1 - 70

内容语文

繁體中文

中文摘要

本文探討社群網路時代帶來的隱私困境。隨著網路科技所創造的環境日新月異,「線上書寫」的型態也不斷改變,網路使用者在網路上揭露和分享私人故事的現象,幾乎成了社群網路的常態,因此,本文將以Facebook所引發的隱私爭議為例,分析此一隱私困境的面貌,並探索其解決之道。本文首先介紹社群網路的特徵,做為探討社群網路所衍生之隱私爭議的基礎,其次,本文將說明社群網路對使用者帶來的隱私風險為何,並且以Helen Nissenbaum強調情境脈絡完整性的資訊隱私權理論,來說明這些爭議的癥結之處,以探討社群網站隱私爭議的解決方向。

英文摘要

This article explores the privacy dilemma in the social networking age. It provides an analysis of the law and policy of privacy on social network sites, using Facebook as its principal example. It first explains the features of social network sites and how Facebook users socialize on the site. Secondly, it analyzes how and why Facebook users misunderstand the risks involved, and how their privacy suffers as a result. This article further tries to apply Nissenbaum's ”contextual integrity” theory of privacy to understand the privacy issues arising from Facebook platform and how policymakers can help preserve user privacy on social network sites.

主题分类 社會科學 > 法律學
参考文献
  1. Stone, B. (2010, April 22). For web' s new wave, sharing details is the point. New York Times, p. A1.
  2. Postman, N. (1990). Informing ourselves to death, address before the German informatics society. Retrieved from http://www.mat.upm.es/~jcm/postman-informing.html
  3. Williams, A. (2006, October 15). Planet Google wants you. New York Times, p. 9.1.
  4. Gonsalves, A. (2006, September 8). Facebook founder apologizes in privacy flap; Users given more control. Information Week. Retrieved from http://www.informationweek.com/news/192700574
  5. UK Information Commissioner' s Office (2011, January 14). The Information Commissioner' s response to a comprehensive approach on personal data protection in the European Union. Retrieved from http://www.ico.gov.uk/SearchResultAsHtml.aspx?cid=WIFIMCxWbrYJ&page=http://www.ico.gov.uk/news/current_topics/~/media/documents/library/Data_Protection/Detailed_specialist_guides/european_commission_dp_strategy_response.ashx&keywords=right to be forgotten
  6. Nick O' Neill, N. (2008, July 29). Facebook starts recommending friends not on site. Retrieved from http://www.allfacebook.com/2008/07/facebook-starts-recommending-friends-not-on-site/
  7. Arrington, M. (2008, January 3). Plaxo flubs it. TechCrunch. Retrieved from http://www.techcrunch.com/2008/0103/plaxo-flubs-it/
  8. O'Reilly, T. (2005). What is web 2.0: Design patterns and business models for the next generation of software. Retrieved from http://oreilly.com/web2/archive/what-is-web-20.html
  9. Stone, B. (2007, August 6). A mystery solved: "Fake Steve" is an editor. New York Times, p. C1.
  10. Gould, E. (2008, May 25). Exposed. New York Times. Retrieved from http://www.nytimes.com/2008/05/25/magazine/25internet-t.html
  11. Markoff, J. (2007, September 1). Who found the bright idea? New York Times, p. C1.
  12. Swartz, J. (2007, September 12). Soon millions of Facebookers won't be incognito. USA TODAY, p. B3.
  13. EUROPA (2011, December. 7). Viviane reding vice-president of the european commission, EU justice commissioner independent data protection authorities: indispensable watchdogs of the digital age meeting of the article 29 working party Brussels. Retrieved from http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/11/863&format=HTML&aged=0&language=EN&guiLanguage=en
  14. Jones, T. (2008, January 10). A deadly web of deceit: A teen's online "friend" proved false, snd cyber-vigilantes are avenging her. Washington Post, p. C1.
  15. Abril, P. S.(2007).A (My)Space of one' s own: On privacy and online social networks.Northwestern Journal of Technology and Intellectual Property,6(1),73-88.
  16. Allen, A. L.(2008).Dredging up the past lifelogging memory, and surveillance.University of Chicago Law Review,75(1),47-74.
  17. Barth, A.,Datta, A.,Mitchell, J. C.,Nissenbaum, H.(2006).Privacy and contextual integrity: Framework and applications.2006 IEEE Symposium on Security and Privacy
  18. Bellia, P. L.,Freiwald, S.(2008).Fourth amendment protection for stored e-mail.University of Chicago Legal Forum,2008,121-178.
  19. Benkler, Y.(2001).Siren songs and Amish children: Autonomy, information and law.New York University Law Review,76(1),23-113.
  20. Benkler, Y.(2006).The wealth of networks: How social production transforms markets and freedom.New Haven:Yale University Press.
  21. Benkler, Y.(2002).Coase' s penguin, or, Linux and the nature of the firm.Yale Law Journal,112(1),369-446.
  22. Blackman, J.(2009).Omniveillance, Google, privacy in public, and the right to your digital identity: A tort for recording and disseminating an individual's image over the Internet.Santa Clara Law Review,49,313-392.
  23. Boyd, D. M.(2004).Friendster and publicly articulated social networks.Proceedings of ACM conference on human factors in computing systems,New York:
  24. Boyd, D. M.,Ellison, N. B.(2007).Social network sites: Definition, history, and scholarship.Journal of Computer-Mediated Communication,13(1),210-230.
  25. Brin, D.(1999).Transparent society: Will technology force us to choose between privacy and freedom?.New York:Basic Books.
  26. Carroll, M. W.(2006).Creative commons and the new intermediaries.Michigan State Law Review,45(1),45-65.
  27. Ciocchetti, C. A.(2007).E-commerce and information privacy: Privacy policies as personal information protectors.American Business Law Journal,44(1),55-126.
  28. Cohen, J. E.(2005).The place of the user in copyright law.Fordham Law Review,74,347-374.
  29. Cohen, J. E.(2007).Cyberspace as/and space.Columbia Law Review,107(1),210-256.
  30. Collins, L.(2008).Friend game.New Yorker,2008(January 21),34.
  31. Cote, M.(2007).Note, getting dooced: Employee blogs and employer blogging policies under the national Labor Relations Act.Washington Law Review,82(1),121-148.
  32. Dreyfuss, R. C.(1999).Warren and Brandeis Redux: Finding (more) privacy protection in intellectual property lore.Stanford Technology Law Review,1999,8.
  33. EU Commission(2010).COM(2010) 609 finalCOM(2010) 609 final,Brussels:.
  34. Freiwald, S.(2001).Comparative institutional analysis in cyberspace: The case of intermediary liability for defamation.Harvard Journal of Law & Technology,14,569-655.
  35. Freiwald, S.(2009).A comment on James Grimmelmann' s saving facebook.Iowa Law Review Bulletin,95,5-11.
  36. Gajda, A.(2009).Judging journalism: The turn toward privacy and judicial regulation of the press.California Law Review,97,1039-1105.
  37. Gelman, L.(2009).Privacy, free speech, and "blurry-edged" social networks.Boston College Law Review,50(5),1315-1344.
  38. Gillmor, D.(2004).We the media: Grassroots journalism by the people, for the people.Sebastopol:O'Reilly.
  39. Goldman, E.(2006).A coasean analysis of marketing.Wisconsin Law Review,2006,1151-1221.
  40. Grimmelmann, J.(2009).Saving facebook.Iowa Law Review,94,1137-1206.
  41. Grossman, W. M.(1998).Net.wars.New York:New York University Press.
  42. Hashemi, Y.(2009).Facebook' s privacy policy and its third-party partnerships: Lucrativity and liability.Boston University Journal of Science & Technology Law,15,140-161.
  43. Jones, S.(Ed.)(2003).Encyclopedia of new media: An essential reference to communication and technology.Thousand Oaks:Sage Publications.
  44. Kahan, D. M.,Slovic, P.,Braman, D.,Gastil, J.(2006).Fear of democracy: A cultural evaluation of sunstein on risk.Harvard Law Review,119,1071-1109.
  45. Keen, A.(2008).The cult of the amateur: How blogs, Myspace, Youtube, and the rest of today's user-generated media are destroying our economy, our culture, and our values.New York:Doubleday.
  46. Kerr, O. S.(2009).The case for the third-party doctrine.Michigan Law Review,107,561-601.
  47. Kesan, J. P.,Shah, R. C.(2006).Setting software defaults: Perspectives from law, computer science and behavioral economics.Notre Dame Law Review,82,583-634.
  48. Komesar, N. K.(1994).Imperfect alternatives: Choosing institutions in law, economics, and public policy.Chicago:The University of Chicago Press.
  49. Kriescher, M.(2009).Professional benefits of online social networking.The Colorado Lawyer,38(2),61-64.
  50. Lee, E.(2009).Developing copyright practices for user-generated content.Journal of Internet Law,13,1-21.
  51. Lessig, L.(1999).Code and other laws of cyberspace.New York:Basic Books.
  52. Levmore, S.(ed.),Nussbaum, M. C.(ed.)(2010).The offensive Internet: speech, privacy, and reputation.Cambridge:Harvard University Press.
  53. Mayer-Schönberger, V.(2009).Delete: The virtue of forgetting in the digital age.Princeton:Princeton University Press.
  54. McClurg, A. J.(1995).Bringing privacy law out of the closet: A tort theory of liability for intrusions in public places.North Carolina Law Review,73,989-1089.
  55. Mcgeveran, W.(2009).Disclosure, endorsement, and identity in social marketing.University of Illinois Law Review,2009(4),1105-1166.
  56. Mulligan, D. K.,Perzanowski, A. K.(2007).The magnificence of the disaster: Reconstructing the Sony BMG rootkit incident.Berkeley Technology Law Journal,22,1157-1232.
  57. Nissenbaum, H.(1998).Protecting privacy in an information age: The problem of privacy in public.Law and Philosophy,17,559-596.
  58. Nissenbaum, H.(2010).Privacy in context: Technology, policy, and the integrity of social life.Stanford:Stanford Law Books.
  59. Nissenbaum, H.(2004).Privacy as contextual integrity.Washington Law Review,79(1),119-158.
  60. Picker, R. C.(2008).Competition and privacy in web 2.0 and the cloud.Northwestern University Law Review,103,1-12.
  61. Post, R. C.(2001).Three concepts of privacy.Georgetown Law Journal,89(6),2087-2101.
  62. Putnam, R. D.(2000).Bowling alone: The collapse and revival of American community.New York:Simon & Schuster.
  63. Richards, N. M.(2005).Reconciling data privacy and the first amendment.UCLA Law Review,52(4),1149-1222.
  64. Richards, N. M.,Solove, D. J.(2007).Privacy' s other path: Recovering the law of confidentiality.Georgetown Law Journal,96(1),123-182.
  65. Rodrigues, R.(2008).You' ve been poked: Privacy in the era of Facebook.The SciTech Lawyer,5(1),18-19+24.
  66. Rubenfeld, J.(2008).The end of privacy.Stanford Law Review,61(1),101-162.
  67. Samuelson, P.(2009).Unbundling fair uses.Fordham Law Review,77(5),2537-2622.
  68. Shirky, C.(2008).Here comes everyone: The power of organizing without organizations.New York:Penguin Group USA.
  69. Slobogin, C.(2007).Privacy at risk: The new government surveillance and the fourth amendment.Chicago:University of Chicago Press.
  70. Solove, D. J.(2008).Understanding privacy.Cambridge:Harvard University Press.
  71. Solove, D. J.(2004).The digital person.New York:New York University Press.
  72. Solove, D. J.(2007).The future of reputation: Gossip, rumor, and privacy on the Internet.New Haven:Yale University Press.
  73. Solove, D. J.(2006).A tale of two bloggers: Free speech and privacy in the blogosphere.Washington University Law Review,84,1195.
  74. Solove, D. J.(2006).A taxonomy of privacy.University of Pennsylvania Law Review,154(3),477-560.
  75. Sprague, R.(2008).Rethinking information privacy in an age of online transparency.Hofstra Labor and Employment Law Journal,25(2),395-417.
  76. Sprague, R.(2007).Fired for blogging: Are there legal protections for employees who blog?.University of Pennsylvania Journal of Labor and Employment Law,9(2),355-387.
  77. Strahilevitz, L. J.(2005).A social networks theory of privacy.University of Chicago Law Review,72,919-988.
  78. Sunstein, C. R.(2005).Laws of fear: Beyond the precautionary principle.New York:Cambridge University Press.
  79. Tien, L.(2004).Architectural regulation and the evolution of social norms.Yale Journal of Law & Technology,7,1-22.
  80. Turner, F.(2008).From counterculture to cyberculture: Steward brand, the whole earth network, and the rise of digital utopianism.Chicago:University of Chicago Press.
  81. Wallace, P.(1999).The psychology of the Internet.New York:Cambridge University Press.
  82. Whitman, J. Q.(2004).The two western cultures of privacy: Dignity versus liberty.Yale Law Journal,113(6),1151-1221.
  83. Zimmer, M.(2008).Privacy on planet Google: Using the theory of "contextual integrity" to clarify the privacy threats of Google' s quest for the perfect search engine.Journal of Business & Technology Law,3(1),109-126.
  84. Zittrain, J.(2009).The future of the Internet - And how to stop it.New Haven:Yale University Press.
  85. Zittrain, J.(2006).The generative Internet.Harvard Law Review,119(7),1974-2040.
  86. 李榮耕(2010)。論偵查機關對通信紀錄的調取。政大法學評論,115,115-147。
  87. 邱文聰(2009)。從資料自決與資訊隱私的概念區分:評「電腦處理個人資料保護法修正草案」的結構性問題。月旦法學雜誌,168,172-189。
  88. 劉靜怡(2010)。不算進步的立法:「個人資料保護法」初步評析。月旦法學雜誌,183,174-164。
  89. 顏厥安編、林鈺雄編(2010)。人權跨國性司法實踐:歐洲人權裁判研究(三)。台北=Taipei:元照=Angle。
被引用次数
  1. 蔡仁祥、黃柏森、張益誠(2016)。個人資料保護管理制度之建構與實證研究-教育單位為例。電腦稽核,33,73-86。
  2. 蔡仁祥、黃柏森、張益誠(2016)。個人資料保護管理制度之建構與實證研究-教育單位為例。電腦稽核,33,73-86。
  3. 陳寶山、陳信助(2016)。探討雲端應用之資安問題:隱私權中的被遺忘權及其對台灣教育與社會層面的影響。學校行政,102,29-44。
  4. 陳棟樑,陳俐文,邱怡瑄(2019)。高中生Instagram持續使用意圖之研究。管理資訊計算,8(特刊1),100-113。
  5. 許炳華(2015)。被遺忘的權利:比較法之觀察。東吳法律學報,27(1),125-163。
  6. 許炳華(2022)。商業利用權與言論自由之調和-以美國法為借鏡。中正財經法學,25,61-126。
  7. 許恒達(2017)。新聞自由與記者的侵犯隱私行為:以業務上正當行為的解釋為中心。臺大法學論叢,46(2),589-664。
  8. 江淑琳(2014)。流動的空間,液態的隱私:再思考社交媒體的隱私意涵。傳播研究與實踐,4(1),85-104。
  9. 李寧修(2016)。消費資訊公開法制之建構:以德國消費資訊法為借鏡。歐美研究,46(4),501-561。
  10. 林昕璇(2020)。論大規模政府監控之資訊隱私保障-評析美國聯邦法院相關裁判。臺灣民主季刊,17(2),43-93。
  11. 劉育成(2018)。隱私不再?-以身體與訊息作為隱私概念雙重性的社會實作理論觀點探究。資訊社會研究,35,87-123。
  12. 劉仲矩、林宜慧(2015)。臉書使用者價值與忠誠度關聯研究:網路信任的干擾效果。企業管理學報,104,43-72。
  13. 翁清坤(2018)。賦予當事人個人資料財產權地位之優勢與侷限:以美國法為中心。臺大法學論叢,47(3),941-1051。
  14. 翁清坤(2020)。大數據對於個人資料保護之挑戰與因應之道。東吳法律學報,31(3),79-159。
  15. 蕭銘雄、李孟娟(2016)。國中生對社群網站 Facebook 使用動機與隱私設置之關聯性研究。Electronic Commerce Studies,14(4),499-525。
  16. 張陳弘(2015)。「目的外利用」個資行為之評價―兼評臺灣臺北地方法院103年度北小字第1360 號小額民事判決。法令月刊,66(3),54-74。
  17. 張陳弘(2018)。新興科技下的資訊隱私保護:「告知後同意原則」的侷限性與修正方法之提出。臺大法學論叢,47(1),201-297。
  18. (2014)。論資訊隱私:科技與商業發展脈絡下的觀察。中原財經法學,32,59-105。
  19. (2016)。網路時代個人資料保護之強化─被遺忘權利之主張。興大法學,19,61-106。
  20. (2017)。記憶或遺忘,抑或相忘於網路—從歐洲法院被遺忘權判決,檢視資訊時代下的個人資料保護。政大法學評論,148,1-68。
  21. (2018)。網路霸凌法律規制的規範取向之研析。月旦法學雜誌,280,185-218。
  22. (2018)。以比較法觀點規範網路服務提供者於防制性隱私內容外流之責任與義務。政大法學評論,154,150-236。
  23. (2023)。從德國 Facebook 案談競爭與隱私之交匯。公平交易季刊,31(1),1-66。