参考文献
|
-
翁清坤(2013)。告知後同意與消費者個人資料之保護。臺北大學法學論叢,87,217-322。
連結:
-
翁清坤(2010)。論個人資料保護標準之全球化。東吳法律學報,22(1),1-60。
連結:
-
翁清坤(2016)。網路上隱私權政策之效力:以美國法為中心。臺大法學論叢,45(1),151-248。
連結:
-
劉靜怡(2012)。社群網路時代的隱私困境:Facebook 為討論對象。臺大法學論叢,41(1),1-70。
連結:
-
Acquisti, A.,John, L. K.,Loewenstein, G.(2013).What Is Privacy Worth?.Journal of Legal Studies,42,249-274.
-
Aspatore(Ed.)(2012).Managing Intellectual Property in Cyberspace.Eagan, MN:Thomson Reuters.
-
Aspatore(Ed.)(2014).Understanding Developments in Cyberspace Law.Eagan, MN:Aspatore.
-
Ayres, I.,Talley, E.(1995).Solomonic Bargaining: Dividing a Legal Entitlement to Facilitate Coasean Trade.Yale Law Journal,104,1027-1116.
-
Balaban, T. L.(2009).Comprehensive Data Privacy Legislation: Why Now is the Time?.Case Western Reserve Journal of Law, Technology & the Internet,1(1),1-35.
-
Bambauer, J. R.(2015).All Life Is an Experiment. (Sometimes It Is a Controlled Experiment.).Loyola University Chicago Law Journal,47(2),487-513.
-
Banta, N. M.(2017).Property Interests in Digital Assets: The Rise of Digital Feudalism.Cardozo Law Review,38(3),1099-1157.
-
Barnhizer, D. D.(2006).Propertization Metaphors for Bargaining Power and Control of the Self in the Information Age.Cleveland State Law Review,54,69-113.
-
Baron, J. B.(2012).Property as Control: The Case of Information.Michigan Telecommunications and Technology Law Review,18(2),367-418.
-
Barrad, C. M. V.(1993).Genetic Information and Property Theory.Northwestern University Law Review,87(3),1037-1086.
-
Bartow, A.(2000).Our Data, Ourselves: Privacy, Propertization, and Gender.University of San Francisco Law Review,34(4),663-704.
-
Basho, K.(2000).The Licensing of Our Personal Information: Is It a Solution to Internet Privacy?.California Law Review,88(5),1507-1546.
-
Belgum, K. D.(1999).Who Leads at Half-time?: Three Conflicting Visions of Internet Privacy Policy.Richmond Journal of Law & Technology,6(1)
-
Bergelson, V.(2003).It's Personal But Is It Mine? Toward Property Rights in Personal Information.U.C. Davis Law Review,37(2),379-452.
-
Bloustein, E. J.(1964).Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser.New York University Law Review,39(6),962-1007.
-
Bovenberg, J. A.(2006).Property Rights in Blood, Genes & Data: Naturally Yours?.Leiden, Holland:Martinus Nijhoff.
-
Bregman-Eschet, Y.(2006).Genetic Databases and Biobanks: Who Controls Our Genetic Privacy?.Santa Clara Computer and High Technology Law Journal,23(1),1-54.
-
Brookman, J.(2015).Protecting Privacy in an Era of Weakening Regulation.Harvard Law & Policy Review,9(2),355-374.
-
Burdon, M.(2010).Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws.Santa Clara Computer and High Technology Law Journal,27(1),63-130.
-
Calabresi, G.,Melamed, A. D.(1972).Property Rules, Liability Rules, and Inalienability: One View of the Cathedral.Harvard Law Review,85(6),1089-1128.
-
Chisum, D. S.,Ochoa, T. T.,Ghosh, S.,LaFrance, M.(2011).Understanding Intellectual Property Law.New York, NY:LexisNexis.
-
Chlapowski, F. S.(1991).The Constitutional Protection of Informational Privacy.Boston University Law Review,71(1),133-160.
-
Cofone, I. N.(2017).The Dynamic Effect of Information Privacy Law.Minnesota Journal of Law, Science & Technology,18(2),517-547.
-
Cohen, J. E.(2000).Examined Lives: Informational Privacy and the Subject as Object.Stanford Law Review,52(5),1373-1438.
-
Cooter, R. D.,Ulen, T.(2004).Law and Economics.Upper Saddle River, NJ:Prentice Hall.
-
Cranor, L.,Frischmann, B.,Harkins, R.,Nissenbaum, H.(2014).Spring Symposium: Data Privacy & Transparency in Private and Government Data Collection.Cardozo Arts & Entertainment Law Journal,32(3),781-838.
-
Cuaresma, J. C.(2002).The Gramm-Leach-Bliley Act.Berkeley Technology Law Journal,17(1),497-518.
-
Cunningham, M.(2013).Diminishing Sovereignty: How European Privacy Law Became International Norm.Santa Clara Journal of International Law,11(2),421-456.
-
Cunningham, M.(2012).Privacy in the Age of the Hacker: Balancing Global Privacy and Data Security Law.George Washington International Law Review,44(4),643-696.
-
DeMarco, D. A.(2006).Understanding Consumer Information Privacy in the Realm of Internet Commerce: Personhood and Pragmatism, Pop-Tarts and Six-Packs.Texas Law Review,84(4),1013-1064.
-
Determann, L.(2012).Social Media Privacy: A Dozen Myths and Facts.Stanford Technology Law Review,2012(7)
-
Dymek, A.(2000).A Clash Between Commercial Speech and Individual Privacy: U.S. West v. FCC.Utah Law Review,2000(3),603-643.
-
Elkin-Koren, N.,Salzberger, E. M.(2004).Law, Economics and Cyberspace: The Effects of Cyberspace on the Economic Analysis of Law.Cheltenham, England:Edward Elgar Pub.
-
Evans, C.(2012).It's the Autonomy, Stupid: Political Data-Mining and Voter Privacy in the Information Age.Minnesota Journal of Law, Science & Technology,13(2),867-898.
-
Executive Office of the President. (2014). Big Data: Seizing Opportunities, Preserving Values. Retrieved from https://obamawhitehouse.archives.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf
-
Fairclough, B.(2016).Privacy Piracy: The Shortcomings of the United States' Data Privacy Regime and How to Fix.Journal of Corporation Law,42(2),461-480.
-
Goldman, D.(2006).I Always Feel Like Someone is Watching Me: A Technological Solution for Online Privacy.Hastings Communications and Entertainment Law Journal,28(3),353-408.
-
Green, D. A.(2009).Indigenous Intellect: Problems of Calling Knowledge Property and Assigning it Rights.Texas Wesleyan Law Review,15(2),335-356.
-
Hagel, J., III,Rayport, J. F.(1997).The Coming Battle for Customer Information.Harvard Business Review,1997,53-65.
-
Hahn, R. W.,Layne-Farrar, A.(2002).The Benefits and Costs of Online Privacy Legislation.Administrative Law Review,54(1),85-172.
-
Halijan, D. F.(2001).The Past, Present, and Future of Trade Secrets Law in Tennessee: A Practitioner's Guide Following the Enactment of the Uniform Trade Secrets Act.University of Memphis Law Review,32(1),1-44.
-
Hall, M. A.(2010).Property, Privacy, and the Pursuit of Interconnected Electronic Medical Records.Iowa Law Review,95(2),631-664.
-
Hemnes, T.(2012).The Ownership and Exploitation of Personal Identity in the New Media Age.John Marshall Review of Intellectual Property Law,12(1),1-39.
-
Hirsch, D.D.(2006).Protecting the Inner Environment: What Privacy Regulation Can Learn from Environmental Law.Georgia Law Review,41(1),1-64.
-
Hirsch, D.D.(2014).The Glass House Effect: Big Data, the New Oil, and the Power of Analogy.Maine Law Review,66(2),373-396.
-
Holland, H. B.(2010).Privacy Paradox 2.0.Widener Law Journal,19(3),893-932.
-
Humbach, J. A.(2012).Privacy and the Right of Free Expression.First Amendment Law Review,11(1),16-89.
-
Information Commissioner's Office (ICO). Big data, Artificial Intelligence, Machine Learning and Data Protection (20170904 Version: 2.2). Retrieved from https://ico.org.uk/media/for-organisations/documents/2013559/bigdata-ai-ml-and-data-protection.pdf
-
Janger, E. J.(2003).Muddy Property: Generating and Protecting Information Privacy Norms in Bankruptcy.William and Mary Law Review,44(4),1801-1882.
-
Janger, E. J.(2003).Privacy Property, Information Costs, and the Anticommons.Hastings Law Journal,54(4),899-930.
-
Jentzsch, N.,Preibusch, S.,Harasser, A.,Ikonomou, D.(2012).,未出版
-
Kang, J.(1998).Information Privacy in Cyberspace Transactions.Stanford Law Review,50(4),1193-1294.
-
Kang, J.,Buchner, B.(2004).Privacy in Atlantis.Harvard Journal of Law & Technology,18(1),229-268.
-
Karas, S.(2002).Privacy, Identity, Databases.American University Law Review,52(2),393-446.
-
Kerr, I.(Ed.),Steeves, V.(Ed.),Lucock, C.(Ed.)(2009).Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society.Oxford, England:Oxford University Press.
-
Kline, C. L.(2008).Security Theater and Database-Driven Information Markets: A Case for an Omnibus U.S. Data Privacy Statute.University of Toledo Law Review,39(2),443-496.
-
Kuner, C.(2007).European Data Protection Law: Corporate Compliance and Regulation.Oxford, England:Oxford University Press.
-
Lane, J.(Ed.),Stodden, V.(Ed.),Bender, S.(Ed.),Nissenbaum, H.(Ed.)(2014).Privacy, Big Data, and the Public Good: Frameworks for Engagement.
-
Laudon, K. C.(1996).Markets and Privacy.Communications of the ACM,39(9),92-104.
-
Lemley, M. A.(2000).Private Property: A Comment on Professor Samuelson's Contribution.Stanford Law Review,52(5),1545-1558.
-
Lessig, L.(1999).The Architecture of Privacy.Vanderbilt Journal of Entertainment Law Practice,1,56-65.
-
Lipman, R.(2016).Online Privacy and the Invisible Market for Our Data.Penn State Law Review,120(3),777-806.
-
Lipton, J.(2003).Balancing Private Rights and Public Policies: Reconceptualizing Property in Databases.Berkeley Technology Law Journal,18(3),773-852.
-
Litman, J.(2000).Information Privacy/Information Property.Stanford Law Review,52(5),1283-1314.
-
Littmann, A. E.(2002).The Technology Split in Customer List Interpretation.University of Chicago Law Review,69(4),1901-1928.
-
Lund, J.(2011).Property Rights to Information.Northwestern Journal of Technology and Intellectual Property,10(1),1-18.
-
Magid, J. M.,Tatikonda, M. V.,Cochran, P. L.(2009).Radio Frequency Identification and Privacy Law: An Integrative Approach.American Business Law Journal,46(1),1-54.
-
Malgieri, G.(2016)."Ownership" of Customer (Big) Data in the European Union: Quasi-Property as Comparative Solution?.Journal of Internet Law,20(5),3-13.
-
Mayer-Schönberger, V.(2010).Beyond Privacy, beyond Rights: Toward a "Systems" Theory of Information Governance.California Law Review,98(6),1853-1886.
-
Mayer-Schönberger, V.,Padova, Y.(2016).Regime Change? Enabling Big Data through Europe's New Data Protection Regulation.Columbia Science and Technology Law Review,17(2),315-335.
-
McCarthy, T.(2004).The Rights of Publicity and Privacy.Eagan, MN:Thomson West.
-
McClurg, A. J.(2003).A Thousand Words are Worth a Picture: A Privacy Tort Response to Consumer Data Profiling.Northwestern University Law Review,98,63-144.
-
McMahon, D. J.(2008).The Future of Privacy in a Unified National Health Information Infrastructure.Seton Hall Law Review,38,787-822.
-
McWilliams, M. C., Jr.(2005).Applicants Laid Bare: The Privacy Economics of University Application Files.Hofstra Law Review,34,185-228.
-
Mejido, J. A.(2011).Personalized Genomics: A Need for a Fiduciary Duty Remains.Rutgers Computer and Technology Law Journal,37,281-312.
-
Mell, P.(1996).Seeking Shade in a Land of Perpetual Sunlight: Privacy as Property in the Electronic Wilderness.Berkeley Technology Law Journal,11,1-92.
-
Merrill, T. W.(1997).Does Public Choice Theory Justify Judicial Activism After All?.Harvard Journal of Law & Public Policy,21,219-230.
-
Miller, K.(2014).Total Surveillance,Big Data, and Predictive Crime Technology: Privacy's Perfect Storm.Journal of Technology Law & Policy,19,105-146.
-
Miller, W. W., Jr.,O'Rourke, M. A.(2001).Bankruptcy Law V. Privacy Rights: Which Holds the Trump Card?.Houston Law Review,38,777-854.
-
Murphy, R. S.(1996).Property Rights in Personal Information: An Economic Defense of Privacy.Georgetown Law Journal,84,2381-2418.
-
Nehf, J. P.(2003).Recognizing the Societal Value in Information Privacy.Washington Law Review,78,1-92.
-
Nehf, J. P.(2005).Incomparability and the Passive Virtues of Ad Hoc Privacy Policy.University of Colorado Law Review,76,1-56.
-
Newman, D. E.(2008).European Union and United States Personal Information Privacy and Human Rights Philosophy: Is There a Match?.Temple International and Comparative Law Journal,22,307-344.
-
Nguyen, X.-T. N.(2004).Collateralizing Privacy.Tulane Law Review,78,553-604.
-
Organization for Economic Co-Operation and Development=OECD(2013).Exploring the Economics of Personal Data: A Survey of Methodologies for Measuring Monetary Value.OECD Digital Economy Papers,220
-
Parkin, M.(2014).Economics.Boston, MA:Pearson.
-
Posner, R. A.(1978).The Right of Privacy.Georgia Law Review,12,393-422.
-
Powles, J.(2015).The Case That Won't Be Forgotten.Loyola University Chicago Law Journal,47(2),583-616.
-
Radin, M. J.(1987).Market-Inalienability.Harvard Law Review,100,1849-1937.
-
Regoli, N. L.(2001).A Tort For Prying E-eyes.University of Illinois Journal of Law, Technology Policy,2001,267-290.
-
Richards, N. M.,King, J. H.(2013).Three Paradoxes of Big Data.Stanford Law Review Online,66,41-46.
-
Richardson, S. B.(2011).How Community Property Jurisdictions Can Avoid Being Lost in Cyberspace.Louisiana Law Review,72,89-126.
-
Rockandela, K.(2013).A Myriad of Reasons to Celebrate: Why the Invalidation of Isolated DNA Patents is a Victory for Personal Property Rights.Vermont Law Review,38,225-250.
-
Rosen, J.(2001).The Unwanted Gaze: The Destruction of Privacy in America.New York, NY:Vintage.
-
Rothman, J. E.(2012).The Inalienable Right of Publicity.Georgetown Law Journal,101,185-242.
-
Salbu, S. R.(2002).The European Union Data Privacy Directive and International Relations.Vanderbilt Journal of Transnational Law,35,655-696.
-
Samuelson, P.(2000).Privacy as Intellectual Property?.Staford Law Review,52,1125-1174.
-
Samuelson, P.(1999).A New Kind of Privacy? Regulating Uses of Personal Data in the Global Information Economy.California Law Review,87,751-778.
-
Schiller, J. C.(2003).Informational Privacy v. the Commercial Speech Doctrine: Can the Gramm-Leach-Bliley Act Provide Adequate Privacy Protection?.CommLaw Conspectus: Journal of Communications Law and Policy,11,349-368.
-
Schwartz, P. M.(2004).Property, Privacy, and Personal Data.Harvard Law Review,117,2056-2128.
-
Schwartz, P. M.(1995).The Protection of Privacy in Health Care Reform.Vanderbilt Law Review,48,295-347.
-
Segovia, S.(2015).Privacy: An Issue of Priority.Hastings Business Law Journal,11,193-224.
-
Shorr, S.(1995).Personal Information Contracts: How To Protect Privacy Without Violating The First Amendment.Cornell Law Review,80,1756-1850.
-
Sinrod, E. J.,Reyna, J. W.,Jolish, B. D.(1999).The New Wave of Speech and Privacy Developments in Cyberspace.Hastings Communications and Entertainment Law Journal,21,583-600.
-
Solove, D. J.(2001).Privacy and Power: Computer Databases and Metaphors for Information Privacy.Stanford Law Review,53,1393-1462.
-
Solove, D. J.(2008).Understanding Privacy.Cambridge, MA:Harvard University Press.
-
Solove, D. J.(2004).The Digital Person: Technology and Privacy in the information Age.New York, NY:NYU Press.
-
Solove, D. J.,Schwartz, P. M.(2011).Information Privacy Law.New York, NY:Aspen Publishers.
-
Spencer, S. B.(2002).Reasonable Expectations and the Erosion of Privacy.San Diego Law Review,39,843-916.
-
Suter, S. M.(2004).Disentangling Privacy from Property: Toward a Deeper Understanding of Genetic Privacy.George Washington Law Review,72(4),737-814.
-
Swedloff, R.(2014).Risk Classification's Big Data (R)evolution.Connecticut Insurance Law Journal,21(1),339-374.
-
Swire, P. P. (1997). Markets, Self-Regulation and Government Enforcement in the Protection of Personal Information. In U.S. Department of Commerce (Ed.), Privacy and Self-Regulation in the Information Age. Retrieved from https://www.ntia.doc.gov/page/chapter-1-theory-markets-and-privacy. doi: 10.2139/ssrn.11472
-
Teh, J.(2002).Privacy Wars in Cyberspace: An Examination of the Legal and Business Tensions in Information Privacy.Yale Journal of Law and Technology,4,1-96.
-
Tene, O.,Polonetsky, J.(2013).Big Data for All: Privacy and User Control in the Age of Analytics.Northwestern Journal of Technology and Intellectual Property,11,239-274.
-
Turkington, R. C.(1990).Legacy of the Warren and Brandeis Article: The Emerging Unencumbered Constitutional Right to Informational Privacy.Northern Illinois University Law Review,10(3),479-520.
-
Victor, J. M.(2013).The EU General Data Protection Regulation: Toward a Property Regime for Protecting Data Privacy.Yale Law Journal,123,513-529.
-
Volokh, E.(2000).Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People from Speaking About You.Stanford Law Review,52,1049-1124.
-
Weeden, J. L.(2006).Genetic Liberty, Genetic Property: Protecting Genetic Information.Ave Maria Law Review,4,611-664.
-
Westby, J. R.(2004).International Guide to Privacy.Chicago, IL:America Bar Association.
-
Westin, A.(1967).Privacy and Freedom.New York, NY:Atheneum.
-
Young, A. C.,Levine J. P.,Zurich, B. R.(2017).Franchise Relationships, Personal Information and Trade Secret Liability.Intellectual Property and Technology Law Journal,29(1),18-19.
-
Zarsky, T. Z.(2017).Incompatible: The GDPR in the Age of Big Data.Seton Hall Law Review,47,995-1020.
-
Zarsky, T. Z.(2004).Desperately Seeking Solutions: Using Implementation-Based Solutions for the Troubles of Information Privacy in the Age of Data Mining and the Internet Society.Maine Law Review,56,13-60.
-
Zhu, B. A.(2014).A Traditional Tort for a Modern Threat: Applying Intrusion upon Seclusion to Dataveillance Observations.New York University Law Review,89,2381-2416.
-
王澤鑑(2012)。人格權法。臺北:自刊。
-
史迪格里茲、羅耀宗譯(2013)。不公平的代價。臺北:天下。
-
張靜(2007)。我國營業秘密法學的建構與開展第一冊:營業秘密的基礎理論。臺北:新學林。
-
陳計男(2008)。破產法論。臺北:三民。
-
勞倫斯雷席格、劉靜怡譯(2002)。網路自由與法律。臺北:商周。
-
謝銘洋(2010)。從美國法上之商業利用權(Right of Publicity)探討肖像權之財產權化:最高法院九十七年台上字第一三九六號民事判決解析。月旦裁判時報,4,102-108。
-
謝銘洋、古清華、丁中原、張凱娜(1996)。營業秘密法解讀。臺北:元照。
-
羅伯‧萊克、周徵譯(2017)。拯救資本主義:在大翻轉年代,照顧多數人的福利,不是少數者的財富。臺北:聯經。
|