英文摘要
|
Computers have become an integral and essential part of our daily lives. A huge amount of digital data is exchanged among devices and stored in various storage types. With this increased reliance on technology comes the growing concern for data security and privacy. In this digital age, where personal and sensitive information is constantly being transmitted and stored, it becomes imperative to protect this data from unauthorized access. One way to achieve this is through the use of encryption technology. Encryption is the process of converting plain text into a code to prevent unauthorized access. This technology is widely used to secure data, but unfortunately, it can also be exploited by criminals to hide illegal activities and information. This makes it even more challenging for law enforcement agencies to carry out criminal investigations. While encryption provides a certain level of security, it does not automatically grant individuals privacy rights. In fact, the use of probability theory is not a suitable explanation for privacy. Encrypted files should not be equated with locked containers such as rooms or suitcases. The contents of encrypted files may be visible, but their meaning may not be understandable. Decrypting encrypted files is similar to interpreting a conversation in a foreign language or searching bags with sniffer dogs. Moreover, encrypting files does not provide absolute privacy protection. Law enforcement agencies are allowed to decrypt encrypted files that have been legally obtained, without obtaining a warrant in advance. In conclusion, while encryption technology is an effective tool for securing data, it does not provide complete privacy protection. It is important for individuals to be aware of the limitations and to adopt a multi-layered approach to data security and privacy. This may include using encryption technology, implementing strong passwords, and regularly updating software to stay ahead of potential security threats.
|
参考文献
|
-
李榮耕(2016)。數位資料及附帶搜索:以行動電話內的資訊為例。臺北大學法學論叢,100,245-322。
連結:
-
李榮耕(2015)。科技定位監控與犯罪偵查:兼論美國近年 GPS 追蹤法制及實務之發展。臺大法學論叢,44(3),871-969。
連結:
-
中國哲學書電子化計劃,《六韜.龍韜.陰符及陰書》,載於:https://ctext.org/liu-tao/zh。https://ctext.org/liu-tao/zh
-
Amitay, D. (2011, June 14). Most Common iPhone Passcodes. Daniel Amitay Blog. http://danielamitay.com/blog/2011/6/13/most-common-iphone-passcodes.
-
Bonin, A. C.(1996).Protecting Protection: First and Fifth Amendment Challenges to Cryptography Regulation.University of Chicago Legal Forum,1996(1),495-517.
-
Brady, S.(1997).Keeping Secrets in Cyberspace: Establishing Fourth Amendment Protection for Internet Communication.Harvard Law Review,110(7),1591-1608.
-
Couillard, D. A.(2009).Defogging the Cloud: Applying Fourth Amendment Principles to Evolving Privacy Expectations in Cloud Computing.Minnesota Law Review,93,2205-2239.
-
Crain, N. A.(1999).Bernstein, Karn, and Junger: Constitutional Challenges to Cryptographic Regulations.Alabama Law Review,50(3),869-909.
-
Edgett, S. J.(2003).Double-Clicking on Fourth Amendment Protection: Encryption Creates a Reasonable Expectation of Privacy.Pepperdine Law Review,30(2),339-366.
-
Fraser, J. A., III(1997).The Use of Encrypted, Coded and Secret Communications is an “Ancient Liberty” Protected by the United States Constitution.Virginia Journal of Law & Technology,2,1-45.
-
Froomkin, A. M.(1995).The Metaphor Is the Key: Cryptography, the Clipper Chip, and the Constitution.The University of Pennsylvania Law Review,143(3),709-897.
-
Gilligan, F. A.,Imwinkelried, E. J.(1998).Cyberspace: The Newest Challenge for Traditional Legal Doctrine.Rutgers Computer & Technology Law Journal,24,305-343.
-
Hricik, D.(1998).Lawyers Worry Too Much about Transmitting Client Confidences by Internet E-mail.Georgetown Journal of Legal Ethics,11,459-508.
-
Kerben, J.(1997).The Dilemma for Future Communication Technologies: How to Constitutionally Dress the Crypto-Genie.CommLaw Conspectus,5,125-152.
-
Kerr, O. S.(2009).The Case for the Third-Party Doctrine.Michigan Law Review,107(4),561-602.
-
Kerr, O. S.(2007).Four Models of Fourth Amendment Protection.Stanford Law Review,60(2),503-552.
-
Kerr, O. S.(2005).Searches and Seizures in a Digital World.Harvard Law Review,119,531-585.
-
Kerr, O. S.(2001).The Fourth Amendment in Cyberspace: Can Encryption Create A “Reasonable Expectation of Privacy?”.Connecticut Law Review,33,503-533.
-
Kerr, O. S.,Schneier, B.(2018).Encryption Workarounds.Georgetown Law Journal,106,989-1019.
-
LaFave, W. R.(2004).Search and Seizure: A Treatise on the Fourth Amendment.Thomson West.
-
Lauzon, E.(1998).The Philip Zimmermann Investigation: The Start of the Fall of Export Restrictions on Encryption Software Under First Amendment Free Speech Issues.Syracuse Law Review,48,1307-1364.
-
Lennon, T. B.(1994).The Fourth Amendment's Prohibitions on Encryption Limitation: Will 1995 Be Like 1984?.Albany Law Review,58,467-508.
-
Nguyen, T.(1997).Cryptography, Export Controls, and the First Amendment in Bernstein v. United States Department of State.Harvard Journal of Law & Technology,10(3),667-682.
-
Pilkington, L. M.(1996).First and Fifth Amendment Challenges to Export Controls on Encryption: Bernstein and Karn.Santa Clara Law Review,37(1),159-211.
-
Post, R.(2000).Encryption Source Code and the First Amendment.Berkeley Technology Law Journal,15(2),713-723.
-
Schneier, B.(2015).Applied Cryptography: Protocols, Algorithms, and Source Code in C.John Wiley & Sons, Inc.
-
Shankland, S. (2021, May 24). Quantum computers could crack today's encrypted messages. That's a problem. Cent. https://www.cnet.com/tech/computing/quantum-computers-could-crack-todays-encrypted-messages-thats-a-problem
-
Singh, S.(1999).The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography.:Fourth Estate.
-
Slobogin, C.,Schumacher, J. E.(1993).Reasonable Expectations of Privacy and Autonomy in Fourth Amendment Cases: An Empirical Look at “Understandings Recognized and Permitted by Society”.Duke Law Journal,42(4),727-775.
-
Suro, R., & Corcoran, E. (1998, March 30). U.S. Law Enforcement Wants Keys to High-Tech Cover. Washington Post.https://www.washingtonpost.com/wp-srv/politics/special/encryption/stories/cr033098.htm
-
王兆鵬(2000).搜索扣押與刑事被告的憲法權利.自刊.
-
王兆鵬(2004).新刑訴‧新思維.元照.
-
王兆鵬,張明偉,李榮耕(2022).刑事訴訟法(上).新學林.
-
王兆鵬,張明偉,李榮耕。王兆鵬、張明偉、李榮耕《武經總要.武經總要前集.字驗》,載於 :https://ctext.org/wiki.pl?if。https://ctext.org/wiki.pl?if=gb&res=817018
-
李榮耕(2008)。Yes, I do!:同意搜索與第三人同意搜索。月旦法學雜誌,157,102-125。
-
楊雲驊(2007)。未告知證人拒絕證言權之法律效果:評最高法院九五年臺上字第九○九號、九五年臺上字第二四二六號、九六年臺上字第一○四三號判決。台灣法學雜誌,99,157-176。
-
溫祖德(2015)。行動電話內數位資訊與附帶搜索:以美國聯邦最高法院見解之變遷為主。月旦法學雜誌,239,198-220。
|