研究生: |
徐秀怡 Shee, Siew Yi |
---|---|
論文名稱: |
電子商務中個人資訊利用與隱私保護探討 A Study of Utilization of Personal Information and Privacy Protection in E-commerce |
指導教授: |
孫宏民
Sun,Hung-Min |
口試委員: |
洪國寶
Horng,Gwo-Boa 顏嵩銘 Yen,Sung-Ming 曾文貴 Tzeng,Wen-Guey |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊系統與應用研究所 Institute of Information Systems and Applications |
論文出版年: | 2016 |
畢業學年度: | 104 |
語文別: | 英文 |
論文頁數: | 49 |
中文關鍵詞: | 電子商務 、個人資訊 、利用 、洩漏 、隱私保護 、隱私權 |
外文關鍵詞: | Utilization |
相關次數: | 點閱:1 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在電子商務快速發展的環境下,使用者個人資訊安全已經成為需要重視的議
題之一。在消費者使用網路購物便利性的同時,會在不自覺中透露出一些敏感資
訊如姓名,聯絡方式以及配送地址等。隨著電子商務應用更廣泛的情況下,其暴
露的隱私問題也越來越明顯。目前,電子商務中消費者私人資訊被公開,個人資
訊未經授權就被採集利用等違法的行為屢禁不止。因此為維護消費者隱私權益,
整頓電子商務中不良的風氣已成必要之舉。
本論文以當下熱議的電子商務隱私保護問題為出發點,透過文獻及案例分析。
以電子商務環境中,消費者個人資訊如何從網絡購物過程中被獲取以及利用,並
透過案列分析了網路購物過程中消費者個人資訊潛藏著的安全隱患。分別以商家
和消費者這兩個角色的視角,詳細的分析安全隱患產生的原因與後果。最後也根
據文獻和案例提出透過消費者增強自身意識,商家的自律以及政府立法三方面的
措施來維護和加強電子商務中個人資訊的保護,也減少網路購物的後顧之憂,為
電子商務打造一個安心的網購環境。
In the rapid development of e-commerce environment, users’ personal information
security has become an issue. While consumer was enjoyed in the convenience
brought by online shopping, some sensitive information such as name, contact details
and delivery address might be accidentally leaked due to common data breaches
and various of security concern. With the broader use of e-commerce, the exposure
of privacy issues has become increasingly evident. Currently,the number of cases
that e-commerce consumer private information is disclosed, personal information is
collected without authorization and other illegal use of repeated acts is continued
to increase. Therefore, to safeguard consumer privacy rights, consolidation of ecommerce
in the contagion has become necessary.
In this thesis, we focus on the consumer data utilization and privacy protection
topic. Through the literature and case studies, review how do consumers personal
information is acquired from the network. We also detailed analysis of the causes
and security risks arising which will face by business and consumer during the online
shopping process. Finally, through the literature and case, we give the advise to
three of the parties: consumer, business and government that which suggestion
they can do for measures and strengthen the protection of personal information in
e-commerce.
[1] Yumi Asahi. Privacy protection against ubiquitous marketing. SICE Annual
Conference 2010, pages 18–21, 2010.
[2] Internet marketing exposure in malaysia. http://www.gobalakrishnan.com/
2006/12/malaysia-internet-marketing/.
[3] Moslein.K.M Koch.M. Building consumer’s confidence in adopting ecommerce.”identities
management for e-commerce and collaboration application”.
International Journal of Electronic Commerce Vol.9 No.3, pages 11–29,
2005.
[4] Looi.H.C. E-commerce adoption in brunei darussalam: a quantitative analysis
of factors influencing its adoption. Communication of the Association for
Information Systems Vol.15, pages 61–81, 2005.
[5] Licker.P.s Molla.A. Perceived e-readiness factors in e-commerce adoption: An
empirical investigation in a developing country. International Journal of Electronic
Commerce Vol.10 No.1, pages 83–110, 2005.
[6] Business-to-business. https://en.wikipedia.org/wiki/Business-to-business.
[7] Business-to-consumer. https://en.wikipedia.org/wiki/Business-to-consumer.
[8] Consumer-to-business. https://en.wikipedia.org/wiki/Consumer-to-business.
[9] Elance. https://www.upwork.com/?r.
[10] Consumer-to-business. https://en.wikipedia.org/wiki/Customertocustomer.
45
[11] Ruten. http://www.ruten.com.tw/.
[12] Online-to-offline. http://www.benzinga.com/general/education/15/08/5768857/
what-does-o2o-mean-for-the-future-of-e-commerce.
[13] Data privacy. https://www.techopedia.com/definition/10380/information-privacy.
[14] Apple and amazon patch security flaws exposed by hack. http://
www.theguardian.com/ technology/ blog/ 2012/ aug/ 08/ apple-amazon-patchsecurity.
[15] 王家福,劉海年. 中國人權百科全書. Journal of international and comparative law,
page 644, 1998.05.
[16] Samuel D.Warren and Louis D.Brandeis. The right to privacy [j.] harvard law review.
5(4):193–220, 1890.
[17] Irwin Altman. Privacy regulation: culturally universal or culturally specific? Journal
of Social Issues, 1977, pages 66–84, 1977.
[18] 劉德良. 隱私與隱私權問題研究. 社會科學, 8:51–58, 2003.
[19] Henry L. Hu. [a commentary on the decision of the first case of human flesh search.
J legal application, 7, 2009.
[20] John Edward Campbell Matt Carlson. Panopticon.com: Online surveillance and
the commodification of privacy. Journal of Broadcasting Electronic Media, 4(46):
586–606, 2002.
[21] Mark S.Ackerman and Jr. Donald T.Davis. Privacy and security issues in ecommerce.
New Economy Handbook, page Chap 39, 2003.
[22] E-commerce sales report by e-marketer2014. http://www.emarketer.com/Article/
Worldwide-Ecommerce-Sales-Increase-Nearly-20-2014/1011039.
[23] What data does google collect? https://privacy.google.com/data-we-collect.html.
46
[24] What data does baidu collect? http:// ir.baidu.com/ phoenix.zhtml?
c=188488p=privacy.
[25] What data does amazon collect? http://www.amazon.com/gp/help/customer/
display.html?nodeId=468496.
[26] 李欲曉. 雲計算大數據時代個人隱私保護刻不容緩. 理論報導, 10(7), 2013.
[27] Ashley madson data breach. https:// en.wikipedia.org/ wiki/ AshleyMadisondatabreach.
[28] Godwin J.Udo. A privacy and security concerns as major barriers for e-commerce:
a survey study. In Information Management Computer Security, volume 9/4, pages
165–174, 2001.
[29] WenXi. Utilization and protection of user’s personal information in e-commerce.
2014.
[30] Reputation impact of a data breach. http://www.experian.com/assets/data-breach/
white-papers/reputation-study.pdf.
[31] Target shares drop. http://blogs.wsj.com/moneybeat/2014/01/21/target-takesanother-hit-shares-drop-to-52-week-low/.
[32] Data security laws and penalties. http://www.techrepublic.com/blog/data-center/
data-security-laws-and-penalties-pay-it-now-or-pay-out-later/.
[33] Ashley madison suicide case. http://www.dailymail.co.uk/news/article-3208907/
The-Ashley-Madison-suicide-Texas-police-chief-takes-life-just-days-email-leakedcheating-website-hack.html.
[34] Godwin J.Udo. Privacy and security concerns as major barriers for e-commerce: a
survey study. Information Management Computer Security 9/4, pages 165–174,
2001.
47
[35] How to use web cookies with e-commerce websites. http://
blog.unibulmerchantservices.com/ how-to-use-web-cookies-with-e-commercewebsites/.
[36] Custora. E-commerce customer acquisition snapshot. pages 3–4, Q2 2013.
[37] Mailchimp research. http:// mailchimp.com/ resources/ research/ effects-of-listsegmentation-on-email-marketing-stats/.
[38] Data mining and e-commerce. http://www.ebaytechblog.com/2010/10/20/datamining-and-e-commerce.
[39] Data classification. https://www.umsystem.edu/ums/is/infosec/classification/.
[40] Microsoft safety and security center. https://www.microsoft.com/en-us/security/
pc-security/default.aspx?WT.mcid = SiteLink.
[41] Telesign consumer account security report. https://www.telesign.com/resources/
research-and-reports/telesign-consumer-account-security-report/.
[42] 如 何 處 理 網 購 快 遞 訂 單. http:// www.jobtrans.cn/
News2016033010283893IARIX.html.
[43] Voipsupply. http://www.voipsupply.com/.
[44] Symantec. https://www.symantec.com/.
[45] Symantec threat report. https://www.symantec.com/security-center/threat-report.
[46] Trustware. https://www.trustwave.com/home/.
[47] Pci security. https://www.pcisecuritystandards.org/pcisecurity/.
[48] Mcafee. http://www.mcafee.com/us/index.html.
[49] Vaultlabs. http://vaultlabs.com/.
[50] Carbonite. https://www.carbonite.com/.
48
[51] CASC. Casc 2015 consumer trust survey. pages 3–4, 2015.
[52] European Union. European parliament and council directive 95/46/ec. Official
Journal L281 of 23.11.1995, 1995.