簡易檢索 / 詳目顯示

研究生: 徐秀怡
Shee, Siew Yi
論文名稱: 電子商務中個人資訊利用與隱私保護探討
A Study of Utilization of Personal Information and Privacy Protection in E-commerce
指導教授: 孫宏民
Sun,Hung-Min
口試委員: 洪國寶
Horng,Gwo-Boa
顏嵩銘
Yen,Sung-Ming
曾文貴
Tzeng,Wen-Guey
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊系統與應用研究所
Institute of Information Systems and Applications
論文出版年: 2016
畢業學年度: 104
語文別: 英文
論文頁數: 49
中文關鍵詞: 電子商務個人資訊利用洩漏隱私保護隱私權
外文關鍵詞: Utilization
相關次數: 點閱:1下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在電子商務快速發展的環境下,使用者個人資訊安全已經成為需要重視的議
    題之一。在消費者使用網路購物便利性的同時,會在不自覺中透露出一些敏感資
    訊如姓名,聯絡方式以及配送地址等。隨著電子商務應用更廣泛的情況下,其暴
    露的隱私問題也越來越明顯。目前,電子商務中消費者私人資訊被公開,個人資
    訊未經授權就被採集利用等違法的行為屢禁不止。因此為維護消費者隱私權益,
    整頓電子商務中不良的風氣已成必要之舉。
    本論文以當下熱議的電子商務隱私保護問題為出發點,透過文獻及案例分析。
    以電子商務環境中,消費者個人資訊如何從網絡購物過程中被獲取以及利用,並
    透過案列分析了網路購物過程中消費者個人資訊潛藏著的安全隱患。分別以商家
    和消費者這兩個角色的視角,詳細的分析安全隱患產生的原因與後果。最後也根
    據文獻和案例提出透過消費者增強自身意識,商家的自律以及政府立法三方面的
    措施來維護和加強電子商務中個人資訊的保護,也減少網路購物的後顧之憂,為
    電子商務打造一個安心的網購環境。


    In the rapid development of e-commerce environment, users’ personal information
    security has become an issue. While consumer was enjoyed in the convenience
    brought by online shopping, some sensitive information such as name, contact details
    and delivery address might be accidentally leaked due to common data breaches
    and various of security concern. With the broader use of e-commerce, the exposure
    of privacy issues has become increasingly evident. Currently,the number of cases
    that e-commerce consumer private information is disclosed, personal information is
    collected without authorization and other illegal use of repeated acts is continued
    to increase. Therefore, to safeguard consumer privacy rights, consolidation of ecommerce
    in the contagion has become necessary.
    In this thesis, we focus on the consumer data utilization and privacy protection
    topic. Through the literature and case studies, review how do consumers personal
    information is acquired from the network. We also detailed analysis of the causes
    and security risks arising which will face by business and consumer during the online
    shopping process. Finally, through the literature and case, we give the advise to
    three of the parties: consumer, business and government that which suggestion
    they can do for measures and strengthen the protection of personal information in
    e-commerce.

    Table of Contents i List of Figures iii List of Tables iv 1 Introduction 1 2 Background 3 2.1 E-commerce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.1.1 Business to business e-commerce (B2B) . . . . . . . . . . . . 4 2.1.2 Business to consumer e-commerce (B2C) . . . . . . . . . . . . 4 2.1.3 Consumer to business e-commerce(C2B) . . . . . . . . . . . . 5 2.1.4 Consumer to consumer e-commerce (C2C) . . . . . . . . . . . 6 2.1.5 Online to offline e-commerce (O2O) . . . . . . . . . . . . . . . 7 2.2 About data privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.2.1 Data privacy type . . . . . . . . . . . . . . . . . . . . . . . . 8 2.2.2 The important of data privacy . . . . . . . . . . . . . . . . . 9 3 Privacy and Data Privacy in E-commerce 11 3.1 Different specialty of privacy definition . . . . . . . . . . . . . . . . . 11 3.1.1 Privacy definition from Legal . . . . . . . . . . . . . . . . . . 11 3.1.2 Privacy definition from Psychology . . . . . . . . . . . . . . . 12 3.1.3 Privacy definition from Sociology . . . . . . . . . . . . . . . . 12 3.1.4 Privacy definition from Ethics . . . . . . . . . . . . . . . . . . 12 3.1.5 Privacy definition from Economic . . . . . . . . . . . . . . . . 12 3.1.6 Privacy definition from Computer Sciences . . . . . . . . . . . 13 3.2 The implication of data privacy in E-commerce . . . . . . . . . . . . 13 3.3 The feature of private data in E-commerce . . . . . . . . . . . . . . . 14 i 3.3.1 The extensiveness of the private data . . . . . . . . . . . . . . 14 3.3.2 The recognizability of the private data . . . . . . . . . . . . . 14 3.3.3 The acquisition of the private data . . . . . . . . . . . . . . . 14 3.3.4 The shareable of the private data . . . . . . . . . . . . . . . . 15 3.4 Privacy collection in E-commerce . . . . . . . . . . . . . . . . . . . . 15 3.5 The specific technic modus of how e-commerce behavior infringe on privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.5.1 Data storing . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3.5.2 Data transmission . . . . . . . . . . . . . . . . . . . . . . . . 17 3.5.3 Data access permission . . . . . . . . . . . . . . . . . . . . . . 17 3.5.4 Data destruction . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.6 The specific on human factor how e-commerce behavior infringe on privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.6.1 The privacy protection awareness of consumer is weak . . . . 18 3.6.2 Lack of a clarity regulator mechanism on logistic company . . 19 3.6.3 The imperfect of laws and regulations on e-commerce . . . . . 19 3.7 Effect of privacy data leakage . . . . . . . . . . . . . . . . . . . . . . 20 3.7.1 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 3.7.2 Individual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 4 Data Privacy Implantation Measures and Aegis in Ecommerce 23 4.1 Data Privacy Implantation Measure in E-commerce. . . . . . . . . . . 23 4.1.1 The collection of privacy data . . . . . . . . . . . . . . . . . . 23 4.1.2 The arrangement of privacy data . . . . . . . . . . . . . . . . 27 4.1.3 The processing of privacy data . . . . . . . . . . . . . . . . . 28 4.2 Data Privacy Aegis in E-commerce . . . . . . . . . . . . . . . . . . . 29 4.2.1 From the standpoint of consumer . . . . . . . . . . . . . . . . 29 4.2.2 From the standpoint of e-commerce . . . . . . . . . . . . . . . 32 4.2.3 From the standpoint of government . . . . . . . . . . . . . . . 37 4.3 Equilibrium relation between the use of privacy data and its protection 40 4.3.1 Rational use of consumer personal information . . . . . . . . 40 4.3.2 Balance between privacy data protection and utilization . . . 42 5 Conclusion and Future Work 43 5.0.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 5.0.2 Future work . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

    [1] Yumi Asahi. Privacy protection against ubiquitous marketing. SICE Annual
    Conference 2010, pages 18–21, 2010.
    [2] Internet marketing exposure in malaysia. http://www.gobalakrishnan.com/
    2006/12/malaysia-internet-marketing/.
    [3] Moslein.K.M Koch.M. Building consumer’s confidence in adopting ecommerce.”identities
    management for e-commerce and collaboration application”.
    International Journal of Electronic Commerce Vol.9 No.3, pages 11–29,
    2005.
    [4] Looi.H.C. E-commerce adoption in brunei darussalam: a quantitative analysis
    of factors influencing its adoption. Communication of the Association for
    Information Systems Vol.15, pages 61–81, 2005.
    [5] Licker.P.s Molla.A. Perceived e-readiness factors in e-commerce adoption: An
    empirical investigation in a developing country. International Journal of Electronic
    Commerce Vol.10 No.1, pages 83–110, 2005.
    [6] Business-to-business. https://en.wikipedia.org/wiki/Business-to-business.
    [7] Business-to-consumer. https://en.wikipedia.org/wiki/Business-to-consumer.
    [8] Consumer-to-business. https://en.wikipedia.org/wiki/Consumer-to-business.
    [9] Elance. https://www.upwork.com/?r.
    [10] Consumer-to-business. https://en.wikipedia.org/wiki/Customertocustomer.
    45
    [11] Ruten. http://www.ruten.com.tw/.
    [12] Online-to-offline. http://www.benzinga.com/general/education/15/08/5768857/
    what-does-o2o-mean-for-the-future-of-e-commerce.
    [13] Data privacy. https://www.techopedia.com/definition/10380/information-privacy.
    [14] Apple and amazon patch security flaws exposed by hack. http://
    www.theguardian.com/ technology/ blog/ 2012/ aug/ 08/ apple-amazon-patchsecurity.
    [15] 王家福,劉海年. 中國人權百科全書. Journal of international and comparative law,
    page 644, 1998.05.
    [16] Samuel D.Warren and Louis D.Brandeis. The right to privacy [j.] harvard law review.
    5(4):193–220, 1890.
    [17] Irwin Altman. Privacy regulation: culturally universal or culturally specific? Journal
    of Social Issues, 1977, pages 66–84, 1977.
    [18] 劉德良. 隱私與隱私權問題研究. 社會科學, 8:51–58, 2003.
    [19] Henry L. Hu. [a commentary on the decision of the first case of human flesh search.
    J legal application, 7, 2009.
    [20] John Edward Campbell Matt Carlson. Panopticon.com: Online surveillance and
    the commodification of privacy. Journal of Broadcasting Electronic Media, 4(46):
    586–606, 2002.
    [21] Mark S.Ackerman and Jr. Donald T.Davis. Privacy and security issues in ecommerce.
    New Economy Handbook, page Chap 39, 2003.
    [22] E-commerce sales report by e-marketer2014. http://www.emarketer.com/Article/
    Worldwide-Ecommerce-Sales-Increase-Nearly-20-2014/1011039.
    [23] What data does google collect? https://privacy.google.com/data-we-collect.html.
    46
    [24] What data does baidu collect? http:// ir.baidu.com/ phoenix.zhtml?
    c=188488p=privacy.
    [25] What data does amazon collect? http://www.amazon.com/gp/help/customer/
    display.html?nodeId=468496.
    [26] 李欲曉. 雲計算大數據時代個人隱私保護刻不容緩. 理論報導, 10(7), 2013.
    [27] Ashley madson data breach. https:// en.wikipedia.org/ wiki/ AshleyMadisondatabreach.
    [28] Godwin J.Udo. A privacy and security concerns as major barriers for e-commerce:
    a survey study. In Information Management Computer Security, volume 9/4, pages
    165–174, 2001.
    [29] WenXi. Utilization and protection of user’s personal information in e-commerce.
    2014.
    [30] Reputation impact of a data breach. http://www.experian.com/assets/data-breach/
    white-papers/reputation-study.pdf.
    [31] Target shares drop. http://blogs.wsj.com/moneybeat/2014/01/21/target-takesanother-hit-shares-drop-to-52-week-low/.
    [32] Data security laws and penalties. http://www.techrepublic.com/blog/data-center/
    data-security-laws-and-penalties-pay-it-now-or-pay-out-later/.
    [33] Ashley madison suicide case. http://www.dailymail.co.uk/news/article-3208907/
    The-Ashley-Madison-suicide-Texas-police-chief-takes-life-just-days-email-leakedcheating-website-hack.html.
    [34] Godwin J.Udo. Privacy and security concerns as major barriers for e-commerce: a
    survey study. Information Management Computer Security 9/4, pages 165–174,
    2001.
    47
    [35] How to use web cookies with e-commerce websites. http://
    blog.unibulmerchantservices.com/ how-to-use-web-cookies-with-e-commercewebsites/.
    [36] Custora. E-commerce customer acquisition snapshot. pages 3–4, Q2 2013.
    [37] Mailchimp research. http:// mailchimp.com/ resources/ research/ effects-of-listsegmentation-on-email-marketing-stats/.
    [38] Data mining and e-commerce. http://www.ebaytechblog.com/2010/10/20/datamining-and-e-commerce.
    [39] Data classification. https://www.umsystem.edu/ums/is/infosec/classification/.
    [40] Microsoft safety and security center. https://www.microsoft.com/en-us/security/
    pc-security/default.aspx?WT.mcid = SiteLink.
    [41] Telesign consumer account security report. https://www.telesign.com/resources/
    research-and-reports/telesign-consumer-account-security-report/.
    [42] 如 何 處 理 網 購 快 遞 訂 單. http:// www.jobtrans.cn/
    News2016033010283893IARIX.html.
    [43] Voipsupply. http://www.voipsupply.com/.
    [44] Symantec. https://www.symantec.com/.
    [45] Symantec threat report. https://www.symantec.com/security-center/threat-report.
    [46] Trustware. https://www.trustwave.com/home/.
    [47] Pci security. https://www.pcisecuritystandards.org/pcisecurity/.
    [48] Mcafee. http://www.mcafee.com/us/index.html.
    [49] Vaultlabs. http://vaultlabs.com/.
    [50] Carbonite. https://www.carbonite.com/.
    48
    [51] CASC. Casc 2015 consumer trust survey. pages 3–4, 2015.
    [52] European Union. European parliament and council directive 95/46/ec. Official
    Journal L281 of 23.11.1995, 1995.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE