The Development of Digital Footprint and the threats to privacy
碩士 === 國立臺灣大學 === 國家發展研究所 === 101 === Technological development has significantly improved the flow and the use of information, bringing our present lives more conveniences and systems to manage operational efficiency. However, information technology has also brought negative effects for individuals...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/97361523630110422287 |
id |
ndltd-TW-101NTU05011038 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101NTU050110382016-03-16T04:15:07Z http://ndltd.ncl.edu.tw/handle/97361523630110422287 The Development of Digital Footprint and the threats to privacy 數位足跡之發展及運用與對隱私權的威脅 Tse-Hsin Huang 黃則馨 碩士 國立臺灣大學 國家發展研究所 101 Technological development has significantly improved the flow and the use of information, bringing our present lives more conveniences and systems to manage operational efficiency. However, information technology has also brought negative effects for individuals. It has spurred the public and private sectors ability to deeply track our daily activities, possibly revealing the most intimate of details. With electronic monitoring, frequent tracking and information systems becoming more massive in scale, privacy is threatened. This article will be divided into six chapters. The first chapter is the introduction. The second chapter is the development of the concept of privacy. The 2nd chapter discusses the historical development of privacy rights in United States and Taiwan. The value of privacy must be understood through social and cultural context. The second chapter will examine public authorities that are using technology in criminal investigations and its use in trials, detailing possible privacy threat implications. A discussion will examine the public authority’s electronic monitoring and tracking of people and its related privacy issues. When the majority of domestic literature only addresses the U.S. Department of Homeland Security’s establishment of several large-scale information systems, this paper will address the local case that has originated in the past two years concerning Taiwan’s New Taipei City "Defense Science and Technology City" program and its content. While integrating information systems and constructing policing technology and management systems, we will scrutinize how there is a lack of consideration in the corresponding planning for privacy. The third chapter will cover surveillance in the workplace and its threat to privacy. The employers justify their electronic monitoring and tracking with "Electronic Performance Monitoring", "Enterprise Confidential", "Employees’ Consent" reasoning. This reasoning has been resulting in a dilemma for privacy. The fifth chapter investigates consumer privacy protection in a network information society. Industry provides free services, and in exchange, the user provides relevant personal information on friendships, interests and activities. The industry, then using this information, attracts advertisers, application developers and other commercial entities that see opportunities. Access to large-scale personal information has been so simple in recent years. This chapter, examines how data mining is now commonly used "marketing approach" and discuses the collection, processing, and its using of the three stages respectively for what privacy issues may encounter. Last, chapter six will conlcude. Georg Gesk 葛祥林 2013 學位論文 ; thesis 142 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 國家發展研究所 === 101 === Technological development has significantly improved the flow and the use of information, bringing our present lives more conveniences and systems to manage operational efficiency. However, information technology has also brought negative effects for individuals. It has spurred the public and private sectors ability to deeply track our daily activities, possibly revealing the most intimate of details. With electronic monitoring, frequent tracking and information systems becoming more massive in scale, privacy is threatened.
This article will be divided into six chapters. The first chapter is the introduction. The second chapter is the development of the concept of privacy. The 2nd chapter discusses the historical development of privacy rights in United States and Taiwan. The value of privacy must be understood through social and cultural context. The second chapter will examine public authorities that are using technology in criminal investigations and its use in trials, detailing possible privacy threat implications. A discussion will examine the public authority’s electronic monitoring and tracking of people and its related privacy issues. When the majority of domestic literature only addresses the U.S. Department of Homeland Security’s establishment of several large-scale information systems, this paper will address the local case that has originated in the past two years concerning Taiwan’s New Taipei City "Defense Science and Technology City" program and its content. While integrating information systems and constructing policing technology and management systems, we will scrutinize how there is a lack of consideration in the corresponding planning for privacy. The third chapter will cover surveillance in the workplace and its threat to privacy. The employers justify their electronic monitoring and tracking with "Electronic Performance Monitoring", "Enterprise Confidential", "Employees’ Consent" reasoning. This reasoning has been resulting in a dilemma for privacy. The fifth chapter investigates consumer privacy protection in a network information society. Industry provides free services, and in exchange, the user provides relevant personal information on friendships, interests and activities. The industry, then using this information, attracts advertisers, application developers and other commercial entities that see opportunities. Access to large-scale personal information has been so simple in recent years. This chapter, examines how data mining is now commonly used "marketing approach" and discuses the collection, processing, and its using of the three stages respectively for what privacy issues may encounter. Last, chapter six will conlcude.
|
author2 |
Georg Gesk |
author_facet |
Georg Gesk Tse-Hsin Huang 黃則馨 |
author |
Tse-Hsin Huang 黃則馨 |
spellingShingle |
Tse-Hsin Huang 黃則馨 The Development of Digital Footprint and the threats to privacy |
author_sort |
Tse-Hsin Huang |
title |
The Development of Digital Footprint and the threats to privacy |
title_short |
The Development of Digital Footprint and the threats to privacy |
title_full |
The Development of Digital Footprint and the threats to privacy |
title_fullStr |
The Development of Digital Footprint and the threats to privacy |
title_full_unstemmed |
The Development of Digital Footprint and the threats to privacy |
title_sort |
development of digital footprint and the threats to privacy |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/97361523630110422287 |
work_keys_str_mv |
AT tsehsinhuang thedevelopmentofdigitalfootprintandthethreatstoprivacy AT huángzéxīn thedevelopmentofdigitalfootprintandthethreatstoprivacy AT tsehsinhuang shùwèizújīzhīfāzhǎnjíyùnyòngyǔduìyǐnsīquándewēixié AT huángzéxīn shùwèizújīzhīfāzhǎnjíyùnyòngyǔduìyǐnsīquándewēixié AT tsehsinhuang developmentofdigitalfootprintandthethreatstoprivacy AT huángzéxīn developmentofdigitalfootprintandthethreatstoprivacy |
_version_ |
1718206149881233408 |