The Development of Digital Footprint and the threats to privacy

碩士 === 國立臺灣大學 === 國家發展研究所 === 101 === Technological development has significantly improved the flow and the use of information, bringing our present lives more conveniences and systems to manage operational efficiency. However, information technology has also brought negative effects for individuals...

Full description

Bibliographic Details
Main Authors: Tse-Hsin Huang, 黃則馨
Other Authors: Georg Gesk
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/97361523630110422287
id ndltd-TW-101NTU05011038
record_format oai_dc
spelling ndltd-TW-101NTU050110382016-03-16T04:15:07Z http://ndltd.ncl.edu.tw/handle/97361523630110422287 The Development of Digital Footprint and the threats to privacy 數位足跡之發展及運用與對隱私權的威脅 Tse-Hsin Huang 黃則馨 碩士 國立臺灣大學 國家發展研究所 101 Technological development has significantly improved the flow and the use of information, bringing our present lives more conveniences and systems to manage operational efficiency. However, information technology has also brought negative effects for individuals. It has spurred the public and private sectors ability to deeply track our daily activities, possibly revealing the most intimate of details. With electronic monitoring, frequent tracking and information systems becoming more massive in scale, privacy is threatened. This article will be divided into six chapters. The first chapter is the introduction. The second chapter is the development of the concept of privacy. The 2nd chapter discusses the historical development of privacy rights in United States and Taiwan. The value of privacy must be understood through social and cultural context. The second chapter will examine public authorities that are using technology in criminal investigations and its use in trials, detailing possible privacy threat implications. A discussion will examine the public authority’s electronic monitoring and tracking of people and its related privacy issues. When the majority of domestic literature only addresses the U.S. Department of Homeland Security’s establishment of several large-scale information systems, this paper will address the local case that has originated in the past two years concerning Taiwan’s New Taipei City "Defense Science and Technology City" program and its content. While integrating information systems and constructing policing technology and management systems, we will scrutinize how there is a lack of consideration in the corresponding planning for privacy. The third chapter will cover surveillance in the workplace and its threat to privacy. The employers justify their electronic monitoring and tracking with "Electronic Performance Monitoring", "Enterprise Confidential", "Employees’ Consent" reasoning. This reasoning has been resulting in a dilemma for privacy. The fifth chapter investigates consumer privacy protection in a network information society. Industry provides free services, and in exchange, the user provides relevant personal information on friendships, interests and activities. The industry, then using this information, attracts advertisers, application developers and other commercial entities that see opportunities. Access to large-scale personal information has been so simple in recent years. This chapter, examines how data mining is now commonly used "marketing approach" and discuses the collection, processing, and its using of the three stages respectively for what privacy issues may encounter. Last, chapter six will conlcude. Georg Gesk 葛祥林 2013 學位論文 ; thesis 142 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺灣大學 === 國家發展研究所 === 101 === Technological development has significantly improved the flow and the use of information, bringing our present lives more conveniences and systems to manage operational efficiency. However, information technology has also brought negative effects for individuals. It has spurred the public and private sectors ability to deeply track our daily activities, possibly revealing the most intimate of details. With electronic monitoring, frequent tracking and information systems becoming more massive in scale, privacy is threatened. This article will be divided into six chapters. The first chapter is the introduction. The second chapter is the development of the concept of privacy. The 2nd chapter discusses the historical development of privacy rights in United States and Taiwan. The value of privacy must be understood through social and cultural context. The second chapter will examine public authorities that are using technology in criminal investigations and its use in trials, detailing possible privacy threat implications. A discussion will examine the public authority’s electronic monitoring and tracking of people and its related privacy issues. When the majority of domestic literature only addresses the U.S. Department of Homeland Security’s establishment of several large-scale information systems, this paper will address the local case that has originated in the past two years concerning Taiwan’s New Taipei City "Defense Science and Technology City" program and its content. While integrating information systems and constructing policing technology and management systems, we will scrutinize how there is a lack of consideration in the corresponding planning for privacy. The third chapter will cover surveillance in the workplace and its threat to privacy. The employers justify their electronic monitoring and tracking with "Electronic Performance Monitoring", "Enterprise Confidential", "Employees’ Consent" reasoning. This reasoning has been resulting in a dilemma for privacy. The fifth chapter investigates consumer privacy protection in a network information society. Industry provides free services, and in exchange, the user provides relevant personal information on friendships, interests and activities. The industry, then using this information, attracts advertisers, application developers and other commercial entities that see opportunities. Access to large-scale personal information has been so simple in recent years. This chapter, examines how data mining is now commonly used "marketing approach" and discuses the collection, processing, and its using of the three stages respectively for what privacy issues may encounter. Last, chapter six will conlcude.
author2 Georg Gesk
author_facet Georg Gesk
Tse-Hsin Huang
黃則馨
author Tse-Hsin Huang
黃則馨
spellingShingle Tse-Hsin Huang
黃則馨
The Development of Digital Footprint and the threats to privacy
author_sort Tse-Hsin Huang
title The Development of Digital Footprint and the threats to privacy
title_short The Development of Digital Footprint and the threats to privacy
title_full The Development of Digital Footprint and the threats to privacy
title_fullStr The Development of Digital Footprint and the threats to privacy
title_full_unstemmed The Development of Digital Footprint and the threats to privacy
title_sort development of digital footprint and the threats to privacy
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/97361523630110422287
work_keys_str_mv AT tsehsinhuang thedevelopmentofdigitalfootprintandthethreatstoprivacy
AT huángzéxīn thedevelopmentofdigitalfootprintandthethreatstoprivacy
AT tsehsinhuang shùwèizújīzhīfāzhǎnjíyùnyòngyǔduìyǐnsīquándewēixié
AT huángzéxīn shùwèizújīzhīfāzhǎnjíyùnyòngyǔduìyǐnsīquándewēixié
AT tsehsinhuang developmentofdigitalfootprintandthethreatstoprivacy
AT huángzéxīn developmentofdigitalfootprintandthethreatstoprivacy
_version_ 1718206149881233408