|
[1] Yumi Asahi. Privacy protection against ubiquitous marketing. SICE Annual Conference 2010, pages 18–21, 2010. [2] Internet marketing exposure in malaysia. http://www.gobalakrishnan.com/ 2006/12/malaysia-internet-marketing/. [3] Moslein.K.M Koch.M. Building consumer’s confidence in adopting ecommerce.”identities management for e-commerce and collaboration application”. International Journal of Electronic Commerce Vol.9 No.3, pages 11–29, 2005. [4] Looi.H.C. E-commerce adoption in brunei darussalam: a quantitative analysis of factors influencing its adoption. Communication of the Association for Information Systems Vol.15, pages 61–81, 2005. [5] Licker.P.s Molla.A. Perceived e-readiness factors in e-commerce adoption: An empirical investigation in a developing country. International Journal of Electronic Commerce Vol.10 No.1, pages 83–110, 2005. [6] Business-to-business. https://en.wikipedia.org/wiki/Business-to-business. [7] Business-to-consumer. https://en.wikipedia.org/wiki/Business-to-consumer. [8] Consumer-to-business. https://en.wikipedia.org/wiki/Consumer-to-business. [9] Elance. https://www.upwork.com/?r. [10] Consumer-to-business. https://en.wikipedia.org/wiki/Customertocustomer. 45 [11] Ruten. http://www.ruten.com.tw/. [12] Online-to-offline. http://www.benzinga.com/general/education/15/08/5768857/ what-does-o2o-mean-for-the-future-of-e-commerce. [13] Data privacy. https://www.techopedia.com/definition/10380/information-privacy. [14] Apple and amazon patch security flaws exposed by hack. http:// www.theguardian.com/ technology/ blog/ 2012/ aug/ 08/ apple-amazon-patchsecurity. [15] 王家福,劉海年. 中國人權百科全書. Journal of international and comparative law, page 644, 1998.05. [16] Samuel D.Warren and Louis D.Brandeis. The right to privacy [j.] harvard law review. 5(4):193–220, 1890. [17] Irwin Altman. Privacy regulation: culturally universal or culturally specific? Journal of Social Issues, 1977, pages 66–84, 1977. [18] 劉德良. 隱私與隱私權問題研究. 社會科學, 8:51–58, 2003. [19] Henry L. Hu. [a commentary on the decision of the first case of human flesh search. J legal application, 7, 2009. [20] John Edward Campbell Matt Carlson. Panopticon.com: Online surveillance and the commodification of privacy. Journal of Broadcasting Electronic Media, 4(46): 586–606, 2002. [21] Mark S.Ackerman and Jr. Donald T.Davis. Privacy and security issues in ecommerce. New Economy Handbook, page Chap 39, 2003. [22] E-commerce sales report by e-marketer2014. http://www.emarketer.com/Article/ Worldwide-Ecommerce-Sales-Increase-Nearly-20-2014/1011039. [23] What data does google collect? https://privacy.google.com/data-we-collect.html. 46 [24] What data does baidu collect? http:// ir.baidu.com/ phoenix.zhtml? c=188488p=privacy. [25] What data does amazon collect? http://www.amazon.com/gp/help/customer/ display.html?nodeId=468496. [26] 李欲曉. 雲計算大數據時代個人隱私保護刻不容緩. 理論報導, 10(7), 2013. [27] Ashley madson data breach. https:// en.wikipedia.org/ wiki/ AshleyMadisondatabreach. [28] Godwin J.Udo. A privacy and security concerns as major barriers for e-commerce: a survey study. In Information Management Computer Security, volume 9/4, pages 165–174, 2001. [29] WenXi. Utilization and protection of user’s personal information in e-commerce. 2014. [30] Reputation impact of a data breach. http://www.experian.com/assets/data-breach/ white-papers/reputation-study.pdf. [31] Target shares drop. http://blogs.wsj.com/moneybeat/2014/01/21/target-takesanother-hit-shares-drop-to-52-week-low/. [32] Data security laws and penalties. http://www.techrepublic.com/blog/data-center/ data-security-laws-and-penalties-pay-it-now-or-pay-out-later/. [33] Ashley madison suicide case. http://www.dailymail.co.uk/news/article-3208907/ The-Ashley-Madison-suicide-Texas-police-chief-takes-life-just-days-email-leakedcheating-website-hack.html. [34] Godwin J.Udo. Privacy and security concerns as major barriers for e-commerce: a survey study. Information Management Computer Security 9/4, pages 165–174, 2001. 47 [35] How to use web cookies with e-commerce websites. http:// blog.unibulmerchantservices.com/ how-to-use-web-cookies-with-e-commercewebsites/. [36] Custora. E-commerce customer acquisition snapshot. pages 3–4, Q2 2013. [37] Mailchimp research. http:// mailchimp.com/ resources/ research/ effects-of-listsegmentation-on-email-marketing-stats/. [38] Data mining and e-commerce. http://www.ebaytechblog.com/2010/10/20/datamining-and-e-commerce. [39] Data classification. https://www.umsystem.edu/ums/is/infosec/classification/. [40] Microsoft safety and security center. https://www.microsoft.com/en-us/security/ pc-security/default.aspx?WT.mcid = SiteLink. [41] Telesign consumer account security report. https://www.telesign.com/resources/ research-and-reports/telesign-consumer-account-security-report/. [42] 如 何 處 理 網 購 快 遞 訂 單. http:// www.jobtrans.cn/ News2016033010283893IARIX.html. [43] Voipsupply. http://www.voipsupply.com/. [44] Symantec. https://www.symantec.com/. [45] Symantec threat report. https://www.symantec.com/security-center/threat-report. [46] Trustware. https://www.trustwave.com/home/. [47] Pci security. https://www.pcisecuritystandards.org/pcisecurity/. [48] Mcafee. http://www.mcafee.com/us/index.html. [49] Vaultlabs. http://vaultlabs.com/. [50] Carbonite. https://www.carbonite.com/. 48 [51] CASC. Casc 2015 consumer trust survey. pages 3–4, 2015. [52] European Union. European parliament and council directive 95/46/ec. Official Journal L281 of 23.11.1995, 1995. |