參考文獻
一、 中文部份
1.張台先、陳玥菁編譯,Thomas J. Smedinghoff等合著,網路法律,台北市:儒林,民87。
2.王郁琦,「網路上的隱私權問題」,資訊法務透析(85年10月),頁37-45。3.林建智,「論合理期待原則」,保險專刊33期(82年9月),頁157-166。4.郭芳瑜,師範院校學生之網路倫理態度與行為之研究,臺南師範學院國民教育研究所碩士論文,民90。5.張紹勳、張紹評、林秀娟編著,SPSS for Windows統計分析:初等統計與高等統計,四版,台北市:松崗,民89。
6.戚國雄,「資訊時代的倫理議題─兼談網路倫理」,應用倫理研究通訊第五期(87年1月),頁12-18。二、 西文部份
1. Brown, D.J. et al. “Information & Ethics in Insurance,” CPCU Journal (51:4)1998, pp:227-237.
2. Chou, D. C. and Chou, A. Y. "A manager''''s guide to data mining," Information Systems Management(Fall 1999), pp:33-41.
3. Conger,Loch and Helft ” Ethics and information technology use,” Information Systems Journal(5:3)1995,pp:161-183.
4. DeCew, J. W. In Pursuit of Privacy:Law, Ethics and the Rise of Technology, Cornell University Press, New York, 1997.
5. Elgesem D. “Privacy, Respect for Persons and risk,” In C. Ess. ed., Philosophical Perspectives on Computer-Mediated Communication, State Universtiy of New York Press, New York, 1996.
6. Elgesem D. ” The structure of rights in Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data,” Ethics and Information Technology (1:4)1999, pp: 283-293.
7. Fischer-Hubner, S. “Privacy and Security at Risk in the Global Information Society,” in Thomas, D. and Loader, B.D. ed., Cybercrime, Routledge, London, 2000, pp:173-192.
8. Fried, C. “Privacy,” Yale Law Journal(77)1968,p: 477.
9. Han, J. and Kamber, M. Data Mining:Concepts and Techniques, Academic Press, San Francisco, 2001.
10. Holvast, J. Vulnerability and Privacy, North-Holland, New York, 1993.
11. Johnson, D.G. Computer Ethics, Prentice Hall, Upper Saddle River, 1994.
12. Mason, R.O. “Four Ethical Issues of the Information Age,” Management Information Systems Quarterly (10:1)1986, pp:5-12.
13. McArthur, R.L. “Reasonable Expectations of Privacy,” Ethics and Information Technology (3)2001, pp.123-128.
14. Moor, J.H. “Towards a Theory of Privacy in the Information Age,” Computers and Society (27:3)1997, pp:27-32.
15. OECD, “Guidelines on the Protection on Privacy and Transborder Flows of Personal Data,” http://www.oecd.org/dsti/sti/it/secur/prod/PRIV-EN.HTM
16. Rachels, J. “Why Privacy Is Important,” Philosophy and Public Affairs, (4)Summer 1975, pp:323-333.
17. Regan, P. Legislating Privacy:Technology, Social Values, and Public Policy, University of North Carolina Press, Chapel Hill, 1995.
18. Rosenberg, R.S. The Social Impact of Computers, Academic Press, Boston, 1992.
19. Tavani, H.T. ”Informational Privacy, Data Mining, and the Internet,” Ethics and Information Technology (1:2)1999,pp: 137-145.
20. Tavani, H.T. "KDD, Data Mining, and the Challenge for Normative Privacy," Ethics and Information Technology (1:4)1999, pp:265-273.
21. Tavani, H.T. and Moor, J.H. "Privacy Protection, Control of Information, and Privacy-enhancing Technologies," Computers and Society (31:1)2001, pp:6-11.
22. Tunick, M. Practice and Principles, Princeton University Press, New Jersey, 1998.
23. Warren, S.D. and Brandeis, L.D. “The Right to Privacy,” Harvard Law Review (14:5)1890, pp:193-220.
24. Westin, A.F. and Baker, M.A. Databanks in a Free Society, Quadrangle/New York Times Book Co., New York, 1972.
25. Westin, A.F. Privacy and Freedom, Anatheum Press , New York, 1967.
26. Wong, J. S. K., et al. “A Framework for a World Wide Web-based Data Mining System,” Journal of Network and Computer Applications (21) 1998, pp:163-185.