跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.81) 您好!臺灣時間:2025/10/04 14:26
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳俊宏
研究生(外文):Jun-Hong Chen
論文名稱:探討資訊安全核心議題
論文名稱(外文):The Intellectual Core of Information Security Research
指導教授:蕭文龍蕭文龍引用關係
指導教授(外文):Wen-Lung Shiau
學位類別:碩士
校院名稱:銘傳大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:中文
論文頁數:98
中文關鍵詞:叢集分析引文分析共被引分析因素分析多維尺度分析資訊安全
外文關鍵詞:Information SecurityCluster AnalFactor AnalysisCitationCoCitation
相關次數:
  • 被引用被引用:0
  • 點閱點閱:638
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:2
從Internet Worm資訊安全事件爆發開始至今,在世界各地不斷的有資訊安全事件發生,同時也受到CERT、BSI、ISO等單位的關注,促使資訊安全的相關防護標準因應而生。在資訊安全議題越來越被重視的情況下,相關的學術研究文獻數量也逐年遞增,涉略的範圍也越來越廣泛。要從廣大的資訊安全領域當中找出高價值核心文獻、核心知識結構與其中的議題,總是要耗費許多閱讀時間進行彙整。因此本研究主要透過共被引分析方法來探討資訊安全的高價值文獻與核心議題,進而藉由因素分析方法、叢集分析方法以及多維尺度分析方法等不同的角度加以探討。本研究結果表示,藉由叢集分析與因素分析等結果提出數位簽章與金鑰加密安全相關應用、無線網路安全、身分驗證、隱私擴大安全、量子密碼學的安全性證明以及多粒子糾纏態量子密碼學秘密分享協定等六項資訊安全相關議題。與過去學者的研究結果進行比較,發現量子密碼學之無線網路應用或許在未來是一個值得關注的議題。
Since the Internet Worm event began, Information Security incidents occur repeatedly and more and more diversification, and then cause serious damage of economic. This phenomenon continuously increases the number of Information Security related research literature. Understanding Information Security from a large amount of data is not easy. Therefore purpose of this paper is to explore the intellectual core of Information Security research. The major resource is from ISI database. Citation and Co-Citation are used to analyze and calculate the reference frequency of large amounts of data. Finally, find six core issues of Information Security through Co-Citation, multidimensional scaling analysis, factor analysis and cluster analysis.
摘要 I
ABSTRACT II
誌謝 III
目錄 IV
表目錄 VI
圖目錄 VII
第壹章 緒論 1
第一節 研究背景 1
第二節 研究目的與問題 4
第三節 論文架構 6
第貳章 文獻探討 6
第一節 資訊安全 6
第二節 共被引的支撐文獻 24
第參章 研究方法 37
第一節 文獻收集 39
第二節 文獻修正 41
第三節 文獻分析 42
第四節 共被引分析 43
第五節 叢集分析與多維尺度分析 44
第六節 因素分析 47
第肆章 結果 47
第一節 原始文獻與核心文獻資料分布情形 47
第二節 引用門檻 48
第三節 核心文獻 49
第四節 共被引矩陣 53
第五節 叢集分析與多維尺度分析 54
第六節 因素分析 56
第七節 議題分析 58
第伍章 討論 65
第陸章 結論 69
第柒章 研究限制 73
參考文獻 74
附錄 84
iThome 即時新聞 - 中國信託繳費中心網站外洩大量用戶個資,2013 http://www.ithome.com.tw/itadm/article.php?c=80303
Acedo, F. J., Barroso, C., and Galan, J. L., "The resource-based theory: dissemination and main trends", Strategic Management Journal, (27:7), 2006, pp 621-636.
Akyildiz, I. F., Weilian, S., Sankarasubramaniam, Y., and Cayirci, E., "A survey on sensor networks", IEEE Communications Magazine, (40:8), 2002, pp 102-114.
Albrechtsen, E., "A qualitative study of users'' view on information security", Computers & Security, (26:4), 2007, pp 276-289.
Alvarez, G., and Li, S., "Some basic cryptographic requirements for chaos-based cryptosystems", International Journal of Bifurcation and Chaos, (16:5), 2006, pp 2129-2151.
Anderson, E. E., and Choobineh, J., "Enterprise information security strategies", Computers & Security, (27:1–2), 2008, pp 22-29.
Anderson, J. M., "Why we need a new definition of information security", Computers & Security, (22:4), 2003, pp 308-313.
Behnia, S., Akhshani, A., Mahmodi, H., and Akhavan, A., "A novel algorithm for image encryption based on mixture of chaotic maps", Chaos, Solitons & Fractals, (35:2), 2008, pp 408-419.
Beige, A., Englert, B.-G., Kurtsiefer, C., and Weinfurter, H., "Secure communication with a publicly known key", Acta Physica Polonica A, (101), 2002, pp 357–368.
Bennett, C. H., and Brassard, G., "Quantum Cryptography: Public Key Distribution and Coin Tossing", Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, 1984, pp 175-179.
Bennett, C. H., Brassard, G., Crepeau, C., and Maurer, U. M., "Generalized privacy amplification", IEEE Transactions on Information Theory, (41:6), 1995, pp 1915-1923.
Boneh, D., and Franklin, M., "Identity based encryption from the Weil pairing", SIAM Journal of Computing, (32:3), 2003, pp 586-615.
Branciard, C., Gisin, N., Lutkenhaus, N., Luetkenhaus, N., and Scarani, V., "Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography", Quantum Information & Computation, (7:7), 2007, pp 639-664.
BS7799, Information security management- Part 1: Code of practiice for information security management, BSI, 1999a
BS7799, Information security management- Part 2: Code of practiice for information security management, BSI, 1999b
Burrows, M., Abadi, M., and Needham, R., " A logic of authentication", ACM Transactions on Computer Systems, (8), 1990, pp 18–36.
Chang, C., and Hung, S., "Distinct Journal Preference of Successful EC Researchers: A Citation Analysis", Electronic Commerce Studies, (2:1), 2004, pp 1-18.
Chaum, D. L., "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of the ACM, (24:2), 1981, pp 84-90.
Chen, C., Chen, Z., and Li, Y., "Characterizing and defending against divide-conquer-scanning worms", Computer Networks, (54:18), 2010, pp 3210-3222.
Chen, L.-C., and Lien, Y.-H., "Using author co-citation analysis to examine the intellectual structure of e-learning: A MIS perspective", Scientometrics, (89:3), 2011, pp 867-886.
Clarke, R., "Information technology and dataveillance", Communications of the ACM, (31:5), 1988, pp 498-512.
Cox, I. J., Kilian, J., Leighton, F. T., and Shamoon, T., "Secure spread spectrum watermarking for multimedia", IEEE Transactions on Image Processing, (6:12), 1997, pp 1673-1687.
Csiszar , I., and Korner, J., "Broadcast channels with confidential messages", IEEE Transactions on Information Theory, (24:3), 1978, pp 339-348.
Culnan, M., "Mapping the intellectual structure of MIS, 1980-1985: a co-citation analysis", MIS Quarterly, (11:3), 1987, pp 341-353.
Culnan, M. J., "The intellectual development of management information systems, 1972-1982: a co-citation analysis", Management Science, (32:2), 1986, pp 156-172.
Debuisschert, T., and Fossier, S., "Security analysis of the time-coding quantum key distribution protocols", Quantum Information & Computation, (11:11-12), 2011, pp 968-987.
Denning, D. E., "An Intrusion-Detection Model", IEEE Transactions on Software Engineering, (13:2), 1987, pp 222-232.
Diffie, W., and Hellman, M., "New directions in cryptography", IEEE Transactions on Information Theory, (22:6), 1976, pp 644-654.
Ding, Y., "Semantic Web: Who is who in the field - a bibliometric analysis", Journal of Information Science, (36:3), 2010, pp 335-356.
Ding, Y., Chowdhury, G., and Foo, S., "Mapping the intellectual structure of information retrieval studies: an author co-citation analysis, 1987-1997", Journal of Information Science, (25:1), 1999, pp 67-78.
Dolev, D., and Yao, A., "On the security of public key protocols", IEEE Transactions on Information Theory, (29:2), 1983, pp 198-208.
ElGamal, T. A., " A public-key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, (31), 1985, pp 469–472.
Forcht, K. A., Computer security management, Boyd & Fraser Pub. Co., 1994
Fung, C.-H. F., Tamaki, K., Qi, B., Lo, H.-K., and Ma, X., "Security proof of quantum key distribution with detection efficiency mismatch", Quantum Information & Computation, (9:1-2), 2009, pp 131-165.
Galvagno, M., "The intellectual structure of the anti-consumption and consumer resistance field An author co-citation analysis", European Journal of Marketing, (45:11-12), 2011, pp 1688-1701.
Gao, F., Guo, F., Wen, Q., and Zhu, F., "Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication", Science in China Series G: Physics, Mechanics and Astronomy, (51:5), 2008, pp 559-566.
Gao, F., Qin, S.-J., Wen, Q.-Y., and Zhu, F.-C., "Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state", Optics Communications, (283:1), 2010, pp 192-195.
Gerber, M., and Solms, R. v., "From Risk Analysis to Security Requirements", Computers & Security, (20:7), 2001, pp 577-584.
Gisin, N., Ribordy, G. g., Tittel, W., and Zbinden, H., "Quantum cryptography", Reviews of Modern Physics, (74), 2002, pp 145–195.
Gold, S., "Understanding the hacker psyche", Network Security, (2011:12), 2011, pp 15-17.
Goldreich, O., Goldwasser, S., and Micali, S., "How to construct random functions", Journal of the ACM, (33:4), 1986, pp 792-807.
Goldwasser, S., and Micali, S., "Probabilistic encryption", Journal of Computer and System Sciences, (28:2), 1984, pp 270-299.
Goldwasser, S., Micali, S., and Rivest, R. L., "A digital signature scheme secure against adaptive chosen-message attacks", SIAM Journal on Computing, (17:2), 1988, pp 281-308.
Gottesman, D., Lo, H.-K., Lutkenhaus, N., and Preskill, J., "Security of quantum key distribution with imperfect devices", Quantum Information & Computation, (5), 2004, pp 325-360.
Grover, V., Ayyagari, R., Gokhale, R., Lim, J., and Coffey, J., "A Citation Analysis of the Evolution and State of Information Systems within a Constellation of Reference", Journal of the Association for Information Systems, (7:5), 2006, pp 270-325.
Hone, K., and Eloff, J. H. P., "Information security policy — what do international information security standards say?", Computers & Security, (21:5), 2002, pp 402-409.
Hancock, B., "Security crisis management — the basics", Computers & Security, (21:5), 2002, pp 397-401.
He, D., Ma, M., Zhang, Y., Chen, C., and Bu, J., "A strong user authentication scheme with smart cards for wireless communications", Computer Communications, (34:3), 2011, pp 367-374.
He, H., Hu, M., Zhang, W., Zhang, H., and Yang, a. Z. 2005. "Topology-based macroscopical response and control technology for network security event," in Computational Intelligence and Security, Pt 2, Proceedings, pp. 560-566.
Hedstrom, K., Kolkowska, E., Karlsson, F., and Allen, J. P., "Value conflicts for information security management", The Journal of Strategic Information Systems, (20:4), 2011, pp 373-384.
Hendler, J., Shadbolt, N., Hall, W., Berners-Lee, T., and Weitzner, D., "Web science: an interdisciplinary approach to understanding the web", Communications of the ACM, (51:7), 2008, pp 60-69.
Hillery, M., Bužek, V., and Berthiaume3, A., "Quantum secret sharing", Physical Review A, (59), 1999, pp 1829–1834.
Hsiao, C. H., and Yang, C., "The intellectual development of the technology acceptance model: A co-citation analysis", International Journal of Information Management, (31:2), 2011, pp 128-136.
Hu, C.-P., Hu, J.-M., Gao, Y., and Zhang, Y.-K., "A journal co-citation analysis of library and information science in China", Scientometrics, (86:3), 2011, pp 657-670.
Hu, Q., Hart, P., and Cooke, D., "The role of external and internal influences on information systems security – a neo-institutional perspective", The Journal of Strategic Information Systems, (16:2), 2007, pp 153-172.
Hung, S., Hung, W., Kang, T., and Tang, K., "Publication Productivitiy of IS Researchers in the Pacific Asia Region: An Analysis of DSS and I&M Journals (2003-2007)", Pacific Asia Journal of the Association for Information Systems, (1:2), 2009, pp 38-53.
Huttner, B., Imoto, N., Gisin, N., and Mor, T., "Quantum cryptography with coherent states", Physical Review A, (51:3), 1995, pp 1863-1869.
Hwang, K., Kwok, Y.-K., Song, S., Chen, M. C. Y., Chen, Y., Zhou, R., and Lou, X., "GridSec: Trusted grid computing with security binding and self-defense against network worms and DDoS attacks", Computational Science -ICCS 2005 (3516), 2005, pp 187-195.
Inamori, H., Lutkenhaus, N., and Mayers, D., "Unconditional security of practical quantum key distribution", The European Physical Journal D, (41:3), 2007, pp 599-627.
ISO/IEC17799, Information technology-code of practice for information security management, I. I. O. f. Standardization), 2000
Jia, Z., Lin, X., Tan, S.-H., Li, L., and Yang, Y., "Public key distribution scheme for delay tolerant networks based on two-channel cryptography", Journal of Network and Computer Applications, (35:3), 2012, pp 905-913.
Juels, A., "RFID security and privacy: a research survey", Selected Areas in Communications, IEEE Journal on, (24:2), 2006, pp 381-394.
Karlsson, A., Koashi, M., and Imoto, N., "Quantum entanglement for secret sharing and secret splitting", Physical Review A, (59:1), 1999, pp 162-168.
Kaspersky - Kaspersky Lab Confirms Flashfake / Flashback Botnet Infected more than 600,000 Mac OS X Computers, Describes Ramifications and Remedies, 2012a
http://www.kaspersky.com/about/news/virus/2012/Kaspersky_Lab_Confirms_Flashfake_Flashback_Botnet_Infected_more_than_600_000_Mac_OS_X_Computers_Describes_Ramifications_and_Remedies
Kaspersky - The menace on your mobile – six times as much malware found in 2011, 2012b
http://www.kaspersky.com/about/news/virus/2012/The_menace_on_your_mobile_six_times_as_much_malware_found_in_2011
Koblitz, N., "Elliptic Curve Cryptosystem", Computer Journal of Mathematics Computation, (48:3), 1987, pp 203-209.
Kruskal, J. B., "Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis", Psychometrika, (29:1), 1964, pp 1-27.
Kshetri, N., "The simple economics of cybercrimes", IEEE COMPUTER SOCIETY, (4:1), 2006, pp 33-39.
Lamport, L., "Password authentication with insecure communication", Communications of the ACM, (24:11), 1981, pp 770-772.
Lee, W. H., "How to identify emerging research fields using scientometrics: An example in the field of Information Security", Scientometrics, (76:3), 2008, pp 503-525.
Leifer, R., and Mills, P. K., "An Information Processing Approach for Deciding upon Control Strategies and Reducing Control Loss in Emerging Organizations", Journal of Management Information Systems, (22:1), 1996, pp 113-137.
Leydesdorff, L., and Vaughan, L., "Co-occurrence matrices and their applications in information science: Extending ACA to the Web environment", Journal of the American Society for Information Science and Technology, (57:12), 2006, pp 1616-1628.
Li, C.-T., and Hwang, M.-S., "An efficient biometrics-based remote user authentication scheme using smart cards", Journal of Network and Computer Applications, (33:1), 2010, pp 1-5.
Liao, I.-E., Lee, C.-C., and Hwang, M.-S., "A password authentication scheme over insecure networks", Journal of Computer and System Sciences, (72:4), 2006, pp 727-740.
Lidong, Z., and Haas, Z. J., "Securing ad hoc networks", IEEE Network, (13:6), 1999, pp 24-30.
Liu, Z., "Visualizing the intellectual structure in urban studies: A journal co-citation analysis (1992-2002)", Scientometrics, (62:3), 2005, pp 385-402.
Lo, H.-K., and Chau, H. F., "Unconditional security of quantum key distribution over arbitrarily long distances", Science (283), 1999, pp 2050–2056.
Lo, H.-K., Chau, H. F., and Ardehali, M., "Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security", Journal of Cryptology, (18:2), 2005, pp 133-165.
Loch, K. D., Houston, H. C., and Warkentin, M. E., "Threats to Information Systems: Today''s Reality, Yesterday''s Understanding", MIS Quarterly, (16:2), 1992, pp 173-186.
Maurer, U. M., "Secret key agreement by public discussion from common information", IEEE Transactions on Information Theory, (39:3), 1993, pp 733-742.
Mayers, D., "Unconditional security in quantum cryptography", Journal of the ACM, (48:3), 2001, pp 351-406.
Mayers, D., and Salvail, L., "Quantum oblivious transfer is secure against all individual measurements", Workshop on Physics and Computation, 1994. PhysComp ''94, Proceedings., 1994, pp 69-77.
McCain, K. W., "Mapping authors in intellectual space: A technical overview", Journal of the American Society for Information Science, (41:6), 1990, pp 433-443.
Mollick, E., "Tapping into the underground", Sloan Management Review, (46:4), 2005, pp 21–24.
Needham, R. M., and Schroeder, M. D., "Using encryption for authentication in large networks of computers", Communications of the ACM, (21:12), 1978, pp 993-999.
Neumann, P. G., Computer Related Risks, 1995
Niekerk, J. F. V., and Solms, R. V., "Information security culture: A management perspective", Computers & Security, (29:4), 2010, pp 476-486.
Oliveira, L. B., Aranha, D. F., Gouvea, C. P. L., Scott, M., Camara, D. F., Lopez, J., and Dahab, R., "TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks", Computer Communications, (34:3), 2011, pp 485-493.
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler, D. E., "SPINS: security protocols for sensor networks", Wireless Networks, (8:5), 2002, pp 521-534.
Pilkington, A., and Meredith, J., "The evolution of the intellectual structure of operations management-1980-2006: A citation/co-citation analysis", Journal of Operations Management, (27:3), 2009, pp 185-202.
Pointcheval, D., and Stern, J., "Security arguments for digital signatures and blind signatures", Journal of Cryptology, (13:3), 2000, pp 361–396.
Posthumus, S., and Solms, R. v., "A framework for the governance of information security", Computers & Security, (23:8), 2004, pp 638-646.
Provos, N., McNamee, D., Mavrommatis, P., Wang, K., and Modadugu, N., The Ghost In The Browser Analysis of Web-based Malware, 2007
Qi, B., Fung, C.-H. F., Lo, H.-K., and Ma, X., "Time-shift attack in practical quantum cryptosystems", Quantum Information & Computation, (7:1-2), 2007, pp 73-82.
Rachedi, A., Benslimane, A., Otrok, H., Mohammed, N., and Debbabi, M., "A Secure Mechanism Design-Based and Game Theoretical Model for MANETs", Mobile Networks & Applications, (15:2), 2010, pp 191-204.
Ramos-Rodriguez, A.-R., and Ruiz-Navarro, J., "Changes in the intellectual structure of strategic management research: a bibliometric study of the Strategic Management Journal, 1980-2000", Strategic Management Journal, (25:10), 2004, pp 981-1004.
Rex Kelly Rainer, J., Snyder, C. A., and Carr, H. H., "Risk analysis for information technology", Journal of Management Information Systems, (8:1), 1991, pp 129-147.
Richardson, R., 2010 / 2011 CSI Computer Crime and Security Survey, 2011
Rivest, R. L., Shamir, A., and Adleman, L., "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, (21:2), 1978, pp 120-126.
Saint-Germain, R., "Information security management best practice based on ISO/IEC 17799", The Information Management Journal, (39:4), 2005, pp 60 - 66.
Scarani, V., Bechmann-Pasquinucci, H., Cerf, N. J., Dušek, M., Lutkenhaus, N., and Peev, M., "The security of practical quantum key distribution", Reviews of Modern Physics, (81:3), 2009, pp 1301-1350.
Schultz, E. E., Proctor, R. W., Lien, M.-C., and Salvendy, G., "Usability and Security An Appraisal of Usability Issues in Information Security Methods", Computer & Security, (20:7), 2001, pp 620-634.
Shamir, A., "How to share a secret", Communications of the ACM, (22:11), 1979, pp 612-613.
Shannon, C., "Communication theory of secrecy systems", Bell Systems Technical Journal, (28), 1949, pp 656-715.
Small, H., "Co citation in the scientific literature: A new measure of the relationship between two documents", Journal of the American society for information science, (24:4), 1973, pp 265-269.
Small, H., and Griffith, B., "The structure of scientific literatures I: Identifying and graphing specialties", Science studies, (4), 1974, pp 17-40.
Solms, R. v., "Information security management: The second generation", Computers & Security, (15:4), 1996, pp 281-288.
Spafford, E. H., "The internet worm program: an analysis", ACM SIGCOMM Computer Communication Review, (19:1), 1989, pp 17-57.
Takesue, H., Nam, S. W., Zhang, Q., Hadfield, R. H., Honjo, T., Tamaki, K., and Yamamoto, Y., "Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors", Nature Photon, (1), 2007, pp 343-348.
Tight, M., "Higher education research as tribe, territory and/or community: a co-citation analysis", Higher Education, (55:5), 2008, pp 593-605.
Tsay, M., Xu, H., and Wu, C., "Journal co-citation analysis of semiconductor literature", Scientometrics, (57:1), 2003, pp 7-25.
Wang, C., Deng, F. G., and Long, G. L., "Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger state", Optics Communications, (253:1–3), 2005, pp 15-20.
Wegman, M. N., and Carter, J. L., "New hash functions and their use in authentication and set equality", Journal of Computer and System Sciences, (22:3), 1981, pp 265-279.
White, H., "Author cocitation analysis and Pearson''s r", Journal of the American Society for Information Science and Technology, (54:13), 2003, pp 1250-1259.
White, H. D., and McCain, K. W., "Visualizing a discipline: An author co-citation analysis of information science, 1972-1995", Journal of the American Society for Information Science, (49:4), 1998, pp 327-355.
Wootters, W. K., and Zurek, W. H., "A single quantum cannot be cloned", Nature, (299), 1982, pp 802 - 803.
Wright, M., "Third Generation Risk Management Practices", Computer Fraud & Security, (1999:4), 1999, pp 9-12.
Xu, F., Chen, W., Wang, S., Yin, Z., Zhang, Y., Liu, Y., Zhou, Z., Zhao, Y., Li, H., Liu, D., Han, Z., and Guo, G., "Field experiment on a robust hierarchical metropolitan quantum cryptography network", Chinese Science Bulletin, (54:17), 2009, pp 2991-2997.
Yang, D., and Wu, J., "Review and prospect of relationship marketing: A citation analysis", Contemporary Management Research, (3:3), 2007, pp 267-284.
Young, R., Zhang, L., and Prybutok, V. R., "Hacking into the Minds of Hackers", Information Systems Management, (24:4), 2007, pp 281-287.
Zazali, H. H., and Othman, W. A. M., "Key Exchange in Elliptic Curve Cryptography Based on the Decomposition Problem", Sains Malaysiana, (41:7), 2012, pp 907-910.
Zou, C. C., Towsley, D., Gong, W., and Cai, S., "Advanced routing worm and its security challenges", Simulation-Transactions of the Society for Modeling and Simulation International, (82:1), 2006, pp 75-85.
電子全文 電子全文(本篇電子全文限研究生所屬學校校內系統及IP範圍內開放)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 2.吳瑾瑜,網路中無體商品交易之民法相關問題 ─ 以線上遞送付費商業電腦軟體為例,政大法學評論,第74 期,2003年6月。
2. 4.吳瑾瑜,論網站標價錯誤之法律效力,月旦法學雜誌,第187期,2010年12月。
3. 8.林瑞珠,網路拍賣契約爭議問題之研究,月旦法學雜誌,第130期,2006年2月。
4. 11.邱映曦,網路拍賣之法制趨勢,科技法律透析,第19卷8期,2007年08月。
5. 12.高志明,網路拍賣服務提供者對於拍賣商品之法律責任--以日本法制及司法實務見解為借鏡,萬國法律,第150 期,2006 年12 月。
6. 14.郭戎晉,日本網路購物標價錯誤判決與臺、日實務差異之研究,科技法律透析,2010年4月。
7. 15.郭戎晉,購物網站價格標示錯誤法律問題之研究–由臺北地方法院民事判決出發,臺北大學法學論叢,第76期,2010年12月。
8. 16.陳惠茹,看日本如何解決電子商務交易糾紛,科技法律透析,2009年6月。
9. 17.陳自強,意思表示錯誤之基本問題,政大法學評論,第52期,1994年。
10. 19.陳信至,網路交易是否適用消保法–以所謂數位商品為例(上),科技法律透析,2002年6月。
11. 20.陳信至,網路交易是否適用消保法–以所謂數位商品為例(下),科技法律透析,2002年7月。
12. 21.陳信至,網路交易是否適用消保法–以郵購買賣之要件及解約權效果為例(上),萬國法律,第124期,2002年8月。
13. 22.陳信至,網路交易是否適用消保法–以郵購買賣之要件及解約權效果為例(下),萬國法律,第125期,2002年10月。
14. 24.馮震宇,論網際網路與消費者保護之問題(下),資訊法務透析,1998年7月。
15. 25.黃茂榮,電子商務契約與電子簽章(上),植根雜誌,第24卷第10期,2008年9月。