完整後設資料紀錄
DC 欄位語言
dc.contributor.author張彥閔en_US
dc.contributor.authorChang, Yenminen_US
dc.contributor.author林志潔en_US
dc.contributor.authorLin, Chih-Chiehen_US
dc.date.accessioned2014-12-12T01:24:25Z-
dc.date.available2014-12-12T01:24:25Z-
dc.date.issued2010en_US
dc.identifier.urihttp://140.113.39.130/cdrfb3/record/nctu/#GT079468510en_US
dc.identifier.urihttp://hdl.handle.net/11536/40993-
dc.description.abstract當犯罪案件發生後,目前的犯罪偵查模式,主要仍然依靠個案承辦人員的經驗以及其熟悉的偵查方式,對可能的嫌犯進行調查與訴追,而偵查的效率及成果,便與承辦人員個人的工作經驗習習相關。另一方面,資訊科技的進步一日千里,各種資料庫的分析工具不斷推陳出新;同時,隨著硬體製程的進步,處理大量資料的時間也不斷縮短。本研究的目的即是在探討是否能將資料探勘技術應用於輔助犯罪偵查,特別是利用建立與國民個人資料相關的關聯性資料庫,而後利用資料庫關聯分析來輔助犯罪偵查進行。 個人資料庫的建立是此一科技力量能夠輔助犯罪偵查進行的基礎,但建立個人資料庫勢必會影響到國民個人的隱私權益。本研究首先針對外國以及我國對於隱私權的發展以及隱私權特有的性質進行分析,並主張可以在適度的範圍內,蒐集個人主動棄置的個人相關資料以建立關聯性資料庫,但需排除敏感性較高的個人相關資料,例如健康資訊等。 本研究亦根據現行的科技技術,提出可用以建立及管理個人資料庫的意見,以及將此類分析結果用於犯罪訴追的助益。由於隱私權具備了知悉隱私權內容不以佔有為要件,以及隱私權內容洩漏不易察覺這兩個特殊的性質,這使得隱私權的權益範圍難以界定,同時一旦隱私權受到侵害,影響程度很可能可以持續很長的時間。因此,除了排除敏感性較高的個人相關資料,不納入個人資料庫的蒐集對象外,本研究亦主張針對此一關聯性資料庫的存取權限,需要經過適當的設計,使得在不影響資料分析的完整性前提下,僅有特定的被授權人能夠取得完整的資料分析結果。對於將資料探勘技術引進犯罪偵查,本研究主張在適當的管控之下,針對敏感性較低的個人資料建立關聯性資料庫,便能夠在避免個人資料不慎流出的風險之外,善加利用科技的力量,達成促進犯罪訴追效率的目的。zh_TW
dc.description.abstractOnce a crimial case happened, present criminal investigation mode, personal mainly depends on personal experience of investigators. Once there is a civilian personal database built based on relational database, it would be helpful in using the database for criminal investigation. However, building such kind of personal database would face on the issue of civilian privacy interference. The thesis aims at the development of privacy, international and domestic, and the particular characters of privacy, and tries to provide a proper possibility to build a kind of relational database of civilian personal information but exclude highly sensitive personal information, such as healthy information. The thesis also considers present technologies and tries to control use of the database. Since privacy has two important characters: knowing privacy contents does not require occupying the contents, and privacy contents leakage is not easy to be detected, once privacy is infringed, the damage could extend for a long time. Therefore, access authority of the relational database should be properly designed to limit only very few authorized people, such as prosecutor of the case, being able to access full analyzing results, to minimize the possibility of data leakage as well as to enhance criminal investigation.en_US
dc.language.isozh_TWen_US
dc.subject資料探勘zh_TW
dc.subject關聯性分析zh_TW
dc.subject個人資料庫zh_TW
dc.subject隱私權zh_TW
dc.subject犯罪偵查zh_TW
dc.subject強制處分zh_TW
dc.subject財產權zh_TW
dc.subject文字辨識zh_TW
dc.subject物品辨識zh_TW
dc.subject毒品zh_TW
dc.subject管制藥品zh_TW
dc.subject犯罪資料庫zh_TW
dc.subjectdata miningen_US
dc.subjectrelational analysisen_US
dc.subjectpersonal databaseen_US
dc.subjectprivacyen_US
dc.subjectcriminal investigationen_US
dc.subjectprosecutors' orderen_US
dc.subjectpropertyen_US
dc.subjecttext identificationen_US
dc.subjectobject identificationen_US
dc.subjectdrugen_US
dc.subjectcontrolled drugen_US
dc.subjectcriminal databaseen_US
dc.title建立個人廢棄物資料庫之隱私權限制--以輔助犯罪偵查為中心zh_TW
dc.titlePrivacy Limitation of Building Personal Litter Database:Focusing on Criminal Investigation Assistanceen_US
dc.typeThesisen_US
dc.contributor.department管理學院科技法律學程zh_TW
顯示於類別:畢業論文


文件中的檔案:

  1. 851002.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。