Table of Contents Table of Contents
Previous Page  101 / 148 Next Page
Information
Show Menu
Previous Page 101 / 148 Next Page
Page Background

通訊監察與民主監督

101

Law Review

, 27, 1: 125-163.

)

許家源

(

2014

)。〈論通訊保障及監察法「調取票」之創設〉,《靜宜

法學》,

3: 95-113

。(

Hsu, C. Y. [2014]. A study of the “access

warrant” in the Communication Security and Surveillance Act.

Providence Law Review

, 3: 95-113.

)

張麗卿

(

2014

)。〈通訊保障及監察法之修正與評析〉,《月旦法學雜

誌》,

229: 25-45

。(

Chang, L. C. [2014]. The Communication

Security and Surveillance Act: Amendment and critique.

The

Taiwan Law Review

, 229: 25-45.

)

劉定基

(

2013

)。〈析論個人資料保護法上「當事人同意」的概念〉,

《月旦法學雜誌》,

218: 146-167

。(

Liu, T. C. [2013]. On the

notion of “consent of the parties” within the meaning of the

Personal Information Protection Act.

The Taiwan Law Review

,

218: 146-167.

)

劉靜怡

(

2016

)。〈監視科技設備與交通違規執法〉,《月旦法學雜誌》,

248: 73-84

。(

Liu, C. Y. [2016]. Monitoring technology equip-

ments and traffic enforcement.

The Taiwan Law Review

, 248:

73-84.

)

Angwin, J.

(

2014

)

.

Dragnet nation: A quest for privacy, security, and

freedom in a world of relentless surveillance

. New York: Times

Books.

Bentham, J., & Božovič, M.

(

Eds.

)

(

2010

)

.

The panopticon writings.

London: Verso Books.

Bignami, F.

(

2007

)

. Privacy and law enforcement in the European

Union: The data retention directive.

Chicago Journal of Interna-

tional Law,

8

,

1: 233-255.

Cameron, I.

(

2000

)

.

National security and the European Convention

on Human Rights.

The Hague, the Netherlands: Kluwer Law In-

ternational.

Cohen, J. E.

(

2012

)

.

Configuring the networked self: Law, code, and the

play of everyday practice.

New Haven, CT: Yale University Press.

Cohen, J. E.

(

2013

)

. What privacy is for.

Harvard Law Review,

126, 7:

1904-1933.

Cole, D.

(

2014, March

)

. Can privacy be saved.

The New York Review