請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/55329
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 莊裕澤(Yuh-Jzer Joung) | |
dc.contributor.author | Yen-Chung Tseng | en |
dc.contributor.author | 曾彥中 | zh_TW |
dc.date.accessioned | 2021-06-16T03:56:54Z | - |
dc.date.available | 2016-02-04 | |
dc.date.copyright | 2015-02-04 | |
dc.date.issued | 2014 | |
dc.date.submitted | 2014-12-05 | |
dc.identifier.citation | [1] C. C. Aggarwal, “On k-anonymity and the curse of dimensionality,” in Proceedings of the 31st international conference on Very large data bases. VLDB Endowment,
2005, pp. 901?909. [2] S. S. Al-Fedaghi, “Beyond purpose-based privacy access control,” in Proceedings of the eighteenth conference on Australasian database-Volume 63. Australian Computer Society, Inc., 2007, pp. 23?32. [3] T. Berners-Lee. (2009) Putting government data online. [Online]. Available: http://www.w3.org/DesignIssues/GovData.html [4] ??. (2010) Linked data. [Online]. Available: http://www.w3.org/DesignIssues/LinkedData.html [5] C. Bizer, T. Heath, and T. Berners-Lee, “Linked data-the story so far,” International journal on semantic web and information systems, vol. 5, no. 3, pp. 1?22, 2009. [6] J. Brickell and V. Shmatikov, “The cost of privacy: destruction of data-mining utility in anonymized data publishing,” in Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2008, pp. 70?78. [7] G. Brumfiel, “Down the petabyte highway,” Nature, vol. 469, no. 20, pp. 282?283, 2011. [8] J.-W. Byun and N. Li, “Purpose based access control for privacy protection in relational database systems,” The VLDB Journal, vol. 17, no. 4, pp. 603?619, 2008. [9] U. Cabinet Office, “G8 Open Data Charter,” The G8, 2013. [Online]. Available: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/207772/Open_Data_Charter.pdf [10] J. Cao, P. Karras, C. Raissi, and K.-L. Tan, “ρ-uncertainty: inference-proof transaction anonymization,” Proceedings of the VLDB Endowment, vol. 3, no. 1-2, pp. 1033?1044, 2010. [11] A. B. Carroll, “The pyramid of corporate social responsibiiity: Toward the moral management of organizational stakeholders,” Business Horizons, 1991. [12] A. Cavoukian, “Privacy in the clouds,” Identity in the Information Society, vol. 1, no. 1, pp. 89?108, 2008. [13] A. Cavoukian et al., Privacy and Government 2.0: The Implications of an Open World. Information and Privacy Commissioner of Ontario, 2009. [14] S. Charney, “Trustworthy computing next,” Microsoft, white paper, 2012. [15] H. Chen, R. Chiang, and V. Storey, “Business intelligence and analytics: From big data to big impact,” MIS Quarterly, vol. 36, pp. 1165?1188, 2012. [16] M. Cherian, L. Kagal, and E. Prud’ hommeaux, “Policy mediation to enable collaborative use of sensitive data,” in The Future of the Web for Collaborative Science World Wide Web Conference, Raleigh, NC, USA, 2010. [17] T. Craig and M. E. Ludloff, Privacy and Big Data, M. Loukides and M. Blanchette, Eds. O’Reilly Media, Inc., 2011. [18] A. Dahlsrud, “How corporate social responsibility is defined: an analysis of 37 definitions,” Corporate social responsibility and environmental management, vol. 15, no. 1, pp. 1?13, 2008. [19] Data Processing Center, Ministry of Finance, R.O.C., “Message Implementation Guideline Ver: 3.1.” [Online]. Available: https://www.einvoice.nat.gov.tw/home/DownLoad?fileName=f1373596032470.pdf&CSRT=6824701616360918796 [20] T. Davies and D. Edwards, “Emerging implications of open and linked data for knowledge sharing in development,” IDS Bulletin, vol. 43, no. 5, pp. 117?127, 2012. [21] D. DiFranzo, A. Graves, J. S. Erickson, L. Ding, J. Michaelis, T. Lebo, E. Patton, G. T. Williams, X. Li, J. G. Zheng et al., “The web is my back-end: Creating mashups with linked open government data,” in Linking government data. Springer, 2011, pp. 205?219. [22] L. Ding, D. DiFranzo, A. Graves, J. Michaelis, X. Li, D. L. McGuinness, and J. Hendler, “Data-gov wiki: Towards linking government data.” in AAAI Spring Sym- posium: Linked data meets artificial intelligence, vol. 10, 2010, pp. 1?1. [23] L. Ding, T. Lebo, J. S. Erickson, D. DiFranzo, G. T. Williams, X. Li, J. Michaelis, A. Graves, J. G. Zheng, Z. Shangguan et al., “Twc logd: A portal for linked open government data ecosystems,” Web Semantics: Science, Services and Agents on the World Wide Web, vol. 9, no. 3, pp. 325?333, 2011. [24] Y. Du, T. Xia, Y. Tao, D. Zhang, and F. Zhu, “On multidimensional k-anonymity with local recoding generalization,” in Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on. IEEE, 2007, pp. 1422?1424. [25] C. Dwork, “Differential privacy,” in Automata, languages and programming. Springer, 2006, pp. 1?12. [26] E-Invoice Platform, Ministry of Finance, R.O.C., “Operation guidelines for trial implementation of e-invoicing in consumer channels (translated),” 2011. [Online]. Available: https://www.einvoice.nat.gov.tw/wSite/ct?xItem=1354802&ctNode=2350&mp=1 [27] EasyCard Corporation, “What is EasyCard?” 2013. [Online]. Available: http://www.easycard.com.tw/english/easycard/index.asp [28] Z. Fang, “E-government in digital era: concept, practice, and development,” International journal of the Computer, the Internet and management, vol. 10, no. 2, pp.1?22, 2002. [29] D. F. Ferraiolo and D. R. Kuhn, “Role-based access controls,” arXiv preprint arXiv: 0903.2171, 2009. [30] Fiscal Information Agency, Ministry of Finance. (2013, Nov.) Using carriers ensures safe merchandise returns; receipts allows food safety cloud service. [Online]. Available: http://www.fia.gov.tw/ct.asp?xItem=2622&ctNode=235&mp=1 [31] Food and R. Drug Administration. (2014, Nov.) Reinvigorating confidence and order in food safety through amendments to the act governing food safety and sanitation. [Online]. Available: http://www.mohw.gov.tw/cht/Ministry/DM2_P. aspx?f_list_no=7&fod_list_no=4982&doc_no=47558 [32] B. Fung, K. Wang, R. Chen, and P. S. Yu, “Privacy-preserving data publishing: A survey of recent developments,” ACM Computing Surveys (CSUR), vol. 42, no. 4, p. 14, 2010. [33] G. Ghinita, Y. Tao, and P. Kalnis, “On the anonymization of sparse high-dimensional data,” in Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on. IEEE, 2008, pp. 715?724. [34] J. Hendler, J. Holm, C. Musialek, and G. Thomas, “Us government linked open data: semantic. data. gov,” IEEE Intelligent Systems, vol. 27, no. 3, pp. 0025?31, 2012. [35] J. Hendler and T. Berners-Lee, “From the semantic web to social machines: A research challenge for ai on the world wide web,” Artificial Intelligence, vol. 174, no. 2, pp. 156?161, 2010. [36] K. Hill, “How target figured out a teen girl was pregnant before her father did,” 2012. [Online]. Available: http://www.forbes.com/sites/kashmirhill/2012/02/16/ how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/ [37] J. S. Hiller and F. Belanger, “Privacy strategies for electronic government,” E-government, vol. 200, pp. 162?198, 2001. [38] HM Government, “Putting the frontline first: smarter government,” 2009. [Online]. Available: http://www.official-documents.gov.uk/document/cm77/7753/7753.pdf [39] A. C. Hsueh and J. Hsu, “Taiwan Convenience Stores 2010,” Global Agriculture Information Network, Tech. Rep., 2010. [Online]. Available: http://gain.fas.usda.gov/RecentGAINPublications/TaiwanConvenienceStores2010_TaipeiATO_Taiwan_6-30-2010.pdf [40] N. Huijboom and T. Van den Broek, “Open data: an international comparison of strategies,” European journal of ePractice, vol. 12, no. 1, pp. 1?13, 2011. [41] M. Janssen, Y. Charalabidis, and A. Zuiderwijk, “Benefits, adoption barriers and myths of open data and open government,” Information Systems Management, vol. 29, no. 4, pp. 258?268, 2012. [42] Y.-J. Joung, Y.-C. Tseng, S.-C. Cha, N.-W. Lo, G. Chung, and S.-H. Hsu, “Motivations, Deployment, Assessment, and Prospects of Taiwan’s e-Invoicing System: An Overview,” in HICCS 47, 2013. [43] L. Kagal, C. Hanson, and D. Weitzner, “Using dependency tracking to provide explanations for policy management,” in Policies for Distributed Systems and Networks, 2008. POLICY 2008. IEEE Workshop on. IEEE, 2008, pp. 54?61. [44] L. Kagal and J. Pato, “Preserving privacy based on semantic policy tools,” Security & Privacy, IEEE, vol. 8, no. 4, pp. 25?30, 2010. [45] E. Kalampokis, E. Tambouris, and K. Tarabanis, “A classification scheme for open government data: towards linking decentralised data,” International Journal of Web Engineering and Technology, vol. 6, no. 3, pp. 266?285, 2011. [46] T. Kang and L. Kagal, “Enabling privacy-awareness in social networks.” in AAAI Spring Symposium: Intelligent Information Privacy Management, 2010. [47] A. Korolova, K. Kenthapadi, N. Mishra, and A. Ntoulas, “Releasing search queries and clicks privately,” in Proceedings of the 18th international conference on World wide web. ACM, 2009, pp. 171?180. [48] S. Kulk and B. Van Loenen, “Brave new open data world?” International Journal of Spatial Data Infrastructures Research, 2012. [49] D. Lambert, “Measures of disclosure risk and harm,” JOURNAL OF OFFICIAL STATISTICS-STOCKHOLM-, vol. 9, pp. 313?313, 1993. [50] S. LaValle, E. Lesser, R. Shockley, M. Hopkins, and N. Kruschwitz, “Big data, analytics and the path from insights to value,” MIT Sloan Management Review, vol. 52, no. 2, pp. 21?32, 2011. [51] D. Le-Phuoc, A. Polleres, M. Hauswirth, G. Tummarello, and C. Morbidoni, “Rapid prototyping of semantic mash-ups through semantic web pipes,” in Proceedings of the 18th international conference on World wide web. ACM, 2009, pp. 581?590. [52] K. LeFevre, D. J. DeWitt, and R. Ramakrishnan, “Incognito: Efficient full-domain k-anonymity,” in Proceedings of the 2005 ACM SIGMOD international conference on Management of data. ACM, 2005, pp. 49?60. [53] ??, “Mondrian multidimensional k-anonymity,” in Data Engineering, 2006. ICDE’06. Proceedings of the 22nd International Conference on. IEEE, 2006, pp. 25?25. [54] T. Li, N. Li, J. Zhang, and I. Molloy, “Slicing: A new approach for privacy preserving data publishing,” Knowledge and Data Engineering, IEEE Transactions on, vol. 24, no. 3, pp. 561?574, 2012. [55] C. Lin, “An appraisal of business tax reform in taiwan: The case of value-added taxation,” in The Political Economy of Tax Reform, NBER-EASE, T. Ito, A. O. Krueger, and editors, Eds. University of Chicago Press, 1992, vol. 1, pp. 137?155. [56] C. Lynch, “Big data: How do your data grow?” Nature, vol. 455, no. 7209, pp. 28?29, 2008. [57] A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, “l-diversity: Privacy beyond k-anonymity,” ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 1, no. 1, p. 3, 2007. [58] J. Manyika, M. Chui, B. Brown, J. Bughin, R. Dobbs, C. Roxburgh, and A. Byers, “Big data: The next frontier for innovation, competition, and productivity,” McKin- sey Global Institute, pp. 1?137, 2011. [59] J. Manyika, M. Chui, P. Groves, D. Farrel, S. Van Kuiken, and E. Almasi Doshi, “Open data: Unlocking innovation and performance with liquid information,” McK- insey Global Institute, Tech. Rep., 2013. [60] A. Meyerson and R. Williams, “On the complexity of optimal k-anonymity,” in Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. ACM, 2004, pp. 223?228. [61] K. Miller, “Big data analytics in biomedical research,” Biomedical Computation Review, 2012. [62] Ministry of Justice, R.O.C., “Personal Information Protection Act,” Laws & Regulatoins Database of the Republic of China, 2010. [63] ??, “Regulations Governing the Use of Uniform Invoices,” Laws & Regulatoins Database of the Republic of China, 2011. [64] ??, “Value-added and Non-value-added Business Tax Act,” Laws & Regulatoins Database of the Republic of China, 2011. [65] L. Moreau, “The foundations for provenance on the web,” Foundations and Trends in Web Science, vol. 2, no. 2?3, pp. 99?241, 2010. [66] A. Narayanan and V. Shmatikov, “Robust de-anonymization of large sparse datasets,” in Security and Privacy, 2008. SP 2008. IEEE Symposium on. IEEE, 2008, pp. 111?125. [67] ??, “Myths and fallacies of personally identifiable information,” Communications of the ACM, vol. 53, no. 6, pp. 24?26, 2010. [68] M. E. Nergiz, M. Atzori, and C. Clifton, “Hiding the presence of individuals from shared databases,” in Proceedings of the 2007 ACM SIGMOD international confer- ence on Management of data. ACM, 2007, pp. 665?676. [69] Q. Ni, E. Bertino, J. Lobo, C. Brodie, C.-M. Karat, J. Karat, and A. Trombeta, “Privacy-aware role-based access control,” ACM Transactions on Information and System Security (TISSEC), vol. 13, no. 3, p. 24, 2010. [70] B. Obama, “Transparency and open government,” The White House, 2009. [Online]. Available: http://www.whitehouse.gov/the_press_office/Transparency_and_Open_Government [71] P. Ohm, “Broken promises of privacy: Responding to the surprising failure of anonymization,” UCLA L. Rev., vol. 57, p. 1701, 2009. [72] T. Pardo, “Realizing the promise of digital government: It’s more than building a web site,” Center for technology in government, 2000. [73] President Chain Store Corporation, “iCash user guide.” [Online]. Available: http://www.icash.com.tw/howtouse.asp [74] P. Russom, “Big data analytics,” TDWI Best Practices Report, Fourth Quarter, 2011. [75] R. S. Sandhu and P. Samarati, “Access control: principle and practice,” Communications Magazine, IEEE, vol. 32, no. 9, pp. 40?48, 1994. [76] O. Seneviratne, L. Kagal, and T. Berners-Lee, Policy-aware content reuse on the web. Springer, 2009. [77] N. Shadbolt, K. O’Hara, T. Berners-Lee, N. Gibbins, H. Glaser, W. Hall et al., “Linked open government data: Lessons from data. gov. uk,” IEEE Intelligent Systems, vol. 27, no. 3, pp. 16?24, 2012. [78] P. Shi, L. Xiong, and B. Fung, “Anonymizing data with quasi-sensitive attribute values,” in Proceedings of the 19th ACM international conference on Information and knowledge management. ACM, 2010, pp. 1389?1392. [79] F. Shih and L. Kagal, “Policy-aware pipes: support accountability in mashup service of linked data.” ISWC, 2009. [80] A. C. Simpson, “On privacy and public data: A study of data. gov. uk,” Journal of Privacy and confidentiality, vol. 3, no. 1, p. 4, 2011. [81] L. Sweeney, “Uniqueness of simple demographics in the us population,” Technical report, Carnegie Mellon University, Tech. Rep., 2000. [82] ??, “Achieving k-anonymity privacy protection using generalization and suppression,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 571?588, 2002. [83] ??, “k-anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557?570, 2002. [84] P. F. Uhlir and P. Schroder, “Open data for global science,” Data Science Journal, vol. 6, no. 0, pp. OD36?OD53, 2007. [85] M. M. Wagner, J. M. Robinson, F.-C. Tsui, J. U. Espino, and W. R. Hogan, “Design of a national retail data monitor for public health surveillance,” Journal of the American Medical Informatics Association, vol. 10, no. 5, pp. 409?418, 2003. [86] K. Wang, Y. Xu, A. W.-C. Fu, and R. C.-W. Wong, “ff-anonymity: When quasi-identifiers are missing,” in Data Engineering, 2009. ICDE’09. IEEE 25th International Conference on. IEEE, 2009, pp. 1136?1139. [87] K. Wang, P. S. Yu, and S. Chakraborty, “Bottom-up generalization: A data mining solution to privacy protection,” in Data Mining, 2004. ICDM’04. Fourth IEEE International Conference on. IEEE, 2004, pp. 249?256. [88] D. J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigenbaum, J. Hendler, and G. J. Sussman, “Information accountability,” Communications of the ACM, vol. 51, no. 6, pp. 82?87, 2008. [89] X. Xiao and Y. Tao, “Anatomy: Simple and effective privacy preservation,” in Proceedings of the 32nd international conference on Very large data bases. VLDB Endowment, 2006, pp. 139?150. [90] ??, “M-invariance: towards privacy preserving re-publication of dynamic datasets,” in Proceedings of the 2007 ACM SIGMOD international conference on Management of data. ACM, 2007, pp. 689?700. [91] J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. W.-C. Fu, “Utility-based anonymization using local recoding,” in Proceedings of the 12th ACM SIGKDD interna- tional conference on Knowledge discovery and data mining. ACM, 2006, pp. 785?790. [92] Y. Xu, K. Wang, A. W.-C. Fu, and P. S. Yu, “Anonymizing transaction databases for publication,” in Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2008, pp. 767?775. [93] Y. Ye, Y. Liu, C. Wang, D. Lv, and J. Feng, “Decomposition: Privacy preservation for multiple sensitive attributes,” in Database Systems for Advanced Applications. Springer, 2009, pp. 486?490. [94] R. K. Yin, Case study research: Design and methods. vol. 5. SAGE Publications, 2003, [95] H. Yu and D. Robinson, “The new ambiguity of ’open government’,” Princeton CITP/Yale ISP Working Paper, 2012. [96] K. Zhu, “Information transparency in electronic marketplaces: Why data transparency may hinder the adoption of b2b exchanges,” Electronic markets, vol. 12, no. 2, pp. 92?99, 2002. [97] J. Zou and C. J. Pavlovski, “Towards accountable enterprise mashup services,” in e-Business Engineering, 2007. ICEBE 2007. IEEE International Conference on. IEEE, 2007, pp. 205?212. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/55329 | - |
dc.description.abstract | 近年來開放資料逐漸成為各國電子化政府的一項目標,其主因包含諸多益處例如資訊透明化、全民參與、海量資料分析、鼓勵第三方加值應用服務、等。但要達成以上目標並非易事,而隱私的問題正是其中時常被提及但鮮被深度探討的困難之一。藉此契機,此論文旨在利用台灣電子發票為例,分析政府開放資料可能帶來的隱私爭議,並嘗試提出解決方法或建議。
根據電子發票的資料交換標準訊息格式,我們合成出模擬用的資料並根據此資料提出許多可能的應用,例如經濟分析或食品安全網路、等,然而對與資料所記載的對象而言,這些應用也有相對應的隱私風險。為了在保護隱私和的前提下開放電子發票資料,我們套用QID-SA架構以建立攻擊模型並嘗試使用相關的匿名化技術來尋找能同時滿足隱私和資料可用度的解決方案。 經過分析,由於電子發票資料相對複雜,判斷尋求最佳解是極為困難的,因此我們假設了一些可能的非最佳解,惟必須設法讓隱私或可用度其中一方妥協方才可行。其他技術例如存取控制或資訊當責或許能填補匿名化的缺點,但這些概念卻違背了開放資料的初衷。即便如此,我們仍認為政府應積極參與並盡可能開放稍敏感的資料,因為正是這些資料才有研究、分析、及應用的潛力。結論來說,如果政府、企業、和人民三方能充分溝通合作,或許將不再需要妥協就能實現開放政府資料的願景。 | zh_TW |
dc.description.abstract | Open data has been on the e-government agenda of many nations for it promises information transparency and encourages involvement of citizens in democratic processes. It also shares virtues with big data and suggests even more benefits due to its accessibility. However among the various barriers of implementation, the issue of privacy is frequently mentioned but lacks elaboration in literature. This thesis will use the Taiwanese E-invoice as case to explore the implications and processes of addressing privacy in open government data (OGD).
Using the Message Implementation Guideline of Taiwanese E-invoice, sample datasets are synthesized then analyzed for applications they empower and privacy risks incurred. A well-researched concept, anonymization, is selected to address privacy-preserving data publishing via the QID-SA framework. Possible privacy attacks are modeled on this framework, and the effectiveness of anonymizing methods is assessed. The goal is to find an optimal solution, if it exists, that achieves good utility and privacy. Through analysis, we find such solution remains elusive due to the complexity of e-invoice data, and although suboptimal ones are suggested, substantial compromises must be made. Access control and information accountability may overcome the shortcomings, but these concepts deviate from the original goal of openly accessible data. Nevertheless, we still conclude that government should actively dislcose such ``unsafe' dataset despite the complications, for it is this kind of data that houses vast potential. Through communication with stakeholders and supporting legislation, we believe one day those compromises may alleviate and the prospect of OGD can be realized. | en |
dc.description.provenance | Made available in DSpace on 2021-06-16T03:56:54Z (GMT). No. of bitstreams: 1 ntu-103-R01725021-1.pdf: 3361251 bytes, checksum: e0d620fc6df5027e5c557f11832ea330 (MD5) Previous issue date: 2014 | en |
dc.description.tableofcontents | 口試委員審定書 i
Acknowledgments iii 論文摘要 v Abstract vii Contents ix List of Tables xiii 1 Introduction 1 1.1 Contributions 2 2 Research Method 5 3 Background 7 3.1 Big data applications 7 3.2 From big data to open data 10 3.3 Open government data 11 3.4 Linked data and OGD 13 3.5 OGD and privacy 15 4.Taiwanese E-invoice 17 4.1 Uniform Invoice 17 4.2 Data carriers 18 4.3 E-invoice Specifications 20 5 Approaches to Open e-invoice data 23 5.1 Repository of Downloadable Files 23 5.2 Registry of Downloadable Files 25 5.3 Direct Provision of Linked Data 25 5.4 Indirect Provision of Linked Data 26 6 Privacy risk and countermeasures 29 6.1 Types of privacy attack 30 6.1.1 Identity disclosure 30 6.1.2 Attribute disclosure 31 6.1.3 Membership disclosure 33 6.1.4 Probabilistic attack 34 6.2 Anonymization: class countermeasures 34 6.2.1 Suppression 35 6.2.2 Perturbation 35 6.3 Anonymization: QID-SA framework 36 6.3.1 Privacy protection models 37 6.3.2 Data recoding operations 40 7 Assessing privacy for Taiwanese E-invoice 45 7.1 Attempting QID-SA framework 46 7.1.1 B2B creation dataset 46 7.1.2 B2C creation dataset 51 7.2 Attempting anonymizing operations 54 7.2.1 B2B creation dataset 54 7.2.2 B2C creation dataset 58 7.2.3 No silver bullet 59 7.3 Reaching a compromise 60 7.3.1 B2B creation dataset 61 7.3.2 B2C creation dataset 65 7.4 Nobody’s happy 68 8 Beyond anonymization & Conclusion 69 8.1 Beyond anonymization 69 8.1.1 Access control 70 8.1.2 Information accountability 71 8.1.3 Complications 73 8.2 From here on... 74 8.3 Conclusion 75 A Short survey on non-QID-SA and high-dimension anonymization 79 B Demonstration of difficulty in normalizing Description 83 C Sample synthesized e-invoice records 85 Bibliography 87 | |
dc.language.iso | en | |
dc.title | 政府開放資料創新應用與可能的隱私爭議探討:以台灣電子發票為例 | zh_TW |
dc.title | Open government data applications and privacy implications: The case on Taiwanese open e-invoice data | en |
dc.type | Thesis | |
dc.date.schoolyear | 103-1 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 查士朝(Shi-cho Cha),盧信銘(Hsin-min Lu) | |
dc.subject.keyword | 開放資料,政府開放資料,電子化政府,電子發票,匿名化,隱私, | zh_TW |
dc.subject.keyword | open data,open government data,e-government,e-invoice,anonymization,privacy, | en |
dc.relation.page | 93 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2014-12-06 | |
dc.contributor.author-college | 管理學院 | zh_TW |
dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
顯示於系所單位: | 資訊管理學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-103-1.pdf 目前未授權公開取用 | 3.28 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。