박사

클라우드 서비스에서 개인정보 국외 이동에 관한 연구

노현숙 2015년
논문상세정보
' 클라우드 서비스에서 개인정보 국외 이동에 관한 연구' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 가상화
  • 개인정보
  • 국외 이전
  • 국외 제공
  • 분산화
  • 클라우드 서비스
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
784 0

0.0%

' 클라우드 서비스에서 개인정보 국외 이동에 관한 연구' 의 참고문헌

  • 클라우드컴퓨팅 활성화를 위한 법제도 개선방안 연구, 제7장 클라우드컴퓨팅 서비스의 정보보호 이슈
    이민영 한국인터넷진흥원 [2010]
  • 클라우드 컴퓨팅 플랫폼과 오픈 플랫폼 기술
    한재선 정보처리학회지 제16권 제2호 [2009]
  • 클라우드 서비스의 통신정책적 고찰
    오병철 정보법학 제15권 제2호 [2011]
  • 클라우드 서비스와 소프트웨어 서비스의 법적 이슈
    손승우 정보법학 제14권제2호 [2010]
  • 클라우드 서비스와 개인정보보호
    김기창 정보법학 제16권 제3호 [2012]
  • 클라우드 서비스 환경에서의 개인정보의 미국 이전에 따른 문제점 및대응방안 연구 - 미국 정부기관에 의한 개인정보 누출 위험을 중심으로-, 법학논고
    박완규 경북대학교 법학연구원 [2012]
  • 비교법적 관점에서 본 개인정보 보호법의 문제점과 개정방향: 한국 EU 일본을 중심으로
    Internet and Information Security 제3권 제2호 [2012]
  • 국내외 클라우드 동향 및 전망
    박형우 이종숙 정보처리학회지 제16권 제2호 [2009]
  • 개인정보 보호법 일부개정법률안
    조원진 의원 대표발의 [2014]
  • 개인정보 국외이전 관련 국가 간 협력방안 연구
    이용규 한국정보보호진원 [2006]
  • 個人情報の保護に關する法律.
  • “클라우드 서비스와 개인정보보호의 문제점”
    정연덕 정보법학 제15권 제3호 [2012]
  • http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf.
  • http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2012/wp196_en.pdf.
  • Yoo, Christopher S., The Changing Patterns of Internet Usage, 63 Fed.Comm. L.J. 67 (2010).
  • Wugmeister, Miriam, Karin Retzer & Cynthia Rich, Global Solution forCross-border Data Transfers: Making the Case for CorporatePrivacy Rules, 38 Geo. J. Int'l L. 449 (2007).
  • Wittow, Mark H. & Daniel J. Buller, Cloud Computing: Emerging LegalIssues for Access to Data, Anywhere, Anytime, 14 No. 1 J.Internet L. 1 (2010).
  • Whitman, James Q., The Two Western Cultures of Privacy: DignityVersus Liberty, 113 Yale L.J. 1151 (2004).
  • Warren, Samuel D. & Louis D. Brandeis, The Right to Privacy, 4 Harv.L. Rev. 193 (1890).
  • Vouk, Mladen A., Cloud Computing-Issues, Research andImplementations, 16 J. Computing & Info. Tech. 235 (2008).
  • Van Hoboken, Joris V. J. & Ira S. Rubinstein, Privacy and Security inthe Cloud: Some Realism about Technical Solutions toTransnational Surveillance in the Post-Snowden Era, 66 Me.L. Rev. 487 (2014).
  • Uniting and Strengthening America by Providing Appropriate ToolsRequired to Intercept and Obstruct Terrorism Act of 2001(USA PATRIOT Act).
  • United States Internationl Trade Commission, Policy Challenges of Cross-BorderCloud Computing, Journal of International Commerce and Economy,2012.
  • Transfers of personal data to third countries: Applying Article 26 (2) ofthe EU Data Protection Directive to Binding Corporate Rulesfor International Data Transfers, adopted on June 3, 2003.
  • Stavridis, James & Elton C. Parker III, Sailing the Cyber Sea, Issue 65, 2ndquarter 2012.http://www.carlisle.army.mil/dime/documents/Sailing%20the%20Cybersea%20Stavridis.pdf.
  • Speta, James B., A Common Carrier Approach to InternetInterconnection, 54 Fed. Comm. L.J. 225 (2002).
  • Soghoian, Christopher, Caught in the Cloud: Privacy, Encryption, andGovernment Back Doors in the Web 2.0 Era, 8 J. Telecomm. &High Tech. L. 359 (2010).
  • Smith, Delbert D., The Interdependence of Computer and CommunicationsServices and Facilities: A Question of Federal Regulations, 117 U. Pa.L. Rev. 829 (1969).
  • Sluijs, Jasper P., Pierre Larouche & Wolf Sauter, Cloud Computing in the EUPolicy Sphere, 2011.
  • Schwartz, Paul M., European Data Protection Law and Restrictions onInternational Data Flows, 80 Iowa L. Rev. 471 (1995).
  • Ryan, W. Michael & Christopher M. Loeffler, Insights into Cloud Computing, 22No. 11 Intell. Prop. & Tech. L.J. 22 (2010).
  • Robison, Jeremy, Free at What Cost?: Cloud Computing Privacy Under theStored Communications Act, 98 Geo. L.J. 1195 (2010).
  • Robinson, Gustavus H., The Pubulic Utility Concept in American Law, 41Harv. L. Rev. 277 (1928).
  • Reilly, Steven M., Losing My Edge: The Copyrigh Implicationsn ofAudioblogging and Why Blogs Matter to the Music Industry, 12Vand. J. Ent. & Tech. L. 439 (2010).
  • Reidenberg Joel R. & Francoise Gamet-Pol, The Fundamental Role ofPrivacy and Confidence in the Network, 30 Wake Forest L.Rev. 105 (1995).
  • Rashbaum, Kenneth N., Bennett B. Borden & Theresa H. Beaumont,Outrun the Lions: A Practical Framework for Aanaysis of LegalIssues in the Evolution of Cloud Computing, 12 Ave Maria L.Rev. 71 (2014).
  • Proposal for a Regulation of the European Parliament and of thecouncil on the protection of individuals with regard to theprocessing of personal data and on the free movement of suchdata (General Data Protection Regulation).
  • Opinion 05/2012 on Cloud Computing 17, (EC) No. 01037/12, WP 196(2012), Article 29 Data Protection Working Party,
  • OECD Guidelines on the Protection of Privacy and Transborder Flows ofPersonal Data.
  • O'Reilly, James T., Homeland Security and The Future of Privacy Rights:A Commentary, 55-Jun Fed.Law. (2008).
  • Newman, John M., Copyright Freeconomics, 66 Vand. L. Rev. 1409(2013).
  • Narkiewicz, David, Legal Tech Forecast: Cloudy, with Only a Chance ofPurchasing New Sosftware, 32-APR Pa. Law. 56 (2010).
  • Narayanan, Vineeth, Harnessing the Cloud: International Law Implications ofCloud-Com[uting, 12 Chi. J. Int'l L. 783 (2012).
  • Mowbray, Miranda, The Fog over the Grimpen Mire: CloudComputing and the Law, Technology and Society, Vol. 6, no.1(2009).
  • Millstein, Julian S. & Matthew King, Cloud Computing and Outsourcing:Is Data Lost in the Fog?, 981 PLI/Pat 173 (2009).
  • Miller, Michael, Cloud Computing: Web-Based Applications That Changethe Way You Work and Collaborate Online, Que. 2008.
  • Mell, Peter & Tim Grance, The NIST Definition of Cloud Computing,Version 15, Nat'l Inst. Standards & Tech., 2009,http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf.
  • McAllister, Breck P., Lord Hale and Business Affected with A Public Interest,43 Harv. L. Rev. 759 (1930).
  • Mary Meeker, David Joseph & Anant Thaker, Technology Trends, MorganStanley, 2008.
  • Martinez, Jenny S., Process and Substance in the “War on Terror”, 108Colum. L. Rev. 1013 (2008).
  • Martin, Timothy D., Hey! You! Get Off of My Cloud: Defining andProtecting the Metes and Bounds of Privacy, Security, andProperty in Cloud Computing, 92 J. Pat. & Trademark Off. Soc'y283 (2010).
  • M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G.Lee, D. Patterson, A. Rabkin, I. Stoica & M. Zaharia, Above theClouds: A Berkeley View of Cloud Computing, Technical ReportNo. UCB/EECS-2009-28, University of California at Berkley,USA, Feb. 10, 2009.
  • Lewis, Grace, Basics About Cloud Computing, Software Eng'g Inst.,Carnegie Mellon Univ., 2010.
  • Lemley, Mark A., Antitrust and the Internet Standardization Problem,28 Conn. L. Rev. 1041 (1996).
  • Lanois, Paul, Caught in the Clouds: The WEB 2.0, Cloud Computing, andPrivacy?, 9 Nw. J. Tech. & Intell. Prop. 29 (2010).
  • Lametti, David, The Cloud: Bondless Digital Potential or Enclosure 3.0?, 17Va. J.L. & Tech. 190 (2012).
  • Kono, Toshiyuki & Paulius Jurcys, International Jurisdiction over CopyrightInfringements in the Cloud, 2012.
  • King, Nancy J. & V.T. Raja, What Do THey Really Know About Mein the Cloud? A Comparative Law Perspective on ProtectingPrivacy and Security of Sensitive Consumer Data, 50 Am.Bus. L.J. 413 (2013).
  • Kesan, Jay P. Carol M. Hayes & Masooda N. Bashir, Information Privacyand Data Control in Cloud Computing: Consumers, PrivacyPreferences, and Market Efficiency, 70 Wash. & Lee L. Rev.341 (2013).
  • Kemp, Richard, Trends in Information Technology Law: LookingAhead to 2010, 15 No. 1 Cyberspace Law. 9 (2010).
  • John Soma, Melodi Mosley Gates & Michael Smith, Bit-Wise but PrivacyFoolish: Smarter E-Messaging Technologies Call for a Return toCore Privacy Principles, 20 ALB. L.J. SCI. & Tech. 487 (2010).
  • Irwin, Manley R., The Computer Utility: Competition or Regulation?, 76Yale L. J. 1299 (1967).
  • ICT융합에 따른 방송통신 이용자보호 법제의 합리적 개선방안
    박종수 법제연구 제44호 [2013]
  • Hondius, Frits W., Data Law in europe, 16 Stan. J. Int'l L. 87, 89 (1980).
  • Hon, W. Kuan & Christopher Millard, Cloud Computing vs TraditionalOutsourcing ?Key Differences, 4 (2012).
  • Harshbarger, Jared A., Cloud Computing Providers and Data SecurityLaws: Building Trust with United States Companies, 16 J.Tech. L. & Pol'y, 229 (2011).
  • Guidelines for the Regulation of Computerized Personal Data Files.
  • Greenleaf, Graham, The Influence of European Data Privacy StandardsOutside Europe: Implications for Globalization of Convention108, 2 Int'l Data Privacy L. 68 (2012).
  • Goodman, Ellen P. & Anne H. Chen, Modeling Policy for New PublicService Media Networks, 24 Harv. J.L. & Tech. 111 (2010).
  • Froomkin, A. Michael, Flood Control on the Information Ocean: Livingwith Anonymity, Digital Cash, and Distributed Databases, 15J.L. & Com. 395 (1996).
  • Foster, Ian, Yong Zhao, Ioan Raicu & Shiyong Lu, Cloud Computing andGrid Computing 360-Degree Compared,http://arxiv.org/ftp/arxiv/papers/0901/0901.0131.pdf.
  • European Union Agency for Fundamental Rights & Council of Europe,Handbook on European Data Protection Law, 2014.
  • EU Data Protection Directive 95/46/EC.
  • Dial, Audra A. & John M. Moye, Trade Secrets in the Cloud:Assessing and Mitigating the Risks, 17 No. 11 J. Internet L. 1(2014).
  • Denny, William R., Survey of Recent Developments in the Law ofCloud Computing and Software as a Service Agreement, 66Bus. Law. 237 (2010).
  • Data Protection Act 1998.
  • Cross Border Privacy Rules.
  • Couillard, David A., Defogging the Cloud: Applying FourthAmendment Principles to Evolving Privacy Expectations inCloud Computing, 93 Minn. L. Rev. 2205 (2009).
  • Convention for the Protection of Individuals with regard to AutomaticProcessing of Personal Data.
  • Cole, Patrick E., New Challenges to the U.S. Multinational Corporarionin the European Economic Community: Data Protection Laws,17 N.Y.U. J. Int'l L. & Pol. 893 (1985).
  • Cohen, Julie E., Examined Lives: Informational Privacy and theSubject as Object, 52 Stan. L. Rev. 1373 (2000).
  • Cloud Computing의 지적재산권 문제
    박준석 정보법학 제15권 제1호 [2011]
  • Charter of Fundamental Rights of the European Union.
  • Chander, Anupam & Uyen P. Le, Data Nationalism, 64 Emory L.J. 677(2015).
  • Carey, Peter, Data Protection Third Edition, A Practical Guide to UKand EU Law, Oxford Univerity Press, 2009.
  • Buyya, Rajkumar, Rajiv Ranjan & Rodrigo N. Calheiros, Modeling andSimulation of Scalable Cloud Computing Environments and theCloudSim Toolkit: Challenges and Opportunities, 7 Proc. HighPerformance Computing & Simulation Conf. 1 (2009).
  • Bundesdatenschutzgesetz.
  • Boone, M. Scott, The Past, Present, and Future of Computing and ItsImpact on Digital Rights Management, Mich. St. L. Rev. 413(2008).
  • Blau, George L., Seeing Through Clouds, 36-APR Wyo. Law. 42(2013).
  • Billings, John T., European Protectionism in Cloun Computing:Addressing Concerns over the Patriot Act, 21 CommLawConspectus 211 (2012).
  • Bickerstaff, Steve, Shackles on the Giant, 78 Tex. L. Rev. 1, 85 (1999).
  • Besunder, Alison Arden, Best Practices for Data Protection andPrivacy Leading Lawyers on Creating A Data ProtectionStrategy, Dealing with Security Breaches, and AnalyzingRecent Trend in Legislation-Assisting Business Clients withKey Data Protection and Privacy Considerations, 2009 WL4026403.
  • Baun, Christian, Marcel Kunze, Jens Nimis & Stefan Tai, CloudComputing, Springer-Verlag, 2010.
  • Barnhill, David S., Cloud Computing and Stored Communications:Another Look at Quon v. Arch Wireless, 25 Berkeley Tech.L.J. 621 (2010).
  • Baker, Jennifer, European Distrust of US Data Security CreatesMarket For Local Cloud Service: Europeans Worried Aboutthe US Patriot Act Prefer to Keep Their Data in the EU,2011.
  • Bainbridge, David, Data Protection Law Second Edition, XPL, 2005.
  • Andrews, Damon C. & John M. Newman, Personal Jurisdiction andChoice of Law in the Cloud, http://ssrn.com/abstract=222767.
  • Rajkumar, Chee Shin Yeo & Srikumar Venugopal, MarketorientedCloud Computing: Vision, Hype, and Reality for Delivering IT Servicesas Computing Utilities, Proceedings of the 10th IEEE InternationalConference on High Performance Computing and Communications,2008.
  • Paul M., Preemption and Privacy, 118 Yale L.J. 902 (2009).
  • Paul M., Information Privacy in the Cloud, 161 U. Pa. L. Rev.1623 (2013).
  • Paul M., From Victorian Secrets to Cyberspace Shaming, 76 U.Chi. L. Rev. 1407 (2009).
  • Mark A. & David McGowan, Legal Implications of NetworkEconomic Effects, 86 Cal. L. Rev. 479 (1998).