帳號:guest(3.15.226.33)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者:邱菊梅
作者(英文):Chu-Mei Chiu
論文名稱:基於電子郵件及區塊鏈技術之電子公文交換架構
論文名稱(英文):An Architecture for Electronic Exchange of Official Document Based on Email and Blockchain
指導教授:許芳銘
指導教授(英文):Fang-Ming Hsu
口試委員:李漢銘
李維斌
鄭仁亮
侯佳利
許芳銘
口試委員(英文):Hahn-Ming Lee
Wei-Bin Lee
Jen-Liang Cheng
Jia-Li Hou
Fang-Ming Hsu
學位類別:博士
校院名稱:國立東華大學
系所名稱:企業管理學系
學號:89932010
出版年(民國):112
畢業學年度:111
語文別:中文
論文頁數:109
關鍵詞:公文電子交換區塊鏈電子郵件電子憑證數位簽章訊息傳遞
關鍵詞(英文):official document exchangeblockchainemailelectronic certificatedigital signaturemessage transfer
相關次數:
  • 推薦推薦:0
  • 點閱點閱:16
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:5
  • 收藏收藏:0
公文為政府治理的重要資產,更是政府機關政務溝通之重要工具。我國於1998年開始致力於電子化政府之推動,以網路替代馬路,使各機關的公文交換可以突破地域與時間的限制,也大幅提升政府行政效率。目前,公文電子交換系統已逾36,000個用戶,範圍包含政府機關、學校及民間公司行號、組織團體、立法委員辦公室等,影響層面極為深廣。因此,為公文交換提供快速、便捷、穩定、安全的環境,成為主管部門義不容辭的任務。
本研究目的在於提出便利、安全、信任且經濟的電子公文交換新架構。首先,本研究以交換系統之利益相關者為虛擬組織,藉由SWOT分析結果推導本研究之核心概念;其次,依文獻探討及作者實務經驗提出電子公文交換新架構;再根據新架構實作雛型系統,從系統安全性及效能驗證技術可行性;最後,進行便利性及成本效益之評估。
本研究所提出之電子公文交換架構主要是透過電子郵件系統提供便利又經濟的交換平台,並擴展電子公文到個人;藉由區塊鏈技術提供不可竄改及可信任的電子公文交換紀錄帳本;採用公開基礎金鑰電子憑證提供用戶實名註冊,以解決電子郵件身分偽冒、詐騙郵件議題;傳送或收取每份電子公文時,均須簽章驗章、加解密,以確保電子公文之保密性、完整性及不可否認性等需求。
本文研究主要貢獻包含:(1)整合電子郵件及區塊鏈發展電子公文交換架構,以降低維運成本及增加系統信任度。(2)具有雙重信任、不可否認性及確認送達效力。(3)終端用戶個人無須自行保管區塊鏈私鑰,亦無損交換紀錄安全信任程度。
Official documents are an important asset for government governance, and an essential tool for government agencies to communicate with each other. The theme of Electronic-Government has been promoted in Taiwan since 1998 by taking advantage of information technology and the Internet, so that the exchange of official documents between various agencies can eliminate geographical and time constraints, and it also greatly improves the administrative efficiency of the government. At present, the official document electronic exchange system has more than 36,000 users, including government agencies, schools, private companies, organizations, legislators' offices, etc., and the system's influence is extremely extensive. Therefore, providing a fast, convenient, stable, and secure environment for the exchange of official documents has become a duty-bound task for the competent authorities. The purpose of this study is to propose a new architecture for electronic document exchange that is convenient, secure, trusted, and economical. First of all, this research considers the stakeholders of the exchange system as a virtual organization, and deduces the research concept through SWOT analysis; secondly, based on the literature review and the author's practical experience, a new architecture of electronic document exchange is proposed; next, a prototype system is implemented based to the new architecture, and is verified for the technical feasibility from the perspective of system safety and performance; finally, the convenience and cost of the architecture is evaluated. The proposed architecture is mainly to provide a convenient and economical exchange platform through the email system, to expand electronic official documents to individuals; to provide an unalterable and trusted electronic document exchange record through blockchain technology; the public key infrastructure certificate authority’s certificate provides real-name registration for users to solve the problems of e-mail identity forgery and fraudulent mail; every electronic document sent or received must be signed, verified, encrypted and decrypted to ensure the confidentiality, integrity and non-repudiation of electronic documents. The main contributions of this research include: (1) integrating email and blockchain to develop an electronic document exchange architecture to reduce maintenance costs and increase system trust; (2) providing double trust, non-repudiation, and confirmation of delivery; (3) no need to keep the private keys of the blockchain for end users, which will not damage the security and trust of the exchange records.
誌謝辭 I
摘要 II
Abstract III
目 次 V
表 次 VII
圖 次 VIII
第一章 緒論 1
第一節 研究背景 1
第二節 研究動機 4
第三節 研究目的 5
第四節 研究範圍與限制 6
第五節 名詞解釋 7
第二章 文獻探討 12
第一節 公文電子交換技術發展 12
第二節 區塊鏈技術之可信任性 22
第三節 電子郵件技術之便利與安全 35
第三章 研究方法 44
第一節 研究概念 44
第二節 研究設計 48
第三節 研究流程 50
第四章 安全信任新架構及雛型系統實作 51
第一節 構思安全信任新架構 51
第二節 雛型系統實作 54
第三節 收發文作業處理 62
第四節 測試情境設計 65
第五節 實測公文收發 70
第五章 評估分析及討論 74
第一節 實測結果評估分析 74
第二節 區塊鏈架構討論 86
第三節 交換平臺討論 88
第六章 研究結論與建議 92
第一節 研究結論 92
第二節 研究貢獻 95
第三節 未來研究建議 97
參考文獻 99
附錄 雛型系統環境建構作業 110
Aldawood, H. A. & Skinner, G. (2019). A Critical Appraisal of Contemporary Cyber Security Social Engineering Solutions:Measures, Policies, Tools and Applications. International Journal of Security (IJS), 10(1), 1-15.
Al-Mashhadi, H. M. & Alabiech, M. H. (2017). A Survey of Email Service; Attacks, Security Methods and Protocols. International Journal of Computer Applications, 162(11).
Almazrooie, M., Samsudin, A., Gutub, A. A. A., Salleh, M. S., Omar, M., &Hassan, S. A. (2018). Integrity verification for digital Holy Quran verses using cryptographic hash function and compression, Journal of King Saud University -Computer and Information Sciences, 32(1), 24-34.
Alsaidi, A., Al-lehaibi, K., Alzahrani, H., AlGhamdi M., & Gutub A. (2018). Compression Multi-Level Crypto Stego Security of Texts Utilizing Colored Email Forwarding. Journal of Computer Science & Computational Mathematics, 8(3),33-42.
Anderson, B. M. (2020-01-09). The Most In-Demand Hard and Soft Skills of 2020. Retrieved from https://www.linkedin.com/business/talent/blog/talent-strategy/linkedin-most-in-demand-hard-and-soft-skills, (2022.12.04).
Ayodele, T., Shoniregun, C. A., & Akmayeva, G. (2011-02-21~23). Security review of email summarization systems. 2011 World Congress on Internet Security (WorldCIS-2011), London, UK. https://ieeexplore.ieee.org/document/5749866 , doi: 10.1109/WorldCIS17046.2011.5749866
Ayodele, T., Shoniregun, C. A., & Akmayeva, G. (2012-06-10~12). Anti-phishing prevention measure for email systems. World Congress on Internet Security (WorldCIS), Guelph, ON, Canada. https://ieeexplore.ieee.org/document/6280179
Azaria, A., Ekblaw, A., Vieira, T. & Lippman, A. (2016-08-22~24). MedRec:Using Blockchain for Medical Data Access and Permission Management. 2016 2nd International Conference on Open and Big Data (OBD). Vienna, Austria, 25-30, Retrieved from https://ieeexplore.ieee.org/document/7573685, doi: 10.1109/OBD.2016.11.
Back, A. (2002). Hashcash - A Denial of Service Counter-Measure.1st August 2002. Retrieved from http://hashcash.org/papers/hashcash.pdf (2022.10.13)
Barker, P. (2002). Information Technologies. Clinician's Guide to Assistive Technology, 115-126.
Birthriya, S. K. & Jain, A. K. (2022). A Comprehensive Survey of Phishing Email Detection and Protection Techniques. Information Security Journal: A Global Perspective, 31(4). https://doi.org/10.1080/19393555.2021.1959678
Bitnodes. (2022-12-06). Reachable Bitcoin Nodes. Retrieved from https://bitnodes.io/ (2022.12.06).
Bocek, T., Rodrigues, B. B., Strasser, T. & Stiller, B. (2017). Blockchains everywhere - a use-case of blockchains in the pharma supplychain. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 772–777.
Boucher, P., Nascimento, S., & Kritikos, M. (2017). How blockchain technology could change our lives. European Parliamentary Research Service, Scientifc Foresight Unit. Doi: 10.2861/926645.
Brookes, T. (2021-03-11). What Is Secure Email, and should You Switch? Retrieved from https://www.howtogeek.com/710380/, (2022-02-04).
Dwork, C., & Naor, M. (1992-08-15~18). Pricing via processing or combatting junk mail. Annual International Cryptology Conference, Santa Barbara, CA, USA . Advances in Cryptology - CRYPT0 '92, LNCS 740, 139-147.
Cagigas, D., Clifton, J., Diaz-Fuentes, D. & Fernandez-Gutierrez, M. (2019), Blockchain for Public Services: A Systematic Literature Review, Digital Object Identifier 10.1109/ACCESS.2021.3052019
Campaign Monitor (2021-01-26). Campaign Monitor Benchmarks Report Shows Email Growth Tripled in 2020. Retrieved from https://www.globenewswire.com/news-release/2021/01/26/2164364/0/en/Campaign-Monitor-Benchmarks-Report-Shows-Email-Growth-Tripled-in-2020.html (2022.04.27)
Casino, F. Dasaklis, T. K. & Patsakis, C. (2019). A systematic literature review of blockchain based applications: Current status, classifcation and open issues. Telematics and Informatics, 36, 55–81. https://doi.org/10.1016/j.tele.2018.11.006
Ceci, L. (2022-09-12). Number of e-mails per day worldwide 2017-2025. Retrieved from https://www.statista.com/statistics/456500/daily-number-of-e-mails-worldwide/, (2022.12.04).
Cha, S.-C. & Yeh, K.-H. (2018-5-30 ~ 06-01). An ISO/IEC 15408-2 Compliant Blockchain System for IoT Auditing Management. 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China, https://ieeexplore.ieee.org/document/8433185/metrics#metrics
Cha, S.-C., Wang, H., Tan Z., Joung Y.-J., Tseng Y.-C., & Yeh K.-H. (2020). On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining. IEEE Transactions on Emerging Topics in Computational Intelligence, 4(5), 641-652, doi: 10.1109/TETCI.2019.2938547.
Chen, W., Zheng, Z., Ngai, E. C., Zheng, P., & Zhou, Y. (2019), Exploiting Blockchain Data to Detect Smart Ponzi Schemes on Ethereum. IEEE Access, 7, 37575-37586.
Choudhari, S. & Das S. (2021-06-16~18). Spam E-mail Identification Using Blockchain Technology. 2021 International Conference on Communication, Control and Information Sciences (ICCISc), Idukki, India. https://ieeexplore.ieee.org/document/9485018 doi: 10.1109/ICCISc52257.2021.9485018
Christidis, K. & Devetsikiotis, M. (2016). Blockchains and Smart Contracts for the Internet of Things. IEEE Access, 4, 2292–2303.
De Filippi, P., Mannan, M., & Reijers, W. (2020). Blockchain as a confidence machine: The problem of trust & challenges of governance. Technology in Society, 62. https://doi.org/10.1016/j.techsoc.2020.101284.
DeFilippis, E., Impink, S. M., Singell, M., Polzer, J. T., & Sadun, R. (2020) Collaborating During Coronavirus: The Impact of COVID-19 on the Nature of Work, NBER Working Papers 27612, National Bureau of Economic Research, Inc. doi: 10.1109/CNS.2018.8433185. doi: 10.1504/IJWGS.2018.095647.
Ding, J., Xu, H., Li, P., & Zhu, F. (2018), Research on Food Safety Traceability Technology Based on RFID Security Authentication and 2-Dimensional Code, Proceedings of the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIs), Matsue, Japan, 2018, 517-526.
Dovbnya, A. (2019-05-29). 10 Major Blockchain Trends in 2019. Retrieved https://u.today/guides/blockchain/10-major-blockchain-trends-in-2019, (2022.12.03).
Ethereum. (2022-12-06). Ethereum Mainnet Statistics. Retrieved from https://ethernodes.org/ (2022.12.06).
Ferris, M. (1994). New email security infrastructure. NSPW '94: Proceedings of the 1994 workshop on new security paradigms, 20-27. Retrieved from https://www.nspw.org/papers/1994/nspw1994-ferris.pdf , (2020.12.12).
Griggs, K. N., Ossipova, O., Kohlios, C. P., Baccarini, A. N., Howson, E. A., & Hayajneh, T. (2018), Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring, Journal of Medical Systems, 42(7), 130. https://doi.org/10.1007/s10916-018-0982-x.
Gellens, R. and Klensin, J. (2006). Message Submission for Mail. Network Working Group T.I. Society, 1-14.
Hinarejos, M. F., Ferrer-Gomila, J. -L., & Huguet-Rotger, L. (2019). A Solution for Secure Certified Electronic Mail Using Blockchain as a Secure Message Board. IEEE Access, 7, 31330-31341.
Hinarejos, M. F. & Ferrer-Gomila, J. -L. (2020). A Solution for Secure Multi-Party Certified Electronic Mail Using Blockchain. IEEE Access, 8, 102997-103006.
Hanrahan B. V. & Quiñones, M. A. P. (2015-04-18). Lost in e-mail: Pulling users down a path of interaction. the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York, United States. Retrieved from https://doi.org/10.1145/2702123.2702351 (2021.05.17).
Heartfield, R. & Gan, D. (2016). Social engineering in the internet of everything. Cutter IT Journal, 29(7), 20-29.
Hou, H. (2017-07-31~08-03). The Application of Blockchain Technology in E-Government in China. 2017 26th International Conference on Computer Communication and Networks (ICCCN). Vancouver, BC, Canada.
Hughes, L., Dwivedi, Y. K., Misra, S. K., Rana, N. P., Raghavan, V., & Akella, V. (2019). Blockchain research, practice and policy: Applications, benefts, limitations, emerging research themes and research agenda. International Journal of Information Management. https://doi.org/10.1016/j. ijinfomgt.2019.02.005
Hyperledger. (2022). Use Install, build and deploy solutions using Hyperledger technologies. Retrieved from https://www.hyperledger.org/use (2022.11.22).
Fabric. (2020). A Blockchain Platform for the Enterprise. Retrieved from https://hyperledger-fabric.readthedocs.io/en/release-2.5/ (2023.01.10).
IC3. (2020). Internet Crime Report 2020. Retrieved from https://www.ic3.gov/Media/PDF/AnnualReport/2020_IC3Report.pdf (2022.12.04).
Jervfors, F. (2007-02-07). How Mail Systems Work. Retrieved from https://squirrelmail.org/wiki/HowMailSystemsWork (2019.09.27)
Juan, M. D., Andrés, R. P., Rafael, P. M., Gustavo, R. E., & Manuel, P. C. (2018). A Model for National Electronic Identity Document and Authentication Mechanism Based on Blockchain, International Journal of Modeling and Optimization, 8(3), 160-165.8
Kobayashi, Y., Fujimoto, Y., & fujita. K. (2019). Development of E-mail Delivery Mediation System Based on Interruptibility and Its Evaluation in Daily Office Work Scenario, IEEE Acess, 7, 94084~94096.
Konstantinidis, I., Siaminos, G., Timplalexis, C., Zervas, P., Peristeras, V., & Decker, S. (2018). Blockchain for Business Applications: A Systematic Literature Review. Business Information Systems, 320. https://doi.org/10.1007/978-3-319-93931-5_28
Kumar, A., Chaudhary, M. & Kumar, N. (2015). Social engineering threats and awareness: a survey. European Journal of Advances in Engineering and Technology, 2(11), 15-19.
Kumar, R. & Singh, A. J. (2015). Understanding steganography over cryptography and various steganography techniques, International Journal of Computer Science and Mobile Computing, 4(3), 253–258.
Lamport, L., Shostak, R., & Pease, M. C. (1982). The Byzantine Generals Problem. Computer Science, 382-401
Lee, H. L. (2015-11-12). PM Lee Hsien Loong at the 80th Anniversary Celebrations of the United Overseas Bank (UOB) on 12 November 2015. Retrieved from https://www.pmo.gov.sg/Newsroom/pm-lee-hsien-loong-80th-anniversary-celebrations-united-overseas-bank-uob-12-november (2022.11.30).
Lee, W., Rotoloni,B. (2018). 2017 Emerging Cyber Threats, Trends & Technologies Report. Georgia Institute of Technology, 28.
Lin, I.-C. & Liao, T.-C. (2017). A Survey of Blockchain Security Issues and Challenges. International Journal of Network Security, 19(5), 653-659.
Madrigal, A. C. (2014-04-05). Email Is Still the Best Thing on the Internet. Retrieved from https://www.theatlantic.com/technology/archive/2014/08/why-email-will-never-die/375973/?single_page=true (2022. 04.07).
Maimon, D., Howell, C. J., Moloney, M., & Park Y. S. (2020). An Examination of Email Fraudsters’ Modus Operandi. Crime & Delinquency, 1, 1-30.
Malik, A., Sikka, G., & Verma, H. (2017). A high-capacity text steganography scheme based on LZW compression and color coding, Engineering Science and Technology, 20(1), 72–29.
Merisalo M.& Raulas M. (2004). The impact of e-mail marketing on brand loyalty. Journal of Product & Brand Management, 13(7), 498-505.
Myers, J., & Rose, M. (1996). RFC1939: Post office protocol-Version 3. Retrieved from https://dl.acm.org/doi/pdf/10.17487/RFC1939, (2022.11.05).
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System, retrieved from https://bitcoin.org/bitcoin.pdf (2018.07.01).
Neu, C. R., Anderson, R. H. & bikson, T.K. (1998). E-Mail Communication Between Government and Citizens Security, Policy Issues, and Next Steps. RAND Science and Technology, 1-8.
Niranjanamurthy, M. (2014). E-commerce: Recommended Online Payment Method – PayPal. International Journal of Computer Science and Mobile Computing, 3(7), 669-679.
Olleros, F. X. & Zhegu, M. (2016). Research handbook on digital transformations. Edward Elgar publisher.
Peck, M. E. (2017). Blockchains: How they work and why they’ll change the world, IEEE Spectrum, 54(10), 26–35.
Person, T. (2019-02-28). Markets are eating the world. Retrieved from https://www.ribbonfarm.com/2019/02/28/markets-are-eating-the-world/ (2023-01-03)
Poller, A., Waldmann, U., Vowé, S., & Turpe, S. (2012). Electronic identity cards for user authentication-promise and practice. IEEE Security and Privacy, 10(1), 46–54.
Reddick, C. G., Rodríguez-Bolívar, M. P., & Scholl, H. J. (2021). Blockchain and the Public Sector Theories, Reforms, and Case Studies. Public Administration and Information Technology, 36.
Rijn, J. V. (2023-01). Email is not dead. But email IS changing, retrieved from https://www.emailisnotdead.com/ (2023.01.10).
Rivera, R., Robledo, J. G., Larios, V. M., & Avalos, J. M (2017-09-14~17). How digital identity on blockchain can contribute in a smart city environment. 2017 International Smart Cities Conference (ISC2), Wuxi, China. https://ieeexplore.ieee.org/document/8090839 (2020.05.26). doi: 10.1109/ISC2.2017.8090839
Sampson, M. (2003). Electronic Mail. Encyclopedia of Information Systems, 2, 57-70.
Saraf, C. & Sabadra, S. (2018). Blockchain Platforms: A Compendium. 2018 IEEE International Conference on Innovative Research and Development (ICIRD). pp. 1-6, doi: 10.1109/ICIRD.2018.8376323.
Schäfer, C. (2015). Detection of compromised email accounts used for spamming in correlation with mail user agent access activities extracted from metadata, 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), 2015, pp. 1-6, doi: 10.1109/CISDA.2015.7208641.
Schwab K. (2016). Fourth Industrial Revolution, World Economic Forum. Retrieved from https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-it-means-and-how-to-respond/ (2022.09.30)
Sheikh, S. A. & Banday, M. T. (2021). A Cryptocurrency-based E-mail System for SPAM Control. International Journal of Advanced Computer Science and Applications (IJACSA), 12(1), 324-333.
Spahiu, E., Spagnoletti, P., & Federici T. (2022) Blockchain Technology Applications in Businesses and Organizations. Advances in Data Mining and Database Management. 239.
Sullivan, C. & Burger, E. (2017). E-residency and blockchain. Computer Law and Security Review, 33(4). 470–481.
Szabo, N. (2001). Trusted Third Parties are Security Holes. Retrieved from https://nakamotoinstitute.org/trusted-third-parties/ (2022.10.28).
Tam, KC. (2018-04-02). Blockchain and the Challengers. Retrieved from https://medium.com//kctheservant/blockchain-and-the-challengers-74e22cf0cf4e, (2022.06.14)
Tapscott, D. & Tapscott, A. (2016). Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and World. Penguin Random House.
Tempesta, S. (2020-02-05). 2020 Resolutions for Blockchain. https://www.linkedin.com/pulse/2020-resolutions-blockchain-stefano-tempesta (2022.8.10).
Trading Economics. (2023-01). Euro Area - Individuals using the internet for sending/receiving e-mails. Retrieved from https://tradingeconomics.com/euro-area/individuals-using-the-internet-for-sending-receiving-e-mails-eurostat-data.html (2023.01.10).
UAE. (2022-05-04). Blockchain in the UAE government. Retrieved from https://u.ae/en/about-the-uae/digital-uae/blockchain-in-the-uae-government (2022.08.11).
Volzdoska, R. R. P., McComb, S., Green, S. G., & Compton, W. D. (2003) Examining a curvilinear relationship between communication frequency and team performance in cross-functional project teams. IEEE Transactions on Engineering Management, 50(3), 262-269.
Werbach, K. (2018), The blockchain and the new architecture of trust. Information Policy. Kindle Edition.
Whittaker, S. & Sidner, C. (1996-04-13~18). Email overload: Exploring personal information management of email. the SIGCHI Conference on Human Factors in Computing Systems. British Columbia. Vancouver, Canada. Retrieved from https://dl.acm.org/doi/10.1145/238386.238530, https://doi.org/10.1145/238386.238530 (2022.01.15).
Whittaker, S., Bellotti, V., & Cwizdka, J. (2007). Everything through e-mail. Personal Information Management. University of Washington Press, 167-189.
Zeddini, B., Maachaoui, M., & Inedjaren, Y. (2022). Security Threats in Intelligent Transportation Systems and Their Risk Levels. Cyber Risk and Security, 10(5), 91, https://doi.org/10.3390/risks10050091
王擎天。(2017)。區塊鏈。創見文化,2017年8月。
大紀元。(2013-05-23)。電子公文遭駭 資安辦:機密文件未流失。檢自https://www.epochtimes.com.tw/n60843/ (2022.10.06)。
古瑞源。(2020)。開放文件格式藉由公文電子交換系統推廣接受度研究。中國文化大學資訊管理學系。
行政院。(2021)。資通安全責任等級分級辦法。資通安全管理法及子法彙編。110 年 9 月(民)。
行政院研究發展考核委員會。(2004)。公文交換G2B2C計畫。九十三年二月(民)。
行政院研究發展考核委員會。(2011)。第四階段電子化政府計畫(101 年至105 年)(核定本),100 年05 月(民)。
行政院秘書處。(2010)。文書處理手冊。2010。
何祖鳳、吳怡菱、李昂樺、劉家榮、蕭春蘭。(2006)。各國政府機關電子公文檔案管理—以英國、美國、日本為例,2006年。
李光斗。(2018)。區塊鏈財富革命。湖南教育出版社。
陳曉莉。(2015-11-19)。新加坡總理李顯龍:銀行業者應擁抱行動支付與區塊鏈等新技術。檢自https://www.ithome.com.tw/news/100072 (2022.11.30)。
林怡芬、葉奕昕。(2020) 。從文書流程管理缺失探討提升政府行政效能精進做法,檔半年刊,19(1),24-35。
周峻佑。(2022-04-26)。【資安日報】2022年4月26日,勒索軟體Quantum僅耗時4小時攻陷受害目標、法國醫院遭網路攻擊被迫中斷連線。檢自https://www.ithome.com.tw/news/150627 (2022-12-29)。
邱菊梅、林其範。(2020) 。全國共用公文電子交換政策制定與推動策略之探討,檔案半年刊,19(2),4-23。
徐明星、田穎、李齋月。(2017)。圖解區塊鏈。碁峯資訊股份有限公司,2017年11月初版;2019年2月初版十三刷。
國家發展委員會。(2018) 。服務型智慧政府推動計畫-第五階段電子化政府計畫,107年5月。
國家發展委員會。(2019)。智慧政府規劃報告-基礎架構 T-Road。108年2月。
國家發展委員會。(2021a-12-20)。檔案管理局文書檔案智慧鏈結計畫階段性成果顯著。檢自https://www.ndc.gov.tw/nc_27_35441 (2022.01.15)。
國家發展委員會。(2021b)。政府資料傳輸平臺(T-Road)資料保護衝擊影響評估報告。委託機關:國家發展委員會。受託單位:安侯企業管理股份有限公司。110 年 7 月。
國家發展委員會。(2022)。111年度「政府資料傳輸平臺(T-Road)維運及輔導機關介接委外服務案」建議書徵求文件。111年1月。
檔案管理局。(2013)。公文電子交換系統資安事故檢討與加強防範措施報告。102 年 7 月 10 日(民)。
檔案管理局。(2020)。文書及檔案管理電腦化作業規範,文書及檔案管理資訊化法令彙編(2020年12月)。
檔案管理局。(2022a-10-05)。111年1-10月交換量統計.ods。檢自https://www.good.nat.gov.tw/download.php?area=5&page=1 (2022.12.05)。
檔案管理局。(2022b-10-05)。公文交換-工作重點-執行效益。檢自https://www.good.nat.gov.tw/articles.php?page=document_exchange (2022.12.05)。
檔案管理局。(2023-01-03)。公文交換系統地址簿可交換資料 (all-active-utf8)。檢自https://www.good.nat.gov.tw/reginfo.php (2023.01.05)。
許芳銘、何祖鳳。(2021)。區塊鏈應用於政府行政創新之挑戰。檔案半年刊, 20(1),4-15。
陳美蓉、林其範。(2020)。我國公文電子交換系統回顧與展望。檔案半年刊,19(1),78-95。
楊耿瑜。(2019)。以區塊鏈技術建構政府數位服務―公文電子交換機制新契機。檔案半年刊, 18(2), 106-117。
楊蘭堯(2020)。加速政府資料傳輸與安全應用-T-Road 架構與安全機制。國土及公共治理季刊,8(4),86-91。
黃仁德、姜樹翰。(2001)。網路與電子化政府。國家發展研究,1(1),63-116。
黃彥棻。(2022-06-20)。【臺灣區塊鏈應用實例:司法聯盟鏈】區塊鏈貫穿司法審判流程,聯盟鏈兼具技術和管理優勢。檢自https://www.ithome.com.tw/news/151487 (2022-12-26)。
數位發展部。(2023-01-05)。政府共通應用服務。檢自https://moda.gov.tw/digital-affairs/digital-service/operations/232 (2023-01-10)。
數位發展部。(2022-11-23)。垃圾電子郵件情資之應處。檢自https://moda.gov.tw/digital-affairs/communications-cyber-resilience/operations/1329 (2022-12-26)。
廖世偉。(2016-03)。金融科技與區塊鏈-鑑往知來、打造數位金融基礎建設。2016.03中央銀行演講簡報。檢自https://www.tri.org.tw/trinews/doc/1050429_5.pdf (2022.11.27)
臺灣車聯網產業協會。(2022-11-30)。11/30 區塊鏈開創智慧交通新時代暨SIG成立記者會。檢自https://www.ttia-tw.org/ news.php?wshop=ttia&Opt=detailed&tp=News&lang=zh-tw&news_id=23358 (2022-12-03)。
潘國才。(2018-12-27)。智慧政府規劃報告。行政院第3632次會議。檢自https://www.slideshare.net/OpenMic1/20181227-126795869 (2022.06.10)。
賴國旺。(2014)。公文電子交換系統之資訊安全改善建議。檔案半年刊,13(2),4-17。
蕭新晟、黃柏緯。(2020-08-05)。【投書】國民如何信任數位身分證?愛沙尼亞數位治理經驗給台灣的啟示。檢自https://www.twreporter.org/a/opinion-e-governance-in-estonia (2022-12-26)。
謝翠娟。(2012)。電子化政府與新科技。科學發展,480,26-33。
羅正漢。(2022 -12-02)。麗臺遭遇勒索軟體攻擊,本週第二起上市公司發布資安事件重大訊息。檢自https://www.ithome.com.tw/news/154538 (2023-01-05)。
(此全文20260111後開放外部瀏覽)
01.pdf
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *