|
Aldawood, H. A. & Skinner, G. (2019). A Critical Appraisal of Contemporary Cyber Security Social Engineering Solutions:Measures, Policies, Tools and Applications. International Journal of Security (IJS), 10(1), 1-15. Al-Mashhadi, H. M. & Alabiech, M. H. (2017). A Survey of Email Service; Attacks, Security Methods and Protocols. International Journal of Computer Applications, 162(11). Almazrooie, M., Samsudin, A., Gutub, A. A. A., Salleh, M. S., Omar, M., &Hassan, S. A. (2018). Integrity verification for digital Holy Quran verses using cryptographic hash function and compression, Journal of King Saud University -Computer and Information Sciences, 32(1), 24-34. Alsaidi, A., Al-lehaibi, K., Alzahrani, H., AlGhamdi M., & Gutub A. (2018). Compression Multi-Level Crypto Stego Security of Texts Utilizing Colored Email Forwarding. Journal of Computer Science & Computational Mathematics, 8(3),33-42. Anderson, B. M. (2020-01-09). The Most In-Demand Hard and Soft Skills of 2020. Retrieved from https://www.linkedin.com/business/talent/blog/talent-strategy/linkedin-most-in-demand-hard-and-soft-skills, (2022.12.04). Ayodele, T., Shoniregun, C. A., & Akmayeva, G. (2011-02-21~23). Security review of email summarization systems. 2011 World Congress on Internet Security (WorldCIS-2011), London, UK. https://ieeexplore.ieee.org/document/5749866 , doi: 10.1109/WorldCIS17046.2011.5749866 Ayodele, T., Shoniregun, C. A., & Akmayeva, G. (2012-06-10~12). Anti-phishing prevention measure for email systems. World Congress on Internet Security (WorldCIS), Guelph, ON, Canada. https://ieeexplore.ieee.org/document/6280179 Azaria, A., Ekblaw, A., Vieira, T. & Lippman, A. (2016-08-22~24). MedRec:Using Blockchain for Medical Data Access and Permission Management. 2016 2nd International Conference on Open and Big Data (OBD). Vienna, Austria, 25-30, Retrieved from https://ieeexplore.ieee.org/document/7573685, doi: 10.1109/OBD.2016.11. Back, A. (2002). Hashcash - A Denial of Service Counter-Measure.1st August 2002. Retrieved from http://hashcash.org/papers/hashcash.pdf (2022.10.13) Barker, P. (2002). Information Technologies. Clinician's Guide to Assistive Technology, 115-126. Birthriya, S. K. & Jain, A. K. (2022). A Comprehensive Survey of Phishing Email Detection and Protection Techniques. Information Security Journal: A Global Perspective, 31(4). https://doi.org/10.1080/19393555.2021.1959678 Bitnodes. (2022-12-06). Reachable Bitcoin Nodes. Retrieved from https://bitnodes.io/ (2022.12.06). Bocek, T., Rodrigues, B. B., Strasser, T. & Stiller, B. (2017). Blockchains everywhere - a use-case of blockchains in the pharma supplychain. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 772–777. Boucher, P., Nascimento, S., & Kritikos, M. (2017). How blockchain technology could change our lives. European Parliamentary Research Service, Scientifc Foresight Unit. Doi: 10.2861/926645. Brookes, T. (2021-03-11). What Is Secure Email, and should You Switch? Retrieved from https://www.howtogeek.com/710380/, (2022-02-04). Dwork, C., & Naor, M. (1992-08-15~18). Pricing via processing or combatting junk mail. Annual International Cryptology Conference, Santa Barbara, CA, USA . Advances in Cryptology - CRYPT0 '92, LNCS 740, 139-147. Cagigas, D., Clifton, J., Diaz-Fuentes, D. & Fernandez-Gutierrez, M. (2019), Blockchain for Public Services: A Systematic Literature Review, Digital Object Identifier 10.1109/ACCESS.2021.3052019 Campaign Monitor (2021-01-26). Campaign Monitor Benchmarks Report Shows Email Growth Tripled in 2020. Retrieved from https://www.globenewswire.com/news-release/2021/01/26/2164364/0/en/Campaign-Monitor-Benchmarks-Report-Shows-Email-Growth-Tripled-in-2020.html (2022.04.27) Casino, F. Dasaklis, T. K. & Patsakis, C. (2019). A systematic literature review of blockchain based applications: Current status, classifcation and open issues. Telematics and Informatics, 36, 55–81. https://doi.org/10.1016/j.tele.2018.11.006 Ceci, L. (2022-09-12). Number of e-mails per day worldwide 2017-2025. Retrieved from https://www.statista.com/statistics/456500/daily-number-of-e-mails-worldwide/, (2022.12.04). Cha, S.-C. & Yeh, K.-H. (2018-5-30 ~ 06-01). An ISO/IEC 15408-2 Compliant Blockchain System for IoT Auditing Management. 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China, https://ieeexplore.ieee.org/document/8433185/metrics#metrics Cha, S.-C., Wang, H., Tan Z., Joung Y.-J., Tseng Y.-C., & Yeh K.-H. (2020). On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining. IEEE Transactions on Emerging Topics in Computational Intelligence, 4(5), 641-652, doi: 10.1109/TETCI.2019.2938547. Chen, W., Zheng, Z., Ngai, E. C., Zheng, P., & Zhou, Y. (2019), Exploiting Blockchain Data to Detect Smart Ponzi Schemes on Ethereum. IEEE Access, 7, 37575-37586. Choudhari, S. & Das S. (2021-06-16~18). Spam E-mail Identification Using Blockchain Technology. 2021 International Conference on Communication, Control and Information Sciences (ICCISc), Idukki, India. https://ieeexplore.ieee.org/document/9485018 doi: 10.1109/ICCISc52257.2021.9485018 Christidis, K. & Devetsikiotis, M. (2016). Blockchains and Smart Contracts for the Internet of Things. IEEE Access, 4, 2292–2303. De Filippi, P., Mannan, M., & Reijers, W. (2020). Blockchain as a confidence machine: The problem of trust & challenges of governance. Technology in Society, 62. https://doi.org/10.1016/j.techsoc.2020.101284. DeFilippis, E., Impink, S. M., Singell, M., Polzer, J. T., & Sadun, R. (2020) Collaborating During Coronavirus: The Impact of COVID-19 on the Nature of Work, NBER Working Papers 27612, National Bureau of Economic Research, Inc. doi: 10.1109/CNS.2018.8433185. doi: 10.1504/IJWGS.2018.095647. Ding, J., Xu, H., Li, P., & Zhu, F. (2018), Research on Food Safety Traceability Technology Based on RFID Security Authentication and 2-Dimensional Code, Proceedings of the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIs), Matsue, Japan, 2018, 517-526. Dovbnya, A. (2019-05-29). 10 Major Blockchain Trends in 2019. Retrieved https://u.today/guides/blockchain/10-major-blockchain-trends-in-2019, (2022.12.03). Ethereum. (2022-12-06). Ethereum Mainnet Statistics. Retrieved from https://ethernodes.org/ (2022.12.06). Ferris, M. (1994). New email security infrastructure. NSPW '94: Proceedings of the 1994 workshop on new security paradigms, 20-27. Retrieved from https://www.nspw.org/papers/1994/nspw1994-ferris.pdf , (2020.12.12). Griggs, K. N., Ossipova, O., Kohlios, C. P., Baccarini, A. N., Howson, E. A., & Hayajneh, T. (2018), Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring, Journal of Medical Systems, 42(7), 130. https://doi.org/10.1007/s10916-018-0982-x. Gellens, R. and Klensin, J. (2006). Message Submission for Mail. Network Working Group T.I. Society, 1-14. Hinarejos, M. F., Ferrer-Gomila, J. -L., & Huguet-Rotger, L. (2019). A Solution for Secure Certified Electronic Mail Using Blockchain as a Secure Message Board. IEEE Access, 7, 31330-31341. Hinarejos, M. F. & Ferrer-Gomila, J. -L. (2020). A Solution for Secure Multi-Party Certified Electronic Mail Using Blockchain. IEEE Access, 8, 102997-103006. Hanrahan B. V. & Quiñones, M. A. P. (2015-04-18). Lost in e-mail: Pulling users down a path of interaction. the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York, United States. Retrieved from https://doi.org/10.1145/2702123.2702351 (2021.05.17). Heartfield, R. & Gan, D. (2016). Social engineering in the internet of everything. Cutter IT Journal, 29(7), 20-29. Hou, H. (2017-07-31~08-03). The Application of Blockchain Technology in E-Government in China. 2017 26th International Conference on Computer Communication and Networks (ICCCN). Vancouver, BC, Canada. Hughes, L., Dwivedi, Y. K., Misra, S. K., Rana, N. P., Raghavan, V., & Akella, V. (2019). Blockchain research, practice and policy: Applications, benefts, limitations, emerging research themes and research agenda. International Journal of Information Management. https://doi.org/10.1016/j. ijinfomgt.2019.02.005 Hyperledger. (2022). Use Install, build and deploy solutions using Hyperledger technologies. Retrieved from https://www.hyperledger.org/use (2022.11.22). Fabric. (2020). A Blockchain Platform for the Enterprise. Retrieved from https://hyperledger-fabric.readthedocs.io/en/release-2.5/ (2023.01.10). IC3. (2020). Internet Crime Report 2020. Retrieved from https://www.ic3.gov/Media/PDF/AnnualReport/2020_IC3Report.pdf (2022.12.04). Jervfors, F. (2007-02-07). How Mail Systems Work. Retrieved from https://squirrelmail.org/wiki/HowMailSystemsWork (2019.09.27) Juan, M. D., Andrés, R. P., Rafael, P. M., Gustavo, R. E., & Manuel, P. C. (2018). A Model for National Electronic Identity Document and Authentication Mechanism Based on Blockchain, International Journal of Modeling and Optimization, 8(3), 160-165.8 Kobayashi, Y., Fujimoto, Y., & fujita. K. (2019). Development of E-mail Delivery Mediation System Based on Interruptibility and Its Evaluation in Daily Office Work Scenario, IEEE Acess, 7, 94084~94096. Konstantinidis, I., Siaminos, G., Timplalexis, C., Zervas, P., Peristeras, V., & Decker, S. (2018). Blockchain for Business Applications: A Systematic Literature Review. Business Information Systems, 320. https://doi.org/10.1007/978-3-319-93931-5_28 Kumar, A., Chaudhary, M. & Kumar, N. (2015). Social engineering threats and awareness: a survey. European Journal of Advances in Engineering and Technology, 2(11), 15-19. Kumar, R. & Singh, A. J. (2015). Understanding steganography over cryptography and various steganography techniques, International Journal of Computer Science and Mobile Computing, 4(3), 253–258. Lamport, L., Shostak, R., & Pease, M. C. (1982). The Byzantine Generals Problem. Computer Science, 382-401 Lee, H. L. (2015-11-12). PM Lee Hsien Loong at the 80th Anniversary Celebrations of the United Overseas Bank (UOB) on 12 November 2015. Retrieved from https://www.pmo.gov.sg/Newsroom/pm-lee-hsien-loong-80th-anniversary-celebrations-united-overseas-bank-uob-12-november (2022.11.30). Lee, W., Rotoloni,B. (2018). 2017 Emerging Cyber Threats, Trends & Technologies Report. Georgia Institute of Technology, 28. Lin, I.-C. & Liao, T.-C. (2017). A Survey of Blockchain Security Issues and Challenges. International Journal of Network Security, 19(5), 653-659. Madrigal, A. C. (2014-04-05). Email Is Still the Best Thing on the Internet. Retrieved from https://www.theatlantic.com/technology/archive/2014/08/why-email-will-never-die/375973/?single_page=true (2022. 04.07). Maimon, D., Howell, C. J., Moloney, M., & Park Y. S. (2020). An Examination of Email Fraudsters’ Modus Operandi. Crime & Delinquency, 1, 1-30. Malik, A., Sikka, G., & Verma, H. (2017). A high-capacity text steganography scheme based on LZW compression and color coding, Engineering Science and Technology, 20(1), 72–29. Merisalo M.& Raulas M. (2004). The impact of e-mail marketing on brand loyalty. Journal of Product & Brand Management, 13(7), 498-505. Myers, J., & Rose, M. (1996). RFC1939: Post office protocol-Version 3. Retrieved from https://dl.acm.org/doi/pdf/10.17487/RFC1939, (2022.11.05). Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System, retrieved from https://bitcoin.org/bitcoin.pdf (2018.07.01). Neu, C. R., Anderson, R. H. & bikson, T.K. (1998). E-Mail Communication Between Government and Citizens Security, Policy Issues, and Next Steps. RAND Science and Technology, 1-8. Niranjanamurthy, M. (2014). E-commerce: Recommended Online Payment Method – PayPal. International Journal of Computer Science and Mobile Computing, 3(7), 669-679. Olleros, F. X. & Zhegu, M. (2016). Research handbook on digital transformations. Edward Elgar publisher. Peck, M. E. (2017). Blockchains: How they work and why they’ll change the world, IEEE Spectrum, 54(10), 26–35. Person, T. (2019-02-28). Markets are eating the world. Retrieved from https://www.ribbonfarm.com/2019/02/28/markets-are-eating-the-world/ (2023-01-03) Poller, A., Waldmann, U., Vowé, S., & Turpe, S. (2012). Electronic identity cards for user authentication-promise and practice. IEEE Security and Privacy, 10(1), 46–54. Reddick, C. G., Rodríguez-Bolívar, M. P., & Scholl, H. J. (2021). Blockchain and the Public Sector Theories, Reforms, and Case Studies. Public Administration and Information Technology, 36. Rijn, J. V. (2023-01). Email is not dead. But email IS changing, retrieved from https://www.emailisnotdead.com/ (2023.01.10). Rivera, R., Robledo, J. G., Larios, V. M., & Avalos, J. M (2017-09-14~17). How digital identity on blockchain can contribute in a smart city environment. 2017 International Smart Cities Conference (ISC2), Wuxi, China. https://ieeexplore.ieee.org/document/8090839 (2020.05.26). doi: 10.1109/ISC2.2017.8090839 Sampson, M. (2003). Electronic Mail. Encyclopedia of Information Systems, 2, 57-70. Saraf, C. & Sabadra, S. (2018). Blockchain Platforms: A Compendium. 2018 IEEE International Conference on Innovative Research and Development (ICIRD). pp. 1-6, doi: 10.1109/ICIRD.2018.8376323. Schäfer, C. (2015). Detection of compromised email accounts used for spamming in correlation with mail user agent access activities extracted from metadata, 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), 2015, pp. 1-6, doi: 10.1109/CISDA.2015.7208641. Schwab K. (2016). Fourth Industrial Revolution, World Economic Forum. Retrieved from https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-it-means-and-how-to-respond/ (2022.09.30) Sheikh, S. A. & Banday, M. T. (2021). A Cryptocurrency-based E-mail System for SPAM Control. International Journal of Advanced Computer Science and Applications (IJACSA), 12(1), 324-333. Spahiu, E., Spagnoletti, P., & Federici T. (2022) Blockchain Technology Applications in Businesses and Organizations. Advances in Data Mining and Database Management. 239. Sullivan, C. & Burger, E. (2017). E-residency and blockchain. Computer Law and Security Review, 33(4). 470–481. Szabo, N. (2001). Trusted Third Parties are Security Holes. Retrieved from https://nakamotoinstitute.org/trusted-third-parties/ (2022.10.28). Tam, KC. (2018-04-02). Blockchain and the Challengers. Retrieved from https://medium.com//kctheservant/blockchain-and-the-challengers-74e22cf0cf4e, (2022.06.14) Tapscott, D. & Tapscott, A. (2016). Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and World. Penguin Random House. Tempesta, S. (2020-02-05). 2020 Resolutions for Blockchain. https://www.linkedin.com/pulse/2020-resolutions-blockchain-stefano-tempesta (2022.8.10). Trading Economics. (2023-01). Euro Area - Individuals using the internet for sending/receiving e-mails. Retrieved from https://tradingeconomics.com/euro-area/individuals-using-the-internet-for-sending-receiving-e-mails-eurostat-data.html (2023.01.10). UAE. (2022-05-04). Blockchain in the UAE government. Retrieved from https://u.ae/en/about-the-uae/digital-uae/blockchain-in-the-uae-government (2022.08.11). Volzdoska, R. R. P., McComb, S., Green, S. G., & Compton, W. D. (2003) Examining a curvilinear relationship between communication frequency and team performance in cross-functional project teams. IEEE Transactions on Engineering Management, 50(3), 262-269. Werbach, K. (2018), The blockchain and the new architecture of trust. Information Policy. Kindle Edition. Whittaker, S. & Sidner, C. (1996-04-13~18). Email overload: Exploring personal information management of email. the SIGCHI Conference on Human Factors in Computing Systems. British Columbia. Vancouver, Canada. Retrieved from https://dl.acm.org/doi/10.1145/238386.238530, https://doi.org/10.1145/238386.238530 (2022.01.15). Whittaker, S., Bellotti, V., & Cwizdka, J. (2007). Everything through e-mail. Personal Information Management. University of Washington Press, 167-189. Zeddini, B., Maachaoui, M., & Inedjaren, Y. (2022). Security Threats in Intelligent Transportation Systems and Their Risk Levels. Cyber Risk and Security, 10(5), 91, https://doi.org/10.3390/risks10050091 王擎天。(2017)。區塊鏈。創見文化,2017年8月。 大紀元。(2013-05-23)。電子公文遭駭 資安辦:機密文件未流失。檢自https://www.epochtimes.com.tw/n60843/ (2022.10.06)。 古瑞源。(2020)。開放文件格式藉由公文電子交換系統推廣接受度研究。中國文化大學資訊管理學系。 行政院。(2021)。資通安全責任等級分級辦法。資通安全管理法及子法彙編。110 年 9 月(民)。 行政院研究發展考核委員會。(2004)。公文交換G2B2C計畫。九十三年二月(民)。 行政院研究發展考核委員會。(2011)。第四階段電子化政府計畫(101 年至105 年)(核定本),100 年05 月(民)。 行政院秘書處。(2010)。文書處理手冊。2010。 何祖鳳、吳怡菱、李昂樺、劉家榮、蕭春蘭。(2006)。各國政府機關電子公文檔案管理—以英國、美國、日本為例,2006年。 李光斗。(2018)。區塊鏈財富革命。湖南教育出版社。 陳曉莉。(2015-11-19)。新加坡總理李顯龍:銀行業者應擁抱行動支付與區塊鏈等新技術。檢自https://www.ithome.com.tw/news/100072 (2022.11.30)。 林怡芬、葉奕昕。(2020) 。從文書流程管理缺失探討提升政府行政效能精進做法,檔半年刊,19(1),24-35。 周峻佑。(2022-04-26)。【資安日報】2022年4月26日,勒索軟體Quantum僅耗時4小時攻陷受害目標、法國醫院遭網路攻擊被迫中斷連線。檢自https://www.ithome.com.tw/news/150627 (2022-12-29)。 邱菊梅、林其範。(2020) 。全國共用公文電子交換政策制定與推動策略之探討,檔案半年刊,19(2),4-23。 徐明星、田穎、李齋月。(2017)。圖解區塊鏈。碁峯資訊股份有限公司,2017年11月初版;2019年2月初版十三刷。 國家發展委員會。(2018) 。服務型智慧政府推動計畫-第五階段電子化政府計畫,107年5月。 國家發展委員會。(2019)。智慧政府規劃報告-基礎架構 T-Road。108年2月。 國家發展委員會。(2021a-12-20)。檔案管理局文書檔案智慧鏈結計畫階段性成果顯著。檢自https://www.ndc.gov.tw/nc_27_35441 (2022.01.15)。 國家發展委員會。(2021b)。政府資料傳輸平臺(T-Road)資料保護衝擊影響評估報告。委託機關:國家發展委員會。受託單位:安侯企業管理股份有限公司。110 年 7 月。 國家發展委員會。(2022)。111年度「政府資料傳輸平臺(T-Road)維運及輔導機關介接委外服務案」建議書徵求文件。111年1月。 檔案管理局。(2013)。公文電子交換系統資安事故檢討與加強防範措施報告。102 年 7 月 10 日(民)。 檔案管理局。(2020)。文書及檔案管理電腦化作業規範,文書及檔案管理資訊化法令彙編(2020年12月)。 檔案管理局。(2022a-10-05)。111年1-10月交換量統計.ods。檢自https://www.good.nat.gov.tw/download.php?area=5&page=1 (2022.12.05)。 檔案管理局。(2022b-10-05)。公文交換-工作重點-執行效益。檢自https://www.good.nat.gov.tw/articles.php?page=document_exchange (2022.12.05)。 檔案管理局。(2023-01-03)。公文交換系統地址簿可交換資料 (all-active-utf8)。檢自https://www.good.nat.gov.tw/reginfo.php (2023.01.05)。 許芳銘、何祖鳳。(2021)。區塊鏈應用於政府行政創新之挑戰。檔案半年刊, 20(1),4-15。 陳美蓉、林其範。(2020)。我國公文電子交換系統回顧與展望。檔案半年刊,19(1),78-95。 楊耿瑜。(2019)。以區塊鏈技術建構政府數位服務―公文電子交換機制新契機。檔案半年刊, 18(2), 106-117。 楊蘭堯(2020)。加速政府資料傳輸與安全應用-T-Road 架構與安全機制。國土及公共治理季刊,8(4),86-91。 黃仁德、姜樹翰。(2001)。網路與電子化政府。國家發展研究,1(1),63-116。 黃彥棻。(2022-06-20)。【臺灣區塊鏈應用實例:司法聯盟鏈】區塊鏈貫穿司法審判流程,聯盟鏈兼具技術和管理優勢。檢自https://www.ithome.com.tw/news/151487 (2022-12-26)。 數位發展部。(2023-01-05)。政府共通應用服務。檢自https://moda.gov.tw/digital-affairs/digital-service/operations/232 (2023-01-10)。 數位發展部。(2022-11-23)。垃圾電子郵件情資之應處。檢自https://moda.gov.tw/digital-affairs/communications-cyber-resilience/operations/1329 (2022-12-26)。 廖世偉。(2016-03)。金融科技與區塊鏈-鑑往知來、打造數位金融基礎建設。2016.03中央銀行演講簡報。檢自https://www.tri.org.tw/trinews/doc/1050429_5.pdf (2022.11.27) 臺灣車聯網產業協會。(2022-11-30)。11/30 區塊鏈開創智慧交通新時代暨SIG成立記者會。檢自https://www.ttia-tw.org/ news.php?wshop=ttia&Opt=detailed&tp=News&lang=zh-tw&news_id=23358 (2022-12-03)。 潘國才。(2018-12-27)。智慧政府規劃報告。行政院第3632次會議。檢自https://www.slideshare.net/OpenMic1/20181227-126795869 (2022.06.10)。 賴國旺。(2014)。公文電子交換系統之資訊安全改善建議。檔案半年刊,13(2),4-17。 蕭新晟、黃柏緯。(2020-08-05)。【投書】國民如何信任數位身分證?愛沙尼亞數位治理經驗給台灣的啟示。檢自https://www.twreporter.org/a/opinion-e-governance-in-estonia (2022-12-26)。 謝翠娟。(2012)。電子化政府與新科技。科學發展,480,26-33。 羅正漢。(2022 -12-02)。麗臺遭遇勒索軟體攻擊,本週第二起上市公司發布資安事件重大訊息。檢自https://www.ithome.com.tw/news/154538 (2023-01-05)。
|