{"id":2246,"date":"2019-10-29T11:46:10","date_gmt":"2019-10-29T03:46:10","guid":{"rendered":"https:\/\/infolaw.iias.sinica.edu.tw\/?p=2246"},"modified":"2024-01-15T13:34:28","modified_gmt":"2024-01-15T05:34:28","slug":"%e5%80%8b%e4%ba%ba%e8%b3%87%e6%96%99%e8%a2%ab%e7%9b%9c%e7%94%a8%e4%ba%86%ef%bc%8c%e5%85%ac%e5%8f%b8%e6%90%8d%e5%a4%b1%e5%a4%9a%e5%b0%91%e9%8c%a2%ef%bc%9f","status":"publish","type":"post","link":"https:\/\/infolaw.iias.sinica.edu.tw\/?p=2246","title":{"rendered":"\u500b\u4eba\u8cc7\u6599\u88ab\u76dc\u7528\u4e86\uff0c\u516c\u53f8\u640d\u5931\u591a\u5c11\u9322\uff1f"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2848 size-full\" src=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2019\/11\/iconfinder_User_4200482-e1700259960986.png\" alt=\"\" width=\"20\" height=\"20\" \/> Leslie<br \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2850 size-full\" src=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2019\/11\/iconfinder_calendar-month-day-booking-date_3209363-e1705296717271.png\" alt=\"\" width=\"20\" height=\"20\" \/> 2019\u5e7410\u670804\u65e5<\/p>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-drop-cap\">IBM Security\u8207Ponemon Institute\u6bcf\u5e74\u7686\u6703\u5c0d\u5168\u7403\u8cc7\u6599\u5916\u6d29\u6210\u672c\u63d0\u51fa\u5e74\u5ea6\u5831\u544a\uff0c2019\u5e74\u300c\u8cc7\u6599\u5916\u6d29\u6210\u672c\u5831\u544a\uff08Cost Data Breach Report\uff09\u300d\u65bc\u540c\u5e74\u4e03\u6708\u63d0\u51fa\uff0c\u5c0d2019\u5e747\u6708\u81f32019\u5e744\u6708\u5168\u7403\u8d85\u904e\u4e94\u767e\u5bb6\u6709\u8cc7\u6599\u5916\u6d29\u60c5\u6cc1\u7684\u516c\u53f8\u9032\u884c\u6aa2\u9a57\u3002\u5831\u544a\u6307\u51fa\uff0c\u8cc7\u6599\u5916\u6d29\u60c5\u6cc1\u65e5\u76ca\u56b4\u91cd\uff0c2019\u5e74\u5831\u544a\u6578\u64da\u8f03\u904e\u53bb\u4e94\u5e74\u6210\u957712\uff05\uff0c\u5168\u7403\u5e73\u5747\u640d\u5931\u8fd1\u56db\u5104\u7f8e\u5143\uff0c\u6bcf\u6b21\u640d\u5931\u7684\u8cc7\u6599\u6578\u91cf\u5e73\u5747\u70ba25,575\u7b46\uff0c\u640d\u5931\u6700\u591a\u7684\u570b\u5bb6\u70ba\u7f8e\u570b\uff08\u7f8e\u91d18.1\u5104\u5143\uff09\uff0c\u5e73\u5747\u6307\u8a8d\u6578\u64da\u5916\u6d29\u6642\u9593\u70ba279\u5929\uff0c\u640d\u5931\u91d1\u984d\u6700\u9ad8\u7684\u7522\u696d\u70ba\u5065\u5eb7\u7167\u8b77\u3002\u4ee5\u4e0b\u70ba\u672c\u5831\u544a\u7814\u7a76\u65b9\u5f0f\u8207\u7814\u7a76\u6210\u679c\u7c21\u8981\u91cd\u9ede\uff1a<\/p>\n\n\n\n<p><strong>\u4e00\u3001\u7814\u7a76\u65b9\u6cd5<\/strong><\/p>\n\n\n\n<p>\u672c\u7bc7\u5831\u544a\u6536\u96c6507\u500b\u7d44\u7e54\u3001\u8a2a\u554f3,211\u4f4d\u719f\u6089\u7d44\u7e54\u8cc7\u6599\u5916\u6d29\u8b70\u984c\u7684\u5c08\u696d\u4eba\u54e1\uff0c\u8a2a\u984c\u5305\u62ec\u8cc7\u6599\u5916\u6d29\u539f\u56e0\u3001\u65b9\u5f0f\u3001\u5982\u4f55\u5075\u6e2c\u4e26\u8abf\u67e5\u5916\u6d29\u3001\u4e8b\u5f8c\u88dc\u6551\uff08\u7cfb\u7d71\u4fee\u6b63\u3001\u76f8\u95dc\u6cd5\u5f8b\u8cac\u4efb\u7b49\uff09\u3002<\/p>\n\n\n\n<p><strong>\u4e8c\u3001\u8cc7\u6599\u5916\u6d29\u640d\u5931\u6210\u672c\u8a08\u7b97\u65b9\u5f0f<\/strong><\/p>\n\n\n\n<p>\u8a72\u5831\u544a\u63a1\u7528\u6703\u8a08\u4f5c\u696d\u6210\u672c\u5206\u6790\u6cd5\uff08activity-based costing\uff0cABC\uff09\uff0c\u521d\u6b65\u5c07\u640d\u5931\u985e\u5225\u5206\u6210\u56db\u5927\u985e\uff1a<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>\u5075\u6e2c\u8207\u60c5\u52e2\u5347\u7d1a\uff1a\u6aa2\u9a57\u8207\u8abf\u67e5\u6d3b\u52d5\u3001\u8a55\u4f30\u8207\u7a3d\u6838\u3001\u5371\u6a5f\u8655\u7406\u5c0f\u7d44\u3001\u9ad8\u5c64\u6e9d\u901a\u6210\u672c\u7b49\u3002<\/li><li>\u901a\u77e5\u6210\u672c\uff1a\u5411\u8cc7\u6599\u64c1\u6709\u8005\u901a\u77e5\u5916\u6d29\u60c5\u6cc1\u3001\u8207\u57f7\u6cd5\u55ae\u4f4d\u6e9d\u901a\u3001\u5916\u90e8\u5c08\u5bb6\u5408\u4f5c\u7b49\u3002<\/li><li>\u5f8c\u671f\u8655\u7406\uff1a\u5ba2\u8a34\u670d\u52d9\u3001\u5167\u90e8\u6e9d\u901a\u3001\u91cd\u65b0\u88fd\u767c\u8f09\u5177\uff08\u5982\u4fe1\u7528\u5361\uff09\u3001\u6cd5\u52d9\u3001\u7522\u54c1\u6298\u6263\u3001\u88c1\u7f70\u6e96\u5247\u66f4\u65b0\u7b49\u3002<\/li><li>\u5546\u696d\u640d\u5931\u6210\u672c\uff1a \u8cc7\u6599\u5916\u6d29\u671f\u9593\u7d93\u71df\u640d\u5931\u6210\u672c\u3001\u9867\u5ba2\u6d41\u5931\u3001\u5546\u8b7d\u6d41\u5931\u7b49\u3002<\/li><li><\/li><\/ol>\n\n\n\n<p><strong>\u4e09\u3001\u91cd\u8981\u767c\u73fe<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"956\" height=\"430\" src=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/03\/\u88681.png\" alt=\"\" class=\"wp-image-2465\" srcset=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/03\/\u88681.png 956w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/03\/\u88681-300x135.png 300w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/03\/\u88681-768x345.png 768w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/03\/\u88681-200x90.png 200w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/03\/\u88681-690x310.png 690w\" sizes=\"auto, (max-width: 956px) 100vw, 956px\" \/><\/figure><\/div>\n\n\n\n<p>\u4e0a\u8ff0\u7814\u7a76\u767c\u73fe\u4e2d\uff0c\u6211\u5011\u53ef\u4ee5\u770b\u5230\u5065\u5eb7\u7167\u8b77\u7522\u696d\u76f8\u8f03\u65bc\u5176\u4ed6\uff0c\u6709\u6700\u9ad8\u7684\u8cc7\u6599\u5916\u6d29\u6210\u672c\uff08\u898b\u4e0b\u5716\u4e00 \uff09\uff0c\u7814\u7a76\u5831\u544a\u6307\u51fa\u5176\u4e00\u7684\u539f\u56e0\u70ba\uff0c\u5065\u5eb7\u7167\u8b77\u7522\u696d\u8f03\u5b83\u7522\u696d\u6709\u56b4\u683c\u898f\u7bc4\uff0c\u56e0\u800c\u9055\u898f\u7684\u6210\u672c\u9ad8\uff1b\u516c\u90e8\u9580\u5247\u56e0\u70ba\u8f03\u6c92\u6709\u300c\u9867\u5ba2\u6d41\u5931\u300d\u5f8c\u679c\uff0c\u56e0\u800c\u640d\u5931\u6210\u672c\u6700\u5c0f\u3002\u672c\u6578\u64da\u9700\u8981\u6ce8\u610f\u7684\u662f\uff0c\u672c\u5831\u544a\u5065\u5eb7\u7167\u8b77\u516c\u53f8\u8abf\u67e5\u5c0d\u8c61\u7686\u5728\u7f8e\u570b\u4e14\u70ba\u79c1\u4eba\u4f01\u696d\uff0c\u5728\u7f8e\u570b\u4ee5\u5916\u570b\u5bb6\uff0c\u5065\u5eb7\u7167\u8b77\u7522\u696d\u7d93\u5e38\u6b78\u985e\u70ba\u516c\u5bb6\u90e8\u9580\u3002<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"803\" src=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57161-1024x803.png\" alt=\"\" class=\"wp-image-2248\" srcset=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57161-1024x803.png 1024w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57161-300x235.png 300w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57161-768x602.png 768w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57161-200x157.png 200w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57161-690x541.png 690w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57161.png 1750w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>\u5716\uff08\u4e00\uff09\u53d6\u81ea\u5831\u544a\u7b2c26\u9801<br>\u8cc7\u6599\u4f86\u6e90\uff1aIBM Security, Cost of a Data Breach Report 2019, 26 (2019).<\/figcaption><\/figure><\/div>\n\n\n\n<p><strong>\u56db\u3001\u8cc7\u6599\u5916\u6d29\u539f\u56e0<\/strong><\/p>\n\n\n\n<p>\u672c\u5831\u544a\u5c07\u5916\u6d29\u539f\u56e0\u5927\u7565\u5206\u6210\u4e09\u985e\u4e26\u8aaa\u660e\u5982\u4e0b\uff1a\uff081\uff09\u60e1\u610f\u653b\u64ca\uff1a\u904e\u534a\u6578\uff0851%\uff09\u4ee5\u4e0a\u8cc7\u6599\u5916\u6d29\u70ba\u6b64\u539f\u56e0\uff1b\uff082\uff09\u4eba\u70ba\u758f\u5931\uff1a25%\uff1b\uff083\uff09\u7cfb\u7d71\u6545\u969c\uff1a24\uff05\u3002\u8fd1\u4e94\u5e74\u60e1\u610f\u653b\u64ca\u6bd4\u4f8b\u5982\u4e0b\u5716\u6240\u793a\uff1a <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"796\" src=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57162-1024x796.png\" alt=\"\" class=\"wp-image-2249\" srcset=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57162-1024x796.png 1024w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57162-300x233.png 300w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57162-768x597.png 768w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57162-200x155.png 200w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57162-690x536.png 690w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57162.png 1680w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>\u5716\uff08\u4e8c\uff09\u53d6\u81ea\u5831\u544a\u7b2c33\u9801<br>\u8cc7\u6599\u4f86\u6e90\uff1aIBM Security, Cost of a Data Breach Report 2019, 33 (2019).<\/figcaption><\/figure><\/div>\n\n\n\n<p><strong>\u4e94\u3001\u8cc7\u6599\u5916\u6d29\u8655\u7406\u9031\u671f<\/strong><\/p>\n\n\n\n<p>\u8cc7\u6599\u5916\u6d29\u4e8b\u4ef6\u767c\u751f\u5230\u8655\u7406\u5b8c\u7562\u6240\u9700\u6642\u9593\uff0c\u672c\u5831\u544a\u7a31\u70ba\u300c\u8cc7\u6599\u5916\u6d29\u751f\u547d\u9031\u671f\uff08data breach lifecycle\uff09\u300d\uff0c\u5c31\u6b64\u90e8\u5206\uff0c\u5831\u544a\u4e5f\u6307\u51fa\u4e0b\u5217\u91cd\u8981\u767c\u73fe\uff1a<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"959\" height=\"426\" src=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/03\/\u88682.png\" alt=\"\" class=\"wp-image-2466\" srcset=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/03\/\u88682.png 959w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/03\/\u88682-300x133.png 300w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/03\/\u88682-768x341.png 768w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/03\/\u88682-200x89.png 200w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/03\/\u88682-690x307.png 690w\" sizes=\"auto, (max-width: 959px) 100vw, 959px\" \/><\/figure><\/div>\n\n\n\n<p>\u5728\u4e0d\u540c\u7522\u696d\u5225\u90e8\u5206\uff0c\u8cc7\u6599\u5916\u6d29\u751f\u547d\u9031\u671f\u4e5f\u6709\u986f\u8457\u7684\u5dee\u7570\uff08\u5982\u4e0b\u5716 \uff09\uff0c\u9700\u6642\u6700\u9577\u7684\u7522\u696d\u662f\u5065\u5eb7\u7167\u8b77\u53ca\u516c\u90e8\u9580\uff0c\u5169\u8005\u9700\u8981\u8fd1\u4e00\u5e74\u7684\u6642\u9593\u624d\u80fd\u6574\u6392\u9664\u8cc7\u6599\u5916\u6d29\u4e8b\u4ef6\uff1b\u6700\u77ed\u6642\u9593\u5247\u662f\u8ca1\u52d9\u91d1\u878d\u90e8\u9580\uff0c\u751f\u547d\u9031\u671f\u70ba233\u5929\u3002<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"876\" src=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57163-1024x876.png\" alt=\"\" class=\"wp-image-2251\" srcset=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57163-1024x876.png 1024w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57163-300x257.png 300w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57163-768x657.png 768w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57163-200x171.png 200w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57163-690x590.png 690w, https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u8cc7\u6599\u57163.png 1754w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>\u5716\uff08\u4e09\uff09\u53d6\u81ea\u5831\u544a\u7b2c54\u9801<br>\u8cc7\u6599\u4f86\u6e90\uff1aIBM Security, Cost of a Data Breach Report 2019, 54 (2019).<\/figcaption><\/figure><\/div>\n\n\n\n<p>\u5831\u544a\u6578\u64da\u986f\u793a\uff0c\u8655\u7406\u8cc7\u6599\u5916\u6d29\u7684\u901f\u5ea6\u8207\u8ca1\u52d9\u640d\u5931\u6210\u53cd\u6bd4\uff0c\u8655\u7406\u901f\u5ea6\u8d8a\u5feb\u5247\u8cc7\u6599\u5916\u6d29\u9020\u6210\u7684\u640d\u5931\u8d8a\u4f4e\uff0c\u7136\u7531\u4e0a\u8ff0\u5716\u8868\u53ef\u898b\uff0c\u516c\u90e8\u9580\u9762\u5c0d\u8cc7\u6599\u5916\u6d29\u7684\u6210\u672c\uff0c\u5728\u6240\u6709\u7522\u696d\u5225\u4e2d\u6700\u5c11\u3001\u8655\u7406\u5929\u6578\u537b\u6700\u591a\uff0c\u7531\u8cc7\u6599\u5916\u6d29\u958b\u59cb\u5230\u5b8c\u6574\u6392\u9664\u72c0\u6cc1\u53ef\u9054\u5c07\u8fd1\u4e00\u5e74\u6642\u9593\uff0c\u56e0\u800c\u7b46\u8005\u5047\u8a2d\u4e0a\u958b\u6578\u64da\u5448\u73fe\u53cd\u6bd4\u7387\u6d88\u9577\u7684\u8da8\u52e2\u7684\u524d\u63d0\u662f\uff0c\u8cc7\u6599\u8655\u7406\u8005\u6703\u56e0\u8cc7\u6599\u5916\u6d29\u800c\u9020\u6210\u4e0d\u9858\u6216\u7121\u6cd5\u8ca0\u64d4\u7684\u9245\u984d\u640d\u5931\u3002\u516c\u90e8\u9580\u76f8\u8f03\u65bc\u79c1\u4eba\u71df\u5229\u55ae\u4f4d\uff0c\u56e0\u70ba\u751a\u5c11\u7522\u751f\u300c\u9867\u5ba2\u6d41\u5931\u300d\u554f\u984c\uff0c\u7f3a\u4e4f\u7a4d\u6975\u8a98\u56e0\u6539\u5584\u8cc7\u6599\u5916\u6d29\u9632\u8b77\u8207\u8655\u7406\u6a5f\u5236\uff0c\u56e0\u800c\u5728\u8655\u7406\u6548\u7387\u4e0a\u656c\u966a\u672b\u5ea7\u3002\u516c\u90e8\u9580\u53ef\u904b\u7528\u516c\u6b0a\u529b\u5f37\u5236\u4eba\u6c11\u7e73\u4ea4\u500b\u4eba\u8cc7\u6599\uff0c\u4e26\u5b58\u6709\u4eba\u6c11\u6700\u6a5f\u654f\u7684\u5b8c\u6574\u8cc7\u8a0a\uff0c\u9762\u5c0d\u5168\u7403\u7db2\u8def\u60e1\u610f\u653b\u64ca\u65e5\u76ca\u7316\u7357\uff0c\u82e5\u5be9\u67e5\u8207\u5236\u8861\u6a5f\u5236\u672a\u900f\u660e\u4e14\u4e0d\u5b8c\u5584\uff0c\u4eba\u6c11\u500b\u8cc7\u4fb5\u5bb3\u98a8\u96aa\u5c07\u65e5\u76ca\u5347\u9ad8\u3002<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/infolaw.iias.sinica.edu.tw\/wp-content\/uploads\/2020\/02\/\u793a\u610f\u57161-1024x683.jpg\" alt=\"\" class=\"wp-image-2252\" width=\"2048\" height=\"1024\"\/><figcaption>&#8220;data privacy&#8221; by stockcatalog is licensed under CC BY 2.0<\/figcaption><\/figure><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>\u8cc7\u6599\u4f86\u6e90<\/strong><\/h4>\n\n\n\n<p>IBM Security, Cost of a Data Breach Report (2019), <a href=\"https:\/\/www.ibm.com\/downloads\/cas\/ZBZLY7KL?_ga=2.214614101.374799518.1570089204-1306271313.1570089204&amp;_gac=1.238354740.1570089204.EAIaIQobChMI9dWtsYP-5AIVFaqWCh0ucwmFEAAYASAAEgLxZ_D_BwE\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"https:\/\/www.ibm.com\/downloads\/cas\/ZBZLY7KL?_ga=2.214614101.374799518.1570089204-1306271313.1570089204&amp;_gac=1.238354740.1570089204.EAIaIQobChMI9dWtsYP-5AIVFaqWCh0ucwmFEAAYASAAEgLxZ_D_BwE (\u5728\u65b0\u5206\u9801\u4e2d\u958b\u555f)\">https:\/\/www.ibm.com\/downloads\/cas\/ZBZLY7KL?_ga=2.214614101.374799518.1570089204-1306271313.1570089204&amp;_gac=1.238354740.1570089204.EAIaIQobChMI9dWtsYP-5AIVFaqWCh0ucwmFEAAYASAAEgLxZ_D_BwE<\/a> (Last visited: December 27, 2019). <\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>\u4f5c\u8005<\/strong><\/h4>\n\n\n\n<p>\u4e2d\u592e\u7814\u7a76\u9662\u6cd5\u5f8b\u5b78\u7814\u7a76\u6240 \u3000Leslie<br>\u672c\u7814\u7a76\u611f\u8b1d\u300cAI\u4eba\u5de5\u667a\u6167\u4e4b\u502b\u7406\u6311\u6230\u8207\u56e0\u61c9\u7b56\u7565\uff1a\u4e00\u500b\u77ed\u671f\u8207\u4e2d\u9577\u671f\u7684\u7814\u7a76\u300d\u8a08\u756b\u652f\u6301<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Leslie 2019\u5e7410\u670804\u65e5 IBM Securit<br \/><a class=\"read-more\" style=\"color:#843700\" href=\"https:\/\/infolaw.iias.sinica.edu.tw\/?p=2246\">[ Read More ]<\/a><\/p>\n","protected":false},"author":5,"featured_media":2252,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[43],"tags":[55],"class_list":["post-2246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles-books-reviews","tag-55","post-item clearfix"],"_links":{"self":[{"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=\/wp\/v2\/posts\/2246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2246"}],"version-history":[{"count":17,"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=\/wp\/v2\/posts\/2246\/revisions"}],"predecessor-version":[{"id":5494,"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=\/wp\/v2\/posts\/2246\/revisions\/5494"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=\/wp\/v2\/media\/2252"}],"wp:attachment":[{"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infolaw.iias.sinica.edu.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}