{"updated":"2025-01-20T06:36:41.416943+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00174676","sets":["581:8417:8427"]},"path":["8427"],"owner":"11","recid":"174676","title":["セキュリティ管理におけるサイバーリスク保険の有効性評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-09-15"},"_buckets":{"deposit":"c88987df-42d6-48f4-8813-d054c84eb6dd"},"_deposit":{"id":"174676","pid":{"type":"depid","value":"174676","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"セキュリティ管理におけるサイバーリスク保険の有効性評価","author_link":["360485","360487","360486","360484"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"セキュリティ管理におけるサイバーリスク保険の有効性評価"},{"subitem_title":"An Effectiveness Evaluation of Cyber Risk Insurance as a Security Control Method","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:社会の変革に挑戦するセキュリティ技術とプライバシー保護技術] セキュリティ管理,サイバーリスク保険,モンテカルロ・シミュレーション","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2016-09-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"九州大学大学院システム情報科学研究院"},{"subitem_text_value":"九州大学大学院システム情報科学研究院"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School and Faculty of Information Science and Electrical Engineering, Kyushu University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School and Faculty of Information Science and Electrical Engineering, Kyushu University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/174676/files/IPSJ-JNL5709025.pdf","label":"IPSJ-JNL5709025.pdf"},"date":[{"dateType":"Available","dateValue":"2018-09-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL5709025.pdf","filesize":[{"value":"540.9 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"0edc909e-f4f3-4e91-b300-6fb825df2e64","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"石川, 朝久"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"櫻井, 幸一"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tomohisa, Ishikawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kouichi, Sakurai","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"昨今報道されている情報セキュリティ事故により,セキュリティ管理への関心は高まり,その必要性はより重要視されている.また,その動向を受け,多くの専門家や研究機関によりベストプラクティスが示されつつある.その一方,推奨されるすべての対策を実装することはコスト面でも難しく,実用的なセキュリティ投資・リスク検討手法も整理されていない.そのため,セキュリティ対策担当者からは投資基準・費用対効果が分かりにくいと指摘されている.その批判は,新しいセキュリティ管理手法として最近注目されているサイバーリスク保険にもあてはまる.本論文では,実用的な費用便益分析ができる手法を利用して,サイバーリスク保険の有効性を示すことに成功した.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Since the recent security breach requires the intensification of security control, the documents, describing the best practice of security control, are published by experts. However, the implementations of all best practice are very difficult because of cost and the difficulty of cost-effective security investment. This paper analyzes related works of security control method based on cost-benefit analysis and current cyber risk insurance. Then, this paper evaluates the effectiveness of cyber risk insurance as the security control method.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"2098","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"2088","bibliographicIssueDates":{"bibliographicIssueDate":"2016-09-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicVolumeNumber":"57"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-19T00:44:50.397346+00:00","id":174676,"links":{}}