{"updated":"2025-01-20T01:39:58.354010+00:00","links":{},"created":"2025-01-19T00:55:24.159387+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00189329","sets":["1164:4088:9383:9455"]},"path":["9455"],"owner":"11","recid":"189329","title":["The Beast that Shouted Governance at the Heart of the University"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-05-10"},"_buckets":{"deposit":"a1f47960-ed54-494b-9c34-85e2f7e2641f"},"_deposit":{"id":"189329","pid":{"type":"depid","value":"189329","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"The Beast that Shouted Governance at the Heart of the University","author_link":["430445","430446"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"The Beast that Shouted Governance at the Heart of the University"},{"subitem_title":"The Beast that Shouted Governance at the Heart of the University","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"情報システム運用","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2018-05-10","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Cybermedia Center, Osaka University"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Cybermedia Center, Osaka University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/189329/files/IPSJ-IOT18041025.pdf","label":"IPSJ-IOT18041025.pdf"},"date":[{"dateType":"Available","dateValue":"2020-05-10"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT18041025.pdf","filesize":[{"value":"613.4 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"52d2127c-752f-4007-86f8-7ca2aa928ff6","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2018 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hiroki, Kashiwazaki"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hiroki, Kashiwazaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"In December 2017, a Japanese university announced large-scale personal information leak. According to open information, the leak was caused on several systems by several unauthorized accesses. Also in February 2018, a Japanese research institute announced a large-scale security incident. Even only in Japan, many reports of cyber security incidents are announced for a year. After security incidents occur, a supervisory agency (in these cases, Ministry of Education, Culture, Sports, Science and Technology a.k.a MEXT) and security advisory consulting companies order the institutes to “strengthen governance in their own institutes”. This paper shows an example of personal information leak incident in an university and a beast that asked what is the governance in the university at the heart of the university.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In December 2017, a Japanese university announced large-scale personal information leak. According to open information, the leak was caused on several systems by several unauthorized accesses. Also in February 2018, a Japanese research institute announced a large-scale security incident. Even only in Japan, many reports of cyber security incidents are announced for a year. After security incidents occur, a supervisory agency (in these cases, Ministry of Education, Culture, Sports, Science and Technology a.k.a MEXT) and security advisory consulting companies order the institutes to “strengthen governance in their own institutes”. This paper shows an example of personal information leak incident in an university and a beast that asked what is the governance in the university at the heart of the university.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"4","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2018-05-10","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"25","bibliographicVolumeNumber":"2018-IOT-41"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":189329}