{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00191478","sets":["1164:4088:9383:9535"]},"path":["9535"],"owner":"11","recid":"191478","title":["情報セキュリティポリシーにおける例外措置の利用者による実施阻害要因および対応に関する一考察"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-09-20"},"_buckets":{"deposit":"ac39915e-2c1e-4de2-867a-a478f1ccaafe"},"_deposit":{"id":"191478","pid":{"type":"depid","value":"191478","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"情報セキュリティポリシーにおける例外措置の利用者による実施阻害要因および対応に関する一考察","author_link":["441981","441977","441982","441979","441980","441978"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"情報セキュリティポリシーにおける例外措置の利用者による実施阻害要因および対応に関する一考察"},{"subitem_title":"A Study on Response to Users' Inhibitory Factors in Exceptional Rules of Information Security Policy","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2018-09-20","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"情報セキュリティ大学院大学"},{"subitem_text_value":"情報セキュリティ大学院大学"},{"subitem_text_value":"情報セキュリティ大学院大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Institute of Information Security","subitem_text_language":"en"},{"subitem_text_value":"Institute of Information Security","subitem_text_language":"en"},{"subitem_text_value":"Institute of Information Security","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/191478/files/IPSJ-IOT18043001.pdf","label":"IPSJ-IOT18043001.pdf"},"date":[{"dateType":"Available","dateValue":"2020-09-20"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT18043001.pdf","filesize":[{"value":"835.2 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"39814949-773e-4539-928f-21cae04c16bb","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2018 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"村﨑, 康博"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"稲葉, 緑"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"原田, 要之助"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yasuhiro, Murasaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Midori, Inaba","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yonosuke, Harada","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"情報セキュリティポリシーの策定 ・ 実施は,全ての組織 (企業や官公庁など) において必須施策のひとつであり,想定外の事象にも対応できるように “例外措置” の策定が推奨されてきている.例外措置の普及をはかる上で,利用者が例外措置を実施する上で障害となる要因が挙げられてきている.これらの阻害要因を調べることにより,個人および組織における対応案について考察し提案する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The formulation and implementation of the information security policy is one of the essential measures in all organizations (private companies and government offices), and it has been recommended to formulate \"exceptional rules\" to be able to cope with unexpected events, in the dissemination of exception measures. In the dissemination of the exceptional rules, it has been mentioned that the user becomes a failure to implement the exceptional rules. By examining these inhibition factors, we discuss and propose countermeasures for individuals and organizations.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2018-09-20","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicVolumeNumber":"2018-IOT-43"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":191478,"updated":"2025-01-20T00:38:26.825181+00:00","links":{},"created":"2025-01-19T00:57:21.761822+00:00"}