{"updated":"2025-01-19T23:32:38.407557+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00194277","sets":["1164:5251:9700:9701"]},"path":["9701"],"owner":"44499","recid":"194277","title":["組織のセキュリティ文化形成-手法についての一考察-"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-02-08"},"_buckets":{"deposit":"8b928805-9ec2-418c-8321-47cebf5a5b6a"},"_deposit":{"id":"194277","pid":{"type":"depid","value":"194277","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"組織のセキュリティ文化形成-手法についての一考察-","author_link":["459456","459457","459459","459458"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"組織のセキュリティ文化形成-手法についての一考察-"},{"subitem_title":"A Study of Method -Security Culture Building of Organization-","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2019-02-08","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"情報セキュリティ大学院大学情報セキュリティ研究科"},{"subitem_text_value":"情報セキュリティ大学院大学情報セキュリティ研究科"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Security, Institute of Information Security","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Security, Institute of Information Security","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/194277/files/IPSJ-EIP19083007.pdf","label":"IPSJ-EIP19083007.pdf"},"date":[{"dateType":"Available","dateValue":"2021-02-08"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-EIP19083007.pdf","filesize":[{"value":"1.2 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"26"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"f17bdd45-e7f7-42f9-828d-1d1a8288a93d","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"岡嶋, 裕希"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"原田, 要之助"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuki, Okajima","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yonosuke, Harada","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11238429","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8647","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年世界中で繰り返し行われるサイバー攻撃によって情報セキュリティに対する関心が高まっており,企業は脅威への対策を行うことを余儀なくされている.経営層,情報システム部門等,IT リテラシーの高い人々は自組織のセキュリティ対策に関心を持ち,対応策を導入しようという動きがあるが,情報セキュリティ対策の性質上,どうしても利便性とのトレードオフになり業務効率が落ちる等,未だに導入に反対する声もある.その結果今日では情報流出に関する事件のうち,内部不正犯罪が取り上げられてきている.内部不正は職務上与えられた権限を使い行われるため,その対策はもはやシステムだけでは防ぐことは出来ないと言える.そこで本論文ではこれらを防ぐために,情報セキュリティに関心を持つ組織文化がどのように形成され,またどのように効果的に醸成できるかについて検討する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In recent years, companies are forced to take measures against repeated cyber-attacks all over the world due to increased concern with information security. Management, information system department, and IT-literate employee have an interest of security measures and implementation of those. Alternatively, there are even now opposing opinion to introduce those owing to trade-off between security and business efficiency. As a result, nowadays, malicious insider attract rising attention within information leakage incidents. Malicious insider has official authority, and does wrong readily, therefore only measures by system are inadequate. In this paper, we discuss how to build and foster security culture of organization.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告電子化知的財産・社会基盤(EIP)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2019-02-08","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"7","bibliographicVolumeNumber":"2019-EIP-83"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T00:59:20.693096+00:00","id":194277,"links":{}}