{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00213645","sets":["1164:3925:10503:10715"]},"path":["10715"],"owner":"44499","recid":"213645","title":["在宅型テレワークにおける情報セキュリティポリシーの違反要因の調査"],"pubdate":{"attribute_name":"公開日","attribute_value":"2021-11-01"},"_buckets":{"deposit":"18cf48e3-067b-4c6a-9a71-b31068d23dd3"},"_deposit":{"id":"213645","pid":{"type":"depid","value":"213645","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"在宅型テレワークにおける情報セキュリティポリシーの違反要因の調査","author_link":["546956","546953","546954","546955"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"在宅型テレワークにおける情報セキュリティポリシーの違反要因の調査"},{"subitem_title":"Investigating Factors Contributing to Violations of Information Security Policies in Home-Based Telework","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2021-11-01","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"情報セキュリティ大学院大学"},{"subitem_text_value":"情報セキュリティ大学院大学"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/213645/files/IPSJ-CSEC21095014.pdf","label":"IPSJ-CSEC21095014.pdf"},"date":[{"dateType":"Available","dateValue":"2023-11-01"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC21095014.pdf","filesize":[{"value":"707.4 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"da94fa17-5ad4-44ed-bbe6-2bc69e9d61ea","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2021 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"床波, 大貴"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"稲葉, 緑"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hiroki, Tokonami","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Midori, Inaba","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"情報セキュリティの確保に組織的に取り組む情報セキュリティマネジメントでは,従業員に,組織の情報セキュリティポリシーの遵守を徹底することが重要である.昨今,テレワークが急速に広まっているが,情報セキュリティポリシーの遵守は徹底されているとは言い難い.テレワークではシャドー IT のリスクが懸念され,特に許可のない私物端末の利用については,ゼロトラストに基づく技術的な対策が行き届きにくい.そのため,テレワークにおける私物端末の利用に関する情報セキュリティポリシーの違反要因を明らかにし,対処することが重要である.本稿は,テレワークにおける許可のない私物端末の利用に関する情報セキュリティポリシーの違反要因を調査し,その違反要因を明らかにするための調査方針を示す.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In information security management, which is a systematic approach to ensure information security, it is important to ensure that employees comply with the information security policy of the organization. Recently, telework has been spreading rapidly, but it is difficult to say that the information security policy is thoroughly observed. In telework, the risk of shadow IT is a concern, and it is difficult to take technical measures based on zero-trust for the use of personal devices without permission. Therefore, it is important to identify and deal with the violation factors of the information security policy regarding the use of personal devices in telework. This paper investigates the violation factors of the information security policy regarding the use of personal devices without permission in telework, and presents a research policy for clarifying the violation factors.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2021-11-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"14","bibliographicVolumeNumber":"2021-CSEC-95"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":213645,"updated":"2025-01-19T17:05:05.274645+00:00","links":{},"created":"2025-01-19T01:14:30.054077+00:00"}