{"created":"2025-01-18T23:28:49.398369+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00069352","sets":["1164:3925:6047:6092"]},"path":["6092"],"owner":"10","recid":"69352","title":["組織のITセキュリティ推進のゲーム理論による分析-セキュリティ推進部門と従業員間の指示と実施のゲーム-"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-05-04"},"_buckets":{"deposit":"0d83901f-1673-49e1-8f3f-81477cfc213d"},"_deposit":{"id":"69352","pid":{"type":"depid","value":"69352","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"組織のITセキュリティ推進のゲーム理論による分析-セキュリティ推進部門と従業員間の指示と実施のゲーム-","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"組織のITセキュリティ推進のゲーム理論による分析-セキュリティ推進部門と従業員間の指示と実施のゲーム-"},{"subitem_title":"IT-security Implementation Game in Organizations - A Game between Promotion Section and Employee -","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ゲーム理論応用・マルウェア対策","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2010-05-04","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"電気通信大学,情報処理推進機構(IPA)"},{"subitem_text_value":"電気通信大学"},{"subitem_text_value":"電気通信大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"University of Electro-Communications, Information-Technology Promotion Agency","subitem_text_language":"en"},{"subitem_text_value":"University of Electro-Communications","subitem_text_language":"en"},{"subitem_text_value":"University of Electro-Communications","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/69352/files/IPSJ-CSEC10049001.pdf"},"date":[{"dateType":"Available","dateValue":"2012-05-04"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC10049001.pdf","filesize":[{"value":"586.2 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"7c575df3-6b32-474d-b6ad-2996093ba30f","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2010 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"杉浦, 昌"},{"creatorName":"諏訪, 博彦"},{"creatorName":"太田, 敏澄"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masashi, Sugiura","creatorNameLang":"en"},{"creatorName":"Hirohiko, Suwa","creatorNameLang":"en"},{"creatorName":"Toshizumi, Ohta","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本論文は,組織内でセキュリティ対策を指示する立場のセキュリティ推進部門とその指示を受けて実施する立場の従業員の行動をモデル化し,組織内のセキュリティ対策をゲーム理論を用いて分析したものである.推進部門と従業員の 2 プレーヤからなる非協力の戦略型ゲームを考え,それぞれのペイオフにより形成されるゲームの構造を明らかにした.分析により,以下の知見を得た.常時実施ゲーム,指示実施ゲーム,指示非実施ジレンマゲーム,常時非実施ジレンマゲーム,常時非実施ゲームの 5 種類のゲームが存在する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We develop a model of IT security implementation game in organizations based on game theory. Two players are the members of game; i.e. an IT security section that promotes implementation of IT security in an organization, and the employee who implements IT security in his/her business in the organization. We formulate the costs and benefits of implementation for their strategies in the game. Results in our analysis find the five types of game, which are a regular implementation game, a promotion-implementation game, a promotion-non-implementation dilemma game, a regular non-implementation dilemma game, and a regular non-implementation game.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2010-05-04","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicVolumeNumber":"2010-CSEC-49"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"id":69352,"updated":"2025-01-21T23:59:00.352620+00:00","links":{}}