ログイン
言語:

WEKO3

  • トップ
  • コミュニティ
  • ランキング
AND
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

{"_buckets": {"deposit": "805df9a0-6570-4f1e-b745-f1c796461154"}, "_deposit": {"id": "3408", "owners": [], "pid": {"revision_id": 0, "type": "depid", "value": "3408"}, "status": "published"}, "_oai": {"id": "oai:repository.dl.itc.u-tokyo.ac.jp:00003408"}, "item_7_alternative_title_1": {"attribute_name": "\u305d\u306e\u4ed6\u306e\u30bf\u30a4\u30c8\u30eb", "attribute_value_mlt": [{"subitem_alternative_title": "\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u5730\u57df\u9593\u304a\u3088\u3073\u30bb\u30af\u30bf\u9593\u76f8\u4e92\u4f9d\u5b58\u6027\u306b\u95a2\u3059\u308b\u5b9f\u8a3c\u7814\u7a76"}]}, "item_7_biblio_info_7": {"attribute_name": "\u66f8\u8a8c\u60c5\u5831", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2012-03-22", "bibliographicIssueDateType": "Issued"}, "bibliographic_titles": [{}]}]}, "item_7_date_granted_25": {"attribute_name": "\u5b66\u4f4d\u6388\u4e0e\u5e74\u6708\u65e5", "attribute_value_mlt": [{"subitem_dategranted": "2012-03-22"}]}, "item_7_degree_name_20": {"attribute_name": "\u5b66\u4f4d\u540d", "attribute_value_mlt": [{"subitem_degreename": "\u4fee\u58eb(\u60c5\u5831\u7406\u5de5\u5b66)"}]}, "item_7_description_5": {"attribute_name": "\u6284\u9332", "attribute_value_mlt": [{"subitem_description": "Nowadays information technology system becomes very important in a modern business. Firms link their information technology system together in order to increase their efficiency. The linked systems help businesses communication, transact, and operate their works easier and faster. It also helps reducing cost and time. These are important advantages which make information technology becomes backbone of worldwide businesses. In this paper, first we discuss the problem and background knowledge of information security management. We talk about general viewpoints on economics of information securities. Here research catagories in information security economics will be presented with some interesting examples. Then we talk about motivation of the research in interdependency of information security. Here we try to give readers some viewpoints of interdependency of information security from both sectoral and regional viewpoints. Next we present our way to propose the empirical study on the sectoral and regional interdependency of information security. Our empirical study shows differences of interdependency of information security in both perspectives. Moreover we also discuss about the interdependency of information security according to our results in a comprehensice manner due to our objective of this empirical study. We also show result regarding informat impact on interdependency of information security due to the Great East Japan Earthquake. The results show some reduction in interdependency of information security due to this large scale earthquake. Such reduction in interdependency of information security might refer to sensitivity of the security.", "subitem_description_type": "Abstract"}]}, "item_7_full_name_3": {"attribute_name": "\u8457\u8005\u5225\u540d", "attribute_value_mlt": [{"nameIdentifiers": [{"nameIdentifier": "8191", "nameIdentifierScheme": "WEKO"}], "names": [{"name": "\u30b8\u30a7\u30f3\u30c1\u30e3\u30e9\u30c3\u30b5\u30af\u30f3, \u30dc\u30f3\u30b3\u30c3\u30c8"}]}]}, "item_7_select_21": {"attribute_name": "\u5b66\u4f4d", "attribute_value_mlt": [{"subitem_select_item": "master"}]}, "item_7_subject_13": {"attribute_name": "\u65e5\u672c\u5341\u9032\u5206\u985e\u6cd5", "attribute_value_mlt": [{"subitem_subject": "007", "subitem_subject_scheme": "NDC"}]}, "item_7_text_24": {"attribute_name": "\u7814\u7a76\u79d1\u30fb\u5c02\u653b", "attribute_value_mlt": [{"subitem_text_value": "\u60c5\u5831\u7406\u5de5\u5b66\u7cfb\u7814\u7a76\u79d1\u96fb\u5b50\u60c5\u5831\u5b66\u5c02\u653b"}]}, "item_7_text_36": {"attribute_name": "\u8cc7\u6e90\u30bf\u30a4\u30d7", "attribute_value_mlt": [{"subitem_text_value": "Thesis"}]}, "item_7_text_4": {"attribute_name": "\u8457\u8005\u6240\u5c5e", "attribute_value_mlt": [{"subitem_text_value": "\u6771\u4eac\u5927\u5b66\u5927\u5b66\u9662\u60c5\u5831\u7406\u5de5\u5b66\u7cfb\u7814\u7a76\u79d1\u96fb\u5b50\u60c5\u5831\u5b66\u5c02\u653b"}, {"subitem_text_value": "Department of Information and Communication Engineering, Graduate School of Information Science and Technology, The University of Tokyo"}]}, "item_creator": {"attribute_name": "\u8457\u8005", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Jenjarrussakul, Bongkot"}], "nameIdentifiers": [{"nameIdentifier": "8190", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "\u30d5\u30a1\u30a4\u30eb\u60c5\u5831", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2017-05-31"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "48106414.pdf", "filesize": [{"value": "3.2 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 3200000.0, "url": {"label": "48106414.pdf", "url": "https://repository.dl.itc.u-tokyo.ac.jp/record/3408/files/48106414.pdf"}, "version_id": "072907fd-b017-4ead-b30e-a224b52a9002"}]}, "item_language": {"attribute_name": "\u8a00\u8a9e", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "\u8cc7\u6e90\u30bf\u30a4\u30d7", "attribute_value_mlt": [{"resourcetype": "thesis", "resourceuri": "http://purl.org/coar/resource_type/c_46ec"}]}, "item_title": "Empirical Studies on Regional and Sectoral Interdependencies of Information Security", "item_titles": {"attribute_name": "\u30bf\u30a4\u30c8\u30eb", "attribute_value_mlt": [{"subitem_title": "Empirical Studies on Regional and Sectoral Interdependencies of Information Security"}]}, "item_type_id": "7", "owner": "1", "path": ["9/233/234", "34/105/262"], "permalink_uri": "http://hdl.handle.net/2261/51732", "pubdate": {"attribute_name": "\u516c\u958b\u65e5", "attribute_value": "2012-05-29"}, "publish_date": "2012-05-29", "publish_status": "0", "recid": "3408", "relation": {}, "relation_version_is_last": true, "title": ["Empirical Studies on Regional and Sectoral Interdependencies of Information Security"], "weko_shared_id": null}
  1. 124 情報理工学系研究科
  2. 40 電子情報学専攻
  3. 1244025 修士論文(電子情報学専攻)
  1. 0 資料タイプ別
  2. 20 学位論文
  3. 025 修士論文

Empirical Studies on Regional and Sectoral Interdependencies of Information Security

http://hdl.handle.net/2261/51732
50cc5e91-1257-445b-a6f4-c669cf16eebd
名前 / ファイル ライセンス アクション
48106414.pdf 48106414.pdf (3.2 MB)
Item type 学位論文 / Thesis or Dissertation(1)
公開日 2012-05-29
タイトル
タイトル Empirical Studies on Regional and Sectoral Interdependencies of Information Security
言語
言語 eng
資源タイプ
資源 http://purl.org/coar/resource_type/c_46ec
タイプ thesis
その他のタイトル
その他のタイトル 情報セキュリティの地域間およびセクタ間相互依存性に関する実証研究
著者 Jenjarrussakul, Bongkot

× Jenjarrussakul, Bongkot

WEKO 8190

Jenjarrussakul, Bongkot

Search repository
著者別名
識別子
識別子 8191
識別子Scheme WEKO
姓名
姓名 ジェンチャラッサクン, ボンコット
著者所属
著者所属 東京大学大学院情報理工学系研究科電子情報学専攻
著者所属
著者所属 Department of Information and Communication Engineering, Graduate School of Information Science and Technology, The University of Tokyo
Abstract
内容記述タイプ Abstract
内容記述 Nowadays information technology system becomes very important in a modern business. Firms link their information technology system together in order to increase their efficiency. The linked systems help businesses communication, transact, and operate their works easier and faster. It also helps reducing cost and time. These are important advantages which make information technology becomes backbone of worldwide businesses. In this paper, first we discuss the problem and background knowledge of information security management. We talk about general viewpoints on economics of information securities. Here research catagories in information security economics will be presented with some interesting examples. Then we talk about motivation of the research in interdependency of information security. Here we try to give readers some viewpoints of interdependency of information security from both sectoral and regional viewpoints. Next we present our way to propose the empirical study on the sectoral and regional interdependency of information security. Our empirical study shows differences of interdependency of information security in both perspectives. Moreover we also discuss about the interdependency of information security according to our results in a comprehensice manner due to our objective of this empirical study. We also show result regarding informat impact on interdependency of information security due to the Great East Japan Earthquake. The results show some reduction in interdependency of information security due to this large scale earthquake. Such reduction in interdependency of information security might refer to sensitivity of the security.
書誌情報 発行日 2012-03-22
日本十進分類法
主題 007
主題Scheme NDC
学位名
学位名 修士(情報理工学)
学位
値 master
研究科・専攻
情報理工学系研究科電子情報学専攻
学位授与年月日
学位授与年月日 2012-03-22
戻る
0
views
See details
Views

Versions

Ver.1 2021-03-02 08:07:00.858784
Show All versions

Share

Mendeley CiteULike Twitter Facebook Print Addthis

Cite as

Export

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by CERN Data Centre & Invenio


Powered by CERN Data Centre & Invenio