詳細検索結果
以下の条件での結果を表示する: 検索条件を変更
クエリ検索: "CYBER"
6,425件中 1-20の結果を表示しています
  • 大濱 裕
    日本経営倫理学会誌
    2001年 8 巻 107-120
    発行日: 2001/03/31
    公開日: 2017/07/28
    ジャーナル フリー
    In recent years, IT has come to be acknowledged as the cutting edge to change the current world, not only to change the global economy but also to change the world politics. Also, IT is regarded as key factor to change the internationasl society, spread the democracy all over the world, however, this common perception of IT is sometimes criticized as too bright. In fact, it is evident that IT revolution has also caused new types of moral hazard and harmed the benefits of our society. Such moral hazards are quite peculiar to IT revolution, especially to Internet technology or
    Cyber
    Space. In this aspect, those moral hazards could be called
    Cyber
    Moral Hazard. The typical type of
    Cyber
    Moral Hazard are
    Cyber
    Crime,
    Cyber
    Terrorism or
    Cyber
    War, and in the business area, information asymmetry causes lots of
    Cyber
    Moral Hazard. This study sets its focus on the characteristics and causes of
    Cyber
    Moral Hazard, and analizes the ethical issues peculiar to IT revolution.
  • 奥田 栄
    社会・経済システム
    2004年 25 巻 95-101
    発行日: 2004/10/30
    公開日: 2017/07/28
    ジャーナル フリー
    Cyber
    ethics is a branch of so-called applied ethics. In this paper we discuss the question of whether Internet technology introduces any unique ethical issues or not. We start our discussion examining a difference between physical space and
    cyber
    space, then discuss how this difference is treated in Luhmann's theory of social system, in other words, what kind of difference in moral communication can be induced, and consider a difference between ethics in physical space and in
    cyber
    space. In physical space, we can do all of what is not forbidden by the law of nature. On the other hand, in
    cyber
    space we can do all of what is not forbidden by software constituting
    cyber
    space. Of course, we can rewrite software and regulate any undesirable act which was possible formerly. In this case, neither law nor ethic is necessary for such a
    cyber
    space. But, we cannot take all situations that can happen into account. Whenever a new act becomes possible, software needs revisions. There is no guarantee that revisions repeated many times do not contradict mutually. So, there will be room to exist ethical problems in
    cyber
    space.
  • Kenji Watanabe
    Journal of Disaster Research
    2017年 12 巻 5 号 1039
    発行日: 2017/10/01
    公開日: 2018/11/01
    ジャーナル オープンアクセス

    As our daily lives and socioeconomic activities have increasingly come to depend on information systems and networks, the impact of disruptions to these systems and networks have also become more complex and diversified.

    In urban areas, where people, goods, money, and information are highly concentrated, the possibility of chain failures and confusion beyond our expectations and experience is especially high.

    The vulnerabilities in our systems and networks on have become the targets of

    cyber
    attacks, which have come to cause socioeconomic problems with increasing likelihood. To counter these attacks, technological countermeasures alone are insufficient, and countermeasures such as the development of professional skills and organizational response capabilities as well as the implementation of
    cyber
    security schemes based on public-private partnerships (PPP) at the national level must be carried out as soon as possible.

    In this JDR mini special issue on

    Cyber
    Security, I have tried to expand the scope of traditional
    cyber
    security discussions with mainly technological aspects. I have also succeeded in including non-technological aspects to provide feasible measures that will help us to prepare for, respond to, and recover from socioeconomic damage caused by advancing
    cyber
    attacks.

    Finally, I am truly grateful for the authors’ insightful contributions and the referees’ acute professional advice, which together make this JDR mini special issue a valuable contribution to making our society more resilient to incoming

    cyber
    attacks.

  • 土居 茂雄
    工学教育
    2021年 69 巻 1 号 1_92-1_97
    発行日: 2021年
    公開日: 2021/02/06
    ジャーナル フリー
    Hokkaido Prefectural Police and NIT Tomakomai College signed a contract about student nurture in
    cyber
    security field in 2018. After the contract, we have started collaborated
    cyber
    security education. Hokkaido Prefectural Police has spoken to students about
    cyber
    security, usage of social network service and
    cyber
    security crime. In NIT Tomakomai College, some computer science and engineering course students developed and studied some contents related to
    cyber
    security. In this paper, we report the
    cyber
    security education in 2018 and 2019.
  • 安達 早苗, *森本 祥一
    日本社会情報学会全国大会研究発表論文集
    2011年 26 巻
    発行日: 2011年
    公開日: 2012/03/20
    会議録・要旨集 フリー
    Cyber
    -bullying is a serious problem in the Internet. The number of troubles by verbal abuse, libels using the Bulletin Board System or e-mail, is on the increase. Against this problem, there have been the two principal countermeasures in Japan; content-control software and education regarding the morals and use of the Internet at an elementary school, a junior high school, or a high school. However,
    cyber
    -bullying occurs not only to minors but also to adults. In such cases, the countermeasures are not effective. Therefore, in this paper we survey the countermeasures and discuss problems when they are applied to the
    cyber
    -bullying of adults.
  • 安保 克也
    憲法論叢
    2008年 15 巻 101-126
    発行日: 2008/12/27
    公開日: 2018/01/10
    ジャーナル オープンアクセス
    It seems that wars in the 21st century are mainly in the form of
    Cyber
    Warfare rather than a more conventional style of confrontation.
    Cyber
    Warfare breaks out without declaration. Therefore, under the current Japanese legal system it is difficult to prevent
    Cyber
    Warfare, which is fought in the lawless zone called Cyberspace. If there were any legal regulations, such as international treaties, these laws would be broken easily with the new technology that is available. This paper tries to analyze how different nations tackle
    Cyber
    Warfare and how
    Cyber
    Warfare could be interpreted legally. It also makes several how suggestions on the Japanese defense policy against
    Cyber
    Warfare.
  • Hyun-seung Yang, Hyun Jin Park, Yong-jin Cho
    映像情報メディア学会技術報告
    2000年 24.1 巻 MIP2000-12/AIT2000-1
    発行日: 2000/01/13
    公開日: 2017/06/23
    会議録・要旨集 フリー
    A
    cyber
    -character is a kind of artificial life inhabiting a virtual world. To be a life form in the virtual world,
    cyber
    characters need sensors and control systems. The sensor system enable the
    cyber
    character to recognaize not only the virtual world but also the real world in such a manner that it can respond to user's commands. The control system provides the
    cyber
    character with life-like behavior by generating goals and plans, selecting appropriate actions, and finally by animating the character. Users may feel the
    cyber
    character to be alive because of its close interaction and smart performance. In this paper, a
    cyber
    -character system designed to prove users with a realistic feeling of an artificial life is discussed.
  • 内藤 勲
    オフィス・オートメーション
    2000年 20 巻 3 号 58-64
    発行日: 2000/03/20
    公開日: 2019/01/15
    ジャーナル フリー
    Internet Technology made unified global
    cyber
    space in our world. E-business in
    cyber
    space has diffused rapidly. Virtual company is one of the models of organizing in
    cyber
    space. In needs organizing infrastructure for virtual company generally to realize. That infrastructure is McDonaldization in
    cyber
    space. McDonaldization means diffusion of some institutions for exchanging actions in society through efficiency, possibility of calculate, possibility of forecast, and control. Recent emergencies of some business models in
    cyber
    space will contribute McDonaldization and eventually make easy for constructing virtual companies.
  • —各州による「いじめ法施策」策定の特質と課題に焦点を当てて—
    宮本 浩紀
    アメリカ教育学会紀要
    2012年 23 巻 27-39
    発行日: 2012/10/13
    公開日: 2024/03/05
    研究報告書・技術報告書 フリー

    Cyber
    -bullying is one of the most difficult problems in the United States as well as Japan, Asian countries and European countries etc. To prevent some students from bullying and
    cyber
    -bullying, the administrators of education, teachers and researchers have been thinking about those matters.

    Although such an investigation of the

    cyber
    -bullying have been energetically held, the problems of that matter cause some students being bullied, make some students sad, and in some cases make some students kill themselves. In order to cope with those problematic behaviors, each school ordered the assailants of bullying suspend. Having been thought that order as a remedy for
    cyber
    -bullying, it wouldn’t have gone well. For some schools’ action was recognized as over-criminalizing by some courts of justice. As a result of that judgment those schools was ordered paying fine to the assailants and their families.

    Taking considerations that those cases had caused schools not to be able to punish the bullying behaviors, the U.S. Government and each state controlling educational matters enacted Bullying Laws and Policies(Anti-Bullying Laws and Policies).

    This paper examines concretely how the

    cyber
    -bullying is in the United States and what impact and problems of the Bullying Laws and Policies in the same country. Materials used for analysis included"Analysis of State Bullying Laws and Policies" reported by U.S. Department of Education, and"Crime, Violence, Discipline, and Safety in U.S Public Schools Findings From the School Survey on Crime and Safety 2009-10" reported by the same administrator, and so on.

  • Susumu Ichinose
    映像情報メディア学会技術報告
    1998年 22.1 巻
    発行日: 1998/01/14
    公開日: 2017/06/23
    会議録・要旨集 フリー
    The 21st century will see the formation of a "
    Cyber
    society" that, while separate from the real world, will cooperate with it, leading to the further expansion and development of world society.
    Cyber
    society allows the formation of virtual space through the connection of multiple computers in a network. In this virtual space, multiple users can communicate with each other and can collect and exchange information while moving about freely and engaging in activities. Three main technologies are vital to the construction of the
    Cyber
    society : platform technology for converting multimedia information to optical signals and performing digital processing and communication processing on such signals ; communications network technology for transferring these signals from one point to another ; and application technology for configuring the
    Cyber
    society that will be formed on this network. This paper describes platform technology and network technology with an emphasis on their relationship to application technology for configuring the
    Cyber
    society, and will also discuss interSpace, one of the
    cyber
    society platform system of the
    Cyber
    society.
  • 三好 孝典, 加藤 勇夫, 松本 勉
    産業応用工学会論文誌
    2024年 12 巻 1 号 62-71
    発行日: 2024年
    公開日: 2024/03/15
    ジャーナル オープンアクセス
    In recent years, the increasing prominence of
    cyber
    -attacks has highlighted the critical need for enhanced security in industrial control systems and mobility network systems. These systems, responsible for controlling production lines and plants, are becoming primary targets for
    cyber
    threats. In this paper, we propose a method to maintain the stable operation of control systems when
    cyber
    -attack anomalies are detected, while simultaneously preventing the spread of damage based on the detected anomalous activities. By integrating real-time anomaly detection with dynamic network zoning, our method aims to promptly detect and isolate any malicious activities or unauthorized devices in the network. In this paper, we demonstrate the effectiveness of our anomaly detection method using security units through experiments in an evaluation environment simulating an industrial control system field network. Furthermore, we show that the implementation of dynamic zoning can effectively mitigate the impact of potential attacks. Our research contributes a robust security solution designed with the unique characteristics and requirements of control systems in mind, offering a promising direction for future advancements in the field.
  • ―北崎論文へのコメント―
    雨宮 智浩
    心理学評論
    2016年 59 巻 3 号 324-329
    発行日: 2016年
    公開日: 2018/02/06
    ジャーナル フリー

    The possibility of implementing ‘we-mode’ among users in

    cyber
    spaces, which is proposed by Kitazaki, is discussed by reviewing the studies on body ownership and the sense of agency, both of which are strongly involved in self-body perception and recognition. The movement of a body in
    cyber
    space should strongly correlate with that in the physical space, but not necessary be rendered as realistic. Furthermore, the interaction and relationship between the spaces from the point of view of both a sense of realistic self-body in a
    cyber
    space and behavior changes after an experience in a
    cyber
    space are discussed to consider the possibility of creating ‘we-mode’ bridging of the physical and
    cyber
    spaces.

  • Hideyuki Tokuda, Jin Nakazawa
    Information and Media Technologies
    2012年 7 巻 1 号 405-413
    発行日: 2012年
    公開日: 2012/03/15
    ジャーナル フリー
    Convergence between
    cyber
    and physical spaces is accelerating due to the penetration of various ubiquitous services based on sensors and actuators. Effective sensors such as ultra low-cost wireless sensors, smart phones and pads allow us to couple real objects, people, places, and environment with the corresponding entities in the
    cyber
    space. Similarly, soft sensors such as blog, facebook, twitter, foursqure and other applications create new types of sensed data for
    cyber
    -physical coupling. for In this paper, we describe sensor enabled
    cyber
    -physical coupling for creating ubiquitous services in the SenseCampus project. We first classify
    cyber
    -physical coupling and ubiquitous services in the project. Several ubiquitous services, such as SensingCloud, DIY smart object services, Twitthings, Airy Notes, and Mebius Ring, are described. We then address the challenges in
    cyber
    -physical coupling for creating advanced ubiquitous services particularly for educational facilities.
  • Hideyuki Tokuda, Jin Nakazawa
    Journal of Information Processing
    2012年 20 巻 1 号 45-53
    発行日: 2012年
    公開日: 2012/01/15
    ジャーナル フリー
    Convergence between
    cyber
    and physical spaces is accelerating due to the penetration of various ubiquitous services based on sensors and actuators. Effective sensors such as ultra low-cost wireless sensors, smart phones and pads allow us to couple real objects, people, places, and environment with the corresponding entities in the
    cyber
    space. Similarly, soft sensors such as blog, facebook, twitter, foursqure and other applications create new types of sensed data for
    cyber
    -physical coupling. for In this paper, we describe sensor enabled
    cyber
    -physical coupling for creating ubiquitous services in the SenseCampus project. We first classify
    cyber
    -physical coupling and ubiquitous services in the project. Several ubiquitous services, such as SensingCloud, DIY smart object services, Twitthings, Airy Notes, and Mebius Ring, are described. We then address the challenges in
    cyber
    -physical coupling for creating advanced ubiquitous services particularly for educational facilities.
  • 八槇 博史
    日本印刷学会誌
    2017年 54 巻 2 号 116-119
    発行日: 2017年
    公開日: 2017/05/16
    ジャーナル フリー
    Cyber
    security has become one of the primary topics in today's networked society.
    Cyber
    security, or information security, is about assuring confidentiality, integrity and availability of information resources, and attackers try to break them in various fashions. In this article, basic concepts about
    cyber
    security are presented, and primary threats, such as breach of secrecy, denial-of-service attacks and targeted
    cyber
    -attacks, and countermeasures, such as encryption and access control, are discussed.
  • 守山 凜, 川戸 聡也, 徳光 政弘
    工学教育
    2022年 70 巻 4 号 4_171-4_176
    発行日: 2022年
    公開日: 2022/07/22
    ジャーナル フリー
    Cyber
    security knowledge and operational skills for computer utilization are essential for engineers in today’s society. In KOSEN that aims to train engineers, the implementation of college-wide
    cyber
    security education is a crucial issue. In fiscal year 2020, the authors held two
    cyber
    security education lectures for students in order to raise students’ awareness of
    cyber
    security at NIT Yonago College. The lectures included not only the classroom lectures but also practical cyberattack and defense exercises using real intrusion tools. This paper reports an overview of the
    cyber
    security education by students, the developed teaching materials, results of the questionnaire analysis to participants, and future prospects and issues.
  • 千代原 亮一
    日本情報経営学会誌
    2010年 30 巻 3 号 88-98
    発行日: 2010/03/05
    公開日: 2017/08/07
    ジャーナル フリー
    In Korea, with the rapid spread of the Internet, "
    cyber
    violence" has been a social problem such as the spread of a falsehood, revealing of a real name and personal information on the Net. The suicide of a famous actress in October 2008 caused by
    cyber
    violence led the Korean government to propose "a
    cyber
    contempt charge" that imposed a severe punishment of a slander on the Internet. In this paper, based on the investigation of socio-cultural background of
    cyber
    violence in Korea and the trend of law development by the Korean government, the author examines the propriety of the
    cyber
    contempt charge. Furthermore, on the basis of consideration of the recent court cases of libel on the Internet in Japan, the author proposes a recommendation of the method for protecting the freedom of speech on the Net from the viewpoint of "information ethics".
  • Masafumi Matta, Masato Koike, Wataru Machii, Tomomi Aoyama, Hidemasa Naruoka, Ichiro Koshijima, Yoshihiro Hashimoto
    JOURNAL OF CHEMICAL ENGINEERING OF JAPAN
    2015年 48 巻 8 号 619-625
    発行日: 2015/08/20
    公開日: 2015/08/20
    ジャーナル フリー
    Industrial control systems (ICS) have hidden vulnerabilities that cannot be usually solved by IT security tools, because of their 24 h 365 d non-stop, non-update and non-patch operation. There is, however, very limited report of
    cyber
    -attacks, so that owners of critical infrastructures do not have much attention for their ICS protection. This is a kind of misunderstanding of the current situation caused by a lacking of capability to detect a
    cyber
    -intrusion. In order to apply an Intrusion Detection System (IDS), it is difficult to make the complete white list of communication packets, and it is also difficult to perform anomaly detection by checking the payload of packet one by one. This paper defines characteristics of communication in the ICS network and proposes a methodology to visualize the ICS network behavior. An illustrative example of pseudo
    cyber
    -attack is also prepared for understanding our proposed method.
  • Elisa Cassi, Ben Densham, Duncan Duffy, Joel Snape
    マリンエンジニアリング
    2020年 55 巻 2 号 235-244
    発行日: 2020/03/01
    公開日: 2020/03/23
    ジャーナル フリー
  • 松田 洋, 新藤 義昭
    映像情報メディア学会誌
    2005年 59 巻 4 号 559-565
    発行日: 2005/04/01
    公開日: 2011/08/17
    ジャーナル フリー
    To improve and augment elementary school level computer-based education classes, we developed a new educational support tool named
    Cyber
    Theater and the script language named
    Cyber
    Theater Scenario Language (CTSL).
    Cyber
    Theater enables to produce the 3DCG animation easily, which includes virtual actors who can speak by using speech synthesizer, virtual stages, stage parts, sound effects, and the background music. The scenario of animation story can be written by using CTSL. CTSL is a Tag-based hypertext language like the HTML language. At first, we developed several 3DCG animations stories for children. As a result of this work, we integrated the 3DCG contents (Actors, Stages, and Stage parts) to the database named
    Cyber
    Theater gallery. By using
    Cyber
    Theater, CTSL, and
    Cyber
    Theater gallery, we designed the Creative Lesson, where upper-aged pupils (including junior high school and high school) studied how to make a 3DCG animation and produced their original animation stories as their short presentation. Moreover, as a teaching material of Creative Lesson, we have developed the CTSL Learning Kit (CLKit), which includes several sample scenarios written by using the CTSL. It is designed for learning how to make a 3DCG animation step by step. In this paper, we report the design details of
    Cyber
    Theater, CTSL, the results of Creative Lesson's experiment, and the CLKit.
feedback
Top