Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM |
2024-03-22 09:10 |
Okinawa |
Okinawa Prefectural Museum and Art Museum (Primary: On-site, Secondary: Online) |
Proposal of an implication relationship estimation method for information security related regulatory documents Kouki Nakanishi, Tkakani ikuko, Sakamoto Masanobu, Ohishi Haruo (NTT) ICM2023-51 |
In recent years, internal controls regarding information security have become increasingly important from the perspectiv... [more] |
ICM2023-51 pp.35-40 |
NS, IN (Joint) |
2024-02-29 09:20 |
Okinawa |
Okinawa Convention Center |
Cross organizational data distribution and federation method considering data governance Masataka Mizukoshi, Kei Omura, Yoshihito Oshima (NTT) IN2023-65 |
Efforts to utilize data beyond the boundaries of companies and organizations, as exemplified by initiatives such as smar... [more] |
IN2023-65 pp.1-6 |
KBSE, SWIM |
2022-05-21 13:45 |
Tokyo |
(Primary: On-site, Secondary: Online) |
System Thinking on the Digital Governance Code Shuichiro Yamamoto (IPUT in Nagoya) KBSE2022-8 SWIM2022-8 |
The digital transformation efforts are delayed in Japanese companies. The Ministry of Economy, Trade and Industry (METI)... [more] |
KBSE2022-8 SWIM2022-8 pp.47-52 |
HCS |
2021-03-16 13:20 |
Online |
Online |
Analysis of the university presidents' message on the new coronavirus infection
-- From the perspective of the presidents' leadership and crisis management -- Susumu Shibui, Hiromi Akagawa (NIAD-QE) HCS2020-80 |
In order to investigate the status of university response to the COVID-19, we focused on the leadership of the president... [more] |
HCS2020-80 pp.73-78 |
SWIM |
2020-11-28 14:10 |
Online |
Online |
Governance and accessment of the use of IT and AI for sustainable development Hiroyuki Ogura (Nihon Univ.), Yonosuke Harada (Inst. of Information Security), Shunsuke Managi (Kyushu Univ.) SWIM2020-8 |
It is required that the management of everything surrounding the organization becomes smarter and that it is transformed... [more] |
SWIM2020-8 pp.10-17 |
SITE, IPSJ-EIP [detail] |
2020-06-04 10:55 |
Online |
Online |
Reconsideration of 'Risk' in information security/cybersecurity governance
-- Based on the discussion in Science, Technology and Society (STS) -- Takumi Kimura (NRI SecureTechnologies) SITE2020-2 |
As information security/cybersecurity has been increasing, so is the importance of (Information) Security Governance. Ho... [more] |
SITE2020-2 pp.7-12 |
SWIM |
2019-11-30 16:35 |
Tokyo |
TUS Kagurazaka Campus Fujimi Bldg. |
City and corporate governance of the use of Artificial Intelligence
-- Sustainable smart cities implementation through Systems Approach and Machine Learning Systems Engineering -- Hiroyuki Ogura, Shunsuke Managi (Kyushu Univ.), Masahiko Ishino (Bunkyo Univ.) SWIM2019-24 |
In this paper, we consider a city and corporate governance model of the use of new digital technologies including Artifi... [more] |
SWIM2019-24 pp.29-36 |
IA, SITE, IPSJ-IOT [detail] |
2019-03-07 13:25 |
Tokushima |
Grand XIV Naruto |
The Requirement of the Consensus Building for the IoT Services using the Personal Data in Emergency Hiroshi Kitamura (Setsu Univ.) SITE2018-71 IA2018-63 |
The management standard in the data under the cloud computing services depends on the ISO/IEC specification or the busin... [more] |
SITE2018-71 IA2018-63 pp.67-72 |
IA |
2018-09-04 10:55 |
Hokkaido |
Hokkaido Univ. Conference Hall |
A Field Survey Report on Information Security Governance for Academic Institutes in Cloud-First World Hidenobu Watanabe, Kouji Nishimura (Hiroshima Univ.), Kento Aida, Hiroshi Yoshida (NII) IA2018-23 |
It is important that academic institutes which aim to use cloud services for information systems comprehend an actual st... [more] |
IA2018-23 pp.47-54 |
SITE, IPSJ-CE, IPSJ-CLE |
2017-12-08 13:00 |
Ehime |
|
An Evaluation of Bitcoin Full Node Cluster
-- Investigation of governance control over block chains by ratio of number of nodes -- Shigeichiro Yamasaki (Kindai Univ.) SITE2017-54 |
The purpose of this research is to show that the full node operator of the P2P type system in the block chain can also b... [more] |
SITE2017-54 pp.1-4 |
SWIM |
2017-12-02 14:45 |
Tokyo |
Tokyo University of Science, Kagurazaka Campus, Fujimi Building |
SWIM2017-20 |
The technology of the autonomous and connected car will be advancing with the functional implementation of Intelligent T... [more] |
SWIM2017-20 pp.7-12 |
SC |
2017-11-02 13:50 |
Kyoto |
Kyoto University (Design Innovation Center) |
On the Viewpoint and Approach of Service Design in the IoT Era
-- Bridging Service System Management and Open Innovation -- Shinji Kikuchi (UoA), Shigeru Hosono (TMU) SC2017-27 |
So far, information system architecture has been developed including various concepts such as open downsizing, B to B an... [more] |
SC2017-27 pp.25-32 |
NS, IN (Joint) |
2013-03-08 10:30 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Reliable Micro Advertisement System for IP Nodes Enabled by Using the DNS Hiroshi Kitamura (NEC/UEC), Shingo Ata (Osaka City Univ.), Masayuki Murata (Osaka Univ.) IN2012-181 |
If there is a system that can show information of each IP communication node and its users will which types of communica... [more] |
IN2012-181 pp.161-166 |
IA, SITE, IPSJ-IOT [detail] |
2012-03-15 14:45 |
Hokkaido |
Hokkaido Univ. |
Desired management method of the domain names from the viewpoint of the self governance in the Internet Yuna Fujita, Yukio Hiramatsu (OIT) SITE2011-37 IA2011-87 |
Internet systems haves been managed and operated based on self-governance in general. Domain name system is one of such ... [more] |
SITE2011-37 IA2011-87 pp.89-94 |
SITE |
2010-10-15 13:50 |
Tokyo |
Nihon Univ. (Surugadai) |
Smart Grid and Privacy
-- Examination of Privacy Impact Assessment -- Hideyuki Fujii (NTT Data), Kensuke Yamaguchi (Univ. of Tokyo) SITE2010-40 |
This paper focus on the problem of privacy in Smart Grid and introduce Privacy Impact Assessment (PIA) approach to solve... [more] |
SITE2010-40 pp.35-40 |
AI, SC |
2010-08-23 16:25 |
Tokyo |
NII |
Accountability Computing Michiharu Kudo (IBM) AI2010-21 |
In globally operated companies, service efficiency and business integrity are getting more and more important. In this p... [more] |
AI2010-21 pp.65-70 |
SWIM |
2009-09-11 14:40 |
Tokyo |
|
SaaS Business Model from User-based View Hiroshi Takahashi (Miyagi Univ.) SWIM2009-6 |
Many news about SaaS and Cloud computing show these aspects from the technology side. However, decision to use SaaS and ... [more] |
SWIM2009-6 pp.7-12 |
ICM |
2009-07-10 09:15 |
Yamagata |
|
Taking preventive measures against the licensing violation in the communication system development with open source software Yuko Hamano, Hiroshi Maeda, Yasuhiko Takeda, Minoru Kato (NTT COMWARE) ICM2009-20 |
The system development with adopting open source software has recently been on the marked increase in a lot of companies... [more] |
ICM2009-20 pp.39-44 |
NC |
2007-10-18 16:20 |
Miyagi |
Tohoku University |
[Invited Talk]
Ethics and Governance of Brain-Machine Interface
-- Current and Future Visions in Japan and US -- Tamami Fukushi (JST), Osamu Sakura (JST/Univ of Tokyo) NC2007-44 |
Neuroscience research has been developed by basic biology, physiology as well as clinical observations/experiences. In r... [more] |
NC2007-44 pp.59-62 |
DE |
2007-07-02 13:55 |
Miyagi |
Akiu hot springs (Sendai) |
A Role Distribution Method for RBAC and its Implementation to Smart Card Management Seiichi Kondo (Mitsubishi Electric Corp./Kyoto Univ.), Mizuho Iwaihara, Masatoshi Yoshikawa (Kyoto Univ.), Takashi Komiya, Toshihisa Onuma, Koichi Yamada (Mitsubishi Electric Corp.) DE2007-23 |
Role-Bases Access Control has emerged as an implementation model for
users and access contol administration in enterpri... [more] |
DE2007-23 pp.7-12 |