{"created":"2023-05-15T12:25:24.074958+00:00","id":17835,"links":{},"metadata":{"_buckets":{"deposit":"ceb935f6-3cd6-4dd7-b1b7-b1675696df06"},"_deposit":{"created_by":10,"id":"17835","owners":[10],"pid":{"revision_id":0,"type":"depid","value":"17835"},"status":"published"},"_oai":{"id":"oai:kansai-u.repo.nii.ac.jp:00017835","sets":["63:67"]},"author_link":["42848","42854","42851","42849","42852","42850","42855","36101","36105","42853"],"item_12_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2020","bibliographicIssueDateType":"Issued"},"bibliographic_titles":[{}]}]},"item_12_description_5":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"目次\n1.研究の目的と研究成果の概要\n2.研究成果\n(1) シンポジウム\n(2) 論文\n・第一論文 髙野一彦「新しい法制度に対応したコンプライアンス・プログラムの定立を」衆知2017.1-2 号、PHP研究所、2016年、66~69頁\n・第二論文 髙野一彦 「情報危機管理とビッグデータ : わが国の個人情報保護法制への提言と企業コンプライアンス」、関西大学社会安全学部編『リスク管理のための社会安全学』ミネルヴァ書房、2015年、21~46頁\n・第三論文 新保史生「改正個人情報保護法の論点」憲法学会、憲法研究48号、2016年、29-55頁\n・第四論文 河野和宏「大学生に対する違法動画視聴の防止対策に関する一検討 : 不正のトライアングル理論と状況的犯罪予防論からの検討」電子情報通信学会技術研究報告、SSS2018-15、2018年9~12頁\n・第五論文 新井健介・河野和宏・馬場口登「推薦対象の属性から構築した階層構造を用いたTF-IDF法による匿名化処理」電子情報通信学会技術研究報告vol. 115、no. 479、EMM2015-81、2016年、31~36頁\n・第六論文 新井健介・河野和宏・馬場口登「TF-IDF法によるユーザへの情報推薦のための匿名化処理」電子情報通信学会技術研究報告vol. 115、no. 38、IT2015-10、EMM2015-10、2015年、51~56頁\n3.謝辞","subitem_description_type":"Other"}]},"item_12_full_name_3":{"attribute_name":"著者別名","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"42851","nameIdentifierScheme":"WEKO"}],"names":[{"name":"Takano, Kazuhiko"}]},{"nameIdentifiers":[{"nameIdentifier":"42852","nameIdentifierScheme":"WEKO"}],"names":[{"name":"Shimpo, Fumio"}]},{"nameIdentifiers":[{"nameIdentifier":"42853","nameIdentifierScheme":"WEKO"}],"names":[{"name":"Kono, Kazuhiro"}]},{"nameIdentifiers":[{"nameIdentifier":"42854","nameIdentifierScheme":"WEKO"}],"names":[{"name":"Arai, Kensuke"}]},{"nameIdentifiers":[{"nameIdentifier":"42855","nameIdentifierScheme":"WEKO"}],"names":[{"name":"Babaguchi, Noboru"}]}]},"item_12_rights_13":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"第一論文 PHP研究所の許諾を得て公開しています。"},{"subitem_rights":"第二論文 ミネルヴァ書房の許諾を得て公開しています。"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"髙野, 一彦"}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"新保, 史生"}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"河野, 和宏"}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"新井, 健介"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"馬場口, 登"}],"nameIdentifiers":[{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-12-01"}],"displaytype":"detail","filename":"KU-0020-20180000-00.pdf","filesize":[{"value":"6.8 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"研究組織、目次、研究の目的と研究成果の概要、研究成果、謝辞","url":"https://kansai-u.repo.nii.ac.jp/record/17835/files/KU-0020-20180000-00.pdf"},"version_id":"192026bf-0ba7-42f0-a4d3-f9880fbe0b5c"},{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-12-01"}],"displaytype":"detail","filename":"KU-0020-20180000-01.pdf","filesize":[{"value":"1.1 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"新しい法制度に対応したコンプライアンス・プログラムの定立を","url":"https://kansai-u.repo.nii.ac.jp/record/17835/files/KU-0020-20180000-01.pdf"},"version_id":"e57f07de-6f65-4b15-8c8f-43f5bae4243a"},{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-12-01"}],"displaytype":"detail","filename":"KU-0020-20180000-02.pdf","filesize":[{"value":"800.2 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"情報危機管理とビッグデータ : わが国の個人情報保護法制への提言と企業コンプライアンス","url":"https://kansai-u.repo.nii.ac.jp/record/17835/files/KU-0020-20180000-02.pdf"},"version_id":"161ca23b-77e2-4d20-ad92-bd1516900dbd"},{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-12-01"}],"displaytype":"detail","filename":"KU-0020-20180000-03.pdf","filesize":[{"value":"884.6 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"改正個人情報保護法の論点","url":"https://kansai-u.repo.nii.ac.jp/record/17835/files/KU-0020-20180000-03.pdf"},"version_id":"8a6131fd-6787-45d6-80a3-6e4e54246928"},{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-12-01"}],"displaytype":"detail","filename":"KU-0020-20180000-04.pdf","filesize":[{"value":"1.0 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"大学生に対する違法動画視聴の防止対策に関する一検討 : 不正のトライアングル理論と状況的犯罪予防論からの検討","url":"https://kansai-u.repo.nii.ac.jp/record/17835/files/KU-0020-20180000-04.pdf"},"version_id":"40593b47-030d-4992-b6fb-bb1fae836e16"},{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-12-01"}],"displaytype":"detail","filename":"KU-0020-20180000-05.pdf","filesize":[{"value":"2.1 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"推薦対象の属性から構築した階層構造を用いたTF-IDF法による匿名化処理","url":"https://kansai-u.repo.nii.ac.jp/record/17835/files/KU-0020-20180000-05.pdf"},"version_id":"0bc9bc3f-9d02-44fa-b312-182be1407290"},{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-12-01"}],"displaytype":"detail","filename":"KU-0020-20180000-06.pdf","filesize":[{"value":"1.2 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"TF-IDF法によるユーザへの情報推薦のための匿名化処理","url":"https://kansai-u.repo.nii.ac.jp/record/17835/files/KU-0020-20180000-06.pdf"},"version_id":"ed16b6d8-0827-4ecb-b54c-bccd6bd4b40e"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"個人情報保護法","subitem_subject_scheme":"Other"},{"subitem_subject":"EU一般データ保護規則","subitem_subject_scheme":"Other"},{"subitem_subject":"データ保護の十分性","subitem_subject_scheme":"Other"},{"subitem_subject":"匿名化","subitem_subject_scheme":"Other"},{"subitem_subject":"コンプライアンス","subitem_subject_scheme":"Other"},{"subitem_subject":"コーポレートガバナンス","subitem_subject_scheme":"Other"},{"subitem_subject":"ビッグデータ","subitem_subject_scheme":"Other"},{"subitem_subject":"十分性","subitem_subject_scheme":"Other"},{"subitem_subject":"第三者提供","subitem_subject_scheme":"Other"},{"subitem_subject":"オプトアウト","subitem_subject_scheme":"Other"},{"subitem_subject":"トレーサビリティー","subitem_subject_scheme":"Other"},{"subitem_subject":"個人情報データベース等提供罪","subitem_subject_scheme":"Other"},{"subitem_subject":"著作権侵害","subitem_subject_scheme":"Other"},{"subitem_subject":"リーチサイト","subitem_subject_scheme":"Other"},{"subitem_subject":"不正のトライアングル理論","subitem_subject_scheme":"Other"},{"subitem_subject":"状況的犯罪予防論","subitem_subject_scheme":"Other"},{"subitem_subject":"k-匿名化","subitem_subject_scheme":"Other"},{"subitem_subject":"TF-IDF法","subitem_subject_scheme":"Other"},{"subitem_subject":"Mondrianアルゴリズム","subitem_subject_scheme":"Other"},{"subitem_subject":"情報推薦","subitem_subject_scheme":"Other"},{"subitem_subject":"プライバシー保護","subitem_subject_scheme":"Other"},{"subitem_subject":"GDPR","subitem_subject_scheme":"Other"},{"subitem_subject":"FCPA","subitem_subject_scheme":"Other"},{"subitem_subject":"Copyright infringement","subitem_subject_scheme":"Other"},{"subitem_subject":"Reach site","subitem_subject_scheme":"Other"},{"subitem_subject":"Fraud triangle theory","subitem_subject_scheme":"Other"},{"subitem_subject":"Situational crime prevention theory","subitem_subject_scheme":"Other"},{"subitem_subject":"CF-Tree","subitem_subject_scheme":"Other"},{"subitem_subject":"Normalized Web Distance","subitem_subject_scheme":"Other"},{"subitem_subject":"k-Anonymization","subitem_subject_scheme":"Other"},{"subitem_subject":"TF-IDF Method","subitem_subject_scheme":"Other"},{"subitem_subject":"Mondrian Algorithm","subitem_subject_scheme":"Other"},{"subitem_subject":"Information Recommendation","subitem_subject_scheme":"Other"},{"subitem_subject":"Privacy Protection","subitem_subject_scheme":"Other"},{"subitem_subject":"関西大学","subitem_subject_scheme":"Other"},{"subitem_subject":"Kansai University","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"research report","resourceuri":"http://purl.org/coar/resource_type/c_18ws"}]},"item_title":"2014~2015年度 教育研究高度化促進費 研究成果報告書「わが国の新たな情報法制の定立のための比較法研究と理解促進の取組」","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"2014~2015年度 教育研究高度化促進費 研究成果報告書「わが国の新たな情報法制の定立のための比較法研究と理解促進の取組」"}]},"item_type_id":"12","owner":"10","path":["67"],"pubdate":{"attribute_name":"公開日","attribute_value":"2020-12-01"},"publish_date":"2020-12-01","publish_status":"0","recid":"17835","relation_version_is_last":true,"title":["2014~2015年度 教育研究高度化促進費 研究成果報告書「わが国の新たな情報法制の定立のための比較法研究と理解促進の取組」"],"weko_creator_id":"10","weko_shared_id":-1},"updated":"2023-05-15T21:20:45.074127+00:00"}