{"created":"2023-05-15T13:48:05.562098+00:00","id":7910,"links":{},"metadata":{"_buckets":{"deposit":"1e6bfe0d-4cce-4772-adcb-597953d13122"},"_deposit":{"created_by":1,"id":"7910","owners":[1],"pid":{"revision_id":0,"type":"depid","value":"7910"},"status":"published"},"_oai":{"id":"oai:chuo-u.repo.nii.ac.jp:00007910","sets":["273:416"]},"author_link":["31012"],"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2015-09-30","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"168","bibliographicPageStart":"151","bibliographicVolumeNumber":"19","bibliographic_titles":[{"bibliographic_title":"中央大学社会科学研究所年報"}]}]},"item_10002_description_19":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":" In recent years, with the rapid ICT development, cyber assaults through vertual space against individuals, businesses, organizations, or even governments have become increasingly intense and create serious security problems and important damages to them. In extreme cases, these trigger even international conflicts. Cyber attacks are generally treated as a crime, while some countries/region regard them as a war, which is contrary to conventional international laws.\n The report regards traditional warfare as a symmetric threat and a cyber assault including cyber terrorism as a non-symmetric threat and differentiates their attributions. In conclusion, it emphasizes the necessity of further enriching domestic laws and international cooperation as countermeasures.","subitem_description_type":"Abstract"}]},"item_10002_full_name_24":{"attribute_name":"著者別名","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"31012","nameIdentifierScheme":"WEKO"}],"names":[{"name":"SUZUKI, Yoichi"}]}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"中央大学社会科学研究所"}]},"item_10002_rights_15":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"この資料の著作権は、資料の著作者または学校法人中央大学に帰属します。著作権法が定める私的利用・引用を超える使用を希望される場合には、掲載誌発行部局へお問い合わせください。"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1343-2125","subitem_source_identifier_type":"ISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"鈴木, 洋一"},{"creatorName":"スズキ, ヨウイチ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{"nameIdentifier":"31012","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-04-22"}],"displaytype":"detail","filename":"1343-2125~19_151.pdf","filesize":[{"value":"83.4 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"本文を見る","url":"https://chuo-u.repo.nii.ac.jp/record/7910/files/1343-2125~19_151.pdf"},"version_id":"1e99a8a1-c1ad-4d76-b63e-2331b8cff933"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"サイバー攻撃","subitem_subject_scheme":"Other"},{"subitem_subject":"サイバーテロ","subitem_subject_scheme":"Other"},{"subitem_subject":"サイバー戦争","subitem_subject_scheme":"Other"},{"subitem_subject":"新しい戦争","subitem_subject_scheme":"Other"},{"subitem_subject":"第5の領域","subitem_subject_scheme":"Other"},{"subitem_subject":"究極の兵器","subitem_subject_scheme":"Other"},{"subitem_subject":"サイバー犯罪条約","subitem_subject_scheme":"Other"},{"subitem_subject":"サイバーセキュリティ戦略","subitem_subject_scheme":"Other"},{"subitem_subject":"タリンマニュアル","subitem_subject_scheme":"Other"},{"subitem_subject":"非国家主体","subitem_subject_scheme":"Other"},{"subitem_subject":"非対称脅威","subitem_subject_scheme":"Other"},{"subitem_subject":"集団的自衛権","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"非対称脅威としてのサイバー攻撃と国内法整備および国際連携による対応の必要性","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"非対称脅威としてのサイバー攻撃と国内法整備および国際連携による対応の必要性"},{"subitem_title":"Cyber Assaults as Non-Symmetric Threats and the Necessity of Further Domestic Law Preparation and International Cooperation","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"1","path":["416"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-11-04"},"publish_date":"2016-11-04","publish_status":"0","recid":"7910","relation_version_is_last":true,"title":["非対称脅威としてのサイバー攻撃と国内法整備および国際連携による対応の必要性"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2023-05-15T18:32:33.982822+00:00"}