{"created":"2023-05-15T13:48:10.203992+00:00","id":8013,"links":{},"metadata":{"_buckets":{"deposit":"ab40b980-2a91-43ce-9fde-75475ddc0ec7"},"_deposit":{"created_by":1,"id":"8013","owners":[1],"pid":{"revision_id":0,"type":"depid","value":"8013"},"status":"published"},"_oai":{"id":"oai:chuo-u.repo.nii.ac.jp:00008013","sets":["271:426"]},"author_link":["32159","32160"],"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2016-03-30","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"4","bibliographicPageEnd":"80","bibliographicPageStart":"63","bibliographicVolumeNumber":"49","bibliographic_titles":[{"bibliographic_title":"比較法雑誌"}]}]},"item_10002_description_19":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":" ISPであるニフティを例にとり,サイバー犯罪に関するプロバイダの実務と考え方を紹介する。サイバー犯罪の捜査においてプロバイダは加入者の通信の秘密に関する事項については,記録命令付差押許可状により対応し,要請があればログ(通信履歴)を保全するが,ログ保存については義務では無い。また,サイバー犯罪の被害抑止活動としては,児童ポルノのブロッキングが民間の作成するブラックリストに基づきプロバイダにより実施されており,ボットネット対策については,マルウェアに感染した加入者に対してプロバイダが駆除要請をして協力している。これらは,通信の秘密とプライバシー保護に関する「電気通信事業における個人情報保護に関するガイドライン」(総務省)をはじめとする国内の法制度だけではなく,G8や欧州評議会における国際的な政策や法制度に民間が参加又は注視する慎重な議論を経ながらも着実に整理され進んできたものである。新たな施策に踏み込む(又は旧来の施策を拡大する)場合には,通信の秘密やプライバシー,表現の自由への影響等を分析しつつ慎重な議論が望まれるが,事後追跡性の確保や被害拡大の抑止・防止の必要性に係わるファクトをベースとした議論であれば,今後とも,ISPは誠意を持って参加していくであろう。","subitem_description_type":"Abstract"}]},"item_10002_full_name_24":{"attribute_name":"著者別名","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"32160","nameIdentifierScheme":"WEKO"}],"names":[{"name":"MARUHASHI, Toru"}]}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"日本比較法研究所"}]},"item_10002_rights_15":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"この資料の著作権は、資料の著作者または学校法人中央大学に帰属します。著作権法が定める私的利用・引用を超える使用を希望される場合には、掲載誌発行部局へお問い合わせください。"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0010-4116","subitem_source_identifier_type":"ISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"丸橋, 透"},{"creatorName":"マルハシ, トオル","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{"nameIdentifier":"32159","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-04-22"}],"displaytype":"detail","filename":"0010-4116_49_4_63~80.pdf","filesize":[{"value":"1.5 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"本文を見る","url":"https://chuo-u.repo.nii.ac.jp/record/8013/files/0010-4116_49_4_63~80.pdf"},"version_id":"f839ab1a-ef48-4f73-b11c-f148ff1a037d"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"サイバー犯罪","subitem_subject_scheme":"Other"},{"subitem_subject":"サイバー犯罪条約","subitem_subject_scheme":"Other"},{"subitem_subject":"記録命令付差押許可状","subitem_subject_scheme":"Other"},{"subitem_subject":"捜査関係事項照会","subitem_subject_scheme":"Other"},{"subitem_subject":"ログ保全","subitem_subject_scheme":"Other"},{"subitem_subject":"ログ保存","subitem_subject_scheme":"Other"},{"subitem_subject":"サイバーセキュリティ戦略","subitem_subject_scheme":"Other"},{"subitem_subject":"児童ポルノブロッキング","subitem_subject_scheme":"Other"},{"subitem_subject":"ボットネット","subitem_subject_scheme":"Other"},{"subitem_subject":"通信の秘密","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"プロバイダの捜査対応,ログ保存,被害抑止協力の実務と考え方","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"プロバイダの捜査対応,ログ保存,被害抑止協力の実務と考え方"},{"subitem_title":"Practice and legal basis of internet service providers: cybercrime investigation, data retention and prevention","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"1","path":["426"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-07-27"},"publish_date":"2017-07-27","publish_status":"0","recid":"8013","relation_version_is_last":true,"title":["プロバイダの捜査対応,ログ保存,被害抑止協力の実務と考え方"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2023-05-15T18:29:24.846529+00:00"}