{"created":"2023-05-15T16:37:17.960562+00:00","id":10646,"links":{},"metadata":{"_buckets":{"deposit":"f1afa3ed-457c-4a1a-b920-38d5b3666791"},"_deposit":{"created_by":2,"id":"10646","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"10646"},"status":"published"},"_oai":{"id":"oai:nagasaki-u.repo.nii.ac.jp:00010646","sets":["82:87:88:830"]},"author_link":["42078","42077"],"item_3_alternative_title_19":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"The Danger of the Passive Attack on the Internet"}]},"item_3_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2000-12-25","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicPageEnd":"144","bibliographicPageStart":"123","bibliographicVolumeNumber":"80","bibliographic_titles":[{"bibliographic_title":"経営と経済"},{"bibliographic_title":"Journal of Business and Economics","bibliographic_titleLang":"en"}]}]},"item_3_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"The Internet is on the way to become a common infrastructure for everyone. But, it is hard to catch up the current situation for both applications and users. Many developers of applications, which depend on the Internet, like e-mail clients, did not consider about to protecting one's personal information. In this situation, scoundrels will attack people by means of to be famous, to show their skills, just for fun, and so on. There was no problem if users were doing a suitable defense countermeasure. But, now, network applications with poor consideration by their developers, users must consider about new style of attack \"passive attack\". In this paper, the author classifies the types of attacks observed on the Internet, and explains the current security levels on some network client applications as a practice.","subitem_description_type":"Abstract"}]},"item_3_description_64":{"attribute_name":"引用","attribute_value_mlt":[{"subitem_description":"経営と経済, 80(3), pp.123-144; 2000","subitem_description_type":"Other"}]},"item_3_full_name_3":{"attribute_name":"著者別名","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"42078","nameIdentifierScheme":"WEKO"}],"names":[{"name":"Suzuki, Hitoshi"}]}]},"item_3_publisher_33":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"長崎大学経済学会"}]},"item_3_relation_29":{"attribute_name":"論文ID(NAID)","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"110000181500","subitem_relation_type_select":"NAID"}}]},"item_3_source_id_10":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00069150","subitem_source_identifier_type":"NCID"}]},"item_3_source_id_7":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"02869101","subitem_source_identifier_type":"ISSN"}]},"item_3_text_62":{"attribute_name":"sortkey","attribute_value_mlt":[{"subitem_text_value":"6"}]},"item_3_version_type_16":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"鈴木, 斉"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-12-22"}],"displaytype":"detail","filename":"keieikeizai80_03_06.pdf","filesize":[{"value":"890.3 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"keieikeizai80_03_06.pdf","url":"https://nagasaki-u.repo.nii.ac.jp/record/10646/files/keieikeizai80_03_06.pdf"},"version_id":"3ce3c500-a9f4-4faf-9a8f-ff9341f3217f"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"受動的攻撃の危険性と防衛対策","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"受動的攻撃の危険性と防衛対策"}]},"item_type_id":"3","owner":"2","path":["830"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-09-06"},"publish_date":"2012-09-06","publish_status":"0","recid":"10646","relation_version_is_last":true,"title":["受動的攻撃の危険性と防衛対策"],"weko_creator_id":"2","weko_shared_id":2},"updated":"2023-05-15T18:28:16.703229+00:00"}