2000年2月号抄録

prev10s.gif


Special feature : Information Services & Security. Security Policy : Practical Measures  

Mamo-ru, UMEMURA (Network SI Division, NEC Informatec Systems, Ltd. (2-1, Sakado 3-chome, Takatsu-ku, Kawasaki-shi, Kanagawa 213-0012))
Abstract : The Internet is a very useful and convenient infrastructure for every organization, but it's also true, that very many threats lies hidden in it. As many organizations are suffered from the intruders every day, they should clearly publish their own Network Security Measures. The measures should be distributed to all of the clients, and let them know the Intranet security level depends on the level of individual client.  
Keywords : The Internet / Network Security / Security Policy / Intranet / Security Hole / Intrusion / Unauthorized Access

Special feature : Information Services & Security. Present state of the unauthorized access and JPCERT/CC

Yasuko WATANABE (Japan Computer Emergency Response Team/Coordination Center)
Abstract : The unjust access is one of the security troubles in the internet environment. As a correspondence organization of the unauthorized access on sites in Japan, JPCERT/CC (Japan Computer Emergency Response Team/Coordination Center) started the activity from October, 1996. In this paper, the following were described : Activity condition of JPCERT/CC and unauthorized access offer information accepted as a report.  
Keywords : JPCERT/CC / unauthorized access / internet security / CSIRT (incident correspondence team)

Special feature : Information Services & Security. Security of public machines in a library

Yasuki KANEKO (Mita Media Center, Keio University)
Abstract : It has become essential service for library services to use computers. The spec of computers are getting so high, and we can use them for many porposes. As for public machines, however, a configration which is fit for someone may be less convenience for other person. It is very important for administrators to development a security policy to keep same environment. There are many purpose of public machines, and there are many security policies each of them. In this article, the security policy problems in case of an library are discussed.  
Keywords : public machine / OPAC / security policy / network security / CD-ROM / utilized database

Special feature : Information Services & Security. Integrated library system and it's security,

Kiyoto GOUBA (Ritsumeikan University Media Resource Center)
Abstract : The remarkable growth of the Internet and the World Wide Web has accelerates the growth of Digital Library. University libraries have faced to the issue to provide an attractive Digital Library to the users. On the other hand, it is coming more and more important to design a firm security system. I want to show you a general idea of our new library system and it's security system.
Keywords : Digital Library / Security / Internet / Networking / Firewall / Database  

Special feature : Information Services & Security, Late Night in an Academic Library : Issues, Concerns, Planning,

Kazuko MATSUMOTO (Keio University Mita Media Center
Abstract : In 1996, the Miami University Libraries, Oxford, Ohio, expanded their opening hours during the second half of the semester to meet the needs of the students for a late night quiet study facility. The closing time was extended from midnight to 2 a.m. Library staff had many reservations, chiefly related to concerns about the safety of library staff and users. Describes how the Access Services Department, working in conjunction with the Department of Public Safety, planned and implemented this change in opening hours.  
Keywords : University Libraries / security / Night-use / opening hours / staff / staffing / safety / services / Miami University, Ohio

INFOSTA Copyright Seminar : Keynote : The present status and problems of copyright deal in database services

Isao MIURA
Abstract : There are two aspects when users receive database services : one is related to legal regulations, and other to a license. I provide some examples to show the actual deal of licenses with the royality fees, while describing how these problems are connected with the development of database industry. Regarding the market size of the database industry, there are gaps between Japan and the U. S. and European countries, stemming from the ways of business practices peculiar to Japan through which licenses are traded. In addition, the problems involved in the matter and influences upon users are also discussed.  
Keywords : copyright / database service / lisense / electronic information service / royality / database producer / publisher

Series : How to read statisticsH. Concerned with business activities,

Mutsumi HOSAKA (Keio University Mita Media Center)
Abstract : Brief overviews of the statistics on business activities, such as “Establishment and Enterprise Census", “Financial Statements of Corporation Industry" and “Basic Survey of Business Structure and Activity", are presented with their historical background. Furthermore the definitions of the words in this overview, the sort of statistics on business activities and the recent trend in Japanese ministries is included.  
Keywords : Statistics / Enterprise / Firms / Company / Business Surveys / Business Structure / Business Activities / Business Operation / Establishment and Enterprise Census / Basic Surveys of Business Structure and Activity / Financial Statements of Corporation by Industry