{"created":"2023-05-15T14:05:42.541742+00:00","id":478,"links":{},"metadata":{"_buckets":{"deposit":"8374c0a8-6237-460a-8341-47ef460c56b9"},"_deposit":{"created_by":15,"id":"478","owners":[15],"pid":{"revision_id":0,"type":"depid","value":"478"},"status":"published"},"_oai":{"id":"oai:dwcla.repo.nii.ac.jp:00000478","sets":["17:18","185:211"]},"author_link":["1502","1055"],"item_10002_alternative_title_1":{"attribute_name":"別タイトル","attribute_value_mlt":[{"subitem_alternative_title":"IT security investment and real options"}]},"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2004-12-25","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"117","bibliographicPageStart":"107","bibliographicVolumeNumber":"55","bibliographic_titles":[{"bibliographic_title":"同志社女子大學學術研究年報"},{"bibliographic_title":"Doshisha Women's College of Liberal Arts annual reports of studies","bibliographic_titleLang":"en"}]}]},"item_10002_description_19":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_10002_description_35":{"attribute_name":"ID","attribute_value_mlt":[{"subitem_description":"AN0016561X-20041225-107","subitem_description_type":"Other"}]},"item_10002_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":" How much should a company invest money into IT security investments? IT Security investments are among those where proper evaluations are difficult. Today some scholars and consulting firms suggest Security ROI, modification of ROI which involves insurance theory. However IT security insurance has not yet spread so much and it is not easy to adapt such process for general companies.\n We introduce real options, which is an effective means to evaluate uncertainty and compatible with insurance theories. Basically a purchase of insurance is buying of put options. Firstly we consider the critical point to apply real options to IT securities. Secondly we practically recognize and evaluate options value through a case study on network security. We use risk analysis and Balanced Scorecard to evaluate the values precisely.","subitem_description_type":"Abstract"}]},"item_10002_description_6":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"論文 (Article)","subitem_description_type":"Other"}]},"item_10002_identifier_registration":{"attribute_name":"ID登録","attribute_value_mlt":[{"subitem_identifier_reg_text":"10.15020/00000471","subitem_identifier_reg_type":"JaLC"}]},"item_10002_link_30":{"attribute_name":"著者 外部リンク","attribute_value_mlt":[{"subitem_link_text":"同志社女子大学研究者データベース - 加藤敦","subitem_link_url":"http://research-db.dwc.doshisha.ac.jp/rd/html/japanese/researchersHtml/2272/2272_Researcher.html"}]},"item_10002_publisher_32":{"attribute_name":"出版地","attribute_value_mlt":[{"subitem_publisher":"京都"}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"同志社女子大学学術研究推進センター"}]},"item_10002_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN0016561X","subitem_source_identifier_type":"NCID"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"04180038","subitem_source_identifier_type":"ISSN"}]},"item_10002_text_27":{"attribute_name":"著者 所属","attribute_value_mlt":[{"subitem_text_value":"同志社女子大学現代社会学部社会システム学科"}]},"item_10002_text_28":{"attribute_name":"著者所属(翻訳)","attribute_value_mlt":[{"subitem_text_value":"Doshisha Women's College of Liberal Arts, Faculty of Contemporary Social Studies, Department of Social System Studies"}]},"item_10002_text_29":{"attribute_name":"著者 役割","attribute_value_mlt":[{"subitem_text_value":"Author"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"加藤, 敦"},{"creatorName":"カトウ, アツシ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{"nameIdentifier":"1055","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"1000000329963","nameIdentifierScheme":"CiNii ID","nameIdentifierURI":"http://ci.nii.ac.jp/nrid/1000000329963"},{"nameIdentifier":"00329963","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://nrid.nii.ac.jp/ja/nrid/1000000329963/"}]},{"creatorNames":[{"creatorName":"KATO, Atsushi","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"1502","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"1000000329963","nameIdentifierScheme":"CiNii ID","nameIdentifierURI":"http://ci.nii.ac.jp/nrid/1000000329963"},{"nameIdentifier":"00329963","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://nrid.nii.ac.jp/ja/nrid/1000000329963/"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2015-08-03"}],"displaytype":"detail","filename":"AN0016561X-20041225-107.pdf","filesize":[{"value":"1.2 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"AN0016561X-20041225-107.pdf","url":"https://dwcla.repo.nii.ac.jp/record/478/files/AN0016561X-20041225-107.pdf"},"version_id":"7504df2e-1311-4b68-a8eb-2f65dfea8f38"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"ITセキュリティ投資とリアルオプション","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ITセキュリティ投資とリアルオプション"}]},"item_type_id":"10002","owner":"15","path":["18","211"],"pubdate":{"attribute_name":"公開日","attribute_value":"2004-12-25"},"publish_date":"2004-12-25","publish_status":"0","recid":"478","relation_version_is_last":true,"title":["ITセキュリティ投資とリアルオプション"],"weko_creator_id":"15","weko_shared_id":15},"updated":"2023-05-15T14:57:27.896230+00:00"}