{"created":"2023-05-15T14:25:06.074197+00:00","id":798,"links":{},"metadata":{"_buckets":{"deposit":"b1f94f47-b6a6-4b11-b9fc-7047406cd622"},"_deposit":{"created_by":2,"id":"798","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"798"},"status":"published"},"_oai":{"id":"oai:iuk-repo.repo.nii.ac.jp:00000798","sets":["15:16","21:37:94"]},"author_link":["1149","1148"],"item_10_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2016-10-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicPageEnd":"47","bibliographicPageStart":"9","bibliographicVolumeNumber":"57","bibliographic_titles":[{"bibliographic_title":"鹿児島経済論集"}]}]},"item_10_creator_2":{"attribute_name":"著者(ヨミ)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"オクダイラ, アツヤ"}],"nameIdentifiers":[{"nameIdentifier":"1148","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"ナカオ, ヤスシ"}],"nameIdentifiers":[{"nameIdentifier":"1149","nameIdentifierScheme":"WEKO"}]}]},"item_10_description_14":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_10_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"he spreading phenomenon of private information is investigated in the context of spreading phenomena on networks. We simulated spread of private information on scalefree networks and on lattice. The epidemic disease spreading models such as the SIS and the SIR are applied. In our simulation, creation of new information through the interaction between two packs of information are taken into consideration; such new information can propagate on networks. Information creation made the spreading of privacy easier to take place and at a wider range in networks in many calculations, including in the parameter region where the spreading is usually difficult. More strict rules against the leaking of privacy, and/or, technologies will be needed in order to inhibit the spread of private information, when the integration of various information is easy in the era of \"Big Data\". To set time-to-live (TTL) to the private data may be a good method.","subitem_description_type":"Abstract"},{"subitem_description":"プライバシー情報が広がる現象をネットワーク上の拡散現象の文脈で調べた。我々はプライバシー情報の拡散をスケールフリーネットワークと格子の上で計算機実験した。感染症のモデルであるSISとSIRを使用した。計算機実験では、拡散する情報の塊の相互作用で新しい情報が生まれる。それがまた拡散する。情報の生成によって多くの計算で拡散がより簡単に起こりより広く広がった。通常は拡散が困難なパラメーター領域でもそうであった。いろいろな情報の集穣が簡単なこの「ビッグデータ」の時代では、通常よりより厳しい法律や技術がプライバシー情報の広がりを防ぐために必要になる。プライバシーデータに寿命(TTL)を設定して放棄することが一つのやり方かもしれない。","subitem_description_type":"Abstract"}]},"item_10_description_43":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"subitem_description":"論文(Article)","subitem_description_type":"Other"}]},"item_10_publisher_33":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"鹿児島国際大学経済学部学会"}]},"item_10_source_id_7":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"13460226","subitem_source_identifier_type":"ISSN"}]},"item_10_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11479673","subitem_source_identifier_type":"NCID"}]},"item_10_text_15":{"attribute_name":"形態","attribute_value_mlt":[{"subitem_text_value":"1245066 bytes"}]},"item_10_text_44":{"attribute_name":"資源タイプ・ローカル","attribute_value_mlt":[{"subitem_text_value":"紀要論文"}]},"item_10_text_45":{"attribute_name":"資源タイプ・NII","attribute_value_mlt":[{"subitem_text_value":"Departmental Bulletin Paper"}]},"item_10_text_46":{"attribute_name":"資源タイプ・DCMI","attribute_value_mlt":[{"subitem_text_value":"text"}]},"item_10_text_47":{"attribute_name":"資源タイプ・ローカル表示コード","attribute_value_mlt":[{"subitem_text_value":"02"}]},"item_10_version_type_16":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"奥平, 敦也"},{"creatorName":"Okudaira, Atsuya","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"1148","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"中尾, 泰士"},{"creatorName":"Nakao, Yasushi","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"1149","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2018-10-17"}],"displaytype":"detail","filename":"13460226_v57_1_Okudaira.pdf","filesize":[{"value":"1.2 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"13460226_v57_1_Okudaira.pdf","url":"https://iuk-repo.repo.nii.ac.jp/record/798/files/13460226_v57_1_Okudaira.pdf"},"version_id":"1ddb0c36-4a87-43d8-a45d-39b1842b6a7f"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Privacy spreading on networks","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Privacy spreading on networks"}]},"item_type_id":"10","owner":"2","path":["16","94"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-04-20"},"publish_date":"2017-04-20","publish_status":"0","recid":"798","relation_version_is_last":true,"title":["Privacy spreading on networks"],"weko_creator_id":"2","weko_shared_id":2},"updated":"2023-05-15T22:05:16.742363+00:00"}