Initialising ...
Initialising ...
Initialising ...
Initialising ...
Initialising ...
Initialising ...
Initialising ...
Kusano, Kanya*; Ichimoto, Kiyoshi*; Ishii, Mamoru*; Miyoshi, Yoshizumi*; Yoden, Shigeo*; Akiyoshi, Hideharu*; Asai, Ayumi*; Ebihara, Yusuke*; Fujiwara, Hitoshi*; Goto, Tadanori*; et al.
Earth, Planets and Space (Internet), 73(1), p.159_1 - 159_29, 2021/12
Times Cited Count:6 Percentile:51.19(Geosciences, Multidisciplinary)The PSTEP is a nationwide research collaboration in Japan and was conducted from April 2015 to March 2020, supported by a Grant-in-Aid for Scientific Research on Innovative Areas from the Ministry of Education, Culture, Sports, Science and Technology of Japan. It has made a significant progress in space weather research and operational forecasts, publishing over 500 refereed journal papers and organizing four international symposiums, various workshops and seminars, and summer school for graduate students at Rikubetsu in 2017. This paper is a summary report of the PSTEP and describes the major research achievements it produced.
Yashiro, Shigeo; Shoji, Makoto; Ueno, Tokio; Ueno, Asuka
JAEA-Testing 2019-001, 28 Pages, 2019/06
Center for Computational Science & e-Systems of Japan Atomic Energy Agency, provides an environment for using PCs with thin client systems to our organization's officers, operation management organization, common business organization, base management department, and offices for each research and development department. Supports the efficient and smooth implementation of our decision-making, core operations and related tasks. This report is the characteristics and construction policy (basic requirements) of the thin client system and hardware newly obtained in the subsequent operation, which were arranged and examined on the introduction of the existing thin client system updated in October 2017. It is a summary of the results, findings, etc. of the occupied thin client system.
Ueno, Asuka; Yashiro, Shigeo; Uno, Kiichiro*; Aoki, Kazuhisa
JAEA-Review 2018-006, 115 Pages, 2018/06
Cyberattacks causing serious damage are ongoing as seen in the incidents such as personal information leakage from the Japan Pension Service by unauthorized access in 2015, and a massive ransomware infection across the world in 2017. Recently, threats in the cyberspace has been growing, such as sending an order form, shipping notification, while pretending a real company to persuade recipient to open an attached file with embedded unforeseen malware, or to click on a link in the email to malicious website. In these circumstances, the information security countermeasures are important issues at the JAEA. CCSE therefore is striving to promote proactive information security countermeasures with the three aspects of (1) Maintenance of the information security regulations, (2) Countermeasures with information security products having a new protection technology, (3) Implementation of information security education and training for the employees to maintain and improve their ability to respond. This report is a summary of the contents of the information security education by e-learning.
Yashiro, Shigeo; Aoki, Kazuhisa; Sato, Tomohiko; Tanji, Kazuhiro
JAEA-Review 2013-038, 123 Pages, 2014/01
With the rapid progress of the utilization of Information Technology (IT), IT infrastructure (network environment and information system) became crucial as a lifeline for promoting business. At the same time, changes in the circumstances surrounding the IT infrastructure globalize the threat of cyber attacks and increase the risk of the information security such as unlawful access to an information system, viral infection, an alteration of a website, disclosure of subtlety information, destruction of an information system and so on. Information security measure is an important issue in Japan Atomic Energy Agency (JAEA). In order to protect the information property of JAEA from the threat, Center for Computational Science & e-Systems (CCSE) has been taking triadic measures for information security: (1) to lay down a set of information security rules, (2) to introduce security equipments to backbone network and (3) to provide information security education. This report is a summary of the contents of the information security education by e-learning.