Study at TCU


Name SEKI Yoshiaki
Official Title Professor
Affiliation Information Systems, Informatics
Profile We, Seki Laboratory, are working on daily research with the aim of building information sharing systems that take security into consideration by closely linking "Information sharing services" and "Information security." The information and communication environments continue to change due to the diverse developments and expansion of computer networks and the emergence of various threats that accompany them. In such a period of change, information sharing services aimed at improving the efficiency of social activities and information security to protect information assets are inextricably linked.
Research Field(Keyword & Summary)
  1. (1) Intellectual collaborative work support technology

    Create computer-based systems that support groups of users who work for a common job or purpose and provide a shared work environment interface.

  2. (2) Knowledge sharing network technology

    We propose a service that allows users to share their knowledge by utilizing SNS that configures a social network on the Internet.

  3. (3) Information security behavior support technology

    We aim for aggressive security in which users correctly understand the risks of computer networks and always be aware of the threats.

Representative Papers
  1. (1) A Method for Smartphone Theft Prevention when the Owner Dozes off IEICE Transactions on Information and Systems Sep. 2019 Vol.E102-D No.9
  2. (2) The Influence of Friend Relationships on Information Security Behavior—Investigation on Passwords Sharing among University Students D - Abstracts of IEICE TRANSACTIONS on Information and Systems (Japanese Edition) Oct. 2018 Vol.J101-D No.10
  3. (3) Risk Assessment for PrivacyProtection of Information Literacy Beginners in Big Data Era The 20th International Conference on Network-Based InformationSystems (NBiS-2017), Advances in Network-Based InformationSystems, The 11 International Workshop on Advanced Distributedand Parallel Network Applications (ADPNA-2017) Aug. 2017
  4. (4) Risk Assessment with Consideration for Indirect Stakeholder in SNS 10th International Conference on Project Management (ProMAC2016) Nov. 2016
  5. (5) Risk Assessment Quantification of Social-media Utilization in Enterprise 15th IEEE/ACIS International Conference on Computer and Information Science (ICIS2016) Jun. 2016
  6. (6) Risk Assessment of Social-media Utilization in an Enterprise 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2015) Jun. 2015
Grant-in-Aid for Scientific Research Support: Japan Society for Promotion of Science (JSPS)
Research Grants/Projects including subsidies, donations, grants, etc. KAKEN 16K00194: Authentication misuse prevention method for application cooperation when using SNS
In this research, we worked on user authentication from the viewpoint of application users. As a concrete example, we investigated and analyzed the influence of friendship on university students' awareness of password sharing, and constructed a model. We also proposed a user authentication method using wearable devices.
Recruitment of research assistant(s) No
Affiliated academic society (Membership type) IEEE: The Institute of Electrical and Electronics Engineers (Member)
ACM: Association for Computing Machinery (Professional Member)
IEICE: The Institute of Electronics, Information and Communication Engineers (Senior member)
IPSJ: Information Processing Society of Japan (Member)
SSI: The Society of Socio-Informatics (Meber)
Education Field (Undergraduate level) Information Systems, Information Security
Education Field (Graduate level) Information Security, Network Security