The 2015 Information Environment Manual for Students

The 2015 Information Environment Manual for Students
The 2015
Information Environment Manual
for Students
ver.1.0E
Institute for Information Management and Communication, Kyoto University
Institute for Information Management and Communication, Kyoto University
Table of Contents for the 2015 Information Environment Manual for Students
1. Introduction to the Information Environment of Kyoto University … ……………………… 2
1.1. Notations… …………………………………………………………………………………………………………………………………………………………… 2
1.2. Information Related Services Provided by Kyoto University……………………………………………………………………………………………………… 3
1.3. Information Related Services Websites……………………………………………………………………………………………………………………………… 3
2. Acquiring and Using University Authentication IDs (ECS-IDs)… ……………………………… 4
2.1. About ECS-IDs … ……………………………………………………………………………………………………………………………………………………… 4
2.2. Procedure for Acquiring an ECS-ID … ……………………………………………………………………………………………………………………………… 4
2.3. Activating ECS-ID… …………………………………………………………………………………………………………………………………………………… 4
2.4. IT Services using ECS-ID… …………………………………………………………………………………………………………………………………………… 5
2.5. Managing your ECS-ID………………………………………………………………………………………………………………………………………………… 5
2.6. Remark to use ECS-ID… ……………………………………………………………………………………………………………………………………………… 5
3. Safe and Appropriate Use of the Information Systems… ……………………………………… 6
3.1. Appropriate Management of ECS-IDs and Passwords… ………………………………………………………………………………………………………… 6
3.2. Changing Your Password……………………………………………………………………………………………………………………………………………… 6
3.3. Points to Keep in Mind When Using the Network… ……………………………………………………………………………………………………………… 7
3.4. Information Security e-Learning……………………………………………………………………………………………………………………………………… 8
4. Computer Terminal Services………………………………………………………………………… 9
4.1. Computer Terminal Services… ……………………………………………………………………………………………………………………………………… 9
4.2. Starting Up Computer Terminals… ……………………………………………………………………………………………………………………………… 10
4.3. Shutting Down Computer Terminals……………………………………………………………………………………………………………………………… 11
4.4. What Can We Do Using Windows 7?… ………………………………………………………………………………………………………………………… 12
4.5. What Can We Do Using Linux?… ………………………………………………………………………………………………………………………………… 18
4.6. Using USB Devices… ……………………………………………………………………………………………………………………………………………… 22
4.7. Requests to Users… ………………………………………………………………………………………………………………………………………………… 23
5. The Computer-Assisted Language Learning (CALL) System… ………………………………… 24
5.1. Using Computer-Assisted Language Learning (CALL) System… ……………………………………………………………………………………………… 24
5.2. Using CALL Autonomous Learning Terminals…………………………………………………………………………………………………………………… 26
6. Connecting Computers to the University Network… …………………………………………… 28
6.1. Using University Wireless LANs… …………………………………………………………………………………………………………………………………
6.1.1. Setting for Windows 8… ………………………………………………………………………………………………………………………………………
6.1.2. Setting for Mac OS X……………………………………………………………………………………………………………………………………………
6.1.3. Setting for iPhone/iPad…………………………………………………………………………………………………………………………………………
28
29
33
36
6.1.4. About using libraries e-journals… …………………………………………………………………………………………………………………………… 38
6.1.5. List of public wireless LANs Access Points…………………………………………………………………………………………………………………… 38
6.2. Using network from outside of the University…………………………………………………………………………………………………………………… 38
7. Logging In Using the Common Portal for All Students… ……………………………………… 39
7.1. About the Common Portal for All Students……………………………………………………………………………………………………………………… 39
8. The Kyoto University Mail for Students and Researchers………………………………………… 40
8.1. Sign in and Sign out………………………………………………………………………………………………………………………………………………… 40
8.2. Reading E-mails……………………………………………………………………………………………………………………………………………………… 41
8.3. Writing a new E-mail… …………………………………………………………………………………………………………………………………………… 41
8.4. Forwarding E-mails automatically………………………………………………………………………………………………………………………………… 42
8.5. Adding Contacts… ………………………………………………………………………………………………………………………………………………… 43
8.6. Changing your language setting… ……………………………………………………………………………………………………………………………… 44
8.7. When using other E-mail software………………………………………………………………………………………………………………………………… 45
9. The KULASIS School Affairs Information System… ……………………………………………… 46
9.1. About KULASIS… ……………………………………………………………………………………………………………………………………………………
9.2. Using KULASIS… ……………………………………………………………………………………………………………………………………………………
9.3. Pocket Seminar Pre-Registration (Liberal Arts and General Education courses)… …………………………………………………………………………
9.4. " 履修登録 " (Class Registration)……………………………………………………………………………………………………………………………………
46
46
49
51
9.5. Functions after Determining Class Registration… ……………………………………………………………………………………………………………… 55
10. University Library Online Services………………………………………………………………… 59
10.1. Using KULINE… …………………………………………………………………………………………………………………………………………………… 59
10.2. Using MyKULINE…………………………………………………………………………………………………………………………………………………… 59
10.3. Using Electronic Journals and Databases… …………………………………………………………………………………………………………………… 62
11. Kyoto University Cyber Learning Space "PandA"… …………………………………………… 63
11.1. About PandA… …………………………………………………………………………………………………………………………………………………… 63
11.2. Recommended Environment… ………………………………………………………………………………………………………………………………… 63
11.3. Logging In… ……………………………………………………………………………………………………………………………………………………… 64
11.4. Getting started… ………………………………………………………………………………………………………………………………………………… 65
11.5. Resources…………………………………………………………………………………………………………………………………………………………… 69
11.6. Assignments… …………………………………………………………………………………………………………………………………………………… 70
Appendix… ……………………………………………………………………………………………… 73
1. Introduction to the Information
Environment of Kyoto University
The Institute for Information Management and Communication
(IIMC) of Kyoto University provides services such as the "Kyoto
University Integrated information Network System (KUINS)"
that provides a high-speed information network, a "Large-Scale
Computing System" that provides a high performance computer
environment for researchers throughout Japan, the "Educational
Computer System" that supports education and research at this
university, the "Computer-Assisted Language Learning (CALL)
System", the "Distance Lecture Support", a "Database Service",
and an "Educational Materials Creation Service". In addition,
an education research environment has been developed based
on information communication technologies such as a syllabus
information system and university library online services.
The "Educational Computer System" and "Computer-Assisted
Language Learning (CALL) System" are provided to help Kyoto
1.1. Notations
In this manual, input and output to computers is expressed
using different fonts.
・Website addresses are written in sans-serif font.
http://www.kyoto-u.ac.jp/
・Characters that are output automatically by computers such as
character terminal prompts (displays requesting user input) are
written in typewriter typeface as shown below.
bash-3.00$
・Input by a user from a computer terminal that should be input
the same as an example such as a command is written in bold
typewriter typeface as shown below.
emacs &
・Input by a user from a computer terminal that should be input
differently than an example such as an ECS-ID is written in
italic typewriter typeface.
a0XXXXXX
・W hen multiple keyboard keys need to be pressed, it is
expressed according to the following.
University students with their studies. Information media based
[Ctrl] + [Alt] + [Del]
on the integration of computers and networks has been changing
・When an user needs to select a menu and then submenus at
society. In order for people to function in this society, it is
necessary to have information literacy based on "ICT (Information
the same time, it is expressed according to the following.
[Start] → [Program] → [Accessories] → [Note]
and Communication Technology)" and ability as "Internationally-
・Notes for operation are expressed according to the following.
Minded Persons" who can understand cultures and ideas, not just
language.
The "Educational Computer System" and "Computer-Assisted
Language Learning (CALL) System" for the university students
Caution‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
An user needs to use with caution.
were updated and began operating in March 2012. These
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
systems were designed to establish an adequate computing
・ The items that do not require caution, but are important are
environment for education at Kyoto University.
expressed according to the following.
The following services are provided.
・About 1,400 computers running Windows are available at 26
locations throughout the university.
・Linux can be used with the Oracle VM VirtualBox.
・Student E-mail service (KUMOI) is provided so that students
can send and receive e-mail using a web browser from inside
and outside the university.
・A cooperation service using University Authentication IDs
(ECS-ID) is available.
The CALL room quality has been improved and the number of
rooms for the CALL System has been increased. Equipment for
CALL has also been installed in open space laboratories (here
after referred to as OSLs) so that students can fully utilize them
for self study and for reviewing.
Both of these systems are used by many people. Therefore,
we have established this manual so that this system can be
used safely and effectively for education and research at this
university.
2
Information‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
This is important information.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
1.2. Information Related Services Provided by Kyoto University
The following table shows the information related services provided by Kyoto University and the department in charge.
Service
Department in Charge
Contact Information
The Institute for Information Management and
Communication
Introduction to the Information Environment of Kyoto University
University Authentication IDs (ECS-ID)
https://www.iimc.kyoto-u.ac.jp/en/inquiry/
Information Environment Support Center
Information Management and Communication
Information Security e-Learning
Department IT Service Division
[email protected]
Security Management Office
Information Management and Communication
Computer Terminal Services
Department IT Service Division
https://www.iimc.kyoto-u.ac.jp/en/inquiry/
Educational Computing Services Group
The Computer-Assisted Language Learning (
CALL ) System
Information Management and Communication
Department IT Service Division
https://www.iimc.kyoto-u.ac.jp/en/inquiry/
Educational Computing Services Group
Information Management and Communication
Computer Network Connection ( KUINS )
Department
[email protected]
IT Service Division Network Group
Common Portal for All Students
The Kyoto University Mail for Students and
Researchers ( KUMOI )
The KULASIS School AAffairs Information System
Information Environment Support Center
https://www.iimc.kyoto-u.ac.jp/en/inquiry/
Information Management and Communication
Department IT Service Division
https://www.iimc.kyoto-u.ac.jp/en/inquiry/
Educational Computing Services Group
University Common Class Student Desk /
Student Affairs Division in your department
http://www.z.k.kyoto-u.ac.jp
Online Library Service (MyKULINE)
Library System Online Service
[email protected]
Online Library Service (Electronic Journal)
Library System Electronic Resources
[email protected]
Information Management and Communication
Learning Support System (PandA)
Department IT Service Division
https://www.iimc.kyoto-u.ac.jp/en/inquiry/
Educational Computing Services Group
1.3. Information Related Services Websites
Service
Website URL
Institute for Information Management and Communication
http://www.iimc.kyoto-u.ac.jp/
Educational Computer System
http://www.iimc.kyoto-u.ac.jp/en/services/ecs/
Information Security e-Learning
http://www.iimc.kyoto-u.ac.jp/ja/services/ismo/
The Computer-Assisted Language Learning ( CALL ) System
http://www.iimc.kyoto-u.ac.jp/ja/services/call/
KUINS(Network Connection)
http://www.iimc.kyoto-u.ac.jp/en/services/kuins
Kyoto University Mail for Students and Researchers
https://mail.st.kyoto-u.ac.jp/
Kyoto University Library Network
http://www.kulib.kyoto-u.ac.jp/
KULASIS(Common Portal for All Students)
https://student.iimc.kyoto-u.ac.jp/
Learning Support System (PandA)
https://panda.ecs.kyoto-u.ac.jp/portal/
3
2. Acquiring and Using University Authentication IDs (ECS-IDs)
2.1. About ECS-IDs
Please apply to the Media Center Information Environment
University Authentication IDs (ECS-ID) are IDs for verifying
Support Center for your ECS-ID. Students should bring their
the identity of students. Using ECS-ID, they can use IT services
Student ID Cards issued by their departments to verify your
provided by the IIMC, the Kyoto University Library Network and
identity.
other departments.
◆ Faculty and Staff
2.2. Procedure for Acquiring an ECS-ID
The IIMC provides a notification that contains your ECS-ID
for new students via your department. If you do not receive
the notification, please contact to the Academic Center for
Computing and Media Studies (hereinafter referred to as the
"Media Center") Information Environment Support Center.
Faculty and Staff who already have SPS-ID can use almost IT
services with SPS-ID therefore they aren't provided with ECSID in principle. But, those who can't get SPS-ID, such as a parttime instructor, can acquire an ECS-ID. If they need to use IT
services that require ECS-ID, please apply to the Media Center
Information Environment Support Center or the representative
reception counters(For example, Kyoto University Uji Library,
Medical Library, and Center for Information Technology of
Caution‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
The procedures for acquiring ECS-IDs are handled in the Media Center
Information Environment Support Centers, and by the representative
reception counters (Uji Library, Center for Information Technology in
Katsura Campus, Medical Library, etc ...). Please bring your student ID
card or faculty ID card to verify your identity for the procedures.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
2.2.1. Usage Qualification
The following people can acquire an ECS-ID. For more
information about usage qualifications for individuals who are
outside of the below 1. and 2., inquire at the ICT Support Center.
1. University students (including research students and
exchange students)
2. Other individuals accepted by the Director-General of the
IIMC
Graduate School of Engineering). They should bring their Faculty
Card to verify their identity.
2.3. Activating ECS-ID
After receiving an ECS-ID and an activation key, you should
activate your ECS-ID until the expiration date. Activating ECS-ID
is necessary to use IT services at Kyoto University.
◆ Activating your ECS-ID through your PC, Cellular Phone or Smart
Phone
1. Please prepare for your ECS-ID and an activation key on the
notification, and decide on your password beforehand.
2. Access the following URL. You can access it using a
PC, a Cellular Phone and a Smart Phone. https://ecs.iimc.kyouto-u.ac.jp/active/
3. Input your ECS-ID and activation key. Next, input your
password twice, then click the [ 実 行 (Run)] button. After
that, your ECS-ID and password are activated.
2.2.2. ECS-ID Application
For students who do not receive the ECS-ID notification, please
refer to this section.
4. Memorize your password and do not tell it to others. The
faculty and staff member will never ask for your password.
We also recommend to read “3. Safe and Appropriate Use of
the Information Systems.” (Page 6)
◆ Students with IC Student ID Cards (Undergraduate Students /
Graduate Students)
If you entered Kyoto University before April 2012, you can use
your ECS-ID that the IIMC has already issued to you. If you do
not have an ECS-ID, please apply to the Media Center Information
Environment Support Center for your ECS-ID.
If you entered Kyoto University on and after April 2012, the
IIMC provides the notification that contains your ECS-ID via
your department. If you do not receive it, please contact to the
Student Affairs Section in your department or the Media Center
Information Environment Support Center.
◆ Students with Non-IC Student ID Cards (Research Students etc.)
4
◆ Activating your ECS-ID using Computer Terminals at the OSLs.
1. Turn ON the computer. For the location of the Power Button,
refer to “4.2. Starting Up Computer Terminals.”
please notify this to Information Environment Support Center at
the Media Center South Buildings.
2. At logon window, click the [ 有効化処理 (activate)] button.
3. T h e f o l l o w i n g w i n d o w w i l l a p p e a r , i n p u t y o u r
ECS-ID, an activation key and your password twice. 2.5.3. If You Forget Your ECS-ID and Password
If you forget your ECS-ID and password, you need to follow
the necessary procedure at the Media Center South Buildings
Information Environment Support Center. The IIMC resets your
Acquiring and Using University Authentication IDs (ECS-IDs)
password and gives you an activation key, and you need to set a
new password by following the procedure in 2.3.
Students, faculties and staffs should bring their student, faculty
ID cards to verify their identity.
2.6. Remark to use ECS-ID
4. After clicking [ 実行 (Run)], a window saying " 有効化を行い
ますか? (The system will activate your ECS-ID.)" will appear.
Click "OK".
2.4. IT Services using ECS-ID
ECS-ID is a university authentication ID, which is ordained
by the Rules for Using the Kyoto University Campus-wide
Information System. Therefore, students must observe this rule
when using ECS-ID. If students use ECS-ID fraudulently, Kyoto
University may suspend your ECS-ID or take other actions.
Please refer to Appendix 4.3- for the Rules for Using the Kyoto
The following IT services are available using ECS-ID.
University Campus-wide Information System and Appendix 5.3-
• The Common Portal for All Students (Single Sign On to
for Password Guideline for Users of Kyoto University Campus-
KULASIS, MyKULINE and Student E-mail Service (KUMOI),
wide Information System.
refer to Section 7)
• The Certifications Publisher (with Student IC Card/Student
ID and ECS-ID password)
• The Student E-mail Service (refer to Section 8)
• Online Library Services such as electronic journals
• Network services such as PPTP connection service and
university wireless LANs.
• Educational Computer System such as PC terminals in
satellite laboratories in the departments and Open Space
Laboratories (OSLs) at the Media Center North / South
Buildings and Kyoto University Library etc.
2.5. Managing your ECS-ID
2.5.1. Changing the Status of Your ECS-ID
The ECS-ID can be used while you are a student or a staff
member at Kyoto University. If your status changes such as
advancing to graduate school or changing from a student to a
staff member, it may be necessary to change the status of your
ECS-ID. The IIMC will inform you via e-mail when you need to
change your ID status. If you receive this e-mail, please complete
the necessary procedure as quickly as possible.
2.5.2. Terminating Your ECS-ID
If you lose your Kyoto University ID because of graduating,
completing your course, or resigning, you will no longer be able
to use your ECS-ID. In this situation, download necessary files
and e-mails or notify changes of your e-mail address in advance.
If you want to terminate your ECS-ID for some other reason,
5
3. Safe and Appropriate Use of the Information Systems
others. By using such tools, simple passwords can easily
3.1. Appropriate Management of ECS-IDs
and Passwords
3.1.1. Why ECS-IDs and Passwords are Necessary
The Educational Computer System must protect the rights of
authorized users who use the system, and protect users files
be guessed. In order to avoid this problem, do not use
passwords mentioned in 3.1.4. Unsafe Passwords, and try
to create secure passwords.
•
permitted for you to use another person's ECS-ID.
•
and information. The ECS-ID and password are used to identify
temporarily.
•
as information that is only known by the actual user, and it can
If you find a computer that is left logged on by someone else,
do not touch it and notify OSL TAs at the Media Center South
be used for notifying the person's identity to the system.
The Educational Computer System uses the combination of an
It is very dangerous to leave a computer where you have
logged on. Always lock a computer when you leave
users. One ECS-ID corresponds to one user so that the system
can recognize which user is accessing it. The password is used
It is not permitted for others to use your ECS-ID. It is also not
Building.
•
Do not try to use a computer that is not approved.
ECS-ID and its password to identify and authorize users. In other
words, if the ECS-ID and password correspond, it is considered
that an authorized user is accessing the system. Therefore, it is
necessary to carefully manage your ECS-ID and password.
3.1.2. If Your Password Becomes Known to Others
If your password becomes known to other persons, it means
3.1.4. Unsafe Passwords
The following types of passwords are not safe.
•
Short passwords (e.g. A7U8)
•
Passwords that use only capital letters, only lower-case
letters, or only numbers (e.g. JKUEDL, 4034712)
•
they may be able to access the Educational Computer System
and related services using your ECS-ID. As a result, the following
(e.g. TYamada, 19850401)
•
problems may occur.
•
You may lose your trust by sending e-mails from your
account or leaving messages on message boards.
•
Passwords using actual words that are found in a dictionary,
people's names, or product names (e.g. Tiger)
Your received e-mails and your files may be viewed or be
changed or deleted by others.
•
Passwords based on your name, birthday, or other attributes
Other disrupting actions or crimes such as cracking of
computers may be perpetrated using your account.
Caution ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
The Educational Computer System requires that passwords be at least
eight characters long.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
These actions through the computer do not show the
3.1.5. If You Think Someone Else is Using Your ECS-ID user's actual appearance, so the doer can only be known
Referring to "Appendix 3" and consult us as soon as possible.
through the ECS-ID. Therefore, actions done using your ECSID are considered as being done by you and you will be held
3.2. Changing Your Password
responsible.
The following method can be used to change your password.
1. Access https://ecs.iimc.kyoto-u.ac.jp/ using web browser.
3.1.3. ECS-ID and Password Management
Passwords are confidential character strings known only by the
ECS-ID holder. Passwords must not become known to anyone
else. Therefore, necessary caution must be used when managing
your password as shown in the following points.
•
Do not tell your password to anyone. Teaching Assistants
(TAs) and staff members will never ask you for your
password.
•
Do not write your password down. Please memorize it.
•
Change your password regularly. If the same password is
used for a long time, the risk of it becoming known to others
increases. It will also become more difficult for you to notice
that your password has become known. For more details,
refer to 3.2. Changing Your Password.
•
6
The tools for guessing passwords can easily be acquired by
2. Enter your ECS-ID and current password to login.
it is necessary to properly manage your ECS-ID and password.
3. Click the [ パスワード変更 (Changing password)] at left.
◆ Warning about Computer Viruses
Computer viruses are malicious computer programs that can
be received through e-mail attachments, browsing of websites,
and external storage media devices such as USB Flash memory
drives. Viruses then spread through networks or through
external storage media such as USB Flash memory drives.
Users must keep in mind the following points.
・Do not open suspicious e-mails (attached files)
・Do not access to suspicious websites
Safe and Appropriate Use of the Information Systems
・Do not open files from unknown sources
◆ Security Countermeasures for Your Own Computer
We request students to implement the following security
4. Type your current password and the new password twice,
and click " 実 行 ". The following window will appear, and
click OK.
countermeasures for their own computers.
・Install antivirus software and always install the latest virus
definition file (pattern file).
・Always use the latest updated versions of software such as
Windows OS, Microsoft Office, Adobe Reader and Flash Player.
・When connecting to a network outside of the university, make
sure there is sufficient security using firewall settings.
Caution ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
5. If your password is changed successfully, it says [ パスワード
の変更を依頼しました。(Your password has been changed.)]
If your computer contains a virus, it can affect many people.
You may be held responsible, so it is necessary to implement
sufficient security countermeasure. ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
3.3.2. Warning about Private Information Protection
Always use caution when handling your own or another person's
private information on the network. When inputting private information on a website, make sure that
the service provider is trustworthy and that the information will
be handled securely. When exchanging important information
such as credit card numbers, make sure that the encrypted
transmission or other safety measures by a certification body are
taken to protect against impersonation. If your e-mail address becomes known to others or if your
3.3. Points to Keep in Mind When Using the Network
e-mail address is made public on the Internet, a large amount
Through the Internet, computers all over the world are
of junk e-mail and virus containing e-mails may be sent to your
connected and various information services are provided. On
address. Once you start receiving junk e-mail, filtering is the only
the other hand, network usage causes various social problems.
countermeasure. Therefore, use caution when giving out your
It is necessary to understand these dangers in order to use the
e-mail address.
network properly. The Educational Computer System User guidelines state that
users must use their actual name, that another person's name or
3.3.1. Warning about Information Security
fictitious name must not be used and that the user must show
◆ Proper Management of User IDs and Passwords
their contact information such as their e-mail address. Therefore,
In the Educational Computer System, ECS-IDs and passwords
it is necessary to carefully select your service provider. For more
are used to identify users and provide services such as computer
information about protecting your private information related to
terminals and e-mail. If your ECS-ID and password become
the Educational Computer System, refer to Appendix 4.4.
known to others, problems such as those explained in 3.1.2. If
Your Password Becomes Known to Others can occur. Therefore,
7
3.3.3. Proper Use of Copyrighted Work
Copyrighted material such as computer software, music, videos,
and publications are protected under Copyright Laws. It is
necessary to understand copyrights and to use such material
properly.
・When using computer software, make sure what rights the
user has and then use the software within that rights.
・Gnutella and related software
(BareShare, LimeWire, etc.)
・BitTorrent and related software
(Including BitComet, cTorrent, Opera BitTorrent function, and
Firefox AllPeers plugin)
In addition, the use of other software with functions for
publishing files widely is not permitted. Most computer
・In order to duplicate copyrighted material outside of any
terminals in the Educational Computer System are restricted
exceptions in the Copyright Law, or to make access available
from having these types of software installed. However, keep in
through the network, it is necessary to acquire permission from
mind that there is some software that can have them installed.
the copyright holder.
・Quoting from another person's works in your paper without
permission from the copyright holder is allowed only when
3.3.6. Prohibited Use of P2P Systems Other than File
Sharing
specified conditions under Copyright Law are met. It is
According to the KUINS usage regulations, P2P systems that
necessary to fully understand these restrictions before quoting
are not for file sharing can be used. However, due to the design
from another's work.
of the Educational Computer System, all communications are
・Use of photos containing other people's face is protected based
executed over a relay server (proxy) to the Internet. Therefore,
on the concept of Portrait Rights. It is necessary to use caution
if a P2P system is used, an overload can occur with the relay
when dealing with such rights, and it may be necessary to
server and may cause problems for other users.
acquire the person's permission beforehand.
Skype and other P2P systems that are not designed as file
sharing software cannot be used with the Educational Computer
3.3.4. Crime, Disturbance, and Sexual Harassment
Recently, many crimes such as fraud and other disruptive
System. There are a few exceptions such as when creating
programs using P2P system development frameworks such as
actions have occurred through e-mail and the Internet.
JXTA, SOBA, and OverlayWeaver as part of a class exercise. If
・Always be aware of the risks.
necessary, consult the contact information shown in Appendix 3.
・If you believe you are the victim of a crime, remain calm and
Troubleshooting through your course instructor.
handle the situation.
・If a problem occurs, do not try to resolve the problem by
yourself. Receive guidance from an expert.
・If you are a victim of sexual harassment, consult the
Harassment Consultation Desk of IIMC or each department.
3.4. Information Security e-Learning
All students and staff members must take the Information
Security e-Leaning course. For more information about the
Course, refer to the following URL.
http://www.iimc.kyoto-u.ac.jp/ja/services/ismo/
3.3.5. Prohibited Use of P2P Type File Sharing Software
P2P type file sharing software is a kind of P2P system used
to share files between connected computers. These systems
become issues because they are often used to share copyrighted
materials without the prior consent of the copyright holder. It is also well known that such software is the source of
information leakage due to viruses that target P2P type file
sharing systems.
KUINS managing the university network requires notification
when a P2P type file sharing system is used. The Educational
Computer System does not make this notification and P2P
type file sharing software cannot be used with the Educational
Computer System.
The following programs cannot be used.
・Winny
・Share
・WinMX
・KaZaa
・eDonkey and related software (e.g. eMule)
8
4. Computer Terminal Services
4.1. Computer Terminal Services
There are about 1,400 computer terminals available on the
Educational Computer System throughout 26 different locations
including the Multimedia Laboratory of the Media Center
South Building, Open Space Laboratories (OSLs), and satellite
laboratories of each department. These computer terminals run
Windows 7. It is also possible to use Linux using Oracle VM
VirtualBox installed in the computer terminal.
Each user's files are stored in the file server at the Media Center
Computer Terminal Services
South Building, and the setting and files are available from any
computer terminal on the network. Files cannot be accessed by
others by default.
In addition, you can print from any computer terminal using
laser printers that are connected to the network at satellite
laboratories and OSLs.
◆ Satellite Laboratories
Satellite laboratories are computer rooms located in each
department, and are used for department classes. Open hours
and user conditions differ according to the department. For
more information about satellite laboratory locations, refer to
Appendix 6.
◆ Open Space Laboratories (OSL)
Open Space Laboratories are computer rooms located on the
first floor of the Media Center South Building, the second floor of
the Media Center North Building, the third floor of the University
Library, the second floor of the Yoshida-South Library, and
Katsura Campus Funai Community Hall. These are not used for
classes, but rather are for self learning.
In the Media Center South Building, graduate students are
working as teaching assistants (TAs) and can answer user's
questions.
◆ Multimedia Laboratories
Multimedia laboratories are located in the second and third
floors of the Media Center South Building, and computer
terminals and video projectors are available. These are used for
liberal arts and general education courses including information
education.
9
4.2. Starting Up Computer Terminals
①
Turn on the computer.
Press here to turn
power ON.
Monitor
PC
The green light is
on while the PC is
running.
Mouse
Keyboard
If you need help with operating
a computer, ask TAs at the Media
Center South Building OSL.
②
Clicking
Getting Started.
・ Click: Quickly pressing
the right or left button of
the mouse one time
・D o u b l e - C l i c k : Q u i c k l y
pressing a button twice
Waiting for a while.
③
Right-Click
Left-Click
Logging on.
Input your ECS-ID as Username.
The ECS-ID is an 8-character long string such as "a0XXXXXX ".
("X" represents numbers.)
Input your password corresponding to your ECS-ID.
Activating your ECS-ID
from here.
After input the Username and the Password, click here.
Opening "Common Portal for All student"
page.
10
4.3. Shutting Down Computer Terminals
① Close all application you started.
② Go to [ スタート (Start)] → [ シャットダウン (Shutdown)] , and then press [OK].
③ The operation is complete.
Computer Terminal Services
If another user is waiting to use the
computer, select [ 再起動 ].
Caution‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
・Do not leave a computer in the logged on status. It could be abused by another user.
・When you are finished, do not press the power button to turn the computer OFF.
If you do that, normal shutdown will not be executed and data will not be saved.
・If the computer is unused for a certain period, the screen will go blank and Windows will be locked.
Please note that if this lock status continues for a certain period, it will automatically log off.
・When you finisih using computer terminals, make sure that the shut down process has completed. Shut down process
sometimes fails.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
11
4.4. What Can We Do Using Windows 7?
You can confirm how much space you have on the disk.
You should save files here.
For more information, refer to "4.4.1 Saving Files"
You can move to the Information Security e-Learning course.
For more information, refer to “3.4. Information Security e-Learning."
FAQs are here.
The Common Portal for All Students web page will appear.
For more information, refer to " 7.Logging In Using the Common Portal for All Students.
You can confirm how many sheets you have printed.
※ ECS-ID is required for checking.
You can confirm job items waiting for printing.
You can cancel an item waiting to be printed.
※ ECS-ID is required for checking.
This brings up the Linux login screen.
For more information, refer to “4.5. What Can We Do Using Linux?”
You can use "Kyoto University Mail for Student and Researchers."
For more information about e-mail services, refer to "8. Using the
Kyoto University Mail for Students and Researchers "
This is the Start Button.
From here, you can use various applications.
12
This is the taskbar.
Minimize
The window will be minimized and will be
move to the taskbar.
Maximize
The window will fill the screen.
Close
The window will close.
Computer Terminal Services
You can put files here that you want to delete.
This is the task tray.
Icons appear here when devices are connected to the computer.
For more information, refer to “4.6. Using USB Devices” .
13
4.4.1. Saving Files When you save files, save it to the following location.
・Go to M Drive([マイコンピュータ]→[Home Directory (M:)])
・My Documents on the Desktop.
(My Documents and the M Drive point to the same location.)
・External storage device (e.g. Flash memory drive)
In the Educational Computer System, disks on the network are
used as the location for saving various files created by users.
These disks are My Documents and M Drive on the desktop. By
saving files to the disks on the network, you can access your files
from any computer on the system. However, there is limitation
1. Select[印刷プレビュー (Print Preview)]from the application
menu to confirm the output results.
on disk size. For more information, refer to "4.7.2. Limitation on
2. Select[印刷 (Print)]to display the printing dialog box.
Usage Amounts."
3. Confirm that the printer name is "Auth-by-Card-Printer ."
If you save files to another location, the files will be removed
after you shut down.
4. Click the[印刷 (Print)]button.
5. Push the 節電ボタン (Power Saving Button) on the printer if
green light is turning on.
Caution‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
Do not use languages other than English or Japanese for file names
using Windows 7. You may not be able to access such files.
6. Put your Student Card close to IC card reader next to the
printer. The LCD monitor changes from [ ICカードヲチカヅ
ケテクダサイ (Put the IC Card close to the reader)] to [ シヨウ
デキマス (Ready to use)] and printing will start.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
4.4.2. Printing at Satellites
Laser printers are available in satellite laboratories. You can
print out documents from various applications.
Educational Computer System printers automatically print out
the ECS-ID on the bottom-left corner of the printed document.
There is a limit on the number of sheets that can be printed.
For more information, refer to "Printing Limitations" in "4.7.2.
Limitations on Usage Amounts." The following is the procedure for printing.
1. Select[印刷プレビュー (Print Preview)]from the application
menu to confirm the output results.
2. After confirming the preview, select[印刷 (Print)]to display
the printing dialog box.
• If no setting are made, printing will be done on both sides
of the paper. To print only on one side, specify in the page
settings.
• We ask users to help supply the paper and toner to the
3. Select a printer name such as "prXXY -XXX -JP" (here, X
printers in the OSLs and satellite laboratories. Paper and toner
represents numbers, and Y represents letters. They differ
are managed by each division (mainly department offices), so
according to the computer room.)
go there to get necessary supplies.
4. Click the[印刷 (Print)]button.
• If no setting are made, printing will be done on both sides
• If you find printer failure, contact TAs and the Media Center
South Building OSL.
of the paper. To print only on one side, specify in the page
settings.
4.4.3. Printing at OSLs
Laser printers are also available in OSLs. You can print out
documents from various applications.
When using printers at OSLs, you need to bring your IC Student
Card.
The following is the printing procedure.
14
Caution‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
Many students use the printers every day and they are
important devices, but some use the printers improperly. Please
use good manners when printing. For example, do not print
many unnecessary pages.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
5. The "CubePDF" dialog appears, Click " ... " to select the location
Caution‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
and name the file.
Students who are taking courses using the Educational Computer
System should keep in mind that if the number of sheets they have
printing is over the specified limit, printing will not be executed even if
it is during a class. You should use the printers wisely.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
※ If you have no IC Student Card.
The following is the procedure for printing.
1. Select[印刷プレビュー (Print Preview)]from the application
menu to confirm the output results.
2. Select[印刷 (Print)]to display the printing dialog box.
Computer Terminal Services
3. Select a printer name such as "Auth-Free-Printer-XXXX" (here,
X represents numbers, and varies according to a terminal room.)
4. Click the[印刷 (Print)]button.
6. Click[変換 (convert)]button.
7. Confirm the output.
4.4.4. Creating PDF Files
For converting documents such as Word documents into PDF,
follow the following procedure.
1. Select[印刷 (Print)]from the application menu.
Caution‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
If some part of the PDF documents needs to be extracted, execute the
same operation using Adobe Reader.
2. Select pages you want to convert.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
3. Select "CubePDF" as a printer name.
4.4.5. Using the World Wide Web (WWW)
4. Click "OK" or "Print" button. The button name differs from
The World Wide Web is a global information system that
applications. (At the figure, Word2010 is used.)
makes it possible to publish or view various information
resources such as text, images, and sound. Now, many
individuals and organizations throughout the world provide
information through the WWW, and anyone can access this
information by using services such as search engines.
Usually, information sources on the WWW can be viewed
through a web browser. The Educational Computer System
uses Microsoft Internet Explorer (IE) and Mozilla Firefox web
browsers for Windows 7.
To start Internet Explorer, go to [ スタート]→[すべてのプロ
グラム]→[Web 閲覧]→[Internet Explorer]or click IE icon
at desktop.
To start Firefox, go to[スタート]→[すべてのプログラム]
→[Web 閲覧]→[Mozilla Firefox].
After starting the web browser, the top page of the IIMC
Educational Computer System website will appear. In the [ ア ド
レス (Address)] box, you will see “http://www.iimc.kyoto-u.ac.jp/
ja/services/ecs/.” This is referred to as the URL. You can input
a URL into the [ ア ド レ ス (Address)] box and you will move to
the website that you entered. Sometimes you will find a “Link”
on a screen that will allow you to jump to another website. By
clicking on links, it is possible to view linked websites.
15
4.4.6. Applications
Many convenient applications are installed in the Windows 7
of the Educational Computer System. These can be executed by
Specialized Applications
・Maple:A computer algebra system, facilitating symbolic
mathematics.
clicking the [ ス タ ー ト (Start)] button at the bottom-left corner
・SPSS:Statistical analysis software
of the screen, then [ す べ て の プ ロ グ ラ ム (All Programs)], and
・R : Language and environment for statistic calculation and
clicking on the program.
graphics
Keep in mind that the same applications are not installed on all
・Mandara:Geographical information analysis system software
computers. Due to license agreements, some software cannot be
installed on all computers. Also, some software is only available
Text Editing
at certain satellite laboratories.
In addition to [ メ モ 帳 (Notepad)] included with Windows, the
The following are some of the software that is available.
following software is also installed
・TeraPad : Standard function Text editor with standard
Microsoft Office 2010
functions
・Word:Word processing software
・Vim:Windows version of vi
・Excel:Spreadsheet software
・Meadow:Windows version of emacs
・PowerPoint:Presentation software
・秀丸:High-function text editor
・Access:Database management software
・サクラエディタ:text editor
LibreOffice
Programming Software
・Writer:Word processing software
・Microsoft Visual C++ Express Edition:C++ development
・Calc:Spreadsheet software
environment
・Impress:Presentation software
・Microsoft Visual C# Express Edition:C# development
・Draw:Drawing software
environment
・Math:Equation editor
・Microsoft Visual Basic Express Edition:Basic development
environment
Linux
・Eclipse:Java development environment
・Vine Linux 6
・Perl:Perl interpreter
・Python:Python interpreter
Web Browsers
・Ruby:Ruby interpreter
・Internet Explorer
・Firefox
Utilities
・Lynx
・Type Trainer:Typing exercise software
・Lhaplus:Compression and decompression Archiving software
Multimedia Software
・IrfanView:Image viewing / editing / formatting software
Communication Applications
・Dynamic Draw:Drawing software for creating diagrams
・WinSCP:File transfer software
・Windows Media Player:Audio / Video player
・TeraTerm:Terminal software
・Quick Time:Audio / Video player
・Real Player:Audio / Video player
Following applications are installed only PC terminal at the
Media Center South Building OSL.
Document Processing Tools
Adobe Web Premium CS4
・pLaTeX, dviout:TeX compiler and viewer
・Adobe Illustrator CS4:Vector graphic software
・GhostScript, GhostView :PS/PDF printing/ File creation
・Adobe Photoshop CS4:Graphics editing software
software
・EasyTeX,TeXworks:Software for simplifying commands and
input for TeX
・Adobe Reader :PDF viewing software
・CubePDF:PDF creation tool for using virtual printers
16
Computer Terminal Services
17
4.5. What Can We Do Using Linux?
GNOME Terminals
A GNOME Terminal is used to send f ile
operation commands such as copy or delete
document, to output commands to printers,
and execute commands to start various
software.
To start it, from the top left part of the screen
select [ アプリケーション( Applications )] → [シ
ステムツール ( System Tools )] → [ GNOME 端
末 ( GNOME Terminal )].
When using Linux and other
software in Windows 7 together,
right-click here or click Minimize
button in upper right screen.
18
Computer Terminal Services
emacs
This is a representative text editor.
19
In the Educational Computer System, Linux is available in
addition to the Windows environment. Using a virtualization
Caution‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
software "Oracle VM VirtualBox", it is able to be run Linux on the
Windows environment.
4.5.1. Start Linux
1. D ouble-click “Linux” on the Windows 7
desktop. You can also start the program
by selecting [ ス タ ー ト (Start)] from the
bottom-left corner of the screen and then
[ す べ て の プ ロ グ ラ ム (All Programs)] →
[Linux] → [Linux] → [Vine Linux 6].
2. After a while, a window shown on the below will appear. Enter
your ECS-ID in the textbox and click [ ログイン ]. Then, enter
your ECS-ID's password in the form and click [ ログイン ].
This operation will not shut down Windows 7.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
4.5.3. Starting GNOME Terminals
To start GNOME Terminal for inputting commands, click
the
icon, or [Applications] → [System Tools] → [Terminal].
4.5.4. Printing
When printing a text file such as a paper.txt file, input the
following from the GNOME Terminal.
lpr paper.txt
It will be output to the printer in the using satellite laboratory,
For Postscript format files (e.g. paper.ps), input the following.
lpr paper.ps
If it does not work, input the following.
lpr -P PRXXY-XXX-JP-PS paper.txt
X represents numbers, Y represents letters. They vary according
to a room. Confirm the tape which is put on the printer.
Information‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
For user authentication with Windows, the expression “log on” is used and with Linux “log in” is used.
When finishing, the expressions “log off” and “log out” are used.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
For example, you see the character strings, "PR18A-211" on the
printer. So type the following.
lpr -P PR18A-211-JP-PS paper.txt
4.5.2 Logging Off (Logging Out)
From the top left of the screen, select [ シ ス テ ム (System)] →
The number of pages printed using UNIX will be counted along
[ シャットダウン (Shut Down )]. A window saying " このシステム
with the number of pages printed using Windows 7.
を今すぐシャットダウンしますか? (Do you want to shut down
(For more information, refer to “Printing Limitations” in “4.7.2.
this system right now?)" will appear. Select the rightmost button,
Limitations on Usage Amounts .” )
[ シャットダウン (Shut down)].
4.5.5. Using Web Browser.
With Linux, firefox is used as a web browser. To start firefox,
input the following from the GNOME Terminal.
firefox &
20
You can also start firefox by going to [ ア プ リ ケ ー シ ョ ン
(Applications)] → [ インターネット (Internet)] → [Fx ウェブブラ
ウザ (firefox)].
4. Confirm and select USB flash drive's name.
5. Waiting for a while, Nautilus the file manager window will open and
show the contents in USB flash drive automatically.
◆ Removing USB flash drive
Right click the USB flash drive icon and select [ ドライブの安全
な取り出し (Remove)].
※ USB flash drive cannot be used on both Windows and Linux
at the same time.
Caution‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
Keep in mind that if you specify the incorrect access permission on
Linux, a file may be read or written by another user. (The default setting
does not allow other users to read or write files.)
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
Both Windows7 and Linux refer mutually through the "Linux"
Computer Terminal Services
4.5.8. Exchanging files between Windows 7 and Linux
folder (M: ¥Linux ¥home) under your "Home Directory" of
Windows 7(M:).
◆ Using Windows7
Move to M:¥Linux ¥home
[ コンピューター (Computer)] → [Home Directory (M:)] → [Linux]
Caution‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
→ [home]
Be careful when changing the default setting files for Linux (these start
◆ Using Linux
with a “.” ).
The home directory of linux is following line.
If you make a mistake with the settings, you may not be able to log in.
In this situation, send the inquiry form from the Educational Computer
System website (https://www.iimc.kyoto-u.ac.jp/en/inquiry/).
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
/home/ecsfsX/ecs/a0XXX/a0XXXXXX
There is the directory named "Windows" under home directory,
move there and see the files under M:¥Linux ¥home at Windows
7.
4.5.6. Using Windows 7 and Linux together
In the Educational Computer System, because the use of
virtualization software, you can treat Linux like any other
application windows. You can also return Windows clicking
Minimize button in upper right screen.
4.5.7. Using USB flash drive at Linux
To access files at USB flash drive from Linux, follow the
Files that contain Japanese characters in the file name from Windows
7 may have a file name containing numbers or letters in UNIX.
Keep in mind that for text file Kanji character codes and linefeed
codes, shift JIS code / CR + LF is used for Windows 7, and in Linux, UTF8/LF is used.
Use the nkf command to confirm the Kanji code.
Example: nkf -g
following steps.
foo.tex
UTF-8
◆ Connecting USB flash drive
1. Connect the USB flash drive to an USB port. If it is already connected,
(This indicates that the Kanji code for the file foo.tex is UTF-8 code.)
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
remove it and connect it again.
2. Automatic Start window will appear at Windows7, ignore this
In the following site, you see the list of applications available for
Linux in the Educational Computer System, and Use of Linux.
window and not to click.
3. At Virtual Box, Right click the
Caution‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
icon at right bottom of the window.
http://www.iimc.kyoto-u.ac.jp/en/services/ecs/services/
terminal/linux.html
21
4.6. Using USB Devices
4.6.1. Using USB Devices
USB (Universal Serial Bus) is one of the standards for
transferring data between computers and peripheral devices.
3. Select the USB device that you want to disconnect.
You will see the following message indicating that you can now
safely disconnect the USB device. Remove the USB device from
the USB port.
By using devices compatible with USB, you can store large
amounts of data to external storage devices easily and to read
various types of removable disks. This section will explain how
to use plug and play (no driver installation needed) Windows 7
compatible USB devices to store large amounts of data.
Most plug and play type USB devices have the same operation
method.
This is the basic usage method for any USB device. If you have
any questions about the USB device you are using, refer to the
manual for the USB device.
4.6.2. Connecting Devices to USB Ports
You can connect devices to the USB ports on the front of the
computer terminal.
Caution‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
・Keep in mind that you may not be able to use USB flash memory
devices with some Educational Computer System computer terminals
that have security protection.
・You are responsible for problems with any USB device you bring.
・Some USB devices require drivers to be installed on the computer.
USB
h
flas
e
driv
However, it may not be possible to install the drivers for your device.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
4.6.4. Using USB Flash Drive
USB flash drives are small drives that can store large amounts of
data, and they are relatively inexpensive. It is recommended that
you use USB flash drive for external storage with Educational
Computer System computer terminals.
注意‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
Many people forget to remove their USB flash memory devices. This
can cause loss of data and may result in information leakage.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
After connecting a device to the USB port, waiting a while. A
window like upper figure appears automatically.
4.6.5. Borrowing USB Devices
You can borrow image scanners connecting to USB ports at
4.6.3. Disconnecting Devices from USB Ports
When you have finished using a USB device, do not immediately
disconnect it from the USB port. This may cause problems with
the USB device or the data. To disconnect a USB device after you
have finished using it, execute the following procedure.
the Media Center South Building OSL. These can be used for
scanning photo and documents so that you can import them to a
computer. If you want to borrow a scanner, ask TAs on the east
side of OSL. You can also ask TAs to borrow USB flash memory
drives and card readers for SD cards and Memory Sticks.
1. Confirm the name of the USB device that you want to
disconnect. Open [ コ ン ピ ュ ー タ ー (Computer)] to confirm
注意‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
These loaned items are shared by others. Please, be sure to return the
this.
2. Click this
icon on the right side of the task tray.
item quickly so that others can use.
In addition, lending USB flash memory is not allowed to bring back
to home. Please return it after you use.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
22
4.7. Requests to Users
The Educational Computer System is provided for educational
4.7.3. Information about the Educational Computer
System
purposes at this university. Therefore, it should be used
Information about the Educational Computer System is
appropriately.
provided at the following website.
Equipment and the budget for the Educational Computer
http://www.iimc.kyoto-u.ac.jp/ja/services/ecs/
System are limited, and it is shared by many users. As a result,
This website shows users how to register the ECS-IDs and
the following limitations have been set for usage.
provides other important notification such as system outage. It
also contains documents that show how to use various services,
4.7.1. Educational Computer System User Guidelines
Users must follow the user guidelines (refer to Appendix 4-2).
a user support FAQ (Frequently Asked Questions) page, and an
inquiry form.
If a user violates the user guidelines, they may be prohibited
from using the educational computer system.
4.7.4. Rules for OSLs and Satellite Laboratories
4.7.2. Limitations on Usage Amounts
users should cooperate with each other so that it can be used
◆ Limitations on Printing
properly. Please observe basic manners such as being quiet and
Users are limited to printing 200 sheets per year. Counting
starts from April 1st and ends March 31st. If you click “Usage
Computer Terminal Services
OSLs and satellite laboratories are used by many people. All
give your seat others when OSLs and satellite laboratories are
crowded.
Information” on the desktop of an Educational Computer
You are not allowed to bring food or drinks into OSLs and
System computer terminal, you will be able to see the number
satellite laboratories, and you are not allowed to use erasers.
of sheets you have already printed and your file and e-mail
These rules are designed to prevent damage to the computer
usage amounts.
terminals.
Many users may use the printers. Therefore, take others into
consideration and try to minimize your printer usage time and
number of pages you print.
Information about using printers effectively is available from
the Educational Computer System at the following URL.
4.7.5. Operation Rules at Satellite Laboratories
Open hours and user conditions differ according to the
department where the satellite laboratory is located. For more
details, please ask each department.
http://www.iimc.kyoto-u.ac.jp/ja/services/ecs/services/printer/
printips.html
◆ File and Limitations
Each user may store up to 300MB of files (stored in My
Documents). If you click “Usage Information” on the desktop of
an Educational Computer System computer terminal, you will be
able to see your file usage amounts. If you greatly exceed these
limitations, you may be prohibited from using the system. Please
use USB Flash memory devices to store files that are over your
limited amount, or to move files from the computer terminals to
your own computer.
◆ Multiple Logon Prohibited
Due to security reasons, logging on to multiple computer
terminals at the same time is prohibited.
23
5. The Computer-Assisted
Language Learning (CALL) System
5.1. Using Computer-Assisted Language
Learning (CALL) System
Language learning CALL rooms are located on the third floor
of the Media Center South Building. (Language Learning CALL
classrooms 301, 302, and 304).
The Calabo EX Courseware Management Tool is available in
301 and 302 rooms. This allows videos from AV devices to
be viewed on the computer, and allows files containing study
assignments to be distributed and collected easily. 304 room
is designed for classes with small number of students and
equipped with AV devices. Each computer is equipped with a
video camera and headset so that you can record pronunciation
of words in foreign languages and record lip movement.
Classroom Scene (Language Learning CALL classroom 301)
Keep in mind that CALL classrooms can only be used during
classes. There are CALL autonomous learning terminals
available at OSL on the first floor of the Media Center South
Building. For more information, refer to Section 5.2.
Common functions for CALL classroom terminals and
differences in the usage method for computers between other
classrooms and OSL will be explained in the following section.
5.1.1. Media for Transferring Digital Files
Digital files can be transferred to computers using media other
than USB flash memory devices by using the card reader/
writer of each terminal. It is possible to use “CompactFlash,”
“Microdrive,” “SmartMedia,” “SD memory card,” “miniSD card,”
“MMC (Multimedia Card),” “RS-MMC,” “Memory Stick,” “Memory
Stick Duo,” “Memory Stick PRO,” “Memory Stick PRO Duo,”
“xD-Picture card,” “xD-Picture Card Type M,” and “xD-Picture
Card Type H.” For more information about using USB memory
devices, refer to [4.6. Using USB Devices]. Insert your media
device to the compatible port.
5.1.2. Sending and Receiving E-mail
For more information, refer to [8. The Kyoto University Mail for
Students and Researchers].
5.1.3. Adjusting the Volume
Videos and audio are used for classes. The audio is output from
the headset. To adjust the volume, use the dial on the headset
cord. After logging in, it is also possible to use the volume
control provided by Windows. Headset should be set with the
microphone on your left side.
Video Cameras and Headsets
24
5.1.4. Selecting Language and Input Method.
To use a language other than Japanese or English, it is
necessary to change the language setting. When you change the
language setting, the input from the keyboard will also change to
the selected language.
(1)Click the left side of the taskbar (language bar) and select
the language you want to use.
(2)You can select one of the following languages.
Chinese (Taiwan), Chinese (China), German (Germany), English
(America), French (France), Japanese (Japan), Korean (Korea),
Chinese (Hong Kong), Spanish (International Sort).
(3)To confirm the layout of the current keyboard, go to [ すべ
てのプログラム (All Programs)] → [ アクセサリ (Accessories)]
→ [ コンピュータの簡単操作 (Ease of Access)] → [ スクリーンキー
ボード (On Screen Keyboard)].
Using the Computer-Assisted Language Learning (CALL) System
5.1.5. Using the Camera
Student terminals are equipped with a camera to take photos
of lip shapes and record video. The following is a simple
explanation for using the camera.
① Double-click Logicool icon.
② Click [ クイックキャプチャ (Quick Capture)], then you see an image from the camera.
③ For capturing still image, select [ フォト (Photo)], for recording video, select [ ビデオ (video)] respectively.
④ Click camera button, then recording will start.
⑤ When recording has finished, thumbnail will appear in the button. Click one you want to see.
25
5.2. Using CALL Autonomous Learning
Terminals
There are CALL autonomous learning terminals in OSLs and
Satellites. To use CALL autonomous learning terminals, following
the steps.
1. Logon to PC terminals.
Logon with your ECS-ID and password.
2. Select a teaching material
Select a teaching material from [ ス タ ー ト (Start)] → [ す べ て
の プ ロ グ ラ ム (All Program)] → [CALL 教 材 (CALL teaching
material)].
5.3. Materials Available through CALL
Autonomous Learning Terminals
The following materials are available (as of March, 2014).
Chinese
ChinaCALL
Vietnamese CALL Material for Conversation
Country Name Quiz in Chinese
Vietnamese CALL Material for Pronunciation
Chinese Multimedia CALL Material for Pronunciation
Chinese Multimedia CALL Material, Shanghai
Chinese Multimedia CALL Material, Beijing
English
English Multimedia CALL Material, Kumamoto Castle
English Multimedia CALL Material, Mt. Aso
English Multimedia CALL Material, Goko
French
CALL French Pronunciation
CALL French Grammar Pt. 1
CALL French Grammar Pt. 2
German
German CALL General Grammar
CALL German Grammar
CALL German DUAL
Beginner German 2007
Beginner German Grammar
Dutch
Dutch CALL
26
Vietnamese
Using the Computer-Assisted Language Learning (CALL) System
27
6. Connecting Computers to the University Network
The network in Kyoto University is called the “Kyoto University Integrated information Network System (KUINS).” This network covers
the main facilities including the Yoshida Campus, Uji Campus, Katsura Campus, and other remote research institutes.
KUINS consists of KUINS II, which uses global IP addresses for connecting internal and external servers (Web server, e-mail server,
etc.), and KUINS III, which uses private IP addresses to connect private computer terminals.
KUINS Ⅲ is available in the spaces where users are restricted such as laboratory.
In this section, we explain how to connect to KUINS from wireless LANs and outside the university network.
6.1. Using University Wireless LANs
This section explains about how to connect your PC to the Internet from university wireless LANs.
Wireless LANs Acceses Points are mainly located in public areas such as lecture rooms, seminar rooms, and meeting rooms). Wireless
LANs provide the network called "KUINS-Air". To connect Kuins Air, you need to select an SSID "KUINS-Air".
28
6.1.1. Setting for Windows 8
(1)Start the computer and turn on the wireless on/off switch in
KUINS-Air service area.
Click the “デスクトップ (Desktop)” tile, click the network icon in
the toolbar.
(2)Make sure that "KUINS-Air" is displayed.
Network Connection
(3)Right-click the start button, and select " コントロール パネル”
(Control Panel)"
(4)In the " コントロール パネル (Control Panel)" window, click
the " ネットワークとインターネット (Network and Internet)"
29
(5)" ネ ッ ト ワ ー ク と イ ン タ ー ネ ッ ト (Network and Internet)"
window appear, click “ ネ ッ ト ワ ー ク と 共 有 セ ン タ ー (Network
and Sharing Center)” .
(6)Click on “アダプターの設定の変更 (Change adapter settings)".
(7)Right-click the "Wi-Fi" icon, and choose " プロパティ
(Properties)".
(8)Make sure that the box labeled “ イ ン タ ー ネ ッ ト プ ロ ト コ
ル バ ー ジ ョ ン 4(TCP/IPv4) (Internet Protocol Version 4(TCP/
IPv4))” is checked.
Select “ イ ン タ ー ネ ッ ト プ ロ ト コ ル バ ー ジ ョ ン 4(TCP/IPv4)
(Internet Protocol Version 4(TCP/IPv4))” and click on “ プ ロ パ
ティ (Properties)” .
(9)Make sure that the
“IP アドレスを自動的に取得する (Obtain an IP Address
automatically)” and “DNS サーバーのアドレスを自動的に取得す
る (Obtain DNS server addresses automatically)”
radio buttons are checked.
Change to above settings if you have
configured a static IP address for another location.
30
(10)In the " ネットワーク接続 (Network connections)" window,
double-click the "Wi-Fi" icon.
(11)Choose "KUINS-Air" from the acceses points list.
Network Connection
(12)Input your ECS-ID or SPS-ID and password and click "OK".
(13) When " 接続を実行しますか? (Continue connecting?)"
is displayed, and click " 証 明 書 詳 細 の 表 示 (Show certificate
details)"
31
(14)Make sure the server thumbprint, click " 接続 (Connect)"
button.
(15)When " 接続済み (Connected)" is displayed under the
"KUINS-Air", the setting is concluded.
32
6.1.2. Setting for Mac OS X
(1) Go to KUINS Air service area, and switch on your PC.
From the Apple menu, select “ シ ス テ ム 環 境 設 定 (System
Preferences)”
Network Connection
(2) Then select " ネットワーク (Network)” in the " システム環境
設定 (System Preferences)" window.
(3)From the displayed window, select "AirMac".
※ In 10.7 or later, "AirMac" is written as "Wi-Fi"
So, please replace "AirMac" with "Wi-Fi".
Next, click the “AirMac を入にする (Turn AirMac On)” button at
the top right of the window.
33
(4) From the " ネットワーク名 (Network Name)” pull-down menu,
select “KUINS-Air.”
(5)When you are asked your credentials, input your ECS-ID and
password. (6)When the "Verify Certificate" window appear, click " 証明書の
表示 (Show Certificate)"
34
(7) Make sure that the server name is "rad.kuins.kyoto-u.ac.jp",
and select " 続ける (Continue)". Network Connection
(8) The window shown on the left is displayed, input your
administration password and click "OK".
(9) Make sure " 状況 (Status): Connected".
The setting is concluded.
35
6.1.3. Setting for iPhone/iPad
(1)Open " 設定 (Settings)(Gear icon)", and select "Wi-Fi".
(2) Turn on "Wi-Fi".
(3) From "Wi-Fi のネットワークを選択…(Choose a network)",
select "KUINS-Air".
36
(4) The " パスワードを入力 (Enter Password)" window appears,
input your ECS-ID and password.
(5) The " 証明書 (Certification)" window is displayed,
make sure that the server name is "rad.kuins.kyoto-u.ac.jp",
Network Connection
and select " 了解 (OK)". (6) The window shown on the left is displayed, the setting is
concluded.
37
※ About using e-journals provided by Kyoto University Library
You need to configure a proxy to access e-journals provided by Kyoto University Library. Setting information is provided below.
IIMC HP:http://www.iimc.kyoto-u.ac.jp/en/services/kuins/external/use/proxy.html
6.2. Using network from outside of the University
KUINS provides a VPN service so that you can connect your PC to KUINS from outside of the university, for example your home. With this
service, you can use services available only from the campas, such as e-journals.
KUINS provides PPTP connection services, and you require ECS-ID to use this service. Configuration is rather complex, but you don't need
to do it again once you set up. Configuration instructions are provided below.
IIMC HP(PPTP Connection from outside of the university):http://www.iimc.kyoto-u.ac.jp/en/services/kuins/vpn/use/pptp.html
38
7. Logging In Using the Common Portal for All Students
7.1. About the Common Portal for All Students
The Common portal for all students is a single-sign-on service
that requires the user to log in one time using their ECS-ID in
◆ Internet Explorer (Windows)
order to use the following services.
1. Go to “ツール (Tools)” > “インターネットオプション (Internet
(1) KULASIS for course registration
(2) MyKULINE for searching publications needed for
assignments
(3) S t u d e n t e - m a i l s e r v i c e ( K U M O I ) f o r s e n d i n g
assignments or making inquiries
7.1.1. Accessing the Common Portal for All Students
The common portal for all students can be accessed by going to
the following URL.
https://student.iimc.kyoto-u.ac.jp/
Options),” click " プライバシー (Privacy)” tab and then click the
[ 詳細設定 (Advanced...)] button.
2. Make sure that “ 自 動 Cookie 処 理 を 上 書 き す る (Override
automatic cookie handling)” is selected, and then click the [OK]
button.
◆ Firefox (Windows)
Go to “ツール (Tools)” > “オプション (Options)” and then click
“プライバシー (Privacy).” Make sure that “サイトから送られてき
た Cookie を保存する (Accept cookies from sites)” is selected and
then click the [OK] button.
◆ Firefox (Mac)
Go to “Firefox” > “環境設定 (Preferences)” and then click “プラ
イバシー (Privacy).” Make sure that “サイトから送られてきた
Cookie を保存する (Accept cookies from sites” is selected).
Logging In Using the Common Portal for All Students
◆ Safari (Mac)
Go to “Safari” > “環境設定 (Preferences)” and then click “セキュ
リティ (Security).” Select “訪問したページのサーバからのみ受け
入れる (Only from sites I visit)” under “Cookie の受け入れ (Accept
cookies).”
7.1.2. Software Requirements
The following software is recommended for using the common
portal for all students.
(For Windows)
Compatible Browsers
•Internet Explorer 6.0 and later
•Mozilla Firefox 1.5 and later
(For Mac)
Compatible Browsers
•Safari
•Mozilla Firefox 1.5 and later
(Cookie Settings)
7.1.3. Usage Notes
・If you're in trouble with logging into this portal system, please
ask ACCMS (South Buildings) or send an inquiry by the form on
this site. Please refer this site when you meet trouble. We can
not receive the inquiries by phone.
・P lease contact each service counter regarding KULASIS or
MyKULINE.
・You can log in MyKULINE and KUMOI directly using your ECSID and the corresponding password.
・Please refer to the inquire form on the log in page or FAQ if
you have any quesitons.
・This site can be also accessed on mobile phone with same URL.
The common portal for all students uses cookies. Please
configure your browser to accept cookies in order to use the
services.
For more information on browser settings, refer to the following.
* The browsers accept cookies by default.
39
8. The Kyoto University Mail for Students and Researchers
The e-mail Service for Students and Researchers, "KUMOI"(Kyoto University Mail clOud Interface", is provided by
Microsoft Office365. You can use this e-mail service anywhere.
8.1. Sign in and Sign out
1. Sign in. Use a Web browser to access http://mail.st.kyoto-u.ac.jp/ .
2. Enter your ECS-ID and password. Then click [Login].
*If you want to use other than Japanese, please refer to "8.6. Changing your language setting."
3. The language setting is required only at the first access. Choose the [language] and [time zone] and click the [save].
Language
Time Zone
4. Click the mail address and the [Sign out].
40
8.2. Reading E-mails
When you sign in, you will see a list of received e-mails by default.
Sign out
Option settings
See the help
Address Book
Write a new e-mail
Sort the e-mails
A list of e-mails showed
Selected e-mails are showed
8.3.Writing a new E-mail
1. Click the [new mail] to compose an e-mail.
E-mail Service
2. The following window appears. Write a message here.
※ If you attach files, Click
icon to select files.
When you attach files, click this icon.
Send the e-mails
Save the e-mails
Select E-mail addresses from
Address Book.
Enter recipients' e-mail addresses.
Using " ; " to input multiple e-mail addresses.
ex. [email protected]; [email protected]; [email protected]
Write the entry.
41
8.4.Forwarding E-mails automatically
To forward your Student Mail automatically, follow steps as shown below.
1. Access to https://ecs.iimc.kyoto-u.ac.jp/
2. Choose the [language], click [change].
3. Click [Login to Setting] at the right side of the gear wheel icon, then enter your ECS-ID and password
3. Click the [Set mail forwarding] at the left column.
4. Type the e-mail address which you want to forward e-mails to. Select [PC] or [mobile], according to the e-mail address you have
input. ※ You can set up three addresses as forwarding address.
5.When you click [Setup] and then the message saying "This setting will available within after 10 minutes." will appear.
6. To logout from the configuration, click [Logout] from the left column.
42
8.5. Adding Contacts
1. Click [People] at the top-right of the page.
2. Address Book page opens. Click [New] -> [Create Contact]
E-mail Service
3. Fill in the blanks and click [SAVE].
When you want to discard the entry, click [DISCARD] to close the window.
4. Click [Outlook] at the top-right of the page and retrun to Inbox.
43
8.6. Changing your language setting
You can change the language you use in student e-mail service (KUMOI) by following these steps.
1. Click the gear wheel icon at the top-right of the page. Click the “オプション” [Option].
2. Click “設定” [Settings].
3. Click “地域” [Regional].
4. Select the language you want to use.
44
5. Click “保存” [Save].
E-mail Service
8.7. When using other E-mail software
If you are familiar with setting up POP3, IMAP or SMTP clients, the basic information you need to get started is below.
◆ POP3, IMAP Setting
・ Server:outlook.office365.com
・ Username:(your ECS-ID) @st.kyoto-u.ac.jp
(for example, your ECS-ID is "a00XXXY", input "a00XXXY @st.kyoto-u.ac.jp" )
・ Password:Password of your ECS-ID
・ IMAP4 Port:993 ( SSL )
・ POP3 Port:995 ( SSL )
◆ SMTP Setting
・ Server: smtp.office365.com
・ Username:(your ECS-ID) @st.kyoto-u.ac.jp
(for example, your ECS-ID is "a00XXXY", input "a00XXXY @st.kyoto-u.ac.jp" )
・ Password:Password of your ECS-ID
・ SMTP Port:587 ( TLS )
notice‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
If you can't understand this explanation, please use the web interface.
We do not support your e-mail software.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
45
9. The KULASIS School Affairs Information System
9.1. About KULASIS
KULASIS is a school affairs information system available on the Internet that allows all students to get information about lecture cancellations
or class changes “Quickly, Easily, and Clearly.”
List of KULASIS Functions (Available functions differ according to the department)
Education
Law
Economics
Science
Medicine(Dept. of Medicine)
Medicine(Dept. of Human Health Science)
Pharmaceutical Sciences
Engineering
Agriculture
Integrated Human Studies
Letters
Education
Law
Economics
Science
Medicine(Dept. of Medicine)
Pharmaceutical Sciences
Engineering
Agriculture
Human and Environmental Studies
Energy Science
Asian and African Area Studies
Informatics
Biostudies
Global Environmental Studies
Government
Management
AdvancedIntegratedStudiesinHumanSuivivability
●
confirm your results
●
time table of exams*
●
class registration
●
preliminary registration of Foreign Languages*
●
preliminary registration of Pocket Seminar*
●
Office hour
●
course support
●
Syllabus
●
time table*
●
Information*
As of October 2014
Graduate Schools
Letters
Functions
Liberal Arts and General Education courses
Division
Faculties
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
●
-
●
●
-
-
-
●
●
●
●
●
-
-
-
●
●
●
-
●
●
●
●
-
●
-
●
●
-
●
-
-
-
●
-
-
-
●
●
●
●
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
-
●
●
●
●
-
* Mobile phones can also be used.
(Note) For more information about class registration, examination schedules, and grade confirmation, ask each department.
9.2. Using KULASIS
9.2.1. Logging In
To log in to KULASIS, you need to have an Educational
Computer System user ID (ECS-ID) (a0******) issued by the IIMC.
Go to the login screen at https://student.iimc.kyoto-u.ac.jp (same
URL for both computers and mobile phones).
For more information about receiving or being reissued an
ECS-ID or resetting a password, consult the Media Center South
Building.
46
9.2.2. Logging Out
To finish using KULASIS, click "Log out" button.
KULASIS contains personal information. If you leave the
computer while you are logged in, it may lead to leakage of
information.
When you are finished using KULASIS, you must also log out
from the Common Portal for All Students.
Caution‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
If no operation is executed for over 30 minutes, the system will
automatically log out for security.
Be careful when using KULASIS because it contains your personal
information.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
9.2.3. Registration Information
When you log in to KULASIS for the first time, you will be
requested to register your contact information.
Using the Syllabus Information System KULASIS
It is necessary to register your e-mail addresses in order to
use KULASIS. Notices from instructors such calls and other
information are sent to the e-mail addresses you use, so register
an e-mail addresses that you check regularly.
In general, the information that you register here is only used
for affairs related to Liberal Arts and General Education courses,
Faculties and Graduate Schools. However, this information may
also be used for other operations in Kyoto University while
respecting your privacy.
A registration confirmation e-mail will be sent to the
newly registered e-mail addresses. If you do not receive this
confirmation e-mail, there may be an input mistake or a problem
with your e-mail rejection settings. If you have some e-mail
rejection settings, add [email protected] to your list of
approved addresses.
47
9.2.4. Home Screen
After inputting your contact information and logging in to
KULASIS, this screen will appear.
The default screen is the Liberal Arts and General Education
courses page for the 1st and 2nd grade undergraduate
students, and for other students the screen is the page for your
department.
When you click the ▲ button below "Faculty" and "Graduate
School" of the INDEX on the left side of the screen, the INDEX for
departments that use KULASIS will be displayed. After selecting
the department that you want, you can view the page for that
department.
9.2.5. Information
This page shows various information such as notices to
students for meetings, classroom changes, class cancellations,
and makeup classes. You should access this page at least once
a day. It is recommended that you access this page from a
computer because it may contain images and PDF files.
* After you register your classes, information only about your
classes will be displayed.
48
9.2.6. Syllabus, Class Research / Contents
You can search class contents (syllabus) for Liberal Arts and
General Education courses and major courses.
You can also confirm updated information such as classroom
changes and changes to class contents. You can use this page to
select classes before registering, and to confirm classrooms.
This is compatible with mobile phones, but class contents
cannot be viewed from mobile phones. It is recommended that
you access this page from a computer.
The latest information for schedule / classroom changes and
instructor changes will be displayed here.
Using the Syllabus Information System KULASIS
9.3. Pocket Seminar Pre-Registration (Liberal Arts and General Education courses)
9.3.1. ポケット・ゼミ (Pocket Seminar)
Small orientation seminars (called "Pocket-semi" or "Poke-Semi") are classes that only first year student can register just one class,
just one time. These pocket seminars include reading of publications on history, geography, and classics, introductions to cutting-edge
knowledge related to the environment, resources, the universe, the medical field, and include field training. These seminars are normally
held in the instructor's laboratory, and there are usually about 10 students in each class so that the classes can be more intimate. It is
recommended that you attend these pocket seminars to broaden your viewpoint as an university student. For more information, please
refer to the Poke-Semi guide book.
To attend one of these seminars, pre-registration is necessary.
For information about the pre-registration schedule, you can go to KULASIS or go to the Liberal Arts and General Education support desk
(first floor of the Yoshida Campus South-1 Building).
After you are approved to attend, register it as same as other Liberal Arts and General Education classes.
49
9.3.2. Pre-Registration Procedure
1. Access " ポケット・ゼミ " (Pocket-Semi) webpage and click
※ In the early-spring period, Application place is the
" 予備登録 "(Preliminary Registration).
Liberal Arts and General Education support desk.
2. Find the class that you want to take and add it to your list of
desired classes.
To add a “2nd Choice” class, click " 次の希望科目を追加する "
(Add Next Choice), and when you are finished, click " 予備登録の
確定 " (Confirm Pre-Registration).
* You can specify up to a “3rd Choice” class for preliminary
registration.
However, if you apply for classes where the instructor selects
the students as one of your first or second choices, you will not
be able to add other classes.
After completing preliminary registration, a confirmation e-mail
will be sent to the e-mail addresses you registered with KULASIS.
●選抜結果 (Selection Results)
After students are selected by lottery or are selected by the
instructor, the results will be sent by e-mail. You can also
confirm the results using KULASIS.
If a class is not full, requests for more students will be posted
on KULASIS (in first come, first served way).
50
9.4. Class Registration
9.4.1. Class Registration
Classes can be registered using KULASIS for Liberal Arts and General Education courses and some specialized education courses
(Faculties of Integrated Human Studies, Letters, Law, Economics, Pharmaceutical Sciences, Engineering and Agriculture, Graduate school
of Letters, Science, Medicine, Pharmaceutical Sciences, Agriculture, Human and Environmental Studies, Energy Science, Asian and African
Area Studies, Biostudies, School of Government, and Management while others use paper application. You can register both Liberal Arts
and General Education courses and specialized classes of departments that use KULASIS.
When registering for classes, you can switch between “Liberal Arts and General Education courses" and “Major Classes” to search for a
particular class.
For departments that do not use KULASIS, registration must be done according to the instructions from that department.
9.4.2. Starting Class Registration
Using the Syllabus Information System KULASIS
If you forget to register for your classes, your credits will not
be approved even if you actually attend the class. Please make
sure you register correctly.
This class registration page is not compatible with mobile
phones. If you cannot access the internet, use one of the
computers at the Media Center North / South Buildings or
library OSLs.
During the timetable creation period, the "Class Registration"
will be displayed with the tabs at the top.
Confirm the schedule and notes, and then move to the class
registration page.
51
9.4.3. Timetable Creation Period
During this period, you can select the classes (candidate classes)
that you want to take. You can specify up to three choices for
one class period.
* Printing the List of Selected Classes for Registration
Click "Print list of selected courses to register" to display the list
as a PDF file. This can be used to determine candidate classes.
52
During this time, you must determine your classes (one class
9.4.4. Class Registration Period
for one class period) from your list of candidate classes. Do not
forget to access this page and determine your classes.
After registering for your classes, it is not possible to change the
contents until the class registration confirmation / adjustment
period. Therefore, confirm the classes before registering for
them.
After you determine your candidate classes, click "Finalize
courses to register) .
Using the Syllabus Information System KULASIS
The final confirmation screen for class registration will appear.
Make sure that there are no mistakes with the classes for
registration. If it is correct, click “Finalize".
If you forget to click the “Finalize" button after selecting your
candidate classes, your selected classes will not be registered.
In order to avoid mistakes, print out or check the confirmation
e-mail.
53
Your application for class registration will then be complete.
After completing application, a confirmation e-mail will be sent
to notify that your application is complete.
Click the "Back to List" button on the next screen to return to
the class registration screen. Click the "Print list for confirming
the entered class registration data" to print and save the list. If
there are any problems, this list will be used.
Caution‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
If there is a mistake with your classes, make necessary changes during the class registration confirmation / modification period.
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
9.4.5. Class Registration Confirmation / Change Period
The class registration confirmation / modification screen will
appear when you access this page during this period. If there
is a mistake with the classes you registered during the class
registration period, an error message will be displayed.
Be sure to access this page during the class registration
confirmation / modification period to make sure there is no
mistake, and if there is a mistake, make necessary changes.
If there is a problem with one of your classes, it will be
displayed below your timetable.
Read the contents of the error. If you still want to register for
the problem class again, resolve the issue and then add the class
again.
(If You Do Not Want to Make Changes)
After confirming the registration contents, click "Do Not
Change"and move to the next screen.
(If You Want to Make Changes)
Click "Change" and register using the same procedure as class
registration.
9.4.6 Determining Class Registration
After determining your class registration, the "Timetable" page
will show your classes. Be sure to confirm the contents.
54
9.5. Functions after Determining Class Registration
9.5.1. Timetable
When class registration is finalized, the "Timetable" tab will be
displayed. On this page, you can confirm the timetable that you
have registered.
Use this page to make final confirmation of your class
registration.
* About the timetable in KULASIS for specialized classes, ask the
affair section of each department.
9.5.2. Class Support
When you click on one of the classes on your schedule page,
you will move to the support page for that class. From that
page, you can download class materials and confirm assignment
information and class notification e-mails.
After the class support page is updated, updated information will
be displayed as new messages on the home page for three days,
so be sure to check.
“New” will be displayed on the schedule when the class support
page is updated.
Using the Syllabus Information System KULASIS
※ You can move to this page from 9.4.3.Timetable Creation
Period (only for departments that use KULASIS).
55
① Class Materials
You can download class materials posted by your instructors.
② Assignment Information
Click "Details" button to display information from your
instructors about to your assignments.
When an instructor sends a class notification e-mail, it will be
③ Class notification e-mail)
sent to the addresses that you registered with KULASIS. This
notification is issued from e-mail address only for sending, and
you cannot reply to such e-mails.
9.5.3. Office Hours
Office hours indicate the time during which students can visit
instructor laboratories to consult about their studies and to
receive guidance.
When you make an appointment to see your instructor (or if
you do not need to make an appointment, when you visit the
laboratory), it is necessary to organize your questions and inform
the matter you want to discuss in order to get permission.
56
9.5.4. 試験時間割 (Examination Timetable)
From this page, you can confirm the timetable for examinations
(announced at different times according to the department). The
time that this page opens will be notified via e-mail.
The examination timetable may be changed, so check for
updated dates.
9.5.5. Confirm grade evaluation
▼ Liberal Arts and General Education courses
You can use KULASIS to check your class grades. The period
for confirming grades depends on the department. An e-mail
notification will be sent to inform you of the period.
Keep in mind that some departments use paper to give
notification of grades.
Using the Syllabus Information System KULASIS
▼ Faculty/ Graduate School
57
9.5.6. Appeal of grade evaluation
To make sure that scores for Liberal Arts and General Education courses are accurate, students question their scores.
Only in the following cases, students file a formal request for clarification of their grades for the current semester.
① There is a clear mistake by the instructor such as the wrong score being recorded.
② There is a clear question based on the evaluation method shown in the syllabus.
However, you may not simply question the reason for your score, and may not request special consideration. For more details about this,
carefully read the “Handbook of Liberal Arts and General Education Courses" and the message displayed when you ask a question.
9.5.7. 授業評価アンケート (Class Evaluations)
You can reply class evaluations to improve Liberal Arts and General Education courses and instructors.
When this page opens, you will be notified via e-mail.
Please cooperate to reply class evaluations that you registered.
58
10. University Library Online Services
The Kyoto University Library offers various web services, such
10.2.2. Registration
as KULINE (Kyoto University Libraries Information NEtwork
In order to use MyKULINE, you need to register as follows.
system). MyKULINE is a web library that offers one stop library
•
services through the Internet. Kyoto University subscribes to a
[KULINE] → [Service] → [Online Services Guide] → [How to
apply]
wide range of e-journals (academic journals that can be accessed
http://www.kulib.kyoto-u.ac.jp/modules/service/
on the Web) and databases for education and research.
index.php?content_id=18&ml_lang=en#how
These services authenticate the user by ECS-ID(Student
Account).
10.1. Using KULINE
In KULINE, you can search not for only books, journals,
e-journals, and e-books held by Kyoto University holds, but also
for articles, rare books, dissertations, KURENAI (Kyoto University
Research Information Repository), and materials held by National
10.2.3. How to Use MyKULINE
0. Log In to MyKULINE
Access KULINE, and click the “Login” button. Then, on the
next authentication window, input your ECS-ID and password.
If the authentication has successfully finished, the window is
automatically redirected to MyKULINE.
Diet Library and other universities. You can change the type of
the materials by 6 tabs on the top page of KULINE depending on
what you are looking for.
•
KULINE
http://kuline.kulib.kyoto-u.ac.jp/
▼ This authentication window will appear.
Using University Library Online Services
More information about how to use KULINE can be found in
the help or the following:
•
[KULINE] → [Guide & Course] → [Reference Guide] → [How
to use KULINE]
1. Confirmation of your library record, extension of
the loan period and reservation
Log in to MyKUILNE, and click the “Kyoto University Library
http://www.kulib.kyoto-u.ac.jp/modules/refguide/docs/
Notifications to Mr./Ms.: ○○” , then you can check Your Library
RefGuide_OPAC_en.pdf
Record. From “Your Library Record” click the “Borrowing Record
List” , then you can check “Borrowing Library,” “Due Date,” “Bib-
10.2. Using MyKULINE
10.2.1. About MyKULINE
liography information” and so on. In addition, you can extend the
loan period and check your borrowing history.
MyKULINE is a personalized online library to every Kyoto
University members. You can use the following services in
MyKULINE.
•
Confirmation of your library record, extension of the loan period
and book reservation
•
My Folder (save search conditions, bookmarks)
•
New Arrival Alert
•
Requests for Loan and Photocopy to other university libraries or
remote Kyoto University libraries
In addition, you can see announcements from libraries .
59
2. My Folder (save search conditions, bookmarks)
You can save your search conditions. You can quickly load the
saved search conditions and search materials by them. The saved
search conditions can be checked by “My Search” of My Folder.
You can also search by a combination of search criteria that
you registered in your favorite search.
You can reserve materials shown as “Loaned Out” on KULINE by
clicking the “Reserve” button.
More information about how to extend the loan period and to
reserve books can be found in the following:
[KULINE] → [Guide & Course] → [Reference Guide] → [How
•
to use MyKULINE -Book Renewal & Reservation]
You can bookmark materials in a search result list or a
bibliography details screen and create a list of materials. The
bookmarked items can be checked by using the bookmark
feature of MyKULINE.
http://www.kulib.kyoto-u.ac.jp/modules/refguide/docs/
RefGuide_MyKULINE_en.pdf
Caution!‥ ‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
*
Renewal & Reservation policy differs among libraries.
Please confirm it from the List of KU libraries.
•
KULINE > List of KU libraries
http://www.kulib.kyoto-u.ac.jp/modules/newdb/
list.php?id=3&n=100&sort=52&sort_method=asc&
item=0&ml_lang=en
*
In many cases, you can extend the loan period of an item only one
time, although this policy differs among libraries.
*
You cannot extend the loan period in some cases, for example, if
you have an overdue material or are in penalty period. For more
information, please check the Reference Guide.
*
When the library notifies you that your reserved item is available,
please go to check it out as quickly as possible.
*
To check your borrowing history, please validate “Borrowing
History” through the settings of MyKULINE
‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥‥
60
▼ Bookmarks in My Folder, MyKULINE
KULINE).
For more information about how to use My Folder, please refer
to the following.
•
•
[KULINE] → [Guide & Course] → [Reference Guide] → [How
Mobile KULINE
https://m.kulib.kyoto-u.ac.jp/m/
to use MyKULINE -New Arrival Alert & My Folder]
http://www.kulib.kyoto-u.ac.jp/modules/refguide/docs/
RefGuide_MyKULINE_alert_en.pdf
3. New Arrival Alert
MyKULINE provides two types of new arrival alert service,
“Search Alert” and “Serials Alert” . These alerts notify you when
books and serials arrive at the library.
By using the KULINE app for iPhone and Android, you can
search the materials held by Kyoto University in 4 different ways
and you can check new arrivals and the borrowed ranking. You
can also use MyKULINE from the app by jumping to Mobile
MyKULINE.
More information about how to use New Arrival Alert services
can be found in the following:
•
To use the app, it is required to install the app named “Ufinity” .
to use MyKULINE -New Arrival Alert & My Folder]
For more information about the app, please refer to the
http://www.kulib.kyoto-u.ac.jp/modules/refguide/docs/
following:
RefGuide_MyKULINE_alert_en.pdf
•
Using University Library Online Services
[KULINE] → [Guide & Course] → [Reference Guide] → [How
[KULINE] → [KULINE for smartphone] →[Access KULINE
by smartphone! The Guide to KULINE app for iPhone &
Android]
4. Requests for Loan and Photocopy to other
You can access this page by scanning the QR code above.
University Libraries or Remote KU Libraries
http://www.kulib.kyoto-u.ac.jp/modules/service/index.
You can request for loan and photocopy to other university
php?content_id=63&ml_lang=en
libraries or remote KU libraries. You can also confirm the status
and cancel the request. More information can be found in the
following:
•
10.2.5. Opinions and Questions about KULINE and
MyKULINE
[KULINE] → [Guide & Course] → [Reference Guide] → [Guide
If you are suddenly unable to log in or forget your password, go
to Interlibrary Loan Services]
to the following FAQ.
http://www.kulib.kyoto-u.ac.jp/modules/refguide/docs/
RefGuide_ILL_en.pdf
•
[KULINE] → [Online Services Guide] → [FAQ]
http://www.kulib.kyoto-u.ac.jp/modules/service/index.
10.2.4. KULINE and MyKULINE for Mobile Phone and
php?content_id=18&ml_lang=en#faq
Smartphone
You can search, reserve, and extend the loan period by using
KULINE and MyKULINE through your mobile phone(Mobile
61
If you have any question, please send an e-mail to the Kyoto
University Library Network KULINE Services WG ([email protected]
kyoto-u.ac.jp). You can also contact the WG from the following
contact form.
10.3.3. Usage Notes
Publishing companies determine the terms of use as the
providers of electronic resources. The following are common
items prohibited by most publishing companies.
•
[KULINE] → [Contact us] → [Question about KULINE]
•
https://www2.kulib.kyoto-u.ac.jp/form_e/?page_id=124
Downloading large amounts of data that are excessive for
personal use
•
Automatic downloading of large amounts of data using
programs
10.3. Using Electronic Journals and
Databases
10.3.1. Available Services
The Kyoto University Library provides Internet access to a wide
range of full text electronic books, journals and databases. For
more information about electronic resources, go to the Kyoto
University Library's website.
•
Non-personal use
•
Reproduction and redistribution
If the terms of use are violated, the university may be penalized
such as receiving usage restrictions. Therefore, please carefully
observe the terms of use. Unintended downloading of large
amounts of data can occur accidentally due to browser expansion
functions, and this has resulted in suspension of services.
Therefore, when using an electronic journal, make sure lump
download and preview functions are turned OFF.
Even by hand, downloading massively in a short time may be
10.3.2. User Authentication and Procedure for
considered an inappropriate use, and causes suspension too.
Agreement
"Downloading" means to display indexes and abstracts of journal
In order to use electronic journals and databases, you should be
articles as well as full-texts. Please avoid excessive use of these
authenticated by your ECS-ID for user authentication
contents in a short time.
① When you use an electronic journal or database, the
10.3.4. Common Questions about the Authentication
authentication window will appear. Input your ECS-ID and
System
password.
Refer to the following URL.
•
Electronic Journal / Database Authentication System FAQ
(Inside the University Only)
http://edb.kulib.kyoto-u.ac.jp/lusr/qa.html
10.3.5. Using outside of the University
② Then, the usage agreement screen will appear. Carefully
read the contents of this screen, and if you agree, you will be
able to access electronic journals and databases. This usage
agreement procedure only needs to be done one time. It will not
be displayed the next time you use it.
According to terms of use, using electronic journals or databases
is primarily limited to University facilities. However, some
publishing companies allow access from outside of the university
(remote access). For more information about the KUINS-PPTP
connection (provided by the IIMC), refer to "6.1. Connecting
Using KUINS PPTP connection service from University Wireless
LANs and Outside of the University" (28p) or go to the following
URL.
•
[IIMC] → [Services] → [Network Management services] →
[Services lineup] → [PPTP connection service]
http://www.iimc.kyoto-u.ac.jp/en/services/kuins/
lineup/pptp.html
62
11. Kyoto University Cyber Learning Space "PandA"
11.1. About PandA
Kyoto University Cyber Learning Space PandA is a Course Management System(CMS) of Kyoto University. You can access PandA by a PC
in our campus, your PC at your home, or your smartphone (under construction). In PandA, you can download materials and submit your
work. Furthermore, you may use PandA in your class for your further study for your class or at home.
The Name "PandA": We renew the CMS system at Kyoto University course for the 2013 academic year. "PandA (People and Academe)"
has chosen as a nickname of the new CMS from public contribution. The concept of PandA is "Environment for Self
awareness and Learning."
11.2. Recommended Environment
PandA can be accessed using a web browser. The followings are the currently recommended environment. In using your own
computer, please make sure that you meet the requirements.
*It is possible to access and log in even if the recommended environment is not met, but problems may occur during usage.
*Internet Explorer 6 or later
*Mozilla Firefox 15 or later
Access from Smart Phone is also available, but you can not use some functions.
Using Kyoto University Cyber Learning Space "PandA"
63
11.3. Logging In
Access : https://panda.ecs.kyoto-u.ac.jp/portal/ and you will see the following screen. Click on "Login" on the top right of the screen.
Currently access from the Portal for All Students (https://student.iimc.kyoto-u.ac.jp) is not supported.
Enter your ECS-ID or registered E-mail address and password, and then click " ログイン " to log in.
At your first login, the tutorial demonstrates the general method to use PandA.
Tutorial
You can check the tutorial when you log in PandA first time. Please read the tutorial and understand the basic manipulation. The tutorial
will not appear from the second time. If you want to check the tutorial, please click doll icon on left side of the login button.
When you log in, you will see PandA start page called "My Workspace" that displays the links for the sites corresponding to your
registered courses as tabs across the top of the screen. You can access the site of lecture courses from the links.
64
11.4. Getting started
11.4.1 My workspace You can use personal page called "My Workspace" in PandA. My Workspace is a place where you can upload your documents, create
new sites, maintain a schedule, store resources, and much more.
*To organize the Course Tabs
You can organize the Course Tabs at " 設定 (Preferences)" of the menu of My Workspace.
* To select language
Click " 設定 (Preferences)" in the menu of My Workspace. " 設定 (Preferences)" page will appear.
Click " 言語 (Language)" button, select " 英語(アメリカ合衆国)" and click " 設定を更新 (Update Preferences)" to change language.
11.4.2 To join available course sites
In My Workspace, click " メンバシップ (Membership)" at the menu and select " 参加可能サイト (Joinable Sites)".
Using Kyoto University Cyber Learning Space "PandA"
65
Click " 詳細(More)" to get full information about the course.
Click " 参加(Join)" under the name of the course you want to
register for.
66
11.4.3 Screen Overview
Menu
Course Tab
Course Tab
The black tab located on the top of the screen and the right side of "PandA" logo is called "Course Tab". The column along the left of the
screen, which contains links to numerous collaborative tools, is called "Menu-bar".
Using Kyoto University Cyber Learning Space "PandA"
The names of courses you are taking are displayed on Course Tab. When you take many courses, the rest of the courses are bundled on
the "More Sites" on the right side of top bar. You can open the course tabs to click "More Sites".
We have three types of courses which are displayed on Course Tabs on PandA.
The names of courses you take are displayed on Course Tab…
(1) Courses automatically appears if you register for it in KULASIS.
(2) Courses you applies registration in PandA.
(3) Courses your instructors register you.
If you can not find the course tab you registered, check the type of the course and take the appropriate action.
We call the left side of the screen "Menu"
Course sites
Clicking a course tab, the corresponding course site will be displayed. Although the contents of menu may not be same by a course, there
is always "Dashboard" on the menu. You can check the information of courses on Dashboard.
67
Dashboard
You can check new information on the dashboard. Please check dashboard when you log on PandA.
11.4.4 Site
PandA manages all the materials of a course by a lecture unit called "site".
In each site, you can download resources, submit and re-submit your assignments. You will see your registered courses on "Course Tab"
automatically because teachers will register the students as roaster. If it is not listed, please contact the person in charge of your courses.
68
11.5. Resources
Materials and handouts used in the courses are called
"Resources".
When you click Resources in a site's menu, you will see a list of
that site's Resources items.
Click the title of an item to open it. To save an item on your
computer, Fill out filename in "Save As…" dialog and save it on
your computer.
Using Kyoto University Cyber Learning Space "PandA"
69
11.6. Assignments
You can submit/resubmit your assignments and can check your instructor's feedback on your assignment.
11.6.1. Submitting Assignments
The following will explain how to submit your assignments
such as essays and files on PandA.
Click the course name at Course-Tab.
Click the assignment you want to submit.
You see the descriptions of the assignment. Following the
requirement, answer or attach your files, and click the submit
button.
70
11.6.2. Resubmitting Assignments
The following will explain how to resubmit your assignments .
You can check status of your submitted assignments. When your
instructor finished grading your assignment, it will be displayed
"Graded" on the menu.
If you are required to resubmit the assignment, you can resubmit
it in the same ways as submitting.
Using Kyoto University Cyber Learning Space "PandA"
You can check a your instructor’ s feedback.
71
72
Appendix
Appendix
73
Appendix -1. FAQ
Frequently Asked Questions are posted on the following website.
http://www.iimc.kyoto-u.ac.jp/en/faq/
If you have a question, please read the FAQ section first and it will give you answers for most questions.
The following are some of the FAQs posted on the website. If you do not find the answer to your question after reading the FAQ section,
you can ask one of the TAs at the Media Center South Building OSL.
Questions About E-mail
[Q] Where can I access Kyoto University Mail for Students and
・For Linux
Researchers?
Firefox 12 or later
[A] At the following URL http://mail.st.kyoto-u.ac.jp/
Google Chrome 18 or later
( As of February 14th, 2014 )
[Q] I forgot my e-mail address. What should I do?
[A] You can login the KUMOI using your ECS-ID. Login from the
[Q] Can I use e-mail software other than Kyoto University Mail
for Students and Researchers?
URL shown above, then your e-mail address is displayed in
upper right corner.
[A] Please refer to “8.7. When using other e-mail software.”
[Q] Why do I receive so much junk e-mail?
[A] When the university e-mail address is used for research, it
is common to receive about 50 to 100 e-mails a day. When
you post your e-mail address on a webpage, it is better to
convert your e-mail address to an image in order to reduce
the number of junk e-mails. You may still receive junk e-mails.
[Q] I can not log in to the Student e-mail service (KUMOI). What's
the problem?
Student mail (KUMOI) has a function for sorting junk e-mails
automatically to the SPAM folder. [A] Make sure that your ECS-ID and password are correct. The
If you do not need to use your university e-mail address, you
password is case-sensitive, so make sure you are using the
can use another e-mail address from another client such as
correct case for each letter.
Hotmail, Yahoo! Mail, and Gmail.
When you change the password of ECS-ID, you can not log
in at most for one hour. It takes about an hour for all systems
[Q] Can I change my e-mail address in this mail service?
to set your new password. If you can not log in, please log in
[A] Your e-mail address is made automatically, and you can not
again after a while. About changing your password, please
change your e-mail address. However, in cases of changing
refer to "3.2 Changing Your Password."
your name (for example, you get married), being harassed
If you still can not log in to Student e-mail service (KUMOI),
by a stalker, or clear mistakes and improperness in your
please bring your Student ID card and inquire to Information
e-mail address, you can change your e-mail address. You
Environment Support Center, Academic Center for Computing
should also read "Appendix 3. Troubleshooting". If you want
and Media Studies, Kyoto University.
to change your e-mail address, please bring your Student ID
card and inquire to Information Environment Support Center,
[Q] Which web browsers can I use for Kyoto University Mail for
Students and Researchers?
[A]・ For Windows
Internet Explorer 9
Internet Explorer 10
Firefox 12 or later
Google Chrome 18 or later
・For Mac OS X
Safari 5.1 or later
Firefox 12 or later
Google Chrome 18 or later
74
Academic Center for Computing and Media Studies, Kyoto
University.
Questions About Windows 7
[Q] Can I write CDs and DVDs?
[A] No. You cannot write CDs and DVDs in PC terminals of the
Education Computer System.
[Q] Why does “プログラムの機能 (Programs and Features)” not
appear in the Control Panel?
[A] You cannot use “プログラムの機能 (Programs and Features).”
You are not allowed to or delete any software. The
[Q] Can I use a floppy disk?
Educational Computer System computer terminals are used
[A] No. You cannot use floppy disks on PC terminals of the
by many people, so you must not change the settings.
Educational Computer System. Please use USB memory disks
to save data.
[Q] When I turn on a PC terminal for self-study, the following
message appears: 'Non-system disc or disc error replace and
[Q] Can I access files that I have saved in My Documents (the M
drive) from my home or laboratory?
strike any key when ready.'
[A] This message occurs when the network cable becomes
[A] No. You can only access these files from PCs in the
disconnected. After taking out and reinserting the network
Educational Computer System. Please copy the files onto a
cable on the back of the terminal, try turning on the power
USB memory drive and take them home or to your laboratory.
again for the PC terminal.
[Q] I'd like to listen to audio...
[Q] The PC terminal I am using seems to be broken.
[A] Please bring headphones, and you can listen to audio. In
[A] Confirm the number written on the yellow seal on the back
addition, please be careful about the volume of the audio you
of the terminal under the Hitachi logo (in the pattern PC-XX-
listen to on your headphones.
YYY). Contact us and tell us what problem you are having
with the PC.
Please contact here to report this problem.
https://www.iimc.kyoto-u.ac.jp/en/inquiry/
Questions About Linux
[Q] Why does an error occur when the LaTeX command is used?
[A] The Japanese LaTeX source can be compiled by the platexutf8 or platex command. Use the xdvi command as the
previewer for dvi files, and use the dvips command for
[Q] Why is “command not found” displayed when I execute
mule?
[A] You cannot use mule. There is a similar editor available
with emacs.
converting to PostScript.
Questions About Printing
[Q] How many sheets can I print?
[Q] Can I delete the ECS-ID ?
[A] You can print up to 200 sheets in a academic year. For
[A] No. The ECS-ID are printed automatically at the bottom left
of the page. This is for identifying who is printing.
Appendix
more information, refer to “Printing Limitations” in “4.7.2
Limitations on Usage Amounts.”
[Q] Why can only I not print?
[Q] The printer is out of paper. What should I do?
[A] You probably have reached your maximum number of
[A] If you are at the Media Center South Building OSL, ask a TA
sheets for the year. You can confirm this by clicking the
for paper. At other OSLs or satellite laboratories, go to the
“Usage Information” icon on the desktop of the Educational
department office to get paper and input it to the printer.
Computer System computer terminals.
[Q] The printer has run out of toner. What should I do?
[A] Inform the office of the OSL or satellite laboratory and
following their directions.
[Q] Can I print in sizes other than A4?
[A] No, you cannot print in sizes other than A4.
75
Other Questions
[Q] I forgot my ECS-ID. What should I do?
[A] You can no longer use your ID once you are no longer a
[A] Bring your student ID card or Faculty ID card to the Media
member of Kyoto University. For example, if you graduate
Center South Buildings Information Environment Support
(or resign or transfer) in March, your privileges will expire on
Center, and follow the procedures.
March 31st. If you have necessary files and e-mails, please
copy them by yourself by the end of that period.
[Q] I forgot my password. What should I do?
[A] Bring your student ID card or Faculty ID card to the Media
Center South Buildings Information Environment Support
[Q] My activation key has expired. What should I do?
Center, and follow the procedure.
[A] Your activation period can be put off, so bring your student
Office hours are weekdays from 10:00am to 5:00pm.
ID card or faculty ID card to the Media Center South Building
Your password will be reset and a new activation key will be
Information Environment Support Center and complete the
procedure.
given to you.
[Q] I have advanced in the university. How can I change the
[Q] The computer terminal or printer does not work. What
should I do?
status of my ID?
[A] An e-mail about changing the status of IDs will be sent all
[A] If the computer terminal does not work, give the computer
users via Student mail (KUMOI) around June. This e-mail will
number (such as PCXXY-XXX) on the yellow sticker on
explain how to change the status of your ID.
the upper-part of one on the front of the main body of the
computer, and explain the situation based on “Appendix 3.
[Q] I failed to advance in the University. How can I get an
Troubleshooting.” If a printer does not work, give the satellite
extension for my ID?
name and explain the problem.
[A] You do not need to do anything. You can continue using
your ID.
[Q] Why can't I connect to the PPTP / LAN / SSH?
[A] Ask questions related to the setting and other questions to
KUINS(http://www.iimc.kyoto-u.ac.jp/en/services/kuins).
[Q] I graduated (or resigned). How long can I use my ID?
76
Appendix 2. Tips
In addition to items explained in the usage guidelines, there are other convenient functions available through computers and the
network. To improve your information literacy, the following will explain frequently used functions.
You can also read the latest information from the IIMC website(http://www.iimc.kyoto-u.ac.jp/ja/services/ecs/support/mame.html)
◆ To Use Electronic Journals:
◆ Sending Large Size Files Via E-mail
→ Refer to "10.2. Using Electronic Journals・Database"(82p) or
→ If you send large-size files that are over 5MB via e-mail, the
Go to the Kyoto University Library Network website
(http://www.kulib.kyoto-u.ac.jp/).
receiver may not be able to open the file. When sending large
files, there are several methods available such compression
software to minimize file size, and internet services for
◆ To Use Kyoto University Open Courseware (OCW):
→Go to the Kyoto University Open Courseware website
(http://ocw.kyoto-u.ac.jp/).
transferring large files.
To compress a file using an Educational Computer System
computer terminal (Windows 7), right-click on the file or
folder, then click " 送る (Send To)" → " 圧縮 (zip 形式 ) フォル
◆ To Acquire an E-mail Address Other than Student mail (KUMOI)
ダ (Compressed (zipped) Folder)".
→ G et a free e-mail account through Yahoo! Mail, Gmail, or
You can also transfer a file using a file delivery service such
Hotmail. You can view, receive, and send e-mails from a web
as Takufairubin and Databin in order to upload a file to a site
browser using such e-mail accounts. However, these free
temporarily so that it can be downloaded by someone.
e-mail addresses are not appropriate for exchanging important
information.
◆ Installing Software to make computers more practical:
→ You are not allowed to install or uninstall software to
Educational Computer System computer terminals. There are
various free and paid software programs available online. You
can use such software on your own computer.
◆ Connecting to the Network through the University Wireless
LAN:
→ Use the wireless LAN access points in public areas at Kyoto
University. For more information, refer to "6. Connecting
Computers to the University Network".
Appendix
◆ Installing Antivirus Software on Your Own Computer:
→ In order to prevent the spread of computer viruses, it is
important to implement countermeasures for your own
computer to protect against viruses. Software such as Titanium
and Norton AntiVirus is effective. You can purchase such
antivirus software at electronics stores or over the internet.
You can also purchase a Symantec Endpoint Protection license
at a discount from the Lune Computer Store in the West
Building.
Y ou need to install and then update antivirus software to
prevent your computer from receiving a virus.
77
Appendix 3. Troubleshooting
This section will explain how to handle various problems.
3.1. If you are the victim of a crime,
disturbance, or harassment
2. Ask a TA
Teaching Assistants (TAs) are always available to speak with
at the Media Center South Building OSL. If you still have
questions after reading the FAQ section, clearly explain your
problem to one of the TAs. When asking a question, you need
Immediately contact someone using the contact information
to inform them of the computer terminal you were using, so be
on this page, or contact a TA at the Media Center South Building
sure to write down the computer terminal number along with
OSL. You will be helped by a qualified person such as a
the problem. The computer number (such as PCXXY-XXX) can
harassment counselor.
be found on the upper-part of the front of the main body of the
computer.
3.2. If a computer terminal or printer does
not work
Inform someone by sending an inquiry form at the Educational
Computer System webpage (https://www.iimc.kyoto-u.ac.jp/en/
inquiry/ ), and select “Computer / Terminal Usage (Educational
Computer System)” as the inquiry type.
Include the following information.
[For Computer Terminals]
Computer number (such as PCXXY-XXX) on the yellow sticker
below the USB port on the front of the main body of the
computer and explain the problem
[For Printers]
Terminal room name and problem
If you need to leave the computer, be sure to remember it.
3. Fill Out an Inquiry Form
Fill out the inquiry form at the Educational Computer System
webpage.
https://www.iimc.kyoto-u.ac.jp/en/inquiry/
4. Look Up the Information by Yourself
If you are having a problem with application software (Word,
Excel, etc.), use a search engine such as Google to resolve the
problem by yourself, or read the manual for the application
online.
5. Read Reference Materials
In order to understand functions and operation methods, be
sure to read any available reference materials.
3.3. When you cannot use webmail (KUMOI)
Sometimes, service is stopped such as for maintenance.
Check the “Maintenance Information” and “Interruption
Information” at the following webpage.
http://www.iimc.kyoto-u.ac.jp/en
If there is no information available, fill out an inquiry
Contact
Address
Yoshida Nihonmatsu-Cho, Sakyo-Ku, Kyoto 〒 606-8501
Academic Center for Computing and Media Studies, Kyoto
form ( https://www.iimc.kyoto-u.ac.jp/ja/inquiry/ ) and select
University, South Building
“KUMOI(Kyoto University Mail for Students)” as the “Inquiry
Telephone
Type.”
075-753-9000 (Main)
For more details, refer to the following URL.
http://www.iimc.kyoto-u.ac.jp/en/services/ecs/contact.html
3.4. When you do not understand how to
use something
1. Read the FAQs
First of all, read the FAQ section in the user guidelines.
It contains easy-to-understand answers to common questions.
The online FAQ section at the following webpage is always
updated, so be sure to check there as well.
http://www.iimc.kyoto-u.ac.jp/en/faq/ecs/
78
付録 -4.1. 京都大学情報環境機構教育用システム及び学術情報ネットワークシステム利用規程
平成 24 年 4 月 27 日
情報環境機構長裁定制定
第 1 条 この規程は、京都大学情報環境機構(以下「機構」とい
う。)が、管理及び運用する全学の情報基盤に基づく学内共同利
用の教育用コンピュータシステム(以下「教育用システム」とい
「KUINS 接続技術責任者」という。)に対して、その旨を通知する
ものとする。
第 9 条 機構長は、KUINS 接続者又は KUINS 接続技術責任者に
対し、KUINS の接続機器の状況について報告を求めることができ
る。
う。)及び学術情報ネットワークシステム(以下「KUINS」という。)
第 10 条 KUINS に機器を接続する場合、次の各号に掲げる地点
の利用に関し必要な事項を定めるものとする。
を責任分界点とする。
第 2 条 教育用システムを利用することのできる者は、次の各号
に掲げる者とする。
(1) 本学の学生
(2) 本学の教職員
(3) その他機構長が必要と認めた者
(1) グローバル IP アドレスの KUINS(次条において「KUINS Ⅱ」
という。)においては、機構設置のネットワーク機器の端子
(2) プライベート IP アドレスの KUINS(次条において「KUINS Ⅲ」
という。)においては、機構設置の情報コンセントの端子
第 11 条 部局情報セキュリティ技術責任者は、前条に定める責
任分界点に何らかの機器又は配線を接続する場合は、次の各号に
第 3 条 教育用システムを利用しようとする者は、所定の手続き
掲げる者を選出し、機構長に届け出なければならない。
を経て、機構長の承認を得なければならない。
(1) KUINS Ⅱにおいては、サブネット連絡担当者
2 機構長は、教育用システムの運用上必要があるときは、教育
(2) KUINS Ⅲにおいては、VLAN 管理責任者
用システムの利用を承認した者(以下「利用者」という。)に対して、
第 12 条 KUINS 接続者が、KUINS に機器を接続する必要がなく
その利用について条件を付することができる。
なったとき又は利用資格がなくなったときは、速やかに機構長及
第 4 条 機構長は、利用者に対し、その利用の状況について報告
び KUINS 接続技術責任者にその旨を届け出なければならない。
を求めることができる。
第 13 条 KUINS に接続された機器を管理している者は、機構が
第 5 条 機構のサテライト(機構が部局に計算機システム又は遠
提供するサービスを受けることができる。
隔講義システム等の機器を設置する施設をいう。以下この条にお
いて同じ。)の設置を希望する部局の長は、あらかじめ機構長に
その設置を申請するものとする。
第 14 条 機構が提供するサービスの内容は、別に機構長が定め
る。
2 サテライトの設置及び改廃に関し必要な事項は、機構長が定
第 15 条 機構長は、KUINS 接続者又はこれに代わる者に対して、
める。
その接続に係る経費の一部を、KUINS 利用負担金として負担する
3 サテライトの管理及び運用は、当該部局の長が行うものとす
ことを求めることができる。
る。
2 KUINS 利用負担金の額及びその負担方法は、別に機構長が定
4 サテライトの使用に関し必要な事項は、当該部局の長と協議
める。
のうえ機構長が定める。
第 16 条 利用者及び KUINS 接続者は、申請書に記載した事項に
第 6 条 機構長は、利用者が所属する部局に対して、その利用に
ついて変更しようとするとき又は変更が生じたときは、機構長が
係る経費の一部を教育用システム利用負担金として負担すること
別に定めるところにより、速やかに、機構長に届け出、又は再申
を求めることができる。
請しなければならない。
2 教育用システム利用負担金の額及びその負担の方法は、別に
第 17 条 利用者及び KUINS 接続者は、機構の機器その他の設備
機構長が定める。
をき損し、又は図書を紛失、汚損したときは、速やかに機構長に
第 7 条 学術情報等の発着信のため、KUINS に機器を接続する
めの通信が KUINS を通過するものを含む。)ことのできる者は、
次の各号に掲げる者とする。
(1) 本学の教職員
(2) その他機構長が必要と認めた者
2 機構長は、き損、紛失又は汚損した者には、弁償を求めるこ
とができる。
第 18 条 教育用システム及び KUINS について、この規程又はこ
の規程に基づく定めに違反した者その他機構の運営に重大な支障
を生じさせた者があるときは、機構長は、その教育用システムの
利用承認若しくは KUINS の接続承認を取り消し、又は一定期間
第 8 条 あらかじめ所属する部局の部局情報セキュリティ技術
の利用停止若しくは接続遮断を行うことができる。
責任者(京都大学の情報セキュリティ対策に関する規程(平成
第 19 条 この規程に定めるもののほか、機構の利用に関し必要
15 年達示第 43 号)第 5 条の 2 第 1 項に定めるものをいう。以
な事項は、機構長が定める。
下同じ。)の同意を得たうえで、所定の申請書を機構長に提出し、
その承認を受けなければならない。
2 機構長は、前項の接続申請を承認したときは、KUINS の接続
を承認した者(以下「KUINS 接続者」という。)及び当該 KUINS
接続者の所属する部局の部局情報セキュリティ技術責任者(以下
Appendix
(KUINS 管理下以外の機器に接続する場合であっても、利用のた
届け出なければならない。
附則
1 この規程は、平成24年5月1日から施行する。
2 この規程施行前に京都大学情報環境機構教育用コンピュータ
システム及び学術情報ネットワークシステム利用規程(平成17
年達示第15号)に基づき、利用承認を受けた者は、この規程に
基づき利用の承認があったものとみなす。
79
付録 -4.2. 京都大学情報環境機構教育用システム利用心得
1. 京都大学情報環境機構(以下、機構という)の教育用システム
ドを適時変更することが含まれる。利用者は利用に際して、機構
の利用を承認された者(以下、利用者という)は利用に際して、
職員および機構が教育用システムの管理を委託した者の指示に従
関連法令を遵守しなければならない。利用者は利用に際して、他
わなければならない。
人のプライバシーおよび人格を尊重しなければならない。
3. 利用者は、機構の教育用システムによるサービス提供の目的に
利用者は利用に際して、他人の著作権およびその他の知的財産権
かなうように利用し、それを営利目的で使用してはならない。
を尊重しなければならない。
4. 利用者は利用に際して、機構の教育用システムを構成する計算
利用者は利用に際して、京都大学の定めるセクシャルハラスメン
機のハードウェア、ソフトウェアおよび装置を毀損、破壊または
ト等に関する方針を遵守しなければならない。利用者は利用に際
改変してはならない。
して、京都大学の定める大学における言論に関する方針を遵守し
5. 利用者は、機構の教育用システムを使用して、利用を承認され
なければならない。
ていない学内外の計算機に対して利用を試み、または、そのハー
2. 利用者は利用に際して、利用者本人の氏名を用いなければなら
ドウェア、ソフトウェアを毀損、破壊または改変してはならない。
ず、他人の氏名または架空の人物の氏名を用いてはならない。利
6. 教育用システムの利用にあたり故意または過失により教育用
用者は、電子メールアドレスなど連絡方法を明示して利用しなけ
システムを構成する計算機組織に損害を生じさせた利用者は、そ
ればならない。
れによって生じた損害を賠償する責任を負う。機構のサービス提
利用者は他人にその利用者コードを使用させ、または、他人の利
供を妨害した利用者は、それによって生じた損害を賠償する責任
用者コードを使用してはならない。
を負う。
利用者は機構が定めるパスワードに関する指針を遵守しなければ
7. 利用者は、京都大学情報環境機構利用規程およびそれに基づい
ならない。この指針には、パスワードを秘匿することと、パスワー
て定められる規則を遵守しなければならない。
付録 -4.3. 京都大学全学情報システム利用規則(抜粋)
〔平成 22 年 1 月 12 日情報担当理事裁定〕
(目的)
学情報システム並びに特定部局情報システムへの全学アカ
第1条 本規則は、京都大学の情報セキュリティ対策に関する規
ウントによる主体認証を伴ってのアクセスを行ってはなら
程(平成 15 年 10 月 21 日達示第 43 号制定)第 2 条第 5 号に基
ない。
づき、京都大学情報セキュリティ対策基準(平成 21 年 3 月 2 日
(6)全学アカウントを他の者に使用され又はその危険が発生した
情報担当理事裁定)第 4 条により指定された全学情報システムの
際には、直ちに情報環境機構長にその旨を報告しなければ
利用に関する事項を定め、京都大学(以下「本学」という。
)に
おける情報セキュリティの確保と情報システムの円滑な利用に資
することを目的とする。
2 全学情報システムの利用目的は以下とする。
ならない。
(7)姓名の変更等全学アカウントの変更が必要になった際は、遅
滞なく情報環境機構に届け出なければならない。
(8)全学情報システムの利用資格を喪失した際又は利用する必要
(1) 本学の教育・研究活動のほか国立大学法人法(平成 15 年 7
がなくなった際は、遅滞なく情報環境機構に届け出なけれ
月 16 日法律第 112 号)に基づき本学が行う業務
ばならない。ただし、個別の届出が必要ないと、あらかじ
(2) その他情報環境機構長が特に認めたもの
(全学アカウントの申請と交付)
め情報環境機構が定めている場合は、この限りでない。
(全学アカウントの一時停止と復帰)
第4条 全学情報システム又は特定部局情報システムを、全学ア
第 13 条 情報環境機構長は、第 7 条及び第 8 条第1号、第2号、
カウントによる主体認証を伴って利用する利用者等は、情報環境
第3号に該当する全学アカウントを発見したとき、又は主体情報
機構長が別途定める手続きにより、申請を行い情報環境機構から
が他者に使用され若しくはその危険が発生したことの報告を受け
全学アカウントを取得しなければならない。
たときは、全学アカウントにより主体認証を行っている全学情報
(全学アカウント利用の遵守すべき事項)
システム並びに第 19 条第 1 項に基づき統合認証システムと接続
第8条 利用者等は、全学アカウントの利用に際して次の各号を
されている部局情報システムの全部又は一部へのアクセス制限を
遵守しなければならない。
行い、その旨を該当する全学アカウントを利用している利用者等
(1)自分の全学アカウントを他の者に使用させたり、他の者の全
学アカウントを使用したりしてはならない。
(2)他の者の主体認証情報 ( パスワード ) を聞き出したり使用し
たりしてはならない。
(3)主体認証情報(パスワード)は、情報環境機構長が別途定め
の所属する部局情報セキュリティ責任者に報告するものとする。
2 部局情報セキュリティ責任者は、前項の措置の報告を受
けたときには、速やかにその旨を利用者等に通知するものとする。
ただし、電話、郵便等の伝達手段によっても通知ができない場合
はこの限りでない。
る利用者パスワードガイドラインに従って適切に管理しな
3 全学アカウントの一時停止あるいはアクセス制限を受け
ければならない。
た利用者等が、全学アカウントの復帰を希望するときは、その旨
(4)利用者等は、主体認証を伴って全学情報システム又は特定部
80
(5)学外の不特定多数の人が操作(利用)可能な端末を用いて全
を情報環境機構長に申し出るものとする。
局情報システムへアクセス中の利用者端末において、他の
4 情報環境機構長は、前項の申し出を受けたときは、当該
者が無断で画面を閲覧・操作することができないように配
の全学アカウントの確認を行った後、速やかに全学アカウントの
慮しなければならない。
復帰を行うものとする。
付録 -4.4. 京都大学情報環境機構教育用システムにおける個人情報の保護
平成19年3月12日
4. 教育用システムの利用記録の取得とその利用目的
1. 個人情報について
教育用システムでは、利用者によるシステムの利用に関して以
利用者からの教育用システムの利用コードの交付申請
下の事項について利用コードおよび時刻情報を含めて利用記録を
・登録などに際して収集した特定の個人を識別しうる情報を対
取得します。
象とします。情報環境機構は個人情報の保護に関して「独立行政
・端末へのログイン・ログアウト、メールシステムへのログイン・
法人等の保有する個人情報の保護に関する法律」及び関係法令な
ログアウトなど利用者の利用コードとパスワードを用いて行われ
らびに「京都大学における個人情報の保護に関する規程」等の京
る利用者の認証記録
都大学の定める個人情報保護の方針に則って業務を行います。
・教育用システムの電子メールシステムにおける電子メールの
2. 利用コードの交付等申請時に取得する個人情報の利用目的
送信と受信
教育用システムの利用コードの交付、継続、停止、再開などの
・教育用システムの端末からの Web サイトのアクセス
申請時に取得する個人情報の利用目的は以下のとおりです。
これらの利用記録は以下の目的のために利用します。
・教育用システム、語学学習システムなど情報環境機構で提供し
(1) 利用者自身のご利用上の問題解決の支援
ているサービスのご利用に関しての利用者 (2) 教育用システムの運用の改善
ご本人への連絡(学部、研究科等京都大学各部局の保有する個
(3) 関係法令、本学関係規程ならびに教育用コンピュータシステ
人情報と結合することにより連絡先を得て利用することがありま
ム利用心得遵守の確認のため
す。)
(4) 統計データ
・利用コードなどのご本人自身による照会に際してのご本人の確
5. 個人情報の安全確保、利用、提供、開示、訂正並びに利用停止
認
収集した個人情報の安全確保、利用、提供、開示、訂正並びに利
・統計データの作成
用停止については「京都大学における個人情報の保護に関する規
3. 教育用システムの利用コードとパスワードの利用目的
程」に則して取り扱います。
教育用システムの利用コードとパスワードは本学が提供する教
育研究その他業務のためのサービスにおいて、これらの組み合わ
せにより利用者個人を認証するために利用します。利用者個人の
認証に際しては、サービスの必要に応じ氏名など利用者個人を特
定する情報と結合することがあります。
「京都大学における個人情報の保護に関する規程」
(抜粋)
情報の復元又は判読が不可能な方法により当該情報の消去又は当
い、滅失又はき損の防止その他保有個人情報の適切な管理のため
該媒体の廃棄を行うものとする。
に必要な措置を講じるとともに、必要に応じ、保有個人情報の利
5 保有個人情報が京都大学の情報セキュリティ対策に関
用者の制限、保有個人情報の取扱いに関する必要な指示その他の
する規程(平成十五年達示第四十三号)第三条第三号又は第四号
合理的な安全対策を講じるものとする。
に該当する場合、当該保有個人情報の漏えい、滅失又はき損の防
2 保有個人情報は、前項の利用者の制限を受けていない
止その他の管理は、前各項に定めるもののほか、同規程の定める
職員等が利用する場合に限り、取り扱うことができる。ただし、
ところによる。
次の各号に掲げる行為については、保護管理者の指示に従い取り
利用及び提供の制限
扱うものとする。
第十三条 職員等は、法令に基づく場合を除き、利用目的以外の
一 保有個人情報の複製
目的のために保有個人情報を自ら利用し、又は提供してはならな
二 保有個人情報の送信
い。
三 保有個人情報が記録されている媒体の外部への送付又は持ち
2 前項の規定にかかわらず、職員等は、次の各号のいず
出し
れかに該当し、かつ、当該保有個人情報を利用目的以外の目的の
四 その他保有個人情報の適切な管理に支障を及ぼすおそれのあ
ために自ら利用し、又は提供することによって、本人又は第三者
る行為
の権利利益を不当に侵害するおそれがないと認められるときは、
3 職員等は、保護管理者の指示に従い、保有個人情報が
利用目的以外の目的のために保有個人情報を自ら利用し、又は提
記録されている媒体を定められた場所に保管するとともに、必要
供することができる。
があると認めるときは、耐火金庫への保管、施錠等を行うものと
一 本人の同意があるとき、又は本人に提供するとき。
する。
二 本学の業務の遂行に必要な限度で保有個人情報を内部で利用
4 職員等は、保有個人情報又は保有個人情報が記録され
する場合であって、当該保有個人情報を利用することについて相
ている媒体(端末及びサーバに内蔵されているものを含む。)が
当な理由のあるとき。
不要となった場合には、保護管理者の指示に従い、当該保有個人
三 行政機関(行政機関の保有する個人情報の保護に関する法律
Appendix
第十一条 保護管理者は、当該部局における保有個人情報の漏え
81
(平成十五年法律第五十八号)第二条第一項に規定する行政機関
は、所定の開示請求書を開示窓口に提出して行わなければならな
をいう。以下同じ)、他の独立行政法人等、地方公共団体又は地
い。
方独立行政法人に保有個人情報を提供する場合において、保有個
2 前項の開示請求書の提出に際しては、法第十三条第二
人情報の提供を受ける者が、法令の定める事務又は業務の遂行に
項に定める書類を提示し、又は提出しなければならない。
必要な限度で提供に係る個人情報を利用し、かつ、当該個人情報
3 第一項に定める開示窓口は総務部広報課に置く。
を利用することについて相当な理由のあるとき。
訂正請求
四 前3号に掲げる場合のほか、専ら統計の作成又は学術研究の
第三十二条 法第二十七条の規定に基づき、保有個人情報の訂正
目的のために保有個人情報を提供するとき、本人以外の者に提供
(追加又は削除を含む。以下同じ)を請求しようとする者(以下「訂
することが明らかに本人の利益になるとき。
正請求者」という)は、所定の訂正請求書を開示窓口に提出して
その他保有個人情報を提供することについて特別な理由のあ
行わなければならない。
るとき。
2 前項の訂正請求書の提出に際しては、訂正請求者は、
3 前項の規程は、保有個人情報の利用又は提供を制限す
法第二十八条第二項に定める書類を提示し、又は提出しなければ
る法令の規定の適用を妨げるものではない。
ならない。
4 総括保護管理者は、個人の権利利益を保護するため特
利用停止請求
に必要があると認めるときは、保有個人情報の利用目的以外の目
第三十九条 法第三十六条の規定に基づき、保有個人情報の利用
的のための本学の内部における利用を特定の職員等に限るものと
の停止、消去又は提供の停止(以下「利用停止」という。)を請
する。
求しようとする者(以下「利用停止請求者」という)は、所定の
開示請求
利用停止請求書を開示窓口に提出して行わなければならない。
第二十条 法第十二条の規定に基づき、保有個人情報の開示を請
2 前項の利用停止請求書の提出に際しては、法第三十七
求しようとする者(以下「開示請求者」という。)
条第二項に定める書類を提示し、又は提出しなければならない。
付録 -5.1. 京都大学における情報セキュリティポリシーについて
平成21年4月
ジに掲載していますので、ご参照ください。
京都大学の学生、教職員 各位
情報セキュリティ対策室
京都大学における情報セキュリティポリシーについて
http://www.iimc.kyoto-u.ac.jp/ja/services/ismo/
情報環境部情報基盤課情報セキュリティ対策室
京都大学における情報セキュリティの基本方針
インターネットをはじめとする情報通信技術の発達は、私たちに
多くの利便性をもたらしました。生活のあらゆる場面で、情報は
〔平成14年12月17日部局長会議了承〕
1.セキュリティの基本方針
誰でも自由に簡単に取り扱うことができ、電子媒体に保存可能な
京都大学が高度な学術研究活動、教育活動、社会貢献活動、及
ものであれば、簡単に誰とでも情報の交換を行うことが可能で、
び業務運営等を安定的かつ効率的に展開するためには、電子情報
教育・研究活動のうえでも欠くことのできない基盤となっていま
が持つ情報セキュリティ上の脆弱性を十分認識し、情報セキュリ
す。 しかし、その反面、コンピュータウィルスや不正アクセス
ティの確保及びそのための情報システムの整備が不可欠である。
による被害、サイバーテロの危険性、個人情報の漏洩など、大き
本学においては、教職員及び学生等の全構成員が情報システム及
な社会問題が生じてきており、対処が求められています。学術情
び情報セキュリティの重要性を認識し、教育研究組織の自治を尊
報システムやネットワークをこれらの脅威から守り、安全性と信
重しつつ情報資産の円滑な運用と保護に取り組むため、「政府機
頼性を確保すること、即ち、情報セキュリティを確保することが、
関の情報セキュリティ対策のための統一基準」(2007 年 6 月 14
情報通信社会におけるすべての人の共通の課題といえます。
日情報セキュリティ政策会議決定)を踏まえ、次の事項を内容と
京都大学においても、利便性に富み、なおかつ安全安心なネット
する情報セキュリティの基本方針(以下、「基本方針」という。)
ワーク環境を保証するため、
を規定する。また、今後の情報技術の進展に対応しつつ本基本方
針の持続的な見直しに努め、情報資産の高度活用に資するととも
○ 京都大学における情報セキュリティの基本方針
に人権を尊重した運営を行い社会的な説明責任に応えることを目
○ 京都大学の情報セキュリティ対策に関する規程
的としてセキュリティレベルの向上を図るものとする。
○ 京都大学情報セキュリティ対策基準
(1) 組織・体制
○ 京都大学情報資産利用のためのルール
京都大学が一体となって情報セキュリティ対策に取り組むための
責任ある組織・体制を構築し、その機能と責任を明確に規定する。
82
を定めています。これらの規則は、平成21年3月に改正され、
(2) 情報の格付けと管理
平成21年4月1日から実施されます。
本学の情報システムにおいて取り扱う多様な情報について、重要
これらのうち京都大学の構成員として、情報セキュリティに関し
な情報を重点管理しつつ公開にも努める視点から、重要度と公開
基本的に念頭においていただきたい規則を2つ掲載していますの
性に応じた情報の格付けに関する定義、情報の管理責任、及び管
で、ご一読願います。
理方法を規定する 。
なお、情報セキュリティに関する種々の情報を下記のホームペー
(3) 物理的セキュリティ
情報システムの設置場所について、不正な立入り、損傷及び妨害
から情報資産を保護するため、安全区域を設置するなどの物理的
クに接続する機器を含む。
【ポリシー】
なセキュリティ対策を規定する 。
本学の情報セキュリティ対策について、基本的な考えを総合的、
(4) 人的セキュリティ
体系的かつ具体的にまとめた京都大学における情報セキュリティ
情報セキュリティに関する責任者とその権限の範囲を明確にし、
の基本方針並びに本学の情報システムの情報セキュリティの維持
全構成員に基本方針の内容を周知徹底するなど、十分な教育及び
及び向上に関する事項を定めた京都大学の情報セキュリティ対策
啓発活動を図るための人的なセキュリティ対策を規定する 。
(5) 技術的セキュリティ
に関する規程から成る。
【実施規程】
外部からの不正なアクセス等から本学の情報資産を適切に保護す
本学の情報システムにおける情報セキュリティを確保するために
るため、情報ネットワークの管理、情報資産へのアクセスの制御
遵守すべき行為及び判断の基準を示す京都大学情報セキュリティ
等の技術的なセキュリティ対策を規定する 。
対策基準その他ポリシーに基づいて策定される規程、基準及び計
(6) 情報ごとのアクセス管理の体制及びシステムの整備
画をいう 。
上記の規定 (2) 及び (4) に関連して、格付けされた情報ごとにア
クセス権限を明確にし、統一的な権限管理並びにその整備システ
3.対象範囲
ムを規定する。
機密性:許可された者のみが情報にアクセスでき、一般には明ら
(7) 運用
かにしないことを確保すること。
基本方針の実効性を確保し、不正アクセスを防止するとともに、
完全性:情報及びその処理方法の正確さや完全である状態を安全
不正アクセスを通じた学外の情報システムへの攻撃等の悪用を防
防護すること。
止するため、基本方針の遵守状況の確認、情報ネットワークの監
可用性:許可された利用者が必要に応じて情報にアクセスできる
視等の運用面に関する
こと。
措置を規定する。また、情報セキュリティに係る緊急事態が発生
この基本方針の対象範囲は、本学で使用するハードウェア、ソ
した際の緊急時対応体制を明確に規定する 。
フトウェア、ネットワーク、記録媒体等の情報システム等(シス
(8) 評価・見直し
テム構成図等の文書を含む 。)及び全ての情報のうち、情報シス
基本方針及び情報セキュリティ対策の評価、情報システムの変更、
テムに電磁的に記録される情報、並びに全構成員及び委託事業者
新たな脅威の発生等を踏まえ、ポリシー及びそれに基づく実施規
とする。
程の点検・評価を定期的に実施して見直しを図ることとし、この
情報システム等:
ために必要な措置を規定する 。
ネットワーク機器(ルータ・ファイアウォール・ハブ・ケーブル
(9) 罰則
等)・サーバ・パソコン ( 本学のネットワークに一時的に接続さ
ポリシー及びそれに基づく実施規程等に違反した場合の利用の規
れる学外者のパソコンを含む)・基本ソフトウェア・応用ソフト
制及び罰則は、京都大学通則及び本学が定める就業規則に則って
ウェア・システム設定情報(パスワードファイル等)
・記録媒体(電
行うほか、別の規程に定めることができる。
子計算機や通信回線装置に内蔵される内蔵電磁的記録媒体、外付
けハードディスク・MO・FD・DVD・CD・USBメモリ・フラッ
2.定義
シュメモリ等の外部電磁的記録媒体)・システム構成図等
この基本方針の用語については、「 政府機関の情報セキュリティ
情報システムに記録される情報:
対策のための統一基準」が定める定義に準拠し、次のとおり定義
アクセス記録(ログ)・文書及び図面等の電磁的記録
する 。
これらの情報に接するすべての者:
【情報セキュリティ】
【情報資産】
役員・常勤職員・非常勤職員・学生(学部生・大学院生・その他
研究生や科目等履修生等の非正規生)・委託業者等
Appendix
情報資産の機密性、完全性及び可用性を維持することをいう 。
4.実施手順の作成
情報システムに記録された情報及び情報システムに関係がある書
この基本方針に沿った具体的な実施手順については、各部局にお
面に記載された情報であり、電磁的に記録された情報すべてを含
いて定めることとする。
む。書面に記載された情報には、電磁的に記録されている情報を
記載した書面(情報システムに入力された情報を記載した書面、
情報システムから出力した情報を記載した書面)及び情報システ
ムに関する設計書が含まれる。
【情報システム】
情報の作成、利用及び管理等のための仕組み(ハードウェア及び
京都大学情報資産利用のためのルール
〔平成19年9月4日部局長会議了承〕
第1章 総 則
(理念)
ソフトウェアからなる情報機器及び記憶媒体並びに有線又は無線
第1 京都大学の教職員および学生等は、本学の情報資産(京都
のネットワークをいう。)をいう。本学の情報システムとは、本
大学の情報セキュリティ対策に関する規程(平成 15 年達示第
学により所有又は管理されているもの及び本学との契約あるいは
43 号)第2条に規定するものをいう。以下同じ。)を利用するに
他の協定に従って提供されるものをいい、本学の情報ネットワー
当たり、教育・研究の自由と自主を基礎とした高い倫理性と社会
83
に対する強い責任感が求められる。このルールは、本学の基本理
念に定める自由と調和の精神にのっとり、情報資産の適正かつ円
第8 対策室は、苦情等及び対策室が検知した被疑行為に関する
滑な利用を確保することを目的とする。このルールの解釈適用に
情報を、情報ネットワーク倫理委員会(以下「倫理委員会」とい
おいては、日本国憲法の保障する学問の自由、表現の自由その他
う。)に通知する。
基本的人権を侵害することがあってはならない。
2 情報ネットワーク危機管理委員会は、被疑行為を認めた場合、
(定義)
倫理委員会に通知する。
第2 このルールにおいて、「本学」、「 情報資産 」、「 情報セキュ
3 倫理委員会は、被疑行為を認めた場合、関係する部局委員会
リティポリシー 」、「 部局 」、「教職員等」、「学生等」、「 部局情報
に通知する。
セキュリティ責任者 」、
「部局情報システム技術担当者」、「 情報
(倫理委員会への依頼)
ネットワーク危機管理委員会 」、
「情報ネットワーク倫理委員会」、
第9 部局委員会は、倫理委員会に対して、被疑行為を通知し、
「 部局委員会 」、「 監視 」、「 利用記録 」 とは、それぞれ京都大学
第10に規定する違反行為の調査若しくは第11に規定する違反
の情報セキュリティ対策に関する規程第1条、第2条各号、第5
行為への措置又はその両者を依頼することができる。
条、第5条の3、第7条、第7条の2、第8条、第11条及び第
(違反行為の調査)
12条に規定されたものをいう。
第10 被疑行為を認めた場合又は被疑行為の通知を受けた場合、
第2章 遵守すべき事項
関係する部局委員会は、すみやかに調査を行い、事実を確認する
(利用目的による規制)
ものとする。事実の確認に当たっては、可能な限り当該行為を行っ
第3 情報資産は、当該情報資産について定められた目的以外に
た者の意見を聴取する等、適正な手続を取らなければならない。
利用してはならない。
2 情報管理者及び部局情報システム技術担当者は、調査に協力
(情報の発信に対する規制)
しなければならない。部局委員会は、調査に必要な範囲で監視の
第4 次に掲げる情報の発信を行ってはならない。
記録及び利用記録の提出を求めることができる。
(1) 差別、名誉毀損、侮辱、ハラスメントにあたる情報の発信。
3 倫理委員会は、必要と認める場合、前2項に規定する調査を
(2) プライバシーを侵害する情報の発信。
行うことができる。倫理委員会は、調査の開始を関係する部局委
(3) 守秘義務に違反する情報の発信。
員会に通知するものとする。倫理委員会と部局委員会は、連携し
(4) 著作権等の財産権を侵害する情報の発信。
て調査を行うことができる。
(5) その他法令に基づく処罰の対象となり、又は損害賠償等の民
4 部局委員会が調査の終了を決定した場合、倫理委員会は当該
事責任を発生させる情報の発信。
部局に対する調査を行うことができない。
(情報機器の利用に対する規制)
第5 情報機器を利用して、次に掲げる行為をし、又はしようと
してはならない。
(1) 通信の秘密を侵害する行為。
(2) 情報セキュリティポリシーの規定に拠らずにネットワーク上
5 調査によって明らかとなった事実は、非公開とする。ただし、
法令に基づき開示が必要な場合は、この限りではない。
(違反行為への措置)
第11 第2章に規定する遵守すべき事項に違反する行為(以下
「違反行為」という。)が確認された場合、部局情報セキュリティ
の通信を監視し又は情報機器の利用情報を取得する行為。
責任者は、違反行為を行った者(以下「違反行為者」という。)
(3) アクセス制御(情報システムにアクセスする者に対してアク
に対して違反行為をやめるよう命ずることができる。ただし、緊
セスを許可する情報及びアクセスの種類を制限することをいう。)
急性が認められる場合、違反行為者が明らかでない場合、又は違
を免れる行為又はこれに類する行為。
反行為者が命令に従わない場合、部局情報セキュリティ責任者は、
(4) 管理者の要請に基づかずにセキュリティ上の脆弱性を検知す
違反行為に係る発信を防止する等の必要な措置をとることができ
る行為。
る。部局情報セキュリティ責任者は、遮断等を実施するために他
(5) 過度な負荷等により円滑な情報資産の利用を妨げる行為。
部局に協力を求めることができる。
(6) 上記の行為を助長する行為。
2 倫理委員会は、部局情報セキュリティ責任者に、前項に規定
(管理責任)
する命令又は措置を行うよう勧告することができる。
第6 情報管理者(情報を作成又は取得した教職員等をいう。以
3 倫理委員会は、必要と認める場合、第1項に規定する命令又
下同じ。)及び部局情報システム技術担当者は、第3、第4及び
は措置を行うことができる。ただし、緊急性が認められる場合を
第5に掲げた事項を遵守するために、情報資産の適切な管理を行
除き、部局情報セキュリティ責任者の意見を訊くものとする。
わなければならない。
4 部局情報セキュリティ責任者が命令又は措置を行い又は行わ
第3章 違反行為への対処
ないことを決定した場合、倫理委員会による命令又は措置は効力
(窓口の設置)
第7 第2章に規定する遵守すべき事項に違反すると疑われる行
為(以下「被疑行為」という。)に関する苦情その他連絡(以下
「苦情等」という。)を受け付けるため、情報環境部情報基盤課情
84
(被疑行為の通知)
を失う。
(違反行為者への措置)
第12 部局情報セキュリティ責任者は、違反行為者に対して、
指導等の適切な措置を講ずることができる。
報セキュリティ対策室(以下「対策室」という。)及び部局に窓
2 倫理委員会は、前項に規定する適切な措置について意見を述
口を置く。
べることができる。
Appendix 5.2 On taking e-Learning courses on Information Security
In Kyoto University, under the supervision of the University Information Security Committee, every member is obliged to take
e-Learning courses on Information security. All students and all faculty-members including staff, please take Information
security e-learning courses.
Information Security e-Learning materials
Students should take (1) and (2). After finishing your learning, you must take a final test. If you omit this final test, you are not
counted as e-learning finisher.
(1)
Rules on Information Systems use and information security
This is a material on security policy of Kyoto University and the information for how to use the university's
information systems.
(2)
Princess Rinrin
This is a material on Information ethics and security provided by National Institute of Informatics.
How to start and use e-learning
1.
Open a webpage of e-Learning
Access the following URL, and select 『Information
Security e-Learning』 page. If you are using a computer
3.
Authenticate via GakuNin (Shibboleth)
(1) Select 『京都大学』 (Kyoto University) on
button
and click 『選択』 marked by a square.
terminal of Educational Computer System, you can access
from the “e-Learning” shortcut on the desktop.
http://www.iimc.kyoto-u.ac.jp/en/
(2) Fill the form to sign in with your ECS-ID and password.
Enlarged view
(This screen may not appear when you are already
logged in.)
2.
Select appropriate material
Select appropriate material in the “Information security
(3) Click 『次』 marked by a square.
Appendix
e-Learning” page.
Enlarged view
(4) Click 『送信』 marked by a square.
85
㻠㻚
㻾㼑㼓㼕㼟㼠㼞㼍㼠㼕㼛㼚㻌
㻌
㻯㼘㼕㼏㼗㻌 䛄㻱㼚㼞㼛㼘㼘㻌㼙㼑䛅㻌 㼙㼍㼞㼗㼑㼐㻌㼎㼥㻌㼍㻌㼟㼝㼡㼍㼞㼑㻚㻌
㻺㼑㼤㼠㻘㻌㼥㼛㼡㻌㼟㼔㼛㼡㼘㼐㻌㼠㼍㼗㼑㻌䇾㻲㼕㼚㼍㼘㻌㼀㼑㼟㼠䇿㻌㼛㼒㻌㼎㼛㼠㼠㼛㼙㻌㼙㼑㼚㼡㻌
㻌
㼍㼒㼠㼑㼞㻌㼘㼑㼍㼞㼚㼕㼚㼓㻌㼠㼔㼑㻌㼏㼛㼡㼞㼟㼑㻚㻌
㻡㻚
㻌
㻌
㻌
㻌
㻌
㻌
㻌
㻌
㻌
㻌
㻌
㻌
㻿㼑㼘㼑㼏㼠㻌㼏㼛㼡㼞㼟㼑㻌㼙㼍㼠㼑㼞㼕㼍㼘㼟㻌
㻌
䕔㻵㼚㻌㼏㼍㼟㼑㻌㼛㼒㻌㻼㼞㼕㼚㼏㼑㼟㼟㻌㻾㼕㼚㼞㼕㼚㻌
㻌 㼕㼏㼛㼚㻌㼕㼟㻌㼍㻌㼏㼛㼡㼞㼟㼑㻌㼙㼍㼠㼑㼞㼕㼍㼘㼟㻚㻌㻰㼑㼜㼑㼚㼐㼕㼚㼓㻌㼛㼚㻌㼠㼔㼑㻌㼏㼛㼡㼞㼟㼑㻌
㼥㼛㼡㻌㼠㼍㼗㼑㻘㻌㼏㼘㼕㼏㼗㻌㼛㼚㻌㼠㼔㼑㻌㼚㼍㼙㼑㻌㼛㼒㻌㼙㼍㼠㼑㼞㼕㼍㼘㼟㻌㼕㼚㻌㼠㼔㼑㻌㼠㼍㼎㼘㼑㻌㼎㼑㼘㼛㼣㻚㻌 㻌
&RXUVH
0DWHULDOV
5XOHVRQ,QIRUPDWLRQ
6\VWHPV XVH DQG
LQIRUPDWLRQVHFXULW\
3ULQFHVV5LQULQ
7H[W.\RWR8QLYHUVLW\5XOHVRQ
WKH 8VH RI ,QIRUPDWLRQ 6\VWHPV
DQG,QIRUPDWLRQ
/HDUQ ZLWK 3ULQFHVV 5LQ 5LQ
&\EHUHWKLFV
㻮㼥㻌㼍㼘㼘㻌㼙㼑㼍㼚㼟㻘㻌㼥㼛㼡㻌㼟㼔㼛㼡㼘㼐㻌㼠㼍㼗㼑㻌䇾㻲㼕㼚㼍㼘㻌㼀㼑㼟㼠䇿㻌㼍㼒㼠㼑㼞㻌
㼘㼑㼍㼞㼚㼕㼚㼓㻌㼠㼔㼑㻌㼏㼛㼡㼞㼟㼑㻚㻌
㻌
㻌
㻌
㻌
䕔㻵㼚㻌㼏㼍㼟㼑㻌㼛㼒㻌㻾㼡㼘㼑㼟㻌㼛㼚㻌㻵㼚㼒㼛㼞㼙㼍㼠㼕㼛㼚㻌㻿㼥㼟㼠㼑㼙㼟㻌㼡㼟㼑㻌㼍㼚㼐㻌
(QODUJHGYLHZ
㻌
㼕㼚㼒㼛㼞㼙㼍㼠㼕㼛㼚㻌㼟㼑㼏㼡㼞㼕㼠㼥㻌
㻌
㻌
㻌
㻌
㻌
㻌
㻌
㻌
㻤㻚
㻌
㻌
㻸㼛㼓㻌㼛㼡㼠㻌
㻯㼘㼕㼏㼗㻌 䛄㻸㼛㼓㻌㼛㼡㼠䛅㻌 㼍㼠㻌㼠㼔㼑㻌㼠㼛㼜㻌㼞㼕㼓㼔㼠㻚㻌
㻥㻚
㻌
㼀㼍㼗㼕㼚㼓㻌㼠㼔㼑㻌㼚㼑㼤㼠㻌㼏㼛㼡㼞㼟㼑㻌㼙㼍㼠㼑㼞㼕㼍㼘㼟㻌
㻳㼛㻌㼎㼍㼏㼗㻌㼠㼛㻌㼠㼔㼑㻌 䛂㻝
㻌
㻻㼜㼑㼚㻌㼍㻌㼣㼑㼎㼜㼍㼓㼑㻌㼛㼒㻌㼑㻙㻸㼑㼍㼞㼚㼕㼚㼓䛃㻘㻌
㼜㼘㼑㼍㼟㼑㻌㼠㼍㼗㼑㻌㼠㼔㼑㻌㼚㼑㼤㼠㻌㼏㼛㼡㼞㼟㼑㻌㼙㼍㼠㼑㼞㼕㼍㼘㼟㻌㼎㼥㻌㼠㼔㼑㻌㼟㼍㼙㼑㻌
䕔㻵㼚㻌㼏㼍㼟㼑㻌㼛㼒㻌㻼㼞㼕㼚㼏㼑㼟㼟㻌㻾㼕㼚㼞㼕㼚㻌
㼜㼞㼛㼏㼑㼐㼡㼞㼑㻚㻌 㻌
㻌
㻲㼕㼚㼍㼘㼘㼥㻘㻌㼥㼛㼡㻌㼟㼔㼛㼡㼘㼐㻌㼏㼛㼙㼜㼘㼑㼠㼑㻌㼠㼔㼑㻌㼒㼛㼘㼘㼛㼣㼕㼚㼓㻌㼠㼣㼛㻦㻌
㻌
㻌
z
㻾㼡㼘㼑㼟㻌㼛㼚㻌㻵㼚㼒㼛㼞㼙㼍㼠㼕㼛㼚㻌㻿㼥㼟㼠㼑㼙㼟㻌㼡㼟㼑㻌㼍㼚㼐㻌㼕㼚㼒㼛㼞㼙㼍㼠㼕㼛㼚㻌
z
㻼㼞㼕㼚㼏㼑㼟㼟㻌㻾㼕㼚㼞㼕㼚㻌
㼟㼑㼏㼡㼞㼕㼠㼥㻌
㻌
㻌
㻌
㻌
㻌
㻢㻚
㼀㼍㼗㼕㼚㼓㻌㼏㼛㼡㼞㼟㼑㻌㼙㼍㼠㼑㼞㼕㼍㼘㼟㻌
㻯㼘㼕㼏㼗㻌 䛄㻱㼚㼠㼑㼞䛅㻌 㼙㼍㼞㼗㼑㼐㻌㼎㼥㻌㼍㻌㼟㼝㼡㼍㼞㼑㻚㻌
㻌
㻵㼒㻌㼥㼛㼡㻌㼔㼍㼢㼑㻌㼍㼚㼥㻌㼝㼡㼑㼟㼠㼕㼛㼚㼟㻘㻌㼜㼘㼑㼍㼟㼑㻌㼏㼛㼚㼠㼍㼏㼠㻌㼡㼟㻌㼎㼥㻌㼠㼔㼑㻌
㼕㼚㼝㼡㼕㼞㼥㻌㼒㼛㼞㼙㻚㻌
㼔㼠㼠㼜㻦㻛㻛㼣㼣㼣㻚㼕㼕㼙㼏㻚㼗㼥㼛㼠㼛㻙㼡㻚㼍㼏㻚㼖㼜㻌
㻌
㻌
㻌
㻌
㻣㻚
(QODUJHGYLHZ
㻲㼕㼚㼍㼘㻌㼀㼑㼟㼠㻌
䕔㻵㼚㻌㼏㼍㼟㼑㻌㼛㼒㻌㻾㼡㼘㼑㼟㻌㼛㼚㻌㻵㼚㼒㼛㼞㼙㼍㼠㼕㼛㼚㻌㻿㼥㼟㼠㼑㼙㼟㻌㼡㼟㼑㻌㼍㼚㼐㻌
㼕㼚㼒㼛㼞㼙㼍㼠㼕㼛㼚㻌㼟㼑㼏㼡㼞㼕㼠㼥㻌
㻭㼒㼠㼑㼞㻌㼠㼍㼗㼕㼚㼓㻌㼏㼛㼡㼞㼟㼑㻌㼙㼍㼠㼑㼞㼕㼍㼘㼟㻘㻌㼏㼘㼕㼏㼗䛄㻱㼤㼕㼠㻌㼍㼏㼠㼕㼢㼕㼠㼥䛅㼙㼍㼞㼗㼑㼐㻌
㼎㼥㻌㼍㻌㼟㼝㼡㼍㼞㼑㻚㻌 㻌
㻌
㻌
㻌
86
㻌
㻌
㻌
Information Security
are you aware of it?
Information should NOT be used for any other purpose
Under no circumstances should you send out information that is:
• Discriminatory, defamatory, insulting, or harassing
• Infringing the privacy of any individual
• Infringing copyright or other property rights
• Subject to punishment by law or civil liability
DO NOT do any of the followings
• Use someone else’s ID/Password
• Impair the confidentiality of communications
• Impair the accessibility to information by placing excess loads on the system, such
as by sending a large volumes of emails, or downloading videos or large files
DO the followings
Appendix
• Keep your account information and passwords safe. Don’t write them down on
paper or send them via email.
• Install and run security software.
• Download and install all software updates to prevent security risks.
• Keep security software and its data files up to date.
• Refrain from opening emails from unknown senders.
• Be cautious when clicking on links to websites in emails.
• Check again the receivers’ addresses before sending an email.
• Refrain from viewing websites that are not related to your work at Kyoto
University.
87
ᵢᶍᴾᶌᶍᶒᴾᶓᶑᶃᴾᵮᵐᵮᴾᶄᶇᶊᶃᴾᶑᶆᵿᶐᶇᶌᶅᴾ
ᶑᶍᶄᶒᶕᵿᶐᶃᴾᶍᶌᴾᵩᵳᵧᵬᵱᵋᵧᵧᵧᴾ
What is file sharing software?
ͻ It is a software to share files with an unspecified number of users. File sharing software are
also known as file-swapping software. This kind of software must be used with caution, as
it is most often used to share copyrighted files illegally.
Popular file sharing software
ͻ Winny, Share, Bit Comet, Bit Torrent, Lime Wire, Cabos, Win MX, Xunlei, Perfect Dark,
Kazaa, eMule, Edonkey, Gnutella, etc.
Problems with P2P file sharing software
ͻ P2P is often used to share copyrighted material for non-academic purposes.
ͻ P2P tends to redistribute downloaded files without notice to you, and to cause copyright
infringements.
ͻ Downloaded files via P2P are often infected with viruses or spywares.
ͻ Computers operating P2P are in danger of leaking data.
ͻ Burdening the network with excess loads, P2P is a possible cause of system failure.
Rules for using P2P file sharing software
ͻ If your PC is connected to KUINS-III, use of P2P file sharing software is totally banned.
ͻ On KUINS-II, if you ask permission with proper reason (such as research purposes), use of
P2P may be allowed.
Downloading & distributing copyrighted data without permission
ͻ This is illegal. You may be sued heavily by the copyright owners.
ͻ Performing illegal downloads may be criminally persecuted.
If you have any questions, please contact us by the following URL:
https://www.iimc.kyoto-u.ac.jp/en/inquiry/
Information Management Dept.,IT Service Division
Information Security Management Office, Kyoto University
88
付録 -5.3. 京都大学全学情報システム利用者パスワードガイドライン
(Note: this English version is provided as a translation of the Japanese version, the original, for the user's convenience.)
Password Guideline for Users of Kyoto University Campus-wide Information System
(Established by the Chief of the Institute for Information Management and Communication, January 12, 2010)
1. Purpose
This Guideline is established to describe matters that users and the like must know in advance when they use passwords in
combination with their accounts for the Campus-wide Information System in accordance with Article 8.3 of the Rules for Using the Kyoto
University Campus-wide Information System.
2. General cautions related to password
2.1 Changing the initial password
Users and the like must change the initial passwords assigned to them immediately after their accounts are created. Do not continue
using the initial password to access information systems of the University.
2.2 Character strings for passwords
The password string created by users and the like must satisfy all of the following conditions:
- The password string must include at least eight characters.
- The password string must have at least one character from each of Character Groups A to C below, and may also contain one or more
characters from Group D.
A) Upper case letters of the alphabet (A to Z)
B) Lower case letters of the alphabet (a to z)
C) Numbers (0 to 9)
D) Symbols (@!#$%&=-+*/.,:;[]|_)
The following character strings must not be used as passwords since they are easy to guess for other persons:
- A character string that can be easily guessed from the account information of the user or the like (name, user ID, etc.)
- A character string resulting from shuffling of the above-mentioned string, or comprising the above-mentioned string with numbers or
symbols added
- Any word listed in a dictionary
- A name of a celebrity or any other proper name
2.3 Changing a password
Users and the like must periodically change the passwords for their accounts if they are so instructed by the Chief of the Institute
for Information Management and Communication. When a user or the like is instructed to change his/her password immediately, he/
she must change it immediately. The new password must not be similar to the password before the change.
2.4 Controlling the password
Users and the like must keep their passwords under strict control. Users and the like must exercise the greatest caution not to
reveal their passwords to other persons or carelessly expose their password to other persons’ eyes.
Appendix
3. Procedures related to password
3.1 When a user forgets their password
If a user or the like forgets his/her password, he/she must submit to the Institute for Information Management and Communication
a request to reset the password in the designated form, presenting his/her identification card (student identification card or staff
identification card). When the password is reset, the user or the like must immediately set a new password.
3.2 Reporting a password-related incident
If the account of a user or the like is used by any other person or if there is any threat of such unauthorized use, he/she must
immediately report the incident to the Chief of Institute for Information Management and Communication.
Supplementary provision
1. Measures to conform to this guideline shall also be applied to a password for an account of specific department
information systems connected to Kyoto University Campus-wide Information System.
Measures associated with this revision of the guideline shall be completed by March 31, 2015.
2. This guideline becomes effective from February 4, 2014.
89
付録 -5.4. 京都大学全学情報システム不正プログラム対策ガイドライン
(Note: this English version is provided as a translation
of the Japanese version, the original, for the user's
convenience.)
Kyoto University Guideline for Measures against Invasion by Malicious Programs to Campus-wide
Information System
(Established by the Chief of the Institute for Information Management and
Communication, January 12, 2010)
1. This Guideline is established to stipulate matters to be observed by the information system technical staff member of a department
and users and the like in order to prevent invasion by malicious programs to Specific Department Information Systems or user terminals
connected to the Campus-wide Information System in accordance with Article 12 of Rules for Using the Kyoto University Campus-wide
Information System.
2. The information system technical staff member of the department controlling user terminals (excluding information systems not
provided by the University) shall take the following anti-malicious program measures for user terminals (excluding information
systems not provided by the University):
(1) If anti-malicious program software (software to protect information systems from virus, spy ware, Trojan horse, worm, bot, route kit
and other malicious programs) is available, such software shall be installed and run on the information system in accordance with the
agreement with the provider of the software;
(2) The anti-malicious program software and the malicious program definition file used by such software shall continually be updated;
(3) When new software is installed, the scan function of the anti-malicious program software shall be run to confirm that new software
does not contain malicious programs. The scan function shall also be run periodically to check for invasion by any malicious program;
(4) The information system technical staff member of the department shall pay close attention to release of information on security
vulnerability of the computer system and security update programs. When a security update program is released, it shall always be
installed on the computer system;
(5) Upon receipt of instruction from the Chief of the Institute for Information Management and Communication, the information system
technical staff member shall implement anti-malicious program measures for the relevant information system in accordance with such
instruction;
(6) No software inappropriate for educational/research activities and any other activities of the University shall be installed;
(7) Software of unknown origin shall not be installed; and
(8) The information system technical staff member of the department shall monitor and control software installed on a user terminal used
by more than one person who belongs to the department.
3. The information system technical staff member of the department controlling a Specific Department Information System shall take the
following anti-malicious program measures:
(1) Implement the anti-malicious program measures specified in Paragraph 2 (excluding Item (8)) of this Guideline for such Specific
Department Information System; and
(2) Monitor and control software installed on such Specific Department Information System.
4. Each user or the like shall take the following anti-malicious program measures:
(1) If the user or the like uses any information system not provided by the University as a user terminal to connect to the Campus-wide
Information System or a Specific Department Information System, he/she shall check to ensure that anti-malicious program measures
equivalent to those listed in Paragraph 2 are implemented for such user terminal.
(2) If the user or the like finds any problem in using the Campus-wide Information System or a Specific Department Information System,
he/she shall immediately report the incident to the information security manager of the department that controls such information
system.
90
Appendix 6. Map of Satellite Laboratories
1 Faculty of Agriculture
2 Faculty of Science
3 Faculty of Letters
4 Faculty of Education
5 Faculty of Law
6 Faculty of Economics
7 Faculty of Engineering
8 Faculty of Engineering
9 Faculty of Integrated Human Studies
10 Faculty of Medicine
11 Faculty of Pharmaceutical Sciences
12 School of Human Science, Faculty of Medicine
13 Kyoto University Library
14 Kyoto University Yoshida-South Library
15 Academic Center for Computing and Media
Studies, South Bldg.
16 Academic Center for Computing and Media
Studies, North Bldg.
---------
Katsura Campus
Main Bldg. W222, W228
Bldg. No.6 208, 210
Main Bldg. L312
2nd Floor Computer Room, 4th Floor Research Computer Room
Hou-Kei North Bldg. 2nd Floor (or “Law-Economics” )
East Bldg. Information Laboratory 1, 2
Bldg. No.3 Laboratory 1, 2
Engineering Science Depts Bldg. 124, 230
Human Studies Bldg. 1206
Center of Anatomy 2nd Floor
Lecture of Bldg. Information Processing Terminals Room
West Bldg. 1st Floor, Terminals Room
3rd Floor Reading Room, Information Terminal Corner
2nd Floor Reading Room
OSL, Multimedia Language Laboratory
OSL,
---------------
B Cluster, Funai Center E study room at the 3rd floor
N
st
1 Floor
West OSL
Information Outlet
East OSL
Entrance Hall
共同利用担当
運用管理室
Shared
Support
Desk
Operation
Management
Room
2nd Floor
Multimedia
Language Laboratory
204
Multimedia
Lecture Room 202
Free Media Corner
Multimedia
Lecture Room 201
Multimedia
Language Laboratory
203
Academic Center for Computing
and Media Studies, North Building
3rd Floor
語学学習
CALL教室304
語学学習
CALL教室302
CALL
Classroom 302
CALL Classroom 304
フリーメディアコーナー
Free Media Corner
Appendix
語学学習
CALL教室301
CALL
Classroom 301
Multimedia
マルチメディア
Language
Laboratory
303
演習室303
Academic Center for Computing
and Media Studies, South Building
15
Academic Center for Computing
and Media Studies, South Building
91
The 2015
Information Environment Manual
for Students
ver.1.0E
Published in March 2015
Editor, Publisher:
Institute for Information Management and Communication,
Kyoto University
Yoshida-Honmachi, Sakyo-ku, Kyoto 606-7401, JAPAN
Tel. +81-75-753-7400
http://www.iimc.kyoto-u.ac.jp/
©Institute for Information Management and Communication,
Kyoto University. 2015
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement