The issues related to personal information protection have been drastically changed through the following stages: (1) progress of processing by computer, (2) development of the Internet, (3) spread of SNS and smartphones, (4) evolution of AI, (5) development of IoT and 5G technologies. Based on these alterations in the handling of personal information, this paper introduces the following: environmental transitions and legal system for the protection of personal information, overview of the personal information protection law, definition of personal information, differences between personal information protection and the right to privacy, past and future review of personal information protection system, new data protection framework between Japan and EU.
This paper explains when portraits uploaded on the Internet infringe on the subject’s “portrait rights” (in Japanese, “Shozoken”) through an analysis of court cases. In 2005, the Japanese Supreme Court presented a method for comprehensively considering various factors as criteria for judging infringement of portrait rights. This method is also applicable when considering infringement of portrait rights on the Internet. Therefore, this paper introduces infringement and non-infringement cases for each of the factors for consideration set forth by the Japanese Supreme Court, and explains the practical points and issues specific to the Internet.
Each organization should voluntary implement cybersecurity. However, due to the sophistication and complexity of cyber attacks, it is very difficult to take measures individually. Therefore information sharing system related to cybersecurity is becoming more active. In this paper, I introduce the information sharing system related to cybersecurity, especially Cyber Security Council organized by the revision of The Basic Act on Cybersecurity in 2019.
Just as criminal acts have never been disrupted in the history of human society, attacks in cyberspace (hereinafter, cyberattacks) are not likely to be disrupted. Rather, cyberattacks are expanding their targets and sophisticating their techniques. This report provides an overview of the global trends of cyberattacks in recent years, and details the trends of indiscriminate cyberattacks based on the observation of the large-scale cyberattack monitoring and analysis system NICTER. In addition, this report introduces the current status of infected IoT devices and a notification act in Japan called NOTICE.
Each organization has a network infrastructure construction department and a security response team so that we can always use the Internet safely. They work together to prevent external attacks and malware infections. Their goal is to prevent incidents such as malfunction of personal computers and various servers, leakage of personal and confidential information, and falsification of Web sites. In this paper, after explaining security technology and cyber attacks, we will introduce various methods, attempts and daily battles to secure information security performed by a special organization such as a university.
How can the Japanese company, having excellent intellectual assets, make an innovation to create new market in the world? In this study, the overseas company creating sustaining innovation was investigated by analyzing causal relationship between market information of the company and its intellectual property. As a result, a novel, market information-driven analytical method is established which uses five figures to correlate intellectual property information into the market information. The five figures clarify the effect of the intellectual property on building the company’s market share, therefore the figures are also useful as a supportive tool for creating business management design sheet. Six questions for the Japanese company to transform into the innovative organization was also proposed in this study.
The downloading data of the articles published in the Journal of Information Science and Technology Association are analyzed using the access statistical data obtained from the e-journals site J-STAGE. The total downloaded number of full texts increases gradually, amounting to about 30,000 per month. The downloaded number of most of the articles of special features and series, on which an embargo of 6 months from their publication is laid for readers other than the society members, decreases after the published month and turns into great increase after the embargo is lifted. By analyzing these trends, reading patterns of the members and others are discussed.