The Journal of Information Science and Technology Association
Online ISSN : 2189-8278
Print ISSN : 0913-3801
ISSN-L : 0913-3801
Volume 70, Issue 5
Displaying 1-15 of 15 articles from this issue
Special feature: Personal Information and Cyber Security
  • Yukiko TOUSHA
    2020 Volume 70 Issue 5 Pages 223
    Published: May 01, 2020
    Released on J-STAGE: May 01, 2020
    JOURNAL FREE ACCESS
  • Fumio SHIMPO
    2020 Volume 70 Issue 5 Pages 224-230
    Published: May 01, 2020
    Released on J-STAGE: May 01, 2020
    JOURNAL FREE ACCESS

    The issues related to personal information protection have been drastically changed through the following stages: (1) progress of processing by computer, (2) development of the Internet, (3) spread of SNS and smartphones, (4) evolution of AI, (5) development of IoT and 5G technologies. Based on these alterations in the handling of personal information, this paper introduces the following: environmental transitions and legal system for the protection of personal information, overview of the personal information protection law, definition of personal information, differences between personal information protection and the right to privacy, past and future review of personal information protection system, new data protection framework between Japan and EU.

    Editor's pick

    Download PDF (1761K)
  • Masahiko SUDO
    2020 Volume 70 Issue 5 Pages 231-237
    Published: May 01, 2020
    Released on J-STAGE: May 01, 2020
    JOURNAL FREE ACCESS

    This paper explains when portraits uploaded on the Internet infringe on the subject’s “portrait rights” (in Japanese, “Shozoken”) through an analysis of court cases. In 2005, the Japanese Supreme Court presented a method for comprehensively considering various factors as criteria for judging infringement of portrait rights. This method is also applicable when considering infringement of portrait rights on the Internet. Therefore, this paper introduces infringement and non-infringement cases for each of the factors for consideration set forth by the Japanese Supreme Court, and explains the practical points and issues specific to the Internet.

    Editor's pick

    Download PDF (602K)
  • Daisuke TSUTA
    2020 Volume 70 Issue 5 Pages 238-243
    Published: May 01, 2020
    Released on J-STAGE: May 01, 2020
    JOURNAL FREE ACCESS

    Each organization should voluntary implement cybersecurity. However, due to the sophistication and complexity of cyber attacks, it is very difficult to take measures individually. Therefore information sharing system related to cybersecurity is becoming more active. In this paper, I introduce the information sharing system related to cybersecurity, especially Cyber Security Council organized by the revision of The Basic Act on Cybersecurity in 2019.

    Editor's pick

    Download PDF (610K)
  • Daisuke INOUE
    2020 Volume 70 Issue 5 Pages 244-248
    Published: May 01, 2020
    Released on J-STAGE: May 01, 2020
    JOURNAL FREE ACCESS

    Just as criminal acts have never been disrupted in the history of human society, attacks in cyberspace (hereinafter, cyberattacks) are not likely to be disrupted. Rather, cyberattacks are expanding their targets and sophisticating their techniques. This report provides an overview of the global trends of cyberattacks in recent years, and details the trends of indiscriminate cyberattacks based on the observation of the large-scale cyberattack monitoring and analysis system NICTER. In addition, this report introduces the current status of infected IoT devices and a notification act in Japan called NOTICE.

    Download PDF (1057K)
  • Akira YUTANI
    2020 Volume 70 Issue 5 Pages 249-254
    Published: May 01, 2020
    Released on J-STAGE: May 01, 2020
    JOURNAL FREE ACCESS

    Each organization has a network infrastructure construction department and a security response team so that we can always use the Internet safely. They work together to prevent external attacks and malware infections. Their goal is to prevent incidents such as malfunction of personal computers and various servers, leakage of personal and confidential information, and falsification of Web sites. In this paper, after explaining security technology and cyber attacks, we will introduce various methods, attempts and daily battles to secure information security performed by a special organization such as a university.

    Editor's pick

    Download PDF (838K)
Series: Measuring and formulating information today - Empirical rules of informetrics
Series: Identifiers used in information science and technology
3i Study Group Report
  • Kenji SUZUKI, Keiji TAKAHASHI, Minori HAGA, Mio KUBOTA
    2020 Volume 70 Issue 5 Pages 266-272
    Published: May 01, 2020
    Released on J-STAGE: May 01, 2020
    JOURNAL FREE ACCESS

    How can the Japanese company, having excellent intellectual assets, make an innovation to create new market in the world? In this study, the overseas company creating sustaining innovation was investigated by analyzing causal relationship between market information of the company and its intellectual property. As a result, a novel, market information-driven analytical method is established which uses five figures to correlate intellectual property information into the market information. The five figures clarify the effect of the intellectual property on building the company’s market share, therefore the figures are also useful as a supportive tool for creating business management design sheet. Six questions for the Japanese company to transform into the innovative organization was also proposed in this study.

    Download PDF (1184K)
Case Study
Meeting report
Book review
Miscellaneous
feedback
Top