詳細検索結果
以下の条件での結果を表示する: 検索条件を変更
クエリ検索: "Privacy"
8,777件中 1-20の結果を表示しています
  • 五十嵐 大, 高橋 克巳
    コンピュータ ソフトウェア
    2012年 29 巻 4 号 4_40-4_49
    発行日: 2012/10/25
    公開日: 2012/12/25
    ジャーナル フリー
    近年,プライバシー保護とデータ活用を両立するための技術である,プライバシー保護データマイニング(PPDM,
    Privacy
    Preserving Data Mining)の研究が盛んとなってきている.この分野で特に重要な研究テーマのひとつは,技術的に何を満たせばプライバシーが守られていると言えるのかということを解析する,プライバシー概念の研究である.そんな中現在最も注目を浴びているプライバシーの概念が,2006年にDworkが提唱したDifferential
    Privacy
    である.本稿ではPPDM分野の概要および,Differential
    Privacy
    の簡単な紹介を行う.
  • 村上 隆夫
    応用統計学
    2025年 54 巻 1 号 113-120
    発行日: 2025年
    公開日: 2025/09/22
    ジャーナル 認証あり

    差分プライバシーは,個人のプライバシーを保護したまま統計解析を行う際の安全性指標のデファクト標準として知られており,米国の企業や政府などで導入が進められている.本論文では,差分プライバシーとはどのようなものか,どのような安全性を保証するのか,どのようなモデルがあるか,といった差分プライバシーの基本的な事項について簡単に説明する.

  • 新保 史生
    情報メディア研究
    2003年 2 巻 1 号 29-43
    発行日: 2003年
    公開日: 2004/04/27
    ジャーナル フリー
    ネットワークにおいて個人情報を取得して利用する機会が増えるにつれ,情報システムの脆弱性を原因とする個人情報漏えい事件や不正利用が頻繁に発生している.また,我が国においても個人情報保護法が制定されたことから,個人情報の適正な取扱いと保護への関心と社会的要求が高まっている.その要請に応ずるための具体的な「指針」や「方針」を示したものとして「プライバシーポリシー」と呼ばれるものがあり,民間の事業者の多くは,これを掲載するところが増えてきている.行政機関においても日常的に行政事務やそれ以外の場面における個人情報の取扱量が増加している現状からすると,民間の事業者における取組同様に,行政機関におけるプライバシーポリシー掲載の必要性は高まっているといえる.そこで,主に米国の連邦政府機関の取組を中心に,プライバシーポリシーの掲載意義と現状を概観する.
  • Iguchi Hiroko, Ota Katsumasa
    医療情報学
    2006年 26 巻 6 号 367-375
    発行日: 2006年
    公開日: 2015/06/19
    ジャーナル フリー
     In this study, a Patients’ Information
    Privacy
    Scale (PIPS) and a Convenient
    Privacy
    Checklist (CPC) were developed, and the validity and reliability of the instruments were examined. This study was conducted in 3 stages: 1) Developing the Patients Information
    Privacy
    Scale, 2) Developing Convenient
    Privacy
    Checklist, and 3) Conducting a main test to examine those scales. A total of 595 patients were selected from 37 facilities in three prefectures, as samples for the main study. Valid response rates were 40.2%. The PIPS was analyzed using factor analysis. As a result, four factors, “Treatment-Related Information,” “Identification-Related Information,” “Daily Life-Behavior Related Information” and “Personal Life-Related Information” were extracted (Chronbach’s α=0.978). Through the examination of the criterion-related validity, construct validity, and stability, the PIPS was confirmed as a valid and reliable instrument. The CPC was analyzed by examination of representative nature of the items, the correlations between each CPC item and the factor of the PIPS, respectively. The result confirmed the efficiency of the checklist. This study shows that the PIPS and the CPC can be meaningful instruments in the evaluation of how to balance the right of information
    privacy
    against the practical needs for information sharing.
  • 吉田 圭吾, 溝上 慎一
    心理学研究
    1996年 67 巻 1 号 50-55
    発行日: 1996/04/26
    公開日: 2010/07/16
    ジャーナル フリー
    Marshall (1974) and Pedersen (1979) theorized and studied Orientation toward
    Privacy
    , but the concept has not been explored extensively in this country. In this study, a Japanese version of their Inventory of Orientation toward
    Privacy
    was constructed. In Study 1, translated items of the inventory were examined to see whether they had the same dimensions as the original scale. The results indicated that the dimensions were similar, except an ‘Anonymity’ factor. In Study 2, excluding anonymity items, a 21-item Japanese version was constructed, incorporating Iwata's (1987) findings as well. Factor analysis revealed seven factors, Free will, Intimacy with Friends, Reserve, Intimacy with Family, Seclusion, and Isolation. Finally, in Study 3, the new Inventory was administered to another sample, and its factor structure re-examined. The structure proved to be reasonably stable, and it therefore may be concluded that the scale meaningfully measured Orientation toward
    Privacy
    .
  • Kung Chen, Da-Wei Wang
    医療情報学
    2009年 29 巻 3 号 117-128
    発行日: 2009年
    公開日: 2015/03/06
    ジャーナル フリー
     With the spread of electronic health records, patients’
    privacy
    concerns rise greatly. In response, many organizations advocate that healthcare information systems (HIS) should have an opt-in capability and a way for people to segment sensitive information, if they choose to. Currently, employing a proper access control mechanism to protect patients’ electronic health records is a well-accepted discipline in HIS development. However, the design of such mechanisms hardly includes the requirement of supporting patients’ preferences regarding the use of their personal information. It is therefore highly desirable to extend a HIS’s access control to handle patients’
    privacy
    preferences. On the other hand, as the principle and practice of patients’
    privacy
    preferences are still emerging, instead of replacing existing mechanisms with new ones, techniques for adapting existing mechanisms to quickly reflect patients’
    privacy
    preferences can be a worthwhile solution. In particular, we argue that aspect-oriented programming (AOP) can be part of the solutions and has the potential to provide fine-grained
    privacy
    protection to cater to the
    privacy
    needs of each individual. Aspect-oriented approach enables separation of concerns which are better designed independently, but must operate together. We propose an aspect-based preference management framework that collects and manages patients’ preferences independently yet can integrate with the underlying HIS to support patients’
    privacy
    preferences effectively. The proposed mechanisms are loosely coupled with the underlying system. It is thus easy to adapt them and employ them for migrating existing systems to support patients’
    privacy
    preferences.
  • 千代原 亮一
    法政論叢
    2000年 37 巻 1 号 1-15
    発行日: 2000/11/15
    公開日: 2017/11/01
    ジャーナル フリー
    I Introduction II Outline of the
    privacy
    i Argument of the right of
    privacy
    1. Conception of the right of
    privacy
    ii Legal basis of the right of
    privacy
    and the argument of the article 13 of the Constitution iii Relationship with the law in force iv Protection of the
    privacy
    and the personal information V Formation and expansion of the right of
    privacy
    in the United States and Germany III Detail ot the
    privacy
    i
    Privacy
    of dead person ii
    Privacy
    of the juridical person iii Relationship with the freedom of expression 1. Precedent 2. Adjustment between the right of
    privacy
    and freedom of expression iv Relationship with disclosure of public information V Educational information Vi Medical informtion Vii
    Privacy
    in the internet IV Conclusion
  • Post論文を切り口にしてWarren and Brandeis論文を読み直す
    林 紘一郎
    情報通信学会誌
    2012年 30 巻 3 号 29-42
    発行日: 2012年
    公開日: 2013/03/25
    ジャーナル フリー
    プライバシーの権利を初めて世に問うた1890年のWarren and Brandeis論文は、人格的利益としての
    privacy
    の概念を提唱し、世界各国に普及させる上で決定的な影響を与えた。しかし、この論文がもう1つの重要な要素としてproperty概念を対置し、それら2要素のあり方を (未公表著作物に対する) 著作権を事例としながら論じている点を、わが国法学界は見落とすか過小評価している。米国では論文100周年に当る1990年に、多数の回顧行事や論文が出現し、こうした複眼的・大局的分析を再評価しているが、わが国ではそのような分析は乏しい。本稿は、100周年記念論文として出色のPost論文を切り口にして、Warren and Brandeis論文の今日的意義を探るものである。
  • Rui Sun, Jia Rong Chen, Yi Xiang Wang, Ying Rui Zhou, Ying Yu Luo
    Journal of Advanced Computational Intelligence and Intelligent Informatics
    2020年 24 巻 4 号 509-523
    発行日: 2020/07/20
    公開日: 2020/07/20
    ジャーナル オープンアクセス

    At the present time, consumers often disclose their

    privacy
    when using online platforms to receive personalized recommendation information and services, but they are also highly concerned whether their
    privacy
    is being violated. “
    Privacy
    paradox” is becoming a hot topic of research. What are the potential impacts of individual cognitive differences and situational cues on
    privacy
    decision-making? How to balance the internal causes of the “
    privacy
    paradox” so that consumers are more willing to accept personalized recommendation services based on users’
    privacy
    data? Can the transparency of
    privacy
    rights ease user conflict perceptions and promote disclosure intentions? These questions are inconclusive. Therefore, the purpose of this our research was to explore consumer
    privacy
    paradoxical behaviors from a novel perspective of the characteristics of authorization cues, and to clarify the internal relationship between individual cognitive processing and
    privacy
    authorization cues. This study suggests that the big data platform, when collecting or using user information, should try to reduce the behaviors that induce users’ resistance. It also provides a reference for how to better achieve benign interaction in personalized recommendation between Internet companies and users. The event-related potential technique is adopted to explore the matching relationship between individual cognitive processing and
    privacy
    authorization cues and to analyze the internal neural mechanism of the personalized recommendation user in the authorization decision. The experiment simulated the
    privacy
    authorization situation, and adopted a 2 × 2 × 2 hybrid experimental design: authority sensitivity (high/low) * authorization transparency (with/without permission) * cognitive style (field dependent/field independent). The experimental results show that: (1) Authorization transparency, authority sensitivity and their interactions will affect the user’s
    privacy
    authorization behaviors, and the interaction of the two cues has a greater impact on the behavior than the role of a single cue; (2) The cognitive style will affect the individual’s attention resource allocation in the authorization scenario, which, limited by cognitive resources, will result in selective attention to contextual cues: Compared with the field-independent group with self-characterization as a reference, the field-dependent group induced a greater P2 amplitude; (3) When the two-cue valences in the authoritative scenario are inconsistent, the amplitude of the N2 component is greater than that when the valences are consistent, and the amplitude of the N2 induced by the field-dependent group is more affected by the scenario cue valence; (4) Regardless of whether it is a field-dependent group or a field-independent group, there is no salient difference in the amplitude of LPP components induced in each scenario. According to the results of this study, even if
    privacy
    authorization involves high risks, individuals tend to selectively seek supportive cues or avoid obtaining information that is inconsistent with their cognition. This research reveals the differences of neural mechanisms in users’ actual decision-making, provides the possibility for further exploration of the black box behind users’ attitudes and behaviors, and opens up new ideas for the study of the “
    privacy
    paradox.”

  • プライバシー懸念の多様性に着目した実証分析
    高崎 晴夫
    情報通信学会誌
    2016年 34 巻 3 号 25-39
    発行日: 2016年
    公開日: 2017/02/06
    ジャーナル フリー

    個人情報等の可用性と個人情報・プライバシー保護をバランスさせる新たなビジネスモデル構築という視点に立ち、パーソナライズド・サービスを巡る産業政策についてデータに基づく客観的な議論に資するため、2010 年にわが国では初めてとなる、消費者のサービス利用意向とデータ開示意向に関する大規模なWeb アンケート調査を実施した。本稿は、先行研究で触れられることの無かったプライバシー懸念の多様性に着目し、プライバシー懸念がサービス利用意向にどのような影響を与えているかを詳細に分析した。その結果、利用者が有するプライバシー懸念の中身によってサービス利用意向に与える影響度合いが異なることを含め、先行研究では見られなかった新たな知見を見出し、懸念の種類ごとに異なる事業者対応や政策対応が必要となるなどの示唆が得られた。

  • 中井 綱人, Ye WANG, 吉田 康太, 藤野 毅
    日本セキュリティ・マネジメント学会誌
    2025年 39 巻 2 号 18-19
    発行日: 2025年
    公開日: 2025/11/14
    研究報告書・技術報告書 フリー
  • Katsumasa OTA, Asami KOBAYASHI, Michiko YAHIRO, Naoya MAYUMI
    医療情報学
    2002年 22 巻 1 号 119-126
    発行日: 2002年
    公開日: 2017/08/14
    ジャーナル フリー

     Patients’ rights have become very hot topics in health care.

    Privacy
    is one of these rights. Nurses in clinical settings deal with the information on many patients and share it within the nursing team because nursing is practiced as a team. Sometimes, sharing patients’ information may put the
    privacy
    of a patient at risk. To explore how the nurses perceive patients’
    privacy
    and how they share that information and to what extent, we conducted a questionnaire survey with 179 hospital nurses. We obtained 141 (79%) valid answers. Major findings are as follows: 1) on information directly related to nursing care, nurses perceived patients’
    privacy
    lower than their own, 2) patients' information that was recorded on the chart tended to be shared by all nurses in the ward, on the other hand, information needed to nursing care tend to be shared within the team concerned with the patients’ care, 3) the main reason for limitation of the range of information sharing was whether or not it was necessary for nursing care.

  • 村上 康二郎
    法政論叢
    2011年 48 巻 1 号 141-176
    発行日: 2011/11/15
    公開日: 2017/11/01
    ジャーナル フリー
    Privacy
    rights have developed from "the classical
    privacy
    right", such as the right to be let alone or the right not to have one's private life disclosed, to "the modern
    privacy
    right" or "the information
    privacy
    right", such as the right to control self information. In Japan, many scholars and precedents have discussed the relationship between the classical
    privacy
    right and freedom of expression in the context of "mass media
    privacy
    ". However, discussions of the relationship between the information
    privacy
    right and freedom of expression in the context of "computer
    privacy
    " are not enough. In contrast, there are exhaustive discussions about the relationship between the information
    privacy
    right and freedom of speech in America. One opinion argues that the information
    privacy
    right is not defensible under the First Amendment, but the other opinion contends that the right is defensible under the First Amendment. These recent American discussions give us many suggestions. This article examines the relationship between the information
    privacy
    right and freedom of expression referring to these recent American discussions.
  • Atsushi IWAI
    Journal of Socio-Informatics
    2012年 5 巻 1 号 11-25
    発行日: 2012/09/30
    公開日: 2017/02/04
    ジャーナル フリー
    A key issue in secret voting and many other kinds of private communications is ensuring the anonymity of individuals. Researchers in Information Studies have been aiming to establish metrics of anonymity to enhance the protection of
    privacy
    in information and communication systems. Many related papers, however, focus on so-called connection anonymity. Little research can be found for metrics of voting
    privacy
    , except for the entropy-based approach of Endo et al. (2007, 2008). This study illustrates and evaluates an unknown anonymity measure presented by Iwai (2003) in the field of Japanese mathematical sociology. The metric utilizes a combinatorial approach and has some advantageous aspects over the approach of Endo et al. (2007, 2008) as a metric that measures the degree of preventing the identification of particular voters. Although, in general, Edman et al. (2007) is recognized as the first study that demonstrated a combinatorial approach to defining an anonymity measure, the main idea is shared by the earlier research of Iwai (2003). Even now, the mathematical representation forms in the older research seem to be more suitable for measuring anonymity in voting contexts.
  • 古田 貴久, 角岡 大悟
    日本教育工学雑誌
    2003年 27 巻 2 号 155-163
    発行日: 2003/09/20
    公開日: 2017/10/20
    ジャーナル フリー
    従来のプライバシーの構成概念に加えて,情報化社会の進展に伴い社会的重要性を増している個人情報に対する態度を含めた調査紙を作成した.それを,中学生と大人(保護者,中学校教員)に実施し,プライバシーを構成する因子,および,因子間の因果関係を推定して,プライバシーの構造を検討した.その結果,従来の日本人の研究では抽出されなかった,情報の自己統制に関する因子が抽出された.大人と中学生のプライバシー意識の違いは,中学生のプライバシー意識では,情報の自己統制および他者からの遠慮を期待することに関する因子が未分化であることが示唆された.今後は,情報化社会の進展により,個人情報に対する関心が高まることで,日本人のプライバシーに対する意識にほとんど含まれないとされる,自分自身に関する情報の主体的統制という側面が強調されるようになっていくと考えられる.
  • 折戸 洋子, 村田 潔
    オフィス・オートメーション学会誌
    2007年 27 巻 4 号 83-92
    発行日: 2007/05/31
    公開日: 2019/01/15
    ジャーナル フリー
    This paper deals with socio-cultural influence on protection of personal data and
    privacy
    in Japan and its meanings for Japanese business. The enforcement of the Act for Protection of Personal Data in April 2005 has prompted broad recognition that Japanese firms, which collect, store and use personal data, should enhance their effort in protecting personal data and
    privacy
    as a part of development of their social responsibility. However, Japanese socio-cultural characteristics related to the notion of
    privacy
    tend to make ordinary Japanese people consider protection of
    privacy
    is identical to compliance with the Act. This would distort Japanese firms' ways of approaching protection of personal data and
    privacy
    and result in putting Japanese firms as well as Japanese economy in jeopardy in the global business environment.
  • L.B. Mariano
    科学哲学
    1997年 30 巻 123-138
    発行日: 1997/11/10
    公開日: 2009/05/29
    ジャーナル フリー
  • 福田 康典, 村田 潔, 折戸 洋子
    情報経営
    2022年 83 巻
    発行日: 2022年
    公開日: 2023/02/16
    会議録・要旨集 フリー
  • 駒村 圭吾
    法政論叢
    2003年 39 巻 2 号 57-66
    発行日: 2003/05/15
    公開日: 2017/11/01
    ジャーナル フリー
    I
    Privacy
    and Constitutionalism (1)
    Privacy
    not as a Positive Law - Does it Matter? (2)
    Privacy
    in Classic and New Formula - From "Right to be Let Alone" to "Control over Personal Information" (3)
    Privacy
    as a Project to Rebuild Public/Private Dichotomy (4)
    Privacy
    and Personal Information II Private and Public (1) Right to
    Privacy
    Protects Personal Interest (2) Right to
    Privacy
    Provides an Essential Foundation to Justify Government III Some Implications
  • 福永 英雄
    法政論叢
    2001年 38 巻 1 号 116-125
    発行日: 2001/11/15
    公開日: 2017/11/01
    ジャーナル フリー
    The concept '
    privacy
    ' seems to be reduced to the term 'personal data' Indeed the problematique 'protection of personal data' has great significance in such a highly information-oriented society. But I insist the concept '
    privacy
    ' is also still very important in that it includes a spatial meaning. I suggest the concept 'despatialization' to explain the problematiques in such a highly information-oriented society, especially concerning '
    privacy
    ' and 'personal data.' In a sense 'personal data' can be regarded as 'despatialized' parts of '
    privacy
    .' This is why 'personal data' can be a problematique. 'Personal data' can be processed and reproduced unlimitedly. '
    Privacy
    ' has a broader meaning. '
    Privacy
    ' can be invaded spatially and in 'despatialized' forms. Moreover '
    privacy
    ' can be invaded while the victim himself is unaware. In a respect an invasion of '
    privacy
    ' is an invisible infringement of personal rights. So I propose the foundation of a third-party relief organization investigating invasions of '
    privacy
    .'
feedback
Top