{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T15:16:40Z","timestamp":1694791000196},"reference-count":60,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2011,2,23]],"date-time":"2011-02-23T00:00:00Z","timestamp":1298419200000},"content-version":"vor","delay-in-days":22,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Communications"],"published-print":{"date-parts":[[2011,2]]},"abstract":"Abstract<\/jats:title>As a new frontier for fighting against cyber crime and cyber terrorism, digital forensics has experienced a rapid development in the last decade. Many countries have created new laws and legal procedures, developed new technologies, and enhanced education and research in this emerging field. Japan is no exception. In this paper, we first provide a nutshell of the Japanese political structures, legal systems, and law enforcement practice, and then present an overview of updated and new laws, awareness programs, and the research activities in digital forensics. Our views on the current issues and future work are also discussed. We believe that the result of our study will provide an opportunity for the world to see what has been done and what we are doing in this field in Japan. Meanwhile, it also provides a foundation to advance the digital forensics research and development in Japan as well as in the world. Copyright \u00a9 2010 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/wcm.981","type":"journal-article","created":{"date-parts":[[2010,7,6]],"date-time":"2010-07-06T17:21:25Z","timestamp":1278436885000},"page":"240-253","source":"Crossref","is-referenced-by-count":0,"title":["Development of digital forensics practice and research in Japan"],"prefix":"10.1002","volume":"11","author":[{"given":"Jigang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Tetsutaroh","family":"Uehara","sequence":"additional","affiliation":[]},{"given":"Ryoichi","family":"Sasaki","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2011,2,23]]},"reference":[{"key":"e_1_2_10_2_2","unstructured":"MaughanD. Cyber security R&D program Presented at the US\/Japan CIIP Workshop Arlington VA 29 September2004."},{"key":"e_1_2_10_3_2","unstructured":"BijholdJ RuifrokA JessenM GeradtsZ EhrhardtS AlberinkI. Forensic audio and visual evidence: a review: 2004\u20132007.The Proceedings of the 15th International Forensic Science Symposium Lyon France 23\u201326 October2007."},{"key":"e_1_2_10_4_2","unstructured":"DiClementeA HorvathM PollittM. Digital evidence: a review: 2001\u20132004.The Proceedings of the 14th International Forensic Science Symposium Lyon France 19\u201322 October2004."},{"key":"e_1_2_10_5_2","unstructured":"PollittMM. Report on digital evidence.13th Interpol Forensic Science Symposium Lyon France 16\u201319 October2001."},{"key":"e_1_2_10_6_2","volume-title":"Encyclopedia of Digital Forensics","author":"Tsujii S","year":"2006"},{"key":"e_1_2_10_7_2","doi-asserted-by":"crossref","unstructured":"LiuJ UeharaT. Computer forensics in Japan: a preliminary study.The Proceedings of 2009 International Workshop on Digital Forensics Fukuoka Japan 16\u201319 March2009.","DOI":"10.1109\/ARES.2009.94"},{"key":"e_1_2_10_8_2","unstructured":"Ministry of Foreign Affairs. Governmental Structure Web Japan. Available at:http:\/\/ web\u2010japan.org\/factsheet\/pdf\/GOVSTRUC.pdf[Accessed on 3rd October2008]."},{"key":"e_1_2_10_9_2","unstructured":"Supreme Court of Japan. Available at:http:\/\/www.courts.go.jp\/english\/system\/system.html[Accessed on 3rd October2008]."},{"key":"e_1_2_10_10_2","unstructured":"The Japanese Judicial System. Available at:http:\/\/www.kantei.go.jp\/foreign\/judiciary\/0620system.html[Accessed on 3rd October2008]."},{"key":"e_1_2_10_11_2","unstructured":"Unauthorized Computer Access Law (Law No. 128 of 1999) National Police Agency. Available at:http:\/\/www.npa.go.jp\/cyber\/english\/legislation\/ucalaw.html"},{"key":"e_1_2_10_12_2","unstructured":"Basic Act on the Formation of an Advanced Information and Telecommunications Network Society (Act No. 144 of 2000 effective from 6th January 2001) Cabinet Secretariat. Available at:http:\/\/www.cas.go.jp\/jp\/seisaku\/hourei\/data\/BAFAITNS.pdf"},{"key":"e_1_2_10_13_2","unstructured":"Act on Electronic Signatures and Certification Business (Act. No. 102 of 31 May 2000 effective from 1st April 2001) Cabinet Secretariat. Available at:http:\/\/www.cas.go.jp\/jp\/seisaku\/hourei\/data\/aescb.pdf"},{"key":"e_1_2_10_14_2","unstructured":"NatsuiT. Cyberlaw: a speech at Hang Zhou University of Commerce and Technology. Available at:http:\/\/cyberlaw.la.coocan.jp\/[Accessed on September 2004]."},{"key":"e_1_2_10_15_2","unstructured":"Council of Europe: Convention on Cybercrime Budapest 23.XI.2001. Available at:http:\/\/conventions.coe.int\/Treaty\/EN\/Treaties\/Html\/185.htm"},{"key":"e_1_2_10_16_2","unstructured":"Penal Code (Act No. 45 of 1907 and the revisions of Act No. 54 of 2007 effective from June 12 2007). Available at:http:\/\/www.cas.go.jp\/jp\/seisaku\/hourei\/data\/PC2.pdf"},{"key":"e_1_2_10_17_2","unstructured":"Act on Regulation of Transmission of Specified Electronic Mail (Act No. 26 of 17th April 2002). Available at:http:\/\/www.cas.go.jp\/jp\/seisaku\/hourei\/data\/ACPT.pdf"},{"key":"e_1_2_10_18_2","unstructured":"Act on the Limitation of Liability for Damages of Specified Telecommunications Service Providers and the Right to Demand Disclosure of Identification Information of the Senders (Act No. 137 of 2001). Available at:http:\/\/www.cas.go.jp\/jp\/seisaku\/hourei\/data\/ALL.pdf"},{"key":"e_1_2_10_19_2","unstructured":"Intellectual Property Basic Act (Act No. 122 of 2002) Cabinet Secretariat. Available at:http:\/\/www.cas.go.jp\/jp\/seisaku\/hourei\/data\/ipba.pdf"},{"key":"e_1_2_10_20_2","unstructured":"Act for Establishment of the Intellectual Property High Court (Act No. 119 of 2004) Cabinet Secretariat. Available at:http:\/\/www.cas.go.jp\/jp\/seisaku\/hourei\/data\/IPHC.pdf"},{"key":"e_1_2_10_21_2","unstructured":"Copyright Act (up to the revisions of Act No. 121 of 2006) Cabinet Secretariat. Available at:http:\/\/www.cas.go.jp\/jp\/seisaku\/hourei\/data\/CA.pdf"},{"key":"e_1_2_10_22_2","unstructured":"Electronically Recorded Monetary Claims Act (Act No. 102 of 2007) Cabinet Secretariat. Available at:http:\/\/www.cas.go.jp\/jp\/seisaku\/hourei\/data\/ERMCA.pdf"},{"issue":"2","key":"e_1_2_10_23_2","first-page":"57","article-title":"The cranio\u2010facial superimposition technique using personal computer","volume":"3","author":"Moriyoshi H","year":"1998","journal-title":"Japanese Association of Forensic Science and Technology"},{"key":"e_1_2_10_24_2","first-page":"7","article-title":"Secure efficient logging architecture for forensic computing","volume":"126","author":"Kawaguchi N","year":"2003","journal-title":"JPSJ SIG Notes"},{"key":"e_1_2_10_25_2","doi-asserted-by":"crossref","unstructured":"IshiiT. Criminal regulation of anti\u2010forensic tools in Japan.The 2nd IFIP WG 11.9 International Conference on Digital Forensics 2006.","DOI":"10.1007\/0-387-36891-4_28"},{"key":"e_1_2_10_26_2","unstructured":"FjjitaK AshinoY UeharaT SasakiR. Using boot control to preserve the integrity of evidence.The 4th IFIP WG 11.9 International Conference on Digital Forensics 2008."},{"key":"e_1_2_10_27_2","unstructured":"AshinoY FujitaK FurusawaM UeharaT SasakiR. Implementing boot control for the Windows Vista operating system.The 5th IFIP WG 11.9 International Conference on Digital Forensics 2009."},{"key":"e_1_2_10_28_2","unstructured":"Institute of Digital Forensics. Available at:http:\/\/www.digitalforensic.jp\/"},{"key":"e_1_2_10_29_2","unstructured":"@police the National Police Agency. Available at:http:\/\/www.cyberpolice.go.jp\/english\/index.html"},{"key":"e_1_2_10_30_2","unstructured":"SasakiR. Computer Forensics. Available at:http:\/\/www.cyberpolice.go.jp\/column\/explanation03.html[Accessed on 16th September2003]."},{"key":"e_1_2_10_31_2","unstructured":"SasakiR. Introduction to Digital Forensics. Available at:http:\/\/www.cyberpolice.go.jp\/column\/explanation08.htm[Accessed on 1st October2004]."},{"key":"e_1_2_10_32_2","unstructured":"Ohmsha. Available at:http:\/\/www.ohmsha.co.jp\/"},{"key":"e_1_2_10_33_2","first-page":"10","article-title":"What is digital forensics?","author":"Tsujii S","year":"2005","journal-title":"Computer and Network LAN"},{"key":"e_1_2_10_34_2","first-page":"20","article-title":"Case studies in United States","author":"Tompson E","year":"2005","journal-title":"Computer and Network LAN"},{"key":"e_1_2_10_35_2","first-page":"37","article-title":"Legal application of e\u2010evidence","author":"Funahashi M","year":"2005","journal-title":"Computer and Network LAN"},{"key":"e_1_2_10_36_2","first-page":"60","article-title":"Introduction of digital forensic tools from the US","author":"Morimoto M","year":"2005","journal-title":"Computer and Network LAN"},{"issue":"2","key":"e_1_2_10_37_2","first-page":"49","article-title":"A trial for systematization of digital forensics and proposal on the required technologies","volume":"20","author":"Sasaki R","year":"2006","journal-title":"Security Management"},{"issue":"1","key":"e_1_2_10_38_2","doi-asserted-by":"crossref","first-page":"95","DOI":"10.3156\/jsoft.19.1_95_2","article-title":"Digital forensics","volume":"19","author":"Sasaki R","year":"2007","journal-title":"Journal of Japan Society for Fuzzy Theory and Intelligent Informatics"},{"issue":"8","key":"e_1_2_10_39_2","first-page":"744","article-title":"Trend on digital forensics","volume":"91","author":"Sasaki R","year":"2008","journal-title":"The Journal of the Institute of Electronics, Information and Communication Engineers."},{"issue":"8","key":"e_1_2_10_40_2","first-page":"889","article-title":"Digital forensics: technologies for acquisition and investigation of digital evidence","volume":"48","author":"Uehara T","year":"2007","journal-title":"Journal of Information Processing Society of Japan"},{"issue":"3","key":"e_1_2_10_41_2","first-page":"68","article-title":"A survey on research activities for technologies on digital forensics","volume":"23","author":"Uehara T","year":"2009","journal-title":"Journal of Japan Society of Security Management"},{"issue":"3","key":"e_1_2_10_42_2","first-page":"37","article-title":"Digital forensics and substantive law","volume":"22","author":"Hayashi K","year":"2008","journal-title":"Journal of Japan Society of Security Management"},{"issue":"3","key":"e_1_2_10_43_2","first-page":"68","article-title":"Digital forensics in cloud computing era","volume":"23","author":"Akiyama M","year":"2009","journal-title":"Journal of Japan Society of Security Management"},{"key":"e_1_2_10_44_2","unstructured":"Federation of American Scientists. National Police Agency of Japan. Available at:http:\/\/www.fas.org\/irp\/world\/japan\/npa.htm[Accessed on 27 October2008]."},{"key":"e_1_2_10_45_2","unstructured":"Outline of Criminal Justice in Japan. Available at:http:\/\/www.courts.go.jp\/english\/proceedings\/criminal_justice_index.html[Accessed on 3rd October2008]."},{"key":"e_1_2_10_46_2","unstructured":"Outline of Civil Litigation in Japan. Available at:http:\/\/www.courts.go.jp\/english\/proceedings\/civil_suit_index.html[Accessed on 3rd October2008]."},{"key":"e_1_2_10_47_2","unstructured":"The Japanese Judicial System. Available at:http:\/\/www.kantei.go.jp\/foreign\/judiciary\/0620system.html[Accessed on 3rd October2008]."},{"key":"e_1_2_10_48_2","unstructured":"Information for Crime victims. Ibaraki Prefectural Police."},{"key":"e_1_2_10_49_2","unstructured":"Changes in Japan's Legal System American Embassy Tokyo Japan. Available at:http:\/\/japan.usembassy.gov\/pdfs\/wwwfarrestsup.pdf[Accessed on October2006]."},{"key":"e_1_2_10_50_2","first-page":"44","volume-title":"Challenges Posed by Digital Evidence","author":"Yu Ronald","year":"2004"},{"key":"e_1_2_10_51_2","volume-title":"The E\u2010Records\/E\u2010Discovery Connection: Selected Hot Topics and Case Law (U.S., Canada, U.K.)","author":"Baron JR","year":"2009"},{"key":"e_1_2_10_52_2","unstructured":"The Info\u2010Communications Bureau of the National Police Agency. Available at:http:\/\/www.npa.go.jp\/english\/jotsuu\/[Accessed on 10 November 2008]."},{"key":"e_1_2_10_53_2","unstructured":"PollittMM. Computer forensics: an approach to evidence in cyberspace.The Proceedings of the 1995 National Information Systems Security Conference Baltimore MD 10\u201313 October1995."},{"key":"e_1_2_10_54_2","unstructured":"The Legal Training and Research Institute of Japan. Available at:http:\/\/www.courts.go.jp\/english\/institute\/institute.html[Accessed on 3rd October2008]."},{"key":"e_1_2_10_55_2","unstructured":"HashimotoH. Legal reform in Japan: the establishment of American style law schools and reinstitution of jury system.The 48th International Studies Annual Conference Chicago IL 28 February \u20133rd March2007."},{"key":"e_1_2_10_56_2","unstructured":"Harvard Law School. Analysis of the legal profession and law firms. Available at:http:\/\/www.law.harvard.edu\/programs\/plp\/pages\/statistics.php[Accessed on 28 October2008]."},{"key":"e_1_2_10_57_2","volume-title":"Computer Forensics: Computer Crime Scene Investigation","author":"Vacca JohnR","year":"2002"},{"key":"e_1_2_10_58_2","first-page":"28\u201335","article-title":"E\u2010discovery basics","author":"Best RichardE","year":"2005","journal-title":"California Litigation: The Journal of the Litigation Section, State Bar of California"},{"key":"e_1_2_10_59_2","volume-title":"International CIIP Handbook, 2006","author":"Wigert IA","year":"2006"},{"key":"e_1_2_10_60_2","doi-asserted-by":"crossref","unstructured":"HankinsR UeharaT LiuJ. A comparative study of forensic science and computer forensics.The Proceedings of the 3rd IEEE International Conference on Secure Software Integration and Reliability Improvement Shanghai China 8\u201310 July2009.","DOI":"10.1109\/SSIRI.2009.42"},{"key":"e_1_2_10_61_2","unstructured":"Internet World Stats: Usage and Population Statistics. Available at:http:\/\/www.internetworldstats.com\/"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fwcm.981","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/wcm.981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T06:45:21Z","timestamp":1694673921000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/wcm.981"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2]]},"references-count":60,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,2]]}},"alternative-id":["10.1002\/wcm.981"],"URL":"https:\/\/doi.org\/10.1002\/wcm.981","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2]]}}}