{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T16:32:29Z","timestamp":1697473949899},"reference-count":11,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2008,6,27]],"date-time":"2008-06-27T00:00:00Z","timestamp":1214524800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6,27]]},"abstract":"Purpose<\/jats:title>The purpose of this paper is to analyse incidents of personal information leakage in Japan based on Japanese socio\u2010cultural characteristics of information privacy and to consider how best to develop an effective personal information protection policy that conforms to Japanese situations as well as to the global requirement of personal information protection.<\/jats:p><\/jats:sec>Design\/methodology\/approach<\/jats:title>After describing recent incidents of personal information leakage in Japan, the paper examines the defects of the Act on Protection of Personal Information (APPI) that permit these incidents to continue. Subsequently, these incidents and the responses of the Japanese people in a manner that reflects the unique Japanese socio\u2010cultural characteristics of information privacy are analysed. Finally, the paper proposes a revision of APPI that conforms to these Japanese socio\u2010cultural characteristics as well as to the global requirement for personal information protection.<\/jats:p><\/jats:sec>Findings<\/jats:title>Personal information leakage cases and social responses in Japan reflect three Japanese socio\u2010cultural characteristics: Uchi\/Soto awareness, insular collectivism and Hon'ne\/Tatemae tradition. An effective law protecting personal information in Japan's cultural environment cannot be made simply by copying the privacy protection laws in western nations. Instead, legal protection of personal information should be drafted that reflects and takes into account these socio\u2010cultural characteristics.<\/jats:p><\/jats:sec>Originality\/value<\/jats:title>This paper conducts analysis of incidents of personal information leakage in Japan based on Japanese socio\u2010cultural characteristics. A revision of APPI is proposed on the basis of the analysis. The paper's analysis and proposal would provide a good clue to develop effective measures to protect personal information and the right to information privacy in the global, multicultural information society.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14779960810888365","type":"journal-article","created":{"date-parts":[[2008,6,28]],"date-time":"2008-06-28T11:07:40Z","timestamp":1214651260000},"page":"161-171","source":"Crossref","is-referenced-by-count":6,"title":["Socio\u2010cultural analysis of personal information leakage in Japan"],"prefix":"10.1108","volume":"6","author":[{"given":"Yohko","family":"Orito","sequence":"first","affiliation":[]},{"given":"Kiyoshi","family":"Murata","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021020443904700_b2","unstructured":"ACCS (2007), Survey on File Sharing Software Usage, Association of Copyright for Computer Software, Tokyo, available at: www2.accsjp.or.jp\/news\/pdf\/p2psurvey2007a.pdf (accessed 6 January 2008)."},{"key":"key2022021020443904700_b1","unstructured":"Adams, A.A., Murata, K. and Orito, Y. (2008), \u201cThe Japanese sense of privacy\u201d, in preparation."},{"key":"key2022021020443904700_b3","unstructured":"Cabinet Office (2006), A Survey on Personal Data Protection (in Japanese), available at: www8.cao.go.jp\/survey\/h18\/h18\u2010hogo\/index.html (accessed 3 January 2008)."},{"key":"key2022021020443904700_b4","unstructured":"HITACHI (2007), A Survey on Data Leakage Due to File Sharing Software 2007 (in Japanese), available at: www.hitachi.co.jp\/hirt\/publications\/hirt\u2010pub07012\/p2p_report.pdf (accessed 6 January 2007)."},{"key":"key2022021020443904700_b5","unstructured":"Kimura, B. (1981), Self, Relationship and Time: Phenomenological Psychopathology, Kobundo, Tokyo (in Japanese)."},{"key":"key2022021020443904700_b6","unstructured":"Lessig, L. (1999), Code and Other Laws of Cyberspace, Basic Books, New York, NY."},{"key":"key2022021020443904700_b7","unstructured":"Nakagawa, K. (2006), \u201cThe present situation and challenges of the act on protection of personal information\u201d, Chosa To Joho, No. 549, pp. 1\u201010 (in Japanese)."},{"key":"key2022021020443904700_b8","unstructured":"Nakane, C. (1970), Japanese Society, University of California Press, Berkeley, CA."},{"key":"key2022021020443904700_b9","unstructured":"Nippon Keidanren (2003), Towards Constructing a Secure and Safe Net Society, Nippon Keidanren, Tokyo (in Japanese) available at: www.keidanren.or.jp\/japanese\/policy\/2003\/023\/index.html (accessed 30 May 2007)."},{"key":"key2022021020443904700_b10","unstructured":"OECD (1980), OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, available at: www.oecd.org\/document\/18\/0,2340,en_2649_34255_1815186_1_1_1_1,00.html (accessed 16 January 2007)."},{"key":"key2022021020443904700_b11","unstructured":"Orito, Y. and Murata, K. (2005), \u201cPrivacy protection in Japan: cultural influence on the universal value\u201d, Proceedings of ETHICOMP 2005, (CD\u2010ROM)."}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14779960810888365","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779960810888365\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779960810888365\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T21:53:49Z","timestamp":1644530029000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779960810888365\/full\/html"}},"subtitle":[],"editor":[{"given":"Ken","family":"Himma","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2008,6,27]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008,6,27]]}},"alternative-id":["10.1108\/14779960810888365"],"URL":"https:\/\/doi.org\/10.1108\/14779960810888365","relation":{},"ISSN":["1477-996X"],"issn-type":[{"value":"1477-996X","type":"print"}],"subject":[],"published":{"date-parts":[[2008,6,27]]}}}