Journal article Open Access

The Development of Japanese Data Protection

Adams, A. A.; Murata, K; Orito, Y


DCAT Export

<?xml version='1.0' encoding='utf-8'?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:adms="http://www.w3.org/ns/adms#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dct="http://purl.org/dc/terms/" xmlns:dctype="http://purl.org/dc/dcmitype/" xmlns:dcat="http://www.w3.org/ns/dcat#" xmlns:duv="http://www.w3.org/ns/duv#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:frapo="http://purl.org/cerif/frapo/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:gsp="http://www.opengis.net/ont/geosparql#" xmlns:locn="http://www.w3.org/ns/locn#" xmlns:org="http://www.w3.org/ns/org#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:prov="http://www.w3.org/ns/prov#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:vcard="http://www.w3.org/2006/vcard/ns#" xmlns:wdrs="http://www.w3.org/2007/05/powder-s#">
  <rdf:Description rdf:about="https://doi.org/10.5281/zenodo.812344">
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://doi.org/10.5281/zenodo.812344</dct:identifier>
    <foaf:page rdf:resource="https://doi.org/10.5281/zenodo.812344"/>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Adams, A. A.</foaf:name>
        <foaf:givenName>A. A.</foaf:givenName>
        <foaf:familyName>Adams</foaf:familyName>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Meiji University (明治大学)</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Murata, K</foaf:name>
        <foaf:givenName>K</foaf:givenName>
        <foaf:familyName>Murata</foaf:familyName>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Meiji University</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Orito, Y</foaf:name>
        <foaf:givenName>Y</foaf:givenName>
        <foaf:familyName>Orito</foaf:familyName>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Ehime University</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:title>The Development of Japanese Data Protection</dct:title>
    <dct:publisher>
      <foaf:Agent>
        <foaf:name>Zenodo</foaf:name>
      </foaf:Agent>
    </dct:publisher>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#gYear">2010</dct:issued>
    <dcat:keyword>privacy</dcat:keyword>
    <dcat:keyword>data protection</dcat:keyword>
    <dcat:keyword>Japan</dcat:keyword>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2010-01-01</dct:issued>
    <owl:sameAs rdf:resource="https://zenodo.org/record/812344"/>
    <adms:identifier>
      <adms:Identifier>
        <skos:notation rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/812344</skos:notation>
        <adms:schemeAgency>url</adms:schemeAgency>
      </adms:Identifier>
    </adms:identifier>
    <dct:isVersionOf rdf:resource="https://doi.org/10.5281/zenodo.812343"/>
    <dct:isPartOf rdf:resource="https://zenodo.org/communities/opendepot"/>
    <dct:description>In 2003, Japan enacted its first private-sector data protection legislation, complementing the concurrent update of the public-sector regulations. The publicly stated goal of the Japanese government was to support trade with Europe by providing suitably strong protection to qualify for European data-export approval. In this paper we examine the internal social and political pressures that led to the adoption of apparently strong private-sector data protection, despite prior long resistance to such a move. The pressures we have identified include direct and indirect effects of Japanese economic difficulties since the early 1990s, media pressure to update public-sector rules because of the introduction of Juki Net, and similar media pressure to apply similar rules to the private sector. We also examine the role that the technology of kanji input systems played on the lack of urgency in demands for private-sector data protection until 2000. This record was migrated from the OpenDepot repository service in June, 2017 before shutting down.</dct:description>
    <dct:description>{"references": ["Adams, A.A., K. Murata, and Y. Orito. 2009. \"The Japanese Sense of Information Privacy.\" AI &amp; Society 24 (4): 327\u2013341.\nAoyagi, T. 2006. \u30b5\u30a4\u30d0\u30fc\u76e3\u8996\u793e\u4f1a (Cyber-Surveillance Society). Tokyo:\u96fb\u6c17\u901a\u4fe1\u632f\u8208\u4f1a (Denkitsushin Shinko-Kai).\nAsahi Shimbun. 2002. \u500b\u4eba\u60c5\u5831\u3001\u3069\u3046\u5b88\u308b \u4f4f\u6c11\u57fa\u672c\u53f0\u5e33\u30cd\u30c3\u30c8(\u691c\u8a3c) (How is personal information protected in Juki Net system?). January 9.\nAsahi Shimbun. 2008. \"Distrust Stymies Online Network.\" March 7. http://www.asahi.com/english/Heraldasahi/TKY200803070097.html.\nBasic Act on the Formation of an Advanced Information and Telecommunications Network Society. 2000. \u9ad8\u5ea6\u60c5\u5831\u901a\u4fe1\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u793e\u4f1a\u5f62\u6210\u57fa\u672c\u6cd5 \u5e73\u6210\u5341\u4e8c\u5e74\u5341\u4e8c\u6708\u516d\u65e5\u6cd5\u5f8b\u7b2c\u767e\u56db\u5341\u56db\u53f7 (Basic act on the formation of an advanced information and telecommunications network society, Act No. 144 of December 6, 2000).\nBenedict, R. 1946. The Chrysanthemum and the Sword: Patterns of Japanese Culture. Boston, MA: Houghton Mifflin.\nBennett, C.J., and C.D. Raab. 2006. The Governance of Privacy. Cambridge, MA: MIT Press.\nBoas, T.C. 2007. \"Conceptualizing Continuity and Change: The Composite Standard Model of Path Dependence.\" Journal of Theoretical Politics 19 (1): 33\u201354.\nCallen, T., and J.D. Ostry. 2003. Japan's Lost Decade: Policies for Economic Revival. Washington, DC: International Monetary Fund.\nCouncil on Electric Telecommunication (\u96fb\u6c17\u901a\u4fe1\u5be9\u8b70\u4f1a). 1994. 21\u4e16\u7d00\u306e\u77e5\u7684\u793e\u4f1a\u3078\u306e\u6539\u9769\u306b\u5411\u3051\u3066\u2015\u60c5\u5831\u901a\u4fe1\u57fa\u76e4\u6574\u5099\u30d7\u30ed\u30b0\u30e9\u30e0 (Towards restructuring the intellectual society in the 21st century: Programs for constructing the infrastructure of information and telecommunication).\nCurtis, G.L. 1999. The Logic of Japanese Politics. New York: Columbia University Press.\nDoi, T. 1985. The Anatomy of Self. Tokyo: Kodansha International.\nEuropean Parliament and Council of the European Communities. 1995. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data. O J L 281: 31\u201350.\nEzrati, M. 1997. \"Japan's Aging Economics.\" Foreign Affairs 76 (3) (May\u2013June): 96\u2013104.\nFreeman, L. 2003. \"Mobilizing and Demobilizing the Public Sphere: Mass Media and the Internet in Japan.\" In The State of Civil Society in Japan, eds. F.J. Schwartz, and S.J. Pharr (Cambridge: Cambridge University Press), chap. 11, 235\u2013256.\nGottlieb, N. 2000. Word-processing Technology in Japan: Kanji and the Keyboard. Richmond: Curzon Press.\nHendry, J. 2003. Understanding Japanese Society. Oxford: Routledge.\nHoribe, M. 1994. \u60c5\u5831\u516c\u958b\u5236\u5ea6\u30fb\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u5236\u5ea6\u306e\u56de\u9867\u3068\u5c55\u671b (Systems for information disclosure and personal information protection: Looking backward and forward). Jurist (Supplement, Freedom of Information and Protection of Privacy): 2\u201315.\nIkuta (\u751f\u7530) v. Moriguchi City (\u5b88\u53e3\u5e02). 2008. \u6700\u9ad8\u88c1\u5224\u6240\u7b2c\u4e00\u5c0f\u6cd5\u5ef7\u5e73\u6210\u4e00\u4e5d(\u30aa)\u7b2c\u56db\u3007\u4e09; First Petty Bench of the Supreme Court, 2007 (Heisei 19), (O) No. 403. http://www.courts.go.jp/hanrei/pdf/20080306142412.pdf\nIshi, H. 1981. \u8ab2\u7a0e\u6240\u5f97\u6355\u6349\u7387\u306e\u696d\u7a2e\u9593\u683c\u5dee\u2212\u30af\u30ed\u30e8\u30f3\u306e1\u3064\u306e\u63a8\u8a08 (Differences of taxable income recognition between industries: An estimation of KU-RO-YON). \u5b63\u520a\u73fe\u4ee3\u7d4c\u6e08 (Kikan gendai keizai), 72\u201393.\nIshiguro, K. 2003. \"Law and Economy in the Electronic Age.\" Tokyo: Iwanami Shoten.\nIto, J. 2003. \"Privacy Report to Japanese Government.\" http://joiwiki.ito.com/joiwiki/index.cgi?privacy_report_to_japanese_government.\nIT Strategic Headquarters. 2001. \"e-Japan Strategy.\" http://www.kantei.go.jp/foreign/it/network/0122full_e.html.\nJapan Cabinet Office. 2010. \u300c\u793e\u4f1a\u4fdd\u969c\u30fb\u7a0e\u306b\u95a2\u308f\u308b\u756a\u53f7\u5236\u5ea6\u306b\u95a2\u3059\u308b\u691c\u8a0e\u4f1a\u300d\u3092\u958b\u59cb (Launch of the commission on numbering systems for tax and social security). Press Release, February 8. http://www.kantei.go.jp/jp/singi/kokkasenryaku/image/20100208_syakaihosyou_1_news.pdf \nJapan Research Institute. 2005. \u6240\u5f97\u88dc\u8db3\u7387\u63a8\u8a08\u306e\u554f\u984c\u3068\u4eca\u5f8c\u306e\u8ab2\u984c-90\u5e74\u4ee3\u4ee5\u964d\u683c\u5dee\u5927\u5e45\u7e2e\u5c0f\u3068\u306e\u5224\u65ad\u306f\u65e9\u8a08 (Problems and challenges in estimation of income recognition rate: Differences have still existed after 1990s). http://www.jri.co.jp/press/2005/jri_051007.pdf.\nKeidanren. 2000a. IT\u5316\u306b\u5bfe\u5fdc\u3057\u305f\u53d6\u5f15\u30eb\u30fc\u30eb\u6574\u5099\u306b\u5411\u3051\u305f\u4e2d\u9593\u63d0\u8a00 (Interim proposal for enhancement of rules on computerized commerce). September. http://www.keidanren.or.jp/japanese/policy/2000/042/.\nKeidanren. 2000b. \u300c\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u57fa\u672c\u6cd5\u5236\u306b\u95a2\u3059\u308b\u5927\u7db1\u300d\u306b\u3064\u3044\u3066 (Outline of personal protection of information law). December. http://www.keidanren.or.jp/japanese/policy/2000/065.html.\nKeidanren. 2003. \u5b89\u5fc3\u30fb\u5b89\u5168\u3067\u81ea\u7531\u306a\u30cd\u30c3\u30c8\u793e\u4f1a\u3092\u76ee\u6307\u3057\u3066 (Towards constructing a secure and safe Net society). March. http://www.keidanren.or.jp/japanese/policy/2003/023/.\nKikuchi, M. 2007. \"Assessing Government Efforts to (Re)Build Trust in Government: Challenges and Lessons Learned from Japanese Experience.\" International Public Management Review 8 (2): 183\u2013203.\nKoketsu, A. 2007. \u76e3\u8996\u793e\u4f1a\u306e\u672a\u6765:\u5171\u8b00\u7f6a\u30fb\u56fd\u6c11\u4fdd\u8b77\u6cd5\u3068\u6226\u6642\u52d5\u54e1\u4f53\u5236 (The future of surveillance society). Tokyo: \u5c0f\u5b66\u9928 (Sh\u014dgakukan).\nLyon, D. 2002. Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination. Oxford: Routledge.\nLunde, K. 1993. Understanding Japanese Information Processing. Sebastapol, CA: O'Reilly Associates.\nMarcure, K.A. 1985. \"The Danka System.\" Monumenta Nipponica 40 (1): 39\u201367.\nMasuhara, Y. 1984. \u30bf\u30c6\u30de\u30a8\u3068\u30db\u30f3\u30cd (Superficiality and Truth). Tokyo: \u8b1b\u8ac7\u793e (Kodansha).\nMilberg, S.J., S.J. Burke, J.J. Smith, and E.A. Kallman. 1995. \"Values, Personal Information, Privacy, and Regulatory Approaches.\" Communications of the ACM 38 (12): 65\u201374.\nMinistry of Internal Affairs and Communications (Japan). 2008. \u4f4f\u6c11\u57fa\u672c\u53f0\u5e33\u30ab\u30fc\u30c9\u306e\u5229\u7528\u72b6\u6cc1 (The use of Juki Net Cards). May 20. http://www.soumu.go.jp/menu_news/s-news/2008/pdf/080520_1_bt.pdf.\nMinistry of Internal Affairs and Communications (Japan). 2010. \"2005 Census of Japan: Summary of Results.\" http://www.stat.go.jp/english/data/kokusei/2005/nihon/pdf/summary.pdf.\nMizutani, M., J. Dorsey, and J.H. Moor. 2004. \"The Internet and Japanese Conception of Privacy.\" Ethics and Information Technology 6: 121\u2013128.\nMurai, J. 1995. \u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8 (The Internet). Tokyo: \u5ca9\u6ce2\u66f8\u5e97 Iwanami Shoten.\nMurakami Wood, D., D. Lyon, and K. Abe. 2007. \"Surveillance in Urban Japan: A Critical Introduction.\" Urban Studies 44 (3): 551\u2013568.\nNakane, C. 1970. Japanese Society. London: Penguin.\nNamaoto, M. 1997. \"Death of the Salaryman.\" Financial Times (Weekend), May 17\u201318.\nNoble, G.W. 2000. \"Let a Hundred Channels Contend: Technological Change, Political Opening, and Bureaucratic Priorities in Japanese Television Broadcasting.\" Journal of Japanese Studies 26 (1): 79\u2013109.\nNoguchi, M.S. 2009. \"Get Set for Next Year's Overhaul of Official Kanji.\"\nJapan Times, October 21. http://search.japantemes.co/jp/cgibin/ek20091021mn.html.\nOECD. 1980. \"OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.\" September. http://www.oecd.org/document/18/0,2340,en_2649_201185_1815186_1_1_1_1,00.html.\nOgasawara, M. 2008. ID Troubles: The National Identification Systems in Japan and the (mis) Construction of the Subject. MA Thesis, Queen's University, Ontario, Canada. http://qspace.library.queensu.ca/bitstream/1974/1222/1/Ogasawara_Midori_200805_MA.pdf.\nOgura, T. 2001. \u76e3\u8996\u793e\u4f1a\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc (Surveillance Society and Privacy). Tokyo: \u30a4\u30f3\u30d1\u30af\u30c8\u51fa\u7248\u4f1a (Impact Shuppankai).\nOgura, T. 2003. \u8def\u4e0a\u306b\u81ea\u7531\u3092 (Freedom in the Streets!). Tokyo: \u30a4\u30f3\u30d1\u30af\u30c8\u51fa\u7248\u4f1a (Impact Shuppankai).\nOgura, T. 2005. \u30b0\u30ed\u30fc\u30d0\u30eb\u5316\u3068\u76e3\u8996\u8b66\u5bdf\u56fd\u5bb6\u3078\u306e\u62b5\u6297(Resistance against Globalisation and the Surveillance/Police State). Tokyo: \u6a39\u82b1\u820e (Kinohanasha).\nOhta, H., H. Tsubouchi, and T. Tsuji. 2003. \u6240\u5f97\u7a0e\u306b\u304a\u3051\u308b\u6c34\u5e73\u7684\u516c\u5e73\u6027\u306b\u3064\u3044\u3066 (Horizontal fairness of income taxation).\nJapanese Cabinet Office Report. http://www5.cao.go.jp/keizai3/discussion-paper/dp031.pdf.\nOizumi, E. 1994. \"Property Finance in Japan: Expansion and Collapse of the Bubble Economy.\" Environment and Planning A 26 (2): 199\u2013213.\nOkamura, H. 2005. \u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e\u77e5\u8b58 (Knowledge on Act on the Protection of Personal Information). Tokyo: \u65e5\u672c\u7d4c\u6e08\u65b0\u805e\u793e (Nihon Keizai Shimbun).\nOrito, Y., and K. Murata. 2008. \"Socio-cultural Analysis of Personal Information Leakage in Japan.\" Journal of Information Communication and Ethics in Society 6 (2): 161\u2013171.\nOtake, T. 2006. Master of Multitasking Revels in Cyber-Elite Life; Interview with Joi Ito.\" Japan Times. November 5. http://search.japantimes.co.jp/cgi-bin/fl20061105x1.html.\nPekkanen, R. 2006. Japan's Dual Civil Society. Palo Alto, CA: Stanford University Press.\nSakamura, K. 2002. 21\u4e16\u7d00\u65e5\u672c\u306e\u60c5\u5831\u6226\u7565 (Japan's 21st Century Information Strategy). Tokyo: \u5ca9\u6ce2\u66f8\u5e97 (Iwanami Shoten).\nSakurai, Y. 2003. \u3084\u306f\u308a\u5618\u3060\u3063\u305f\u5927\u81e3\u306e\u767a\u8a00 \u5fb4\u7a0e\u4e8b\u52d9\u306b\u4f4f\u57fa\u30cd\u30c3\u30c8\u4f7f\u7528 (The minister told a lie: Juki Net will be used for tax collection). Weekly Diamond. February 24.\nSaxonhouse, G.R., and R.M. Stern. 2004. Japan's Lost Decade: Origins, Consequences and Prospects for Recovery. Oxford: Blackwell.\nSchwartz, F.J., and S.J. Pharr, eds. 2003. The State of Civil Society in Japan. Cambridge: Cambridge University Press.\nShiraishi, A. 2009. \u300c\u67ff\u300d\u306a\u30699\u5b57\u8ffd\u52a0\u3001\u300c\u9df9\u300d\u306f\u9078\u5916 \u65b0\u5e38\u7528\u6f22\u5b57\u306e\u4fee\u6b63\u6848 (New draft table adds 196 everyday-use kanji). Asahi Shimbun. October 23.\nTravis, A. 2005. \"Labour Steps Back in Push for ID Cards.\" The Guardian, August 4.\nUnicode Consortium. 2006. The Unicode Standard, Version 5.0. Boston, MA: Addison-Wesley.\nWestin, A.F. 1967. Privacy and Freedom. Parsippany, NJ: Atheneum.\nYamada, H. 2000. \u500b\u4eba\u60c5\u5831\u5b88\u308c\u306c\u4f4f\u6c11\u53f0\u5e33\u30cd\u30c3\u30c8 (Juki Net cannot protect personal information). Asahi Shimbun, July 15.\nYamagishi, T., and M. Yamagishi. 1994. \"Trust and Commitment in the United States and Japan.\" Motivation and Emotion 18 (2): 129\u2013166."]}</dct:description>
    <dct:accessRights rdf:resource="http://publications.europa.eu/resource/authority/access-right/PUBLIC"/>
    <dct:accessRights>
      <dct:RightsStatement rdf:about="info:eu-repo/semantics/openAccess">
        <rdfs:label>Open Access</rdfs:label>
      </dct:RightsStatement>
    </dct:accessRights>
    <dct:license rdf:resource="http://creativecommons.org/licenses/by-nc/2.0/"/>
    <dcat:distribution>
      <dcat:Distribution>
        <dcat:accessURL rdf:resource="https://doi.org/10.5281/zenodo.812344">https://doi.org/10.5281/zenodo.812344</dcat:accessURL>
        <dcat:byteSize>365314</dcat:byteSize>
        <dcat:downloadURL rdf:resource="https://zenodo.org/record/812344/files/The_Development_of_Japanese_Data_Protection_Publisher_Version.pdf">https://zenodo.org/record/812344/files/The_Development_of_Japanese_Data_Protection_Publisher_Version.pdf</dcat:downloadURL>
        <dcat:mediaType>application/pdf</dcat:mediaType>
      </dcat:Distribution>
    </dcat:distribution>
  </rdf:Description>
</rdf:RDF>
62
66
views
downloads
All versions This version
Views 6262
Downloads 6666
Data volume 24.1 MB24.1 MB
Unique views 5656
Unique downloads 6262

Share

Cite as