1 / 10

The Impact of the Personal-Information Protection Laws in Japan: A Bibliometric Perspective

Rump session at PET2006. The Impact of the Personal-Information Protection Laws in Japan: A Bibliometric Perspective. Kanta MATSUURA (The University of Tokyo). Cf. “Towards Modeling Wireless Location Privacy ”, at PET2005 by Leping Huang, Hiroshi Yamane, Kanta Matsuura , and Kaoru Sezaki

Download Presentation

The Impact of the Personal-Information Protection Laws in Japan: A Bibliometric Perspective

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Rump session at PET2006 The Impact of the Personal-Information Protection Laws in Japan: A Bibliometric Perspective Kanta MATSUURA (The University of Tokyo) Cf. “Towards Modeling Wireless Location Privacy”, at PET2005 by Leping Huang, Hiroshi Yamane, Kanta Matsuura, and Kaoru Sezaki “An Empirical Analysis of Security Investment in Countermeasures Based on an Enterprise Survey in Japan”, at WEIS2006 by Wei Liu, Hideyuki Tanaka and Kanta Matsuura

  2. We may need quicker innovation/cultivation • The major origin of real-world breaches: a gap problem • Study the research community itself. Sophisticated Attackers/Technologies How can we shorten the gap? Popular Level/Literacy

  3. Activities of the Japanese research community • Bibliometric data observed at SCIS (Symposium on Cryptography and Information Security) • Foundedin 1984 and held annually. • A large number of research papers. • Addressing information security and privacy from various angles. • Quality of published materials is not formally controlled but controlled to some extent by pressures in reality. • In IT field of Japan, domestic academic societies are very active and researchers place a high priority on the activities.

  4. 340 Year 2005 Large increase of the number of papers in 2005 And 338 in 2006 340 • The (set of) personal-information protection laws came into full operation in April 2005. 2005

  5. Patent survey • Purpose • Evaluate SCIS as an analytical platform in terms of innovative activities • Method: Extract information-security patents by the SCIS authors, that is, filter based on • the IPC numbers (i.e. keywords) and • the names of the applicants/inventors.

  6. Scatter plot of # of papers and # of patent applications • Clear correlation (Each plot: Each year) Number of patent applications by SCIS authors Number of SCIS papers

  7. More Bibliometric analyses (Results by investigating the ratio of the number of cross-sector coauthored papers to that of total papers) Inter-sector collaboration in the information security field is underdeveloped • Saturating around 20% in SCIS ((1986-)1999-2003) • References: 54% in the electrical field (1995) 78% in the machinery field(1995) Lower level compared to the other fields

  8. With a Comparison with the IEEE Symposium on Security and Privacy • Submissions are from all over the world. • Papers from Japan are less than 5% of accepted papers. • Collaboration rate has been consistently lower in Japan. Ours (3-year moving average)

  9. IEEE-SP SCIS Share of each sector

  10. Concluding remarks • Research community’s activities: • Increase in quantity. • With keeping structures such as collaboration rate, sector-wise shares, etc. • Want to study more? • Need a rigorous analysis (like a trend in WEIS).

More Related