{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:54:51Z","timestamp":1743065691159,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031156878"},{"type":"electronic","value":"9783031156885"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15688-5_17","type":"book-chapter","created":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T23:02:42Z","timestamp":1661814162000},"page":"200-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Protection During Criminal Investigations of Personal Data Held by Third Parties"],"prefix":"10.1007","author":[{"given":"Taro","family":"Komukai","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,30]]},"reference":[{"key":"17_CR1","volume-title":"Cyber Privacy: Who Has Your Data and Why You Should Care","author":"A Dos Falcon","year":"2020","unstructured":"Dos Falcon, A.: Cyber Privacy: Who Has Your Data and Why You Should Care. BenBella Books, Dallas (2020)"},{"key":"17_CR2","volume-title":"Data and Goliath","author":"B Schneier","year":"2015","unstructured":"Schneier, B.: Data and Goliath. Norton, New York (2015)"},{"volume-title":"Bulk Collection","year":"2017","unstructured":"Cate, H., Dempsey, J. (eds.): Bulk Collection. Oxford University Press, New York (2017)","key":"17_CR3"},{"key":"17_CR4","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt1pwtb27","volume-title":"The Rise of Big Data Policing","author":"A Ferguson","year":"2017","unstructured":"Ferguson, A.: The Rise of Big Data Policing. New York University Press, New York (2017)"},{"issue":"1","key":"17_CR5","first-page":"63","volume":"4","author":"T Komukai","year":"2020","unstructured":"Komukai, T.: Access to personal data held by third parties by investigating authorities and protection of the individual. J. Inf. Commun. Policy 4(1), 63\u201380 (2020)","journal-title":"J. Inf. Commun. Policy"},{"key":"17_CR6","volume-title":"Understanding Privacy","author":"D Solove","year":"2008","unstructured":"Solove, D.: Understanding Privacy. Harvard University Press, Cambridge (2008)"},{"key":"17_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05023-2","volume-title":"The Emergence of Personal Data Protection as a Fundamental Right of the EU","author":"G Fuster","year":"2014","unstructured":"Fuster, G.: The Emergence of Personal Data Protection as a Fundamental Right of the EU. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05023-2"},{"unstructured":"United States Senate Webpage, Constitution of the United States. https:\/\/www.senate.gov\/civics\/constitution_item\/constitution.htm. Accessed 30 Jan 2022","key":"17_CR8"},{"issue":"3","key":"17_CR9","doi-asserted-by":"publisher","first-page":"547","DOI":"10.2307\/1290314","volume":"98","author":"T Davies","year":"1999","unstructured":"Davies, T.: Recovering the original Fourth Amendment. Mich. Law Rev. 98(3), 547 (1999)","journal-title":"Mich. Law Rev."},{"key":"17_CR10","volume-title":"Understanding Criminal Procedure","author":"J Dressler","year":"2017","unstructured":"Dressler, J., Michaels, A., Simmons, R.: Understanding Criminal Procedure. Carolina Academic Press, Durham (2017)"},{"unstructured":"Boyd v. United States, 116 U.S. 616, 627: Olmstead v. United States, 277 U.S. 438, Goldman v. United States, 316 US 129, 134\u2013136 (1886)","key":"17_CR11"},{"unstructured":"Katz v. US, 389 U.S. 347 (1967)","key":"17_CR12"},{"unstructured":"United States v Miller, 425 U.S. 435, 442 (1976)","key":"17_CR13"},{"unstructured":"Carpenter v. United States, 138 S. Ct. 2206, 2221 (2018)","key":"17_CR14"},{"key":"17_CR15","first-page":"195","volume":"64","author":"A Taslitz","year":"2014","unstructured":"Taslitz, A., Henderson, S.: Reforming the grand jury to protect privacy in third party records. Am. Univ. Law Rev. 64, 195 (2014)","journal-title":"Am. Univ. Law Rev."},{"unstructured":"United States v Morton Salt Co, 338 U.S. 632, 643 (1950)","key":"17_CR16"},{"key":"17_CR17","first-page":"77","volume":"86","author":"P Michael","year":"2019","unstructured":"Michael, P.: Taking data. Univ. Chicago Law Rev. 86, 77\u2013141 (2019)","journal-title":"Univ. Chicago Law Rev."},{"unstructured":"European Union: Regulation 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (2016). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj. Accessed 30 Jan 2022","key":"17_CR18"},{"unstructured":"Ferguson v. City of Charleston, 532 U.S. 67 (2001)","key":"17_CR19"},{"unstructured":"Council of Europe, European Convention on Human Rights and Fundamental Freedoms. https:\/\/www.echr.coe.int\/Documents\/Convention_ENG.pdf. Accessed 30 Jan 2022","key":"17_CR20"},{"unstructured":"European Union: Directive 2016\/680 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008\/977\/JHA (2016). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A32016L0680. Accessed 30 Jan 2022","key":"17_CR21"},{"unstructured":"Charter of Fundamental Rights of the European Union, 7 December 2000. https:\/\/www.europarl.europa.eu\/charter\/pdf\/text_en.pdf. Accessed 30 Jan 2022","key":"17_CR22"},{"key":"17_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7","volume-title":"The EU General Data Protection Regulation (GDPR): A Practical Guide","author":"P Voigt","year":"2017","unstructured":"Voigt, P., von dem Bussche, A.: The EU General Data Protection Regulation (GDPR): A Practical Guide. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57959-7"},{"unstructured":"Prime Minister of Japan and His Cabinet webpage, The Constitution of Japan. https:\/\/japan.kantei.go.jp\/constitution_and_government_of_japan\/constitution_e.html. Accessed 30 Jan 2022","key":"17_CR24"},{"unstructured":"Judgment of Supreme Court, 16 March, Japan (1976). https:\/\/www.courts.go.jp\/app\/hanrei_en\/detail?id=47. Accessed 30 Jan 2022","key":"17_CR25"},{"unstructured":"Kyodo News: Denuded private life, Sekai No. 921, pp. 106\u2013114 (2019)","key":"17_CR26"},{"unstructured":"The Code of Criminal Investigations, Rules of the National Public Safety Commission No. 2, Article 99 (1957)","key":"17_CR27"},{"unstructured":"Judgment of Nagoya District Court, 16 July 2004, Japan (2004). https:\/\/www.courts.go.jp\/app\/hanrei_jp\/detail4?id=7540. Accessed 30 Jan 2022","key":"17_CR28"},{"unstructured":"Uga, K.: A Commentary of the Act on the Protection of Personal Information (APPI), 6th edn. Yuhikaku, Tokyo (2018)","key":"17_CR29"},{"unstructured":"Ministry of Internal Affairs and Communications (MIC): Commentary for guidelines For Protection Of Personal Information In Telecommunications Business, MIC Notice No. 152 of 2017; Last Amendment: MIC Notice No. 297 of 2017, September 2017 (Updated in February 2021). https:\/\/www.soumu.go.jp\/main_content\/000744055.pdf. Accessed 30 Jan 2022","key":"17_CR30"},{"unstructured":"Yonemura, S.: Lectures on Medical Law. Nippon Hyoron Sha, Tokyo (2016)","key":"17_CR31"},{"key":"17_CR32","doi-asserted-by":"publisher","DOI":"10.1017\/9781316459607","volume-title":"The Fourth Amendment in an Age of Surveillance","author":"D Gray","year":"2017","unstructured":"Gray, D.: The Fourth Amendment in an Age of Surveillance. Cambridge University Press, Cambridge (2017)"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Choice and Digital by Default: Autonomy vs Digital Determination"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15688-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T23:08:43Z","timestamp":1661814523000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15688-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031156878","9783031156885"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15688-5_17","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"30 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Human Choice and Computers","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tokyo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hcc15.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}