{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:37:12Z","timestamp":1742913432131,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811076046"},{"type":"electronic","value":"9789811076053"}],"license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7605-3_43","type":"book-chapter","created":{"date-parts":[[2017,12,19]],"date-time":"2017-12-19T06:22:45Z","timestamp":1513664565000},"page":"258-264","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Consideration of Privacy Risk Assessment of the My Number in the Financial Industry in Japan"],"prefix":"10.1007","author":[{"given":"Sanggyu","family":"Shin","sequence":"first","affiliation":[]},{"given":"Yoichi","family":"Seto","sequence":"additional","affiliation":[]},{"given":"Kei","family":"Sakamoto","sequence":"additional","affiliation":[]},{"given":"Mayumi","family":"Sasaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"key":"43_CR1","unstructured":"Act on the Use of Numbers to Identify a Specific Individual in the Administrative Procedure (Act No. 27 of 31 May 2013). \n                  http:\/\/www.cas.go.jp\/jp\/seisaku\/bangoseido\/pdf\/260717bangouhou.pdf"},{"key":"43_CR2","unstructured":"A draft of a bill to amend part of the Act on the Protection of Personal Information and the Act on Utilization of Numbers to Identify Specific Individuals in Administrative Procedures (Overview), February 2015. \n                  https:\/\/www.kantei.go.jp\/jp\/singi\/it2\/senmon_bunka\/number\/dai8\/siryou2.pdf"},{"key":"43_CR3","volume-title":"Practical Privacy Risk Assessment Technique - Privacy by Design and Personal Information Impact Assessment","author":"Y Seto","year":"2014","unstructured":"Seto, Y.: Practical Privacy Risk Assessment Technique - Privacy by Design and Personal Information Impact Assessment. Kindaikagaku Press, Tokyo (2014)"},{"key":"43_CR4","unstructured":"Specific personal information protection assessment guideline, April 2014. \n                  http:\/\/www.ppc.go.jp\/files\/pdf\/shishin.pdf"},{"key":"43_CR5","unstructured":"Mayumi, S., Kei, S., Kazuhiro M., Sanggyu, S., Yoichi, S.: The problem analysis of specific personal information protection assessment. In: CSS 2015, vol. 2015(3), pp. 1199\u20131206 (2015)"},{"key":"43_CR6","unstructured":"Kei, S., Mayumi, S., Sanggyu, S., Yoichi, S.: A Study on the privacy risk assessment of responding to National ID Act in the financial sector. In: 2016 Symposium on Cryptography and Information Security (SCIS 2016) (2016)"},{"key":"43_CR7","unstructured":"Guidelines on proper handling of specific personal information in financial services, December 2014. \n                  http:\/\/www.ppc.go.jp\/files\/pdf\/141211kinyu-guideline.pdf"},{"key":"43_CR8","volume-title":"Privacy Impact Assessment PIA and Personal Information Protection","author":"S Yoichi","year":"2010","unstructured":"Yoichi, S., Hiroaki, R., Fumio, S., Yasujiro, M., Hiroaki, I.: Privacy Impact Assessment PIA and Personal Information Protection. Chuokeizai Press, Tokyo (2010)"},{"key":"43_CR9","unstructured":"Sang-gyu, S., Tomomi, H., Mayumi, S., Yoichi, S.: Analysis of risk items in specific personal information protection assessment. In: The 32th Symposium on Cryptography and Information Security (2015)"},{"key":"43_CR10","unstructured":"ISO22307:2008 Financial services \u2013 Privacy impact assessment. \n                  http:\/\/www.iso.org\/iso\/catalogue_detail.htm?csnumber=40897"},{"issue":"1","key":"43_CR11","first-page":"3","volume":"29","author":"N Satoru","year":"2015","unstructured":"Satoru, N., Naoko, O., Michiya, O., Haruyki, K., Makoto, S., Yoichi, S.: Development of guidelines for personal information impact assessment. J. Jpn. Soc. Secur. Manage. 29(1), 3\u201316 (2015)","journal-title":"J. Jpn. Soc. Secur. Manage."},{"key":"43_CR12","unstructured":"Explanation of Specific Personal Information Protection Assessment Guidelines, November 2014. \n                  http:\/\/www.ppc.go.jp\/files\/pdf\/explanation.pdf"},{"key":"43_CR13","unstructured":"Inspection Manual for Deposit-Taking Institutions, June 2014. \n                  http:\/\/www.fsa.go.jp\/en\/refer\/manual\/yokin_e\/y-all.pdf"},{"key":"43_CR14","unstructured":"About financial information system and FISC safety measures standard, December 2014. \n                  http:\/\/www.fsa.go.jp\/singi\/singi_kinyu\/kessai_sg\/siryou\/20141208\/03.pdf"},{"key":"43_CR15","unstructured":"The Guidelines on the Protection of Personal Information, November 2009. \n                  http:\/\/www.fsa.go.jp\/common\/law\/kj-hogo\/01.pdf"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7605-3_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T22:07:13Z","timestamp":1558130833000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7605-3_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"ISBN":["9789811076046","9789811076053"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7605-3_43","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017,12,20]]},"assertion":[{"value":"20 December 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CUTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ubiquitous Information Technologies and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taichung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cute2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}