{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T16:59:09Z","timestamp":1756573149264,"version":"3.41.2"},"reference-count":28,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2008,9,12]],"date-time":"2008-09-12T00:00:00Z","timestamp":1221177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9,12]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to reconsider the concept of the right to information privacy and to propose, from a Japanese perspective, a revised conception of this right that is suitable for the modern information society.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>First, the concept of privacy and personal information protection in the information society is briefly explained. After that, confused situations in Japan caused by the enforcement of Act on the Protection of Personal Information are described followed by the analysis of the Japanese socio\u2010cultural circumstances surrounding privacy. Based on these, the effectiveness of the concept of the right to information privacy in the Japanese socio\u2010cultural and economic context is examined and the need to rethink the concept of the right to information privacy discussed. Finally, a revised conception of the right is proposed.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>In view of the circumstances in Japan, the concept of the right to information privacy, defined as \u201can individual's right to control the circulation of information relating to him\/herself\u201d, as well as the Organisation for Economic Co\u2010operation and Development's eight principles already become outdated in today's sophisticated information\u2010communication society. There is a need to control\/restrict use of personal information so that individuals' autonomy and freedom is ensured in the current situation and to revise the concept of the right to information privacy based on this idea.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper proposes a revision of the concept of the right to information privacy focused on control of, not access to, use of personal information. The revised concept is defined so that individuals' autonomy and freedom is ensured even in the \u201cinformational transparent\u201d society.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14779960810916237","type":"journal-article","created":{"date-parts":[[2008,9,27]],"date-time":"2008-09-27T07:08:05Z","timestamp":1222499285000},"page":"233-245","source":"Crossref","is-referenced-by-count":10,"title":["Rethinking the concept of the right to information privacy: a Japanese perspective"],"prefix":"10.1108","volume":"6","author":[{"given":"Kiyoshi","family":"Murata","sequence":"first","affiliation":[]},{"given":"Yohko","family":"Orito","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031720213256400_b1","doi-asserted-by":"crossref","unstructured":"de George, R.T. (2003), The Ethics of Information Technology and Business, Blackwell, Oxford.","DOI":"10.1002\/9780470774144"},{"key":"key2022031720213256400_b2","unstructured":"Doi, T. (1973), The Anatomy of Dependence: The Key Analysis of Japanese Behavior, Kodansha International, Tokyo."},{"key":"key2022031720213256400_b3","unstructured":"European Parliament and the Council of the European Union (1995), Directive 95\/46\/EC of the European Parliament and the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal information and on the Free Movement of Such Data, available at: http:\/\/europa.eu.int\/eur\u2010lex\/lex\/LexUriServ\/LexUriServ.do?uri\u2009=\u2009CELEX:31995L0046:EN:HTML (accessed January 16, 2007)."},{"key":"key2022031720213256400_b4","doi-asserted-by":"crossref","unstructured":"Floridi, L. (2006), \u201cFour challenges for a theory of informational privacy\u201d, Ethics and Information Technology, Vol. 8 No. 3, pp. 109\u201019.","DOI":"10.1007\/s10676-006-9121-3"},{"key":"key2022031720213256400_b5","unstructured":"Hayahi, S. (1984), Management and Culture, Chuokoronsha, Tokyo (in Japanese)."},{"key":"key2022031720213256400_b6","doi-asserted-by":"crossref","unstructured":"Hiramatsu, T. (1993), \u201cProtecting telecommunications privacy in Japan\u201d, Communications of the ACM, Vol. 36 No. 8, pp. 74\u20107.","DOI":"10.1145\/163381.163400"},{"key":"key2022031720213256400_b7","unstructured":"Horibe, M. (1988), Privacy and the Advanced Information Society, Iwanami Shoten, Tokyo (in Japanese)."},{"key":"key2022031720213256400_b8","unstructured":"Horibe, M. (1994), \u201cSystems for information disclosure and personal information protection: looking backward and forward\u201d, in Horibe, M. (Ed.), Information Disclosure and Personal Information Protection (special edition of Jurist), Yuhikaku, Tokyo, pp. 2\u201015 (in Japanese)."},{"key":"key2022031720213256400_b9","doi-asserted-by":"crossref","unstructured":"Introna, L.D. (1997), \u201cPrivacy and the computer: why we need privacy in the information society\u201d, Metaphilosophy, Vol. 28 No. 3, pp. 259\u201075.","DOI":"10.1111\/1467-9973.00055"},{"key":"key2022031720213256400_b10","unstructured":"Japan Federation of Bar Associations (2006), \u201cPosition document concerning revision of the Act for Protection of Personal Information\u201d (in Japanese), available at: www.nichibenren.or.jp\/ja\/opinion\/report\/data\/kojin\u2009_\u2009joho.pdf (accessed January 16, 2007)."},{"key":"key2022031720213256400_b11","unstructured":"Kimura, B. (1981), Self, Relationship and Time: Phenomenological Psychopathology, Kobundo, Tokyo (in Japanese)."},{"key":"key2022031720213256400_b12","unstructured":"Lyon, D. (2001), Surveillance Society: Monitoring Everyday Life, Open University Press, Buckingham."},{"key":"key2022031720213256400_b13","doi-asserted-by":"crossref","unstructured":"Mizutani, M., Dorsey, J. and Moor, J.H. (2004), \u201cThe internet and Japanese conception of privacy\u201d, Ethics and Information Technology, Vol. 6, pp. 121\u20108.","DOI":"10.1023\/B:ETIN.0000047479.12986.42"},{"key":"key2022031720213256400_b14","doi-asserted-by":"crossref","unstructured":"Moor, J.H. (1997), \u201cTowards a theory of privacy in the information age\u201d, Computers and Society, Vol. 27 No. 3, pp. 27\u201032.","DOI":"10.1145\/270858.270866"},{"key":"key2022031720213256400_b15","doi-asserted-by":"crossref","unstructured":"Moor, J.H. (1998), \u201cReason, relativity, and responsibility in computer ethics\u201d, Computers and Society, Vol. 28 No. 1, pp. 14\u201021.","DOI":"10.1145\/277351.277355"},{"key":"key2022031720213256400_b16","unstructured":"Murata, K. (2004), \u201cIs global information ethics possible? Opinions on the technologically\u2010dependent society\u201d, Journal of Information, Communication and Ethics in Society, Vol. 2 No. 5, pp. 18\u201019."},{"key":"key2022031720213256400_b17","doi-asserted-by":"crossref","unstructured":"Nakada, M. and Tamura, T. (2005), \u201cJapanese conception of privacy: an intercultural perspective\u201d, Ethics and Information Technology, Vol. 7 No. 1, pp. 27\u201036.","DOI":"10.1007\/s10676-005-0453-1"},{"key":"key2022031720213256400_b18","unstructured":"National Consumer Affairs Center of Japan (2005), \u201cA trend and problems observed in a recent consultation example concerning personal information\u201d, available at: www.kokusen.go.jp\/cgi\u2010bin\/byteserver.pl\/pdf\/n\u201020051107_2.pdf (accessed January 16, 2007)."},{"key":"key2022031720213256400_b19","unstructured":"Nippon Keidanren (2003), \u201cTowards constructing a secure and safe Net society\u201d (in Japanese), available at: www.keidanren.or.jp\/japanese\/policy\/2003\/023\/index.html (accessed May 30, 2007)."},{"key":"key2022031720213256400_b20","unstructured":"OECD (1980), OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Information, OECD, Washington, DC, available at: www.oecd.org\/document\/18\/0,2340,en_2649_34255_1815186_1_1_1_1,00.html (accessed January 16, 2007)."},{"key":"key2022031720213256400_b21","unstructured":"Okamura, H. (2005), Knowledge on Act on the Protection of Personal Information, Nihon Keizai Shimbun, Tokyo (in Japanese)."},{"key":"key2022031720213256400_b22","unstructured":"Orito, Y. and Murata, K. (2005), \u201cPrivacy protection in Japan: cultural influence on the universal value\u201d, Proceedings of ETHICOMP 2005, Link\u00f6ping University, Link\u00f6ping, September 12\u201015."},{"key":"key2022031720213256400_b23","unstructured":"Orito, Y. and Murata, K. (2007), \u201cUtilisation and protection of consumers' personal information in Japan: culture, tradition and business\u201d, Office Automation, Vol. 27 No. 4, pp. 83\u201092 (in Japanese)."},{"key":"key2022031720213256400_b24","doi-asserted-by":"crossref","unstructured":"Orito, Y. and Murata, K. (2008), \u201cSocio\u2010cultural analysis of personal information leakage in Japan\u201d, Journal of Information, Communication & Ethics in Society, Vol. 6 No. 2, pp. 161\u201071.","DOI":"10.1108\/14779960810888365"},{"key":"key2022031720213256400_b25","unstructured":"Rachels, J. (1975), \u201cWhy privacy is important\u201d, Philosophy & Public Affairs, Vol. 4 No. 4, pp. 323\u201033."},{"key":"key2022031720213256400_b26","unstructured":"Shapiro, A.L. (1999), The Control Revolution: How the Internet is Putting Individuals in Charge and Changing the World we Know, PublicAffairs, New York, NY."},{"key":"key2022031720213256400_b27","doi-asserted-by":"crossref","unstructured":"Warren, S.D. and Brandeis, L.D. (1890), \u201cThe right to privacy\u201d, Harvard Law Review, Vol. 4 No. 5, pp. 193\u2010220.","DOI":"10.2307\/1321160"},{"key":"key2022031720213256400_b28","unstructured":"Westin, A.F. (1967), Privacy and Freedom, Atheneum, New York, NY."}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14779960810916237","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779960810916237\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779960810916237\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:13:09Z","timestamp":1753402389000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/6\/3\/233-245\/225152"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,12]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,9,12]]}},"alternative-id":["10.1108\/14779960810916237"],"URL":"https:\/\/doi.org\/10.1108\/14779960810916237","relation":{},"ISSN":["1477-996X"],"issn-type":[{"type":"print","value":"1477-996X"}],"subject":[],"published":{"date-parts":[[2008,9,12]]}}}