{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:46Z","timestamp":1750308826518,"version":"3.41.0"},"reference-count":34,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T00:00:00Z","timestamp":1283299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001700","name":"Ministry of Education, Culture, Sports, Science, and Technology","doi-asserted-by":"publisher","award":["21730304","22530378"],"award-info":[{"award-number":["21730304","22530378"]}],"id":[{"id":"10.13039\/501100001700","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCAS Comput. Soc."],"published-print":{"date-parts":[[2010,9]]},"abstract":"<jats:p>The construction of a secure and safe society using information and communication technology (ICT) is recognised as an urgent issue in Japan. This recognition is based on public fear about crime related to manufactured risk caused by modernisation or industrial civilisation. This fear has created a social atmosphere that has led to the rapid development and implementation of security systems using ICT, such as security cameras, smart IC cards and mobile phones, to establish security and safety in Japanese society. However, the never-ending quest for social security and safety with ICT will inevitably cause further manufactured risk, which could lead to serious problems in the future. We have to recognise such risk and control it appropriately.<\/jats:p>","DOI":"10.1145\/1862406.1862409","type":"journal-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T11:55:58Z","timestamp":1285156558000},"page":"38-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Japanese risk society"],"prefix":"10.1145","volume":"40","author":[{"given":"Kiyoshi","family":"Murata","sequence":"first","affiliation":[{"name":"Meiji University"}]},{"given":"Yohko","family":"Orito","sequence":"additional","affiliation":[{"name":"Ehime University"}]}],"member":"320","published-online":{"date-parts":[[2010,9]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"}}Abe K. (1995) What Is Seken? Kodansha: Tokyo (in Japanese). }}Abe K. (1995) What Is Seken? Kodansha: Tokyo (in Japanese)."},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","unstructured":"}}Andrejevic M. (2007) iSpy: Surveillance and Power in the Internet Era. University Press of Kansas: Lawrence KS. }}Andrejevic M. (2007) iSpy: Surveillance and Power in the Internet Era. University Press of Kansas: Lawrence KS.","DOI":"10.1353\/book.119494"},{"key":"e_1_2_1_3_1","unstructured":"}}Aoyagi T. (2006) Cyber Surveillance Society: Privacy in the Ubiquitous Age. Denki Tsushin Shinkokai: Tokyo (in Japanese). }}Aoyagi T. (2006) Cyber Surveillance Society: Privacy in the Ubiquitous Age. Denki Tsushin Shinkokai: Tokyo (in Japanese)."},{"key":"e_1_2_1_4_1","unstructured":"}}Beck U. (1992) Risk Society: Towards a New Modernity. Sage Publications: London. }}Beck U. (1992) Risk Society: Towards a New Modernity. Sage Publications: London."},{"key":"e_1_2_1_5_1","unstructured":"}}Cabinet Office (2007) An Opinion Poll on Public Security. http:\/\/www8.cao.go.jp\/survey\/h18\/h18-chian\/index.html accessed 24.07.2009 (in Japanese). }}Cabinet Office (2007) An Opinion Poll on Public Security. http:\/\/www8.cao.go.jp\/survey\/h18\/h18-chian\/index.html accessed 24.07.2009 (in Japanese)."},{"key":"e_1_2_1_6_1","unstructured":"}}Ben-Dasan I. (1971) Japanese and Abrahamidae. Kadokawa Shoten: Tokyo (in Japanese). }}Ben-Dasan I. (1971) Japanese and Abrahamidae. Kadokawa Shoten: Tokyo (in Japanese)."},{"key":"e_1_2_1_7_1","unstructured":"}}Council of Ministries for Crime Control (2003) Action Programme for Construction of a Crime-free Society: Towards Renascence of the World's Safest Country. http:\/\/www.kantei.go.jp\/jp\/singi\/hanzai\/kettei\/031218keikaku.html accessed 16.01.2010 (in Japanese). }}Council of Ministries for Crime Control (2003) Action Programme for Construction of a Crime-free Society: Towards Renascence of the World's Safest Country. http:\/\/www.kantei.go.jp\/jp\/singi\/hanzai\/kettei\/031218keikaku.html accessed 16.01.2010 (in Japanese)."},{"key":"e_1_2_1_8_1","unstructured":"}}Gandy O. H. Jr. (1993) The Panoptic Sort: A Political Economy of Personal Information. Westview Press: Boulder CO. }}Gandy O. H. Jr. (1993) The Panoptic Sort: A Political Economy of Personal Information. Westview Press: Boulder CO."},{"key":"e_1_2_1_9_1","unstructured":"}}Giddens A. (1994) \"Living in a post-traditional society \" in Reflexive Modernization: Politics Tradition and Aesthetics in the Modern Social Order Beck U. Giddens A. and Lash S. Polity Press: Cambridge. }}Giddens A. (1994) \"Living in a post-traditional society \" in Reflexive Modernization: Politics Tradition and Aesthetics in the Modern Social Order Beck U. Giddens A. and Lash S. Polity Press: Cambridge."},{"key":"e_1_2_1_10_1","unstructured":"}}Giddens A. (1999) Runaway World: How Globalisation Is Reshaping Our Lives. Profile Books: London. }}Giddens A. (1999) Runaway World: How Globalisation Is Reshaping Our Lives. Profile Books: London."},{"key":"e_1_2_1_11_1","unstructured":"}}Goto K. (2009) Public Order in Japan. Shinchosha: Tokyo (in Japanese). }}Goto K. (2009) Public Order in Japan. Shinchosha: Tokyo (in Japanese)."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/00071310020015280"},{"key":"e_1_2_1_13_1","first-page":"10","article-title":"How 'the myth of collapsing safe society' has been created in Japan: beyond the moral panic and victim industry","volume":"29","author":"Hamai K.","year":"2004","journal-title":"Japanese Journal of Sociological Criminology."},{"key":"e_1_2_1_14_1","unstructured":"}}Hamai K. and Serizawa K. (2006) Crime-phobia Society: Is Anyone Suspicious? Kobunsha: Tokyo (in Japanese). }}Hamai K. and Serizawa K. (2006) Crime-phobia Society: Is Anyone Suspicious? Kobunsha: Tokyo (in Japanese)."},{"key":"e_1_2_1_15_1","unstructured":"}}IT Media News (2006) 64 percent parents want to let their children have a mobile phone with the crime prevention facilities. http:\/\/www.itmedia.co.jp\/survey\/articles\/0602\/02\/news018.html accessed on 16.01.2010 (in Japanese). }}IT Media News (2006) 64 percent parents want to let their children have a mobile phone with the crime prevention facilities. http:\/\/www.itmedia.co.jp\/survey\/articles\/0602\/02\/news018.html accessed on 16.01.2010 (in Japanese)."},{"key":"e_1_2_1_16_1","unstructured":"}}IT Strategic Headquarters (2008) Priority Policy Programme 2008. http:\/\/www.kantei.go.jp\/foreign\/policy\/it\/Program2008.pdf accessed 24.07.2009. }}IT Strategic Headquarters (2008) Priority Policy Programme 2008. http:\/\/www.kantei.go.jp\/foreign\/policy\/it\/Program2008.pdf accessed 24.07.2009."},{"key":"e_1_2_1_17_1","first-page":"99","article-title":"Anticrime volunteers and surveillance society","volume":"55","author":"Ito T.","year":"2005","journal-title":"Media Communication."},{"key":"e_1_2_1_18_1","unstructured":"}}Jones M. and Jones E. (1999) Mass Media. Palgrave Macmillan: London. }}Jones M. and Jones E. (1999) Mass Media. Palgrave Macmillan: London."},{"key":"e_1_2_1_19_1","unstructured":"}}Kawai M. (2004) Paradoxes of the Disillusionment with the Myth of the Secure Japanese Society: Socio-legal Study on Public Order. Iwanami Shoten: Tokyo (in Japanese). }}Kawai M. (2004) Paradoxes of the Disillusionment with the Myth of the Secure Japanese Society: Socio-legal Study on Public Order. Iwanami Shoten: Tokyo (in Japanese)."},{"key":"e_1_2_1_20_1","unstructured":"}}Kawashima T. (1967) Japanese Sense of Law. Iwanami Shoten: Tokyo (in Japanese). }}Kawashima T. (1967) Japanese Sense of Law. Iwanami Shoten: Tokyo (in Japanese)."},{"key":"e_1_2_1_21_1","unstructured":"}}Kubo H. (2006) Has Public Order Deteriorated in Japan? Kojinsha: Tokyo (in Japanese). }}Kubo H. (2006) Has Public Order Deteriorated in Japan? Kojinsha: Tokyo (in Japanese)."},{"key":"e_1_2_1_22_1","unstructured":"}}Lessig L. (1999) Code and Other Laws of Cyberspace. Basic Books: New York. }}Lessig L. (1999) Code and Other Laws of Cyberspace. Basic Books: New York."},{"key":"e_1_2_1_23_1","unstructured":"}}Lyon D. (2001) Surveillance Society: Monitoring Everyday Life. Open University Press: Buckingham. }}Lyon D. (2001) Surveillance Society: Monitoring Everyday Life. Open University Press: Buckingham."},{"key":"e_1_2_1_24_1","unstructured":"}}Lyon D. (2003) \"Surveillance as social sorting: computer codes and mobile bodies \" in Surveillance and Social Sorting: Privacy Risk and Digital Discrimination Lyon D. ed. Routledge: New York 13--30. }}Lyon D. (2003) \"Surveillance as social sorting: computer codes and mobile bodies \" in Surveillance and Social Sorting: Privacy Risk and Digital Discrimination Lyon D. ed. Routledge: New York 13--30."},{"key":"e_1_2_1_25_1","unstructured":"}}Murata K. (2010) Information ethics and culture: revisiting traditional Japanese ethical values. http:\/\/www.ccsr.cse.dmu.ac.uk\/conferences\/ethicomp\/ethicomp2010\/Information%20ethics%20and%20culture%20ETHICOMP%202010%20revised.pdf accessed on 13.06.2010. }}Murata K. (2010) Information ethics and culture: revisiting traditional Japanese ethical values. http:\/\/www.ccsr.cse.dmu.ac.uk\/conferences\/ethicomp\/ethicomp2010\/Information%20ethics%20and%20culture%20ETHICOMP%202010%20revised.pdf accessed on 13.06.2010."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-005-0453-1"},{"key":"e_1_2_1_27_1","unstructured":"}}National Police Agency (2009) Crime Settings in 2008. http:\/\/www.npa.go.jp\/toukei\/seianki7\/h20hanzaizyousei.pdf accessed 24.07.2009 (in Japanese). }}National Police Agency (2009) Crime Settings in 2008. http:\/\/www.npa.go.jp\/toukei\/seianki7\/h20hanzaizyousei.pdf accessed 24.07.2009 (in Japanese)."},{"key":"e_1_2_1_28_1","unstructured":"}}National Public Safety Commission and National Police Agency (2005) On Continuous Reform of Police Force: Towards Regaining Security and Trust. http:\/\/www.npa.go.jp\/seisaku\/soumu10\/20051228.pdf accessed 16.01.2010 (in Japanese). }}National Public Safety Commission and National Police Agency (2005) On Continuous Reform of Police Force: Towards Regaining Security and Trust. http:\/\/www.npa.go.jp\/seisaku\/soumu10\/20051228.pdf accessed 16.01.2010 (in Japanese)."},{"volume-title":"Proceedings of UK-Japan Symposium \"Privacy and Security in the Information Society\". 98--112","year":"2008","author":"Otsu N.","key":"e_1_2_1_29_1"},{"key":"e_1_2_1_30_1","unstructured":"}}Serizawa K. (2009) Runaway Security. Yosensha: Tokyo (in Japanese). }}Serizawa K. (2009) Runaway Security. Yosensha: Tokyo (in Japanese)."},{"key":"e_1_2_1_31_1","unstructured":"}}Tsunoda T. (2005) \"Japanese public safety is maintained well \" in Resistance against Globalisation and the Surveillance\/Police State Ogura T. ed. Kinohanasha: Tokyo 195--259 (in Japanese). }}Tsunoda T. (2005) \"Japanese public safety is maintained well \" in Resistance against Globalisation and the Surveillance\/Police State Ogura T. ed. Kinohanasha: Tokyo 195--259 (in Japanese)."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02249397"},{"key":"e_1_2_1_33_1","unstructured":"}}Yamagishi T. (1998) The Structure of Trust: The Evolutionary Games of Mind and Society. University of Tokyo Press: Tokyo (in Japanese). }}Yamagishi T. (1998) The Structure of Trust: The Evolutionary Games of Mind and Society. University of Tokyo Press: Tokyo (in Japanese)."},{"key":"e_1_2_1_34_1","unstructured":"}}Whitaker R. (1999) The End of Privacy: How Total Surveillance Is Becoming a Reality. The New Press: New York. }}Whitaker R. (1999) The End of Privacy: How Total Surveillance Is Becoming a Reality. The New Press: New York."}],"container-title":["ACM SIGCAS Computers and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1862406.1862409","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1862406.1862409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:55Z","timestamp":1750278415000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1862406.1862409"}},"subtitle":["trying to create complete security and safety using information and communication technology"],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,9]]}},"alternative-id":["10.1145\/1862406.1862409"],"URL":"https:\/\/doi.org\/10.1145\/1862406.1862409","relation":{},"ISSN":["0095-2737"],"issn-type":[{"type":"print","value":"0095-2737"}],"subject":[],"published":{"date-parts":[[2010,9]]},"assertion":[{"value":"2010-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}