{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:14Z","timestamp":1750220714578,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T00:00:00Z","timestamp":1580428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,31]]},"DOI":"10.1145\/3383845.3383856","type":"proceedings-article","created":{"date-parts":[[2020,4,5]],"date-time":"2020-04-05T16:15:03Z","timestamp":1586103303000},"page":"3-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Survey of Specification Explanations about the Risk of Data Handling in Cloud Translation Services"],"prefix":"10.1145","author":[{"given":"Miyuki","family":"Fujii","sequence":"first","affiliation":[{"name":"Institute of Information Security, Tsuruya-cho, Kanagawa-ku, Yokohama-city, Kanagawa, JAPAN"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Midori","family":"Inaba","sequence":"additional","affiliation":[{"name":"Institute of Information Security, Tsuruya-cho, Kanagawa-ku, Yokohama-city, Kanagawa, JAPAN"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,4,5]]},"reference":[{"volume-title":"Economics of asymmetric information","author":"Yabushita S.","key":"e_1_3_2_1_1_1","unstructured":"Yabushita , S. 2002. Economics of asymmetric information . Kobunsha Co., Ltd. Yabushita, S. 2002. Economics of asymmetric information. Kobunsha Co., Ltd."},{"volume-title":"as of","year":"2015","key":"e_1_3_2_1_2_1","unstructured":"Nihon Keizai Shimbun (The Nikkei). as of Feb. 20, 2015 . The confidential information of the central government and major manufacturers entered on the translation site can be viewed. https:\/\/www.nikkei.com\/article\/DGXLASDG20H2X_Q5A220C1CC0000\/. Accessed Jun . 1, 2019. Nihon Keizai Shimbun (The Nikkei). as of Feb. 20, 2015. The confidential information of the central government and major manufacturers entered on the translation site can be viewed. https:\/\/www.nikkei.com\/article\/DGXLASDG20H2X_Q5A220C1CC0000\/. Accessed Jun. 1, 2019."},{"volume-title":"as of","year":"2015","key":"e_1_3_2_1_3_1","unstructured":"HUFFPOST (JP). as of Feb. 20, 2015 . What they entered on the translation site, full view of affairs and salary information. https:\/\/www.huffingtonpost.jp\/2015\/02\/20\/translation-online-service_n_6718922.html. Accessed Jun. 8, 2019. HUFFPOST (JP). as of Feb. 20, 2015. What they entered on the translation site, full view of affairs and salary information. https:\/\/www.huffingtonpost.jp\/2015\/02\/20\/translation-online-service_n_6718922.html. Accessed Jun. 8, 2019."},{"key":"e_1_3_2_1_4_1","volume-title":"10 Major Security Threats For the year","author":"Security Center of Information-technology Promotion Agency (IPA), Japan. 2016.","year":"2016","unstructured":"Security Center of Information-technology Promotion Agency (IPA), Japan. 2016. 10 Major Security Threats For the year 2016 . p47. Security Center of Information-technology Promotion Agency (IPA), Japan. 2016. 10 Major Security Threats For the year 2016. p47."},{"key":"e_1_3_2_1_5_1","unstructured":"Consumer Affairs Agency. 2018. Commentary on Product Liability Law. Article 2 \"Definition\".  Consumer Affairs Agency. 2018. Commentary on Product Liability Law. Article 2 \"Definition\"."},{"key":"e_1_3_2_1_6_1","volume-title":"A Note on Software Product Liability and Open Source Software","author":"Taniguchi N.","year":"2015","unstructured":"Taniguchi , N. 2005. A Note on Software Product Liability and Open Source Software . Research Papers of Information Processing Society of Japan . 2015 -EIP-28(4). pp17--24. Taniguchi, N. 2005. A Note on Software Product Liability and Open Source Software. Research Papers of Information Processing Society of Japan. 2015-EIP-28(4). pp17--24."},{"volume-title":"Improving risk communication","author":"National Research Council. 1989.","key":"e_1_3_2_1_7_1","unstructured":"National Research Council. 1989. Improving risk communication . Washington, DC : National Academy Press . National Research Council. 1989. Improving risk communication. Washington, DC: National Academy Press."},{"issue":"2","key":"e_1_3_2_1_8_1","first-page":"23","article-title":"Some Difficulties in Making a Risk Communication with the Members of Public","volume":"18","author":"Chikamoto K.","year":"2008","unstructured":"Chikamoto , K. 2008 . Some Difficulties in Making a Risk Communication with the Members of Public . Journal of the Society for Risk Analysis, Japan. 18 ( 2 ). pp. 23 -- 31 . Chikamoto, K. 2008. Some Difficulties in Making a Risk Communication with the Members of Public. Journal of the Society for Risk Analysis, Japan. 18(2). pp.23--31.","journal-title":"Journal of the Society for Risk Analysis, Japan."},{"volume-title":"Does Anyone Read Online Privacy Policy? https:\/\/www.ecommercetimes.com\/story\/11303.html Accessed","year":"2019","key":"e_1_3_2_1_9_1","unstructured":"Commerce Times as of Jun 15, 2001. Does Anyone Read Online Privacy Policy? https:\/\/www.ecommercetimes.com\/story\/11303.html Accessed Sep. 18, 2019 . Commerce Times as of Jun 15, 2001. Does Anyone Read Online Privacy Policy? https:\/\/www.ecommercetimes.com\/story\/11303.html Accessed Sep. 18, 2019."},{"volume-title":"Accessed","year":"2019","key":"e_1_3_2_1_10_1","unstructured":"The materials 2-3 distributed by the 4th Personal Information Protection Committee in 2015. https:\/\/www.ppc.go.jp\/aboutus\/minutes\/2015\/20160329\/ . Accessed Jul. 29, 2019 . The materials 2-3 distributed by the 4th Personal Information Protection Committee in 2015. https:\/\/www.ppc.go.jp\/aboutus\/minutes\/2015\/20160329\/. Accessed Jul. 29, 2019."},{"key":"e_1_3_2_1_11_1","first-page":"31","volume-title":"The Approach Method of Food Traceability \"Practical Manual","author":"Agriculture Forestry","unstructured":"Ministry of Agriculture , Forestry and Fisheries . 2016. The Approach Method of Food Traceability \"Practical Manual \". p 31 . Ministry of Agriculture, Forestry and Fisheries. 2016. The Approach Method of Food Traceability \"Practical Manual\". p31."}],"event":{"name":"ICCMB 2020: 2020 The 3rd International Conference on Computers in Management and Business","sponsor":["Univ. of Manchester University of Manchester","The Hong Kong Polytechnic The Hong Kong Polytechnic University"],"location":"Tokyo Japan","acronym":"ICCMB 2020"},"container-title":["Proceedings of the 2020 the 3rd International Conference on Computers in Management and Business"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383845.3383856","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3383845.3383856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:19Z","timestamp":1750199599000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383845.3383856"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,31]]},"references-count":11,"alternative-id":["10.1145\/3383845.3383856","10.1145\/3383845"],"URL":"https:\/\/doi.org\/10.1145\/3383845.3383856","relation":{},"subject":[],"published":{"date-parts":[[2020,1,31]]},"assertion":[{"value":"2020-04-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}