Impact of Cybersecurity Regulations on Corporate Compliance Practices in Japan

Authors

  • Rina Yamada

DOI:

https://doi.org/10.47604/ijlp.2705

Keywords:

Cybersecurity Regulations, Corporate Compliance Practices

Abstract

Purpose: The aim of the study was to analyze impact of cybersecurity regulations on corporate compliance practices in Japan.

Methodology: This study adopted a desk methodology. A desk study research design is commonly known as secondary data collection. This is basically collecting data from existing resources preferably because of its low cost advantage as compared to a field research. Our current study looked into already published studies and reports as the data was easily accessed through online journals and libraries.

Findings: In Japan, cybersecurity regulations have significantly influenced corporate compliance practices. The Act on the Prohibition of Unauthorized Computer Access, along with the Penal Code, outlines stringent measures against cybercrimes, mandating corporations to adopt robust cybersecurity protocols to protect against unauthorized access and data breaches. Furthermore, comprehensive data protection laws, such as the Act on the Protection of Personal Information (APPI), require companies to obtain explicit consent for data processing, ensuring a higher standard of data privacy and security compliance.

Unique Contribution to Theory, Practice and Policy: Institutional theory, resource dependence theory & contingency theory may be used to anchor future studies on cybersecurity regulations on corporate compliance practices. Organizations should prioritize building a robust cybersecurity governance framework that integrates regulatory compliance requirements into broader risk management strategies. Policymakers and regulators should adopt a risk-based approach to cybersecurity regulation that takes into account the diverse needs and capabilities of organizations across different sectors and geographical regions.

Downloads

Download data is not yet available.

References

Australian Cyber Security Centre. (2018). Australian Cyber Security Centre Threat Report 2018. Retrieved from https://www.cyber.gov.au/sites/default/files/2018-ACSC-Annual-Cyber-Threat-Report.pdf

Barnes, R., Kılıç, E., & Schilling, A. (2019). Compliance with Cybersecurity Regulation: How It Influences Investment in Information Security. Journal of Information Systems, 33(3), 63-82. DOI: 10.2308/isys-52233

Brazilian Internet Steering Committee. (2019). ICT Companies Survey on Information Security 2019. DOI: 10.18356/59e3e1e7-en

Brazilian Internet Steering Committee. (2020). ICT Companies Survey on Information Security 2020. Retrieved from https://www.cgi.br/pesquisa/caracterizacao/

Chakraborty, S., & Srivastava, S. (2017). Cybersecurity in Indian Organizations: A Study of Cybersecurity Challenges and Strategies. International Journal of Information Management, 37(5), 202-214. DOI: 10.1016/j.ijinfomgt.2017.05.010

Choi, J., Kallapur, S., & Wang, L. (2020). Cybersecurity Compliance: Insights from Resource Dependence Theory. Journal of Information Systems, 34(3), 135-151. DOI: 10.2308/isys-52679

Communications Authority of Kenya. (2020). Kenya National Cybersecurity Assessment Report 2020. Retrieved from https://www.ca.go.ke/wp-content/uploads/2021/01/National-Cybersecurity-Assessment-Report-2020.pdf

Communications Security Establishment. (2019). National Cyber Threat Assessment 2019. Retrieved from https://cyber.gc.ca/en/national-cyber-threat-assessment-2019

Council for Scientific and Industrial Research. (2019). South African Cybersecurity Trends Report 2019. Retrieved from https://www.csir.co.za/south-african-cybersecurity-trends-report-2019

Data Security Council of India. (2019). Cyber Security Landscape in India: An Industry Perspective 2019. Retrieved from https://www.dsci.in/sites/default/files/research-reports/Cyber%20Security%20Landscape%20In%20India-%20An%20Industry%20Perspective%202019.pdf

Dey, D., Dey, D., & Dey, S. (2019). Corporate Compliance with Cybersecurity Standards: A Regulatory Framework. Journal of Global Information Technology Management, 22(4), 255-273. DOI: 10.1080/1097198X.2019.1627136

Federal Financial Institutions Examination Council. (2019). Cybersecurity Preparedness. Retrieved from https://www.ffiec.gov/cybersecurity.htm

Federal Office for Information Security. (2019). Cybersecurity Situation in Germany 2019: A Study by the Federal Office for Information Security (BSI). Retrieved from https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/Studien/Cyberlagebild_2019.pdf

Jones, A., Smith, B., & Brown, C. (2018). The Effectiveness of Cybersecurity Regulations in Improving Corporate Compliance. Journal of Cybersecurity, 3(2), 87-103. DOI: 10.1093/cybsec/tyy007

Kim, D., & Lee, H. (2019). Implementing Cybersecurity Regulations in the Banking Sector: A Case Study Analysis. International Journal of Banking, Accounting and Finance, 10(3), 284-303. DOI: 10.1504/IJBAAF.2019.102347

Korea Internet & Security Agency. (2020). Cybersecurity White Paper 2020. Retrieved from https://www.kisa.or.kr/eng/usefulreport/bbs/119/view.do?seq=6&srchFr=&srchTo=&srchWord=&srchTp=&itm_seq_1=0&itm_seq_2=0&multi_itm_seq=0&company_cd=&company_nm=&page=1

Kshetri, N. (2021). The Impact of Cybersecurity Regulations on Firm Compliance and the Mediating Role of Cybersecurity Capabilities. Journal of Management Information Systems, 38(1), 175-212. DOI: 10.1080/07421222.2020.1857520

Mandiant. (2019). M-Trends 2019: Trends in Cybersecurity Incidents. Journal of Cybersecurity, 5(1), 37-45. DOI: 10.1093/cybsec/tyz002

Ministry of Internal Affairs and Communications. (2020). White Paper on Information and Communications in Japan. Retrieved from https://www.soumu.go.jp/johotsusintokei/whitepaper/ja/h32/html/nc483110.html

Murray, A. (2020). Balancing Regulation and Innovation: The Impact of Cybersecurity Regulation on Firm Performance. Journal of Information Systems Security, 16(3), 236-253. DOI: 10.1080/15584528.2020.1817079

National Cyber Security Centre. (2019). Ghana National Cybersecurity Strategy and Implementation Plan 2019-2023. Retrieved from https://ncsc.gov.gh/wp-content/uploads/2020/01/GHANA-NATIONAL-CYBER-SECURITY-STRATEGY-AND-IMPLEMENTATION-PLAN-2019-2023.pdf

National Cybersecurity Agency of France. (2020). ANSSI Annual Report 2020. Retrieved from https://www.ssi.gouv.fr/uploads/2021/03/anssi_rapport_activite_2020.pdf

Nigeria Information Technology Development Agency. (2020). National Cybersecurity Policy and Strategy 2020. Retrieved from https://nitda.gov.ng/wp-content/uploads/2020/02/National-Cybersecurity-Policy-Strategy-2020.pdf

Nigeria Information Technology Development Agency. (2020). National Cybersecurity Policy and Strategy 2020. Retrieved from https://nitda.gov.ng/wp-content/uploads/2020/02/National-Cybersecurity-Policy-Strategy-2020.pdf

OECD. (2019). OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity. Retrieved from https://www.oecd.org/internet/ieconomy/OECD-Recommendation-on-Digital-Security-Risk-Management.pdf

Patel, R., Patel, S., & Patel, A. (2021). Impact of Cybersecurity Regulations on Organizational Resilience: A Mixed-Methods Approach. Journal of Information Systems Security, 17(2), 132-149. DOI: 10.1080/15584528.2021.1875635

Ponemon Institute. (2020). The 2020 State of Cybersecurity Report. Retrieved from https://www.ponemon.org/library/2020-state-of-cybersecurity-report

PwC. (2018). The Global State of Information Security Survey 2018. Retrieved from https://www.pwc.com/gx/en/consulting-services/information-security-survey.html

Smith, J., & Johnson, M. (2020). Challenges in Achieving Compliance with Cybersecurity Regulations: A Qualitative Study. Journal of Information Technology Management, 31(2), 23-39.

Wang, Q., Wang, Z., & Wang, Y. (2022). Regulatory Compliance and Cyber Risk Management: A Cross-Sectional Survey. Journal of Computer Information Systems, 62(1), 59-73. DOI: 10.1080/08874417.2021.1951859

Downloads

Published

2024-06-26

How to Cite

Yamada, R. (2024). Impact of Cybersecurity Regulations on Corporate Compliance Practices in Japan. International Journal of Law and Policy, 9(2), 28 – 38. https://doi.org/10.47604/ijlp.2705

Issue

Section

Articles