Impact of Cybersecurity Regulations on Corporate Compliance Practices in Japan
DOI:
https://doi.org/10.47604/ijlp.2705Keywords:
Cybersecurity Regulations, Corporate Compliance PracticesAbstract
Purpose: The aim of the study was to analyze impact of cybersecurity regulations on corporate compliance practices in Japan.
Methodology: This study adopted a desk methodology. A desk study research design is commonly known as secondary data collection. This is basically collecting data from existing resources preferably because of its low cost advantage as compared to a field research. Our current study looked into already published studies and reports as the data was easily accessed through online journals and libraries.
Findings: In Japan, cybersecurity regulations have significantly influenced corporate compliance practices. The Act on the Prohibition of Unauthorized Computer Access, along with the Penal Code, outlines stringent measures against cybercrimes, mandating corporations to adopt robust cybersecurity protocols to protect against unauthorized access and data breaches. Furthermore, comprehensive data protection laws, such as the Act on the Protection of Personal Information (APPI), require companies to obtain explicit consent for data processing, ensuring a higher standard of data privacy and security compliance.
Unique Contribution to Theory, Practice and Policy: Institutional theory, resource dependence theory & contingency theory may be used to anchor future studies on cybersecurity regulations on corporate compliance practices. Organizations should prioritize building a robust cybersecurity governance framework that integrates regulatory compliance requirements into broader risk management strategies. Policymakers and regulators should adopt a risk-based approach to cybersecurity regulation that takes into account the diverse needs and capabilities of organizations across different sectors and geographical regions.
Downloads
References
Australian Cyber Security Centre. (2018). Australian Cyber Security Centre Threat Report 2018. Retrieved from https://www.cyber.gov.au/sites/default/files/2018-ACSC-Annual-Cyber-Threat-Report.pdf
Barnes, R., Kılıç, E., & Schilling, A. (2019). Compliance with Cybersecurity Regulation: How It Influences Investment in Information Security. Journal of Information Systems, 33(3), 63-82. DOI: 10.2308/isys-52233
Brazilian Internet Steering Committee. (2019). ICT Companies Survey on Information Security 2019. DOI: 10.18356/59e3e1e7-en
Brazilian Internet Steering Committee. (2020). ICT Companies Survey on Information Security 2020. Retrieved from https://www.cgi.br/pesquisa/caracterizacao/
Chakraborty, S., & Srivastava, S. (2017). Cybersecurity in Indian Organizations: A Study of Cybersecurity Challenges and Strategies. International Journal of Information Management, 37(5), 202-214. DOI: 10.1016/j.ijinfomgt.2017.05.010
Choi, J., Kallapur, S., & Wang, L. (2020). Cybersecurity Compliance: Insights from Resource Dependence Theory. Journal of Information Systems, 34(3), 135-151. DOI: 10.2308/isys-52679
Communications Authority of Kenya. (2020). Kenya National Cybersecurity Assessment Report 2020. Retrieved from https://www.ca.go.ke/wp-content/uploads/2021/01/National-Cybersecurity-Assessment-Report-2020.pdf
Communications Security Establishment. (2019). National Cyber Threat Assessment 2019. Retrieved from https://cyber.gc.ca/en/national-cyber-threat-assessment-2019
Council for Scientific and Industrial Research. (2019). South African Cybersecurity Trends Report 2019. Retrieved from https://www.csir.co.za/south-african-cybersecurity-trends-report-2019
Data Security Council of India. (2019). Cyber Security Landscape in India: An Industry Perspective 2019. Retrieved from https://www.dsci.in/sites/default/files/research-reports/Cyber%20Security%20Landscape%20In%20India-%20An%20Industry%20Perspective%202019.pdf
Dey, D., Dey, D., & Dey, S. (2019). Corporate Compliance with Cybersecurity Standards: A Regulatory Framework. Journal of Global Information Technology Management, 22(4), 255-273. DOI: 10.1080/1097198X.2019.1627136
Federal Financial Institutions Examination Council. (2019). Cybersecurity Preparedness. Retrieved from https://www.ffiec.gov/cybersecurity.htm
Federal Office for Information Security. (2019). Cybersecurity Situation in Germany 2019: A Study by the Federal Office for Information Security (BSI). Retrieved from https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/Studien/Cyberlagebild_2019.pdf
Jones, A., Smith, B., & Brown, C. (2018). The Effectiveness of Cybersecurity Regulations in Improving Corporate Compliance. Journal of Cybersecurity, 3(2), 87-103. DOI: 10.1093/cybsec/tyy007
Kim, D., & Lee, H. (2019). Implementing Cybersecurity Regulations in the Banking Sector: A Case Study Analysis. International Journal of Banking, Accounting and Finance, 10(3), 284-303. DOI: 10.1504/IJBAAF.2019.102347
Korea Internet & Security Agency. (2020). Cybersecurity White Paper 2020. Retrieved from https://www.kisa.or.kr/eng/usefulreport/bbs/119/view.do?seq=6&srchFr=&srchTo=&srchWord=&srchTp=&itm_seq_1=0&itm_seq_2=0&multi_itm_seq=0&company_cd=&company_nm=&page=1
Kshetri, N. (2021). The Impact of Cybersecurity Regulations on Firm Compliance and the Mediating Role of Cybersecurity Capabilities. Journal of Management Information Systems, 38(1), 175-212. DOI: 10.1080/07421222.2020.1857520
Mandiant. (2019). M-Trends 2019: Trends in Cybersecurity Incidents. Journal of Cybersecurity, 5(1), 37-45. DOI: 10.1093/cybsec/tyz002
Ministry of Internal Affairs and Communications. (2020). White Paper on Information and Communications in Japan. Retrieved from https://www.soumu.go.jp/johotsusintokei/whitepaper/ja/h32/html/nc483110.html
Murray, A. (2020). Balancing Regulation and Innovation: The Impact of Cybersecurity Regulation on Firm Performance. Journal of Information Systems Security, 16(3), 236-253. DOI: 10.1080/15584528.2020.1817079
National Cyber Security Centre. (2019). Ghana National Cybersecurity Strategy and Implementation Plan 2019-2023. Retrieved from https://ncsc.gov.gh/wp-content/uploads/2020/01/GHANA-NATIONAL-CYBER-SECURITY-STRATEGY-AND-IMPLEMENTATION-PLAN-2019-2023.pdf
National Cybersecurity Agency of France. (2020). ANSSI Annual Report 2020. Retrieved from https://www.ssi.gouv.fr/uploads/2021/03/anssi_rapport_activite_2020.pdf
Nigeria Information Technology Development Agency. (2020). National Cybersecurity Policy and Strategy 2020. Retrieved from https://nitda.gov.ng/wp-content/uploads/2020/02/National-Cybersecurity-Policy-Strategy-2020.pdf
Nigeria Information Technology Development Agency. (2020). National Cybersecurity Policy and Strategy 2020. Retrieved from https://nitda.gov.ng/wp-content/uploads/2020/02/National-Cybersecurity-Policy-Strategy-2020.pdf
OECD. (2019). OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity. Retrieved from https://www.oecd.org/internet/ieconomy/OECD-Recommendation-on-Digital-Security-Risk-Management.pdf
Patel, R., Patel, S., & Patel, A. (2021). Impact of Cybersecurity Regulations on Organizational Resilience: A Mixed-Methods Approach. Journal of Information Systems Security, 17(2), 132-149. DOI: 10.1080/15584528.2021.1875635
Ponemon Institute. (2020). The 2020 State of Cybersecurity Report. Retrieved from https://www.ponemon.org/library/2020-state-of-cybersecurity-report
PwC. (2018). The Global State of Information Security Survey 2018. Retrieved from https://www.pwc.com/gx/en/consulting-services/information-security-survey.html
Smith, J., & Johnson, M. (2020). Challenges in Achieving Compliance with Cybersecurity Regulations: A Qualitative Study. Journal of Information Technology Management, 31(2), 23-39.
Wang, Q., Wang, Z., & Wang, Y. (2022). Regulatory Compliance and Cyber Risk Management: A Cross-Sectional Survey. Journal of Computer Information Systems, 62(1), 59-73. DOI: 10.1080/08874417.2021.1951859
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Rina Yamada
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.