Article
"Regulating under Uncertainty: Governance Options for Generative AI"

Details

 

Cyber Security/Data Privacy:Publications

Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (5) Unauthorized Account Log-ins"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (4) Phishing Scams and Unlawful Cash Transfers"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (3) Information Divulgence by Internal Wrongdoing"
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (2) Information Divulgence by Contractors”
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (1) Ransomware Attacks”

View All

Information Technology, Life Sciences and Intellectual Property:Publications

Book
"New Textbook for NFT: Business Models, and Law, Accounting and Tax in the Web3 Era"
Magazine Article
"Special Feature: AI and Law -Risks and Outlook in the Era of Generative AI Part 2 [Papers] Current and Future Status of AI Law and Policies of the Japanese Government"
Book
"100 Q&A: Complying with Global Data Protection Laws"
Article
"Lexology Panoramic: Drone Regulation 2025 - Japan Chapter"
Magazine Article
"Key Issues Concerning the Handling of Children's Personal Information"

View All

Information Technology:Publications

Magazine Article
"Special Feature: AI and Law -Risks and Outlook in the Era of Generative AI Part 2 [Papers] Current and Future Status of AI Law and Policies of the Japanese Government"
Book
"Rules for Writing a Novel Using Generative AI (Included in "AI Techniques for Novelists - Talking with AI Expands your Ideas for Stories")"
Magazine Article
"Practical Q&A on the Act on the Protection of Personal Information (Part 13): Special Care-Required Personal Information"
Book
"Regulations Regarding Genomes"
Magazine Article
"Series: Technology x Copyright - Keywords for Promoting a Better Understanding (7): Fine-tuning"

View All

Intellectual Property and Entertainment:Publications

Book
"New Textbook for NFT: Business Models, and Law, Accounting and Tax in the Web3 Era"
Magazine Article
"Special Feature: AI and Law -Risks and Outlook in the Era of Generative AI Part 2 [Papers] Current and Future Status of AI Law and Policies of the Japanese Government"
Book
"Rules for Writing a Novel Using Generative AI (Included in "AI Techniques for Novelists - Talking with AI Expands your Ideas for Stories")"
Magazine Article
"Practical Q&A on the Act on the Protection of Personal Information (Part 13): Special Care-Required Personal Information"
Book
"Regulations Regarding Genomes"

View All

Data Protection and Privacy:Publications

Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (5) Unauthorized Account Log-ins"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (4) Phishing Scams and Unlawful Cash Transfers"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (3) Information Divulgence by Internal Wrongdoing"
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (2) Information Divulgence by Contractors”
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (1) Ransomware Attacks”

View All

Cybersecurity:Publications

Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (5) Unauthorized Account Log-ins"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (4) Phishing Scams and Unlawful Cash Transfers"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (3) Information Divulgence by Internal Wrongdoing"
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (2) Information Divulgence by Contractors”
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (1) Ransomware Attacks”

View All

Ryoko Matsumoto:Publications

Book
"100 Q&A: Complying with Global Data Protection Laws"
Magazine Article
"Practical Q&A on the Act on the Protection of Personal Information (Part 13): Special Care-Required Personal Information"
Book
"Act on the Protection of Personal Information"
Magazine Article
"Practical Q&A on the Act on the Protection of Personal Information (Part 5): Joint Use"
Magazine Article
"Latest Practical Issues and Challenges for Protection of Personal Data (Part 16 - final): What the Personal Information Protection Law should be and where we stand today"

View All