Information Technology and Society (FY2003-2010)

This program was engaged in studies for minimizing risks derived from the wide deployment of information systems that handle critical functions in our society. (Activities ended as of March 2010)

Program Supervisor

DOI Norihisa

Professor, Research and Development Initiative, Chuo University
(as of the completion of the R&D Focus Area)

This R&D program is engaged in studies for minimizing risks derived from the wide deployment of information systems that handle critical functions in our society. Due to the remarkable progress in information technologies in recent years, information systems are heavily utilized for critical functions in our society. While such information systems have dramatically improved our life, they have also resulted in an additional risk to our society; information system accidents may immeasurably damage our society. Providing risk assessment and exploring methodologies for minimizing social risks are the primary goals of this program.

There are several aspects of methodologies this program deals with. One aspect we must focus on is governance of technologies in our society. Since the last decade, information technologies have increasingly become more ubiquitous throughout our society; dramatic changes can be seen in components of the structure and foundations of our society. This process is called the creation of a"ubiquitous society."In a ubiquitous society, the ecosystem of newly developed information technologies is completely different from the old ones. More overlaps exist between the R&D and technologies deployed in our society. In this environment, people can obtain instant benefits through information technologies, but formulating structures and methodologies for governance of these technologies for our society from a long-term perspective is difficult. This program encourages studies to approach new ways of governance and their issues for our ubiquitous society in order to compose a sustainable and resilient basis addressing the rapid deployment of information technologies and their governance.

The other focal point of this R&D program is to identify and resolve vulnerabilities in the information systems that reside within the critical infrastructure in our society. Specifically, the impact of the deployment and diversification of information technologies on critical functions of our society is studied. Recommendations for information system security will be offered for our government to minimize the potential risks to our society.


The following R&D Project is currently ongoing for identifying and minimizing the risks to our society delivered by information systems.

In this R&D Project, governance of information technologies in the ubiquitous society is being studied in terms of the ubiquitous presence of information technologies that are expected to be even more widely deployed throughout our society in the near future. Achievements through this program are going to be made as recommendations regarding legal systems, guidelines, and implementation methods for wider audiences including government, public sectors, academia and research communities.

In these R&D Projects, various vulnerabilities of information systems that have already been applied to critical infrastructures are identified and their solutions are studied. The results of this study are also utilized for making recommendations for risk management and mitigation method development for public sectors and critical infrastructure operators.

R&D Program: Governance in Ubiquitous Society (FY2005-2010)

To fund and support five R&D projects that are designed to pursue Goal [1]

R&D Projects

Planning-type R&D

Elucidation and resolution of vulnerabilities in the advanced information society
DOI Norihisa
(Professor Emeritus, Keio University)


Research group

Multiple risk communicator working group
SASAKI Ryoichi
(Professor, Engineering Department, Tokyo Denki University)


Cryptographic risk working group
(Professor, Graduate School of Systems and Information Engineering, University of Tsukuba)


DRM working group
(Professor, Graduate School of Information Science, Nara Institute of Science and Technology)


Emergency information communication system working group
OHNO Hiroyuki
(Professor, Information Media Center, Kanazawa University)


Investigation of the most effective investment method for information security
(Assistant Professor, Institute of Industrial Science, The University of Tokyo)


R&D Program: Governance in Ubiquitous Society

Study of Information Trust Mechanisms in a Ubiquitous Society
(Professor, Information and Society Research Division,National Institute of infomatics)


Research for Social Governance in the Gap between Skillful / Non-skillful Users of Cellular Phones in Japan
TAMAI Katsuya
(Professor, Intellectual Property Division, Research Center for Advanced Science & Technology, University of Tokyo)


Effective Information Security Governance Systems in Corporations
HAYASHI Koichiro
(President, Institute of Information Security)


Development of Problem-Solving Capacity for Crisis Management Using GIS
(Director&Professor, Research Center for Disaster Reduction Systems, Disaster Prevention Research Institute, Kyoto University)


Country Domain Governance Project
MIKAMI Yoshiki
(Professor, System Safety Department, Nagaoka University of Technology)


R&D Project: Challenge in Identifying the Vulnerabilities Hidden in Our Highly Sophisticated Information Society and Exploring Solutions (FY2003-2007)

This program was complete at the end of FY2007, having achieved its mission on Goal [2] as planned. Major results:

  • Development of a hazard map simulator for information system accidents
  • Development and trial application of a Multiple Risk Communicator
  • Proposal for a Cryptography SLA (Security Level Agreement)
  • Proposals on DRM (Digital Rights Management)
  • Proposals on an information telecommunication system for emergencies
  • Analyzed effective investment methods for information security
  • Issues and proposals on policies and laws related to information security
Top page