Coverart for item
The Resource Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin, (electronic resource)

Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin, (electronic resource)

Label
Social computing and the law : uses and abuses in exceptional circumstances
Title
Social computing and the law
Title remainder
uses and abuses in exceptional circumstances
Statement of responsibility
edited by Khurshid Ahmad, Trinity College, Dublin
Contributor
Editor
Subject
Language
eng
Summary
This innovative book sets itself at the crossroads of several rapidly developing areas of research in legal and global studies related to social computing, specifically in the context of how public emergency responders appropriate content on social media platforms for emergency and disaster management. The book - a collaboration between computer scientists, ethicists, legal scholars and practitioners - should be read by anyone concerned with the ongoing debate over the corporatization and commodification of user-generated content on social media and the extent to which this content can be legally and ethically harnessed for emergency and disaster management. The collaboration was made possible by EU's FP 7 Project Slandail (# 607691, 2014-17).--
Assigning source
Provided by publisher
Cataloging source
UkCbUP
Index
index present
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
Ahmad, Khurshid
Series statement
Cambridge Social Sciences eBooks
http://library.link/vocab/subjectName
  • Computer networks
  • Computer networks
  • Microblogs
  • Online social networks
  • Interactive computer systems
Label
Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin, (electronic resource)
Link
https://eui.idm.oclc.org/login?url=https://doi.org/10.1017/9781108575720
Instantiates
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Machine generated contents note: 1. Introduction; 1.1. A note on terminology; 1.2. Security, privacy, and dignity during an emergency; 1.3. Our contribution: disasters, technology, law and ethics; 1.4. Structure of the book; 2. Social computing systems and ethical considerations; 2.1. Introduction; 2.2. Key ethical challenges posed by social computing systems; 2.3. Technology mediated protection of data and persons; 2.4. Conclusion; 3. Internet laws; 3.1. Introduction; 3.2. Internet governance systems: self-regulation, technical regulation and governmental regulation; 3.3. Ownership of personal data harvested from social computing systems; 3.4. Protection for monitoring and harvesting information on social media; 3.5. Summary findings; 4. Copyright law and data protection law; 4.1. Introduction; 4.2. EU copyright directives and German copyright law; 4.3. The ontology of copyright; 4.4. Copyright and exceptional circumstances: disaster management; 4.5. Exceptions and limitations; 4.6. Summary; 5. EU human rights framework; 5.1. Introduction; 5.2. Approach; 5.3. Disaster management and human rights; 5.4. EU fundamental rights framework and disaster management; 5.5. Conclusion; 6. Conclusion: legally using social computing streams and privacy protection; 6.1. Introduction; 6.2. Social computing analysis in exceptional circumstances; 6.3. Checklist of legal issues; 6.4. Risk analysis; 6.5. Conclusion
Control code
CR9781108575720
Dimensions
unknown
Extent
1 online resource (xii, 164 pages)
Form of item
online
Governing access note
Use of this electronic resource may be governed by a license agreement which restricts use to the European University Institute community. Each user is responsible for limiting use to individual, non-commercial purposes, without systematically downloading, distributing, or retaining substantial portions of information, provided that all copyright and other proprietary notices contained on the materials are retained. The use of software, including scripts, agents, or robots, is generally prohibited and may result in the loss of access to these resources for the entire European University Institute community
Isbn
9781108428651
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
digital, PDF file(s).
Specific material designation
remote
System control number
(OCoLC)1077692707
Label
Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin, (electronic resource)
Link
https://eui.idm.oclc.org/login?url=https://doi.org/10.1017/9781108575720
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Machine generated contents note: 1. Introduction; 1.1. A note on terminology; 1.2. Security, privacy, and dignity during an emergency; 1.3. Our contribution: disasters, technology, law and ethics; 1.4. Structure of the book; 2. Social computing systems and ethical considerations; 2.1. Introduction; 2.2. Key ethical challenges posed by social computing systems; 2.3. Technology mediated protection of data and persons; 2.4. Conclusion; 3. Internet laws; 3.1. Introduction; 3.2. Internet governance systems: self-regulation, technical regulation and governmental regulation; 3.3. Ownership of personal data harvested from social computing systems; 3.4. Protection for monitoring and harvesting information on social media; 3.5. Summary findings; 4. Copyright law and data protection law; 4.1. Introduction; 4.2. EU copyright directives and German copyright law; 4.3. The ontology of copyright; 4.4. Copyright and exceptional circumstances: disaster management; 4.5. Exceptions and limitations; 4.6. Summary; 5. EU human rights framework; 5.1. Introduction; 5.2. Approach; 5.3. Disaster management and human rights; 5.4. EU fundamental rights framework and disaster management; 5.5. Conclusion; 6. Conclusion: legally using social computing streams and privacy protection; 6.1. Introduction; 6.2. Social computing analysis in exceptional circumstances; 6.3. Checklist of legal issues; 6.4. Risk analysis; 6.5. Conclusion
Control code
CR9781108575720
Dimensions
unknown
Extent
1 online resource (xii, 164 pages)
Form of item
online
Governing access note
Use of this electronic resource may be governed by a license agreement which restricts use to the European University Institute community. Each user is responsible for limiting use to individual, non-commercial purposes, without systematically downloading, distributing, or retaining substantial portions of information, provided that all copyright and other proprietary notices contained on the materials are retained. The use of software, including scripts, agents, or robots, is generally prohibited and may result in the loss of access to these resources for the entire European University Institute community
Isbn
9781108428651
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
digital, PDF file(s).
Specific material designation
remote
System control number
(OCoLC)1077692707

Library Locations

    • Badia FiesolanaBorrow it
      Via dei Roccettini 9, San Domenico di Fiesole, 50014, IT
      43.803074 11.283055
Processing Feedback ...