The Resource Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin, (electronic resource)
Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin, (electronic resource)
Resource Information
The item Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in European University Institute.This item is available to borrow from 1 library branch.
Resource Information
The item Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in European University Institute.
This item is available to borrow from 1 library branch.
- Summary
- This innovative book sets itself at the crossroads of several rapidly developing areas of research in legal and global studies related to social computing, specifically in the context of how public emergency responders appropriate content on social media platforms for emergency and disaster management. The book - a collaboration between computer scientists, ethicists, legal scholars and practitioners - should be read by anyone concerned with the ongoing debate over the corporatization and commodification of user-generated content on social media and the extent to which this content can be legally and ethically harnessed for emergency and disaster management. The collaboration was made possible by EU's FP 7 Project Slandail (# 607691, 2014-17).--
- Language
- eng
- Extent
- 1 online resource (xii, 164 pages)
- Contents
-
- Machine generated contents note: 1. Introduction; 1.1. A note on terminology; 1.2. Security, privacy, and dignity during an emergency; 1.3. Our contribution: disasters, technology, law and ethics; 1.4. Structure of the book; 2. Social computing systems and ethical considerations; 2.1. Introduction; 2.2. Key ethical challenges posed by social computing systems; 2.3. Technology mediated protection of data and persons; 2.4. Conclusion; 3. Internet laws; 3.1. Introduction; 3.2. Internet governance systems: self-regulation, technical regulation and governmental regulation; 3.3. Ownership of personal data harvested from social computing systems; 3.4. Protection for monitoring and harvesting information on social media; 3.5. Summary findings; 4. Copyright law and data protection law; 4.1. Introduction; 4.2. EU copyright directives and German copyright law; 4.3. The ontology of copyright; 4.4. Copyright and exceptional circumstances: disaster management; 4.5. Exceptions and limitations; 4.6. Summary; 5. EU human rights framework; 5.1. Introduction; 5.2. Approach; 5.3. Disaster management and human rights; 5.4. EU fundamental rights framework and disaster management; 5.5. Conclusion; 6. Conclusion: legally using social computing streams and privacy protection; 6.1. Introduction; 6.2. Social computing analysis in exceptional circumstances; 6.3. Checklist of legal issues; 6.4. Risk analysis; 6.5. Conclusion
- Isbn
- 9781108450843
- Label
- Social computing and the law : uses and abuses in exceptional circumstances
- Title
- Social computing and the law
- Title remainder
- uses and abuses in exceptional circumstances
- Statement of responsibility
- edited by Khurshid Ahmad, Trinity College, Dublin
- Language
- eng
- Summary
- This innovative book sets itself at the crossroads of several rapidly developing areas of research in legal and global studies related to social computing, specifically in the context of how public emergency responders appropriate content on social media platforms for emergency and disaster management. The book - a collaboration between computer scientists, ethicists, legal scholars and practitioners - should be read by anyone concerned with the ongoing debate over the corporatization and commodification of user-generated content on social media and the extent to which this content can be legally and ethically harnessed for emergency and disaster management. The collaboration was made possible by EU's FP 7 Project Slandail (# 607691, 2014-17).--
- Assigning source
- Provided by publisher
- Cataloging source
- UkCbUP
- Index
- index present
- Literary form
- non fiction
- Nature of contents
- dictionaries
- http://library.link/vocab/relatedWorkOrContributorName
- Ahmad, Khurshid
- Series statement
- Cambridge Social Sciences eBooks
- http://library.link/vocab/subjectName
-
- Computer networks
- Computer networks
- Microblogs
- Online social networks
- Interactive computer systems
- Label
- Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin, (electronic resource)
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Machine generated contents note: 1. Introduction; 1.1. A note on terminology; 1.2. Security, privacy, and dignity during an emergency; 1.3. Our contribution: disasters, technology, law and ethics; 1.4. Structure of the book; 2. Social computing systems and ethical considerations; 2.1. Introduction; 2.2. Key ethical challenges posed by social computing systems; 2.3. Technology mediated protection of data and persons; 2.4. Conclusion; 3. Internet laws; 3.1. Introduction; 3.2. Internet governance systems: self-regulation, technical regulation and governmental regulation; 3.3. Ownership of personal data harvested from social computing systems; 3.4. Protection for monitoring and harvesting information on social media; 3.5. Summary findings; 4. Copyright law and data protection law; 4.1. Introduction; 4.2. EU copyright directives and German copyright law; 4.3. The ontology of copyright; 4.4. Copyright and exceptional circumstances: disaster management; 4.5. Exceptions and limitations; 4.6. Summary; 5. EU human rights framework; 5.1. Introduction; 5.2. Approach; 5.3. Disaster management and human rights; 5.4. EU fundamental rights framework and disaster management; 5.5. Conclusion; 6. Conclusion: legally using social computing streams and privacy protection; 6.1. Introduction; 6.2. Social computing analysis in exceptional circumstances; 6.3. Checklist of legal issues; 6.4. Risk analysis; 6.5. Conclusion
- Control code
- CR9781108575720
- Dimensions
- unknown
- Extent
- 1 online resource (xii, 164 pages)
- Form of item
- online
- Governing access note
- Use of this electronic resource may be governed by a license agreement which restricts use to the European University Institute community. Each user is responsible for limiting use to individual, non-commercial purposes, without systematically downloading, distributing, or retaining substantial portions of information, provided that all copyright and other proprietary notices contained on the materials are retained. The use of software, including scripts, agents, or robots, is generally prohibited and may result in the loss of access to these resources for the entire European University Institute community
- Isbn
- 9781108450843
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- digital, PDF file(s).
- Specific material designation
- remote
- System control number
- (OCoLC)1077692707
- Label
- Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin, (electronic resource)
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Machine generated contents note: 1. Introduction; 1.1. A note on terminology; 1.2. Security, privacy, and dignity during an emergency; 1.3. Our contribution: disasters, technology, law and ethics; 1.4. Structure of the book; 2. Social computing systems and ethical considerations; 2.1. Introduction; 2.2. Key ethical challenges posed by social computing systems; 2.3. Technology mediated protection of data and persons; 2.4. Conclusion; 3. Internet laws; 3.1. Introduction; 3.2. Internet governance systems: self-regulation, technical regulation and governmental regulation; 3.3. Ownership of personal data harvested from social computing systems; 3.4. Protection for monitoring and harvesting information on social media; 3.5. Summary findings; 4. Copyright law and data protection law; 4.1. Introduction; 4.2. EU copyright directives and German copyright law; 4.3. The ontology of copyright; 4.4. Copyright and exceptional circumstances: disaster management; 4.5. Exceptions and limitations; 4.6. Summary; 5. EU human rights framework; 5.1. Introduction; 5.2. Approach; 5.3. Disaster management and human rights; 5.4. EU fundamental rights framework and disaster management; 5.5. Conclusion; 6. Conclusion: legally using social computing streams and privacy protection; 6.1. Introduction; 6.2. Social computing analysis in exceptional circumstances; 6.3. Checklist of legal issues; 6.4. Risk analysis; 6.5. Conclusion
- Control code
- CR9781108575720
- Dimensions
- unknown
- Extent
- 1 online resource (xii, 164 pages)
- Form of item
- online
- Governing access note
- Use of this electronic resource may be governed by a license agreement which restricts use to the European University Institute community. Each user is responsible for limiting use to individual, non-commercial purposes, without systematically downloading, distributing, or retaining substantial portions of information, provided that all copyright and other proprietary notices contained on the materials are retained. The use of software, including scripts, agents, or robots, is generally prohibited and may result in the loss of access to these resources for the entire European University Institute community
- Isbn
- 9781108450843
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- digital, PDF file(s).
- Specific material designation
- remote
- System control number
- (OCoLC)1077692707
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.eui.eu/portal/Social-computing-and-the-law--uses-and-abuses-in/yw9zf79YfSU/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/portal/Social-computing-and-the-law--uses-and-abuses-in/yw9zf79YfSU/">Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.eui.eu/">European University Institute</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.eui.eu/portal/Social-computing-and-the-law--uses-and-abuses-in/yw9zf79YfSU/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/portal/Social-computing-and-the-law--uses-and-abuses-in/yw9zf79YfSU/">Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.eui.eu/">European University Institute</a></span></span></span></span></div>