000 03586nam a22003858i 4500
001 CR9781108575720
003 UkCbUP
005 20200124160341.0
006 m|||||o||d||||||||
007 cr||||||||||||
008 171010s2018||||enk o ||1 0|eng|d
020 _a9781108575720 (ebook)
020 _z9781108428651 (hardback)
020 _z9781108450843 (paperback)
040 _aUkCbUP
_beng
_erda
_cUkCbUP
050 0 0 _aK564.C6
_bS554 2018
082 0 0 _a343.09/99
_223
245 0 0 _aSocial computing and the law :
_buses and abuses in exceptional circumstances /
_cedited by Khurshid Ahmad, Trinity College, Dublin.
264 1 _aCambridge :
_bCambridge University Press,
_c2018.
300 _a1 online resource (xii, 164 pages) :
_bdigital, PDF file(s).
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aTitle from publisher's bibliographic system (viewed on 01 Oct 2018).
505 8 _aMachine generated contents note: 1. Introduction; 1.1. A note on terminology; 1.2. Security, privacy, and dignity during an emergency; 1.3. Our contribution: disasters, technology, law and ethics; 1.4. Structure of the book; 2. Social computing systems and ethical considerations; 2.1. Introduction; 2.2. Key ethical challenges posed by social computing systems; 2.3. Technology mediated protection of data and persons; 2.4. Conclusion; 3. Internet laws; 3.1. Introduction; 3.2. Internet governance systems: self-regulation, technical regulation and governmental regulation; 3.3. Ownership of personal data harvested from social computing systems; 3.4. Protection for monitoring and harvesting information on social media; 3.5. Summary findings; 4. Copyright law and data protection law; 4.1. Introduction; 4.2. EU copyright directives and German copyright law; 4.3. The ontology of copyright; 4.4. Copyright and exceptional circumstances: disaster management; 4.5. Exceptions and limitations; 4.6. Summary; 5. EU human rights framework; 5.1. Introduction; 5.2. Approach; 5.3. Disaster management and human rights; 5.4. EU fundamental rights framework and disaster management; 5.5. Conclusion; 6. Conclusion: legally using social computing streams and privacy protection; 6.1. Introduction; 6.2. Social computing analysis in exceptional circumstances; 6.3. Checklist of legal issues; 6.4. Risk analysis; 6.5. Conclusion.
520 _aThis innovative book sets itself at the crossroads of several rapidly developing areas of research in legal and global studies related to social computing, specifically in the context of how public emergency responders appropriate content on social media platforms for emergency and disaster management. The book - a collaboration between computer scientists, ethicists, legal scholars and practitioners - should be read by anyone concerned with the ongoing debate over the corporatization and commodification of user-generated content on social media and the extent to which this content can be legally and ethically harnessed for emergency and disaster management. The collaboration was made possible by EU's FP 7 Project Slandail (# 607691, 2014-17).
650 0 _aComputer networks
_xLaw and legislation.
650 0 _aComputer networks
_xSocial aspects.
650 0 _aMicroblogs
_xSocial aspects.
650 0 _aOnline social networks
_xSocial aspects.
650 0 _aInteractive computer systems
_xSocial aspects.
700 1 _aAhmad, Khurshid,
_eeditor.
776 0 8 _iPrint version:
_z9781108428651
856 4 0 _uhttps://doi.org/10.1017/9781108575720
999 _c523508
_d523506