Social computing and the law uses and abuses in exceptional circumstances

"This innovative book sets itself at the crossroads of several rapidly developing areas of research in legal and global studies related to social computing, specifically in the context of how public emergency responders appropriate content on social media platforms for emergency and disaster ma...

Descripción completa

Detalles Bibliográficos
Otros Autores: Ahmad, Khurshid, 1948- editor (editor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: New York : Cambridge University Press 2018.
Colección:CUP ebooks.
Acceso en línea:Conectar con la versión electrónica
Ver en Universidad de Navarra:https://innopac.unav.es/record=b39776001*spi
Tabla de Contenidos:
  • Cover; Half-title page; Title page; Copyright page; Contents; List of Figures; List of Contributors; Foreword; Acknowledgements; List of Abbreviations; 1 Introduction; 1.1 A Note on Terminology; 1.2 Security, Privacy and Dignity during an Emergency; 1.3 Our Contribution: Disasters, Technology, Law and Ethics; 1.4 Structure of the Book; 2 Social Computing Systems and Ethical Considerations; 2.1 Introduction; 2.2 Key Ethical Challenges Posed by Social Computing Systems; 2.3 Technology-Mediated Protection of Data and Persons; 2.4 Conclusion; 3 Internet Laws; 3.1 Introduction.
  • 3.2 Internet Governance Systems: Self-Regulation, Technical Regulation and Governmental Regulation3.3 Ownership of Personal Data Harvested from Social Computing Systems; 3.4 Protection for Monitoring and Harvesting Information on Social Media; 3.5 Summary Findings; 4 Copyright Law and Data Protection Law; 4.1 Introduction; 4.2 EU Copyright Directives and German Copyright Law; 4.3 The Ontology of Copyright; 4.4 Copyright and Exceptional Circumstances: Disaster Management; 4.5 Exceptions and Limitations; 4.6 Summary; 5 EU Human Rights Framework; 5.1 Introduction; 5.2 Approach.
  • 5.3 Disaster Management and Human Rights5.4 EU Fundamental Rights Framework and Disaster Management; 5.5 Conclusion; 6 Conclusion: Legally Using Social Computing Streams and Privacy Protection; 6.1 Introduction; 6.2 Social Computing Analysis in Exceptional Circumstances; 6.3 Checklist of Legal Issues; 6.4 Risk Analysis; 6.5 Conclusion; Appendix A Licence Agreement for the Use of a Social Media Monitor in Disaster Management; Appendix B Checklist of Legal Issues; References; Index.