Coverart for item
The Resource Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin

Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin

Label
Social computing and the law : uses and abuses in exceptional circumstances
Title
Social computing and the law
Title remainder
uses and abuses in exceptional circumstances
Statement of responsibility
edited by Khurshid Ahmad, Trinity College, Dublin
Contributor
Editor
Subject
Language
eng
Summary
  • "This innovative book sets itself at the crossroads of several rapidly developing areas of research in legal and global studies related to social computing, specifically in the context of how public emergency responders appropriate content on social media platforms for emergency and disaster management. The book - a collaboration between computer scientists, ethicists, legal scholars and practitioners - should be read by anyone concerned with the ongoing debate over the corporatization and commodification of user-generated content on social media and the extent to which this content can be legally and ethically harnessed for emergency and disaster management. The collaboration was made possible by EU's FP 7 Project Slandail (# 607691, 2014-17)"--
  • "Microblogging systems and social networking systems, sometimes referred to as types of social computing systems, generate enormous amounts of data that often contain specific information about persons, events, and geographical locations. During exceptional circumstances, this data can, in principle, be invaluable; for example, in deploying scarce resources in times of emergency for saving lives, rescuing and rehabilitating people, and protecting property. Microblogs and social networking pages have become a mainstay of data dissemination in the public space and are heavily used by both citizens and authorities in times of crisis; they have been used, for example, by police forces to disseminate and seek information about missing people, and by hospitals seeking blood. Twitter carries the first messages of victims of atrocities (Paris 2015, Berlin 2016, London 2017 and Manchester 2017), Facebook is used to find missing relatives. Vast quantities of personal information floods microblogs and social networking pages: this data helps authorities to deploy resources where the need is greatest and yet this data can be used in whole sale surveillance as well. Social computing systems are now part and parcel of our interactions with others in good times and bad"--
Assigning source
  • Provided by publisher
  • Provided by publisher
Cataloging source
DLC
Index
index present
LC call number
K564.C6
LC item number
S554 2018
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1948-
http://library.link/vocab/relatedWorkOrContributorName
Ahmad, Khurshid
http://library.link/vocab/subjectName
  • Computer networks
  • Computer networks
  • Microblogs
  • Online social networks
  • Interactive computer systems
  • Computer networks
  • Computer networks
  • Interactive computer systems
  • Online social networks
Label
Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin
Instantiates
Publication
Copyright
Bibliography note
Includes bibliographical references (pages 150-162) and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Technology-mediated protection of data and persons ;
  • Conclusion
  • Internet laws.
  • Introduction
  • Internet governance systems : self-regulation, technical regulation and governmental regulation
  • Ownership of personal data harvested from social computing systems
  • Protection for monitoring and harvesting information on social media
  • Summary findings
  • Copyright law and data protection law.
  • Introduction
  • Introduction. A
  • EU copyright directives and German copyright law ;
  • The
  • Ontology of copyright
  • Copyright and exceptional circumstances : disaster management
  • Exceptions and limitations ;
  • Summary
  • EU human rights framework.
  • Introduction ;
  • Approach
  • Disaster management and human rights
  • Note on terminology
  • EU fundamental rights framework and disaster management ;
  • Conclusion ;
  • Conclusion : legally using social computing streams and privacy protection. Introduction
  • Social computing analysis in exceptional circumstances ;
  • Checklist of legal issues ; Risk analysis ; Conclusion
  • Security, privacy and dignity during an emergency
  • Our contribution : disasters, technology, law and ethics
  • Structure of the book
  • Social computing systems and ethical considerations.
  • Introduction
  • Key ethical challenges posed by social computing systems
Control code
1022496592
Dimensions
24 cm
Extent
xii, 164 pages
Isbn
9781108428651
Lccn
2018022356
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
System control number
(OCoLC)1022496592
Label
Social computing and the law : uses and abuses in exceptional circumstances, edited by Khurshid Ahmad, Trinity College, Dublin
Publication
Copyright
Bibliography note
Includes bibliographical references (pages 150-162) and index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Technology-mediated protection of data and persons ;
  • Conclusion
  • Internet laws.
  • Introduction
  • Internet governance systems : self-regulation, technical regulation and governmental regulation
  • Ownership of personal data harvested from social computing systems
  • Protection for monitoring and harvesting information on social media
  • Summary findings
  • Copyright law and data protection law.
  • Introduction
  • Introduction. A
  • EU copyright directives and German copyright law ;
  • The
  • Ontology of copyright
  • Copyright and exceptional circumstances : disaster management
  • Exceptions and limitations ;
  • Summary
  • EU human rights framework.
  • Introduction ;
  • Approach
  • Disaster management and human rights
  • Note on terminology
  • EU fundamental rights framework and disaster management ;
  • Conclusion ;
  • Conclusion : legally using social computing streams and privacy protection. Introduction
  • Social computing analysis in exceptional circumstances ;
  • Checklist of legal issues ; Risk analysis ; Conclusion
  • Security, privacy and dignity during an emergency
  • Our contribution : disasters, technology, law and ethics
  • Structure of the book
  • Social computing systems and ethical considerations.
  • Introduction
  • Key ethical challenges posed by social computing systems
Control code
1022496592
Dimensions
24 cm
Extent
xii, 164 pages
Isbn
9781108428651
Lccn
2018022356
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
System control number
(OCoLC)1022496592

Library Locations

    • Pardee Legal Research CenterBorrow it
      5998 Alcalá Park, San Diego, CA, 92110-2492, US
      32.771471 -117.187496
Processing Feedback ...