عرض عادي

Social computing and the law : uses and abuses in exceptional circumstances / edited by Khurshid Ahmad

المساهم (المساهمين):نوع المادة : نصنصاللغة: الإنجليزية الناشر:New York : Cambridge University Press, 2018وصف:xii, 164 pages : illustrations ; 24 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9781108428651 (hardback)
الموضوع:تصنيف مكتبة الكونجرس:
  • K564.C6 S554 2018
المحتويات:
Machine generated contents note: 1. Introduction; 1.1. A note on terminology; 1.2. Security, privacy, and dignity during an emergency; 1.3. Our contribution: disasters, technology, law and ethics; 1.4. Structure of the book; 2. Social computing systems and ethical considerations; 2.1. Introduction; 2.2. Key ethical challenges posed by social computing systems; 2.3. Technology mediated protection of data and persons; 2.4. Conclusion; 3. Internet laws; 3.1. Introduction; 3.2. Internet governance systems: self-regulation, technical regulation and governmental regulation; 3.3. Ownership of personal data harvested from social computing systems; 3.4. Protection for monitoring and harvesting information on social media; 3.5. Summary findings; 4. Copyright law and data protection law; 4.1. Introduction; 4.2. EU copyright directives and German copyright law; 4.3. The ontology of copyright; 4.4. Copyright and exceptional circumstances: disaster management; 4.5. Exceptions and limitations; 4.6. Summary; 5. EU human rights framework; 5.1. Introduction; 5.2. Approach; 5.3. Disaster management and human rights; 5.4. EU fundamental rights framework and disaster management; 5.5. Conclusion; 6. Conclusion: legally using social computing streams and privacy protection; 6.1. Introduction; 6.2. Social computing analysis in exceptional circumstances; 6.3. Checklist of legal issues; 6.4. Risk analysis; 6.5. Conclusion.
ملخص:"This innovative book sets itself at the crossroads of several rapidly developing areas of research in legal and global studies related to social computing, specifically in the context of how public emergency responders appropriate content on social media platforms for emergency and disaster management. The book - a collaboration between computer scientists, ethicists, legal scholars and practitioners - should be read by anyone concerned with the ongoing debate over the corporatization and commodification of user-generated content on social media and the extent to which this content can be legally and ethically harnessed for emergency and disaster management. The collaboration was made possible by EU's FP 7 Project Slandail (# 607691, 2014-17)"-- Provided by publisher.ملخص:"Microblogging systems and social networking systems, sometimes referred to as types of social computing systems, generate enormous amounts of data that often contain specific information about persons, events, and geographical locations. During exceptional circumstances, this data can, in principle, be invaluable; for example, in deploying scarce resources in times of emergency for saving lives, rescuing and rehabilitating people, and protecting property. Microblogs and social networking pages have become a mainstay of data dissemination in the public space and are heavily used by both citizens and authorities in times of crisis; they have been used, for example, by police forces to disseminate and seek information about missing people, and by hospitals seeking blood. Twitter carries the first messages of victims of atrocities (Paris 2015, Berlin 2016, London 2017 and Manchester 2017), Facebook is used to find missing relatives. Vast quantities of personal information floods microblogs and social networking pages: this data helps authorities to deploy resources where the need is greatest and yet this data can be used in whole sale surveillance as well. Social computing systems are now part and parcel of our interactions with others in good times and bad"-- Provided by publisher.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة K564.C6 S554 2018 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30030000003842

Includes bibliographical references and index.

Machine generated contents note: 1. Introduction; 1.1. A note on terminology; 1.2. Security, privacy, and dignity during an emergency; 1.3. Our contribution: disasters, technology, law and ethics; 1.4. Structure of the book; 2. Social computing systems and ethical considerations; 2.1. Introduction; 2.2. Key ethical challenges posed by social computing systems; 2.3. Technology mediated protection of data and persons; 2.4. Conclusion; 3. Internet laws; 3.1. Introduction; 3.2. Internet governance systems: self-regulation, technical regulation and governmental regulation; 3.3. Ownership of personal data harvested from social computing systems; 3.4. Protection for monitoring and harvesting information on social media; 3.5. Summary findings; 4. Copyright law and data protection law; 4.1. Introduction; 4.2. EU copyright directives and German copyright law; 4.3. The ontology of copyright; 4.4. Copyright and exceptional circumstances: disaster management; 4.5. Exceptions and limitations; 4.6. Summary; 5. EU human rights framework; 5.1. Introduction; 5.2. Approach; 5.3. Disaster management and human rights; 5.4. EU fundamental rights framework and disaster management; 5.5. Conclusion; 6. Conclusion: legally using social computing streams and privacy protection; 6.1. Introduction; 6.2. Social computing analysis in exceptional circumstances; 6.3. Checklist of legal issues; 6.4. Risk analysis; 6.5. Conclusion.

"This innovative book sets itself at the crossroads of several rapidly developing areas of research in legal and global studies related to social computing, specifically in the context of how public emergency responders appropriate content on social media platforms for emergency and disaster management. The book - a collaboration between computer scientists, ethicists, legal scholars and practitioners - should be read by anyone concerned with the ongoing debate over the corporatization and commodification of user-generated content on social media and the extent to which this content can be legally and ethically harnessed for emergency and disaster management. The collaboration was made possible by EU's FP 7 Project Slandail (# 607691, 2014-17)"-- Provided by publisher.

"Microblogging systems and social networking systems, sometimes referred to as types of social computing systems, generate enormous amounts of data that often contain specific information about persons, events, and geographical locations. During exceptional circumstances, this data can, in principle, be invaluable; for example, in deploying scarce resources in times of emergency for saving lives, rescuing and rehabilitating people, and protecting property. Microblogs and social networking pages have become a mainstay of data dissemination in the public space and are heavily used by both citizens and authorities in times of crisis; they have been used, for example, by police forces to disseminate and seek information about missing people, and by hospitals seeking blood. Twitter carries the first messages of victims of atrocities (Paris 2015, Berlin 2016, London 2017 and Manchester 2017), Facebook is used to find missing relatives. Vast quantities of personal information floods microblogs and social networking pages: this data helps authorities to deploy resources where the need is greatest and yet this data can be used in whole sale surveillance as well. Social computing systems are now part and parcel of our interactions with others in good times and bad"-- Provided by publisher.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة