Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Company Directors: Duties, Liabilities and Remedies

Company Directors: Duties, Liabilities and Remedies

Edited by: Mark Arnold KC, Simon Mortimore KC
Price: £275.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION Pre-order Mortgage Receivership: Law and Practice



 Stephanie Tozer, Cecily Crampin, Tricia Hemans
Practical guidance to relevant law & procedure


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


Social Computing and the Law: Uses and Abuses in Exceptional Circumstances (eBook)

Edited by: Khurshid Ahmad

ISBN13: 9781108650144
Published: October 2018
Publisher: Cambridge University Press
Country of Publication: UK
Format: eBook (ePub)
Price: £70.99
The amount of VAT charged may change depending on your location of use.


The sale of some eBooks are restricted to certain countries. To alert you to such restrictions, please select the country of the billing address of your credit or debit card you wish to use for payment.

Billing Country:


Sale prohibited in
Korea, [North] Democratic Peoples Republic Of

Due to publisher restrictions, international orders for ebooks may need to be confirmed by our staff during shop opening hours. Our trading hours are Monday to Friday, 8.45am to 6.00pm, London, UK time.


The device(s) you use to access the eBook content must be authorized with an Adobe ID before you download the product otherwise it will fail to register correctly.

For further information see https://www.wildy.com/ebook-formats


Once the order is confirmed an automated e-mail will be sent to you to allow you to download the eBook.

All eBooks are supplied firm sale and cannot be returned. If you believe there is a fault with your eBook then contact us on ebooks@wildy.com and we will help in resolving the issue. This does not affect your statutory rights.

This eBook is available in the following formats: ePub.

In stock.
Need help with ebook formats?




Also available as

This innovative book sets itself at the crossroads of several rapidly developing areas of research in legal and global studies related to social computing, specifically in the context of how public emergency responders appropriate content on social media platforms for emergency and disaster management.

The book - a collaboration between computer scientists, ethicists, legal scholars and practitioners - should be read by anyone concerned with the ongoing debate over the corporatization and commodification of user-generated content on social media and the extent to which this content can be legally and ethically harnessed for emergency and disaster management.

Subjects:
eBooks, IT, Internet and Artificial Intelligence Law
Contents:
1. Introduction
1.1. A note on terminology
1.2. Security, privacy, and dignity during an emergency
1.3. Our contribution: disasters, technology, law and ethics
1.4. Structure of the book
2. Social computing systems and ethical considerations
2.1. Introduction
2.2. Key ethical challenges posed by social computing systems
2.3. Technology mediated protection of data and persons
2.4. Conclusion
3. Internet laws
3.1. Introduction
3.2. Internet governance systems: self-regulation, technical regulation and governmental regulation
3.3. Ownership of personal data harvested from social computing systems
3.4. Protection for monitoring and harvesting information on social media
3.5. Summary findings
4. Copyright law and data protection law
4.1. Introduction
4.2. EU copyright directives and German copyright law
4.3. The ontology of copyright
4.4. Copyright and exceptional circumstances: disaster management
4.5. Exceptions and limitations
4.6. Summary
5. EU human rights framework
5.1. Introduction
5.2. Approach
5.3. Disaster management and human rights
5.4. EU fundamental rights framework and disaster management
5.5. Conclusion
6. Conclusion: legally using social computing streams and privacy protection
6.1. Introduction
6.2. Social computing analysis in exceptional circumstances
6.3. Checklist of legal issues
6.4. Risk analysis
6.5. Conclusion.