Fr. 170.00

Social Computing and the Law - Uses and Abuses in Exceptional Circumstances

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Informationen zum Autor Khurshid Ahmad is Professor of Computer Science at Trinity College, Dublin. He specializes in artificial intelligence with research interests in information extraction from images and texts, fuzzy logic, sentiment analysis, neural networks, and terminology and ontology. Ahmad holds a Ph.D. in Theoretical Nuclear Physics from the University of Surrey (1975). He is an elected Fellow of the British Computer Society and of Trinity College, as well as a Chartered Engineer. He has taught at the Universities of Karachi and Surrey and has been a Visiting Professor at Copenhagen Business School. Ahmad has published over 250 research papers. His books include Computers, Language Learning and Language Teaching (Cambridge, 1985), Translator's Workbench: Tools and Terminology for Translation and Text Processing (1995), and Affective Computing and Sentiment Analysis: Emotion, Metaphor, and Terminology (2011). Klappentext A compilation of expertise in Internet law and in ethical considerations concerning social computing in emergencies.Social computing systems are disruptive technologies with an evolving legal landscape. This book documents legal and ethical considerations in the application of social computing systems in emergency and disaster situations. It references recent legal rulings and the European General Data Protection Regulation (2018). Inhaltsverzeichnis 1. Introduction; 1.1. A note on terminology; 1.2. Security, privacy, and dignity during an emergency; 1.3. Our contribution: disasters, technology, law and ethics; 1.4. Structure of the book; 2. Social computing systems and ethical considerations; 2.1. Introduction; 2.2. Key ethical challenges posed by social computing systems; 2.3. Technology mediated protection of data and persons; 2.4. Conclusion; 3. Internet laws; 3.1. Introduction; 3.2. Internet governance systems: self-regulation, technical regulation and governmental regulation; 3.3. Ownership of personal data harvested from social computing systems; 3.4. Protection for monitoring and harvesting information on social media; 3.5. Summary findings; 4. Copyright law and data protection law; 4.1. Introduction; 4.2. EU copyright directives and German copyright law; 4.3. The ontology of copyright; 4.4. Copyright and exceptional circumstances: disaster management; 4.5. Exceptions and limitations; 4.6. Summary; 5. EU human rights framework; 5.1. Introduction; 5.2. Approach; 5.3. Disaster management and human rights; 5.4. EU fundamental rights framework and disaster management; 5.5. Conclusion; 6. Conclusion: legally using social computing streams and privacy protection; 6.1. Introduction; 6.2. Social computing analysis in exceptional circumstances; 6.3. Checklist of legal issues; 6.4. Risk analysis; 6.5. Conclusion....

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.