Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-xm8r8 Total loading time: 0 Render date: 2024-06-29T03:19:46.084Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  28 September 2018

Khurshid Ahmad
Affiliation:
Trinity College Dublin
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Social Computing and the Law
Uses and Abuses in Exceptional Circumstances
, pp. 150 - 162
Publisher: Cambridge University Press
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Primary Sources

Ackerman, B. (2004). The Emergency Constitution. Yale Law Journal, 113(5), 10291091.Google Scholar
Agarwal, S., & Lau, C. T. (2010). Remote Health Monitoring Using Mobile Phones and Web Services. Telemedicine and e-Health, 16(5), 603607.Google Scholar
Ahmad, K. (2017). Slándáil: A Security System for Language and Image Analysis-Final Report for EU FP7 Project no. 607691 (2014–2017). Available at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3060047 (last accessed 16 May 2018).Google Scholar
Alemanno, A., & Lauto, K. C. (2014). Opening Editorial. European Journal of Risk Regulation, 2, 129132.Google Scholar
Alexander, D. E. (2014). Social Media in Disaster Risk Reduction and Crisis Management. Science and Engineering Ethics, 20(3), 717733.Google Scholar
Alston, P., & Goodman, R. (2012). International Human Rights: Oxford University Press.Google Scholar
Andrejevic, M. (2011). Social Network Exploitation. In Papacharissi, Z. (ed.), A Networked Self: Identity, Community, and Culture on Social Network Sites (pp. 82101): Routledge.Google Scholar
Article 29 Data Protection Working Party. (2012). European Commission. Retrieved from http://ec.europa.eu/newsroom/document.cfm?doc_id=40100 (last accessed 16 May 2018).Google Scholar
Article 29 Data Protection Working Party: Preliminary EDPS Opinion on the Review of the ePrivacy Directive (2002). European Commission. Retrieved from https://edps.europa.eu/sites/edp/files/publication/16–07-22_opinion_eprivacy_en.pdf (last accessed 16 May 2018).Google Scholar
Austin, G. W. (2005). The Berne Convention as a Canon of Construction: Moral Rights after Dastar. NYU Annual Survey of American Law, 61(2),111150.Google Scholar
Austin, L. M. (2014). Lawful Illegality: What Snowden Has Taught Us about the Legal Infrastructure of the Surveillance State. In Geist, M. (ed.), Law, Privacy and Surveillance in Canada in the Post-Snowden Era (pp. 103125): University of Ottawa Press.Google Scholar
Austin, L., Fisher Liu, B., & Jin, Y. (2012). How Audiences Seek Out Crisis Information: Exploring the Social-Mediated Crisis Communication Model. Journal of Applied Communication Research, 40(2), 188207.Google Scholar
Bagh, M. T. (2007). On-demand Anwendungen in Forschung und Lehre: die öffentliche Zugänglichmachung für Unterricht und Forschung im Rechtsvergleich zwischen Schweden und Deutschland (vol. 6): Walter de Gruyter.Google Scholar
Barnett, R. (2015). Why the NSA Data Seizures Are Unconstitutional. Harvard Journal of Law and Public Policy, 38, 320.Google Scholar
Bartha, G., & Kocsis, S. (2011). Standardization of Geographic Data: The European Inspire Directive. European Journal of Geography, 2(2), 7989.Google Scholar
Bekkers, V., Edwards, A., & de Kool, D. (2013). Social Media Monitoring: Responsive Governance in the Shadow of Surveillance? Government Information Quarterly, 30(4), 335342.Google Scholar
Bengtsson, L., Lu, X., Thorson, A., Garfield, R., & Von Schreeb, J. (2011). Improved Response to Disasters and Outbreaks by Tracking Population Movements with Mobile Phone Network Data: A Post-Earthquake Geospatial Study in Haiti. PLOS Medicine, 8(8), e1001083.CrossRefGoogle Scholar
Bently, L., & Sherman, B. (2014). Intellectual Property Law: Oxford University Press.Google Scholar
Berger, C. (2012). Aktuelle Entwicklungen im Urheberrecht – Der EuGH bestimmt die Richtung. Zeitschrift für Urheber- und Medienrecht, 56(5), 353360.Google Scholar
Berger, C.(2014). European Copyright in Germany. In Enders, C., Kusumadara, A., & Mrozek, A. (eds.), United in Diversity: Freedom, Property and Human Rights (pp. 89108): Leipziger Universitätsverlag.Google Scholar
Berger, C. & Wündisch, S. (Des) (2015). Handbuch des Urhebervertragsrechts: Nomos Verlagsgesellschaft.Google Scholar
Berlin, I. (1958). Two Concepts of Liberty: Clarendon Press.Google Scholar
Berlin, I.(2013). The Pursuit of the Ideal. In The Crooked Timber of Humanity: Chapters in the History of Ideas, 2nd edn., edited by Hardy, H. (pp. 120): Princeton University Press.Google Scholar
Bernhöft, M. (2009). Die urheberrechtliche Zulässigkeit der digitalen Aufzeichnung einer Sendung (vol. 4942): Peter Lang.Google Scholar
Bigo, D., Carrera, S., Hernanz, N., Jeandesboz, J., Parkin, J., Ragazzi, F., & Scherrer, A. (2013). Mass Surveillance of Personal Data by EU Member States and Its Compatibility with EU Law. CEPS paper in Liberty and Security in Europe, no. 62, November 2013.Google Scholar
Bone, C., Ager, A., Bunzel, K., & Tierney, L. (2016). A Geospatial Search Engine for Discovering Multi-format Geospatial Data across the Web. International Journal of Digital Earth, 9(1), 4762.CrossRefGoogle Scholar
Boyd, D. & Ellison, N. B. (2007). Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication, 13(1), 210–230.CrossRefGoogle Scholar
Brayne, S. (2017). Big Data Surveillance: The Case of Policing. American Sociological Review, 82(5), 9771008.Google Scholar
Brewer, I., & McNeese, M. (2003). Using Cognitive Systems Engineering to Develop Collaborative Geospatial Military Technologies. Paper presented at the Proceedings of the International Conference on Military Geology and Geography, United States Military Academy, West Point, NY.Google Scholar
Brownstein, J. S., Freifeld, C. C., & Madoff, L. C. (2009). Digital Disease Detection – Harnessing the Web for Public Health Surveillance. New England Journal of Medicine, 360(21), 21532157.Google Scholar
Bruggeman, V. (2010). Compensating Catastrophe Victims: A Comparative Law and Economics Approach (vol. 12): Kluwer Law International.Google Scholar
Burns, R. (2015). Rethinking Big Data in Digital Humanitarianism: Practices, Epistemologies, and Social Relations. GeoJournal, 80(4), 477490.CrossRefGoogle Scholar
Burton, E., Goldsmith, J., Koenig, S., Kuipers, B., Mattei, N., & Walsh, T. (2017). Ethical Considerations in Artificial Intelligence Courses. AI Magazine, 38(2), 22–34. Available at https://arxiv.org/pdf/1701.07769.pdf (last accessed 25 March 2018).Google Scholar
Busà, M. G., Musacchio, M. T., Finan, S., & Fennell, C. (2015). Trust-Building through Social Media Communications in Disaster Management. Paper presented at the 24th International Conference on World Wide Web, Florence, Italy.Google Scholar
Campbell, M. A. (2005). Cyber Bullying: An Old Problem in a New Guise? Australian Journal of Guidance and Counselling, 15(1), 6876.CrossRefGoogle Scholar
Caron, D. D., Kelly, M. J., & Telesetsky, A. (2014). The International Law of Disaster Relief: Cambridge University Press.Google Scholar
Cartlidge, E. (2014). Appeals Court Overturns Manslaughter Convictions of Six Earthquake Scientists. Science. Available at www.sciencemag.org/news/2014/11/updated-appeals-court-overturns-manslaughter-convictions-six-earthquake-scientists (last accessed 25 April 2018).Google Scholar
Cavoukian, A., & Castro, D. (2014). Big Data and Innovation, Setting the Record Straight: De-identification Does Work. White paper, 16 June 2014. Available at www2.itif.org/2014-big-data-deidentification.pdf (last accessed 16 May 2018).Google Scholar
Chae, J., Thom, D., Bosch, H., Jang, Y., Maciejewski, R., Ebert, D. S., & Ertl, T. (2012). Spatiotemporal Social Media Analytics for Abnormal Event Detection and Examination Using Seasonal-Trend Decomposition. Paper presented at the 2012 IEEE Conference on Visual Analytics Science and Technology (VAST), 14–19 October 2012.Google Scholar
Chamlee‐Wright, E., & Storr, V. H. (2009). “There’s No Place Like New Orleans”: Sense of Place and Community Recovery in the Ninth Ward after Hurricane Katrina. Journal of Urban Affairs, 31(5), 615634.CrossRefGoogle Scholar
Chatfield, A. T., Scholl, H. J., & Brajawidagda, U. (2014). #Sandy Tweets: Citizens’ Co-Production of Time-Critical Information during an Unfolding Catastrophe. Paper presented at the System Sciences (HICSS), 2014 – 47th Hawaii International Conference.Google Scholar
Cherniss, J., & Hardy, H. (2004). Isaiah Berlin. Available at http://plato.stanford.edu/entries/berlin (last accessed 16 May 2018).Google Scholar
Citron, D. K. (2014). Hate Crimes in Cyberspace: Harvard University Press.Google Scholar
Cogburn, D. L., & Espinoza-Vasquez, F. K. (2011). From Networked Nominee to Networked Nation: Examining the Impact of Web 2.0 and Social Media on Political Participation and Civic Engagement in the 2008 Obama Campaign. Journal of Political Marketing, 10(1–2), 189213.CrossRefGoogle Scholar
Coile, R. C. (1997). The Role of Amateur Radio in Providing Emergency Electronic Communication for Disaster Management. Disaster Prevention and Management: An International Journal, 6(3), 176185.Google Scholar
Coleman, D. J., & McLaughlin, J. (1998). Defining Global Geospatial Data Infrastructure (GGDI): Components, Stakeholders and Interfaces. Geomatica, 52(2), 129143.Google Scholar
Cook, T. (2012). Exceptions and Limitations in European Union Copyright Law. Journal of Intellectual Property Rights, 17, 243245.Google Scholar
Crackau, A. (2014). Zum europäischen Werkbegriff des Urheberrechts [On the European Definition of Works in Copyright Law]. SSRN Electronic Journal.CrossRefGoogle Scholar
Creta, A. (2012). A (Human) Right to Humanitarian Assistance in Disaster Situations? Surveying Public International Law. In de Guttry, A., Gestri, M., & Venturini, G. (eds.), International Disaster Response Law (pp. 353379): Springer.Google Scholar
Criddle, E. J., & Fox-Decent, E. (2012). Human Rights, Emergencies, and the Rule of Law. Human Rights Quarterly, 34(1), 3987.Google Scholar
Criddle, E. J., & Fox-Decent, E. (2016). Fiduciaries of Humanity: How International Law Constitutes Authority: Oxford University Press.Google Scholar
Cruz, A. M., & Krausmann, E. (2013). Vulnerability of the Oil and Gas Sector to Climate Change and Extreme Weather Events. Climatic Change, 121(1), 4153.Google Scholar
Cubie, D., & Hesselman, M. (2015). Accountability for the Human Rights Implications of Natural Disasters: A Proposal for Systemic International Oversight. Netherlands Quarterly of Human Rights, 33(1), 941.CrossRefGoogle Scholar
Cusumano, M. A. (2004). The Business of Software: Free Press.Google Scholar
De Franceschi, A., & Lehmann, M. (2015). Data as Tradeable Commodity and New Measures for Their Protection. Italian Law Journal, 1, 51.Google Scholar
de Graaf, G. (2015). The Bright Future of Value Pluralism in Public Administration. Administration & Society, 47(9), 10941102.Google Scholar
De Guttry, A., Gestri, M., & Venturini, G. (2012). International Disaster Response Law: Springer.Google Scholar
De Hert, P. (2015). The Right to Protection of Personal Data. Incapable of Autonomous Standing in the Basic EU Constituting Documents. HeinOnline.Google Scholar
De Schutter, O. (2013). Fundamental Rights in the European Union: Oxford University Press.Google Scholar
De Schutter, O.(2014). International Human Rights Law: Cases, Materials, Commentary: Cambridge University Press.Google Scholar
De Stefani, P. (2017). Using Social Media in Natural Disaster Management: A Human-Rights Based Approach. Peace Human Rights Governance, 1(2), 195221.Google Scholar
Delgado, J., Torres, V., Llorente, S., & Rodríguez, E. (2005). Rights and Trust in Multimedia Information Management. In Dittmann, J., Katzenbeisser, S., & Uhl, A. (eds.), Communications and Multimedia Security: 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19–21, 2005. Proceedings (pp. 5564): Springer.Google Scholar
Directive 2002/58/EC ePrivacy Directive. (2002).Google Scholar
Donohue, L. (2014). Bulk Metadata Collection: Statutory and Constitutional Considerations. Harvard Journal of Law and Public Policy, 37, 757900.Google Scholar
Dreier, T., & Schulze, G. (2004). Urheberrechtsgesetz. Urheberrechtswahrnehmungsgesetz, Kunsturhebergesetz. Kommentar: Beck.Google Scholar
Dreier, T., & Schulze, G.(2015). Urheberrechtsgesetz: UrhG, 5th edn.: Beck.Google Scholar
Droege, C. (2007). The Interplay between International Humanitarian Law and International Human Rights Law in Situations of Armed Conflict. Israel Law Review, 40(2), 310355.CrossRefGoogle Scholar
Duffield, M. (2016). The Resilience of the Ruins: Towards a Critique of Digital Humanitarianism. Resilience, 4(3), 147165.Google Scholar
Edwards, L. (2009). Coding Privacy. Chicago-Kent Law Review, 84(3), 861873.Google Scholar
El Emam, K., & Álvarez, C. (2014). A Critical Appraisal of the Article 29 Working Party Opinion 05/2014 on Data Anonymization Techniques. International Data Privacy Law, ipu033.Google Scholar
Elliott, J. R. (2014). Natural Hazards and Residential Mobility: General Patterns and Racially Unequal Outcomes in the United States. Social Forces, sou120.Google Scholar
Elliott, J. R., & Pais, J. (2006). Race, Class, and Hurricane Katrina: Social Differences in Human Responses to Disaster. Social Science Research, 35(2), 295321.Google Scholar
Ensthaler, J. (2009). Inhalte des Urheberrechts. In Gewerblicher Rechtsschutz und Urheberrecht (pp. 4680): Springer.Google Scholar
Ess, C. (2013). Digital Media Ethics: Polity.Google Scholar
Farber, D. A. (2014). International Law and the Disaster Cycle. In Caron, K. & Telesetksy, A. (eds.), The International Law of Disaster Relief (pp. 7–20): Cambridge University Press.Google Scholar
Field, C. B. (2012). Managing the Risks of Extreme Events and Disasters to Advance Climate Change Adaptation: Special Report of the Intergovernmental Panel on Climate Change: Cambridge University Press.CrossRefGoogle Scholar
Floridi, L. (2013). The Ethics of Information: Oxford University Press.Google Scholar
Förster, A. (2014). Urheberrecht: eine Einführung in die rechtlichen Grundlagen kreativer Tätigkeit (vol. 11): University of Bamberg Press.Google Scholar
Fraustino, J. D., & Ma, L. (2015). CDC’s Use of Social Media and Humor in a Risk Campaign – “Preparedness 101: Zombie Apocalypse”. Journal of Applied Communication Research, 43(2), 222241.Google Scholar
Fuchs, T. (2006). Der Arbeitnehmerurheber im System des § 43 UrhG. GRUR, 561565.Google Scholar
Galicki, A. (2015). The End of Smith v. Maryland: The NSA’s Bulk Telephony Metadata Program and the Fourth Amendment in the Cyber Age. American Criminal Law Review, 52, 375414.Google Scholar
Gestri, M. (2012). EU Disaster Response Law: Principles and Instruments. In De Guttry, A., Gestri, M., & Venturini, G. (eds.), International Disaster Response Law: Springer.Google Scholar
Giegerich, T. (2012). Article 36 UN Charter. In Zimmermann, A. (ed.), The Statute of the International Court of Justice: A Commentary (pp. 134162): Oxford University Press.Google Scholar
Ginsburg, J. C. (1994). Global Use/Territorial Rights: Private International Law Questions of the Global Information Infrastructure. Journal of the Copyright Society of the USA, 42(4), 318338.Google Scholar
Ginsburg, J. C.(1999). The Cyberian Captivity of Copyright: Territoriality and Authors’ Rights in a Networked World. Santa Clara Computer & High Technology Law Journal, 15(2), 347362.Google Scholar
GNU. (1991). General public license.Google Scholar
Graham, C. (2016). Referendum Result Response [press release]. Retrieved from https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2016/07/referendum-result-response (last accessed 16 May 2018).Google Scholar
Greaves, F., Ramirez-Cano, D., Millett, C., Darzi, A., & Donaldson, L. (2013). Harnessing the Cloud of Patient Experience: Using Social Media to Detect Poor Quality Healthcare. BMJ Quality & Safety, bmjqs–2012–001527.Google Scholar
Greenwald, G. (2013). NSA Collecting Phone Records of Millions of Verizon Customers Daily. The Guardian, 6(5), 13.Google Scholar
Griffiths, J. (2011). Infopaq, BSA and the “Europeanisation” of United Kingdom Copyright Law. Media & Arts Law Review, 16. Available at https://ssrn.com/abstract=1777027 (last accessed 16 May 2018).Google Scholar
Groot, R., & McLaughlin, J. D. (2000). Geospatial Data Infrastructure: Concepts, Cases, and Good Practice: Oxford University Press.Google Scholar
Gross, O., & Aolain, F. N. (2001). Emergency, War and International Law – Another Perspective. Nordic Journal of International Law, 70(1), 2963.Google Scholar
Guadamuz, A. (2016). The Monkey Selfie: Copyright Lessons for Originality in Photographs and Internet Jurisdiction. Internet Policy Review, 5(1), DOI: 10.14763/2016.1.398.Google Scholar
Guibault, L. (2010). Why Cherry-Picking Never Leads to Harmonisation: The Case of the Limitations on Copyright under Directive 2001/29/EC. Journal of Intellectual Property, Information Technology and Electronic Commerce Law, 2, 5566.Google Scholar
Gupta, R., & Brooks, H. (2013). Using Social Media for Global Security: John Wiley & Sons.Google Scholar
Handig, C. (2012). Erste Umrisse eines europäischen Werkbegriffs. Wirtschaftsrechtliche Blätter, 26(4), 191197.Google Scholar
Hardin, R. (2002). Trust and Trustworthiness: Russell Sage Foundation.Google Scholar
Harper, E. (2009). International Law and Standards Applicable in Natural Disaster Situations: International Development Law Organization, Rome, Italy.Google Scholar
Hartig, O. (2009). Provenance Information in the Web of Data. LDOW, 538.Google Scholar
Hartzog, W. (2012). Privacy and Terms of Use. In Stewart, D. (ed.), Social Media and the Law: A Guidebook for Communication Students and Professionals: Routledge.Google Scholar
Haupt, S., & Marschke, C. (2005). Urheberrecht für Autoren. Probleme des Urheberrechts bei wissenschaftlichen Publikationen. Zeitschrift für Germanistik, 15(2), 254276.Google Scholar
Heipke, C. (2010). Crowdsourcing Geospatial Data. ISPRS Journal of Photogrammetry and Remote Sensing, 65(6), 550557.Google Scholar
Henderson, J. J. (2013). The Boundaries of Free Speech in Social Media. In Stewart, D. (ed.), Social Media and the Law (pp. 122): Routledge.Google Scholar
Herzberg, A. (2006). Miturheberschaft, Bearbeiterurheberrecht, freie Benutzung und Plagiate: GRIN.Google Scholar
Hetmank, S. (2016). Urheberrechtsverletzungen im Internet. In Internetrecht (pp. 117145): Springer.Google Scholar
Hill, K. (2012). Max Schrems: The Austrian Thorn in Facebook’s Side. Forbes, 7, 2012.Google Scholar
Hiller, J. S., & Russell, R. S. (2017). Privacy in Crises: The NIST Privacy Framework. Journal of Contingencies and Crisis Management, 25(1), 3138.Google Scholar
Hoeren, T. (2013). Urheberrecht und Internetrecht. Grundlagen der praktischen Information und Dokumentation. Handbuch zur Einführung in die Informationswissenschaft und-praxis, 6, 3955.Google Scholar
Holpuch, A. (2015, 19/02/2015). Native American Activist to Sue Facebook over Site’s “Real Name” Policy. The Guardian. Available at www.theguardian.com/technology/2015/feb/19/native-american-activist-facebook-lawsuit-real-name (last accessed 16 May 2018).Google Scholar
Hu, M. (2015). Small Data Surveillance v. Big Data Cybersurveillance. Big Data Cybersurveillance (28 November 2015). Washington & Lee Legal Studies Paper (2016–6).Google Scholar
Italy, Government of. (1992). Law n. 225: Establishment of the National Civil Protection Service. Available at www.protezionecivile.gov.it/jcms/it/view_prov.wp?contentId=LEG1602 (last accessed 16 May 2018).Google Scholar
Jackson, D., & Hayes, P. (2016). Ensuring Security of Data and Information Flow in Emergency Response Decision Support. Paper presented at the 11th International Conference on Availability, Reliability and Security (ARES) 2016, Salzburg, Austria.Google Scholar
Johnson, M., Ruess, P., & Coll, J. (2016). OPERA – Operational Platform for Emergency Response and Awareness: Reimagining Disaster Alerts. National Water Center Innovators Program Summer Institute Report 2016.Google Scholar
Kekes, J. (1996). The Morality of Pluralism: Princeton University Press.Google Scholar
Kelly, S., & Ahmad, K. (2014). Determining Levels of Urgency and Anxiety during a Natural Disaster: Noise, Affect, and News in Social Media. Paper presented at the DIMPLE: Disaster Management and Principled Large-scale information Extraction Workshop Programme, Reykjavik, Iceland.Google Scholar
Kelly, S., & Ahmad, K.(2015). Propagating Disaster Warnings on Social and Digital Media. Intelligent Data Engineering and Automated Learning, 9375, 475484.Google Scholar
Kelly, S., Zhang, X., & Ahmad, K. (2017). Mining Multimodal Information on Social Media for Increased Situational Awareness. Paper presented at the 14th International Conference on Information Systems for Crisis Response and Management (ISCRAM), Albi, France.Google Scholar
Kerr, O. S. (2002). Internet Surveillance Law after the USA Patriot Act: The Big Brother that Isn’t. Northwestern University Law Review, 97, 607673.Google Scholar
King, I., Li, J., & Chan, K. T. (2009). A Brief Survey of Computational Approaches in Social Computing. Paper presented at the International Joint Conference on Neural Networks (IJCNN) 2009, Atlanta, Georgia.Google Scholar
Kinne, B. (1943). Voltaire Never Said It! Modern Language Notes, 58(7), 534535.Google Scholar
Kramer, X. E. (2008). The Rome II Regulation on the Law Applicable to Non-Contractual Obligations: The European Private International Law Tradition Continued-Introductory Observations, Scope, System, and General Rules. Nederlands Internationaal Privaatrecht, 4, 414424.Google Scholar
Kur, A., Planck, M., & Dreier, T. (2013). European Intellectual Property Law: Text, Cases and Materials: Edward Elgar Publishing.Google Scholar
Landau, S. (2014). Highlights from Making Sense of Snowden, Part II: What’s Significant in the NSA Revelations. IEEE Security & Privacy, 12(1), 6264.Google Scholar
Lauta, K. C. (2014). Disaster Law: Routledge.Google Scholar
Lee, D. (2014). Drag Queens in Facebook Name Row. BBC News, 12 September. Available at www.bbc.co.uk/news/technology-29175102 (last accessed 16 May 2018).Google Scholar
Leistner, M. (2014). Urheberrecht an der Schnittstelle zwischen Unionsrecht und nationalem Recht. GRUR, 11451155.Google Scholar
Lessig, L. (1999). Code and Other Laws of Cyberspace: Basic Books.Google Scholar
Lessig, L.(2006). Code and Other Laws of Cyberspace, Version 2.0: Basic Books.Google Scholar
Lindsay, B. R. (2016). Social Media for Emergencies and Disasters: Overview and Policy Considerations: Congressional Research Service.Google Scholar
Lipton, J. (2001). Copyright in the Digital Age: A Comparative Survey. Rutgers Computer & Technology Law Journal, 27(2), 333.Google Scholar
Liu, S. B., Palen, L., Sutton, J., Hughes, A. L., & Vieweg, S. (2008). In Search of the Bigger Picture: The Emergent Role of On-line Photo Sharing in Times of Disaster. Paper presented at the Proceedings of the Information Systems for Crisis Response and Management conference (ISCRAM).Google Scholar
Liu, Y., Gummadi, K. P., Krishnamurthy, B., & Mislove, A. (2011). Analyzing Facebook Privacy Settings: User Expectations vs. Reality. Paper presented at the Proceedings of the 2011 ACM SIGCOMM conference on Internet Measurement Conference.Google Scholar
Lloyd, I. (2017). Information Technology Law: Oxford University Press.Google Scholar
Lo, C. P., & Yeung, A. K. (2007). Concepts and Techniques of Geographic Information Systems: Pearson Prentice Hall.Google Scholar
Loader, B. D., & Mercea, D. (2011). Networking Democracy? Social Media Innovations and Participatory Politics. Information, Communication & Society, 14(6), 757769.Google Scholar
Longworth, E. (1999). Possibilities of a Legal Framework for Cyberspace: Including a New Zealand Perspective: Prepared for the Unesco Experts Meetings on Cyberspace Law (in South Korea and the Republic of Monaco, September 1998): GP Publications.Google Scholar
Loos, M. (2016). European Harmonisation of Online and Distance Selling of Goods and the Supply of Digital Content. Amsterdam Law School Research Paper no. 2016-27; Centre for the Study of European Contract Law Working Paper Series no. 2016-08.Google Scholar
Luca, M. (2016). Reviews, Reputation, and Revenue: The Case of Yelp.com. Harvard Business School Working Paper no. 12-016.Google Scholar
Lutz, P. (2009). Grundriss des Urheberrechts: CF Müller GmbH.Google Scholar
Lyon, D. (2006). Theorizing Surveillance: Routledge.CrossRefGoogle Scholar
Lyon, D.(2014). Surveillance, Snowden, and Big Data: Capacities, Consequences, Critique. Big Data & Society, 1(2), DOI: 10.1177/2053951714541861.Google Scholar
Manning, C. (2016). Hyperlinks & Copyright Law. Available at https://ssrn.com/abstract=2781471 (last accessed 4 May 2018).Google Scholar
Mans, U., Berens, J., & Shimshon, G. (2015). The New Humanitarian Data Ecosystem: Challenges and Opportunities to Increase Trust and Impact. World Humanitarian Summit White Paper. Unpublished manuscript.Google Scholar
Maresh-Fuehrer, M., & Smith, R. (2016). Social Media Mapping Innovations for Crisis Prevention, Response, and Evaluation. Computers in Human Behavior, 54, 620629.Google Scholar
Margoni, T. (2014). The Digitisation of Cultural Heritage: Originality, Derivative Works and (non-) Original Photographs. Available at https://ssrn.com/abstract=2573104 (last accessed 16 May 2018).Google Scholar
Mayer-Schönberger, V., & Cukier, K. (2013). Big Data: A Revolution That Will Transform How We Live, Work, and Think: Houghton Mifflin Harcourt.Google Scholar
McCaughey, M., & Ayers, M. D. (2013). Cyberactivism: Online Activism in Theory and Practice: Routledge.Google Scholar
McPherson, S. S. (2009). Tim Berners-Lee: Inventor of the World Wide Web: Twenty-First Century Books.Google Scholar
Menell, P. S. (2016). Economic Analysis of Copyright Notice: Tracing and Scope in the Digital Age. Boston University Law Review, 96(3), 9671023.Google Scholar
Millman, R. (2016, 16/09/2016). Firefox and Chrome are Blocking Access to The Pirate Bay. ITPRO. Available at www.itpro.co.uk/security/27250/firefox-and-chrome-are-blocking-access-to-the-pirate-bay (last accessed 16 May 2018).Google Scholar
Mishna, F., Saini, M., & Solomon, S. (2009). Ongoing and Online: Children and Youth’s Perceptions of Cyber Bullying. Children and Youth Services Review, 31(12), 12221228.Google Scholar
Mlot, S. (2016). Silence Instagram Trolls with Keyword Filters. Entrepreneur.com. Available at www.entrepreneur.com/article/282298 (last accessed 16 May 2018).Google Scholar
Moreau, L., Groth, P., Miles, S., Vazquez-Salceda, J., Ibbotson, J., Jiang, S., … & Tan, V. (2008). The Provenance of Electronic Data. Communications of the ACM, 51(4), 5258.Google Scholar
Morva, O. (2016). Are E-Petitions Operative for Change? On the Effectiveness and the Transformative Potential of E-Petitioning. Paper presented at the Proceedings of 22nd International Academic Conferences, Lisbon.Google Scholar
Netanel, N. W. (2000). Cyberspace Self-Governance: A Skeptical View from Liberal Democratic Theory. California Law Review, 88(2), 395498.Google Scholar
Ni Loideain, N. (2016). The End of Safe Harbor: Implications for EU Digital Privacy and Data Protection Law. Journal of Internet Law, 19(8), 1, 814.Google Scholar
Nieuwenburg, P. (2004). The Agony of Choice: Isaiah Berlin and the Phenomenology of Conflict. Administration & Society, 35(6), 683700.Google Scholar
Nissen, T. E. (2015). #TheWeaponizationOfSocialMedia: @Characteristics_of_ Contemporary_Conflicts: Royal Danish Defence College.Google Scholar
OECD. (2015). Changing Face of Strategic Crisis Management: OECD Publishing.Google Scholar
Ohm, P. (2010). Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. UCLA Law Review, 57, 17011777.Google Scholar
Ohm, P.(2012). The Fourth Amendment in a World without Privacy. Mississippi Law Journal, 81(5), 13091355.Google Scholar
Oriola, T. A. (2004). Electronic Database Protection and the Limits of Copyright. Journal of World Intellectual Property, 7(2), 201228.Google Scholar
Oriola, T. A.(2005). Regulating Unsolicited Commercial Electronic Mail in the United States and the European Union: Challenges and Prospects. Tulane Journal of Technology & Intellectual Property, 7, 113166.Google Scholar
Overeem, P., & Verhoef, J. (2014). Moral Dilemmas, Theoretical Confusion: Value Pluralism and Its Supposed Implications for Public Administration. Administration & Society, 46(8), 9861009.Google Scholar
Palen, L., Anderson, K. M., Mark, G., Martin, J., Sicker, D., Palmer, M., & Grunwald, D. (2010). A Vision for Technology-Mediated Support for Public Participation & Assistance in Mass Emergencies & Disasters. Paper presented at the Proceedings of the 2010 ACM-BCS Visions of Computer Science Conference, Edinburgh, United Kingdom.Google Scholar
Parameswaran, M., & Whinston, A. B. (2007). Social Computing: An Overview. Communications of the Association for Information Systems, 19, 762780.Google Scholar
Pell, S. K., & Soghoian, C. (2014). A Lot More Than a Pen Register, and Less Than a Wiretap: What the Stingray Teaches Us about How Congress Should Approach the Reform of Law Enforcement Surveillance Authorities. Yale Journal of Law and Technology, 16(1), 134171.Google Scholar
Peng, W., Li, F., Zou, X., & Wu, J. (2014). A Two-Stage Deanonymization Attack against Anonymized Social Networks. IEEE Transactions on Computers, 63(2), 290303.Google Scholar
PLoS Medicine Editors. (2012). Digital Humanitarianism: Collective Intelligence Emerging. PLoS Medicine, 9(7), e1001278.Google Scholar
Poeppel, J. (2005). Die Neuordnung der urheberrechtlichen Schranken im digitalen Umfeld (vol. 11): V&R unipress GmbH.Google Scholar
Provost, R. (2002). International Human Rights and Humanitarian Law (vol. 22): Cambridge University Press.Google Scholar
Ramirez, E., Brill, J., Ohlhausen, M. K., Wright, J. D., & McSweeny, T. (2014). Data Brokers: A Call for Transparency and Accountability: Federal Trade Commission.Google Scholar
Ramsbotham, O., Miall, H., & Woodhouse, T. (2011). Contemporary Conflict Resolution: Polity.Google Scholar
Raue, B. (2013). Informationsfreiheit und Urheberrecht. Juristenzeitung), 6, 280288.Google Scholar
Reed, C. (2012). Making Laws for Cyberspace: Oxford University Press.Google Scholar
Reinemann, S., & Remmertz, F. (2012). Urheberrechte an User-generated Content. Zeitschrift für Urheber-und Medien recht (ZUM), 55, 216227.Google Scholar
Renda, A., Simonelli, F., Mazziotti, G., Bolognini, A., & Luchetta, G. (2015). The Implementation, Application and Effects of the EU Directive on Copyright in the Information Society. CEPS Special Report No. 120, 19 November 2015.Google Scholar
Rizza, C., Büscher, M., & Watson, H. (2017). Working with Data: Ethical Legal and Social Considerations Surrounding the Use of Crisis Data and Information Sharing during a Crisis. Journal of Contingencies and Crisis Management, 25(1), 26.Google Scholar
Ronzitti, N. (2012). Conclusion. In De Guttry, A., Gestri, M., & Venturini, G. (eds.), International Disaster Response Law: Springer.Google Scholar
Rosati, E. (2013). Originality in EU Copyright: Full Harmonization through Case Law: Edward Elgar Publishing.Google Scholar
Rowland, D., Kohl, U., & Charlesworth, A. (2016). Information Technology Law, 5th edn.: Routledge.Google Scholar
Ryder, J., Longstaff, B., Reddy, S., & Estrin, D. (2009). Ambulation: A Tool for Monitoring Mobility Patterns over Time Using Mobile Phones. Paper presented at the 2009 International Conference on Computational Science and Engineering.Google Scholar
Schack, H. (2015). Urheber-und Urhebervertragsrecht, 7th edn.: Mohr Siebeck.Google Scholar
Sevignani, S. (2013). Facebook vs. Diaspora: A Critical Study. In Lovink, G., & Rasch, M. (eds.), Unlike Us Reader: Social Media Monopolies and Their Alternatives (pp. 323337): Institute of Network Cultures.Google Scholar
Shelton, D. L. (2014). Advanced Introduction to International Human Rights Law: Edward Elgar Publishing.Google Scholar
Shih, P. C., Han, K., & Carroll, J. M. (2014). Community Incident Chatter: Informing Local Incidents by Aggregating Local News and Social Media Content. Paper presented at the Proceedings of the International Conference on Information Systems for Crisis Response and Management.Google Scholar
Simon, H. A. (1982). Models of Bounded Rationality: Empirically Grounded Economic Reason (vol. 3): MIT Press.Google Scholar
Siracusa Principles. (1985). Symposium: Limitation and Derogation Provisions in the International Covenant on Civil and Political Rights: Principles. Human Rights Quarterly, 7(1), 314.Google Scholar
Solove, D. J. (2007). The Future of Reputation: Gossip, Rumor, and Privacy on the Internet: Yale University Press.Google Scholar
Sotto, L. J., & Simpson, A. P. (2015). United States. In Jay, R. P. (ed.), Data Protection and Privacy in 31 Jurisdictions Worldwide: Law Business Research.Google Scholar
Sphere Project. (2011). Humanitarian Charter and Minimum Standards in Humanitarian Response: The Sphere Project.Google Scholar
Spicer, M. W. (2001). Value Pluralism and Its Implications for American Public Administration. Administrative Theory & Praxis, 23(4), 507528.Google Scholar
Stallings, R. A., & Quarantelli, E. L. (1985). Emergent Citizen Groups and Emergency Management. Public Administration Review, 45, 93100.Google Scholar
Stefanidis, A., Crooks, A., & Radzikowski, J. (2013). Harvesting Ambient Geospatial Information from Social Media Feeds. GeoJournal, 78(2), 319338.Google Scholar
Stelter, B. (2009). Facebook’s Users Ask Who Owns Information. New York Times, 16 February.Google Scholar
Stewart, D., ed. (2013). Preface. In Social Media and The Law: A Guidebook for Communication Students and Professionals (pp. vixxi): Routledge.Google Scholar
Stewart, D.(2017). Social Media and the Law: A Guidebook for Communication Students and Professionals, 2nd edn.: Routledge.Google Scholar
Stieglitz, S., & Dang-Xuan, L. (2013). Emotions and Information Diffusion in Social Media – Sentiment of Microblogs and Sharing Behavior. Journal of Management Information Systems, 29(4), 217248.Google Scholar
Sui, D. Z. (2008). Geospatial Technologies and Homeland Security: Research Frontiers and Future Challenges (vol. 94): Springer Science & Business Media.Google Scholar
Svensson-McCarthy, A.-L. (1998). The International Law of Human Rights and States of Exception: With Special Reference to the Travaux Preparatoires and the Case-law of the International Monitoring Organs (vol. 54): Martinus Nijhoff Publishers.Google Scholar
Sweeney, L. (2002). Achieving k-anonymity Privacy Protection Using Generalization and Suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5), 571588.Google Scholar
Taddeo, M., & Floridi, L. (2017). The Moral Responsibilities of Online Service Providers. In Taddeo, M. & Floridi, L. (eds.), The Responsibilities of Online Service Providers (pp. 1342): Springer.Google Scholar
Talisse, R. B. (2011). Value Pluralism and Liberal Politics. Ethical Theory and Moral Practice, 14(1), 87100.Google Scholar
Tene, O., & Polonetsky, J. (2012). Big Data for All: Privacy and User Control in the Age of Analytics. Northwestern Journal of Technology & Intellectual Property, 11(5), 239273.Google Scholar
Terry, F. (2003). Condemned to Repeat? The Paradox of Humanitarian Action. Sydney Papers, 15(2), 110.Google Scholar
Trudel, P. (2000). Liability in Cyberspace. In Fuentes-Camacho, T. (ed.), The International Dimension of Cyberspace Law (pp. 189211): Ashgate.Google Scholar
United Kingdom, Government of the. (2004). Civil Contingencies Act. Available at www.legislation.gov.uk/ukpga/2004/36/contents (last accessed 16 May 2018).Google Scholar
United Nations (UN). (1945). Charter of the United Nations.Google Scholar
United Nations (UN)(1976). International Covenant on Civil and Political Rights.Google Scholar
UN Commission on Human Rights. (1984). Siracusa Principles on the Limitation and Derogation of Provisions in the International Covenant on Civil and Political Rights. Geneva: United Nations Commission on Human Rights.Google Scholar
UN Framework Convention on Climate Change (UNFCCC). (2010). United Nations Climate Change Conference COP 16, 29 November–10 December 2010, Cancun, Mexico.Google Scholar
UNFCCC & EU. (2015). Submission-by-latvia-and-the-european-commission-on-behalf-of-the-european-union-and-its-member-states.html. Available at http://docplayer.net/amp/45102139 (last accessed 25 April 2017).Google Scholar
UN High Commissioner for Human Rights (OHCHR), Office of the. (2014). The Right to Privacy in the Digital Age. Available at www.ohchr.org/EN/Issues/Digital/Age/Pages/DigitalAgeIndex.aspx (last accessed 16 May 2018).Google Scholar
UN International Strategy for Disaster Recover (UNISDR). (2015). Sendai Framework for Disaster Risk Reduction 2015–2030: UNISDR.Google Scholar
US Department of Justice. (2006). Privacy Technology Focus Group: Final Report and Recommendations. Available at www.it.ojp.gov/documents/privacy_technology_focus_group_full_report.pdf (last accessed 16 May 2018).Google Scholar
Vallor, S. (2016). Technology and the Virtues: A Philosophical Guide to a Future Worth Wanting: Oxford University Press.Google Scholar
van Engelen, D. (2008). Rome II and Intellectual Property Rights: Choice of Law Brought to a Standstill. Nederlands Internationaal Privaatrecht, 4, 440448.Google Scholar
Van Velze, S. C. (2015). Communication to a New Public? A Critical Analysis of the CJEU’s “New Public” Criterion in European Copyright Law: Universiteit van Amsterdam.Google Scholar
Vandenbroucke, D., Zambon, M.-L., Crompvoets, J., & Dufourmont, H. (2008). INSPIRE Directive: Specific Requirements to Monitor Its Implementation. In Crompvoets, J., Rajabifard, A., van Loenen, B., & Delgado Fernández, T. (eds.), A Multi-View Framework to Assess Spatial Data Infrastructures (pp. 327355): Space for Geo-Information (RGI), Wageningen University and Centre for SDIs and Land Administration, Department of Geomatics, University of Melbourne.Google Scholar
Vitoria, M., Laddie, H. I. L., & Prescott, P. (2011). Laddie, Prescott and Vitoria: The Modern Law of Copyright and Designs, 4th edn.: LNUK.Google Scholar
von Lewinski, S., & Walter, M. (2010). Information Society Directive. In Walter, M. & von Lewinski, S. (eds.), European Copyright Law: A Commentary (pp. 9211032): Oxford University Press.Google Scholar
Waelde, C., Laurie, G., Brown, A., Kheria, S., & Cornwell, J. (2013). Contemporary Intellectual Property: Law and Policy: Oxford University Press.Google Scholar
Wagenaar, H. (1999). Value Pluralism in Public Administration. Administrative Theory & Praxis, 21(4), 441449.Google Scholar
Wagner, R. P. (2003). Information Wants to Be Free: Intellectual Property and the Mythologies of Control. Columbia Law Review, 103, 9951034.Google Scholar
Wandtke, A.-A., Bullinger, W., Block, U., & Grunert, E. W. (2014). Praxiskommentar zum Urheberrecht, 4th edn.: Beck.Google Scholar
Wang, F.-Y., Carley, K. M., Zeng, D., & Mao, W. (2007). Social Computing: From Social Informatics to Social Intelligence. IEEE Intelligent Systems, 22(2). DOI: 10.1109/MIS.2007.41.Google Scholar
Warren, S. D., & Brandeis, L. D. (1890). The Right to Privacy. Harvard Law Review, 4(5), 193220.Google Scholar
Weiss, M. A., & Archick, K. (2016). US-EU Data Privacy: From Safe Harbor to Privacy Shield: Congressional Research Service.Google Scholar
World Trade Organization (WTO). (1995). Agreement on Trade-Related Aspects of Intellectual Property Rights: WTO.Google Scholar
Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information Security in Big Data: Privacy and Data Mining. Access, IEEE, 2, 11491176.Google Scholar
Yadron, D. (2016). Twitter Deletes 125,000 Isis Accounts and Expands Anti-Terror Teams. The Guardian. Available at www.theguardian.com/technology/2016/feb/05/twitter-deletes-isis-accounts-terrorism-online (last accessed 16 May 2018).Google Scholar
Young-McLear, K., Mazzuchi, T. A., & Sarkani, S. (2015). Large-Scale Disaster Response Management Social Media and Homeland Security. In Social Media and the Transformation of Interaction in Society (pp. 93131): IGI Global.Google Scholar
Zeng, D., Wang, F.-Y., & Carley, K. M. (2007). Guest Editors’ Introduction: Social Computing. IEEE Intelligent Systems, 22(5), 2022.Google Scholar
Zhang, X., Kelly, S., & Ahmad, K. (2016). The Slandail Monitor: Real-Time Processing and Visualisation of Social Media Data for Emergency Management. Paper presented at the 11th International Conference on Availability, Reliability and Security (ARES) 2016, Salzburg, Austria.Google Scholar
Ziewitz, M., & Brown, I. (2011). A Prehistory of Internet Governance. In Brown, I. (ed.), Research Handbook on Governance of the Internet (pp. 326): Edward Elgar.Google Scholar
Zimmer, M. (2010). “But the Data Is Already Public”: On the Ethics of Research in Facebook. Ethics and Information Technology, 12(4), 313325.Google Scholar
Zittrain, J. L. (2006). The Generative Internet. Harvard Law Review, 119, 19742040.Google Scholar

Secondary Sources

Agence France Presse v. Morel, No. 934 F.Supp.2d 547 (United States District Court 2013).Google Scholar
Al-Skeini and Others v. the United Kingdom, No. 55721/07 (European Court of Human Rights 2011).Google Scholar
The Amalgamated Transit Union, Local 113 v. Toronto Transit Commission (Use of Social Media Grievance), No. O.L.A.A No. 267 (Ontario Superior Court of Justice 2016).Google Scholar
Barberi e a., Giud. Billi (Trib. dell’Aquila 2012).Google Scholar
Beyond Systems, Inc. v. Realtime Gaming Holding Company, §878 A. 2d 567, at 579 (2005).Google Scholar
Campbell v. Mirror Group Newspapers Ltd, No. 2 AC 457 (UK House of Lords 2002).Google Scholar
Case C-335/12 Nintendo and Others v. PC Box Srl and Others (Court of Justice of the European Union 2014).Google Scholar
Cases C-293/12 and 594/12 Digital Rights Ireland and Seitlinger and Others (European Court of Justice 2014).Google Scholar
CBS Songs Ltd. v. Amstrad Consumer Electronics PLC, No. 1 AC 1013 (House of Lords 1988).Google Scholar
Craigslist Inc. v. 3Taps Inc., No. CV 12–03316 CRB (Northern District of California Court 2013).Google Scholar
Feist Publications, Inc., v. Rural Telephone Service Co, No. 499 U.S. 340 (Supreme Court of the United States 1991).Google Scholar
Government’s Ex Parte Application for Order Compelling Apple Inc. to Assist Agents in Search (Apple Inc. v. FBI), No. ED No. 15-0451M (United States District Court 2016).Google Scholar
Independent Newspapers, Inc. v. Brodie, No. 966 A. 2d 432, 407 Md. 415 (Court of Appeals of Maryland 2009).Google Scholar
Isayeva and Others v. Russia, Nos. 57947/00, 57948/00 and 57949/00 (European Court of Human Rights 2005).Google Scholar
Largent v. Reed, No. 192009–1823 (Court of Common Pleas of the 29th Judicial District of Pennsylvania 2011).Google Scholar
Microsoft Corp. v. United States, No. 14‐2985 (United States Court of Appeals for the Second Circuit 2016).Google Scholar
Nucci v. Target Corporation, No. 4D14-138, 162 So.3d 146 (District Court of Appeal of Florida, Fourth District 2015).Google Scholar
People of the State of New York v. Malcolm Harris, No. 192011NY080152 (Criminal Court of the City of New York 2012).Google Scholar
Pres. Francabandera, imp. Barberi e a, No. 3317 (Corte d’Appello dell’Aquila 2014).Google Scholar
Reno v. American Civil Liberties Union, 521 U.S. 844 (1997).Google Scholar
SAS Institute, Inc. v. World Programming Limited, No. 5: 10-CV-25-FL (Dist. Court, North Carolina 2016).Google Scholar
Sony Corp. of America v. Universal City Studios, Inc., No. 464 U.S. 417 (Supreme Court of the United States 1984).Google Scholar
St Albans City and District Council v. International Computers Ltd, No. EWCA Civ 1296 (UK Court of Appeal 1996).Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Edited by Khurshid Ahmad, Trinity College Dublin
  • Book: Social Computing and the Law
  • Online publication: 28 September 2018
  • Chapter DOI: https://doi.org/10.1017/9781108575720.010
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Edited by Khurshid Ahmad, Trinity College Dublin
  • Book: Social Computing and the Law
  • Online publication: 28 September 2018
  • Chapter DOI: https://doi.org/10.1017/9781108575720.010
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Edited by Khurshid Ahmad, Trinity College Dublin
  • Book: Social Computing and the Law
  • Online publication: 28 September 2018
  • Chapter DOI: https://doi.org/10.1017/9781108575720.010
Available formats
×