Logo

Protecting Children Online?: Cyberbullying Policies of Social Media Companies

Large book cover: Protecting Children Online?: Cyberbullying Policies of Social Media Companies

Protecting Children Online?: Cyberbullying Policies of Social Media Companies
by

Publisher: The MIT Press
ISBN-13: 9780262037099
Number of pages: 297

Description:
This book investigates regulatory and social pressures that social media companies face in the aftermath of high profile cyberbullying incidents. The author's research evaluates the policies companies develop to protect themselves and users.

Home page url

Download or read it online for free here:
Download link
(3.8MB, PDF)

Similar books

Book cover: Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked WorldControlling Knowledge: Freedom of Information and Privacy Protection in a Networked World
by - AU Press
Who controls our access to information, and who decides what others have a right to know about us? Lorna Stefanick offers a user-friendly overview of the regulatory regime that currently governs freedom of information and the protection of privacy.
(9425 views)
Book cover: Security and Privacy: Global Standards for Ethical Identity ManagementSecurity and Privacy: Global Standards for Ethical Identity Management
by - ANU E Press
This study is principally concerned with the ethical dimensions of identity management technology -- electronic surveillance, the mining of personal data, and profiling -- in the context of transnational crime and global terrorism.
(7865 views)
Book cover: Global Survey on Internet Privacy and Freedom of ExpressionGlobal Survey on Internet Privacy and Freedom of Expression
by - UNESCO
This book identifies the relationship between freedom of expression and Internet privacy, assessing where they support each other in different circumstances. The book maps out the issues in the current regulatory landscape of Internet privacy ...
(7137 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(18697 views)