Logo

Protecting Children Online?: Cyberbullying Policies of Social Media Companies

Large book cover: Protecting Children Online?: Cyberbullying Policies of Social Media Companies

Protecting Children Online?: Cyberbullying Policies of Social Media Companies
by

Publisher: The MIT Press
ISBN-13: 9780262037099
Number of pages: 297

Description:
This book investigates regulatory and social pressures that social media companies face in the aftermath of high profile cyberbullying incidents. The author's research evaluates the policies companies develop to protect themselves and users.

Home page url

Download or read it online for free here:
Download link
(3.8MB, PDF)

Similar books

Book cover: Lessons from the Identity TrailLessons from the Identity Trail
by - Oxford University Press
The authors explore the intricacies of privacy, identity and anonymity applying fresh analytical approaches, revealing the limitations of several traditional concepts, and identifying new insights on these critically important issues.
(14113 views)
Book cover: The Future of Reputation: Gossip, Rumor, and Privacy on the InternetThe Future of Reputation: Gossip, Rumor, and Privacy on the Internet
by - Yale University Press
A fascinating account of how the Internet is transforming gossip and our ability to protect our own reputations. The author shows that the unconstrained flow of information on the Internet may impede opportunities for self-development and freedom.
(17611 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(19559 views)
Book cover: How to Become Anonymous, Secure and Free OnlineHow to Become Anonymous, Secure and Free Online
by - Smashwords
This book describes how internet users can become anonymous, secure and free. It gives many free resources and methods for users who want to go anonymous and protect their personal data from being accessed or hacked from outside sources.
(4237 views)