Logo

Protecting Children Online?: Cyberbullying Policies of Social Media Companies

Large book cover: Protecting Children Online?: Cyberbullying Policies of Social Media Companies

Protecting Children Online?: Cyberbullying Policies of Social Media Companies
by

Publisher: The MIT Press
ISBN-13: 9780262037099
Number of pages: 297

Description:
This book investigates regulatory and social pressures that social media companies face in the aftermath of high profile cyberbullying incidents. The author's research evaluates the policies companies develop to protect themselves and users.

Home page url

Download or read it online for free here:
Download link
(3.8MB, PDF)

Similar books

Book cover: Security and Privacy: Global Standards for Ethical Identity ManagementSecurity and Privacy: Global Standards for Ethical Identity Management
by - ANU E Press
This study is principally concerned with the ethical dimensions of identity management technology -- electronic surveillance, the mining of personal data, and profiling -- in the context of transnational crime and global terrorism.
(9278 views)
Book cover: Lessons from the Identity TrailLessons from the Identity Trail
by - Oxford University Press
The authors explore the intricacies of privacy, identity and anonymity applying fresh analytical approaches, revealing the limitations of several traditional concepts, and identifying new insights on these critically important issues.
(14951 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(20982 views)
Book cover: Underground: Tales of hacking, madness, and obsessionUnderground: Tales of hacking, madness, and obsession
by - Mandarin
The author uncovered one of this country's best kept secrets and in doing so has created a highly intense and enjoyable read. The book is an overview of some computer intrusion incidents and describes the persons behind them.
(15876 views)