Logo

Protecting Children Online?: Cyberbullying Policies of Social Media Companies

Large book cover: Protecting Children Online?: Cyberbullying Policies of Social Media Companies

Protecting Children Online?: Cyberbullying Policies of Social Media Companies
by

Publisher: The MIT Press
ISBN-13: 9780262037099
Number of pages: 297

Description:
This book investigates regulatory and social pressures that social media companies face in the aftermath of high profile cyberbullying incidents. The author's research evaluates the policies companies develop to protect themselves and users.

Home page url

Download or read it online for free here:
Download link
(3.8MB, PDF)

Similar books

Book cover: Global Survey on Internet Privacy and Freedom of ExpressionGlobal Survey on Internet Privacy and Freedom of Expression
by - UNESCO
This book identifies the relationship between freedom of expression and Internet privacy, assessing where they support each other in different circumstances. The book maps out the issues in the current regulatory landscape of Internet privacy ...
(7011 views)
Book cover: Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked WorldControlling Knowledge: Freedom of Information and Privacy Protection in a Networked World
by - AU Press
Who controls our access to information, and who decides what others have a right to know about us? Lorna Stefanick offers a user-friendly overview of the regulatory regime that currently governs freedom of information and the protection of privacy.
(9244 views)
Book cover: The Transnational Dimension of Cyber Crime and TerrorismThe Transnational Dimension of Cyber Crime and Terrorism
by - Hoover Institution Press
The worldwide information infrastructure is today increasingly under attack by cyber criminals and terrorists. These attacks threaten the substantial and ever-growing reliance of commerce, governments, and the public upon the new technology.
(12581 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(18422 views)