Computer & Internet
Showing 65–80 of 84 results
| Title & Subtitle | Abstract | Contributors | Pages | Year | Purchase |
|---|---|---|---|---|---|
![]() ResetReclaiming the Internet for Civil Society |
In the 2020 CBC Massey Lectures, bestselling author and renowned technology and security expert Ronald J. Deibert exposes the disturbing influence and impact of the internet on politics, the … | Ronald J. Deibert | 339 | 2020 | View |
|
From ![]() Retreat, Reform, RestraintFrom: Reset |
In the final chapter, the author turns to the question “What is to be done?” The negative implications of social media are increasingly acknowledged and well documented. But what to … | Ronald J. Deibert | 68 | 2020 | $6.80 Add |
|
From ![]() Search EnginesFrom: Cyberlibel |
Description of Internet search engines and their potential liability in cyberlibel matters. | David Potts | 18 | 2011 | $1.80 Add |
|
From ![]() Should Internet-specific Principles of Law Be Adopted?From: Cyberlibel |
Discussion of how courts have approached the idea of adopting Internet-specific rules for defamation law, and arguments in favour and against. | David Potts | 17 | 2011 | $1.70 Add |
|
From ![]() Social Networking and Cyber Research Undermining the Jury System |
Analysis of the effect of juror social networking and cyber research on the validity of jury verdicts. | Karen Eltis | 12 | 2016 | $1.20 Add |
|
From ![]() Social Networking and Privacy Rights MobilizationThe Perils of Friendships |
Considers the relationship between social networking and privacy rights mobilization. Through a legal consciousness lens, this chapter provides a background on social networking and discusses … | Lesley A. Jacobs | 20 | 2014 | $2.00 Add |
|
From ![]() Summary of My Personal Observations about CyberlibelFrom: Cyberlibel |
Observations about what is cyberlibel and why it should be examined separately from defamation generally. | David Potts | 5 | 2011 | $0.50 Add |
|
From ![]() Summary of the Law of Defamation and its Application to CyberlibelFrom: Cyberlibel |
Restatement of the Supreme Court of Canada’s summary of the claim and defences of the law of defamation generally, and an outline of which chapters deal with which specific elements of a … | David Potts | 5 | 2011 | $0.50 Add |
|
From ![]() Take Down NoticesFrom: Cyberlibel |
Brief description of UK and South Africa legislation dealing with take down notices as a means of resolving defamation actions. | David Potts | 3 | 2011 | $0.30 Add |
|
From ![]() Technological Protection Measures and Rights Management InformationFrom: Digital Copyright Law |
Discussion of control and management of copyrights through technological protection measures (digital locks) and rights management information (identification of author, owner or terms of use). | Cameron Hutchison | 22 | 2016 | $2.20 Add |
|
From ![]() The Confidentiality of SeclusionStudying Information Flows to Test Intellectual Property Paradigms |
In the information age, law is challenged by the nature of information: expandable, diffusive, and shareable. This chapter illustrates the efficacy of an information science-based analysis, … | Margaret Ann Wilkinson | 23 | 2014 | $2.30 Add |
|
From ![]() The Defence of Qualified PrivilegeFrom: Cyberlibel |
Discussion of the defence of qualified privilege generally and how it applies to cyberlibel. | David Potts | 10 | 2011 | $1.00 Add |
|
From ![]() The Market for Our MindsFrom: Reset |
Chapter 1 explores the economic engine that underlies social media: the personal data surveillance economy. Social media platforms describe themselves in many different, seemingly benign ways: … | Ronald J. Deibert | 40 | 2020 | $4.00 Add |
|
From ![]() The Open Courts Principle, Litigant Privacy, and Electronic Court Records |
Analysis of the effect on privacy from increased access to digital information. | Karen Eltis | 27 | 2016 | $2.70 Add |
|
From ![]() The Regulatory Landscape for Privacy Protection in Canada’s Private Sector |
Examines the regulatory landscape for privacy protection in Canada’s private sector, focusing on the dual purpose of privacy protection in the private sector, the PIPEDA model and the … | Lesley A. Jacobs | 26 | 2014 | $2.60 Add |
|
From ![]() TortFrom: Conflict of Laws 2/e |
Examination of the choice of law rules for tort actions. | Nicholas S. Rafferty; Stephen G.A. Pitel | 24 | 2016 | $2.40 Add |










