Cargando…

Egalitarian Digital Privacy : Image-based Abuse and Beyond /

This book considers the social, legal and technological features of unauthorised dissemination of intimate images. With a focus on private law theory, the book defines the appropriate scope of liability of platforms and viewers. Through its analysis, it develops a new theory of egalitarian digital p...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Keren-Paz, Tsachi
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Bristol : Bristol University Press, 2023.
Colección:Law, society, policy series.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a22000007i 4500
001 JSTOR_on1375201752
003 OCoLC
005 20231005004200.0
006 m o d
007 cr cnu---unuuu
008 220405t20232023enk o 000 0 eng d
040 |a P@U  |b eng  |e rda  |c P@U  |d EBLCP  |d JSTOR  |d UKAHL  |d YDX  |d DEGRU  |d N$T  |d OCLCQ  |d STBDS  |d OCLCO 
020 |a 1529214033  |q electronic book 
020 |a 9781529214031  |q (electronic bk.) 
020 |z 9781529214017 
029 1 |a AU@  |b 000073875392 
035 |a (OCoLC)1375201752 
037 |a 22573/cats1646882  |b JSTOR 
050 4 |a K5293  |b .K47 2023 
050 4 |a HV6575 
082 0 4 |a 345.0274  |2 23/eng/20230418 
082 0 4 |a 362.8839 
049 |a UAMI 
100 1 |a Keren-Paz, Tsachi. 
245 1 0 |a Egalitarian Digital Privacy :  |b Image-based Abuse and Beyond /  |c Tsachi Keren-Paz. 
264 1 |a Bristol :  |b Bristol University Press,  |c 2023. 
264 3 |a Baltimore, Md. :  |b Project MUSE,  |c 0000 
264 4 |c 2023 
300 |a 1 online resource (272 pages). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Law, society, policy series 
505 0 |a Front Cover -- Egalitarian Digital Privacy: Image-based Abuse and Beyond -- Copyright information -- Dedication -- Table of Contents -- Acknowledgements -- Series Editor's Preface -- 1 Introduction -- 1. Definition and terminology -- 2. Theoretical framework and readership -- 3. The main contributions in terms of policy -- 4. The main theoretical/conceptual contributions -- 5. The main doctrinal contributions -- 6. Organization -- 2 Setting the Ground: The Intermediary Liability Debate and Framing Issues -- 1. Introduction -- 2. A primer of intermediary liability 
505 8 |a 3. Control and fairness in courts' decisions on intermediary liability -- A. Control -- B. Fairness -- 4. Situating the argument -- 3 First Principles and Occupiers' Liability: The Case against Immunity -- 1. Introduction -- 2. Control and knowledge of offline intermediaries: rejecting post notice immunity -- A. Offline defamation -- B. Occupiers liability and nuisance -- 3. Burden, control and fairness -- A. Burden -- B. Fairness: business model and complicity -- 4. Right to an effective remedy -- 5. Pre-notice liability -- A. Active contribution to claimant's injury 
505 8 |a B. Control beyond knowledge -- 4 Property and Privacy: The Case for Strict Liability -- 1. Introduction -- 2. Conflicts over title: nemo dat versus market overt -- 3. Similarities and differences: the intermediaries and the thing sold -- 4. The viewer's inferior claim ought to deny immunity to the intermediary -- A. Immunity as expropriation -- B. Asymmetrical harm -- C. Risk taking and victim blaming -- 1. NCII victim blaming -- 2. Rejecting entrustment -- D. An effective alternative remedy -- E. Regressive redistribution -- 5. Policies in favour of merchant/intermediary liability 
505 8 |a A. Efficiency -- B. Fairness -- C. Loss spreading -- 6. Doctrinal translation -- 5 Property and Privacy: Objections and Possible Extensions -- 1. Introduction -- 2. Privacy, property and inalienability -- A. The Inalienability paradox -- B. Why property? -- C. We need to talk about (the harshness of) conversion -- D. Consistency and transitivity -- 3. Competing quasi/proprietary interests -- 4. Possible extensions beyond NCII? -- A. Private (sexual) information beyond images -- B. Defamation and copyright -- 5. Conclusion -- 6 The Policy Debate: Uniqueness of Harm from NCII -- 1. Introduction 
505 8 |a 2. Harm from NCII -- A. Severe, multifaceted, and irreparable -- B. Gendered, systemic, a form of sexual abuse -- 1. Gendered -- 2. Systemic -- 3. Form of sexual abuse -- 3. NCII exceptionalism: the normative significance of irreparable gendered harm -- A. Deprioritizing copyright -- B. Privacy > Defamation -- C. Just regulation -- D. Theory of rights -- 1. Primary and secondary duties -- 2. Interim injunctions -- 3. Anticipatory injunctions -- E. Gendered harm and broader egalitarian considerations -- F. Policy implications 
520 |a This book considers the social, legal and technological features of unauthorised dissemination of intimate images. With a focus on private law theory, the book defines the appropriate scope of liability of platforms and viewers. Through its analysis, it develops a new theory of egalitarian digital privacy. 
588 |a Description based on online resource; title from digital title page (viewed on April 18, 2023). 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
650 0 |a Internet pornography  |x Law and legislation. 
650 0 |a Image-based sexual abuse. 
650 6 |a Pornodivulgation. 
650 7 |a LAW / Privacy.  |2 bisacsh 
650 7 |a Internet pornography  |x Law and legislation  |2 fast 
650 7 |a Image-based sexual abuse  |2 fast 
650 7 |a Social services & welfare, criminology.  |2 thema 
650 7 |a True Crime.  |2 ukslc 
710 2 |a Project Muse.  |e distributor. 
830 0 |a Law, society, policy series. 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/jj.1666826  |z Texto completo 
938 |a Oxford University Press USA  |b OUPR  |n 9781529214048 
938 |a De Gruyter  |b DEGR  |n 9781529214031 
938 |a Askews and Holts Library Services  |b ASKH  |n AH39634330 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30461821 
938 |a Project MUSE  |b MUSE  |n musev2_111362 
938 |a EBSCOhost  |b EBSC  |n 3586829 
994 |a 92  |b IZTAP