|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
JSTOR_on1375201752 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
220405t20232023enk o 000 0 eng d |
040 |
|
|
|a P@U
|b eng
|e rda
|c P@U
|d EBLCP
|d JSTOR
|d UKAHL
|d YDX
|d DEGRU
|d N$T
|d OCLCQ
|d STBDS
|d OCLCO
|
020 |
|
|
|a 1529214033
|q electronic book
|
020 |
|
|
|a 9781529214031
|q (electronic bk.)
|
020 |
|
|
|z 9781529214017
|
029 |
1 |
|
|a AU@
|b 000073875392
|
035 |
|
|
|a (OCoLC)1375201752
|
037 |
|
|
|a 22573/cats1646882
|b JSTOR
|
050 |
|
4 |
|a K5293
|b .K47 2023
|
050 |
|
4 |
|a HV6575
|
082 |
0 |
4 |
|a 345.0274
|2 23/eng/20230418
|
082 |
0 |
4 |
|a 362.8839
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Keren-Paz, Tsachi.
|
245 |
1 |
0 |
|a Egalitarian Digital Privacy :
|b Image-based Abuse and Beyond /
|c Tsachi Keren-Paz.
|
264 |
|
1 |
|a Bristol :
|b Bristol University Press,
|c 2023.
|
264 |
|
3 |
|a Baltimore, Md. :
|b Project MUSE,
|c 0000
|
264 |
|
4 |
|c 2023
|
300 |
|
|
|a 1 online resource (272 pages).
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Law, society, policy series
|
505 |
0 |
|
|a Front Cover -- Egalitarian Digital Privacy: Image-based Abuse and Beyond -- Copyright information -- Dedication -- Table of Contents -- Acknowledgements -- Series Editor's Preface -- 1 Introduction -- 1. Definition and terminology -- 2. Theoretical framework and readership -- 3. The main contributions in terms of policy -- 4. The main theoretical/conceptual contributions -- 5. The main doctrinal contributions -- 6. Organization -- 2 Setting the Ground: The Intermediary Liability Debate and Framing Issues -- 1. Introduction -- 2. A primer of intermediary liability
|
505 |
8 |
|
|a 3. Control and fairness in courts' decisions on intermediary liability -- A. Control -- B. Fairness -- 4. Situating the argument -- 3 First Principles and Occupiers' Liability: The Case against Immunity -- 1. Introduction -- 2. Control and knowledge of offline intermediaries: rejecting post notice immunity -- A. Offline defamation -- B. Occupiers liability and nuisance -- 3. Burden, control and fairness -- A. Burden -- B. Fairness: business model and complicity -- 4. Right to an effective remedy -- 5. Pre-notice liability -- A. Active contribution to claimant's injury
|
505 |
8 |
|
|a B. Control beyond knowledge -- 4 Property and Privacy: The Case for Strict Liability -- 1. Introduction -- 2. Conflicts over title: nemo dat versus market overt -- 3. Similarities and differences: the intermediaries and the thing sold -- 4. The viewer's inferior claim ought to deny immunity to the intermediary -- A. Immunity as expropriation -- B. Asymmetrical harm -- C. Risk taking and victim blaming -- 1. NCII victim blaming -- 2. Rejecting entrustment -- D. An effective alternative remedy -- E. Regressive redistribution -- 5. Policies in favour of merchant/intermediary liability
|
505 |
8 |
|
|a A. Efficiency -- B. Fairness -- C. Loss spreading -- 6. Doctrinal translation -- 5 Property and Privacy: Objections and Possible Extensions -- 1. Introduction -- 2. Privacy, property and inalienability -- A. The Inalienability paradox -- B. Why property? -- C. We need to talk about (the harshness of) conversion -- D. Consistency and transitivity -- 3. Competing quasi/proprietary interests -- 4. Possible extensions beyond NCII? -- A. Private (sexual) information beyond images -- B. Defamation and copyright -- 5. Conclusion -- 6 The Policy Debate: Uniqueness of Harm from NCII -- 1. Introduction
|
505 |
8 |
|
|a 2. Harm from NCII -- A. Severe, multifaceted, and irreparable -- B. Gendered, systemic, a form of sexual abuse -- 1. Gendered -- 2. Systemic -- 3. Form of sexual abuse -- 3. NCII exceptionalism: the normative significance of irreparable gendered harm -- A. Deprioritizing copyright -- B. Privacy > Defamation -- C. Just regulation -- D. Theory of rights -- 1. Primary and secondary duties -- 2. Interim injunctions -- 3. Anticipatory injunctions -- E. Gendered harm and broader egalitarian considerations -- F. Policy implications
|
520 |
|
|
|a This book considers the social, legal and technological features of unauthorised dissemination of intimate images. With a focus on private law theory, the book defines the appropriate scope of liability of platforms and viewers. Through its analysis, it develops a new theory of egalitarian digital privacy.
|
588 |
|
|
|a Description based on online resource; title from digital title page (viewed on April 18, 2023).
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Internet pornography
|x Law and legislation.
|
650 |
|
0 |
|a Image-based sexual abuse.
|
650 |
|
6 |
|a Pornodivulgation.
|
650 |
|
7 |
|a LAW / Privacy.
|2 bisacsh
|
650 |
|
7 |
|a Internet pornography
|x Law and legislation
|2 fast
|
650 |
|
7 |
|a Image-based sexual abuse
|2 fast
|
650 |
|
7 |
|a Social services & welfare, criminology.
|2 thema
|
650 |
|
7 |
|a True Crime.
|2 ukslc
|
710 |
2 |
|
|a Project Muse.
|e distributor.
|
830 |
|
0 |
|a Law, society, policy series.
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/jj.1666826
|z Texto completo
|
938 |
|
|
|a Oxford University Press USA
|b OUPR
|n 9781529214048
|
938 |
|
|
|a De Gruyter
|b DEGR
|n 9781529214031
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH39634330
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL30461821
|
938 |
|
|
|a Project MUSE
|b MUSE
|n musev2_111362
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3586829
|
994 |
|
|
|a 92
|b IZTAP
|