default search action
Helen Nissenbaum
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Helen Nissenbaum:
AI Safety: A Poisoned Chalice? IEEE Secur. Priv. 22(2): 94-96 (2024) - 2023
- [c31]Benjamin Laufer, Jon M. Kleinberg, Karen Levy, Helen Nissenbaum:
Strategic Evaluation. EAAMO 2023: 17:1-17:12 - [c30]Benjamin Laufer, Thomas Krendl Gilbert, Helen Nissenbaum:
Optimization's Neglected Normative Commitments. FAccT 2023: 50-63 - [i13]Benjamin Laufer, Thomas Krendl Gilbert, Helen Nissenbaum:
Optimization's Neglected Normative Commitments. CoRR abs/2305.17465 (2023) - [i12]Benjamin Laufer, Jon M. Kleinberg, Karen Levy, Helen Nissenbaum:
Strategic Evaluation: Subjects, Evaluators, and Society. CoRR abs/2310.03655 (2023) - 2022
- [c29]Ero Balsa, Helen Nissenbaum, Sunoo Park:
Cryptography, Trust and Privacy: It's Complicated. CSLAW 2022: 167-179 - [c28]A. Feder Cooper, Emanuel Moss, Benjamin Laufer, Helen Nissenbaum:
Accountability in an Algorithmic Society: Relationality, Responsibility, and Robustness in Machine Learning. FAccT 2022: 864-876 - [c27]Shikun Zhang, Yan Shvartzshnaider, Yuanyuan Feng, Helen Nissenbaum, Norman Sadeh:
Stop the Spread: A Contextual Integrity Perspective on the Appropriateness of COVID-19 Vaccination Certificates. FAccT 2022: 1657-1670 - [i11]A. Feder Cooper, Benjamin Laufer, Emanuel Moss, Helen Nissenbaum:
Accountability in an Algorithmic Society: Relationality, Responsibility, and Robustness in Machine Learning. CoRR abs/2202.05338 (2022) - [i10]Shikun Zhang, Yan Shvartzshnaider, Yuanyuan Feng, Helen Nissenbaum, Norman M. Sadeh:
Stop the Spread: A Contextual Integrity Perspective on the Appropriateness of COVID-19 Vaccination Certificates. CoRR abs/2205.09036 (2022) - 2021
- [c26]Margot J. Hanley, Solon Barocas, Karen Levy, Shiri Azenkot, Helen Nissenbaum:
Computer Vision and Conflicting Values: Describing People with Automated Alt Text. AIES 2021: 543-554 - [c25]Judith Masthoff, Eelco Herder, Helen Nissenbaum, Maarten de Rijke, Julita Vassileva:
ACM UMAP 2021 Keynote Addresses. UMAP 2021: 1-2 - [i9]Margot J. Hanley, Solon Barocas, Karen Levy, Shiri Azenkot, Helen Nissenbaum:
Computer Vision and Conflicting Values: Describing People with Automated Alt Text. CoRR abs/2105.12754 (2021) - 2020
- [j15]Madelyn R. Sanfilippo, Yan Shvartzshnaider, Irwin Reyes, Helen Nissenbaum, Serge Egelman:
Disaster privacy/privacy disaster. J. Assoc. Inf. Sci. Technol. 71(9): 1002-1014 (2020) - [i8]Margot J. Hanley, Apoorv Khandelwal, Hadar Averbuch-Elor, Noah Snavely, Helen Nissenbaum:
An Ethical Highlighter for People-Centric Dataset Creation. CoRR abs/2011.13583 (2020) - [i7]Suresh Venkatasubramanian, Nadya Bliss, Helen Nissenbaum, Melanie Moses:
Interdisciplinary Approaches to Understanding Artificial Intelligence's Impact on Society. CoRR abs/2012.06057 (2020)
2010 – 2019
- 2019
- [j14]Daniel Susser, Beate Roessler, Helen Nissenbaum:
Technology, autonomy, and manipulation. Internet Policy Rev. 8(2) (2019) - [c24]Yan Shvartzshnaider, Noah J. Apthorpe, Nick Feamster, Helen Nissenbaum:
Going against the (Appropriate) Flow: A Contextual Integrity Approach to Privacy Policy Analysis. HCOMP 2019: 162-170 - [c23]Yan Shvartzshnaider, Zvonimir Pavlinovic, Ananth Balashankar, Thomas Wies, Lakshminarayanan Subramanian, Helen Nissenbaum, Prateek Mittal:
VACCINE: Using Contextual Integrity For Data Leakage Detection. WWW 2019: 1702-1712 - 2018
- [j13]Helen Nissenbaum:
Respecting Context to Protect Privacy: Why Meaning Matters. Sci. Eng. Ethics 24(3): 831-852 (2018) - [c22]Helen Nissenbaum:
Achieving Meaningful Privacy in Digital Systems. CCS 2018: 1-2 - [i6]Yan Shvartzshnaider, Noah J. Apthorpe, Nick Feamster, Helen Nissenbaum:
Analyzing Privacy Policies Using Contextual Integrity Annotations. CoRR abs/1809.02236 (2018) - 2017
- [j12]Sebastian Benthall, Seda F. Gürses, Helen Nissenbaum:
Contextual Integrity through the Lens of Computer Science. Found. Trends Priv. Secur. 2(1): 1-69 (2017) - [c21]Daniel C. Howe, Helen Nissenbaum:
Engineering Privacy and Protest: A Case Study of AdNauseam. IWPE@SP 2017: 57-64 - [i5]Yan Shvartzshnaider, Zvonimir Pavlinovic, Thomas Wies, Lakshminarayanan Subramanian, Prateek Mittal, Helen Nissenbaum:
The VACCINE Framework for Building DLP Systems. CoRR abs/1711.02742 (2017) - 2016
- [c20]Yan Shvartzshnaider, Schrasing Tong, Thomas Wies, Paula Kift, Helen Nissenbaum, Lakshminarayanan Subramanian, Prateek Mittal:
Learning Privacy Expectations by Crowdsourcing Contextual Informational Norms. HCOMP 2016: 209-218 - [i4]Yan Shvartzshnaider, Schrasing Tong, Thomas Wies, Paula Kift, Helen Nissenbaum, Lakshminarayanan Subramanian, Prateek Mittal:
Crowdsourcing Verifiable Contextual Integrity Norms. CoRR abs/1601.04740 (2016) - 2014
- [j11]Solon Barocas, Helen Nissenbaum:
Big data's end run around procedural privacy protections. Commun. ACM 57(11): 31-33 (2014) - 2012
- [c19]Joseph Lorenzo Hall, Benedicte Callan, Helen Nissenbaum:
Accountings of Relationships. HealthSec 2012 - [i3]Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh:
A Critical Look at Decentralized Personal Data Architectures. CoRR abs/1202.4503 (2012) - 2011
- [j10]Finn Brunton, Helen Nissenbaum:
Vernacular resistance to data collection and analysis: A political theory of obfuscation. First Monday 16(5) (2011) - [j9]Vincent Toubiana, Helen Nissenbaum:
An Analysis of Google Logs Retention Policies. J. Priv. Confidentiality 3(1) (2011) - [c18]Jonathan Belman, Helen Nissenbaum, Mary Flanagan:
Grow-A-Game: A Tool for Values Conscious Design and Analysis of Digital Games. DiGRA Conference 2011 - [c17]Christian Detweiler, Alina Pommeranz, Jeroen van den Hoven, Helen Nissenbaum:
Values in Design - Building Bridges between RE, HCI and Ethics. INTERACT (4) 2011: 746-747 - [i2]Vincent Toubiana, Lakshminarayanan Subramanian, Helen Nissenbaum:
TrackMeNot: Enhancing the privacy of Web Search. CoRR abs/1109.4677 (2011) - 2010
- [b1]Helen Nissenbaum:
Privacy in Context - Technology, Policy, and the Integrity of Social Life. Stanford University Press 2010, ISBN 978-0-8047-5237-4, pp. I-XIV, 1-288 - [c16]Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas:
Adnostic: Privacy Preserving Targeted Advertising. NDSS 2010 - [c15]Anupam Datta, Nipun Dave, John C. Mitchell, Helen Nissenbaum, Divya Sharma:
Privacy Challenges in Patient-centric Health Information Systems. HealthSec 2010
2000 – 2009
- 2007
- [c14]Mary Flanagan, Helen Nissenbaum:
A game design methodology to incorporate social activist themes. CHI 2007: 181-190 - [c13]Mary Flanagan, Jonathan Belman, Helen Nissenbaum, Jim Diamond:
A Method For Discovering Values in Digital Games. DiGRA Conference 2007 - 2006
- [c12]Joanne Silverstein, Helen Nissenbaum, Mary Flanagan, Nathan G. Freier:
Ethics and children's information systems. ASIST 2006: 1-7 - [c11]Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum:
Privacy and Contextual Integrity: Framework and Applications. S&P 2006: 184-198 - 2005
- [c10]Mary Flanagan, Daniel C. Howe, Helen Nissenbaum:
Values at play: design tradeoffs in socially-oriented game design. CHI 2005: 751-760 - [c9]Mary Flanagan, Helen Nissenbaum, Daniel C. Howe:
New Design Methods for Activist Gaming. DiGRA Conference 2005 - 2004
- [j8]Helen Nissenbaum:
Hackers and the contested ontology of cyberspace. New Media Soc. 6(2): 195-217 (2004) - 2002
- [c8]Batya Friedman, W. David Hurley, Daniel C. Howe, Helen Nissenbaum, Edward W. Felten:
Users' conceptions of risks and harms on the web: a comparative study. CHI Extended Abstracts 2002: 614-615 - [c7]Batya Friedman, W. David Hurley, Daniel C. Howe, Edward W. Felten, Helen Nissenbaum:
Users' conceptions of web security: a comparative study. CHI Extended Abstracts 2002: 746-747 - 2001
- [j7]Helen Nissenbaum:
How Computer Systems Embody Values. Computer 34(3): 118-120 (2001) - [c6]L. Jean Camp, Helen Nissenbaum, Cathleen McGrath:
Trust: A Collision of Paradigms. Financial Cryptography 2001: 82-96 - [i1]Helen Nissenbaum, Batya Friedman, Edward W. Felten:
Computer Security: Competing Concepts. CoRR cs.CY/0110001 (2001) - 2000
- [j6]Lucas D. Introna, Helen Nissenbaum:
Defining the Web: The Politics of Search Engines. Computer 33(1): 54-62 (2000) - [j5]Lucas D. Introna, Helen Nissenbaum:
Shaping the Web: Why the Politics of Search Engines Matters. Inf. Soc. 16(3): 169-185 (2000)
1990 – 1999
- 1999
- [j4]Helen Nissenbaum:
The Meaning of Anonymity in an Information Age. Inf. Soc. 15(2): 141-144 (1999) - [c5]Batya Friedman, John C. Thomas, Jonathan Grudin, Clifford Nass, Helen Nissenbaum, Mark S. Schlager, Ben Shneiderman:
Trust me, I'm accountable: trust and accountability online. CHI Extended Abstracts 1999: 79-80 - 1998
- [j3]Helen Nissenbaum:
The cutting edge. SIGCAS Comput. Soc. 28(1): 38-39 (1998) - 1997
- [c4]Batya Friedman, Helen Nissenbaum:
Software Agents and User Autonomy. Agents 1997: 466-469 - 1996
- [j2]Batya Friedman, Helen Nissenbaum:
Bias in Computer Systems. ACM Trans. Inf. Syst. 14(3): 330-347 (1996) - [c3]Batya Friedman, Helen Nissenbaum:
User autonomy: who should control what and when? CHI Conference Companion 1996: 433 - 1995
- [c2]Batya Friedman, Helen Nissenbaum:
Minimizing bias in computer systems. CHI 95 Conference Companion 1995: 444 - 1994
- [j1]Helen Nissenbaum:
Computing and Accountability. Commun. ACM 37(1): 72-80 (1994) - 1993
- [c1]Batya Friedman, Helen Nissenbaum:
Discerning bias in computer systems. INTERCHI Adjunct Proceedings 1993: 141-142
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint