Results for 'Helen Nissenbaum'

(not author) ( search as author name )
1000+ found
Order:
  1. Accountability in a computerized society.Helen Nissenbaum - 1996 - Science and Engineering Ethics 2 (1):25-42.
    This essay warns of eroding accountability in computerized societies. It argues that assumptions about computing and features of situations in which computers are produced create barriers to accountability. Drawing on philosophical analyses of moral blame and responsibility, four barriers are identified: 1) the problem of many hands, 2) the problem of bugs, 3) blaming the computer, and 4) software ownership without liability. The paper concludes with ideas on how to reverse this trend.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   48 citations  
  2.  41
    Protecting Privacy in an Information Age: The Problem of Privacy in Public.Helen Nissenbaum - 1998 - Law and Philosophy 17 (5-6):559-596.
    Direct download  
     
    Export citation  
     
    Bookmark   39 citations  
  3. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Direct download  
     
    Export citation  
     
    Bookmark   32 citations  
  4.  86
    Respecting Context to Protect Privacy: Why Meaning Matters.Helen Nissenbaum - 2018 - Science and Engineering Ethics 24 (3):831-852.
    In February 2012, the Obama White House endorsed a Privacy Bill of Rights, comprising seven principles. The third, “Respect for Context,” is explained as the expectation that “companies will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data.” One can anticipate the contested interpretations of this principle as parties representing diverse interests vie to make theirs the authoritative one. In the paper I will discuss three possibilities and explain why (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  5. Toward an approach to privacy in public: Challenges of information technology.Helen Nissenbaum - 1997 - Ethics and Behavior 7 (3):207 – 219.
    This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Although these approaches emphasize the connection between privacy and a protected personal (or intimate) sphere, many individuals perceive a threat to privacy in the widespread collection of information even in realms normally considered "public". In identifying and describing the problem of privacy in public, this article is preliminary work in a larger effort to map out future theoretical directions.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   28 citations  
  6.  79
    Contextual Integrity Up and Down the Data Food Chain.Helen Nissenbaum - 2019 - Theoretical Inquiries in Law 20 (1):221-256.
    According to the theory of contextual integrity (CI), privacy norms prescribe information flows with reference to five parameters — sender, recipient, subject, information type, and transmission principle. Because privacy is grasped contextually (e.g., health, education, civic life, etc.), the values of these parameters range over contextually meaningful ontologies — of information types (or topics) and actors (subjects, senders, and recipients), in contextually defined capacities. As an alternative to predominant approaches to privacy, which were ineffective against novel information practices enabled by (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  7. Technology, autonomy, and manipulation.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Internet Policy Review 8 (2).
    Since 2016, when the Facebook/Cambridge Analytica scandal began to emerge, public concern has grown around the threat of “online manipulation”. While these worries are familiar to privacy researchers, this paper aims to make them more salient to policymakers — first, by defining “online manipulation”, thus enabling identification of manipulative practices; and second, by drawing attention to the specific harms online manipulation threatens. We argue that online manipulation is the use of information technology to covertly influence another person’s decision-making, by targeting (...)
    Direct download  
     
    Export citation  
     
    Bookmark   32 citations  
  8.  83
    Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  9.  53
    Commons-based Peer production and virtue.Yochai Benkler & Helen Nissenbaum - 2006 - Journal of Political Philosophy 14 (4):394–419.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  10.  10
    The cutting edge.Helen Nissenbaum - 1998 - Acm Sigcas Computers and Society 28 (1):38-39.
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  11.  76
    Embodying values in technology: Theory and practice.Mary Flanagan, Daniel Howe & Helen Nissenbaum - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. pp. 322--353.
    Direct download  
     
    Export citation  
     
    Bookmark   31 citations  
  12. Protecting privacy in an information age: The problem of privacy in public. [REVIEW]Helen Nissenbaum - 1998 - Law and Philosophy 17 (s 5-6):559-596.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   49 citations  
  13. Can Trust be Secured Online? A theoretical perspective.Helen Nissenbaum - 1999 - Etica E Politica 1 (2).
  14.  12
    Editorial.Helen Nissenbaum - 1999 - Ethics and Information Technology 1 (3):171-172.
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  13
    Editorial.Helen Nissenbaum - 2001 - Ethics and Information Technology 2 (4):171-172.
    Direct download  
     
    Export citation  
     
    Bookmark  
  16. The Puzzle of Priority: Devising New Norms and Conventions in Research for the Context of Electronic Publication.Helen Nissenbaum - 1999 - Australian Journal of Professional and Applied Ethics 1 (1).
     
    Export citation  
     
    Bookmark  
  17.  34
    Political and ethical perspectives on data obfuscation.Finn Brunton & Helen Nissenbaum - 2013 - In Mireille Hildebrandt & Katja de Vries (eds.), Privacy, due process and the computational turn. Abingdon, Oxon, [England] ; New York: Routledge. pp. 171.
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  18.  8
    The Internet in Public Life.William A. Galston, Thomas C. Hilde, Lucas D. Introna, Peter Levine, Eric M. Uslaner, Helen Nissenbaum & Robert Wachbroit - 2004 - Rowman & Littlefield Publishers.
    The spread of new information and communications technologies during the past two decades has helped reshape civic associations, political communities, and global relations. In the midst of the information revolution, we find that the speed of this technology-driven change has outpaced our understanding of its social and ethical effects. The moral dimensions of this new technology and its effects on social bonds need to be questioned and scrutinized: Should the Internet be understood as a new form of public space and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  87
    Helen Nissenbaum, Privacy in Context: Technology, Policy, and the Integrity of Social Life: Stanford Law Books, 2010, xiv + 288 pages, ISBN 978-0-8047-5237-4. $24.95. [REVIEW]Tony Doyle - 2011 - Journal of Value Inquiry 45 (1):97-102.
  20.  36
    Deborah G. Johnson and Helen Nissenbaum, eds., Computers, ethics and social values, upper saddle river, NJ: Prentice hall, 1995, VI + 714 pp., $44.00 (paper), ISBN 0-13-103110-. [REVIEW]Rob Kling - 1999 - Minds and Machines 9 (1):127-130.
  21. Helen Fay Nissenbaum, Emotion and Focus Reviewed by.Stephen R. Leighton - 1987 - Philosophy in Review 7 (8):315-317.
     
    Export citation  
     
    Bookmark  
  22. Helen Fay Nissenbaum, Emotion and Focus. [REVIEW]Stephen Leighton - 1987 - Philosophy in Review 7:315-317.
     
    Export citation  
     
    Bookmark  
  23.  44
    Privacy in the cloud: applying Nissenbaum's theory of contextual integrity.F. S. Grodzinsky & H. T. Tavani - 2011 - Acm Sigcas Computers and Society 41 (1):38-47.
    The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy, to see how it enables the contextual-integrity framework to respond to privacy challenges posed by (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  24. The Dignity of Human Life: Sketching Out an 'Equal Worth' Approach.Helen Watt - 2020 - Ethics and Medicine 36 (1):7-17.
    The term “value of life” can refer to life’s intrinsic dignity: something nonincremental and time-unaffected in contrast to the fluctuating, incremental “value” of our lives, as they are longer or shorter and more or less flourishing. Human beings are equal in their basic moral importance: the moral indignities we condemn in the treatment of e.g. those with dementia reflect the ongoing human dignity that is being violated. Indignities licensed by the person in advance remain indignities, as when people might volunteer (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  16
    Mix & stir: new outlooks on contemporary art from global perspectives.Helen Westgeest, Kitty Zijlmans & Thomas J. Berghuis (eds.) - 2021 - Amsterdam: Valiz.
    Mix & Stir', this book's aim is an endeavour to understand art as being a panhuman phenomenon of all times and cultures; to steer away from the persistent Eurocentric/Western-centric viewpoint towards a transcultural and transnational interconnected model of exchange and processes of interculturalization. Mix & Stir wants to expand this landscape by bringing to the fore new, recalcitrant, queer, idiosyncratic practices and discourses, theories and topics, methods and concerns that open up ways to approach art from a global perspective. Analogous (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  26. Ethics, Technology and Medicine.Helen Zealley - 1989 - Journal of Medical Ethics 15 (4):220-221.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  27. A Metaphysics for Freedom.Helen Steward - 2012 - Oxford, GB: Oxford University Press.
    Helen Steward argues that determinism is incompatible with agency itself--not only the special human variety of agency, but also powers which can be accorded to animal agents. She offers a distinctive, non-dualistic version of libertarianism, rooted in a conception of what biological forms of organisation might make possible in the way of freedom.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   172 citations  
  28. Embodying Values in Design: Theory and Practice.M. Flanagan, D. Howe & H. Nissenbaum - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. pp. 322--353.
    No categories
     
    Export citation  
     
    Bookmark   19 citations  
  29.  11
    The sexual metaphor.Helen Weinreich-Haste - 1994 - Cambridge: Harvard University Press.
    Explores the avant-garde history of twentieth-century Europe through the lifestyle and music of the Sex Pistols.
    Direct download  
     
    Export citation  
     
    Bookmark  
  30. The Ontology of Mind: Events, Processes, and States.Helen Steward - 1997 - Oxford, GB: Oxford University Press.
    Helen Steward puts forward a radical critique of the foundations of contemporary philosophy of mind, arguing that it relies too heavily on insecure assumptions about the sorts of things there are in the mind--events, processes, and states. She offers a fresh investigation of these three categories, clarifying the distinctions between them, and argues that the category of state has been very widely and seriously misunderstood.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   113 citations  
  31.  95
    A modal ambiguity in for-infinitival relative clauses.Martin Hackl & Jon Nissenbaum - 2012 - Natural Language Semantics 20 (1):59-81.
    This squib presents two puzzles related to an ambiguity found in for-infinitival relative clauses (FIRs). FIRs invariably receive a modal interpretation even in the absence of any overt modal verb. The modal interpretation seems to come in two distinct types, which can be paraphrased by finite relative clauses employing the modal auxiliaries should and could. The two puzzles presented here arise because the availability of the two readings is constrained by factors that are not otherwise known to affect the interpretation (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  32. Defensive Killing.Helen Frowe - 2014 - Oxford, UK: Oxford University Press.
    Most people believe that it is sometimes morally permissible for a person to use force to defend herself or others against harm. In Defensive Killing, Helen Frowe offers a detailed exploration of when and why the use of such force is permissible. She begins by considering the use of force between individuals, investigating both the circumstances under which an attacker forfeits her right not to be harmed, and the distinct question of when it is all-things-considered permissible to use force (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   60 citations  
  33.  22
    Competence and processing in children's grammar of relative clauses.Helen Goodluck & Susan Tavakolian - 1982 - Cognition 11 (1):1-27.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   68 citations  
  34.  38
    A modal ambiguity in for-infinitival relative clauses.Martin Hackl & Jon Nissenbaum - 2012 - Natural Language Semantics 20 (1):59-81.
    This squib presents two puzzles related to an ambiguity found in for-infinitival relative clauses (FIRs). FIRs invariably receive a modal interpretation even in the absence of any overt modal verb. The modal interpretation seems to come in two distinct types, which can be paraphrased by finite relative clauses employing the modal auxiliaries should and could. The two puzzles presented here arise because the availability of the two readings is constrained by factors that are not otherwise known to affect the interpretation (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Processes, Continuants, and Individuals.Helen Steward - 2013 - Mind 122 (487):fzt080.
    The paper considers and opposes the view that processes are best thought of as continuants, to be differentiated from events mainly by way of the fact that the latter, but not the former, are entities with temporal parts. The motivation for the investigation, though, is not so much the defeat of what is, in any case, a rather implausible claim, as the vindication of some of the ideas and intuitions that the claim is made in order to defend — and (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   64 citations  
  36. Agency as a Two-Way Power: A Defence.Helen Steward - 2020 - The Monist 103 (3):342-355.
    This paper presents a dilemma which it has been alleged by Kim Frost must be faced by any defender of the notion of a two-way power and offers a solution to the dilemma which is distinct from Frost’s own. The dilemma is as follows: assuming that powers are to be individuated by what they are powers to do or undergo, then either there is a unified description of the manifestation-type which individuates the power, or there is not. If there is, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  37. Christmas - Philosophy for Everyone: Better Than a Lump of Coal.Stephen Nissenbaum - 2010 - Wiley-Blackwell.
     
    Export citation  
     
    Bookmark  
  38.  8
    I Was in the Umschlagplatz.Zygmunt Nissenbaum - 1989 - Dialectics and Humanism 16 (1):129-134.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  61
    Parasitic degree phrases.Jon Nissenbaum & Bernhard Schwarz - 2011 - Natural Language Semantics 19 (1):1-38.
    This paper investigates gaps in degree phrases with too, as in John is too rich [for the monastery to hire ___ ]. We present two curious restrictions on such gapped degree phrases. First, the gaps must ordinarily be anteceded by the subject of the associated gradable adjective. Second, when embedded under intensional verbs, gapped degree phrases are ordinarily restricted to surface scope, unlike their counterparts without gaps. Just as puzzlingly, we show that these restrictions are lifted when there is overt (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  40. Rob Kling (ed.) Computerization and Controversy: Value Conflicts and Social Choices.H. Nissenbaum - 1997 - Minds and Machines 7:152-155.
  41. Sefer Mosdot ha-emunah: yevarer mosde ha-emunah be-higayon yashar..Mordecai Nissenbaum - 1923 - [Brooklyn, N.Y.?: Ḥ. Mo. L..
     
    Export citation  
     
    Bookmark  
  42.  18
    The Silenced and Unsought Beneficiary: Investigating Epistemic Injustice in the Fiduciary.Helen Mussell - forthcoming - Business Ethics Quarterly:1-23.
    This article uses philosopher Miranda Fricker’s work on epistemic injustice to shed light on the legal concept of the fiduciary, alongside demonstrating the wider contribution Fricker’s work can make to business ethics. Fiduciary, from the Latin fīdūcia, meaning “trust,” plays a fundamental role in all financial and business organisations: it acts as a moral safeguard of the relationship between trustee and beneficiary. The article focuses on the ethics of the fiduciary, but from a unique historical perspective, referring back to the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  43. Actions as processes.Helen Steward - 2012 - Philosophical Perspectives 26 (1):373-388.
    The paper argues that actions should be thought of as processes and not events. A number of reasons are offered for thinking that the things that it is most plausible to suppose we are trying to cotton on to with the generic talk of ‘actions’ in which philosophy indulges cannot be events. A framework for thinking about the event-process distinction which can help us understand how we ought to think about the ontology of processes we need instead is then developed, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   36 citations  
  44. Adolescents’ Motivational Profiles in Mathematics and Science: Associations With Achievement Striving, Career Aspirations and Psychological Wellbeing.Helen M. G. Watt, Micaela Bucich & Liam Dacosta - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  45. Social and Medical Gender Transition and Acceptance of Biological Sex.Helen Watt - 2020 - Christian Bioethics 26 (3):243–268.
    Biological sex should be “acknowledged” and “accepted”—but which responses to gender dysphoria might this preclude? Trans-identified people may factually acknowledge their biological sex and regard transition as purely palliative. While generally some level of self-deception and even a high level of nonlying deception of others are sometimes justified, biological sex is important, and there is a nontrivial onus against even palliative, nonsexually motivated cross-dressing. The onus is higher against co-opting the body, even in a minor and/or reversible way, to make (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  46.  62
    Science and an African Logic.Helen Verran - 2001 - Chicago, IL, USA: University of Chicago Press.
    In this captivating book, Helen Verran addresses precisely that question by looking at how science, mathematics, and logic come to life in Yoruba primary schools.
  47.  6
    Reflections on whiteness: Racialised identities in nursing.Helen T. Allan - 2022 - Nursing Inquiry 29 (1).
    In this article, I discuss the structural domination of whiteness as it intersects with the potential of individual critique and reflexivity. I reflect on my positioning as a white nurse researcher while researching international nurse migration. I draw on two large qualitative studies and one small focus group study to discuss my reactions as a white researcher to evidence of institutional racism in the British health services and my growing awareness of how racism is reproduced in the British nursing profession.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  48.  35
    The Habits of Racism: A Phenomenology of Racism and Racialized Embodiment.Helen Ngo - 2017 - Lexington Books.
    The Habits of Racism examines some of the complex questions raised by the phenomenon and experience of racism. Helen Ngo argues that the conceptual reworking of habit as bodily orientation helps to identify the more subtle but fundamental workings of racism, exploring what the lived experience of racism and racialization teaches about the nature of the embodied and socially-situated being.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   14 citations  
  49.  22
    Imitation Is Necessary for Cumulative Cultural Evolution in an Unfamiliar, Opaque Task.Helen Wasielewski - 2014 - Human Nature 25 (1):161-179.
    Imitation, the replication of observed behaviors, has been proposed as the crucial social learning mechanism for the generation of humanlike cultural complexity. To date, the single published experimental microsociety study that tested this hypothesis found no advantage for imitation. In contrast, the current paper reports data in support of the imitation hypothesis. Participants in “microsociety” groups built weight-bearing devices from reed and clay. Each group was assigned to one of four conditions: three social learning conditions and one asocial learning control (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  50. Quantities.Helen Morris Cartwright - 1970 - Philosophical Review 79 (1):25-42.
1 — 50 / 1000