Results for 'Helen Nissenbaum'

(not author) ( search as author name )
1000+ found
Order:
  1. Accountability in a computerized society.Helen Nissenbaum - 1996 - Science and Engineering Ethics 2 (1):25-42.
    This essay warns of eroding accountability in computerized societies. It argues that assumptions about computing and features of situations in which computers are produced create barriers to accountability. Drawing on philosophical analyses of moral blame and responsibility, four barriers are identified: 1) the problem of many hands, 2) the problem of bugs, 3) blaming the computer, and 4) software ownership without liability. The paper concludes with ideas on how to reverse this trend.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   48 citations  
  2.  41
    Protecting Privacy in an Information Age: The Problem of Privacy in Public.Helen Nissenbaum - 1998 - Law and Philosophy 17 (5-6):559-596.
    Direct download  
     
    Export citation  
     
    Bookmark   40 citations  
  3.  85
    Respecting Context to Protect Privacy: Why Meaning Matters.Helen Nissenbaum - 2018 - Science and Engineering Ethics 24 (3):831-852.
    In February 2012, the Obama White House endorsed a Privacy Bill of Rights, comprising seven principles. The third, “Respect for Context,” is explained as the expectation that “companies will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data.” One can anticipate the contested interpretations of this principle as parties representing diverse interests vie to make theirs the authoritative one. In the paper I will discuss three possibilities and explain why (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  4. Toward an approach to privacy in public: Challenges of information technology.Helen Nissenbaum - 1997 - Ethics and Behavior 7 (3):207 – 219.
    This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Although these approaches emphasize the connection between privacy and a protected personal (or intimate) sphere, many individuals perceive a threat to privacy in the widespread collection of information even in realms normally considered "public". In identifying and describing the problem of privacy in public, this article is preliminary work in a larger effort to map out future theoretical directions.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  5.  76
    Contextual Integrity Up and Down the Data Food Chain.Helen Nissenbaum - 2019 - Theoretical Inquiries in Law 20 (1):221-256.
    According to the theory of contextual integrity (CI), privacy norms prescribe information flows with reference to five parameters — sender, recipient, subject, information type, and transmission principle. Because privacy is grasped contextually (e.g., health, education, civic life, etc.), the values of these parameters range over contextually meaningful ontologies — of information types (or topics) and actors (subjects, senders, and recipients), in contextually defined capacities. As an alternative to predominant approaches to privacy, which were ineffective against novel information practices enabled by (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  6. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Direct download  
     
    Export citation  
     
    Bookmark   28 citations  
  7. Technology, autonomy, and manipulation.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Internet Policy Review 8 (2).
    Since 2016, when the Facebook/Cambridge Analytica scandal began to emerge, public concern has grown around the threat of “online manipulation”. While these worries are familiar to privacy researchers, this paper aims to make them more salient to policymakers — first, by defining “online manipulation”, thus enabling identification of manipulative practices; and second, by drawing attention to the specific harms online manipulation threatens. We argue that online manipulation is the use of information technology to covertly influence another person’s decision-making, by targeting (...)
    Direct download  
     
    Export citation  
     
    Bookmark   31 citations  
  8.  10
    The cutting edge.Helen Nissenbaum - 1998 - Acm Sigcas Computers and Society 28 (1):38-39.
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  9.  82
    Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  10.  76
    Embodying values in technology: Theory and practice.Mary Flanagan, Daniel Howe & Helen Nissenbaum - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. pp. 322--353.
    Direct download  
     
    Export citation  
     
    Bookmark   31 citations  
  11. Protecting privacy in an information age: The problem of privacy in public. [REVIEW]Helen Nissenbaum - 1998 - Law and Philosophy 17 (s 5-6):559-596.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   47 citations  
  12. Can Trust be Secured Online? A theoretical perspective.Helen Nissenbaum - 1999 - Etica E Politica 1 (2).
  13.  12
    Editorial.Helen Nissenbaum - 1999 - Ethics and Information Technology 1 (3):171-172.
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  13
    Editorial.Helen Nissenbaum - 2001 - Ethics and Information Technology 2 (4):171-172.
    Direct download  
     
    Export citation  
     
    Bookmark  
  15. The Puzzle of Priority: Devising New Norms and Conventions in Research for the Context of Electronic Publication.Helen Nissenbaum - 1999 - Australian Journal of Professional and Applied Ethics 1 (1).
     
    Export citation  
     
    Bookmark  
  16.  53
    Commons-based Peer production and virtue.Yochai Benkler & Helen Nissenbaum - 2006 - Journal of Political Philosophy 14 (4):394–419.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  17.  33
    Political and ethical perspectives on data obfuscation.Finn Brunton & Helen Nissenbaum - 2013 - In Mireille Hildebrandt & Katja de Vries (eds.), Privacy, due process and the computational turn. Abingdon, Oxon, [England] ; New York: Routledge. pp. 171.
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  18.  6
    The Internet in Public Life.William A. Galston, Thomas C. Hilde, Lucas D. Introna, Peter Levine, Eric M. Uslaner, Helen Nissenbaum & Robert Wachbroit - 2004 - Rowman & Littlefield Publishers.
    The spread of new information and communications technologies during the past two decades has helped reshape civic associations, political communities, and global relations. In the midst of the information revolution, we find that the speed of this technology-driven change has outpaced our understanding of its social and ethical effects. The moral dimensions of this new technology and its effects on social bonds need to be questioned and scrutinized: Should the Internet be understood as a new form of public space and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  84
    Helen Nissenbaum, Privacy in Context: Technology, Policy, and the Integrity of Social Life: Stanford Law Books, 2010, xiv + 288 pages, ISBN 978-0-8047-5237-4. $24.95. [REVIEW]Tony Doyle - 2011 - Journal of Value Inquiry 45 (1):97-102.
  20.  34
    Deborah G. Johnson and Helen Nissenbaum, eds., Computers, ethics and social values, upper saddle river, NJ: Prentice hall, 1995, VI + 714 pp., $44.00 (paper), ISBN 0-13-103110-. [REVIEW]Rob Kling - 1999 - Minds and Machines 9 (1):127-130.
  21. Helen Fay Nissenbaum, Emotion and Focus Reviewed by.Stephen R. Leighton - 1987 - Philosophy in Review 7 (8):315-317.
     
    Export citation  
     
    Bookmark  
  22. Helen Fay Nissenbaum, Emotion and Focus. [REVIEW]Stephen Leighton - 1987 - Philosophy in Review 7:315-317.
     
    Export citation  
     
    Bookmark  
  23.  44
    Privacy in the cloud: applying Nissenbaum's theory of contextual integrity.F. S. Grodzinsky & H. T. Tavani - 2011 - Acm Sigcas Computers and Society 41 (1):38-47.
    The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy, to see how it enables the contextual-integrity framework to respond to privacy challenges posed by (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  24. Pornography, oppression, and freedom : a closer look.Helen E. Longino - 2009 - In Steven M. Cahn (ed.), Exploring ethics: an introductory anthology. New York: Oxford University Press.
  25. What's Social about Social Epistemology?Helen E. Longino - 2022 - Journal of Philosophy 119 (4):169-195.
    Much work performed under the banner of social epistemology still centers the problems of the individual cognitive agent. AU distinguishes multiple senses of "social," some of which are more social than others, and argues that different senses are at work in various contributions to social epistemology. Drawing on work in history and philosophy of science and addressing the literature on testimony and disagreement in particular, this paper argues for a more thoroughgoing approach in social epistemology.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  26.  38
    Sameness and Substance. [REVIEW]Helen Morris Cartwright - 1982 - Philosophical Review 91 (4):597.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   55 citations  
  27.  29
    Living with Data: Aligning Data Studies and Data Activism Through a Focus on Everyday Experiences of Datafication.Helen Kennedy - 2018 - Krisis 38 (1):18-30.
    In this paper I argue that there is an urgent need for more empirical research into everyday experiences of living with datafication, something that has not been prioritised in the emerging field of data studies to date. As a result of this absence, the knowledge produced within data studies is not as aligned to the aims of data activism as it might be. Data activism seeks to challenge existing, unequal data power relations and to mobilise data in order to enhance (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  28.  27
    Internal Communication in Bangladeshi Ready-Made Garment Factories: Illustration of the Internal Communication System and Its Connection to Labor Unrest.Helene Blumer - 2016 - Wiesbaden: Imprint: Springer Gabler.
    By drawing up a model of the internal communication system of Bangladeshi ready-made garment factories, Helene Blumer identifies the existence and intensity of its communication flows. She furthermore discloses a connection from this communication system to labor unrest. The absence of a functioning formal channel within the factory, the lack of effective labor representation and the rare physical presence of the factory owners confirm the existence of a communication barrier. As symptom of a flawed communication system, this barrier confirms a (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  8
    The Custom-Made Child?: Women-Centered Perspectives.Helen B. Holmes, Betty B. Hoskins & Michael Gross - 1981 - Humana Press.
    Women most fully experience the consequences of human reproductive technologies. Men who convene to evaluate such technologies discuss "them": the women who must accept, avoid, or even resist these technologies; the women who consume technologies they did not devise; the women who are the objects of policies made by men. So often the input of women is neither sought nor listened to. The privileged insights and perspectives that women bring to the consideration of technologies in human reproduction are the subject (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  30.  12
    Strukturalisme og sovjetisk sprogvidenskab.Helen Liesl Krag - 1979 - København (Njalsgade 78/3, 2300 S): Slavisk Institut, Københavns Universitet.
    Direct download  
     
    Export citation  
     
    Bookmark  
  31. Parathyro ston kosmo.Helenē Kypraiou - 1983 - Athēna: Ekdoseis Rizes.
    No categories
     
    Export citation  
     
    Bookmark  
  32. Killing John to Save Mary: A Defence of the Distinction Between Killing and Letting Die.Helen Frowe - 2010 - In J. Campbell, M. O'Rourke & H. Silverstein (eds.), Action, Ethics and Responsibility: Topics in Contemporary Philosophy, Vol. 7. MIT Press.
    Introduction This paper defends the moral significance of the distinction between killing and letting die. In the first part of the paper, I consider and reject Michael Tooley’s argument that initiating a causal process is morally equivalent to refraining from interfering in that process. The second part disputes Tooley’s suggestion it is merely external factors that make killing appear to be worse than letting die, when in reality the distinction is morally neutral. Tooley is mistaken to claim that we are (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  43
    Cooperation, Complicity & Conscience: Problems in Healthcare, Science, Law and Public Policy.Helen Watt (ed.) - 2005 - Linacre Centre.
    Cooperation in evil or wrongdoing is one of the most perplexing areas in bioethics, both for those working in the field and those seeking their advice. The papers collected in this book are written by philosophers, theologians and lawyers who have studied these problems and / or by those who have faced these problems in their own work in law, healthcare and research, and political campaigning. The volume includes both general treatments of the subject of cooperation and conscientious objection, and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Jacques Derrida : Co-responding voix you.Hélène Cixous - 2009 - In Pheng Cheah & Suzanne Guerlac (eds.), Derrida and the time of the political. Durham: Duke University Press.
     
    Export citation  
     
    Bookmark   3 citations  
  35. Nation and Liberty: the Byzantine Example.Hélène Ahrweiler & Jeanne Ferguson - 1983 - Diogenes 31 (124):47-58.
    Nation and liberty: two ideas that in spite of the innumerable works that have been devoted to them are still open to new approaches, indeed, to new definitions. They pose a problem whose essence is to remain without a definitive answer, to be always actual, because it concerns man of all times, all countries and all conditions. This apparently-simple remark raises a question: is it possible to put nation and liberty on the same level? It is permissible to consider liberty (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  36.  17
    Hē sēmasia tou xenou: dokimio.Helenē Ladia - 2016 - Athēna: Harmos.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  37. Agonistic recipes: Constructive conflicting visual mediation as socio-political model.Helen Westgeest - 2021 - In Helen Westgeest, Kitty Zijlmans & Thomas J. Berghuis (eds.), Mix & stir: new outlooks on contemporary art from global perspectives. Amsterdam: Valiz.
     
    Export citation  
     
    Bookmark  
  38.  9
    Net work: ethics and values in web design.Helen Kennedy - 2012 - New York: Palgrave-Macmillan.
    Net Work provides a detailed study of the work of web designers. It draws on empirical research carried out from the birth of web design as an area of work in the 1990s to its professionalization in the twenty-first century and addresses the politics of building an inclusive WWW for people of diverse abilities.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  39.  61
    How Collusion Perpetuates Racial Discrimination in Societies that Ostensibly Promote Equal Opportunity.Helen Lauer - 2016 - Philosophical Papers 45 (1-2):75-101.
    It is shown here that injustices due to racial discrimination are best identified in light of the deleterious effects they have upon their victims, rather than the beliefs and attitudes of their perpetrators. For among participants who cooperate clandestinely to bring about racial injustice there may be broad disagreement about what it is they are doing collectively, and why; or they may disagree in principle about whether what they are doing is morally right. I employ the notion of ‘nomotropic’ behaviour (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  12
    Educational leadership and Hannah Arendt.Helen Gunter - 2014 - New York: Routledge.
    The relationship between education and democratic development has been a growing theme in debates focussed upon public education, but there has been little work that has directly related educational leadership to wider issues of freedom, politics and practice. Engaging with ELMA through the work of Hannah Arendt enables these issues of power to be directly confronted. Arendt produced texts that challenged notions of freedom and politics, and notably examined the lives of people, ideas and historical events in ways that are (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  41. Housing the vulnerable subject : the English context.Helen Carr - 2013 - In Martha Fineman & Anna Grear (eds.), Vulnerability: reflections on a new ethical foundation for law and politics. Burlington, VT: Ashgate.
     
    Export citation  
     
    Bookmark   1 citation  
  42.  65
    How We Fight: Ethics in War.Helen Frowe & Gerald R. Lang (eds.) - 2014 - Oxford: Oxford University Press.
    How We Fight: Ethics in War contains ten groundbreaking essays by some of the leading philosophers of war. The essays offer new perspectives on key debates including pacifism, punitive justifications for war, the distribution of risk between combatants and non-combatants, the structure of 'just war theory', and bases of individual liability in war.
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  43.  6
    Food Glorious Food.Helene Gammack - 2010-09-24 - In Fritz Allhoff & Dan O'Brien (eds.), Gardening ‐ Philosophy for Everyone. Wiley‐Blackwell. pp. 48–61.
    This chapter contains sections titled: Notes.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  7
    Trishashṭiśalākāpurushacharitram-mahākāvyamTrishashtisalakapurushacharitram-mahakavyam.Helen M. Johnson, Śrī-Hemachandra-āchārya, Muni Charaṇavijaya, Sri-Hemachandra-Acharya & Muni Charanavijaya - 1939 - Journal of the American Oriental Society 59 (2):275.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  42
    Global Justice as Process: Applying Normative Ideals of Indigenous African Governance.Helen Lauer - 2017 - Philosophical Papers 46 (1):163-189.
    This contribution explores correctives to several errors that Thomas Nagel seems to presuppose in his seminal defence of scepticism about global justice. I rely on lessons learned and conventions surviving in West African contemporary social and moral contexts, where people engage as a matter of course in divergent, historically antagonistic cultural and political traditions. On this view, global justice is a work in progress—not a fixed univocal formula but an on-going collaborative effort, a project in perpetual renovation and inter-cultural reconsideration (...)
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  46. Remembering the British soldier in Iraq and Afghanistan.Helen Parr - 2024 - In Frank Ledwidge, Helen Parr & Aaron Edwards (eds.), Ground truth: the moral component in contemporary British warfare. New York: Bloomsbury Academic.
     
    Export citation  
     
    Bookmark  
  47.  6
    Methodologische Untersuchungen zur aristotelischen Wissenschaftstheorie.Helen Spanu - 1976 - München: Verlag UNI-Druck.
    Direct download  
     
    Export citation  
     
    Bookmark  
  48. A Metaphysics for Freedom.Helen Steward - 2012 - Oxford, GB: Oxford University Press.
    Helen Steward argues that determinism is incompatible with agency itself--not only the special human variety of agency, but also powers which can be accorded to animal agents. She offers a distinctive, non-dualistic version of libertarianism, rooted in a conception of what biological forms of organisation might make possible in the way of freedom.
  49. Embodying Values in Design: Theory and Practice.M. Flanagan, D. Howe & H. Nissenbaum - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. pp. 322--353.
    No categories
     
    Export citation  
     
    Bookmark   19 citations  
  50. Evaluation for moving ethics in health care services towards democratic care : a three pillars model : education, companionship, and open space.Helen Kohlen - 2018 - In Merel Visse & Tineke A. Abma (eds.), Evaluation for a caring society. Charlotte, NC: Information Age Publishing.
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 1000