Results for 'H. Nissenbaum'

986 found
Order:
  1. Embodying Values in Design: Theory and Practice.M. Flanagan, D. Howe & H. Nissenbaum - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. pp. 322--353.
    No categories
     
    Export citation  
     
    Bookmark   19 citations  
  2. Rob Kling (ed.) Computerization and Controversy: Value Conflicts and Social Choices.H. Nissenbaum - 1997 - Minds and Machines 7:152-155.
  3.  43
    Privacy in the cloud: applying Nissenbaum's theory of contextual integrity.F. S. Grodzinsky & H. T. Tavani - 2011 - Acm Sigcas Computers and Society 41 (1):38-47.
    The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy, to see how it enables the contextual-integrity framework to respond to privacy challenges posed by new (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  4. Accountability in a computerized society.Helen Nissenbaum - 1996 - Science and Engineering Ethics 2 (1):25-42.
    This essay warns of eroding accountability in computerized societies. It argues that assumptions about computing and features of situations in which computers are produced create barriers to accountability. Drawing on philosophical analyses of moral blame and responsibility, four barriers are identified: 1) the problem of many hands, 2) the problem of bugs, 3) blaming the computer, and 4) software ownership without liability. The paper concludes with ideas on how to reverse this trend.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   47 citations  
  5. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Direct download  
     
    Export citation  
     
    Bookmark   28 citations  
  6.  41
    Protecting Privacy in an Information Age: The Problem of Privacy in Public.Helen Nissenbaum - 1998 - Law and Philosophy 17 (5-6):559-596.
    Direct download  
     
    Export citation  
     
    Bookmark   40 citations  
  7. Technology, autonomy, and manipulation.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Internet Policy Review 8 (2).
    Since 2016, when the Facebook/Cambridge Analytica scandal began to emerge, public concern has grown around the threat of “online manipulation”. While these worries are familiar to privacy researchers, this paper aims to make them more salient to policymakers — first, by defining “online manipulation”, thus enabling identification of manipulative practices; and second, by drawing attention to the specific harms online manipulation threatens. We argue that online manipulation is the use of information technology to covertly influence another person’s decision-making, by targeting (...)
    Direct download  
     
    Export citation  
     
    Bookmark   31 citations  
  8.  85
    Respecting Context to Protect Privacy: Why Meaning Matters.Helen Nissenbaum - 2018 - Science and Engineering Ethics 24 (3):831-852.
    In February 2012, the Obama White House endorsed a Privacy Bill of Rights, comprising seven principles. The third, “Respect for Context,” is explained as the expectation that “companies will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data.” One can anticipate the contested interpretations of this principle as parties representing diverse interests vie to make theirs the authoritative one. In the paper I will discuss three possibilities and explain why (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  9. Toward an approach to privacy in public: Challenges of information technology.Helen Nissenbaum - 1997 - Ethics and Behavior 7 (3):207 – 219.
    This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Although these approaches emphasize the connection between privacy and a protected personal (or intimate) sphere, many individuals perceive a threat to privacy in the widespread collection of information even in realms normally considered "public". In identifying and describing the problem of privacy in public, this article is preliminary work in a larger effort to map out future theoretical directions.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  10.  76
    Contextual Integrity Up and Down the Data Food Chain.Helen Nissenbaum - 2019 - Theoretical Inquiries in Law 20 (1):221-256.
    According to the theory of contextual integrity (CI), privacy norms prescribe information flows with reference to five parameters — sender, recipient, subject, information type, and transmission principle. Because privacy is grasped contextually (e.g., health, education, civic life, etc.), the values of these parameters range over contextually meaningful ontologies — of information types (or topics) and actors (subjects, senders, and recipients), in contextually defined capacities. As an alternative to predominant approaches to privacy, which were ineffective against novel information practices enabled by (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  11.  76
    Embodying values in technology: Theory and practice.Mary Flanagan, Daniel Howe & Helen Nissenbaum - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. pp. 322--353.
    Direct download  
     
    Export citation  
     
    Bookmark   31 citations  
  12.  53
    Commons-based Peer production and virtue.Yochai Benkler & Helen Nissenbaum - 2006 - Journal of Political Philosophy 14 (4):394–419.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  13.  33
    Political and ethical perspectives on data obfuscation.Finn Brunton & Helen Nissenbaum - 2013 - In Mireille Hildebrandt & Katja de Vries (eds.), Privacy, due process and the computational turn. Abingdon, Oxon, [England] ; New York: Routledge. pp. 171.
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  14.  10
    The cutting edge.Helen Nissenbaum - 1998 - Acm Sigcas Computers and Society 28 (1):38-39.
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  15.  47
    Nicomachean ethics.H. Aristotle & Rackham - 2014 - Indianapolis: Hackett Publishing Co.. Edited by C. D. C. Reeve.
    Terence Irwin's edition of the Nicomachean Ethics offers more aids to the reader than are found in any modern English translation. It includes an Introduction, headings to help the reader follow the argument, explanatory notes on difficult or important passages, and a full glossary explaining Aristotle's technical terms. The Third Edition offers additional revisions of the translation as well as revised and expanded versions of the notes, glossary, and Introduction. Also new is an appendix featuring translated selections from related texts (...)
    Direct download  
     
    Export citation  
     
    Bookmark   957 citations  
  16.  82
    Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  17.  91
    A modal ambiguity in for-infinitival relative clauses.Martin Hackl & Jon Nissenbaum - 2012 - Natural Language Semantics 20 (1):59-81.
    This squib presents two puzzles related to an ambiguity found in for-infinitival relative clauses (FIRs). FIRs invariably receive a modal interpretation even in the absence of any overt modal verb. The modal interpretation seems to come in two distinct types, which can be paraphrased by finite relative clauses employing the modal auxiliaries should and could. The two puzzles presented here arise because the availability of the two readings is constrained by factors that are not otherwise known to affect the interpretation (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  18. Protecting privacy in an information age: The problem of privacy in public. [REVIEW]Helen Nissenbaum - 1998 - Law and Philosophy 17 (s 5-6):559-596.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   47 citations  
  19. Christmas - Philosophy for Everyone: Better Than a Lump of Coal.Stephen Nissenbaum - 2010 - Wiley-Blackwell.
     
    Export citation  
     
    Bookmark  
  20. Can Trust be Secured Online? A theoretical perspective.Helen Nissenbaum - 1999 - Etica E Politica 1 (2).
  21.  12
    Editorial.Helen Nissenbaum - 1999 - Ethics and Information Technology 1 (3):171-172.
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  13
    Editorial.Helen Nissenbaum - 2001 - Ethics and Information Technology 2 (4):171-172.
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  8
    I Was in the Umschlagplatz.Zygmunt Nissenbaum - 1989 - Dialectics and Humanism 16 (1):129-134.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  60
    Parasitic degree phrases.Jon Nissenbaum & Bernhard Schwarz - 2011 - Natural Language Semantics 19 (1):1-38.
    This paper investigates gaps in degree phrases with too, as in John is too rich [for the monastery to hire ___ ]. We present two curious restrictions on such gapped degree phrases. First, the gaps must ordinarily be anteceded by the subject of the associated gradable adjective. Second, when embedded under intensional verbs, gapped degree phrases are ordinarily restricted to surface scope, unlike their counterparts without gaps. Just as puzzlingly, we show that these restrictions are lifted when there is overt (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  25. Sefer Mosdot ha-emunah: yevarer mosde ha-emunah be-higayon yashar..Mordecai Nissenbaum - 1923 - [Brooklyn, N.Y.?: Ḥ. Mo. L..
     
    Export citation  
     
    Bookmark  
  26. The Puzzle of Priority: Devising New Norms and Conventions in Research for the Context of Electronic Publication.Helen Nissenbaum - 1999 - Australian Journal of Professional and Applied Ethics 1 (1).
     
    Export citation  
     
    Bookmark  
  27.  37
    A modal ambiguity in for-infinitival relative clauses.Martin Hackl & Jon Nissenbaum - 2012 - Natural Language Semantics 20 (1):59-81.
    This squib presents two puzzles related to an ambiguity found in for-infinitival relative clauses (FIRs). FIRs invariably receive a modal interpretation even in the absence of any overt modal verb. The modal interpretation seems to come in two distinct types, which can be paraphrased by finite relative clauses employing the modal auxiliaries should and could. The two puzzles presented here arise because the availability of the two readings is constrained by factors that are not otherwise known to affect the interpretation (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  3
    Ḥalamish le-maʻayano mayim: meḥḳarim be-ḳabalah, halakhah, minhag ṿe-hagut mugashim li-Prof. Mosheh Ḥalamish.Mosheh Ḥalamish, Avi Elqayam & Haviva Pedaya (eds.) - 2016 - Yerushalayim: Karmel.
    Direct download  
     
    Export citation  
     
    Bookmark  
  29. Ibn Rushd: bayna al-ḥikmah wa-al-zanadqah.ʻAzīz Ḥaddādī - 2023 - ʻĀbidīn, al-Qāhirah: Dār Ruʼyah lil-Nashr wa-al-Tawzīʻ.
    Direct download  
     
    Export citation  
     
    Bookmark  
  30. The Pragmatist Challenge: Pragmatist Metaphysics for Philosophy of Science.H. K. Andersen & Sandra D. Mitchell (eds.) - 2023 - Oxford, UK: Oxford University Press.
    This volume offers a collection of in-depth explorations of pragmatism as a framework for discussions in philosophy of science and metaphysics. Each chapter involves explicit reflection on what it means to be pragmatist, and how to use pragmatism as a guiding framework in addressing topics such as realism, unification, fundamentality, truth, laws, reduction, and more. -/- .
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31. The realm of the infinite.H. W. Woodin - 2011 - In Michał Heller & W. H. Woodin (eds.), Infinity: new research frontiers. New York: Cambridge University Press.
  32. al-Ṣūfīyah dīn al-ḥubb.ʻAbd Allāh & ʻĪd Ibrāhīm - 2016 - al-Qāhirah: : Ibdāʻ lil-Nashr wa-al-Tawzīʻ wa-al-Tarjamah.
    كتاب بحصي يتناول الصراع بين الصوفية والسلفية ويتناول قصة حياة الحلاج وابن الفارض والسهروردي ودواوينهم ويتناول الحب الإلهي عند الصوفية.
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  3
    Maqāmāt al-ʻunf: fī al-dīn wa-al-ʻaql al-ḥadāthī, fī al-usṭūrah wa-al-abādīʻ al-adabīyah wa-al-fannīyah, dirāsah.Munīr Ḥāfiẓ - 2016 - al-Lādhiqīyah: Dār al-Ḥiwār lil-Nashr wa-al-Tawzīʻ.
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  31
    An introduction to logic.H. W. B. Joseph - 1906 - Oxford,: Clarendon press.
    "First published by Oxford University Press, 1916."--Title page verso.
  35.  26
    Politics.H. Aristotle & Rackham - 1944 - Cambridge, Mass.: Harvard University Press. Edited by H. Rackham.
    An English language translation accompanies the original Greek text of Aristotle's book about the nature of the state, constitutions, revolutions, democracy, and oligarchy.
    Direct download  
     
    Export citation  
     
    Bookmark   85 citations  
  36. The Nature of Truth.H. H. Joachim - 2005-01-01 - In José Medina & David Wood (eds.), Truth. Blackwell.
    No categories
     
    Export citation  
     
    Bookmark   24 citations  
  37. Xunzi: The Complete Text.H. G. Xunzi - 2014 - Princeton: Princeton University Press. Edited by Eric L. Hutton.
    This is the first complete, one-volume English translation of the ancient Chinese text Xunzi, one of the most extensive, sophisticated, and elegant works in the tradition of Confucian thought. Through essays, poetry, dialogues, and anecdotes, the Xunzi articulates a Confucian perspective on ethics, politics, warfare, language, psychology, human nature, ritual, and music, among other topics. Aimed at general readers and students of Chinese thought, Eric Hutton’s translation makes the full text of this important work more accessible in English than ever (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  38. Sefer Ḥesheḳ Shelomoh: liḳuṭe ḥi. Tanakh u-maʼamre Razal.Shelomoh Ḥuri - 1942 - Gerbah: Ḳupat Or Torah. Edited by Eliyahu Ḥuri.
     
    Export citation  
     
    Bookmark  
  39.  5
    Falāḥ-i falsafah: rivāyatī naw az falsafah-yi Islāmī = Prosperity of philosophy.Yāsir Ḥusaynʹpūr - 2020 - Qum: Nashr-i Adyān.
  40. H.S. Skovoroda.A. M. Niz︠h︡enet︠s︡ʹ - 1969 - [Kharkiv,: "Prapor".
     
    Export citation  
     
    Bookmark  
  41.  43
    Law, Liberty, and Morality.H. L. A. Hart - 1963 - Stanford University Press.
    This incisive book deals with the use of the criminal law to enforce morality, in particular sexual morality, a subject of particular interest and importance since the publication of the Wolfenden Report in 1957. Professor Hart first considers John Stuart Mill's famous declaration: "The only purpose for which power can be rightfully exercised over any member of a civilized community is to prevent harm to others." During the last hundred years this doctrine has twice been sharply challenged by two great (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   64 citations  
  42. al-Mafātīḥ al-asāsīyah li-kutub al-Shaykh al-akbar Ibn al-ʻArabī maʻa buḥūth ukhrá ḥawlah.ʻAbd al-Bāqī Miftāḥ - 2010 - [al-Rabāṭ: [S.N.]. Edited by ʻAbd al-Ilāh Bin-ʻArafah.
  43.  2
    Ḥiwārāt naqdīyah fī al-falsafah wa-al-tārīkh.Muṣṭafá Ḥanafī - 2019 - Tiṭwān: Manshūrāt Bāb al-Ḥikmah.
  44. Sefer Ḥokhmah u-musar: ṿe-hu derushim u-musarim..Maʻṭuḳ Ḥaṭab - 1941 - Gerbah: Yeshuʻah Ḥadad.
     
    Export citation  
     
    Bookmark  
  45.  7
    The categorical imperative.H. J. Paton - 1947 - New York,: Harper & Row.
    A classic exposition of Kant's ethical thought.
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  46.  4
    al-Hawīyah bayna ḥuḍūr al-dhāt wa-al-taʻaddudīyah: muqārabah fikrīyah.Salīm Ḥassānī - 2022 - al-Quds: Dār al-Jundī lil-Nashr wa-al-Tawzīʻ.
    Direct download  
     
    Export citation  
     
    Bookmark  
  47. Bashar dar panāh-i Islām.Qudsīyah Ḥijāzī - 1970 - Tihrān: Kitābfurūshī-i Ishrāqī.
     
    Export citation  
     
    Bookmark  
  48. Divre ḥakhamim: ʻal ha-midot.Aryeh Leyb ben Ḥ (ed.) - 1979 - Yerushalayim: Hotsaʼat "Ḥakhamim".
     
    Export citation  
     
    Bookmark  
  49.  9
    After God: morality and bioethics in a secular age.H. Tristram Engelhardt - 2017 - Yonkers, New York: St. Vladimir's Seminary Press.
    Engelhardt invites readers to understand what it means to live in a world after God, where questions of sin and virtue have been replaced with life-and-death-style choices. After God provides a dark prophetic vision. But there is still hope. As Engelhardt argues, In this culture, children now grow up apart from and defended against a recognition of the God Who lives. They are nurtured in a social fabric that is structured so as to avoid a recognition of, much less an (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  50.  59
    Can we trust the phenomenological interview? Metaphysical, epistemological, and methodological objections.Simon Høffding, Kristian Martiny & Andreas Roepstorff - 2021 - Phenomenology and the Cognitive Sciences 21 (1):33-51.
    The paper defends the position that phenomenological interviews can provide a rich source of knowledge and that they are in no principled way less reliable or less valid than quantitative or experimental methods in general. It responds to several skeptic objections such as those raised against introspection, those targeting the unreliability of episodic memory, and those claiming that interviews cannot address the psychological, cognitive and biological correlates of experience. It argues that the skeptic must either heed the methodological and epistemological (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
1 — 50 / 986