13 found
Sort by:
Disambiguations:
Helen Nissenbaum [13]Helen Fay Nissenbaum [1]
  1. Finn Brunton & Helen Nissenbaum (2013). Political and Ethical Perspectives on Data Obfuscation. In Mireille Hildebrandt & Katja De Vries (eds.), Privacy, Due Process and the Computational Turn. Routledge. 171.
    Direct download  
     
    My bibliography  
     
    Export citation  
  2. Mary Flanagan, Daniel Howe & Helen Nissenbaum (2008). Embodying Values in Technology: Theory and Practice. In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. 322--353.
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  3. Yochai Benkler & Helen Nissenbaum (2006). Commons-Based Peer Production and Virtue. Journal of Political Philosophy 14 (4):394–419.
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  4. Helen Nissenbaum (2005). Where Computer Security Meets National Security. Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  5. William A. Galston, Thomas C. Hilde, Lucas D. Introna, Peter Levine, Eric M. Uslaner, Helen Nissenbaum & Robert Wachbroit (2004). The Internet in Public Life. Rowman & Littlefield Publishers.
    The spread of new information and communications technologies during the past two decades has helped reshape civic associations, political communities, and global relations. In the midst of the information revolution, we find that the speed of this technology-driven change has outpaced our understanding of its social and ethical effects. The moral dimensions of this new technology and its effects on social bonds need to be questioned and scrutinized: Should the Internet be understood as a new form of public space and (...)
     
    My bibliography  
     
    Export citation  
  6. Helen Nissenbaum (2001). Editorial. Ethics and Information Technology 2 (4):171-172.
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  7. Helen Nissenbaum (1999). Can Trust Be Secured Online? A Theoretical Perspective. Etica E Politica 1 (2).
     
    My bibliography  
     
    Export citation  
  8. Helen Nissenbaum (1999). Editorial. Ethics and Information Technology 1 (3):171-172.
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  9. Helen Nissenbaum (1999). The Puzzle of Priority: Devising New Norms and Conventions in Research for the Context of Electronic Publication. Australian Journal of Professional and Applied Ethics 1 (1).
     
    My bibliography  
     
    Export citation  
  10. Jeroen van den Hoven, Lucas Introna, Deborah Johnson, Helen Nissenbaum & Herman Tavani (1999). Coordinating Editor. Ethics and Information Technology 1:89-92.
    Direct download  
     
    My bibliography  
     
    Export citation  
  11. Helen Nissenbaum (1998). The Cutting Edge. Acm Sigcas Computers and Society 28 (1):38-39.
    No categories
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  12. Helen Nissenbaum (1997). Toward an Approach to Privacy in Public: Challenges of Information Technology. Ethics and Behavior 7 (3):207 – 219.
    This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Although these approaches emphasize the connection between privacy and a protected personal (or intimate) sphere, many individuals perceive a threat to privacy in the widespread collection of information even in realms normally considered "public". In identifying and describing the problem of privacy in public, this article is preliminary work in a larger effort to map out future theoretical directions.
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  13. Helen Nissenbaum (1996). Accountability in a Computerized Society. Science and Engineering Ethics 2 (1):25-42.
    This essay warns of eroding accountability in computerized societies. It argues that assumptions about computing and features of situations in which computers are produced create barriers to accountability. Drawing on philosophical analyses of moral blame and responsibility, four barriers are identified: 1) the problem of many hands, 2) the problem of bugs, 3) blaming the computer, and 4) software ownership without liability. The paper concludes with ideas on how to reverse this trend.
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation