19 found
Order:
Disambiguations
Helen Nissenbaum [22]Helen Fay Nissenbaum [1]
  1. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  2. Technology, Autonomy, and Manipulation.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Internet Policy Review 8 (2).
    Since 2016, when the Facebook/Cambridge Analytica scandal began to emerge, public concern has grown around the threat of “online manipulation”. While these worries are familiar to privacy researchers, this paper aims to make them more salient to policymakers — first, by defining “online manipulation”, thus enabling identification of manipulative practices; and second, by drawing attention to the specific harms online manipulation threatens. We argue that online manipulation is the use of information technology to covertly influence another person’s decision-making, by targeting (...)
    Direct download  
    Translate
     
     
    Export citation  
     
    Bookmark   4 citations  
  3.  46
    Respecting Context to Protect Privacy: Why Meaning Matters.Helen Nissenbaum - 2018 - Science and Engineering Ethics 24 (3):831-852.
    In February 2012, the Obama White House endorsed a Privacy Bill of Rights, comprising seven principles. The third, “Respect for Context,” is explained as the expectation that “companies will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data.” One can anticipate the contested interpretations of this principle as parties representing diverse interests vie to make theirs the authoritative one. In the paper I will discuss three possibilities and explain why (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  4. Protecting Privacy in an Information Age: The Problem of Privacy in Public. [REVIEW]Helen Nissenbaum - 1998 - Law and Philosophy 17 (s 5-6):559-596.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   36 citations  
  5.  53
    Embodying Values in Technology: Theory and Practice.Mary Flanagan, Daniel Howe & Helen Nissenbaum - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press. pp. 322--353.
    Direct download  
     
    Export citation  
     
    Bookmark   21 citations  
  6. Accountability in a Computerized Society.Helen Nissenbaum - 1996 - Science and Engineering Ethics 2 (1):25-42.
    This essay warns of eroding accountability in computerized societies. It argues that assumptions about computing and features of situations in which computers are produced create barriers to accountability. Drawing on philosophical analyses of moral blame and responsibility, four barriers are identified: 1) the problem of many hands, 2) the problem of bugs, 3) blaming the computer, and 4) software ownership without liability. The paper concludes with ideas on how to reverse this trend.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  7.  41
    Commons-Based Peer Production and Virtue.Yochai Benkler & Helen Nissenbaum - 2006 - Journal of Political Philosophy 14 (4):394–419.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  8.  93
    Toward an Approach to Privacy in Public: Challenges of Information Technology.Helen Nissenbaum - 1997 - Ethics and Behavior 7 (3):207 – 219.
    This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Although these approaches emphasize the connection between privacy and a protected personal (or intimate) sphere, many individuals perceive a threat to privacy in the widespread collection of information even in realms normally considered "public". In identifying and describing the problem of privacy in public, this article is preliminary work in a larger effort to map out future theoretical directions.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  9.  28
    Protecting Privacy in an Information Age: The Problem of Privacy in Public.Helen Nissenbaum - 1998 - Law and Philosophy 17 (5):559-596.
    Direct download  
     
    Export citation  
     
    Bookmark   11 citations  
  10.  67
    Where Computer Security Meets National Security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  11.  8
    The Cutting Edge.Helen Nissenbaum - 1998 - Acm Sigcas Computers and Society 28 (1):38-39.
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  12.  18
    Political and Ethical Perspectives on Data Obfuscation.Finn Brunton & Helen Nissenbaum - 2013 - In Mireille Hildebrandt & Katja De Vries (eds.), Privacy, Due Process and the Computational Turn. Routledge. pp. 171.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  15
    Coordinating Editor.Jeroen van den Hoven, Lucas Introna, Deborah Johnson, Helen Nissenbaum & Herman Tavani - 1999 - Ethics and Information Technology 1 (1):89-92.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. The Internet in Public Life.William A. Galston, Thomas C. Hilde, Lucas D. Introna, Peter Levine, Eric M. Uslaner, Helen Nissenbaum & Robert Wachbroit - 2004 - Rowman & Littlefield Publishers.
    The spread of new information and communications technologies during the past two decades has helped reshape civic associations, political communities, and global relations. In the midst of the information revolution, we find that the speed of this technology-driven change has outpaced our understanding of its social and ethical effects. The moral dimensions of this new technology and its effects on social bonds need to be questioned and scrutinized: Should the Internet be understood as a new form of public space and (...)
     
    Export citation  
     
    Bookmark  
  15.  11
    Contextual Integrity Up and Down the Data Food Chain.Helen Nissenbaum - 2019 - Theoretical Inquiries in Law 20 (1):221-256.
    According to the theory of contextual integrity, privacy norms prescribe information flows with reference to five parameters — sender, recipient, subject, information type, and transmission principle. Because privacy is grasped contextually, the values of these parameters range over contextually meaningful ontologies — of information types and actors, in contextually defined capacities. As an alternative to predominant approaches to privacy, which were ineffective against novel information practices enabled by IT, CI was able both to pinpoint sources of disruption and provide grounds (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  16. Can Trust Be Secured Online? A Theoretical Perspective.Helen Nissenbaum - 1999 - Etica E Politica 1 (2).
  17.  8
    Editorial.Helen Nissenbaum - 1999 - Ethics and Information Technology 1 (3):171-172.
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  9
    Editorial.Helen Nissenbaum - 2001 - Ethics and Information Technology 2 (4):171-172.
    Direct download  
     
    Export citation  
     
    Bookmark  
  19. The Puzzle of Priority: Devising New Norms and Conventions in Research for the Context of Electronic Publication.Helen Nissenbaum - 1999 - Australian Journal of Professional and Applied Ethics 1 (1).
     
    Export citation  
     
    Bookmark