Author image not provided
 Helen Fay Nissenbaum

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article15.59
Citation Count499
Publication count32
Publication years1993-2016
Available for download13
Average downloads per article1,224.31
Downloads (cumulative)15,916
Downloads (12 Months)1,522
Downloads (6 Weeks)148
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


32 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 32
Result page: 1 2

Sort by:

1
September 2016
Bibliometrics:
Citation Count: 0

With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance -- the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy ...

2
September 2015
Bibliometrics:
Citation Count: 7

With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance -- the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy ...

3 published by ACM
October 2014 Communications of the ACM: Volume 57 Issue 11, November 2014
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 66,   Downloads (12 Months): 463,   Downloads (Overall): 1,859

Full text available: HtmlHtml  PDFPDF
Recognizing the inherent limitations of consent and anonymity.

4
July 2014
Bibliometrics:
Citation Count: 3

All games express and embody human values, providing a compelling arena in which we play out beliefs and ideas. "Big ideas" such as justice, equity, honesty, and cooperation -- as well as other kinds of ideas, including violence, exploitation, and greed -- may emerge in games whether designers intend them ...

5
August 2012 HealthSec'12: Proceedings of the 3rd USENIX conference on Health Security and Privacy
Publisher: USENIX Association
Bibliometrics:
Citation Count: 0


6
September 2011 INTERACT'11: Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part IV
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 2


7
November 2009
Bibliometrics:
Citation Count: 136

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itselfmost people understand that this is crucial to social ...

8 published by ACM
April 2007 CHI '07: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 25
Downloads (6 Weeks): 9,   Downloads (12 Months): 56,   Downloads (Overall): 1,396

Full text available: PDFPDF
Can a set of articulated and tested methodologies be created whose endpoint is the reliable capacity for taking activist social themes into account? In this paper we explore a variety of educational and activist game approaches, and look specifically at the themes emerging from recent projects involving game design for ...
Keywords: activist games, game design, values, design methods

9
May 2006 SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 84

Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philosophy. We formalize some aspects of contextual integrity in a logical framework for expressing and reasoning about norms of transmission of personal information. In comparison with access ...

10
June 2005 Ethics and Information Technology: Volume 7 Issue 2, June 2005
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 3

This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well ...
Keywords: cyber-security, securitization, computer security

11 published by ACM
April 2005 CHI '05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 36
Downloads (6 Weeks): 15,   Downloads (12 Months): 84,   Downloads (Overall): 2,460

Full text available: PDFPDF
Significant work in the CHI community has focused on designing systems that support human values. Designers and engineers have also become increasingly aware of ways in which the artifacts they create can embody political, social, and ethical values. Despite such an awareness, there has been little work towards producing practical ...
Keywords: social issues, values, gender and computing, programming pedagogy

12

13 published by ACM
April 2002 CHI EA '02: CHI '02 Extended Abstracts on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 4,   Downloads (12 Months): 30,   Downloads (Overall): 629

Full text available: PDFPDF
In this study, we analyzed Web users concerns about potential risks and harms from Web use to themselves and to society at large. In addition, we assessed how strongly users felt something should be done to address their concerns. Seventy-two individuals, 24 each from a rural community in Maine, a ...
Keywords: cross-cultural differences, internet, value-sensitive design, user conceptions, user differences, diversity, children on the internet, privacy, security, web security, www

14 published by ACM
April 2002 CHI EA '02: CHI '02 Extended Abstracts on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 39
Downloads (6 Weeks): 3,   Downloads (12 Months): 43,   Downloads (Overall): 1,275

Full text available: PDFPDF
This study characterizes users' conceptions of web security. Seventy-two individuals, 24 each from a rural community in Maine, a suburban professional community in New Jersey, and a high-technology community in California, participated in an extensive (2-hour) semi-structured interview (including a drawing task) about Web security. The results show that many ...
Keywords: user conceptions, user differences, WWW, security, web models, web security, user models, value-sensitive design

15
February 2002 FC '01: Proceedings of the 5th International Conference on Financial Cryptography
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 4

The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be either a loss of trust or a willingness to tolerate increasing risk having weathered one assault. Examining human and computer interaction with a ...

16
April 2001 Ethics and Information Technology: Volume 2 Issue 4, 2001
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 0


17
March 2001 Computer: Volume 34 Issue 3, March 2001
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 6

The story of how information technology has radically altered our lives and even ourselves has been told many times, in many versions. The radical effects of the process have extended to institutions, social processes, relationships, power structures, work, play, education, and beyond. Although the changes have been varied, affecting the ...

18
March 2001 Computer: Volume 34 Issue 3, March 2001
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 6

The author calls for engineering activism to intelligently guide the inevitable incorporation of values into computer systems and devices.

19
June 2000 IEEE Spectrum: Volume 37 Issue 6, June 2000
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0


20
January 2000 Computer: Volume 33 Issue 1, January 2000
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 17

Although the Web itself might truthfully claim a sovereign disinterested and unbiased attitude toward the people who use it, the authors of this article claim that search engines, the tools that navigate the astronomical number of pages (800 million and counting), favor popular, wealthy, and powerful sites at the expense ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us