Helen Nissenbaum

According to our database1, Helen Nissenbaum authored at least 48 papers between 1993 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


ACM UMAP 2021 Keynote Addresses.
Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, 2021

Computer Vision and Conflicting Values: Describing People with Automated Alt Text.
Proceedings of the AIES '21: AAAI/ACM Conference on AI, 2021

Disaster privacy/privacy disaster.
J. Assoc. Inf. Sci. Technol., 2020

Interdisciplinary Approaches to Understanding Artificial Intelligence's Impact on Society.
CoRR, 2020

An Ethical Highlighter for People-Centric Dataset Creation.
CoRR, 2020

VACCINE: Using Contextual Integrity For Data Leakage Detection.
Proceedings of the World Wide Web Conference, 2019

Respecting Context to Protect Privacy: Why Meaning Matters.
Sci. Eng. Ethics, 2018

Analyzing Privacy Policies Using Contextual Integrity Annotations.
CoRR, 2018

Achieving Meaningful Privacy in Digital Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Contextual Integrity through the Lens of Computer Science.
Found. Trends Priv. Secur., 2017

The VACCINE Framework for Building DLP Systems.
CoRR, 2017

Engineering Privacy and Protest: A Case Study of AdNauseam.
Proceedings of the 3rd International Workshop on Privacy Engineering co-located with 38th IEEE Symposium on Security and Privacy, 2017

Crowdsourcing Verifiable Contextual Integrity Norms.
CoRR, 2016

Learning Privacy Expectations by Crowdsourcing Contextual Informational Norms.
Proceedings of the Fourth AAAI Conference on Human Computation and Crowdsourcing, 2016

Big data's end run around procedural privacy protections.
Commun. ACM, 2014

A Critical Look at Decentralized Personal Data Architectures
CoRR, 2012

Accountings of Relationships.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

An Analysis of Google Logs Retention Policies.
J. Priv. Confidentiality, 2011

Vernacular resistance to data collection and analysis: A political theory of obfuscation.
First Monday, 2011

TrackMeNot: Enhancing the privacy of Web Search
CoRR, 2011

Values in Design - Building Bridges between RE, HCI and Ethics.
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011

Grow-A-Game: A Tool for Values Conscious Design and Analysis of Digital Games.
Proceedings of the 2011 DiGRA International Conference: Think, Design, Play, 2011

Privacy Challenges in Patient-centric Health Information Systems.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Adnostic: Privacy Preserving Targeted Advertising.
Proceedings of the Network and Distributed System Security Symposium, 2010

Privacy in Context - Technology, Policy, and the Integrity of Social Life.
Stanford University Press, ISBN: 978-0-8047-5237-4, 2010

A Method For Discovering Values in Digital Games.
Proceedings of the 2007 DiGRA International Conference: Situated Play, 2007

A game design methodology to incorporate social activist themes.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

Privacy and Contextual Integrity: Framework and Applications.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Ethics and children's information systems.
Proceedings of the Information Realities: Shaping the Digital Future for All, 2006

New Design Methods for Activist Gaming.
Proceedings of the Digital Games Research Conference 2005, 2005

Values at play: design tradeoffs in socially-oriented game design.
Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

Hackers and the contested ontology of cyberspace.
New Media Soc., 2004

Users' conceptions of risks and harms on the web: a comparative study.
Proceedings of the Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, 2002

Users' conceptions of web security: a comparative study.
Proceedings of the Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, 2002

Computer Security: Competing Concepts
CoRR, 2001

How Computer Systems Embody Values.
Computer, 2001

Trust: A Collision of Paradigms.
Proceedings of the Financial Cryptography, 2001

Shaping the Web: Why the Politics of Search Engines Matters.
Inf. Soc., 2000

Defining the Web: The Politics of Search Engines.
Computer, 2000

The Meaning of Anonymity in an Information Age.
Inf. Soc., 1999

Trust me, I'm accountable: trust and accountability online.
Proceedings of the CHI '99 Extended Abstracts on Human Factors in Computing Systems, 1999

The cutting edge.
SIGCAS Comput. Soc., 1998

Software Agents and User Autonomy.
Proceedings of the First International Conference on Autonomous Agents, 1997

Bias in Computer Systems.
ACM Trans. Inf. Syst., 1996

User autonomy: who should control what and when?
Proceedings of the Conference on Human Factors in Computing Systems: Common Ground, 1996

Minimizing bias in computer systems.
Proceedings of the Human Factors in Computing Systems, 1995

Computing and Accountability.
Commun. ACM, 1994

Discerning bias in computer systems.
Proceedings of the Human-Computer Interaction, 1993