Helen Nissenbaum

According to our database1, Helen Nissenbaum authored at least 48 papers between 1993 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
ACM UMAP 2021 Keynote Addresses.
Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, 2021

Computer Vision and Conflicting Values: Describing People with Automated Alt Text.
Proceedings of the AIES '21: AAAI/ACM Conference on AI, 2021

2020
Disaster privacy/privacy disaster.
J. Assoc. Inf. Sci. Technol., 2020

Interdisciplinary Approaches to Understanding Artificial Intelligence's Impact on Society.
CoRR, 2020

An Ethical Highlighter for People-Centric Dataset Creation.
CoRR, 2020

2019
VACCINE: Using Contextual Integrity For Data Leakage Detection.
Proceedings of the World Wide Web Conference, 2019

2018
Respecting Context to Protect Privacy: Why Meaning Matters.
Sci. Eng. Ethics, 2018

Analyzing Privacy Policies Using Contextual Integrity Annotations.
CoRR, 2018

Achieving Meaningful Privacy in Digital Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Contextual Integrity through the Lens of Computer Science.
Found. Trends Priv. Secur., 2017

The VACCINE Framework for Building DLP Systems.
CoRR, 2017

Engineering Privacy and Protest: A Case Study of AdNauseam.
Proceedings of the 3rd International Workshop on Privacy Engineering co-located with 38th IEEE Symposium on Security and Privacy, 2017

2016
Crowdsourcing Verifiable Contextual Integrity Norms.
CoRR, 2016

Learning Privacy Expectations by Crowdsourcing Contextual Informational Norms.
Proceedings of the Fourth AAAI Conference on Human Computation and Crowdsourcing, 2016

2014
Big data's end run around procedural privacy protections.
Commun. ACM, 2014

2012
A Critical Look at Decentralized Personal Data Architectures
CoRR, 2012

Accountings of Relationships.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

2011
An Analysis of Google Logs Retention Policies.
J. Priv. Confidentiality, 2011

Vernacular resistance to data collection and analysis: A political theory of obfuscation.
First Monday, 2011

TrackMeNot: Enhancing the privacy of Web Search
CoRR, 2011

Values in Design - Building Bridges between RE, HCI and Ethics.
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011

Grow-A-Game: A Tool for Values Conscious Design and Analysis of Digital Games.
Proceedings of the 2011 DiGRA International Conference: Think, Design, Play, 2011

2010
Privacy Challenges in Patient-centric Health Information Systems.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Adnostic: Privacy Preserving Targeted Advertising.
Proceedings of the Network and Distributed System Security Symposium, 2010

Privacy in Context - Technology, Policy, and the Integrity of Social Life.
Stanford University Press, ISBN: 978-0-8047-5237-4, 2010

2007
A Method For Discovering Values in Digital Games.
Proceedings of the 2007 DiGRA International Conference: Situated Play, 2007

A game design methodology to incorporate social activist themes.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

2006
Privacy and Contextual Integrity: Framework and Applications.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Ethics and children's information systems.
Proceedings of the Information Realities: Shaping the Digital Future for All, 2006

2005
New Design Methods for Activist Gaming.
Proceedings of the Digital Games Research Conference 2005, 2005

Values at play: design tradeoffs in socially-oriented game design.
Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

2004
Hackers and the contested ontology of cyberspace.
New Media Soc., 2004

2002
Users' conceptions of risks and harms on the web: a comparative study.
Proceedings of the Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, 2002

Users' conceptions of web security: a comparative study.
Proceedings of the Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, 2002

2001
Computer Security: Competing Concepts
CoRR, 2001

How Computer Systems Embody Values.
Computer, 2001

Trust: A Collision of Paradigms.
Proceedings of the Financial Cryptography, 2001

2000
Shaping the Web: Why the Politics of Search Engines Matters.
Inf. Soc., 2000

Defining the Web: The Politics of Search Engines.
Computer, 2000

1999
The Meaning of Anonymity in an Information Age.
Inf. Soc., 1999

Trust me, I'm accountable: trust and accountability online.
Proceedings of the CHI '99 Extended Abstracts on Human Factors in Computing Systems, 1999

1998
The cutting edge.
SIGCAS Comput. Soc., 1998

1997
Software Agents and User Autonomy.
Proceedings of the First International Conference on Autonomous Agents, 1997

1996
Bias in Computer Systems.
ACM Trans. Inf. Syst., 1996

User autonomy: who should control what and when?
Proceedings of the Conference on Human Factors in Computing Systems: Common Ground, 1996

1995
Minimizing bias in computer systems.
Proceedings of the Human Factors in Computing Systems, 1995

1994
Computing and Accountability.
Commun. ACM, 1994

1993
Discerning bias in computer systems.
Proceedings of the Human-Computer Interaction, 1993


  Loading...