Helen Nissenbaum
#15,891
Most Influential Person Now
American philosopher and information scientist
Helen Nissenbaum's AcademicInfluence.com Rankings
Helen Nissenbaumphilosophy Degrees
Philosophy
#2678
World Rank
#4496
Historical Rank
#932
USA Rank
Logic
#4381
World Rank
#5664
Historical Rank
#791
USA Rank
Download Badge
Philosophy
Helen Nissenbaum's Degrees
- PhD Philosophy Stanford University
- Bachelors Philosophy Barnard College
Similar Degrees You Can Earn
Why Is Helen Nissenbaum Influential?
(Suggest an Edit or Addition)According to Wikipedia, Helen Nissenbaum is professor of information science at Cornell Tech. She is best known for the concept of "contextual integrity" and her work on privacy, privacy law, trust, and security in the online world. Specifically, contextual integrity has influenced the United States government's thinking about privacy issues.
Helen Nissenbaum's Published Works
Published Works
- Privacy in Context - Technology, Policy, and the Integrity of Social Life (2009) (1913)
- Privacy as contextual integrity (2004) (1520)
- Bias in computer systems (1996) (830)
- Commons‐based Peer Production and Virtue* (2006) (724)
- Shaping the Web: Why the Politics of Search Engines Matters (2000) (657)
- A Contextual Approach to Privacy Online (2011) (514)
- Privacy and contextual integrity: framework and applications (2006) (459)
- Privacy in Context (2009) (367)
- Digital Disaster, Cyber Security, and the Copenhagen School (2009) (332)
- Adnostic: Privacy Preserving Targeted Advertising (2010) (330)
- Embodying values in technology: Theory and practice (2008) (263)
- Big Data’s End Run around Anonymity and Consent (2014) (208)
- Accountability in a computerized society (1997) (206)
- How computer systems embody values (2001) (188)
- Protecting Privacy in an Information Age: The Problem of Privacy in Public (1998) (172)
- Values at play: design tradeoffs in socially-oriented game design (2005) (167)
- Computing and accountability (1994) (153)
- Trackmenot: Resisting Surveillance in Web Search (2015) (152)
- Users' conceptions of web security: a comparative study (2002) (149)
- Mood swings associated with the ‘on—off’ phenomenon in Parkinson's disease (1987) (148)
- The Meaning of Anonymity in an Information Age (1999) (126)
- Vernacular Resistance to Data Collection and Analysis: A Political Theory (2011) (122)
- Where Computer Security Meets National Security1 (2005) (117)
- Hackers and the contested ontology of cyberspace (2004) (113)
- Online Manipulation: Hidden Influences in a Digital World (2018) (108)
- Big data's end run around procedural privacy protections (2014) (103)
- Defining the Web: The Politics of Search Engines (2000) (101)
- Toward an Approach to Privacy in Public: Challenges of Information Technology (1997) (101)
- Technology, Autonomy, and Manipulation (2019) (101)
- A game design methodology to incorporate social activist themes (2007) (85)
- Facial Recognition Technology A Survey of Policy and Implementation Issues (2009) (84)
- Software agents and user autonomy (1997) (83)
- Measuring Privacy: An Empirical Test Using Context To Expose Confounding Variables (2015) (82)
- On Notice: The Trouble with Notice and Consent (2009) (75)
- Securing Trust Online: Wisdom or Oxymoron? (2015) (74)
- Respecting Context to Protect Privacy: Why Meaning Matters (2018) (74)
- Will Security Enhance Trust Online, or Supplant It? (2004) (68)
- Values at Play in Digital Games (2014) (67)
- A Critical Look at Decentralized Personal Data Architectures (2012) (62)
- Computers, ethics & social values (1995) (61)
- Obfuscation: A User's Guide for Privacy and Protest (2015) (59)
- Privacy, Big Data, and the Public Good: Frameworks For Engagement (2014) (54)
- Can Trust be Secured Online? A theoretical perspective (1999) (53)
- Users' conceptions of risks and harms on the web: a comparative study (2002) (52)
- Grow-A-Game: A Tool for Values Conscious Design and Analysis of Digital Games (2011) (51)
- Contextual Integrity Up and Down the Data Food Chain (2019) (51)
- A Method For Discovering Values in Digital Games (2007) (48)
- Political and ethical perspectives on data obfuscation (2013) (36)
- Biosensing in context: Health privacy in a connected world (2016) (33)
- TrackMeNot: Enhancing the privacy of Web Search (2011) (32)
- Will computers dehumanize education? A grounded approach to values at risk (1998) (32)
- Trust: A Collision of Paradigms (2000) (31)
- Learning Privacy Expectations by Crowdsourcing Contextual Informational Norms (2016) (30)
- Contextual Integrity through the Lens of Computer Science (2017) (29)
- From Preemption to Circumvention: If Technology Regulates Why Do We Need Regulation (and Vice Versa)? (2011) (29)
- Sustaining Privacy and Open Justice in the Transition to Online Court Records: A Multidisciplinary Inquiry (2012) (25)
- Sustaining Privacy and Open Justice in the Transition to Online Court Records: A Multidisciplinary Inquiry (2012) (25)
- A Grounded Approach to Social and Ethical Concerns about Technology and Education (1998) (25)
- Accountability in an Algorithmic Society: Relationality, Responsibility, and Robustness in Machine Learning (2022) (24)
- Engineering Privacy and Protest: A Case Study of AdNauseam (2017) (24)
- The Internet in Public Life (2004) (21)
- Going against the (Appropriate) Flow: A Contextual Integrity Approach to Privacy Policy Analysis (2019) (20)
- Respect for context as a benchmark for privacy online: what it is and isn’t (2015) (19)
- User autonomy: who should control what and when? (1996) (19)
- An Analysis of Google Logs Retention Policies (2011) (19)
- Sustaining the Public Good Vision of the Internet: The Politics of Search Engines (1999) (18)
- Instructional Methods and Curricula for “Values Conscious Design” (2009) (17)
- Disaster privacy/privacy disaster (2020) (17)
- Learner Privacy in MOOCs and Virtual Education (2018) (16)
- Embodying Values in Design: Theory and Practice (2008) (16)
- Deregulating Collection: Must Privacy Give Way to Use Regulation? (2017) (16)
- Discerning bias in computer systems (1993) (16)
- Emotion and focus (1985) (16)
- The politics of search engines (2000) (16)
- Privacy, Big Data, and the Public Good: Statistical Framework (2014) (15)
- Trust me, I'm accountable: trust and accountability online (1999) (15)
- VACCINE: Using Contextual Integrity For Data Leakage Detection (2019) (13)
- Privacy Interests In Public Records: An Empirical Investigation (2017) (12)
- An Ethical Highlighter for People-Centric Dataset Creation (2020) (12)
- What Is It About Location? (2019) (11)
- Minimizing bias in computer systems (1995) (11)
- Digital Disaster, Cyber Security, and the (2009) (10)
- Computer Security: Competing Concepts (2001) (10)
- New Design Methods for Activist Gaming (2005) (10)
- Individual Acceptance of Using Health Data for Private and Public Benefit: Changes During the COVID-19 Pandemic (2021) (9)
- Computer Vision and Conflicting Values: Describing People with Automated Alt Text (2021) (9)
- Analyzing Privacy Policies Using Contextual Integrity Annotations (2018) (8)
- Values in Design - Building Bridges between RE, HCI and Ethics (2011) (8)
- Privacy Challenges in Patient-centric Health Information Systems (2010) (8)
- Users' conceptions of web security (2002) (7)
- Academy & the Internet (2004) (6)
- Gay Males and Electronic Health Records: Privacy Perceptions, Age, and Negotiating Stigma (2012) (6)
- Metadata in Context - An Ontological and Normative Analysis of the NSA's Bulk Telephony Metadata Collection Program (2016) (6)
- ORIGIN PRIVACY – PROTECTING PRIVACY IN THE BIG-DATA (2018) (5)
- Affective flattening in elderly patients. (1990) (5)
- Values at play: Tradeoffs in socially-oriented game design (2005) (4)
- Through the Handoff Lens: Competing Visions of Autonomous Futures (2020) (4)
- Ethics and children's information systems (2007) (4)
- The Concept of Handoff as a Model for Ethical Analysis and Design (2020) (4)
- Education in psychogeriatrics: the leap of the imagination (1989) (3)
- The cutting edge (1998) (3)
- Unaccounted Privacy Violation: A Comparative Analysis of Persistent Identification of Users Across Social Contexts (2020) (3)
- Hackers and the Battle for Cyberspace H (2002) (3)
- Interdisciplinary Approaches to Understanding Artificial Intelligence's Impact on Society (2020) (3)
- The VACCINE Framework for Building DLP Systems (2017) (2)
- Vernacular Resistance To Data Collection And Analysis: A Political Philosophy Of Obfuscation (Toronto Research Paper Condensed Draft) (2011) (2)
- Through the Handoff Lens : Are Autonomous Vehicles No-Win for Users (2019) (2)
- An Analysis of Google Log Retention Policies (2011) (1)
- New Research Norms for a New Medium (2015) (1)
- Groundwork for Values in Games (2014) (1)
- Lancaster University Management School Working Paper 2010 / 030 Facial Recognition Technology A Survey of Policy and Implementation Issues (2009) (1)
- Values at Play at Work (2014) (1)
- Commons‐Based Peer Production and Virtue (reprint) (2020) (1)
- Game Elements: The Language of Values (2014) (1)
- Content Based Do Not Track mechanism (2011) (1)
- 2 Phantom Access Agent : a Client-Side Approach to Personal Information Control (2003) (1)
- Academy and the Internet (Digital Formations, Vol. 12) (2004) (0)
- Uncovering Values at Play (2014) (0)
- Manipulation and the First Amendment Manipulation and the First Amendment (2022) (0)
- Accountings of Relationships (2012) (0)
- Overview of the Heuristic (2014) (0)
- ACM UMAP 2021 Keynote Addresses (2021) (0)
- Why is Obfuscation Necessary (2015) (0)
- Crowdsourcing Verifiable Contextual Integrity Norms (2016) (0)
- Stop the Spread: A Contextual Integrity Perspective on the Appropriateness of COVID-19 Vaccination Certificates (2022) (0)
- Respecting Context to Protect Privacy: Why Meaning Matters (2015) (0)
- Proceedings of the first international workshop for foundations of information ethics (FINE 99) (1999) (0)
- Ethics and Information Technology: Editorial (1999) (0)
- Achieving Meaningful Privacy in Digital Systems (2018) (0)
- Manipulated by the wealthy and the technologically adept , search engines may be presenting an increasingly distorted and limited view of the Web (0)
- CS 291 - Computers, Ethics, and Social Responsibility (1996) (0)
- The Values at Play Heuristic (2014) (0)
- Coalition Petition to the U.S. Department of Education to Amend 34 CFR Part 99 to Establish a Data Security Rule (2016) (0)
- Cryptography, Trust and Privacy: It's Complicated (2022) (0)
- Understanding Values at Play (2014) (0)
- Acknowledgement to reviewers (2010) (0)
- Will Obfuscation Work (2015) (0)
- Stewardship of Privacy or Private Capture of a Public Value – a Note (2022) (0)
- An Obfuscation Vocabulary (2015) (0)
- Crowdsourced, Actionable and Verifiable Contextual Informational Norms (2016) (0)
- PART I: CONCEPTUAL FRAMEWORK (2020) (0)
- Reflections on Values at Play (2014) (0)
- Privacy, Big Data, and the Public Good: Dedication (2014) (0)
- Priority for discoveries: challenges of electronic publication to research norms, practices and values (1998) (0)
- Is Obfuscation Justified (2015) (0)
This paper list is powered by the following services:
Other Resources About Helen Nissenbaum
What Schools Are Affiliated With Helen Nissenbaum?
Helen Nissenbaum is affiliated with the following schools: