Helen Nissenbaum

Cornell Tech

111 8th Avenue #302

New York, NY 10011

United States

Cornell Tech NYC

2 W Loop Rd

New York, NY 10044

United States

SCHOLARLY PAPERS

34

DOWNLOADS
Rank 3,069

SSRN RANKINGS

Top 3,069

in Total Papers Downloads

17,006

SSRN CITATIONS
Rank 5,084

SSRN RANKINGS

Top 5,084

in Total Papers Citations

81

CROSSREF CITATIONS

182

Scholarly Papers (34)

1.

Online Manipulation: Hidden Influences in a Digital World

4 Georgetown Law Technology Review 1 (2019)
Number of pages: 45 Posted: 08 Jan 2019 Last Revised: 11 Jan 2020
Daniel Susser, Beate Roessler, Helen Nissenbaum and Helen Nissenbaum
Penn State University, University of Amsterdam and Cornell Tech
Downloads 4,095 (3,477)
Citation 18

Abstract:

Loading...

manipulation, online manipulation, influence, autonomy, privacy, Cambridge Analytica

2.

Adnostic: Privacy Preserving Targeted Advertising

Proceedings Network and Distributed System Symposium, March 2010
Number of pages: 23 Posted: 20 Feb 2015
Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Helen Nissenbaum, Solon Barocas and Solon Barocas
Commission Nationale de L'informatique et des Libertés (CNIL), Princeton University, Stanford University, Cornell Tech and Cornell UniversityMicrosoft Research
Downloads 2,947 (6,086)

Abstract:

Loading...

privacy, software, advertising, tracking, online behavioral advertising, big data

3.

Technology, Autonomy, and Manipulation

Internet Policy Review 2019, 8(2). DOI: 10.14763/2019.2.1410
Number of pages: 22 Posted: 17 Jul 2019
Daniel Susser, Beate Roessler, Helen Nissenbaum and Helen Nissenbaum
Penn State University, University of Amsterdam and Cornell Tech
Downloads 1,562 (16,727)
Citation 6

Abstract:

Loading...

online manipulation, behavioral advertising, privacy, autonomy

4.

A Contextual Approach to Privacy Online

Daedalus 140 (4), Fall 2011: 32-48
Number of pages: 17 Posted: 20 Feb 2015
Helen Nissenbaum and Helen Nissenbaum
Cornell Tech
Downloads 1,209 (24,497)
Citation 11

Abstract:

Loading...

privacy, cyberlaw, contextual integrity, third-party tracking, privacy law

5.

Trust: A Collision of Paradigms

Number of pages: 12 Posted: 08 Mar 2001
L. Jean Camp, Cathleen McGrath, Helen Nissenbaum and Helen Nissenbaum
Indiana University Bloomington - School of Informatics and Computing, Loyola Marymount University and Cornell Tech
Downloads 985 (32,862)
Citation 4

Abstract:

Loading...

information technology

6.

Deregulating Collection: Must Privacy Give Way to Use Regulation?

Number of pages: 42 Posted: 28 Dec 2017
Helen Nissenbaum and Helen Nissenbaum
Cornell Tech
Downloads 755 (47,381)
Citation 6

Abstract:

Loading...

big data, data science, privacy, big data exceptionalism, information law, information regulation, privacy regulation

7.

On Notice: The Trouble with Notice and Consent

Proceedings of the Engaging Data Forum: The First International Forum on the Application and Management of Personal Electronic Information, October 2009
Number of pages: 7 Posted: 21 Feb 2015
Solon Barocas, Solon Barocas, Helen Nissenbaum and Helen Nissenbaum
Cornell UniversityMicrosoft Research and Cornell Tech
Downloads 677 (54,742)
Citation 3

Abstract:

Loading...

privacy, consent, big data, online behavioral advertising, tracking, cyberlaw, privacy policies

8.

Measuring Privacy: An Empirical Test Using Context To Expose Confounding Variables

Columbia Science and Technology Law Review, Forthcoming
Number of pages: 40 Posted: 01 Jan 2016 Last Revised: 08 Jun 2016
Kirsten Martin, Helen Nissenbaum and Helen Nissenbaum
University of Notre Dame and Cornell Tech
Downloads 540 (72,924)
Citation 9

Abstract:

Loading...

Westin, Contextual Integrity, privacy, sensitive information

9.

Privacy Interests In Public Records: An Empirical Investigation

Harvard Journal of Law & Technology, Forthcoming
Number of pages: 27 Posted: 28 Nov 2016 Last Revised: 11 Jul 2017
Kirsten Martin, Helen Nissenbaum and Helen Nissenbaum
University of Notre Dame and Cornell Tech
Downloads 498 (80,629)
Citation 1

Abstract:

Loading...

10.

Commons-Based Peer Production and Virtue

Journal of Political Philosophy, Vol. 14, No. 4, 2006
Number of pages: 26 Posted: 21 Feb 2015
Yochai Benkler, Helen Nissenbaum and Helen Nissenbaum
Harvard University and Cornell Tech
Downloads 396 (105,411)
Citation 5

Abstract:

Loading...

networks, ethics, technology, ethics of technology, ethics of computing, philosophy of technology, values in design

11.

Will Security Enhance Trust Online, or Supplant It?

Trust and Distrust Within Organizations: Emerging Perspectives, Enduring Questions, Eds. R. Kramer and K. Cook, Russell Sage Publications (2004): 155-188
Number of pages: 18 Posted: 21 Feb 2015
Helen Nissenbaum and Helen Nissenbaum
Cornell Tech
Downloads 316 (135,013)
Citation 3

Abstract:

Loading...

trust, digital ethics, ethics in computing, security, trust online, cyberlaw, organizations, networks

12.

Metadata in Context - An Ontological and Normative Analysis of the NSA's Bulk Telephony Metadata Collection Program

13 ISJLP 333 (2017)
Number of pages: 40 Posted: 27 Jun 2016 Last Revised: 27 Dec 2017
Paula Kift, Helen Nissenbaum and Helen Nissenbaum
New York University (NYU) and Cornell Tech
Downloads 312 (136,825)

Abstract:

Loading...

Metadata, Privacy, Contextual Integrity, NSA, Surveillance, Fourth Amendment

13.

Trackmenot: Resisting Surveillance in Web Search

Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, Eds. I. Kerr, C. Lucock, and V. Steeves, Oxford: Oxford University Press, 2009
Number of pages: 23 Posted: 22 Feb 2015
Helen Nissenbaum, Helen Nissenbaum and Howe Daniel
Cornell Tech and School of Creative Media
Downloads 297 (144,097)
Citation 1

Abstract:

Loading...

privacy, web search, obfuscation, cookies, software, privacy law, ethics in technology, trackmenot, search engines

14.

Securing Trust Online: Wisdom or Oxymoron?

Boston University Law Review, June 2001 Volume 81, No.3 635-664. (Reprinted in Virtual Publics: Policy and Community in an Electronic Age, Ed. B. Kolko, New York: Columbia University Press, 1983.)
Number of pages: 31 Posted: 05 Mar 2015
Helen Nissenbaum and Helen Nissenbaum
Cornell Tech
Downloads 246 (174,107)
Citation 5

Abstract:

Loading...

trust, cyberlaw, security, ethics, technology, digital trust, privacy,

15.

Sustaining Privacy and Open Justice in the Transition to Online Court Records: A Multidisciplinary Inquiry

Maryland Law Review, Vol. 71, 2012
Number of pages: 76 Posted: 19 Jul 2012
Amanda Conley, Anupam Datta, Helen Nissenbaum, Helen Nissenbaum and Divya Sharma
O’Melveny & Myers, LLP, Carnegie Mellon University - School of Computer Science, Cornell Tech and Carnegie Mellon University - Department of Electrical and Computer Engineering
Downloads 242 (176,857)
Citation 1

Abstract:

Loading...

privacy, contextual integrity, court records, electronic court records, court records online

16.

Disaster Privacy/Privacy Disaster

TPRC47: The 47th Research Conference on Communication, Information and Internet Policy 2019
Number of pages: 20 Posted: 29 Jul 2019
University of Illinois at Urbana-Champaign, New York University (NYU), University of California, Berkeley, Cornell Tech and University of California, Berkeley - Department of Electrical Engineering & Computer Sciences (EECS)International Computer Science Institute (ICSI)
Downloads 236 (181,207)
Citation 1

Abstract:

Loading...

privacy, contextual integrity, disasters, emergency communications

17.

What Is It About Location?

Berkeley Technology Law Journal, Vol. 35, No. 1, 2020
Number of pages: 76 Posted: 06 May 2019 Last Revised: 03 Aug 2020
Kirsten Martin, Helen Nissenbaum and Helen Nissenbaum
University of Notre Dame and Cornell Tech
Downloads 230 (185,680)

Abstract:

Loading...

18.

Privacy and Contextual Integrity: Framework and Applications

Showcased in "The Logic of Privacy," The Economist, January 2007, Proceedings of the IEEE Symposium on Security and Privacy, May 2006
Number of pages: 15 Posted: 21 Feb 2015
Adam D Barth, Anupam Datta, John Mitchell, Helen Nissenbaum and Helen Nissenbaum
Stanford University, Carnegie Mellon University - School of Computer Science, Stanford University and Cornell Tech
Downloads 187 (224,500)
Citation 15

Abstract:

Loading...

privacy, contextual integrity, privacy policy, privacy law, cyberlaw, computing ethics, ethics

19.

Digital Disaster, Cyber Security and the Copenhagen School

International Studies Quarterly, 53, 2009: 1155-1175
Number of pages: 21 Posted: 21 Feb 2015
Lene Hansen, Helen Nissenbaum and Helen Nissenbaum
University of Copenhagen and Cornell Tech
Downloads 156 (261,780)
Citation 4

Abstract:

Loading...

security, cyber security, network security, estonia, cyber war, copenhagen school

20.

Where Computer Security Meets National Security

Cybercrime, Eds. Jack Balkin, James Grimmelmann, Eddan Katz, Nimrod Kozlovski, Shlomit Wagman, and Tal Zarsky, New York, NYU Press, 2007, Ethics and Information Technology, Vol. 7, No. 2, June 2005, 61-73
Number of pages: 13 Posted: 21 Feb 2015
Helen Nissenbaum and Helen Nissenbaum
Cornell Tech
Downloads 147 (274,578)
Citation 1

Abstract:

Loading...

security, computing, vulnerability, networks, copenhagen school, national security, securitization,

21.

Analyzing Privacy Policies Using Contextual Integrity Annotations

Number of pages: 18 Posted: 01 Oct 2018
Yan Shvartzshnaider, Noah Apthorpe, Nick Feamster, Helen Nissenbaum and Helen Nissenbaum
New York University (NYU), Colgate University, University of Chicago and Cornell Tech
Downloads 142 (282,097)
Citation 6

Abstract:

Loading...

Privacy policies, contextual integrity, annotation

22.

An Analysis of Google Log Retention Policies

2011. The Journal of Privacy and Confidentiality 3(1), 3-26
Number of pages: 24 Posted: 20 Feb 2015
Vincent Toubiana, Helen Nissenbaum and Helen Nissenbaum
Commission Nationale de L'informatique et des Libertés (CNIL) and Cornell Tech
Downloads 135 (293,420)
Citation 2

Abstract:

Loading...

search engines, google, privacy, privacy law, anonymization, cyberlaw, search logs

23.

Vernacular Resistance to Data Collection and Analysis: A Political Theory

First Monday, 16(5), May 2011
Number of pages: 25 Posted: 20 Feb 2015
Helen Nissenbaum, Helen Nissenbaum and Finn Brunton
Cornell Tech and New York University (NYU)
Downloads 111 (338,225)
Citation 1

Abstract:

Loading...

obfuscation, privacy, tracking, privacy law, bittorrent, data collection, data mining

24.

Hackers and the Contested Ontology of Cyberspace

New Media and Society, 6(2), 2004: 195-217
Number of pages: 23 Posted: 04 Mar 2015
Helen Nissenbaum and Helen Nissenbaum
Cornell Tech
Downloads 101 (360,221)
Citation 1

Abstract:

Loading...

hacking, cyberlaw, cybercrime, ontology, media, ethics, computer ethics

25.

Learner Privacy in MOOCs and Virtual Education

Number of pages: 28 Posted: 03 Jan 2019
Elana Zeide, Helen Nissenbaum and Helen Nissenbaum
University of California, Los Angeles and Cornell Tech
Downloads 98 (367,384)

Abstract:

Loading...

Adaptive Learning, Coursera, Ed Tech, Education, edX, E-Learning, Embedded Assessment, FERPA, Intellectual Privacy, Learner Privacy, Learning Environments, Massive Open Online Courses, Personalized Learning, Personalised Learning [Sic], School, Student Privacy, Udacity, Virtual Learning Environment

26.

From Preemption to Circumvention: If Technology Regulates Why Do We Need Regulation (and Vice Versa)?

Berkeley Technology Law Journal, Vol. 26, No. 3, 2011
Number of pages: 22 Posted: 11 Feb 2015
Helen Nissenbaum and Helen Nissenbaum
Cornell Tech
Downloads 97 (369,715)
Citation 2

Abstract:

Loading...

privacy, law, policy, technology, technology law, ethics

27.

Context-Dependent Expectations of Privacy in Self-Generated Mobile Health Data

Number of pages: 51 Posted: 31 Jan 2018
Heather Patterson, Helen Nissenbaum and Helen Nissenbaum
Intel Labs and Cornell Tech
Downloads 87 (395,448)
Citation 1

Abstract:

Loading...

privacy, law, trust, mobile health

28.

The Concept of Handoff as a Model for Ethical Analysis and Design

The Oxford Handbook of Ethics of AI Edited by Markus D. Dubber, Frank Pasquale, and Sunit Das
Number of pages: 20 Posted: 18 Feb 2021
Deirdre K. Mulligan, Helen Nissenbaum and Helen Nissenbaum
University of California, Berkeley - School of Information and Cornell Tech
Downloads 77 (424,743)

Abstract:

Loading...

handoff analytical model, sociotechnical systems, automation, computational systems, human tasks, AI, ethical analysis

29.

Stewardship of Privacy or Private Capture of a Public Value – a Note

Number of pages: 22 Posted: 24 Jul 2022
Helen Nissenbaum and Helen Nissenbaum
Cornell Tech
Downloads 51 (520,266)

Abstract:

Loading...

privacy,ethics,contextual integrity

30.

Through the Handoff Lens: Competing Visions of Autonomous Futures

Berkeley Technology Law Journal, Vol. 35, 2020
Number of pages: 76 Posted: 13 Jul 2021
Jake Goldenfein, Deirdre K. Mulligan, Helen Nissenbaum, Helen Nissenbaum and Wendy Ju
Melbourne Law School - University of Melbourne, University of California, Berkeley - School of Information, Cornell Tech and Cornell University - Cornell Tech NYC
Downloads 49 (529,113)

Abstract:

Loading...

Autonomous Vehicles, Handoff, Philosophy of Technology, Connected Cars, Driver Assist, Values

31.

New Research Norms for a New Medium

In The Commodification of Information, Eds. N. Elkin-Koren and N. Netanel, The Hague: Kluwer Academic Press, 2002. 433-457
Number of pages: 26 Posted: 05 Mar 2015
Helen Nissenbaum and Helen Nissenbaum
Cornell Tech
Downloads 25 (664,006)
Citation 1

Abstract:

Loading...

research, pedagogy, scientific research, digital research, ethics, cyberlaw, information

32.

Facial Recognition Technology: A Survey of Policy and Implementation Issues

Center for Catastrophe Preparedness and Response, New York University
Posted: 23 Jul 2009
Lucas D. Introna, Helen Nissenbaum and Helen Nissenbaum
Lancaster University and Cornell Tech

Abstract:

Loading...

facial recognition technology, biometrics, security, privacy, surveillance

33.

Shaping the Web: Why the Politics of Search Engines Matters

Information Society, Vol. 16, No. 3
Posted: 03 May 2000 Last Revised: 12 Oct 2015
Lucas D. Introna, Helen Nissenbaum and Helen Nissenbaum
Lancaster University and Cornell Tech

Abstract:

Loading...

34.

Protecting Privacy in an Information Age: The Problem of Privacy in Public

Law and Philosophy, 1998
Posted: 09 Nov 1998
Helen Nissenbaum and Helen Nissenbaum
Cornell Tech

Abstract:

Loading...