The SCEAS System
Navigation Menu

Search the dblp DataBase


Helen Nissenbaum: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Batya Friedman, Helen Nissenbaum
    Software Agents and User Autonomy. [Citation Graph (0, 0)][DBLP]
    Agents, 1997, pp:466-469 [Conf]
  2. Mary Flanagan, Daniel C. Howe, Helen Nissenbaum
    Values at play: design tradeoffs in socially-oriented game design. [Citation Graph (0, 0)][DBLP]
    CHI, 2005, pp:751-760 [Conf]
  3. Batya Friedman, W. David Hurley, Daniel C. Howe, Edward W. Felten, Helen Nissenbaum
    Users' conceptions of web security: a comparative study. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2002, pp:746-747 [Conf]
  4. Batya Friedman, W. David Hurley, Daniel C. Howe, Helen Nissenbaum, Edward W. Felten
    Users' conceptions of risks and harms on the web: a comparative study. [Citation Graph (0, 0)][DBLP]
    CHI Extended Abstracts, 2002, pp:614-615 [Conf]
  5. Batya Friedman, Helen Nissenbaum
    Discerning bias in computer systems. [Citation Graph (0, 0)][DBLP]
    INTERCHI Adjunct Proceedings, 1993, pp:141-142 [Conf]
  6. Batya Friedman, Helen Nissenbaum
    Minimizing bias in computer systems. [Citation Graph (0, 0)][DBLP]
    CHI 95 Conference Companion, 1995, pp:444- [Conf]
  7. Mary Flanagan, Helen Nissenbaum
    A game design methodology to incorporate social activist themes. [Citation Graph (0, 0)][DBLP]
    CHI, 2007, pp:181-190 [Conf]
  8. Mary Flanagan, Helen Nissenbaum, Daniel C. Howe
    New Design Methods for Activist Gaming. [Citation Graph (0, 0)][DBLP]
    DIGRA Conf., 2005, pp:- [Conf]
  9. L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
    Trust: A Collision of Paradigms. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:82-96 [Conf]
  10. Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum
    Privacy and Contextual Integrity: Framework and Applications. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:184-198 [Conf]
  11. Helen Nissenbaum
    Computing and Accountability. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:1, pp:72-80 [Journal]
  12. Lucas D. Introna, Helen Nissenbaum
    Defining the Web: The Politics of Search Engines. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:1, pp:54-62 [Journal]
  13. Helen Nissenbaum
    How Computer Systems Embody Values. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:3, pp:118-120 [Journal]
  14. Helen Nissenbaum, Batya Friedman, Edward W. Felten
    Computer Security: Competing Concepts [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  15. Lucas D. Introna, Helen Nissenbaum
    Shaping the Web: Why the Politics of Search Engines Matters. [Citation Graph (0, 0)][DBLP]
    Inf. Soc., 2000, v:16, n:3, pp:- [Journal]
  16. Helen Nissenbaum
    The Meaning of Anonymity in an Information Age. [Citation Graph (0, 0)][DBLP]
    Inf. Soc., 1999, v:15, n:2, pp:- [Journal]
  17. Batya Friedman, Helen Nissenbaum
    Bias in Computer Systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst., 1996, v:14, n:3, pp:330-347 [Journal]

Search in 0.002secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002