Helen Nissenbaum | |
---|---|
![]() Nissenbaum in 2008 | |
Alma mater | Stanford University University of the Witwatersrand |
Known for | Contextual integrity |
Awards | Barwise Prize (2014) |
Scientific career | |
Fields | Information science, Human–Computer Interaction, Privacy, Digital Media |
Institutions | Cornell Tech |
Website | nissenbaum |
Helen Nissenbaum is professor of information science at Cornell Tech. [1] She is best known for the concept of "contextual integrity" and her work on privacy, privacy law, trust, and security in the online world. Specifically, contextual integrity has influenced the United States government's thinking about privacy issues. [2] [3] Nissenbaum co-created the TrackMeNot and AdNauseam browser extensions, which demonstrated the use of obfuscation to maintain user privacy.
Nissenbaum studied mathematics and philosophy at the University of the Witwatersrand in South Africa, graduating in 1976. She then went on to study at Stanford University, where she completed a Master's in the social science of education in 1978, and a PhD in philosophy in 1983. [1]
Nissenbaum has received grants from the National Science Foundation, Air Force Office of Scientific Research, Ford Foundation, the U.S. Department of Health and Human Services Office of the National Coordinator, and the Defense Advanced Research Projects Agency. [4]
She has also contributed to several browser extensions for Firefox and Chrome. TrackMeNot was the first extension that she co-created in 2006. [5] TrackMeNot uses the notion of privacy through obfuscation to protect the user against online identification, surveillance, and profiling. Adnostic [6] was created in 2013 to enable online ad targeting without compromising user's privacy. [7] [8] [9] AdNauseam, created in 2014, follows a similar obfuscation strategy for online ads. [10]
Nissenbaum has written or edited a number of papers [11] and books:
Privacy is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data privacy or data protection.
Center for Democracy & Technology (CDT) is a Washington, D.C.–based 501(c)(3) nonprofit organization that advocates for digital rights and freedom of expression. CDT seeks to promote legislation that enables individuals to use the internet for purposes of well-intent, while at the same time reducing its potential for harm. It advocates for transparency, accountability, and limiting the collection of personal information.
Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy . Privacy concerns have been articulated from the beginnings of large-scale computer sharing and especially relate to mass surveillance.
A privacy policy is a statement or legal document that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. Personal information can be anything that can be used to identify an individual, not limited to the person's name, address, date of birth, marital status, contact information, ID issue, and expiry date, financial records, credit information, medical history, where one travels, and intentions to acquire goods and services. In the case of a business, it is often a statement that declares a party's policy on how it collects, stores, and releases personal information it collects. It informs the client what specific information is collected, and whether it is kept confidential, shared with partners, or sold to other firms or enterprises. Privacy policies typically represent a broader, more generalized treatment, as opposed to data use statements, which tend to be more detailed and specific.
John Richard Perry is a professor at Stanford University and the University of California, Riverside. He has made significant contributions to philosophy in the fields of philosophy of language, metaphysics, and philosophy of mind. He is known primarily for his work on situation semantics, reflexivity, indexicality, personal identity, and self-knowledge.
Contextual advertising is a form of targeted advertising for advertisements appearing on websites or other digital platforms, such as content displayed in mobile browsers. Contextual advertising is also called "In-Text" advertising or "In-Context" technology. Contextual targeting involves the use of linguistic factors to control the placement of advertising material. The advertisements are selected and delivered by automated systems, taking into consideration the context of a user's search or browsing behavior.
Privacy-enhancing technologies (PET) are technologies that embody fundamental data protection principles by minimizing personal data use, maximizing data security, and empowering individuals. PETs allow online users to protect the privacy of their personally identifiable information (PII), which is often provided to and handled by services or applications. PETs use techniques to minimize an information system's possession of personal data without losing functionality. Generally speaking, PETs can be categorized as either hard or soft privacy technologies.
Targetedadvertising or data-driven marketing is a form of advertising, including online advertising, that is directed towards an audience with certain traits, based on the product or person the advertiser is promoting.
Web tracking is the practice by which operators of websites and third parties collect, store and share information about visitors' activities on the World Wide Web. Analysis of a user's behaviour may be used to provide content that enables the operator to infer their preferences and may be of interest to various parties, such as advertisers. Web tracking can be part of visitor management.
Jonathan Mayer is an American computer scientist and lawyer. He is an Associate Professor of Computer Science and Public Affairs at Princeton University affiliated with the Center for Information Technology Policy, and was previously a PhD student in computer science at Stanford University and a fellow at the Center for Internet and Society and the Center for International Security and Cooperation. During his graduate studies he was a consultant at the California Department of Justice.
Corporate surveillance describes the practice of businesses monitoring and extracting information from their users, clients, or staff. This information may consist of online browsing history, email correspondence, phone calls, location data, and other private details. Acts of corporate surveillance frequently look to boost results, detect potential security problems, or adjust advertising strategies. These practices have been criticized for violating ethical standards and invading personal privacy. Critics and privacy activists have called for businesses to incorporate rules and transparency surrounding their monitoring methods to ensure they are not misusing their position of authority or breaching regulatory standards.
Cross-device tracking is technology that enables the tracking of users across multiple devices such as smartphones, television sets, smart TVs, and personal computers.
Contextual integrity is a theory of privacy developed by Helen Nissenbaum and presented in her book Privacy In Context: Technology, Policy, and the Integrity of Social Life. It comprises four essential descriptive claims:
Surveillance capitalism is a concept in political economics which denotes the widespread collection and commodification of personal data by corporations. This phenomenon is distinct from government surveillance, although the two can be mutually reinforcing. The concept of surveillance capitalism, as described by Shoshana Zuboff, is driven by a profit-making incentive, and arose as advertising companies, led by Google's AdWords, saw the possibilities of using personal data to target consumers more precisely.
Human rightsandencryption are often viewed as interlinked. Encryption can be a technology that helps implement basic human rights. In the digital age, the freedom of speech has become more controversial; however, from a human rights perspective, there is a growing awareness that encryption is essential for a free, open, and trustworthy Internet.
Search engine privacy is a subset of internet privacy that deals with user data being collected by search engines. Both types of privacy fall under the umbrella of information privacy. Privacy concerns regarding search engines can take many forms, such as the ability for search engines to log individual search queries, browsing history, IP addresses, and cookies of users, and conducting user profiling in general. The collection of personally identifiable information (PII) of users by search engines is referred to as tracking.
Indiscriminate monitoring is the mass monitoring of individuals or groups without the careful judgement of wrong-doing. This form of monitoring could be done by government agencies, employers, and retailers. Indiscriminate monitoring uses tools such as email monitoring, telephone tapping, geo-locations, health monitoring to monitor private lives. Organizations that conduct indiscriminate monitoring may also use surveillance technologies to collect large amounts of data that could violate privacy laws or regulations. These practices could impact individuals emotionally, mentally, and globally. The government has also issued various protections to protect against indiscriminate monitoring.
Beate Roessler is a German philosopher and researcher who is a Professor of Ethics at the University of Amsterdam.
AdNauseam is a free and open-source web browser extension that blocks Internet ads while automatically simulating clicks on them. Created in 2014 by Daniel Howe, Helen Nissenbaum, and Mushon Zer-Aviv, the software is a digital rights advocacy project that counters surveillance and data profiling employed by online advertising networks.
Some critics questioned TrackMeNot's effectiveness against machine-learning attacks, some cast it as a misuse of bandwidth, and others found it unethical.