{"id":"https://openalex.org/W2896618207","doi":"https://doi.org/10.1145/3243734.3268996","title":"Achieving Meaningful Privacy in Digital Systems","display_name":"Achieving Meaningful Privacy in Digital Systems","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W2896618207","doi":"https://doi.org/10.1145/3243734.3268996","mag":"2896618207"},"language":"en","primary_location":{"id":"doi:10.1145/3243734.3268996","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3268996","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3268996","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3268996","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011149012","display_name":"Helen Nissenbaum","orcid":"https://orcid.org/0000-0002-6485-6997"},"institutions":[{"id":"https://openalex.org/I205783295","display_name":"Cornell University","ror":"https://ror.org/05bnh6r87","country_code":"US","type":"education","lineage":["https://openalex.org/I205783295"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Helen Nissenbaum","raw_affiliation_strings":["Cornell Tech, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"Cornell Tech, New York, NY, USA","institution_ids":["https://openalex.org/I205783295"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5011149012"],"corresponding_institution_ids":["https://openalex.org/I205783295"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1819693,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9501000046730042,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.6831823587417603},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6299244165420532},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.6031392812728882},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5914225578308105},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5692400932312012},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4893469214439392},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.43999430537223816},{"id":"https://openalex.org/keywords/engineering-ethics","display_name":"Engineering ethics","score":0.43387627601623535},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.4320612847805023},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.41435930132865906},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3417116403579712},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12205541133880615}],"concepts":[{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.6831823587417603},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6299244165420532},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.6031392812728882},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5914225578308105},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5692400932312012},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4893469214439392},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.43999430537223816},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.43387627601623535},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.4320612847805023},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.41435930132865906},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3417116403579712},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12205541133880615},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C126322002","wikidata":"https://www.wikidata.org/wiki/Q11180","display_name":"Internal medicine","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3243734.3268996","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3268996","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3268996","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3243734.3268996","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3268996","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3268996","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6700000166893005,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G5638686392","display_name":null,"funder_award_id":"CNS-1704527,SES1642563,SES1537324","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306142","display_name":"John D. and Catherine T. MacArthur Foundation","ror":"https://ror.org/00dxczh48"},{"id":"https://openalex.org/F4320332815","display_name":"Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2896618207.pdf","grobid_xml":"https://content.openalex.org/works/W2896618207.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2116878667","https://openalex.org/W3042284153","https://openalex.org/W576625533","https://openalex.org/W2132024542","https://openalex.org/W2476957992","https://openalex.org/W2118333568","https://openalex.org/W2111170006","https://openalex.org/W315296216","https://openalex.org/W2994243660","https://openalex.org/W4241527182"],"abstract_inverted_index":{"Across":[0],"a":[1,38,122,124],"range":[2],"of":[3,28,44,66,147],"subfields,":[4],"computer":[5],"scientists":[6],"and":[7,22,31,52,129,131],"engineers":[8],"have":[9,150],"responded":[10],"to":[11,14,40,59,113],"society's":[12],"call":[13],"safeguard":[15],"privacy":[16,29,45,67,97],"through":[17],"technology,":[18],"yielding":[19],"scientific":[20,86],"progress":[21],"impressive":[23],"innovation.":[24],"As":[25,116],"the":[26,73],"fields":[27],"science":[30],"engineering":[32],"mature,":[33],"however,":[34],"it's":[35],"worth":[36],"taking":[37],"moment":[39],"ask":[41],"what":[42,83],"ideas":[43,65],"explicitly":[46],"or":[47],"implicitly":[48],"underlie":[49],"this":[50,105],"work":[51,141],"whether":[53,61],"they":[54,62],"are":[55,88],"meaningful,":[56],"that":[57,68,96,149],"is":[58,79,102],"say,":[60],"map":[63],"onto":[64],"provoked":[69],"societal":[70],"concerns,":[71],"in":[72,104],"first":[74],"place.":[75],"If":[76],"not,":[77],"it":[78],"unclear,":[80],"at":[81],"best,":[82],"ends":[84],"these":[85],"efforts":[87],"actually":[89],"serving.":[90],"In":[91],"my":[92],"lecture,":[93],"I":[94,134],"argue":[95],"as":[98,121],"Contextual":[99],"Integrity":[100],"(CI)":[101],"meaningful":[103],"sense":[106],"-":[107],"philosophically":[108],"sound":[109],"while":[110],"being":[111],"accessible":[112],"formal":[114],"representation.":[115],"such,":[117],"CI":[118,148],"could":[119],"serve":[120],"much-needed":[123],"bridge":[125],"between":[126],"technical":[127,145],"approaches":[128],"ethical":[130],"policy":[132],"approaches.":[133],"will":[135],"identify":[136],"promising":[137],"directions":[138],"for":[139],"future":[140],"based":[142],"on":[143],"interesting":[144],"applications":[146],"already":[151],"emerged.":[152]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
