•  1897
    I suggest that the social justice issues raised by Internet regulation can be exposed and examined by using a methodology adapted from that described by John Rawls in 'A Theory of Justice'. Rawls' theory uses the hypothetical scenario of people deliberating about the justice of social institutions from the 'original position' as a method of removing bias in decision-making about justice. The original position imposes a 'veil of ignorance' that hides the particular circumstances of individuals fr…Read more
  •  70
    A bundle of software rights and duties
    Ethics and Information Technology 13 (3): 185-197. 2011.
    Like the ownership of physical property, the issues computer software ownership raises can be understood as concerns over how various rights and duties over software are shared between owners and users. The powers of software owners are defined in software licenses, the legal agreements defining what users can and cannot do with a particular program. To help clarify how these licenses permit and restrict users’ actions, here I present a conceptual framework of software rights and duties that is …Read more
  •  49
    The Social Disutility of Software Ownership
    Science and Engineering Ethics 17 (3): 485-502. 2011.
    Software ownership allows the owner to restrict the distribution of software and to prevent others from reading the software’s source code and building upon it. However, free software is released to users under software licenses that give them the right to read the source code, modify it, reuse it, and distribute the software to others. Proponents of free software such as Richard M. Stallman and Eben Moglen argue that the social disutility of software ownership is a sufficient justification for …Read more
  •  6
    Should Internet Researchers Use Ill-Gotten Information?
    Science and Engineering Ethics 24 (4): 1221-1240. 2018.
    This paper describes how the ethical problems raised by scientific data obtained through harmful and immoral conduct may also emerge in cases where data is collected from the Internet. It describes the major arguments for and against using ill-gotten information in research, and shows how they may be applied to research that either collects information about the Internet itself or which uses data from questionable or unknown sources on the Internet. Three examples demonstrate how researchers add…Read more
  •  1
    Doxing: a conceptual analysis
    Ethics and Information Technology 18 (3): 199-210. 2016.
  • Booters: can anything justify distributed denial-of-service attacks for hire?
    with José Jair Santanna, Ricardo de Oliveira Schmidt, Lisandro Zambenedetti Granville, and Aiko Pras
    Journal of Information, Communication and Ethics in Society 15 (1): 90-104. 2017.