•  29
    Derivative Works, Original Value
    Philosophy in the Contemporary World 19 (1): 44-55. 2012.
    Many arguments offered by the free culture movement emphasize the ways in which new works rely on works, which have gone before, the discoveries and data of other scientists, and a general stock of common knowledge. An exammation of the ways in which old works mform new works will show that drawmg on previous works is a necessary and inevitable part of the act of creation. Despite the negative connotations surrounding the label "derivative," all works are, in an important sense, derivative, and …Read more
  •  21
    The Incentives Argument Revisited: A Millean Account of Copyright
    Southern Journal of Philosophy 52 (2): 163-183. 2014.
    The U.S. Constitution employs a utilitarian view in authorizing Congress to establish patents and copyrights. Let us refer to this way of justifying copyright as the Incentives Argument, or more extensively, the Incentives Argument for Intellectual Property Rights. While seemingly straightforward, the Incentives Argument has been widely criticized in philosophical literature on intellectual property. Scholars have come to prefer Neo-Lockean labor-desert accounts, grounding intellectual property …Read more
  •  60
    Data Science and Designing for Privacy
    Techné: Research in Philosophy and Technology 20 (1): 51-68. 2016.
    Unprecedented advances in the ability to store, analyze, and retrieve data is the hallmark of the information age. Along with enhanced capability to identify meaningful patterns in large data sets, contemporary data science renders many classical models of privacy protection ineffective. Addressing these issues through privacy-sensitive design is insufficient because advanced data science is mutually exclusive with preserving privacy. The special privacy problem posed by data analysis has so far…Read more
  •  35
    Information ethics in the context of smart devices
    with Brian Roux
    Ethics and Information Technology 15 (3): 183-194. 2013.
    In this paper, we employ Extended Cognition as a background for a series of thought experiments about privacy and common used information technology devices. Laptops and smart phones are now widely used devices, but current privacy standards do not adequately address the relationship between the owners of these devices and the information stored on them. Law enforcement treats laptops and smart phones are potential sources of information about criminal activity, but this treatment ignores the us…Read more