5 found
Order:
See also
Michael Falgoust
Tulane University (PhD)
  1. Ethical Issues Raised by Data Acquisition Methods in Digital Forensics Research.Brian Roux & Michael Falgoust - 2012 - Journal of Information Ethics 21 (1):40-60.
  2.  32
    Data Science and Designing for Privacy.Michael Falgoust - 2016 - Techné: Research in Philosophy and Technology 20 (1):51-68.
    Unprecedented advances in the ability to store, analyze, and retrieve data is the hallmark of the information age. Along with enhanced capability to identify meaningful patterns in large data sets, contemporary data science renders many classical models of privacy protection ineffective. Addressing these issues through privacy-sensitive design is insufficient because advanced data science is mutually exclusive with preserving privacy. The special privacy problem posed by data analysis has so far escaped even leading accounts of informational privacy. Here, I argue that (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  3.  23
    Derivative Works, Original Value.Michael Falgoust - 2012 - Philosophy in the Contemporary World 19 (1):44-55.
    Many arguments offered by the free culture movement emphasize the ways in which new works rely on works, which have gone before, the discoveries and data of other scientists, and a general stock of common knowledge. An exammation of the ways in which old works mform new works will show that drawmg on previous works is a necessary and inevitable part of the act of creation. Despite the negative connotations surrounding the label "derivative," all works are, in an important sense, (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  4.  16
    Information Ethics in the Context of Smart Devices.Brian Roux & Michael Falgoust - 2013 - Ethics and Information Technology 15 (3):183-194.
    In this paper, we employ Extended Cognition as a background for a series of thought experiments about privacy and common used information technology devices. Laptops and smart phones are now widely used devices, but current privacy standards do not adequately address the relationship between the owners of these devices and the information stored on them. Law enforcement treats laptops and smart phones are potential sources of information about criminal activity, but this treatment ignores the use of smart devices as extensions (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  12
    The Incentives Argument Revisited: A Millean Account of Copyright.Michael Falgoust - 2014 - Southern Journal of Philosophy 52 (2):163-183.
    The U.S. Constitution employs a utilitarian view in authorizing Congress to establish patents and copyrights. Let us refer to this way of justifying copyright as the Incentives Argument, or more extensively, the Incentives Argument for Intellectual Property Rights. While seemingly straightforward, the Incentives Argument has been widely criticized in philosophical literature on intellectual property. Scholars have come to prefer Neo-Lockean labor-desert accounts, grounding intellectual property rights in the author's natural ownership claims over his creations. Neo-Lockean accounts are thought to avoid (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark