PHIL 355E

Alex Donnell Brown

PHIL 355E

Reflective Writing Assignment

As I reflect on the work throughout the semester, I realize the importance of understanding ethical frameworks in cybersecurity and their application to real-world scenarios. Through this, I have gained a deeper appreciation for the complexities involved in protecting digital assets and user data, as welthe ethical considerations that must be taken into account. Because of this, there are topics, perspectives, or positions that I have engaged with in this course that I want to discuss further. The first of my reflections is focused on the topic of weaponized narratives and how they affect cybersecurity. I find it to be a compelling concept introduced by Jared Pier. Weaponized narratives are not just about misinformation but also about manipulating emotions and exploiting vulnerabilities in our cognitive and social systems. Through my case analysis of Facebook’s role in the 2016 U.S. election, my understanding of weaponized narratives deepened, and I began to realize the ethical responsibilities of tech companies in safeguarding information integrity and resisting manipulation. During the research, my prior knowledge of social media platforms and the impact they have was limited to the surface level. I discovered the underlying algorithms and strategies that amplify divisive content and reward emotional engagement. The event of the 2016 election made me realize the profound impact social media has on society and the importance of ethical considerations for tech companies. In turn, this course challenged my initial assumptions on my view of social media and weaponized narratives, leading me to see how platforms like Facebook are structured to reward emotional engagement and amplify divisive content, and highlighted the importance of platform accountability. Therefore, a major takeaway for me is that ethical responsibility lies not only with individuals but with the systems that shape how information is created and circulated. As weaponized narratives thrive in environments where algorithms favor outrage, transparency, and accountability are crucial to address the problem. Moreover, this has reshaped how I think about media consumption and civic responsibility in the digital age, encouraging me to approach information more critically and compassionately. As a society, we should challenge and combat these narratives, promote media literacy, and advocate responsible tech practices to build a more resilient and informed society. 

My second reflection is from a perspective that I engaged with in this course was the ethical tool virtue ethics and how it applies to real-world situations. Before starting this course, I thought virtue ethics were not as useful as other ethical principles, but I realized how wrong I was—especially in cybersecurity, where professionals need to embody virtues like integrity, honesty, and responsibility to safeguard sensitive information and protect against cyber threats. The ethical frameworks of deontology and utilitarianism focus on rules and consequences, respectively. Unlike deontology and utilitarianism, virtue ethics emphasizes the character and moral habits of individuals, which is crucial in building trust and maintaining ethical standards in the digital realm. Using this ethical approach helps me understand many dilemmas that were brought about by the course. One of these dilemmas is the Israel and Iran cyberwar. Through this case analysis, and using virtue ethics to analyze the case further, it showed more to the story. Before, I saw cyber warfare as just attacks, but my perception was wrong. Through virtue ethics, cyber warfare is not just about attacks, but also about the moral implications of these attacks. This challenged me to ask about the virtue ethics perspective when doing the case analysis. The ethical tool helped me see how virtue ethics could be applied in real-world situations, as I found it challenging to apply previously. As I applied virtue ethics to the cyber warfare case study, it showed that it’s important to have moral principles in cyber warfare, along with showing me that applying virtue ethics requires deep ethical and moral reflection. My takeaway from this is that it is essential to have moral values and ethical behavior, as virtue ethics shows me the importance of cybersecurity. Therefore, in complex situations where ethical considerations are paramount, virtue ethics helps cybersecurity professionals make decisions that align with moral values and promote overall well-being. 

A final reflection I had in this course was the importance of understanding different ethical frameworks. This helped me see that ethics is not just about following rules, but about understanding the reasoning behind them and applying them thoughtfully and consistently. This came from doing a case analysis on the story of Bill Sourour’s shame about writing code for a pharmaceutical quiz. Before, I believed that ethics in writing code came from following the rules and guidelines laid out for the project. However, this case study made me consider whether the project was ethical to begin with. Having done many coding classes and assignments, I was focused on the technical aspects rather than the ethical implications. This story spoke to me on a deeper and more personal level because the emphasis on doing what you are told can have ethical implications if you don’t consider the bigger picture. Meeting requirements, following instructions, and meeting deadlines made me understand and agree with Bill Sourour and his feelings of shame. The ethical dilemma of prioritizing project requirements over broader ethical considerations resonated deeply with me, reinforcing the importance of critical thinking in professional settings. If we disregard ethical considerations, we risk causing harm, compromising our integrity, and contributing to outcomes that benefit some at the expense of others—just as Sourour did when he found out the tragic consequences. This highlights the necessity of considering the broader impact and potential misuse of our work, even when fulfilling immediate obligations. The story and the case analysis instilled in me the concepts of moral sensitivity and moral courage. These two concepts are vital for ensuring ethical conduct in any profession. My takeaway from this case is understanding that technology has the potential to harm, mislead, or otherwise negatively impact people. This story emphasizes the need for software developers to be morally sensitive and willing to exercise moral courage even when facing pressure from clients or superiors.