{"id":207,"date":"2022-01-29T21:58:24","date_gmt":"2022-01-29T21:58:24","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=207"},"modified":"2023-12-08T11:54:04","modified_gmt":"2023-12-08T11:54:04","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/adamjohnson\/law-ethics\/phil-355e\/","title":{"rendered":"PHIL 355E"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><a href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/law-ethics\/phil-355e\/case-analysis-cyber-conflict\/\">Case Analysis: Cyber Conflict<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/law-ethics\/phil-355e\/case-analysis-google-street-view\/\">Case Analysis: Google Street View<\/a><\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n<h1 style=\"text-align: center\">Cybersecurity Ethics<\/h1>\n<p>This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical theories relate to these core issues.<\/p>\n<h1>Course Material<\/h1>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Reflective Writing<\/span><\/p>\n<p><span style=\"font-weight: 400\">I think one of the first topics or perspectives that I engaged in that left an impression would be the case analysis on professional ethics. Reading \u201cThe Code I\u2019m Still Ashamed Of\u201d by Bill Sourour made me really stop and think about how our actions can affect others and how we might not at first see the ethical implications of our decisions.\u00a0 With hindsight it\u2019s easy to say that the decision Sourour made was wrong and shouldn\u2019t have been made in the first place. That&#8217;s why he\u2019s writing about it, but it\u2019s a perfect example of how we should always be conscious of our decisions and actions on an ethical level.\u00a0 The takeaway from this story for me was that we should be conscious of our actions and what effect they could have on others.\u00a0 Something that we see as relevant might have devastating effects on someone else.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Another topic that I found interesting was the case analysis on privacy.\u00a0 We discussed the ethical methods of the implementation of Google Street View.\u00a0 Google was able to violate others&#8217; privacy without consent and didn\u2019t care that they were.\u00a0 Only after the fact did google make an effort to \u201ccorrect\u201d their mistakes allowing people to submit tickets to have their information removed.\u00a0 These actions by Google are very disturbing and show how far an Industry or company will go to do whatever they want without the fear of repercussions.\u00a0 Nobody will go to jail for violating millions of people\u2019s privacy. Google will just pay out some money and keep doing what they are doing pushing the limits of what they can get away with.\u00a0 The takeaway from this example is how society reacted to the Google Street View.\u00a0 In many countries and eventually in the USA people saw how Google was violating privacy, except that it was too late it had already been done and the main objections didn\u2019t come until after the damage was done.\u00a0 I think going into the future it will be interesting to see how society changes. Do we stand up against things like this or do they become so commonplace that companies just get away with it and the ethical standards of society change around technological advancements?\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">For my last reflection I think the most helpful thing I\u2019ve learned in this course is just looking at things ethically.\u00a0 I particularly liked Kant\u2019s categorical imperative and how we shouldn\u2019t make exceptions for ourselves and treat others the way we want to be treated.\u00a0 We should always respect others and consider them before we act in a way that could negatively affect someone else.\u00a0 While this seems like a very simple concept I don\u2019t see much of this happening in society today, we seem to be disconnected from thoughts of respect and everyone acts entitled and superior.\u00a0 I think the best example from Kant is the concept that even if something someone did had a positive result, if they did it for the wrong reasons it\u2019s still unethical.\u00a0 I think these types of decisions dominate our society today, we only care about others or act according to our own best interests and sometimes it might benefit someone else.\u00a0 Now that I have a better understanding of how to view ethical decisions I hope it affects my decision making and life into the future.\u00a0\u00a0<\/span><\/p>\n\n<ul class=\"wp-block-page-list\"><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/awards-and-recognitions\/\">Awards and Recognitions<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/blog\/\">Blog<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/capstone\/\">Capstone<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/contact\/\">Contact<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/crjs-405\/\">CRJS 405<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/cybersecurity-fundamentals\/\">Cybersecurity Fundamentals<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/cyse-300\/\">CYSE 300<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/cyse-301\/\">CYSE 301<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/cyse-368\/\">CYSE 368<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/cyse-406\/\">CYSE 406<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/cyse-407\/\">CYSE 407<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/cyse-494\/\">CYSE 494<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/ece-416\/\">ECE 416<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/ece-419\/\">ECE 419<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/experience\/\">Experience<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/ids-493\/\">IDS 493<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/it-cyse-200t-2\/\">IT\/CYSE 200T<\/a><\/li><li class=\"wp-block-pages-list__item has-child\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/law-ethics\/\">Law &amp; Ethics<\/a><ul class=\"wp-block-navigation__submenu-container\"><li class=\"wp-block-pages-list__item has-child \"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/law-ethics\/phil-355e\/\">PHIL 355E<\/a><ul class=\"wp-block-navigation__submenu-container\"><li class=\"wp-block-pages-list__item \"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/law-ethics\/phil-355e\/case-analysis-cyber-conflict\/\">Case Analysis: Cyber Conflict<\/a><\/li><li class=\"wp-block-pages-list__item \"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/law-ethics\/phil-355e\/case-analysis-google-street-view\/\">Case Analysis: Google Street View<\/a><\/li><\/ul><\/li><\/ul><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/resume\/\">Resume<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/skills-2\/\">Skill 1<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/skill-2\/\">Skill 2<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/skill-3\/\">Skill 3<\/a><\/li><li class=\"wp-block-pages-list__item\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/it-cyse-200t\/\">Tech &amp; Society<\/a><\/li><li class=\"wp-block-pages-list__item menu-item-home\"><a class=\"wp-block-pages-list__item__link\" href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/\">Welcome<\/a><\/li><\/ul>","protected":false},"excerpt":{"rendered":"<p>Case Analysis: Cyber Conflict Case Analysis: Google Street View Cybersecurity Ethics This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/adamjohnson\/law-ethics\/phil-355e\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">PHIL 355E<\/span><\/a><\/p>\n","protected":false},"author":23385,"featured_media":0,"parent":93,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/pages\/207"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/users\/23385"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":6,"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":323,"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/pages\/207\/revisions\/323"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/pages\/93"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/adamjohnson\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}