Cybersecurity Ethics
This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyber-warfare. Students will gain a broad understanding of central issues in cyber ethics and the ways that fundamental ethical theories relate to these core issues.
Course Material
Throughout the duration of this semester, I have engaged with numerous thought-provoking ethical issues involving security, technology, and human rights. The three issues that have particularly impacted my understanding are: The ethics of cyberwarfare, the outcomes of privacy in the digital world, and the ethical considerations of whistleblowing. Each of these topics have deepened my ethical reasoning by challenging me to look further than surface-level outcomes and examine the long-term effects, moral obligations, and underlying values. Below, is a collection of how my views have evolved for each topic and what I hope to carry forward.
Cyberwarfare and Deontological Ethics
Prior to this module, cyber-conflict to me involved hacking or stealing data. I did not understand the impact that it can cause especially as a weapon between other countries. Now, I realize cyberattacks can hurt people just like traditional warfare can by compromising critical infrastructure needed for daily life like water systems and power grids. One thing that stood out to me was how complicated it is to decide if a cyberattack is ethically justified or not ethically justified. The lack of physical violence doesn’t mean harm wasn’t done. The long-term effects can include lack of trust and safety which can lead to even worse conflicts in the future. I am still trying to figure out how countries should respond to these attacks in a way that doesn’t make things worse or is overall fair. Cyberconflict lacks clear rules and oversight, and it seems very difficult to know where to draw the line.
Boylan highlights the absence of transparency and the blurred line between specified
targets and civilians straying away from the core principles in the Just War Theory. While
Taddeo strengthens this theory by declaring the same level of importance of moral reasoning in
cyber war to physical war. Neglecting our moral obligations to human lives and the digital
infrastructure essential for survival violates the ethical obligations of Deontology. For this
reason, the cyberwar between Israel and Iran does not meet any ethical justification and is
considered unjust.
Privacy and Utilitarian Ethics
Prior to studying the ethics in this course, I thought that if something was public, it did not matter if it was recorded. I only associated privacy with private spaces. With the help of Floridi’s concept of information friction, I am able to put into perspective how flawed my way of thinking was. I can now appreciate the proper control and transparency of data privacy and how it respects the well-being of human rights. Privacy is more than just a preference. It is our basic human right that lets us control what we share. Whether it is social, financial, or personal, everyone needs this sense of security and personal space. If every mistake, thought, or moment was broadcasted to the public, our lives would be miserable. Privacy allows us to make choices, reflect on our actions, and to grow without fearing judgement. It gives us the clarity to make decisions, even bad ones, without the pressure of constantly being criticized. If someone does something to act immorally but not illegally, they still deserve privacy.
Moral responsibility is a framework in place to protect all. As new tech innovations arise, the complex data collections methods continue to develop. Major tech corporations must uphold their ethical responsibility to honor the value of every person. Respect can exist without agreement of one’s actions. One bad decision does not represent who a person truly is. Everyone is different and we all have moments we regret, and these moments do not define our identity entirely. This doesn’t imply disregarding consequences though. However, I believe these consequences should also happen in private between the parties that are directly involved. Public shaming usually inflicts more pain, especially in the mental aspect. Mistakes are natural as human beings, and privacy gives us the opportunity to move forward.
Whistleblowing and Contractarian Loyalty
Prior to this module, I looked at whistleblowing from a simple, more surface level perspective. Either you tell the truth and suffer the consequences or be compliant to workplace obligations to ensure the safety of your career. Despite the opposing viewpoints or even if an organization was operating illegally, I thought loyalty meant staying quiet and doing your job. After learning further, loyalty does not always mean you have to be silent. In fact, in some cases the most loyal thing to do is to speak up especially if people are in danger. As a whistleblower, you’re not just going against your company, but actually trying to benefit them in the future as the mission is to uphold the organization’s foundational values. I am still trying to figure out when the right time it is to blow the whistle though. Every case is complex and has its own different ethical dilemmas involved. It is hard to know when to take the risk especially when it usually does not end in favor of the whistleblower. From this module, I’ve learned that silence can sometimes cause even more damage than speaking out.
Contractarian ethics calls for need to analyze institutions not on their power, but the moral responsibility of their people. Real loyalty sometimes requires standing up for what is right even if that sacrifices your personal image or well-being. Ultimately the benefit for many outweighs the benefit for one. Manning valued truth and justice over authority reminding us of the importance of governments to uphold their foundational beliefs.