Reflective Essay
Amgad Bin Shahbain
PHIL 355E – Summer 2025
Matthew Montoya
This semester in PHIL 355E: Law and Ethics in Cybersecurity has enhanced my comprehension of the ethical dilemmas that emerge when technology interacts with society. By engaging in thorough case studies and exploring theoretical concepts, I have gained a more profound understanding of how ethical standards ought to inform professional choices in cybersecurity. Three specific topics whistleblowing, digital privacy, and cyberwarfare have transformed my perspective and will persist in shaping my professional behavior.
Whistleblowing and Moral Loyalty
In my examination of Chelsea Manning’s choice to disclose the “Collateral Murder” video, I utilized Vandekerckhove’s theory of public interest disclosure and Kantian ethics to evaluate whether her actions were ethically justified. Prior to this course, I often perceived whistleblowing mainly as a legal issue; either individuals adhered to the rules or they did not. This case prompted me to consider not just legality but also moral duty. Manning’s decision, even though it breached secrecy laws, resonated with the Kantian notion of acting out of obligation and respecting individuals as ends in themselves. My perspective shifted to view whistleblowing as not a betrayal, but rather a potential demonstration of loyalty to society’s fundamental values of truth, justice, and accountability, particularly when institutions neglect to uphold these principles. In the field of cybersecurity, where classified information and sensitive systems are prevalent, I now recognize that ethical duties can sometimes involve resisting the pressures of institutions, even at personal risk.
Conclusion: Loyalty is not synonymous with blind obedience; it is the bravery to uphold core values when systems falter.
Privacy and Ethical System Design
My analysis of Google Street View focused on privacy issues through Luciano Floridi’s notion of informational privacy and a relational care ethics perspective. At first, I perceived privacy primarily as a matter of individual choice: anything visible in public can be justifiably captured by technology. This course helped me understand the more significant concern that people’s informational identities are linked to their dignity and autonomy, and technology has the potential to violate these without obtaining consent. I also came to realize that the design of systems itself carries ethical implications. James Grimmelmann’s concept of privacy by design highlighted the necessity for ethical responsibility to be proactive rather than reactive. Google’s opt-out model shifted the burden onto individuals, frequently those who are least able to safeguard themselves. This changed my perspective from “users need to be cautious” to “designers should inherently protect users.” As I pursue a career in cybersecurity, I now view privacy as a responsibility of design, rather than just a matter of compliance.
Key takeaway: Develop systems that inherently safeguard people’s ethics that should be integrated into the design, not just added later.
Cyberwarfare and Just War Principles
In my examination of cyberattacks during the Israel-Hamas conflict, I utilized Michael Boylan’s Just War Theory alongside Mariarosaria Taddeo’s cyber-ethical principles. Previously, I regarded cyberwarfare as “less harmful” than traditional warfare because it often does not result in physical destruction. This course has shown me that digital operations targeting essential infrastructure can still breach fundamental moral principles such as discrimination and proportionality. Attacks on power grids, emergency alert systems, or banking networks frequently have indiscriminate consequences, generally inflicting more harm on civilians than on military targets. Taddeo’s focus on dual-use infrastructure made me aware that in the realm of cyberspace, the distinction between civilian and military assets is often unclear; however, this does not diminish the ethical obligation to reduce harm. This has changed my view on the ethical responsibilities associated with cybersecurity defense and policy-making.
Key Insight: In cyber conflicts, the lack of physical violence does not equate to the absence of harm ethical guidelines remain applicable.
Final Reflection
The ethical perspectives I hold have been significantly shaped by these three topics. Manning’s experience demonstrated that ethical responsibilities may require questioning authority. The Street View case emphasized the importance of designing ethically by anticipating potential risks beforehand. The investigation into cyberwarfare revealed that even operations that do not involve physical confrontation must follow strict ethical standards. As I advance in my cybersecurity career, I aim to remind myself that possessing technical expertise alone is not enough; careful ethical consideration must guide every choice I make. In a field where decisions can affect countless individuals, the true measure of professionalism is found not only in my skills but also in the choices I make that respect human dignity, equity, and the well-being of the community.