{"id":207,"date":"2024-02-07T01:07:46","date_gmt":"2024-02-07T01:07:46","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=207"},"modified":"2025-08-09T03:34:00","modified_gmt":"2025-08-09T03:34:00","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyamgad\/law-ethics\/phil-355e\/","title":{"rendered":"PHIL 355E"},"content":{"rendered":"<h1 style=\"text-align: center\">Reflective Essay<\/h1>\n<p><span style=\"font-weight: 400\">Amgad Bin Shahbain<\/span><\/p>\n<p><span style=\"font-weight: 400\">PHIL 355E \u2013 Summer 2025<\/span><\/p>\n<p><span style=\"font-weight: 400\">Matthew Montoya<\/span><\/p>\n<p><span style=\"font-weight: 400\">This semester in PHIL 355E: Law and Ethics in Cybersecurity has enhanced my comprehension of the ethical dilemmas that emerge when technology interacts with society. By engaging in thorough case studies and exploring theoretical concepts, I have gained a more profound understanding of how ethical standards ought to inform professional choices in cybersecurity. Three specific topics whistleblowing, digital privacy, and cyberwarfare have transformed my perspective and will persist in shaping my professional behavior.<\/span><span style=\"font-weight: 400\"><\/p>\n<p><\/span><\/p>\n<p><b>Whistleblowing and Moral Loyalty<\/b><\/p>\n<p><span style=\"font-weight: 400\">In my examination of Chelsea Manning\u2019s choice to disclose the \u201cCollateral Murder\u201d video, I utilized Vandekerckhove\u2019s theory of public interest disclosure and Kantian ethics to evaluate whether her actions were ethically justified. Prior to this course, I often perceived whistleblowing mainly as a legal issue; either individuals adhered to the rules or they did not. This case prompted me to consider not just legality but also moral duty. Manning\u2019s decision, even though it breached secrecy laws, resonated with the Kantian notion of acting out of obligation and respecting individuals as ends in themselves. My perspective shifted to view whistleblowing as not a betrayal, but rather a potential demonstration of loyalty to society\u2019s fundamental values of truth, justice, and accountability, particularly when institutions neglect to uphold these principles. In the field of cybersecurity, where classified information and sensitive systems are prevalent, I now recognize that ethical duties can sometimes involve resisting the pressures of institutions, even at personal risk.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Conclusion: Loyalty is not synonymous with blind obedience; it is the bravery to uphold core values when systems falter.<\/span><\/p>\n<p><span style=\"font-weight: 400\"><br \/>\n<\/span><b>Privacy and Ethical System Design<\/b><\/p>\n<p><span style=\"font-weight: 400\">My analysis of Google Street View focused on privacy issues through Luciano Floridi\u2019s notion of informational privacy and a relational care ethics perspective. At first, I perceived privacy primarily as a matter of individual choice: anything visible in public can be justifiably captured by technology. This course helped me understand the more significant concern that people&#8217;s informational identities are linked to their dignity and autonomy, and technology has the potential to violate these without obtaining consent. I also came to realize that the design of systems itself carries ethical implications. James Grimmelmann\u2019s concept of privacy by design highlighted the necessity for ethical responsibility to be proactive rather than reactive. Google\u2019s opt-out model shifted the burden onto individuals, frequently those who are least able to safeguard themselves. This changed my perspective from \u201cusers need to be cautious\u201d to \u201cdesigners should inherently protect users.\u201d As I pursue a career in cybersecurity, I now view privacy as a responsibility of design, rather than just a matter of compliance.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">Key takeaway: Develop systems that inherently safeguard people&#8217;s ethics that should be integrated into the design, not just added later.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Cyberwarfare and Just War Principles<\/b><\/p>\n<p><span style=\"font-weight: 400\">In my examination of cyberattacks during the Israel-Hamas conflict, I utilized Michael Boylan\u2019s Just War Theory alongside Mariarosaria Taddeo\u2019s cyber-ethical principles. Previously, I regarded cyberwarfare as \u201cless harmful\u201d than traditional warfare because it often does not result in physical destruction. This course has shown me that digital operations targeting essential infrastructure can still breach fundamental moral principles such as discrimination and proportionality. Attacks on power grids, emergency alert systems, or banking networks frequently have indiscriminate consequences, generally inflicting more harm on civilians than on military targets. Taddeo\u2019s focus on dual-use infrastructure made me aware that in the realm of cyberspace, the distinction between civilian and military assets is often unclear; however, this does not diminish the ethical obligation to reduce harm. This has changed my view on the ethical responsibilities associated with cybersecurity defense and policy-making.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">Key Insight: In cyber conflicts, the lack of physical violence does not equate to the absence of harm ethical guidelines remain applicable.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Final Reflection<\/b><span style=\"font-weight: 400\">\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">The ethical perspectives I hold have been significantly shaped by these three topics. Manning\u2019s experience demonstrated that ethical responsibilities may require questioning authority. The Street View case emphasized the importance of designing ethically by anticipating potential risks beforehand. The investigation into cyberwarfare revealed that even operations that do not involve physical confrontation must follow strict ethical standards. As I advance in my cybersecurity career, I aim to remind myself that possessing technical expertise alone is not enough; careful ethical consideration must guide every choice I make. In a field where decisions can affect countless individuals, the true measure of professionalism is found not only in my skills but also in the choices I make that respect human dignity, equity, and the well-being of the community.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reflective Essay Amgad Bin Shahbain PHIL 355E \u2013 Summer 2025 Matthew Montoya This semester in PHIL 355E: Law and Ethics in Cybersecurity has enhanced my comprehension of the ethical dilemmas that emerge when technology interacts with society. By engaging in thorough case studies and exploring theoretical concepts, I have gained a more profound understanding of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyamgad\/law-ethics\/phil-355e\/\">Read More<\/a><\/div>\n","protected":false},"author":28608,"featured_media":0,"parent":93,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyamgad\/wp-json\/wp\/v2\/pages\/207"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyamgad\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyamgad\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyamgad\/wp-json\/wp\/v2\/users\/28608"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyamgad\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/cyamgad\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":445,"href":"https:\/\/sites.wp.odu.edu\/cyamgad\/wp-json\/wp\/v2\/pages\/207\/revisions\/445"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyamgad\/wp-json\/wp\/v2\/pages\/93"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyamgad\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}