{"id":207,"date":"2023-09-13T16:15:32","date_gmt":"2023-09-13T16:15:32","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=207"},"modified":"2024-11-22T01:07:51","modified_gmt":"2024-11-22T01:07:51","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ejcyber\/law-ethics\/phil-355e\/","title":{"rendered":"PHIL 355E"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Ethics<\/h1>\n<p>This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical theories relate to these core issues.<\/p>\n<h1>Course Material<\/h1>\n<p>\u00a01st Analysis:\u00a0<\/p>\n<\/p>\n\n<a href=\"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-content\/uploads\/sites\/34191\/2024\/11\/annotated-phil201.docx.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-phil201.docx<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>2nd Analysis:&nbsp;<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-content\/uploads\/sites\/34191\/2024\/11\/annotated-phil2012028129.docx.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-phil2012028129.docx<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>3rd Analysis:&nbsp;<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-content\/uploads\/sites\/34191\/2024\/11\/annotated-paper205.docx.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-paper205.docx<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>4th Analysis:&nbsp;<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-content\/uploads\/sites\/34191\/2024\/11\/annotated-paper2052028129.docx.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-paper2052028129.docx<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>5th Analysis:<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-content\/uploads\/sites\/34191\/2024\/11\/annotated-phil2012028129.docx-2.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-phil2012028129.docx-2<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Final Reflective Analysis:<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-content\/uploads\/sites\/34191\/2024\/11\/annotated-fixed.docx.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-fixed.docx<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Ethics This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ejcyber\/law-ethics\/phil-355e\/\">Read More<\/a><\/div>\n","protected":false},"author":27495,"featured_media":0,"parent":93,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/pages\/207"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/users\/27495"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":408,"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/pages\/207\/revisions\/408"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/pages\/93"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}