PHIL 355E

PHIL 355E – Cybersecurity Ethics

This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical theories relate to these core issues.


End-of-Course Reflection

Understanding Ethics in Cybersecurity

In PHIL 355E, I explored the ethical responsibilities that cybersecurity professionals face when designing, securing, and managing technology systems. While many cybersecurity courses focus on technical defenses and tools, this course emphasized the importance of ethical decision-making when technology affects individuals, organizations, and society as a whole.

Throughout the semester, I examined ethical theories such as utilitarianism, Kantian ethics, and virtue ethics and applied them to real-world cybersecurity dilemmas. These ethical frameworks provided a structured way to evaluate difficult questions such as privacy rights, corporate responsibility, ethical hacking, and the societal impact of emerging technologies.

One of the most important lessons from this course was that cybersecurity professionals are not only responsible for protecting systems but also for protecting people. Decisions about data collection, system monitoring, and user behavior can have significant consequences for privacy, autonomy, and trust.


Applying Ethical Theories to Real-World Technology

During the course, I completed several case analysis essays that required applying ethical theories to real-world situations involving technology companies and cybersecurity practices. These assignments challenged me to critically analyze ethical dilemmas rather than focusing only on technical solutions.

For example, one of my case analyses examined the ethical challenges faced by technology leaders responsible for designing social media platforms that rely on persuasive design techniques to maximize user engagement. By applying Kantian ethics, I evaluated whether manipulating user behavior for profit violates the moral obligation to respect individuals as autonomous decision-makers.

Kantian Ethics and Tim Kendall …

Working through these case studies helped me understand that cybersecurity decisions often involve balancing competing interests such as business goals, user privacy, and societal well-being.


Ethical Responsibility in the Cybersecurity Profession

As I continue pursuing a career in cybersecurity, this course reinforced the importance of maintaining strong ethical standards. Cybersecurity professionals are often trusted with access to sensitive systems and data, which creates significant responsibility.

Ethical considerations play a role in many areas of cybersecurity, including:

  • responsible vulnerability disclosure

  • ethical penetration testing

  • protection of user privacy

  • corporate accountability for security practices

  • responsible use of surveillance and monitoring technologies

Understanding these ethical responsibilities helps ensure that cybersecurity practices protect both organizations and the individuals who rely on their systems.


Connection to My Future Career

The ethical frameworks I studied in PHIL 355E will influence how I approach cybersecurity challenges in my professional career. Technical skills are essential in cybersecurity, but ethical reasoning is equally important when determining how security tools should be used and how organizations should handle sensitive information.

In the future, I hope to work in cybersecurity roles where I can contribute to protecting digital infrastructure while also respecting the rights and autonomy of users. This course helped me recognize that cybersecurity professionals must not only prevent cyber threats but also ensure that security solutions are implemented responsibly and ethically.


Case Analyses

The following pages contain selected case analyses that I completed during the semester. These essays apply ethical theories to real-world technology challenges and demonstrate my ability to analyze complex ethical dilemmas in cybersecurity and information technology.

Featured case analyses include:

  • Kantian Ethics and Tim Kendall in The Social Dilemma

  • (Second case analysis page haven’t done yet)

Each case analysis examines how ethical theories can guide decision-making when technology companies face conflicts between profit, innovation, and social responsibility.

Kantian-Ethics-and-Tim-Kendall-in-The-Social-Dilemma