Reflective Writing

This semester’s learning has profoundly enhanced my understanding of moral responsibility. I have had the chance to gain more knowledge about the context of my planned career in cybersecurity. The course materials, ranging from information warfare to cyber warfare, data misuse, and diverse ethical frameworks, have provided me with insights into the ethical challenges I will face in safeguarding digital systems and maintaining societal trust. These lessons are central to my professional aspirations and managing the complexities of modern life in a technology-driven world.
The case analysis of information warfare, by Shedd and Stradner (2024) and Prier (2017), foregrounded the extent to which state actors like Russia, China, and Iran manipulate public opinion using social media to destabilize democracies. Virtue Ethics highlighted the ethical insolvency of manipulative acts, which compromise trust and justice. In cybersecurity, this calls for the identification and counter-strategy against disinformation campaigns. My work will develop mechanisms for identifying AI-powered bot farms or false profiles, ensuring information integrity flows. This aligns with the virtue of honesty since I must be open and maintain public trust in online platforms.
The analysis of cyberwarfare by Veeneman in 2023 and Taddeo in 2012 focused on the moral issues of attacking civilian targets during wars, like the Israel-Hamas conflict. According to the idea of utilitarianism, which aims to benefit the most people, such attacks cause too much harm and break the rule of keeping non-combatants safe. In cybersecurity, this means building defenses that prioritize protecting civilians. This includes securing important systems, like power grids and warning alerts, to protect people from harm. The principle of minimizing harm will guide my work in preventing cyberattacks that disrupt essential services, ensuring societal stability.
The Cambridge Analytica case (Chang, 2018) and Sourour’s (2016) experience with deceptive coding further illustrated the ethical perils of data misuse. Deontological ethics and professional codes (ACM, 2018; IEEE, 2020) underscored the duty to uphold transparency and avoid harm. As a cybersecurity professional, I will advocate for ethical data practices, ensuring user consent and protecting against manipulative algorithms. This responsibility extends to my personal life, where I must critically evaluate the information I encounter and share.
Literary analyses, such as Butler’s The Evening and the Morning and the Night and Chen’s The Year of the Rat, introduced contractarianism and Ruism, emphasizing social responsibility and role-based ethics. These perspectives will inform my approach to fostering ethical collaboration in cybersecurity teams, balancing individual duties with collective goals. Ubuntu’s focus on communal identity, as explored in Dick’s The Little Black Box, reminds me that my work impacts broader societal networks, reinforcing my commitment to ethical decision-making.
In conclusion, this course has equipped me with a robust ethical framework to navigate cybersecurity challenges. By applying Virtue Ethics, utilitarianism, deontology, and professional codes, I will strive to protect digital infrastructures while upholding honesty, justice, and societal well-being. These principles will also guide my interactions, ensuring I contribute to a trustworthy and interconnected world.

References
ACM. (2018). ACM Code of Ethics and Professional Conduct. Association for Computing Machinery.
Chang, A. (2018). The Facebook and Cambridge Analytica scandal is explained in a simple diagram. Vox.
IEEE. (2020). IEEE Code of Ethics. Institute of Electrical and Electronics Engineers.
Prier, J. (2017). Commanding the trend: Social media as information warfare. Strategic Studies Quarterly, 11(4), 50–85.
Shedd, J., & Stradner, I. (2024). How Russia, China, and Iran are interfering in the presidential election. Foreign Policy.
Sourour, B. (2016). The code I am still ashamed of. FreeCodeCamp.
Taddeo, M. (2012). An information-based solution for the puzzle of cyberwarfare. Philosophy & Technology, 25(2), 149–164.
Veeneman, M. (2023). The law of war and cyberwarfare: An ethical analysis of the Israel-Hamas conflict. Small Wars Journal.

Leave a Reply

Your email address will not be published. Required fields are marked *