{"id":207,"date":"2023-09-06T16:58:32","date_gmt":"2023-09-06T16:58:32","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=207"},"modified":"2024-11-27T19:53:24","modified_gmt":"2024-11-27T19:53:24","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/hmaca002cyse\/law-ethics\/phil-355e\/","title":{"rendered":"PHIL 355E"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cybersecurity Ethics<\/h1>\n\n\n\n<p>This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical theories relate to these core issues.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Course Material<\/h1>\n\n\n\n<p>This semester has been transformative for me as a cybersecurity major and aspiring ethical hacker. The topics we explored in PHIL 355E challenged my perspectives and helped me develop a more nuanced understanding of ethics in the digital age. Among the many topics, three of them resonated deeply: privacy and informational dignity, the ethical use of professional skills, and the morality of cyber warfare. Each of these areas not only deepened my understanding but also shaped how I envision my future responsibilities as a government ethical hacker.<\/p>\n\n\n\n<p>The topic of privacy and informational dignity had a profound impact on me. Initially, I viewed privacy as a technical issue and as something that could be managed through better encryption, secure systems, and stronger policies. However, studying Luciano Floridi\u2019s concept of informational dignity changed my perspective. Floridi emphasizes that privacy isn\u2019t just about protecting data; it\u2019s tied to autonomy and identity. Losing control over personal information is more than an inconvenience and it\u2019s a violation of dignity. This insight became even clearer when paired with James Grimmelmann\u2019s analysis of power imbalances between corporations like Google and individuals. Learning how companies prioritize profit over individual rights made me rethink the ethical challenges of data collection and its impact on society. As a future cybersecurity professional, I recognize that my work will directly impact how privacy is upheld in an increasingly interconnected world. This realization emphasized the importance of ensuring that the systems I help design and secure respect human dignity and autonomy.<\/p>\n\n\n\n<p>The ethical use of professional skills was another topic that struck me. Bill Sourour\u2019s story about coding a deceptive pharmaceutical quiz highlighted the responsibility that comes with technical expertise. His decision to follow orders, even when the project conflicted with ethical principles, raised important questions about integrity and accountability. As someone entering a field where I\u2019ll have access to sensitive data and systems, I realized that my skills carry immense responsibility. Armstrong\u2019s idea of professional duty reinforced this, emphasizing that professionals are accountable not just to their employers but also to society. The concept of virtue ethics, particularly the golden mean, taught me the importance of balancing professional obligations with ethical principles. Sourour\u2019s case reminded me that there will be moments when I\u2019ll need to question directives that conflict with my values. As an ethical hacker, I will have to navigate these challenges thoughtfully, ensuring that my work aligns with principles like honesty and care for others.<\/p>\n\n\n\n<p>The morality of cyber warfare was the third topic that profoundly influenced me. At the beginning of the semester, I thought of cyberattacks as a strategic tool for national defense and necessary in certain contexts. However, analyzing the Israel-Hamas conflict through Boylan\u2019s concept of \u201cattack and response\u201d and Taddeo\u2019s principle of \u201cwar as a last resort\u201d challenged my assumptions. The cyberattacks on civilian infrastructure blurred the lines between military and civilian targets, causing widespread harm and fear. Utilitarianism, with its focus on minimizing harm, provided a critical lens for evaluating these actions. It became evident that even if these attacks served a military purpose, their disproportionate impact on civilians were not ethically justified. This case made me think about the broader implications of my future work. As someone who will be responsible for defending systems and, potentially, launching countermeasures, I now understand the importance of ensuring that my actions align with ethical standards. Cyber warfare isn\u2019t just about technical efficiency, it\u2019s about protecting lives and upholding justice.<\/p>\n\n\n\n<p>Reflecting on these topics has fundamentally changed the way I view my role in cybersecurity. Privacy, professional responsibility, and the ethical implications of cyber warfare are not just theoretical issues and instead, they\u2019re challenges I\u2019ll face in my career. This course has shown me that being an ethical hacker means more than identifying vulnerabilities or strengthening defenses. It means approaching every decision with integrity and ensuring that my work contributes to a safer and more just digital world. I\u2019ve also learned that ethical dilemmas rarely have clear-cut answers<\/p>\n\n\n\n<p>Moving forward, I want to carry the lessons from this course into my professional life. Privacy is about protecting human dignity, and I\u2019ll ensure the systems I work on respect that. Professional skills come with significant responsibility, and I\u2019ll strive to balance my technical expertise with moral principles like honesty and care. Finally, cyber warfare requires not just strategic thinking but also ethical judgment. As I work toward becoming an ethical hacker for the government, I\u2019ll remember that my ultimate goal isn\u2019t just to safeguard systems but to protect people and uphold justice. Ethics will be at the core of everything I do, guiding me to make thoughtful and responsible decisions in a field where the stakes couldn\u2019t be higher.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Ethics This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/hmaca002cyse\/law-ethics\/phil-355e\/\">Read More<\/a><\/div>\n","protected":false},"author":22167,"featured_media":0,"parent":93,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/hmaca002cyse\/wp-json\/wp\/v2\/pages\/207"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/hmaca002cyse\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/hmaca002cyse\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hmaca002cyse\/wp-json\/wp\/v2\/users\/22167"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hmaca002cyse\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/hmaca002cyse\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":427,"href":"https:\/\/sites.wp.odu.edu\/hmaca002cyse\/wp-json\/wp\/v2\/pages\/207\/revisions\/427"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hmaca002cyse\/wp-json\/wp\/v2\/pages\/93"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/hmaca002cyse\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}