{"id":207,"date":"2023-09-03T17:37:18","date_gmt":"2023-09-03T17:37:18","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=207"},"modified":"2024-06-13T15:25:19","modified_gmt":"2024-06-13T15:25:19","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jrobi047\/law-ethics\/phil-355e\/","title":{"rendered":"PHIL 355E"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Ethics<\/h1>\n<p>This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical theories relate to these core issues.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h1>Case Analysis worked on&#8230;\u00a0<\/h1>\n<p>&nbsp;<\/p>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file aligncenter\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/1.4.-Case-Analysis-on-Privacy-Justin-Robinson.pdf\" type=\"application\/pdf\" style=\"width:100%;height:260px\" aria-label=\"Embed of 1.4.-Case-Analysis-on-Privacy-Justin-Robinson.\"><\/object><a id=\"wp-block-file--media-18069651-8f91-4023-8444-97a793148c16\" href=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/1.4.-Case-Analysis-on-Privacy-Justin-Robinson.pdf\">1.4.-Case-Analysis-on-Privacy-Justin-Robinson<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/1.4.-Case-Analysis-on-Privacy-Justin-Robinson.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-18069651-8f91-4023-8444-97a793148c16\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file aligncenter\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/2.4.-Case-Analysis-on-User-Data-Justin-Robinson.pdf\" type=\"application\/pdf\" style=\"width:100%;height:260px\" aria-label=\"Embed of 2.4.-Case-Analysis-on-User-Data-Justin-Robinson.\"><\/object><a id=\"wp-block-file--media-18069651-8f91-4023-8444-97a793148c16\" href=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/2.4.-Case-Analysis-on-User-Data-Justin-Robinson.pdf\">2.4.-Case-Analysis-on-User-Data-Justin-Robinson<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/2.4.-Case-Analysis-on-User-Data-Justin-Robinson.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-18069651-8f91-4023-8444-97a793148c16\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file aligncenter\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/3.4.-Case-Analysis-on-CSR-Justin-Robinson.pdf\" type=\"application\/pdf\" style=\"width:100%;height:210px\" aria-label=\"Embed of 3.4.-Case-Analysis-on-CSR-Justin-Robinson.\"><\/object><a id=\"wp-block-file--media-18069651-8f91-4023-8444-97a793148c16\" href=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/3.4.-Case-Analysis-on-CSR-Justin-Robinson.pdf\">3.4.-Case-Analysis-on-CSR-Justin-Robinson<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/3.4.-Case-Analysis-on-CSR-Justin-Robinson.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-18069651-8f91-4023-8444-97a793148c16\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file aligncenter\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/4.4.-Case-Analysis-on-Professional-Ethics.pdf\" type=\"application\/pdf\" style=\"width:100%;height:260px\" aria-label=\"Embed of 4.4.-Case-Analysis-on-Professional-Ethics.\"><\/object><a id=\"wp-block-file--media-18069651-8f91-4023-8444-97a793148c16\" href=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/4.4.-Case-Analysis-on-Professional-Ethics.pdf\">4.4.-Case-Analysis-on-Professional-Ethics<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/4.4.-Case-Analysis-on-Professional-Ethics.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-18069651-8f91-4023-8444-97a793148c16\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file aligncenter\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/5.4.-Case-Analysis-on-Whistleblowing-Justin-Robinson.pdf\" type=\"application\/pdf\" style=\"width:100%;height:240px\" aria-label=\"Embed of 5.4.-Case-Analysis-on-Whistleblowing-Justin-Robinson.\"><\/object><a id=\"wp-block-file--media-18069651-8f91-4023-8444-97a793148c16\" href=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/5.4.-Case-Analysis-on-Whistleblowing-Justin-Robinson.pdf\">5.4.-Case-Analysis-on-Whistleblowing-Justin-Robinson<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/5.4.-Case-Analysis-on-Whistleblowing-Justin-Robinson.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-18069651-8f91-4023-8444-97a793148c16\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file aligncenter\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/6.4.-Case-Analysis-on-Cyberconflict.pdf\" type=\"application\/pdf\" style=\"width:100%;height:220px\" aria-label=\"Embed of 6.4.-Case-Analysis-on-Cyberconflict.\"><\/object><a id=\"wp-block-file--media-18069651-8f91-4023-8444-97a793148c16\" href=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/6.4.-Case-Analysis-on-Cyberconflict.pdf\">6.4.-Case-Analysis-on-Cyberconflict<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/6.4.-Case-Analysis-on-Cyberconflict.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-18069651-8f91-4023-8444-97a793148c16\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file aligncenter\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/7.4-Case-Analysis-on-Information-Warfare.pdf\" type=\"application\/pdf\" style=\"width:100%;height:220px\" aria-label=\"Embed of 7.4-Case-Analysis-on-Information-Warfare.\"><\/object><a id=\"wp-block-file--media-18069651-8f91-4023-8444-97a793148c16\" href=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/7.4-Case-Analysis-on-Information-Warfare.pdf\">7.4-Case-Analysis-on-Information-Warfare<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-content\/uploads\/sites\/33998\/2024\/06\/7.4-Case-Analysis-on-Information-Warfare.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-18069651-8f91-4023-8444-97a793148c16\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Ethics This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jrobi047\/law-ethics\/phil-355e\/\">Read More<\/a><\/div>\n","protected":false},"author":27379,"featured_media":0,"parent":93,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-json\/wp\/v2\/pages\/207"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-json\/wp\/v2\/users\/27379"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":340,"href":"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-json\/wp\/v2\/pages\/207\/revisions\/340"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-json\/wp\/v2\/pages\/93"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jrobi047\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}