{"id":221,"date":"2023-04-23T15:07:54","date_gmt":"2023-04-23T15:07:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ksers001\/?page_id=221"},"modified":"2024-08-29T01:18:11","modified_gmt":"2024-08-29T01:18:11","slug":"law-and-ethics-phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ksers001\/sample-page\/law-and-ethics-phil-355e\/","title":{"rendered":"Law and Ethics-PHIL 355E"},"content":{"rendered":"\n<p>Through this course I have learned many new ways to approach ethics relating to topics in cyber<br>security. For a majority of the topics, we discussed I was able to conceptualize new methods of analyzing<br>important subjects. Thought each case had its own unique and intriguing aspects I engaged more with<br>the cases involving Cyber conflict, Data Ethics and Whistle blowing.<br>Discussing data ethics opened my eyes more to understanding how our data is used and<br>handled. Understanding Europe\u2019s GDPR regulations, and the protections it gives its citizens was<br>enlightening. I concluded that the United States should adopt and draft regulations like the GDPR using<br>the theory of contrarianism. Analyzing \u201cBut the data is already public\u201d by Michael Zimmer I was able<br>to show how it is only fair for everyone that companies who handle data should do its best to disclose all<br>the ways a person\u2019s data is being used and do their due diligence to conceal PII. It is also only fair that<br>anyone who handles data dose there best to prevent re identification of data sets. This can include<br>things such as \u201cTerms of Service\u201d agreements. Its only fair for companies to create TOS agreements that<br>are comprehensible to everyone. Shorter, more precise agreements with less verbose and technical<br>wordings are needed to ensure the public understand how data is handled. I was able to use Elizabeth<br>Buchanan\u2019s paper titled \u201cConsidering the ethics on big data research: A case of Twitter and ISIS\/ISIL\u201d to<br>reach this conclusion.<br>The second case I found very enlightening was the case regarding whistle blowing. Watching the<br>Video \u201cCollateral Murder\u201d I was able to analyze the action of whistle blowing through the lens of<br>contrarianism. I analyzed whistle blowing with this ethical theory after reading \u201cWhistle blowing and<br>Rational Loyalty\u201d. The paper helped me understand that even though we should have loyalty to our<br>employers, this does have a limit if there is something morally with their actions and the way the<br>present themselves to the public. An employee\u2019s loyalty should be in what the company represents and<br>not in there supervisors specifically. However, it is best that if an employee has a grievance with the<br>companies\u2019 actions, they should take proper steps within the company to resolve the issue. Reading<br>\u201cCare and Loyalty in the workplace\u201d I was able to gain an understanding that protecting the public from<br>intentional harm takes priority over loyalty to an employer. If a company is doing something strictly<br>against their mission statement, they are being disloyal to public safety, and all proper channel within<br>the organization have been exhausted, it is acceptable to have an external investigation into the ethical<br>matters.<br>Last, I examined Cyber Conflict. Examining the ongoing Cyber warfare tactics used between<br>Israel and Iran. The theory of Deontology shows us that we must act with morality before taking any<br>action and that we should \u201cact so that the maximum of your action can be willed as universal law\u201d.<br>When regarding cyber warfare it is important to use it as a means to an end and to avoid harm to the<br>public. With cyber attacks on critical infrastructure between Israel and Iran, attacks that do more harm<br>than having a strategic purpose, we are only using cyber warfare to escalate. This can eventually lead to<br>tradition warfare or possible lives lost through cyber-attacks. Using the paper \u201cCan there be a just cyber<br>war?\u201d assisted me in this opinion. Also, after reading \u201cAn analysis for a just cyber warfare\u201d. In this paper<br>I was able to learn more about target discrimination and non-combatant immunity. Acts of cyber<br>conflict, like those in Israel and Iran can not be considered a just war because its simply a means to<br>escalate which will eventually lead to traditional warfare or the loss of life by attacking infrastructure<br>like hospitals and power grids. Cyber attacks and cyber conflict should only be used to avoid escalation<br>and protect the public from bloodshed.<\/p>\n\n\n\n<p>This course overall gave me a new perspective on the importance of ethical issues we face in the<br>cyber world<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Through this course I have learned many new ways to approach ethics relating to topics in cybersecurity. For a majority of the topics, we discussed I was able to conceptualize new methods of analyzingimportant subjects. Thought each case had its own unique and intriguing aspects I engaged more withthe cases involving Cyber conflict, Data Ethics&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ksers001\/sample-page\/law-and-ethics-phil-355e\/\">Read More<\/a><\/div>\n","protected":false},"author":24633,"featured_media":0,"parent":123,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/pages\/221"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/users\/24633"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/comments?post=221"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/pages\/221\/revisions"}],"predecessor-version":[{"id":269,"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/pages\/221\/revisions\/269"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/pages\/123"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ksers001\/wp-json\/wp\/v2\/media?parent=221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}