PHIL 355E

Cybersecurity Ethics

This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical theories relate to these core issues.

Reflective Essay

Lilibeth Rodriguez Sanchez

PHIL 355E

Reflective Writing Assignment

Throughout the semester, I have been exposed to a variety of subjects, viewpoints, and stances. The class material has provided me with valuable knowledge, but the topics Privacy, Whistleblowing, and Information warfare stood out the most to me. I believe these topics caught my attention due to the amount of information I realized I did not know were incorporated in such topics.

I have gained valuable insights from the Privacy unit. In our analysis of the ethical implications of Google Street View, we explored alternative approaches to its implementation. For example, Siva’s article called “The Googleization of Everything” highlighted Google’s shortcomings in respecting privacy, providing numerous examples of their disregard for others privacy. One such example, was the capturing of images of a house that was set far back from the road, which clearly violated personal privacy and appeared intrusive. Additionally, Google neglected to automatically blur sensitive information such as individuals faces or license plates from a vehicle. The significance of this matter lies in the fact that cybercriminals can exploit sensitive data such as facial images or license plate numbers to monitor individuals or profit from selling this information to other cybercriminals. The analysis of privacy cases has deepened my comprehension of how easily one’s privacy can be violated. Consequently, I have learned the importance of caution when capturing photographs in public settings, as the potential viewers and potential misuse of these images remain uncertain. Additionally, I refrain from tagging individuals due to the risk involved when tagging them, for instance if I happened to get hacked and I tagged my friend in a photo, that cybercriminal has some access to be able to also hack my friends.

During our study of whistleblowing, I gained valuable insight that have reshaped my understanding of this topic. While I was aware of the concept of whistleblowing and believed in the principle of “If you see something, say something.” This unit prompted me to reconsider my traditional approach. I have come to realize that whistleblowing is not always necessary in every situation. In my analysis of whistleblowing case, I explored Vanderkerchoves concept of Rational Loyalty, which suggests that employees should exercise their right to whistle blow. Before deciding to blow the whistle, individuals should carefully weigh the circumstances and potential outcomes. In my current perspective, I liken this decision-making process to Hammurabi’s code, where the principle of “an eye for an eye” is applied. I know grasp the importance of assessing whether whistleblowing is any appropriate course of action or if it may be deemed excessive for a given situation. The newfound understanding will enable me to discern when whistleblowing is justified and when it is wrong. I can use all this information provided to me to ensure that I incorporate it in my everyday life. Before deciding to blow the whistle, individuals should carefully weigh the circumstances and potential outcomes. In my current perspective, I liken this decision-making process to Hammurabi’s code, where the principle of “an eye for an eye” is applied. I now grasp the importance of assessing whether whistleblowing is an appropriate course of action or if it may be deemed excessive for a given situation. This newfound understanding will enable me to discern when whistleblowing is justified which will give me great knowledge for when I have my career to be able to apply that knowledge of what whistleblowing is, the effects it can have towards ourselves and organization, and when its considered justifiable or not.

In conclusion, I gained knowledge and insights into the concept of information warfare, a subject that was previously unfamiliar to me. As part of my analysis on information warfare, I delved into an article that specifically examined Facebook’s involvement in the 2016 election. While I was aware of the controversy surrounding the election and the rumor of Russian hackers, I was unaware of the significant role played by Facebook. This revelation made me realize the substantial influence that not only Facebook, but also other major corporations have an important role in an election. After conducting further research into the influence of corporations on American politics, I have concluded that it would be beneficial for corporations to not be involved in political affairs. Additionally, I strongly believe that lobbying should be prohibited. From this unit, I have learned the importance of being cautious while the navigating the online realm and critically evaluating the information I encounter. It is important to ensure that we are getting information by trusted sources.

Case Analysis: