{"id":207,"date":"2023-08-26T22:16:12","date_gmt":"2023-08-26T22:16:12","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=207"},"modified":"2025-02-02T22:00:09","modified_gmt":"2025-02-02T22:00:09","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mahmood\/law-ethics\/phil-355e\/","title":{"rendered":"PHIL 355E"},"content":{"rendered":"\n<p>In my Ethics in Cybersecurity course, I have completed several in-depth case analyses that explore various real-world issues related to cybersecurity and its ethical implications. These case studies have provided me with a deeper understanding of the complex ethical challenges that professionals in the field must navigate. Below, I have listed the key case studies I have worked on, each offering unique insights into topics such as data privacy, cybercrime, and the balance between national security and individual rights.<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-106b80a3-7ffb-445d-9fc7-f46545cb7bd9\" href=\"https:\/\/sites.wp.odu.edu\/mahmood\/wp-content\/uploads\/sites\/33788\/2025\/02\/1.4.-Case-Analysis-on-Privacy.docx\">1.4.-Case-Analysis-on-Privacy<\/a><a href=\"https:\/\/sites.wp.odu.edu\/mahmood\/wp-content\/uploads\/sites\/33788\/2025\/02\/1.4.-Case-Analysis-on-Privacy.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-106b80a3-7ffb-445d-9fc7-f46545cb7bd9\">Click here to view<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-34710587-59e9-4dd9-aee5-0bde5f987e51\" href=\"https:\/\/sites.wp.odu.edu\/mahmood\/wp-content\/uploads\/sites\/33788\/2025\/02\/2.4.-Case-Analysis-on-User-Data.docx\">2.4.-Case-Analysis-on-User-Data<\/a><a href=\"https:\/\/sites.wp.odu.edu\/mahmood\/wp-content\/uploads\/sites\/33788\/2025\/02\/2.4.-Case-Analysis-on-User-Data.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-34710587-59e9-4dd9-aee5-0bde5f987e51\">Click here to view<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-e9595601-472c-47d0-9c8d-969193e680f8\" href=\"https:\/\/sites.wp.odu.edu\/mahmood\/wp-content\/uploads\/sites\/33788\/2025\/02\/3.4.-Case-Analysis-on-CSR-2.0.docx\">3.4.-Case-Analysis-on-CSR <\/a><a href=\"https:\/\/sites.wp.odu.edu\/mahmood\/wp-content\/uploads\/sites\/33788\/2025\/02\/3.4.-Case-Analysis-on-CSR-2.0.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e9595601-472c-47d0-9c8d-969193e680f8\">Click here to view<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-130bbb48-1b5a-46f7-9be2-45ee1eac0c69\" href=\"https:\/\/sites.wp.odu.edu\/mahmood\/wp-content\/uploads\/sites\/33788\/2025\/02\/4.4.-Case-Analysis-on-Professional-Ethics.docx\">4.4.-Case-Analysis-on-Professional-Ethics<\/a><a href=\"https:\/\/sites.wp.odu.edu\/mahmood\/wp-content\/uploads\/sites\/33788\/2025\/02\/4.4.-Case-Analysis-on-Professional-Ethics.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-130bbb48-1b5a-46f7-9be2-45ee1eac0c69\">Click here to view<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-89f29be9-a4be-4ee0-88f5-c791ab236665\" href=\"https:\/\/sites.wp.odu.edu\/mahmood\/wp-content\/uploads\/sites\/33788\/2025\/02\/5.4.-Case-Analysis-on-Whistleblowing.docx\">5.4.-Case-Analysis-on-Whistleblowing<\/a><a href=\"https:\/\/sites.wp.odu.edu\/mahmood\/wp-content\/uploads\/sites\/33788\/2025\/02\/5.4.-Case-Analysis-on-Whistleblowing.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-89f29be9-a4be-4ee0-88f5-c791ab236665\">Click here to view<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-83ebd72e-e7ba-4930-892e-93721581bc82\" href=\"https:\/\/sites.wp.odu.edu\/mahmood\/wp-content\/uploads\/sites\/33788\/2025\/02\/6.4.-Case-Analysis-on-Cyberconflict.docx\">6.4.-Case-Analysis-on-Cyberconflict<\/a><a href=\"https:\/\/sites.wp.odu.edu\/mahmood\/wp-content\/uploads\/sites\/33788\/2025\/02\/6.4.-Case-Analysis-on-Cyberconflict.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-83ebd72e-e7ba-4930-892e-93721581bc82\">Click here to view<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-64753e4b-c045-4c61-82d8-3702d0393086\" href=\"https:\/\/sites.wp.odu.edu\/mahmood\/wp-content\/uploads\/sites\/33788\/2025\/02\/7.4-Complete-Case-Analysis-2.0.docx\">7.4-Complete-Case-Analysis<\/a><a href=\"https:\/\/sites.wp.odu.edu\/mahmood\/wp-content\/uploads\/sites\/33788\/2025\/02\/7.4-Complete-Case-Analysis-2.0.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-64753e4b-c045-4c61-82d8-3702d0393086\">Click here to view<\/a><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In my Ethics in Cybersecurity course, I have completed several in-depth case analyses that explore various real-world issues related to cybersecurity and its ethical implications. These case studies have provided me with a deeper understanding of the complex ethical challenges that professionals in the field must navigate. Below, I have listed the key case studies&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mahmood\/law-ethics\/phil-355e\/\">Read More<\/a><\/div>\n","protected":false},"author":27222,"featured_media":0,"parent":93,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/pages\/207"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/users\/27222"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":568,"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/pages\/207\/revisions\/568"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/pages\/93"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mahmood\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}