{"id":207,"date":"2024-09-22T23:09:35","date_gmt":"2024-09-22T23:09:35","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=207"},"modified":"2025-06-16T07:06:08","modified_gmt":"2025-06-16T11:06:08","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/markwassef\/law-ethics\/phil-355e\/","title":{"rendered":"PHIL 355E"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cybersecurity Ethics<\/h1>\n\n\n\n<p>This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical theories relate to these core issues.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Course Material<\/h1>\n\n\n\n<p>This class was by far one of my favorites. Professor Nicol absolutely taught me a lot about general ethics as well as ethics within Cybersecurity. I&#8217;ve attached a couple of essays that I wrote for the class.<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-50b566a5-6fb1-44bd-bbc5-4716a8439602\" href=\"https:\/\/sites.wp.odu.edu\/markwassef\/wp-content\/uploads\/sites\/37243\/2025\/06\/Mannings-Virtue-Ethics.docx\">Mannings-Virtue-Ethics<\/a><a href=\"https:\/\/sites.wp.odu.edu\/markwassef\/wp-content\/uploads\/sites\/37243\/2025\/06\/Mannings-Virtue-Ethics.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-50b566a5-6fb1-44bd-bbc5-4716a8439602\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-dd07a06c-2196-4e0e-9407-098a6d7d519c\" href=\"https:\/\/sites.wp.odu.edu\/markwassef\/wp-content\/uploads\/sites\/37243\/2025\/06\/Case-Analysis-on-Privacy.docx\">Case-Analysis-on-Privacy<\/a><a href=\"https:\/\/sites.wp.odu.edu\/markwassef\/wp-content\/uploads\/sites\/37243\/2025\/06\/Case-Analysis-on-Privacy.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-dd07a06c-2196-4e0e-9407-098a6d7d519c\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-beb98e73-dbe3-4ef9-bc67-d05078e0ae89\" href=\"https:\/\/sites.wp.odu.edu\/markwassef\/wp-content\/uploads\/sites\/37243\/2025\/06\/Equifax-and-User-Data.docx\">Equifax-and-User-Data<\/a><a href=\"https:\/\/sites.wp.odu.edu\/markwassef\/wp-content\/uploads\/sites\/37243\/2025\/06\/Equifax-and-User-Data.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-beb98e73-dbe3-4ef9-bc67-d05078e0ae89\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-34ea7df9-ca9e-4413-a41e-b9575528b264\" href=\"https:\/\/sites.wp.odu.edu\/markwassef\/wp-content\/uploads\/sites\/37243\/2025\/06\/Dentology-and-Superman.docx\">Dentology-and-Superman<\/a><a href=\"https:\/\/sites.wp.odu.edu\/markwassef\/wp-content\/uploads\/sites\/37243\/2025\/06\/Dentology-and-Superman.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-34ea7df9-ca9e-4413-a41e-b9575528b264\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-6d2a03d2-dbad-445f-bbcf-b6f1ac3902d2\" href=\"https:\/\/sites.wp.odu.edu\/markwassef\/wp-content\/uploads\/sites\/37243\/2025\/06\/Reflections-on-Ethical-Theories.docx\">Reflections-on-Ethical-Theories<\/a><a href=\"https:\/\/sites.wp.odu.edu\/markwassef\/wp-content\/uploads\/sites\/37243\/2025\/06\/Reflections-on-Ethical-Theories.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6d2a03d2-dbad-445f-bbcf-b6f1ac3902d2\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Ethics This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/markwassef\/law-ethics\/phil-355e\/\">Read More<\/a><\/div>\n","protected":false},"author":22471,"featured_media":0,"parent":93,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/pages\/207"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/users\/22471"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":389,"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/pages\/207\/revisions\/389"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/pages\/93"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}