{"id":207,"date":"2022-01-30T00:50:33","date_gmt":"2022-01-30T00:50:33","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=207"},"modified":"2025-04-11T00:54:22","modified_gmt":"2025-04-11T00:54:22","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nsportfolio\/law-ethics\/phil-355e\/","title":{"rendered":"PHIL 355E"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Ethics<\/h1>\n<p>This class focused on the ethics of various topics relating to cybersecurity, such as surveillance, data breaches, information warfare, and other important modern-day topics. It tasked students with debating the ethics behind these topics and defending their arguments with philosophical reasoning based on various philosophical beliefs, such as Consequentialism, Deontology, and Virtue Ethics, to name a few. Below are a few case analysis which had me analyze the ethics of different situations relating to cybersecurity.\u00a0<\/p>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-content\/uploads\/sites\/28413\/2025\/04\/Case-Analysis-One.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Case-Analysis-One.\"><\/object><a id=\"wp-block-file--media-3224c52c-4ab4-4ee9-9915-a34a06036ef6\" href=\"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-content\/uploads\/sites\/28413\/2025\/04\/Case-Analysis-One.pdf\">Case-Analysis-One<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-content\/uploads\/sites\/28413\/2025\/04\/Case-Analysis-One.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3224c52c-4ab4-4ee9-9915-a34a06036ef6\"><\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-content\/uploads\/sites\/28413\/2025\/04\/Case-Analysis-Three.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Case-Analysis-Three.\"><\/object><a id=\"wp-block-file--media-211b2354-47da-44f1-b280-5ee2261280a0\" href=\"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-content\/uploads\/sites\/28413\/2025\/04\/Case-Analysis-Three.pdf\">Case-Analysis-Three<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-content\/uploads\/sites\/28413\/2025\/04\/Case-Analysis-Three.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-211b2354-47da-44f1-b280-5ee2261280a0\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-content\/uploads\/sites\/28413\/2025\/04\/Case-Analysis-Seven.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Case-Analysis-Seven.\"><\/object><a id=\"wp-block-file--media-29e15e90-88b8-4030-acf7-b02c4270c34f\" href=\"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-content\/uploads\/sites\/28413\/2025\/04\/Case-Analysis-Seven.pdf\">Case-Analysis-Seven<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-content\/uploads\/sites\/28413\/2025\/04\/Case-Analysis-Seven.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-29e15e90-88b8-4030-acf7-b02c4270c34f\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Ethics This class focused on the ethics of various topics relating to cybersecurity, such as surveillance, data breaches, information warfare, and other important modern-day topics. It tasked students with <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/nsportfolio\/law-ethics\/phil-355e\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":23389,"featured_media":0,"parent":93,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-json\/wp\/v2\/pages\/207"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-json\/wp\/v2\/users\/23389"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":453,"href":"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-json\/wp\/v2\/pages\/207\/revisions\/453"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-json\/wp\/v2\/pages\/93"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nsportfolio\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}