{"id":207,"date":"2024-01-24T18:03:53","date_gmt":"2024-01-24T18:03:53","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=207"},"modified":"2024-04-25T00:53:29","modified_gmt":"2024-04-25T00:53:29","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/pm1\/law-ethics\/phil-355e\/","title":{"rendered":"PHIL 355E"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cybersecurity Ethics<\/h1>\n\n\n\n<h1 class=\"wp-block-heading\">Course Description<\/h1>\n\n\n\n<p>This course examines ethical issues relevant to computing and information technology, including: privacy; freedom of speech and content control on the Internet; individual and social responsibility; cybersecurity; cybercrimes; social impact of computers and other digital technologies; and ethical obligations of IT professionals. Students will gain a broad understanding of central issues in cyber ethics and the ways that fundamental ethical theories relate to these core issues.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Course Material<\/h1>\n\n\n\n<h3 class=\"wp-block-heading\">End of Course Reflection Paper<\/h3>\n\n\n\n<p><span class=\"css-dnqsmz-view--flex-flex\" dir=\"ltr\"><span class=\"css-wxpmja-view\" dir=\"ltr\">This assignment asked me to look back on the work done throughout the semester and reflect on material we\u2019ve gone through, and how it will be relevant to my planned career and\/or life more generally.<\/span><\/span><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/pm1\/wp-content\/uploads\/sites\/35619\/2024\/04\/Philosophy-355E-Course-Reflection.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Philosophy-355E-Course-Reflection<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Case Analysis on CSR<\/h3>\n\n\n\n<p>This case analysis examined CSR, otherwise known as, Corporate Social Responsibility, and focused around the question; <span class=\"css-dnqsmz-view--flex-flex\" dir=\"ltr\"><span class=\"css-wxpmja-view\" dir=\"ltr\"><strong>Who did the Equifax breach harm? How? Why was this harm morally bad?<\/strong><\/span><\/span> In this analysis, I used contractarianism, or the idea that<span class=\"BxUVEf ILfuVd\" lang=\"en\"><span class=\"hgKElc\"> individuals make the right choices under a hypothetical social contract, to answer this proposed question.<\/span><\/span><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/pm1\/wp-content\/uploads\/sites\/35619\/2024\/04\/Case-Analysis-on-CSR.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Case-Analysis-on-CSR<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Case Analysis on User Data<\/h3>\n\n\n\n<p>This case analysis took a deeper look at the usage of user data and fought with the question; <span class=\"css-dnqsmz-view--flex-flex\" dir=\"ltr\"><span class=\"css-wxpmja-view\" dir=\"ltr\"><strong>Should the United States adopt something like Europe\u2019s new Privacy Laws? <\/strong>These privacy laws primarily being the GDPR, or General Data Protection Regulation. In this analysis, I used deontology\/Kantian ethics to argue that the US should adopt this sort of laws and regulation as a means to further protect user data. <\/span><\/span><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/pm1\/wp-content\/uploads\/sites\/35619\/2024\/04\/Case-Analysis-on-User-Data.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Case-Analysis-on-User-Data<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Ethics Course Description This course examines ethical issues relevant to computing and information technology, including: privacy; freedom of speech and content control on the Internet; individual and social responsibility; cybersecurity; cybercrimes; social impact of computers and other digital technologies; and ethical obligations of IT professionals. Students will gain a broad understanding of central issues&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/pm1\/law-ethics\/phil-355e\/\">Read More<\/a><\/div>\n","protected":false},"author":27146,"featured_media":0,"parent":93,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages\/207"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/users\/27146"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":490,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages\/207\/revisions\/490"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages\/93"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}