Cybersecurity Ethics
PHIL 355E Cybersecurity Ethics course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyber warfare. Through case analyses and reflective assignments, I gained a broad understanding of central issues in cyber ethics and the ways that fundamental ethical theories relate to these core issues.
Course Material
Case Analyses:
This case analysis on data ethics explores the ethical considerations surrounding user data privacy through the lens of contractarian moral reasoning. It argues for the adoption of GDPR-like regulations in the United States to address concerns about data consent, privacy, and protection. Drawing on the ethical frameworks of Zimmer and Buchanan, the analysis examines how GDPR principles, such as data anonymization, purpose limitation, and user consent, promote fairness and responsibility in handling personal data. The paper concludes that implementing GDPR-like measures would balance innovation with ethical data practices, safeguarding individual rights in the digital age.
This case analysis examines the ethical concerns surrounding Google Street View through the lens of Consequentialism and Utilitarianism. It argues that, to maximize societal benefits and minimize privacy risks, Google should have integrated stronger privacy protections, such as automatically blurring sensitive information like faces and license plates. Drawing from Floridi’s concept of informational friction and Grimmelmann’s view of privacy as product safety, the analysis highlights how the lack of privacy safeguards in Google Street View led to potential harm, undermining user trust. It concludes that incorporating privacy protections would have improved the overall utility of the service while upholding individual privacy rights.
End-of-Course Reflection:
This end-of-course reflection discusses the key insights and personal growth I experienced throughout the PHIL 355E Cybersecurity Ethics course. It examines how ethical theories, such as Consequentialism, Utilitarianism, and Contractarianism, provide frameworks for addressing complex ethical issues in cybersecurity, including privacy, professional conduct, and information warfare. The reflection also highlights the real-world relevance of these ethical frameworks in shaping responsible practices in cybersecurity and technology.