{"id":207,"date":"2024-09-17T20:01:33","date_gmt":"2024-09-17T20:01:33","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=207"},"modified":"2026-04-19T04:01:04","modified_gmt":"2026-04-19T04:01:04","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/law-ethics\/phil-355e\/","title":{"rendered":"PHIL 355E &#8211; Cybersecurity Ethics"},"content":{"rendered":"\n<p class=\"has-text-align-center\">This course explores ethical principles and theories, along with examining different cases related to the cyber world through an ethical lens.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Reflective Essay<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2025\/08\/PHIL-355E-Reflective-Writing-Assignment-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"PDF embed\"><\/object><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Data Ethics Case Analysis<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2025\/08\/PHIL-355E-Case-Analysis-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"PDF embed\"><\/object><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cyberwarfare Case Analysis<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2025\/08\/PHIL-355E-Case-Analysis-6.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"PDF embed\"><\/object><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This course explores ethical principles and theories, along with examining different cases related to the cyber world through an ethical lens. Reflective Essay Data Ethics Case Analysis Cyberwarfare Case Analysis<\/p>\n","protected":false},"author":29392,"featured_media":0,"parent":93,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/207"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/users\/29392"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":570,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/207\/revisions\/570"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/93"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}