{"id":207,"date":"2024-09-17T16:45:16","date_gmt":"2024-09-17T16:45:16","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=207"},"modified":"2025-08-10T00:48:32","modified_gmt":"2025-08-10T00:48:32","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/seliquini\/law-ethics\/phil-355e\/","title":{"rendered":"PHIL 355E"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Ethics<\/h1>\n<p>This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical theories relate to these core issues.<\/p>\n<p>\u00a0<\/p>\n\n\n<p class=\"has-medium-font-size\"><strong>A Framework for Duty: Reflecting on Cybersecurity Ethics<\/strong><br><br>Entering PHIL 355E, I expected a straightforward review of rules and regulations pertinent to the cybersecurity field. My background, with a decade in the Navy\u2019s submarine force as a Fire Control Technician and four years as a civilian engineer, was built on a clear understanding of duty, precision, and adherence to a strict code of conduct. I believed I had a solid foundation in professional responsibility. This course, however, provided something far more valuable. It did not just give me a list of rules; it provided a series of sophisticated ethical frameworks that transformed my understanding of a professional\u2019s role in a complex, interconnected world. This semester has been a crucial bridge between my technical understanding of cybersecurity and the human-centric principles necessary for a meaningful career. It has equipped me with the language and analytical tools to navigate the profound ethical dilemmas I will face in the perspective fields of threat intelligence and digital forensics.<br><br>The first major shift in my perspective came from the modules on privacy and data ethics. My prior view of privacy was largely individualistic, focused on personal diligence like using strong passwords and being careful what one shares. The concepts of Luciano Floridi\u2019s \u201cinformational friction\u201d and James Grimmelmann\u2019s \u201cprivacy as product safety\u201d fundamentally changed this. I now understand that privacy is less about an individual\u2019s actions and more about the inherent design of the systems we use. The case study on Google Street View was a perfect example of how a system\u2019s architecture can erode privacy by default. For a future threat intelligence analyst, this is a critical insight. It moves the focus from simply blaming a user for being compromised to analyzing the systemic vulnerabilities\u2014often intentionally designed into platforms for profit\u2014that enable attacks to succeed. The subsequent module on data ethics, with its critique of the \u201cnotice and consent\u201d model and the fallacy of \u201canonymized\u201d data, reinforced this: our responsibility is not just to react to threats, but to advocate for systems that are designed with user safety and dignity as a core principle, not an afterthought.<br><br>The modules on corporate social responsibility, professional ethics, and whistleblowing provided a clear hierarchy for a professional\u2019s loyalties. Contrasting Milton Friedman\u2019s shareholder-focused view with Melvin Anshen\u2019s theory of an evolving \u201csocial contract\u201d crystallized the modern corporation&#8217;s obligations. The Equifax breach served as a stark example of a company failing its social contract and externalizing the cost of its failures onto a helpless public. This led directly to the core lesson of the professional ethics module: a professional\u2019s primary allegiance is not to their employer, but to the public welfare, as mandated by the ACM, IEEE, and NSPE codes of ethics. Bill Sourour\u2019s story, \u201cThe Code I\u2019m Still Ashamed Of,\u201d was a powerful, personal account of what happens when this duty is ignored. For someone with a military background, where the chain of command is paramount, the concept of \u201ccritical loyalty\u201d from Oxley and Wittkower\u2014where whistleblowing can be the highest form of loyalty to an organization\u2019s principles\u2014was a profound and necessary framework for navigating the more ambiguous ethical landscape of the corporate world.<br><br>Finally, the modules on cyberconflict and information warfare provided the ethical language to analyze the modern battlefield. As an FT in the Navy, my role was focused on the employment of weapon systems. The concepts from these final modules expanded my definition of what a \u201cweapon\u201d can be. Michael Boylan\u2019s analysis of \u201cdual-use infrastructure\u201d clarified why it is nearly impossible to wage a \u201cclean\u201d cyberwar without harming civilians, as the systems that support a military are the same ones that support society. Similarly, Alexis Madrigal\u2019s description of Facebook as a \u201cmachine\u201d for propaganda showed that a social media platform\u2019s architecture, driven by engagement, can become one of the most effective weapons in information warfare. For a perspective career in threat intelligence, this is an essential realization. It moves the analysis of a cyber operation beyond the purely technical and into the ethic-strategic, forcing questions about proportionality, discrimination, and the societal consequences of the digital tools used by state and non-state actors.<br><br>This course has fundamentally reshaped my understanding of what it means to be a cybersecurity professional. My time in the Navy gave me a deep respect for protecting critical systems and information, but this class provided the ethical frameworks to understand who and what I am truly protecting. If I am fortunate to work in threat intelligence and digital forensics, I will not only be analyzing technical vulnerabilities but also the human and societal harms that result from their exploitation. This course has equipped me with the right ethical questions to ask, ensuring that the foundations of my future career are built not just on technical competence, but on a clear and unwavering commitment to the public I will be serving.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Ethics This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/seliquini\/law-ethics\/phil-355e\/\">Read More<\/a><\/div>\n","protected":false},"author":29386,"featured_media":0,"parent":93,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/seliquini\/wp-json\/wp\/v2\/pages\/207"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/seliquini\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/seliquini\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/seliquini\/wp-json\/wp\/v2\/users\/29386"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/seliquini\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/seliquini\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":370,"href":"https:\/\/sites.wp.odu.edu\/seliquini\/wp-json\/wp\/v2\/pages\/207\/revisions\/370"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/seliquini\/wp-json\/wp\/v2\/pages\/93"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/seliquini\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}