{"id":207,"date":"2021-12-14T04:35:36","date_gmt":"2021-12-14T04:35:36","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=207"},"modified":"2021-12-14T10:10:42","modified_gmt":"2021-12-14T10:10:42","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sgowi001\/law-ethics\/phil-355e\/","title":{"rendered":"PHIL 355E"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Ethics<\/h1>\n<p>This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical theories relate to these core issues.<\/p>\n<h1>Course Material<\/h1>\n<p style=\"text-align: center\"><b>End of Course Reflection<\/b><\/p>\n<p style=\"text-align: left\"><span style=\"font-weight: 400\">Cybersecurity Ethics has plenty of complex concepts. Every concept has its own root and definition. Therefore, this concept can be viewed and used in many different ways.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">First and foremost, is privacy and user data concepts. These concepts are related to each other, in terms of security. Privacy and user data are basic concepts and fundamental terms in the cyber security profession. According to NIST or National Institute of Standards and Technology, privacy can be defined as \u201cAssurance that the confidentiality of, and access to, certain information about an entity is protected.\u201d and \u201cfreedom from intrusion into the private life or affairs of an individual when that intrusion results from undue or illegal gathering and use of data about that individual\u201d Moving on to another concept, which is user data. User data simply means any information the user owns or creates. Takeaway, by combining these two concepts together as future cyber security professionals. It is essential to protect user rights, information, confidentiality, and personal identity. <\/span><\/p>\n<p><span style=\"font-weight: 400\">The second is corporate social responsibility concepts. According to the United Nations Industrial Development Organization, CSR can be defined as \u201ca management concept whereby companies integrate social and environmental concerns in their business operations and interactions with their stakeholders.\u201d Therefore, the CSR concept in cyber security was to focus on social responsibility that every company should take to protect its consumers and its data for both user and society benefit. In addition to this, Kantianism or Kant is a deontological position proposed by Immanuel Kant. Kantian moral reasoning tools explain that \u201cFor Kant, the duty to respect others is absolute, and it\u2019s never right to fail to respect others for the greater good.\u201d In short, doing the right thing means respecting others. Takeaway, it\u2019s never right to do a wrong thing, and it\u2019s wrong to not do the right thing.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Lastly, is the professional ethics concept. In the world of the profession, this concept will become very valuable and essential for everyone in their career. For all professions, there are universal ethical principles that need to be applied. Which include: accountability, doing good and avoiding harm to others, adherence to the law, respect for others, loyalty, trustworthiness, and honesty. Therefore, following through with this professional code of conduct will help to develop confidence in the profession\u2019s trustworthiness, provide greater transparency to clients, be easier to deal with, and be reliable when dealing with other professions. Lastly, Kant states that \u201cKant held that one could do something that resulted in good things but that was motivated by bad reasons. When this happens, the person has still done something wrong.\u201d Takeaway, always doing something that resulted in good things and motivated by good reasons. Respecting others is a must and don\u2019t make an exception for yourself.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In conclusion, to become a perfectly professional, it is important to act in an ethical way and always be moral. Always respect others and be responsible to the whole society. Follow the professional code of conduct to develop great personal behavior. Lastly, always concerned about others and society&#8217;s benefit.<\/span><\/p>\n<p style=\"text-align: center\"><b>Reference<\/b><\/p>\n<p><span style=\"font-weight: 400\">Editor, C. S. R. C. C. (n.d.). <\/span><i><span style=\"font-weight: 400\">Privacy &#8211; glossary<\/span><\/i><span style=\"font-weight: 400\">. CSRC. Retrieved December 14, 2021, from\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">https:\/\/csrc.nist.gov\/glossary\/term\/privacy.\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400\">What is CSR?<\/span><\/i><span style=\"font-weight: 400\"> UNIDO. (n.d.). Retrieved December 14, 2021, from\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">https:\/\/www.unido.org\/our-focus\/advancing-economic-competitiveness\/competitive-trade-<\/span><\/p>\n<p><span style=\"font-weight: 400\">capacities-and-corporate-responsibility\/corporate-social-responsibility-market-integration<\/span><\/p>\n<p><span style=\"font-weight: 400\">\/what-csr.\u00a0<\/span><\/p>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Ethics This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sgowi001\/law-ethics\/phil-355e\/\">Read More<\/a><\/div>\n","protected":false},"author":22629,"featured_media":0,"parent":93,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sgowi001\/wp-json\/wp\/v2\/pages\/207"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sgowi001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sgowi001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sgowi001\/wp-json\/wp\/v2\/users\/22629"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sgowi001\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/sgowi001\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":290,"href":"https:\/\/sites.wp.odu.edu\/sgowi001\/wp-json\/wp\/v2\/pages\/207\/revisions\/290"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sgowi001\/wp-json\/wp\/v2\/pages\/93"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sgowi001\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}