{"id":207,"date":"2020-08-30T20:53:06","date_gmt":"2020-08-30T20:53:06","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=207"},"modified":"2022-05-01T05:29:49","modified_gmt":"2022-05-01T05:29:49","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/thomasmayfield\/law-ethics\/phil-355e\/","title":{"rendered":"PHIL 355E"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Ethics<\/h1>\n<p>This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical theories relate to these core issues.<\/p>\n<h1>Course Material<\/h1>\n<p><span style=\"font-weight: 400\"><br \/><\/span><span style=\"font-weight: 400\">In the spring of 2022 I took Cyber Security Ethics (PHIL355E) and I would like to take a moment to reflect on some of the topics and materials that stood out to me throughout the course.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400\">The first topic I would like to address is in regards to the multitude of ethical theories I learned about in this course. Since this was my first time being introduced to philosophy in college, concepts such as Kantianism or Consequentialism were entirely unfamiliar to me, and I genuinely enjoyed diving into each ethical theory I was introduced to. Initially I was a bit overwhelmed with all of these unfamiliar terms but I quickly learned that I had been applying bits and pieces of these ethical theories to my day to day life since birth. Out of all the ethical theories we covered, I particularly enjoyed learning about deontology. This particular theory is used to determine the morality of an action based on the action\u2019s consequences, and not the action itself. This is an ethical theory that I have loosely, and until recently unknowingly, followed my entire life. Only now at the age of 31 can I actually put a name to it.\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400\">The second topic that I would like to mention involves the course&#8217;s modular approach. Each module focused on a different aspect of cyber security, and I was tasked with applying one of my recently learned ethical theories to it. The modules covered concepts such as data ethics, cyber conflict, and data privacy just to name a few. Each module was a deep dive into their associated concept and each one challenged me. There were times that I found it difficult to get traction applying certain types of ethical ideologies to the provided material, but that initial hesitancy forced me to give the topic much deeper thought. As is the case with ethical dilemmas, I found myself trying to square the topic with an ethical theory that simply could not work, making for my own internal ethical dialogue. A dialogue that I hope will resonate with me again in the future when I am confronted with a choice or demand that raises the alarm on what the consequences of my actions may be.\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400\">My perspective on cyber security as a whole has also drastically changed as a result of taking this course. I always knew that majoring in cyber security was going to result in me being faced with ethical quandaries, but it wasn\u2019t until now that I can fully appreciate the true scope of what I\u2019ll be face to face with. Terms like cyber-warfare and information warfare are thrown around so often in the media that they have almost lost their meaning to me. But now I can stop and appreciate the significance and ramifications of those phrases and better understand what they mean. While I\u2019m not certain where this degree will take me or which of the multiple fields within this area of study I\u2019ll be supporting, I can safely say that I will now be going in with my eyes open to the multitude of problems that society and the industry of cyber security is facing as a result.<\/span><\/p>\n<p>\u00a0<\/p>\n<p>I would also like to share two of my case analysis that I completed during this course!<\/p>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/sites.wp.odu.edu\/thomasmayfield\/case-analysis-on-cyber-conflict\/\" target=\"_blank\" rel=\"noreferrer noopener\">Case Analysis on Cyber Conflict<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/sites.wp.odu.edu\/thomasmayfield\/case-analysis-on-information-warfare\/\" target=\"_blank\" rel=\"noreferrer noopener\">Case Analysis on Information Warfare<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Ethics This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/thomasmayfield\/law-ethics\/phil-355e\/\">Read More<\/a><\/div>\n","protected":false},"author":18050,"featured_media":0,"parent":93,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/thomasmayfield\/wp-json\/wp\/v2\/pages\/207"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/thomasmayfield\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/thomasmayfield\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/thomasmayfield\/wp-json\/wp\/v2\/users\/18050"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/thomasmayfield\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/thomasmayfield\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":351,"href":"https:\/\/sites.wp.odu.edu\/thomasmayfield\/wp-json\/wp\/v2\/pages\/207\/revisions\/351"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/thomasmayfield\/wp-json\/wp\/v2\/pages\/93"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/thomasmayfield\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}