This paper gives a reflection of some of the main takeaways of the course, along with what can be used in the future.
Data Ethics
This case analysis focuses on the laws and usage of user data amongst different entities. Specifically, this case focuses on comparing the United States versus European privacy laws. GDPR is explored along with some other European privacy laws and the following question is answered: Should the United States adopt something like Europe’s new Privacy Laws?
Whistleblowing
This case analysis focuses on the morality of whistleblowing. The case specifically focuses on the leaked footage titled “Collateral Murder?” which shows the United States military firing on Iraqis and the moments that led to it. The questions that are answered within this case analysis are: Did Manning act out of loyalty to the United…
Professional Ethics
This case analysis focuses on ethics within professional settings, specifically the example of Bill Sourour who wrote code for a pharmaceutical company that resulted in young girls committing suicide. This case analysis answers the following questions: What was morally wrong about writing the code for the pharmaceutical quiz? Should Sourour have done anything differently? What…
Corporate Social Responsibility (CSR)
Within this case analysis, the Equifax breach was explored along with different responsibilities associated with corporations and businesses. The case analysis answers the following question: Who did the Equifax breach harm? How? Why was this harm morally bad?
Journal Entry #15
Digital Forensics | Davin Teo | TEDxHongKongSalon – YouTube Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker’s pathway to his career. Davin Teo begins the speech with describing the generalized idea of people who…
ePortfolio Entry #13
How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge? Developing new cyber-policy and infrastructure in a fast-paced technical world is difficult. This is because predicting potential cyber threats and vulnerabilities is also very difficult. In most cases, cyber professionals, or really any organization, only realize some of…
Journal Entry #13
A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company’s cyber infrastructure. To identify the vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their penetration testing…
Journal Entry #11
Watch this video. As you watch the video https://www.youtube.com/watch?v=iYtmuHbhmS0, think about how the description of the cybersecurity analyst job relates to social behaviors. Write a paragraph describing social themes that arise in the presentation. Cybersecurity Analysts are the first line of defense and they usually monitor over networks. They sometimes identify flaws within the system….
ePortfolio Entry #12
How does cyber technology impact interactions between offenders and victims? Over the past two decades, the use of cyber technology has significantly increased. Cyber technology has incorporated itself into every aspect of every day life with many different types of users. These users include people of all ages and social statuses. In a lot of…