
{"id":229,"date":"2026-04-07T18:27:31","date_gmt":"2026-04-07T18:27:31","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cjudy002\/?page_id=229"},"modified":"2026-04-07T18:37:32","modified_gmt":"2026-04-07T18:37:32","slug":"phil-355e","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/cjudy002\/phil-355e\/","title":{"rendered":"PHIL 355E"},"content":{"rendered":"\n<p><strong>Cybersecurity Ethics<\/strong><\/p>\n\n\n\n<p>Examined ethical issues relevant to computing and information technology, including: privacy; freedom of speech and content control on the Internet; individual and social responsibility, cybersecurity, &nbsp;cybercrimes, social impact of computers and other digital technologies, and ethical obligations of IT professionals. Gained understanding of central issues in&nbsp;cyberethics&nbsp;and the ways that fundamental ethical theories relate to these core issues.<\/p>\n\n\n\n<p><strong>Met the following learning objectives: <\/strong><\/p>\n\n\n\n<ul>\n<li>Analyzed ethical problems and made decisions based on ethical principles to solve them<\/li>\n\n\n\n<li>Applied these skills specifically to issues in&nbsp;cybersecurity<\/li>\n\n\n\n<li>Analyzed ethical problems related to&nbsp;cybersecurity<\/li>\n\n\n\n<li>Applied principles learned from ethical theories to&nbsp;cybersecurity&nbsp;case studies<\/li>\n\n\n\n<li>Identified the most common ethical issues in the&nbsp;cybersecurity&nbsp;field<\/li>\n\n\n\n<li>Deliberate effectively about issues in&nbsp;cybersecurity&nbsp;ethics by clearly articulating a considered opinion in the context of relevant alternatives<\/li>\n\n\n\n<li>Explained ethical principles, problems, and potential solutions clearly<\/li>\n<\/ul>\n\n\n\n<p><strong>Coursework<\/strong><\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-3be127c0-d6cf-4101-adf7-e7152844dad8\" href=\"https:\/\/student.wp.odu.edu\/cjudy002\/wp-content\/uploads\/sites\/31905\/2026\/04\/Case-Analysis-for-User-Data.docx\">Case-Analysis-for-User-Data<\/a><a href=\"https:\/\/student.wp.odu.edu\/cjudy002\/wp-content\/uploads\/sites\/31905\/2026\/04\/Case-Analysis-for-User-Data.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3be127c0-d6cf-4101-adf7-e7152844dad8\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file alignleft\"><a id=\"wp-block-file--media-88d7aa1b-4b8e-4600-8c20-c84e051958fe\" href=\"https:\/\/student.wp.odu.edu\/cjudy002\/wp-content\/uploads\/sites\/31905\/2026\/04\/Case-Analysis-for-Cyber-Conflict.docx\">Case-Analysis-for-Cyber-Conflict<\/a><a href=\"https:\/\/student.wp.odu.edu\/cjudy002\/wp-content\/uploads\/sites\/31905\/2026\/04\/Case-Analysis-for-Cyber-Conflict.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-88d7aa1b-4b8e-4600-8c20-c84e051958fe\">Download<\/a><\/div>\n\n\n<a href=\"https:\/\/student.wp.odu.edu\/cjudy002\/wp-content\/uploads\/sites\/31905\/2026\/04\/CybersecurityEthicsReflection.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CybersecurityEthicsReflection<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Ethics Examined ethical issues relevant to computing and information technology, including: privacy; freedom of speech and content control on<\/p>\n<div class=\"read-button read_more_btn_text\"><a class=\"read_more\" href=\"https:\/\/student.wp.odu.edu\/cjudy002\/phil-355e\/\">Read Now<span class=\"arrow_readm\"> &#x25BA;<\/span><\/a><\/div>\n","protected":false},"author":25776,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages\/229"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/users\/25776"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/comments?post=229"}],"version-history":[{"count":4,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages\/229\/revisions"}],"predecessor-version":[{"id":238,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages\/229\/revisions\/238"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/media?parent=229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}