top of page

Leadership

 CYBERSECURITY
ETHICS

PHIL 355E

This component of the LeADERS Program enables students to develop relationship skills such as collaboration and interpersonal communication, problem solving, conflict resolution, and change management. In order to gain credit for completion of the Leadership component of the program, I enrolled in Cybersecurity Ethics. 
​
The course examined on ethical issues relevant to computing and information technology, including: privacy; freedom of speech and content control on the Internet; individual and social responsibility; cybersecurity; cybercrimes; social impact of computers and other digital technologies; and ethical obligations of IT professionals. During this course, I gained a broad understanding of central issues in cyber ethics and the ways that fundamental ethical theories relate to these core issues.

Case Analyses 

Evaluating cases that are impacting the society as technology advances, as well reviewing how big tech companies and their leaders are unethically being intrusive and not caring. 

Case Analysis of Privacy

Every other week, Professor Montoya would assign the class to compose case analysis based on real-world situations that are going on using ethical tools. The ethical tools help see the good and the bad depending on the case or situation going on. As well, analyze if the actions taken were best for everyone and fair or just for one's own benefit. In this first case analysis, by using the ethical tool consequentialism, I argued that it shows Google should have done more research on the cities and overall the country's traditions, values, and laws once they wanted to implement the tool in the location. Not every city and especially a country out of the United States are the same, and that is something that Google forgot to notice. Due to not taking that first step, when Google was trying to capture images for Street View, they ran into privacy problems with countries as well as citizens of different countries. Overall, Google invading and breaking privacy by using images of people and their properties. 

​

Case Analysis of Professional Ethics 

Ethical Tools 

The ethical tools in the course helped me evaluate and analyze a situation that is occurring in the tech field and how it is impacting everyone. It helped me realize that when it comes to decision making, one needs to make it a professional ethical matter what will help everyone fairly and bring more good than bad. 

​

The following are examples of the tools that helped evaluate if a case was ethical or if their steps taken were correct. Click on the image to find out more about what each tool is and how it helps one make the proper decisions. 

Consequentialism Tool Unlocked

Consequentialism Tool Unlocked

Ethical Tool List

Ethical Tool List

Deontology Tool Unlocked

Deontology Tool Unlocked

Course Reflection

Learning Outcome

Being enrolled in PHIL 355E, Cybersecurity Ethics has further my skills in making decisions as well as solving problems in a reasonable and quick matter. These skills are very much needed, especially since they are skills that employers are seeking. The experience has taught me that within the cybersecurity field, one needs to make decisions that will bring good for everyone as well as be fair. Not only make decisions that will affect one group or person which would be unethical. I use to be all right making decisions that would solve problems for friends, but the course helped me develop techniques on analyzing actions carefully and made me think quickly about what the correct actions are supposed to be taken. Overall, fast and quick decision-making skills involve making the correct decision based on actions, and the whole good effect it brings to people. Cybersecurity ethics indeed relates to my future goals because I want to work with the FBI or Homeland Security to stop cyber predators from harming children. The job requires having quick solving problem skills as well as making life-changing decisions at the moment, which I have learned to do so ethically. 

 

​​

bottom of page