The cyber ethics from both an employee’s and customer’s perspective.



Course Objective

Assess ethical dilemmas that occur in organizations in the context of cybersecurity and develop

constructive resolutions based upon application of ethical theories, principles, and models.


The class discusses cyber ethics from both an employee’s and customer’s perspective. The readings

below are included for direction/context purposes for those not familiar with the concepts and can be

found on the Internet.

Question 1.

Code of Ethics

If you were writing a code of ethics, what would be the most important practices to include in your

company 's acceptable use policy, Internet use policy, or acceptable conduct policy?

Question 2

Effect of Cultural Values

Identify examples of how cultural values affect moral legitimacy and cyber ethics norms. How

can cultural values, traditions, religion, the desire for higher economic status, or poor local law

enforcement possibly affect the ability to regulate copyright piracy or other illicit activity globally?  

Background (available on the Web by title):

1. IP Commission Report on the Theft of American Intellectual Property [2013 - see esp. sections on


2. Cyber Espionage and the Theft of U.S. Intellectual Property and Technology [2013 - video / transcripts

of Congressional hearing]

Question 3

Cyber Vigilantism and Proactive Defense

Cyber Vigilantism is a term that describes what may occur when an organization decides to hack back, or

employ another company to launch a cyberattack against a suspected hacker that has disrupted their

assets.  When this is done by an organization, it may be actions taken for revenge or to protect

important assets against future cyber attacks by using a “Pro-Active Defense".

 Is this practice currently illegal, and what could be some possible consequences if an organization

engages in cyber vigilantism?  

 What are other possible options for a "Pro-Active Defense"?

 Background (available on the Web by title):

1. Hacking Back: Digital Revenge is Sweet but Risky [2013]

2. Should the U.S. Allow Companies to ‘Hack Back’ Against Foreign Cyber Spies? [2013]

3. Hacking Back is a Bad Idea after a Cyber Attack, DOJ Official Says [2013]

4. The text of the CFAA outlines penalties.

Related Questions in business category

The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.