Course Objective
Assess ethical dilemmas that occur in organizations in the context of cybersecurity and develop
constructive resolutions based upon application of ethical theories, principles, and models.
The class discusses cyber ethics from both an employee’s and customer’s perspective. The readings
below are included for direction/context purposes for those not familiar with the concepts and can be
found on the Internet.
Question 1.
Code of Ethics
If you were writing a code of ethics, what would be the most important practices to include in your
company 's acceptable use policy, Internet use policy, or acceptable conduct policy?
Question 2
Effect of Cultural Values
Identify examples of how cultural values affect moral legitimacy and cyber ethics norms. How
can cultural values, traditions, religion, the desire for higher economic status, or poor local law
enforcement possibly affect the ability to regulate copyright piracy or other illicit activity globally?
Background (available on the Web by title):
1. IP Commission Report on the Theft of American Intellectual Property [2013 - see esp. sections on
China]
2. Cyber Espionage and the Theft of U.S. Intellectual Property and Technology [2013 - video / transcripts
of Congressional hearing]
Question 3
Cyber Vigilantism and Proactive Defense
Cyber Vigilantism is a term that describes what may occur when an organization decides to hack back, or
employ another company to launch a cyberattack against a suspected hacker that has disrupted their
assets. When this is done by an organization, it may be actions taken for revenge or to protect
important assets against future cyber attacks by using a “Pro-Active Defense".
Is this practice currently illegal, and what could be some possible consequences if an organization
engages in cyber vigilantism?
What are other possible options for a "Pro-Active Defense"?
Background (available on the Web by title):
1. Hacking Back: Digital Revenge is Sweet but Risky [2013]
2. Should the U.S. Allow Companies to ‘Hack Back’ Against Foreign Cyber Spies? [2013]
3. Hacking Back is a Bad Idea after a Cyber Attack, DOJ Official Says [2013]
4. The text of the CFAA outlines penalties.
Sun | Mon | Tue | Wed | Thu | Fri | Sat |
---|---|---|---|---|---|---|
27 | 28 | 29 | 30 | 1 | 2 | 3 |
4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 |
18 | 19 | 20 | 21 | 22 | 23 | 24 |
25 | 26 | 27 | 28 | 29 | 30 | 31 |