The Cyber Ethics From Both An Employee’s And Customer’s Perspective.

The Global Marketplace.
12/09/2019
The Role Of Technology In How The Media Is Organized As A Business And How Information Is Presented To The Public.
12/09/2019

The Cyber Ethics From Both An Employee’s And Customer’s Perspective.

Course Objective

Assess ethical dilemmas that occur in organizations in the context of cybersecurity and develop

constructive resolutions based upon application of ethical theories, principles, and models.

 

The class discusses cyber ethics from both an employee’s and customer’s perspective. The readings

below are included for direction/context purposes for those not familiar with the concepts and can be

found on the Internet.

Question 1.

Code of Ethics

If you were writing a code of ethics, what would be the most important practices to include in your

company 's acceptable use policy, Internet use policy, or acceptable conduct policy?

Question 2

Effect of Cultural Values

Identify examples of how cultural values affect moral legitimacy and cyber ethics norms. How

can cultural values, traditions, religion, the desire for higher economic status, or poor local law

enforcement possibly affect the ability to regulate copyright piracy or other illicit activity globally?

Background (available on the Web by title):

1. IP Commission Report on the Theft of American Intellectual Property [2013 – see esp. sections on

China]

2. Cyber Espionage and the Theft of U.S. Intellectual Property and Technology [2013 – video / transcripts

of Congressional hearing]

Question 3

Cyber Vigilantism and Proactive Defense

Cyber Vigilantism is a term that describes what may occur when an organization decides to hack back, or

employ another company to launch a cyberattack against a suspected hacker that has disrupted their

assets.  When this is done by an organization, it may be actions taken for revenge or to protect

important assets against future cyber attacks by using a “Pro-Active Defense".

Is this practice currently illegal, and what could be some possible consequences if an organization

engages in cyber vigilantism?

What are other possible options for a "Pro-Active Defense"?

Background (available on the Web by title):

1. Hacking Back: Digital Revenge is Sweet but Risky [2013]

2. Should the U.S. Allow Companies to ‘Hack Back’ Against Foreign Cyber Spies? [2013]

3. Hacking Back is a Bad Idea after a Cyber Attack, DOJ Official Says [2013]

4. The text of the CFAA outlines penalties.

Instruction Files
 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Use Code FREE20

WhatsApp Chat with us on Whatsapp