1.2.14 Lab – Create Your Personal Code of Ethical Conduct Answers

1.2.14 Lab – Create Your Personal Code of Ethical Conduct

Objectives

  • Part 1: Research Approaches to Ethical Decision Making
  • Part 2: Research Code of Ethics
  • Part 3: Develop Your Own Personal Code of Ethical Conduct

Background / Scenario

When confronted with an ethical dilemma, what do you consider when making a decision?

Suppose you find a new USB 3.0 flash drive in the computer lab, what would you do? A student in your class says they found a site on the internet that has all of the class exams and quizzes with answers, what would you do?

Working in Cybersecurity is not always about stopping cyber attacks. As a Cybersecurity specialist, your organization may entrust you with some of the most sensitive data. As a result, you will be confronted with challenging ethical dilemmas, which may not have an easy or clear answer. For example, when researching a security breach, are the personal devices of employees and their personal content included?

The focus of this lab is to research approaches or perspectives for ethical decision making. Next, you will research code of ethics and finally you will create your own personal code of ethical conduct.

Required Resources

  • PC or mobile device with Internet access

Instructions

Part 1: Research Approaches to Ethical Decision Making

There are several approaches or perspectives on Ethical Decision Making, including Utilitarian ethics, the Rights approach and the Common Good approach. Other ethical decision models include the Fairness or Justice approach as well as the Virtue approach.

In this part, you will research each ethical decision model or framework and then formulate the underlying principle from that approach.

Use an internet browser to research approaches to ethical decision making.

Step 1: Research Utilitarian ethics

Define the underlying principle for the Utilitarian Ethics approach.

Answers will vary but should include on maximizing the greatest good for the most people.

Step 2: Research the Rights approach to ethical decision making.

Define the underlying principle for the Rights approach to ethical decision making.

Answers will vary but should include the fundamental rights of the individual and how we live our lives as well as respecting others and how they live their lives.

Step 3: Research the Common Good approach to ethical decision making.

Define the underlying principle for the Common Good approach to ethical decision making.

Answers will vary but should include the focus of community. Individuals should pursue the values and goals shared by other members of the community.

Step 4: Research the Fairness or Justice approach to ethical decision making.

Define the underlying principle for the Fairness or Justice approach to ethical decision making.

Answers will vary but should include the fairness of the outcome. Is the outcome equal for everyone? The outcome should not impose favoritism nor discrimination.

Part 2: Research Code of Ethics

Most organizations develop their own code of ethics. Developed by management, this document is based on values and principles to promote the company business with honesty and integrity.

In this part, you will research computer code of ethics and cybersecurity code of ethics.

Use an internet browser to research code of ethics.

Based on your research, create a list of at least ten items. The list should be sequential from most important to least important.

Answers will vary, but may include some of the items below:

1. Information stored on the computer should be treated as seriously as written or spoken words.
2. Respect the privacy of others.
3. Creation and usage of malware is illegal and must not be practiced.
4. Should not prevent others from accessing public information.
5. Overwhelming other’s system with unwanted information is unethical.
6. Sending inappropriate messages through email or chat is forbidden.
7. Do no harm with a computer
8. Comply with legal standards
9. Be trustworthy
10. Maintain confidentiality

Part 3: Develop Your Own Personal Code of Ethical Conduct

A code of conduct provides guidelines for acceptable as well as unacceptable specific behaviors.

Based on your research, develop a list of your own personal code of ethical conduct.

Create a code of ethics list of at least ten items. The list should be sequential from most important to least important.

Answers will vary but may include the ten commandments below.

1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s computer work.
3. Thou shalt not snoop around in other people’s computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid (without permission).
7. Thou shalt not use other people’s computer resources without authorization or proper compensation.
8. Thou shalt not appropriate other people’s intellectual output.
9. Thou shalt think about the social consequences of the program you are writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and respect for other humans

Reflection Questions

1. Is there a Cyber Security incident you remember where the company acted ethically or the company acted un-ethically? Explain.

Answers will vary but may include Equifax data breach.

2. What is a weakness or drawback to Utilitarian Ethics?

Answers will vary but may include the lack of fundamental individual rights.

3. Based on your list of code of ethics, which is the most challenging item in your list to implement?

Answers will vary but may include those items that are out of the control of the cybersecurity specialist. Example when to notify the public of a security incident.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments