The attribution of a malicious cyber incident consists of identifying the responsible party behind the activity. In this video, professors Jair Aguirre, Ben Boudreaux, and John Davis recommend creating an independent, international cyber attribution consortium tasked with investigating and publicly attributing major cyber attacks.
Ethics in Theory, Policy, and Practice
Professors: Boudreaux and Gonzalez
Ethical norms, sometimes codified in law and other forms such as professional codes of conduct, permeate our political, professional, and personal lives. In this course, we will review ethical frameworks, identify and evaluate ethical considerations underlying key public policy issues, and analyze norms that apply to decision-making in professional and social contexts. The goal of the course is to analyze ethical risks and consider our own ethical perspective so we are prepared to shape policy and make decisions that reflect our values and commitments.
The course is divided into three components. First, we will evaluate prominent ethical theories to equip us with a background in ethical theory and help us identify our most fundamental ethical principles. Second, we will analyze the ethical values and principles that underlie policy issues such as health care, education, immigration, and warfare. Third, we will examine the ethics of professional practice and personal life. This will be a discussion-oriented course with several short reflective writing assignments.