2.9 Social Contract Theory - 2.10 Virtue Ethics - 3.2 Spam - 3.5 Censorship - 3.6 Free Speech - 3.8 Breaking Trust - 3.9 Internet Addiction - 4.2 IP - 4.3 IP Protection - 4.4 Fair Use - 4.5 Digital Media - 4.6 Cyber Lockers - 4.9 Open Source SW - 4.10 Creative Commons - 5.2 Privacy - 5.3 Information Disclosure - 5.4 Commercial Data Mining - 5.5 Consumer Backlash - 6.2-6.3 Gov Info Collection - 6.4 Gov Surveillance - 6.5-6.6 Wiretapping/Patroit Act - 6.7 Public/Private Databases - 6.8 Government Data Mining - 6.11 Invasion - 7.2 Hacking - 7.3 Malware - 7.4 Cyber Crime - 7.5 Online Voting - 8.2-8.3 SW Error - 8.4 SW Failure - 8.5 Therac-25 - 8.6 Computer Simulations - 8.7 Software Enineering - 8.8 Warranties Liability - 9.3 SE Code of Ethics - Maxim* 9.6 Whistle Blowers - 10.2 Automation - 10.3 Workplace Changes - 10.4 Globalization - 10.5 Digital Divide - 10.6 Winner Takes All - * already presented