2.9 Social Contract Theory - 2.10 Virtue Ethics - Hampshire 2/19* 2.12 Morality of Breaking the Law 3.2 Spam - Azam 1/29* 3.5 Poliitcal Impact of Social Media - Howard 2/5* 3.6 Censorship - Bate 3/11 3.7 Freedom of Expression - Azzopardi 3/11 3.8 Children and Inapporpriate Content - MacFadyen 3.9 Breaking Trust - Das 3.10 Internet Addiction - Fielder 3/11 4.2 IP - 4.3 IP Protection - Taylor 1/29* 4.4 Fair Use - Westfall 4/1 4.5 Digital Media - Virk 2/19* 4.6 P-to-P Networks and Cyber Lockers - 4.7-4.8 Protections for Software - Smith 2/19* 4.9 Open Source SW - Dettloff 3/11 4.10 Creative Commons - Mona 2/19* 5.2 Privacy - Pierson 2/19* 5.3 Information Disclosure - VanHooser 3/11 5.4 Commercial Data Mining - Wadhwa 1/29* 5.5 Consumer Backlash - 6.2-6.3 Gov Info Collection - 6.4 Gov Surveillance - Reeves-Carson 3/11 6.5-6.6 Wiretapping/Patroit Act - Santangelo 4/1 6.7 Public/Private Databases - 6.8 Government Data Mining - Josebalan 4/1 Dudley 4/8 6.9 National ID Card - Nill 4/1 6.10 Information Dissemination - 6.11 Invasion - Klaus 2/5* 7.2 Hacking - Darwiche 1/29* 7.3 Malware - Tomlin 4/1 7.4 Cyber Crime - McInnes 2/5* 7.5 Online Voting - Hessling 2/5* 8.2-8.3 SW Error - 8.4 SW Failure - 8.5 Therac-25 - ElMajzoub 2/5* 8.6 Tesla Autopilot - Estrope 8.7 Yber Test Vehicle Accident - Patel 4/1 8.8 Computer Simulations - Nassar 8.10 Warranties Liability - 9.3 SE Code of Ethics - Maxim* 9.6 Whistle Blowers - Kelly 2/19* 10.2 Automation - Bonev 1/29* 10.3 Workplace Changes - 10.4 Globalization - Ahmad 1/29* 10.5 Digital Divide - 10.6 Winner Take All - * already presented