1.7 (Chapter 9) Computer Ethics