Chapter 5 Digital Security Ethics and Privacy