7.6. Exploiting the Relationship Verbal Notes | IT Ethics and Cybersecurity BIM | TU | TABFlux