Tag Describe two (2) potential computer ethics issues associated with holding computers hostage.