Preview
Preview

Code of Ethics: Is Wifi the Wild Wild West of Computing? Essay

:: 8 Works Cited
Length: 1455 words (4.2 double-spaced pages)
Rating: Blue      
Open Document
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Wi-Fi, a shortened name for wireless fidelity internet access, is a method of connecting to the Internet using radio waves rather than cables, thus making computer usage more convenient than ever as the user is no longer restricted to the confines of his or her own private space. Now a wireless computer user can tap into their own or their employer’s wireless network, but they also may be able to tap into neighbor’s as well. With the increased availability of wireless computer networks comes a new ethical dilemma. Just because you can tap into someone else’s computer network, known variously as piggybacking, whacking, joyriding, war-chalking, air-hopping or war-driving, does that mean that it is ethical to do so?
While many people believe that tapping into someone else’s wireless network is a harmless activity and has no downsides for the wireless network’s owner, in reality there are indeed negative consequences and therefore the practice cannot be considered ethical. Courts have determined that joyriding on another’s wireless network is a case of trespass against the owner’s router because this action could cause harm by slowing down the speed of the network and/or by introducing viruses into that network. The person tapping into someone else’s Wi-Fi also causes harm to the Internet Service Provider. These companies are in business to sell access to the Internet. Using someone else’s account without their authorization denies companies their rightful profit.
There is also the potential harm that comes because someone doesn’t secure their Wi-Fi. It allows unauthorized access and in some cases allows firewalls and filters which have been established for security and safety particularly for minors to be evaded and ignored. In...


... middle of paper ...


...u.edu/administration/legal_computing/policy/main_policies.html
Kashi, J. (2004, May). Wireless insecurity. Law Practice Today. Retrieved September 27, 2008, from http://www.abanet.org/lpm/lpt/articles/tch05041.html
Kern, B. (2006, March 1). Whacking, joyriding, and war-driving: Roaming use of wi-fi and the law. The Computer & Internet Lawyer. Retrieved September 16, 2008, from Gale database.
Marriott, M. (2006, March 5). Hey neighbor, stop piggybacking on my wireless. New York Times. Retrieved October 1, 2008, from http://www.nytimes.com/2006/03/05/technology/05wireless.html?_r=2&ex=1163394000&en=33084aa17e24f649&ei=5070&oref=slogin&oref=slogin
Snow, N. (2006). Accessing the internet through the neighbor’s wireless internet connection: Physical trespass in virtaul reality. Nebraska Law Review, 84, 1226-65. Retrieved September 16, 2008, from Lexis Nexis database.


Click the button above to view the complete essay, speech, term paper, or research paper








This essay is 100% guaranteed.


Title Length Color Rating  
Essay on The Grid Computing Concept - The grid computing concept has been widely used in scientific research, oil and gas fields, banking and education a few years ago. In this work, we adopt the idea of grid computing but bring it to mobile and ubiquitous devices instead of traditional computers. Therefore, we propose a new concept: Mist Computing. Mist computing complements cloud computing where computing is performed far away, in the 'cloud'. Similar research conducted by Chu [5] extends an implementation of grid computing to mobile and ubiquitous devices and addresses some limitation problems mobile and ubiquitous devices introduce, such as limited resource and limited battery life....   [tags: Mist Computing, Cloud Computing] 662 words
(1.9 pages)
Better Essays [preview]
Code of Ethics in Computing and Information Systems Essay - Ethics are the moral principles by which we govern our lives. Ethics are an important part society because without them the general population that we call society would behave no better than the general population in prison. With this said, Ethics in computing and information systems are the behaviors that are considered acceptable by users and the functionality of the system being used. The information that passes through an information system must be handled ethically to ensure the safety of the user and sensitive information....   [tags: privacy, storage, technology]
:: 5 Works Cited
1254 words
(3.6 pages)
Strong Essays [preview]
Essay The Benefits of Cloud Computing - Cloud Computing “Cloud computing is a type of computing that relies on sharing computing resources rather than having local services or personal devices to handle applications. The cloud, is used as a metaphor for ‘the internet,’ so the phrase cloud computing means ‘a type of Internet-based computing,’ where different services-such as servers, storage and applications- are delivered to an organization’s computers and device through the Internet. Cloud computing is comparable to grid computing, a type of computing where unused processing cycles of all computers in a network are harnesses to solve problems too intensive for any stand-alone machine (Web 2.0).” Whereas “Web 2.0 is the term give...   [tags: sharing computing resources]
:: 5 Works Cited
1225 words
(3.5 pages)
Strong Essays [preview]
Essay about The Backgrounds of the Code - ... The UK Corporate Governance Code, being one of the most important instruments regulating this field of law, is still not a kind of legislation. And its successor, the Combined Code has never been. It was not passed by the Parliament either but came from the committees representing business and financial interests and it is invoked only to the companies, listed above, and only within the boundaries of the principle of “comply or explain”. The ‘comply or explain’ approach is taken by all the reports and codes in UK, including this new 2012 Code....   [tags: Code of UK Corporate Governance] 951 words
(2.7 pages)
Research Papers [preview]
Cloud Computing Software Essay - ... (Barnatt, 2010) Equal rights to all devices Cloud computing is accessible to any computer in question as long as the computer meets the requirements of a reliable internet connection as well as a web browser. It does not matter whether the computer in question is a traditional desktop or a tablet; the cloud is made available for all. For example if a Microsoft excel file is sent over the internet to a mail recipient, it can be viewed and edited compatibly only if the person has Microsoft excel installed on the device in use....   [tags: computing landscape, electronic data, ]
:: 10 Works Cited
1721 words
(4.9 pages)
Term Papers [preview]
The West Point Cheating Scandal Essay - The West Point Cheating Scandal Description: In April of 1976 it was found that there was a possibility that over half of the junior class at West Point Academy had violated the West Point honor code by cheating on a case assignment. The honor code states "A cadet will not lie, cheat, or steal, nor tolerate those who do." This was by far the largest violation of the honor code in West Point history and presented some unusual challenges to the administration. As the year dragged on it was found that more and more students possibly had cheated on the assignment and was also becoming a public relations nightmare in the press and internally to the Army branch of the United States militar...   [tags: West Point Academy Cheating Essays]
:: 3 Works Cited
1579 words
(4.5 pages)
Strong Essays [preview]
Essay on Code Defactoring - Refactoring is the process of making code more readable and amenable to change. It stands to reason, then, that defactoring must be its opposite. This has been my task for today. Earlier this week, my code failed a review (what a surprise). The problem was with a certain construct I had used to make up for the fact that ECMAScript does not support access control with keywords like “private” or “public” as other languages do, but does so in a different way. His view is that access control is subversive, and I should rewrite it using .prototype, so that all the members are public, but make it clear by commentary, documentation, and/or some naming convention, that “private” ones are only to be...   [tags: Computer Code] 777 words
(2.2 pages)
Better Essays [preview]
The American West Essay - The story of the American West is still being told today even though most of historic events of the Wild West happened over more than a century ago. In movies, novels, television, and more ways stories of the old west are still being retold, reenacted, and replayed to relive the events of the once so wild and untamed land of the west that so many now fantasize about. After reading about the old west and watching early westerns it is amazing how much Hollywood still glorifies the history and myth of the old west....   [tags: US History West Western] 1215 words
(3.5 pages)
Strong Essays [preview]
Code Of Hummurabi Essay - History is the past, which for the most part can not be scientificately proven. The real; goal of History is to rediscover past. A dramatic error happens when past is rediscovered from our own bias that is from the way we see it. Even certain artifacts and works pf literature that we have left from earlier civilizations can be interpreted in several different ways, or misinterpreted to a certain extend or entirely. Usually interpretation or even misinterpretation is affected bu the concept of ethnocentrism, where different communities have an already set up establishment of certain norms based on their own believes, traditions, social, legislative, and personal values and ethics from whi...   [tags: Hummurabi Code of Law]
:: 5 Works Cited
1491 words
(4.3 pages)
Strong Essays [preview]
Pervasive Computing Essays - Pervasive Computing Introduction: Pervasive computing is the trend towards increasingly ubiquitous (another name for the movement is ubiquitous computing), connected computing devices in the environment, a trend being brought about by a convergence of advanced electronic - and particularly, wireless - technologies and the Internet. Pervasive computing devices are not personal computers as we tend to think of them, but very tiny - even invisible - devices, either mobile or embedded in almost any type of object imaginable, including cars, tools, appliances, clothing and various consumer goods - all communicating through increasingly interconnected networks....   [tags: Pervasive Computing Technology] 1721 words
(4.9 pages)
Strong Essays [preview]