Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Different roles of wireless technology in society
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Different roles of wireless technology in society
Wi-Fi, a shortened name for wireless fidelity internet access, is a method of connecting to the Internet using radio waves rather than cables, thus making computer usage more convenient than ever as the user is no longer restricted to the confines of his or her own private space. Now a wireless computer user can tap into their own or their employer’s wireless network, but they also may be able to tap into neighbor’s as well. With the increased availability of wireless computer networks comes a new ethical dilemma. Just because you can tap into someone else’s computer network, known variously as piggybacking, whacking, joyriding, war-chalking, air-hopping or war-driving, does that mean that it is ethical to do so?
While many people believe that tapping into someone else’s wireless network is a harmless activity and has no downsides for the wireless network’s owner, in reality there are indeed negative consequences and therefore the practice cannot be considered ethical. Courts have determined that joyriding on another’s wireless network is a case of trespass against the owner’s router because this action could cause harm by slowing down the speed of the network and/or by introducing viruses into that network. The person tapping into someone else’s Wi-Fi also causes harm to the Internet Service Provider. These companies are in business to sell access to the Internet. Using someone else’s account without their authorization denies companies their rightful profit.
There is also the potential harm that comes because someone doesn’t secure their Wi-Fi. It allows unauthorized access and in some cases allows firewalls and filters which have been established for security and safety particularly for minors to be evaded and ignored. In...
... middle of paper ...
...u.edu/administration/legal_computing/policy/main_policies.html
Kashi, J. (2004, May). Wireless insecurity. Law Practice Today. Retrieved September 27, 2008, from http://www.abanet.org/lpm/lpt/articles/tch05041.html
Kern, B. (2006, March 1). Whacking, joyriding, and war-driving: Roaming use of wi-fi and the law. The Computer & Internet Lawyer. Retrieved September 16, 2008, from Gale database.
Marriott, M. (2006, March 5). Hey neighbor, stop piggybacking on my wireless. New York Times. Retrieved October 1, 2008, from http://www.nytimes.com/2006/03/05/technology/05wireless.html?_r=2&ex=1163394000&en=33084aa17e24f649&ei=5070&oref=slogin&oref=slogin
Snow, N. (2006). Accessing the internet through the neighbor’s wireless internet connection: Physical trespass in virtaul reality. Nebraska Law Review, 84, 1226-65. Retrieved September 16, 2008, from Lexis Nexis database.
Works Cited for: Caplan, Hayley. How to Avoid Cell Phone Identity Theft? What Is Privacy? N.p., 31 July 2012. Web.
In this micro-study, I will use tools and information available to the public via internet in attempt to hack the iPhone. Currently the iPhone is only sold to subscribers of the AT&T telecommunication service provider and all applications and updates are installed using Apple’s iTunes software. Using various resources I will focus the two main issues which have put Apple and the iPhone user community into the limelight. First, the “unlocking” of the iPhone, which bypasses the iTunes activations process and allows the device to be used on any SIM (Subscriber Information Module) card cellular phone service provider other than AT&T, in this micro-study I will be using a T-Mobile SIM card. Second, I will attempt to “jailbreak” the device, which will allow me to install third-party applications through underground sources and not directly from Apple. As I attempt to hack the iPhone, I will compare drawbacks and benefits of hacking methods, ease of use, and verify Apple’s claims on affecting functionality and possible damag...
The Hacker Crackdown: Law and Disorder on the Electronic Frontier by Bruce Sterling is a book that focuses on the events that occurred on and led up to the AT&T long-distance telephone switching system crashing on January 15, 1990. Not only was this event rare and unheard of it took place in a time when few people knew what was exactly going on and how to fix the problem. There were a lot of controversies about the events that led up to this event and the events that followed because not only did it happen on Martin Luther King Day, but few knew what the situation truly entailed. There was fear, skepticism, disbelief and worry surrounding the people that were involved and all of the issues that it incorporated. After these events took place the police began to crackdown on the law enforcement on hackers and other computer based law breakers. The story of the Hacker Crackdown is technological, sub cultural, criminal, and legal. There were many raids that took place and it became a symbolic debate between fighting serious computer crime and protecting the civil liberties of those involved.
allow almost anyone access to the internet virtually anonymously and untraceably. The cyber investigator can attempt to obtain the IP address, which would lead investigators to the actual computer used to commit a crime. (Walker, Brock, & Stuart, 2006) However, when that computer is in a net café, with literally hundreds of potential users, finding the one person who committed the crime just becomes infinitely more difficult to achieve because the criminal knows that there are open ports to gain free unlimited access to the internet.
“Smartphones and the 4th Amendment”. The New York Times. (27 Apr. 2014).Web. 28 Apr. 2014.
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
The 20 Enemies of the Internet. 1999. Radio Free Europe / Radio Liberty. Feb 20, 2001. <http://www.rferl.org/nca/special/enemies.html>.
Ever since day one, people have been developing and creating all sorts of new methods and machines to help better everyday life in one way or another. Who can forget the invention of the ever-wondrous telephone? And we can’t forget how innovative and life-changing computers have been. However, while all machines have their positive uses, there can also be many negatives depending on how one uses said machines, wiretapping in on phone conversations, using spyware to quietly survey every keystroke and click one makes, and many other methods of unwanted snooping have arisen. As a result, laws have been made to make sure these negative uses are not taken advantage of by anyone.
The Other Side of Mobile Threats? Retrieved from Trend Micro: http://blog.trendmicro.com/trendlabs-security-intelligence/exploiting-vulnerabilities-the-other-side-of-mobile-threats/. Wright, J. a. The adage of the adage of the adage of the adage of the adage of the adage of the a Five Wireless Threats You May Not Know! Retrieved from SANS: http://www.sans.edu/research/security-laboratory/article/wireless-security-1.
However, government agencies, especially in America, continue to lobby for increased surveillance capabilities, particularly as technologies change and move in the direction of social media. Communications surveillance has extended to Internet and digital communications. law enforcement agencies, like the NSA, have required internet providers and telecommunications companies to monitor users’ traffic. Many of these activities are performed under ambiguous legal basis and remain unknown to the general public, although the media’s recent preoccupation with these surveillance and privacy issues is a setting a trending agenda.
Musil, Steven. "Michigan man dodges prison in theft of Wi-Fi." 22 May 2007. CNET News. 18 June 2010 .
Powell, Robert. "Four Ways Technology Invades Your Privacy." Lovemoney.com. N.p., 5 Oct. 2011. Web. 15 Apr. 2014.
The propose research will address a problem confronting many two year institutions in the present-day (i.e. how to best plan, design, and implement WLAN technologies). While WLAN technologies offer the benefits of mobility, reduced installation time, and decreased cost, many challenges must be met by institutions deploying them (Geier, 2005). These issues are related to security, speed, interoperability, and equipment selection, ease of use, reliability, signal interference, installation, and health risks.
In the early years of computers and computerized technology, computer engineers had to believe that their contribution to the development of computer technology would produce positive impacts on the people that would use it. During the infancy of computer technology, ethical issues concerning computer technology were almost nonexistent because computers back then were not as multifaceted as they are today. However, ethical issues relating to computer technology and cyber technology is undeniable in today’s society. Computer technology plays a crucial role in all aspects of our daily lives. Different forms of computer technology provide unique functionalities that allow people to perform daily activities effectively and efficiently. In modern society, we use computer and cyber technology to communicate with friends and family via social networking sites, participate in business transactions, and get current news. Different tasks require unique technological feature in computer technology to function properly. Although, unique technological features increase people’s proficiency in accomplishing various tasks, unique technological features in computer and cyber technology increase security vulnerabilities. In many cases, the security vulnerabilities in computer technology are exploited by cybercriminals to invade people’s privacy, and steal people’s identity. We know that computers have no moral compass; they cannot make moral decisions for themselves. Essentially, people make moral decisions that affect others positively or negatively depending on how they use computer technology. Some of the biggest ethical issues facing people in the computing environment include privacy concerns on the web and identity theft. Privacy concerns...
This paper is going to discuss wireless security from a broad view where I will go into why wireless security is so important, especially today as the ways in which we communicate is changing dramatically. From there I will discuss the multiple wireless security options that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally, I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden. Wireless is everywhere today whether at home working from your WIFI network to work where you might be linked to a wireless network or even through your phone through a 3G or 4G network to connect to an open wireless network.