blog




  • Essay / Code of Ethics: Is Wifi the Wild West of IT?

    Wi-Fi, the short name for wireless high-fidelity Internet access, is a method of connecting to the Internet using radio waves rather than cables, making computer use more convenient than never, because the user is no longer limited to the limits of his own private space. Now a wireless computer user can access their own or their employer's wireless network, but they can also access their neighbor's. With the increased availability of wireless computer networks, a new ethical dilemma arises. Just because you can access someone else's computer network, known as piggybacking, whacking, joyriding, war-chalking, air-hopping, or war-drive, does that mean that Is it ethical to do so? While many people believe that exploiting someone else's computer network is ethical. Someone else's wireless network is a harmless activity and has no downside for the owner of the wireless network, in reality there are indeed negative consequences and therefore the practice cannot be considered ethical. Courts have determined that wandering onto another's wireless network constitutes intrusion against the owner's router because this action could cause damage by slowing down network speeds and/or introducing viruses into that network. . The person who accesses someone else's Wi-Fi network also harms the Internet service provider. These companies are in the business of selling Internet access. Using someone else's account without their permission deprives businesses of their rightful profit. There is also potential harm if someone does not secure their Wi-Fi network. It allows unauthorized access and, in some cases, allows firewalls and filters that have been established to bypass and ignore safety and security, especially for minors. In......middle of article......u.edu/administration/legal_computing/policy/main_policies.htmlKashi, J. (May 2004). Wireless insecurity. The practice of law today. Retrieved September 27, 2008 from http://www.abanet.org/lpm/lpt/articles/tch05041.htmlKern, B. (March 1, 2006). Fisticuffs, car rides and war driving: roaming use of Wi-Fi and the law. The IT and Internet lawyer. Retrieved September 16, 2008 from the Gale database. Marriott, M. (March 5, 2006). Hey neighbor, stop connecting to my wireless network. New York Times. Retrieved October 1, 2008 from http://www.nytimes.com/2006/03/05/technology/05wireless.html?_r=2&ex=1163394000&en=33084aa17e24f649&ei=5070&oref=slogin&oref=sloginSnow, N. (2006). Accessing the Internet via the neighbor's wireless Internet connection: physical intrusion into virtual reality. Nebraska Law Review, 84, 1226-65. Retrieved September 16, 2008 from the Lexis Nexis database.