Wednesday, January 8, 2020

Code of Ethics Is Wifi the Wild Wild West of Computing...

Wi-Fi, a shortened name for wireless fidelity internet access, is a method of connecting to the Internet using radio waves rather than cables, thus making computer usage more convenient than ever as the user is no longer restricted to the confines of his or her own private space. Now a wireless computer user can tap into their own or their employer’s wireless network, but they also may be able to tap into neighbor’s as well. With the increased availability of wireless computer networks comes a new ethical dilemma. Just because you can tap into someone else’s computer network, known variously as piggybacking, whacking, joyriding, war-chalking, air-hopping or war-driving, does that mean that it is ethical to do so? While many people†¦show more content†¦Hackers can listen in on network traffic and obtain information that people are unaware is being received. It is bad enough when an individual doesn’t secure their network but sometimes it is busine sses whose customers are completely unaware of the security breach. So for all of these reasons a new ethical code must be established which emphasizes to everyone that being a Wi-Fi parasite is not the right thing to do. Without a code of ethics any of the following two scenarios might happen in any school district across the country. Scenario #1: Ms. C the school library media specialist (SLMS) at Exemplary High School uses her networked PC extensively during the day to help students do research, to communicate with staff members and administration via email, to access her library’s automation system, and to keep herself up-to-date on what is going on in her field. She can’t do her job without the use of a computer with Internet access. One day the school’s network goes down. At first Ms. C views it as a minor annoyance but as the hours go by her growing frustration at not being able to get her work done causes her to see if there are any â€Å"available† wireless networks nearby. She gleefully realizes that there is an unsecured network that she can tap into. She unplugs her network cable and connects into the unsuspecting neighbor’s network. She is now able to get all of her work done and no one is the wiser. She doesn’tShow MoreRelatedProject Mgmt296381 Words   |  1186 PagesThe trial version of Microsoft Project software is included on its own CD-ROM free with the text. Acknowledgments We would like to thank Richard Bruce, Ottawa University for updating the Test Bank and Online Quizzes; Charlie Cook, University of West Alabama for revising the PowerPoint slides; Oliver F. Lehmann for providing access to PMBOK study questions; and Mink for accuracy checking the text and Instructor’s Resource Manual content. Next, it is important to note that the text includes contributions

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.