Wi-Fi, a shortened name for wireless fidelity internet access, is a method of connecting to the Internet using radio waves rather than cables, thus making computer usage more convenient than ever as the user is no longer restricted to the confines of his or her own private space. Now a wireless computer user can tap into their own or their employer’s wireless network, but they also may be able to tap into neighbor’s as well. With the increased availability of wireless computer networks comes a new ethical dilemma. Just because you can tap into someone else’s computer network, known variously as piggybacking, whacking, joyriding, war-chalking, air-hopping or war-driving, does that mean that it is ethical to do so? While many people …show more content…
Hackers can listen in on network traffic and obtain information that people are unaware is being received. It is bad enough when an individual doesn’t secure their network but sometimes it is businesses whose customers are completely unaware of the security breach.
So for all of these reasons a new ethical code must be established which emphasizes to everyone that being a Wi-Fi parasite is not the right thing to do. Without a code of ethics any of the following two scenarios might happen in any school district across the country.
Scenario #1: Ms. C the school library media specialist (SLMS) at Exemplary High School uses her networked PC extensively during the day to help students do research, to communicate with staff members and administration via email, to access her library’s automation system, and to keep herself up-to-date on what is going on in her field. She can’t do her job without the use of a computer with Internet access.
One day the school’s network goes down. At first Ms. C views it as a minor annoyance but as the hours go by her growing frustration at not being able to get her work done causes her to see if there are any “available” wireless networks nearby. She gleefully realizes that there is an unsecured network that she can tap into. She unplugs her network cable and connects into the unsuspecting neighbor’s network. She is now able to get all of her work done and no one is the wiser. She doesn’t
One of the most significant concern facing IT industry in the 21st century is legal, social, ethical and professional issues that are associated with appropriate uses of technologies in computing. During the implantation of the Greenwich Freecycling website, many of these issues were encountered. By deploying the correct combination of technologies that is available when implementing the website some of these issues were conquered and overcome.
The excessive use of computers has drastically changed the lives of many users. As a multifaceted tool, the computer is used for tasks to include research, homework, business related
The vulnerabilities of wireless networking may involve the attack of web browsers, on-line banking, DNS servers, and routers exchanging routing table updates, purchases, transactions or stolen personal data. The lack of security with a wireless system may result in denial of service, hijacking, fake impersonation, or eavesdropping for interception of messages through cyber-crimes. Each communicating user should select the language of cryptography, agree and share the symmetric key. The best security practices includes firewalls, intrusion detection systems, secured and updated applications, transport, configured properly working network, and link layers.
The major retailer Target had an online security breach in 2013, which resulted in a loss on $3.2 million dollars in a single day. Almost 4 million credit card and debit card information were compromised Hackers infiltrated(DdoS) the servers of the online store during peak shopping time and implemented several bots to mislead customers to put their credit card information into a wrong location. Within hours all the information was recorded and this led to the biggest credit card fraudulence in recent times. What to take away from this incident? Not even the major corporations are safe from cyber attacks and lack better cyber security. Retailers’ revenue lost to online fraud increased over the past two years to reach an estimated $3.5 billion, an up of 3% from $3.4 billion in 2011(Cybersource 2013). A pie chart below demonstrates the distributions of the targets due in cyber
In the past, academic and administrative computer systems were isolated, either for security reasons or as a result of limited interconnectivity with other computers. Today, nearly any information that an administrator, teacher, student or parent might is available through a network connection. Course lectures are presented are viewed and students submit their assignments via the internet school class shell. Student and parents can view their grades online, administrative paperwork and other information can be shared through a variety of systems. The internet is an awesome and convenient way to communicate, but it introduces
Individuals need to keep their moral compass and clearly realize about the relationship between technology and ethics, even though technology can advance their lives. As the
From the very first discussion where we were tasked to consider what a CIO should do, I was keenly aware of how our own perspectives were such a large part of how we phrased our responses. Regardless of the topic, thinking from the consumer perspective is different from the business or information technology perspective. In this class, it has become apparent that information technology has its own perspective and set of ethics. In this class, we tried to apply traditional ethics to the uses of information technology, but often found that they do not fit as seamlessly as other technologies have in the past. This is because of the business perspective, the uniqueness of the technology, and the uncontrollability and thus unaccountability of the internet. It is clear that both private citizens and corporations do not adhere to the same ethical beliefs when information technology is part of the equation. I realized that our perspectives are often an expression of our ethics.
Take the recent Target hack, which leaked the personal data of 110 million customers. The breach reportedly began as an email-based phishing scheme. Although the retailer 's consumer-facing website is well defended, hackers were reportedly able to gain access into Target 's corporate network by using stolen authentication credentials from a subcontractor that dealt primarily in air conditioning. Someone in that subcontractor 's office clicked something bad.
In 1991 wifi was invented, and as the years go on wifi has been developing and changing in the most incredible ways. Wifi has also changed on how we communicate with people, and how we shop for items. As changes come, trouble also comes with it. In recent years, parents have been blaming wifi for the recent problems their children have been facing. The research and studies that have been conducted shows that an increase in wifi access and coverage does not pose a danger to students in
The film Killswitch was about the government trying to monopolize and control user traffic on the internet. Whether it is for security purposes or financial gain, our system of democracy is being compromised at a technological level. Several speakers including Tim Wu, expressed how “hacktivism” was a revolutionary tool used to take a stand against government interference.
Technology in the classroom is important to assist in the learning process; however this is creating new challenges for teachers. Teachers are now required to educate students on the importance of technology ethics. Computer ethics is the moral guidelines that govern the use of computers and networks (Shelly, G, Gunter, G, and Gunter, R 2012). Ethics in the classroom also requires teachers to explain what plagiarism is and the proper way for students to give credit for information attained from another source. Teachers must also have a plan in place to address internet security, as well as devise a student use agreement and discuss ethical practices while using technology in the classroom.
Some people lose their moral intuition when using computer technology because they assume that their actions do not have real consequences to others. The lack of physicality on the internet can alter one’s ability to empathize with other, which makes them feel that cybercrime morally acceptable. The moral imperatives in the ACM code of ethics can help people make moral choices with computer technology.
When firms like Home Depot and Target invests a lot of financial and non-financial resources to curb the menace, one is left to wonder why such vices continues to affect them and their clients. Hacking of companies in the United States have reached a sky high and notable names in the industry have been affected by the vice. The firms like Home Depot, JPMorgan, Michael, Nieman Marcus and Target, have had its share of this vice. The United States Postal Services have not been left behind also, because it was also affected by the hackers ( 'Cybercrime a
Cyber criminals take pride in creating chaos, and the chaos that cyber criminals inflict on their victims can be crippling to individuals and corporations. We have all heard about hackers getting information from major retail chains as well as information being leaked that included Social Security numbers for millions of people. We use the internet with somewhat of a naivete expectation that all of our information is safe. That is, until something untoward occurs, and then it can be all out panic.
It is important to note that whether an attack is perpetrated by a hacker group, other corporations or individuals, organizations must always prepare adequately through intrusion detection and prevention systems in place. Data breaches can have very devastating business and social impact to large businesses and their customers – the users. For instance, were Cloudflare attacked by a competing company, their trade secrets could have given the opponents ammunition to take them out of the field. In addition, lost data could influence criminal activity if for instance particular client information, for