Wi-Fi, a shortened name for wireless Internet access fidelity, is a method of connecting to the Internet using radio waves instead of cables, thus making computer use more convenient than ever since the user does not it is more limited to the confines of one's private space. Now a wireless computer user can connect to their own or their employer's wireless network, but they may also be able to connect to their neighbors' as well. With the increased availability of wireless computer networks comes a new ethical dilemma. Just because you can tap into someone else's computer network, known variously as piggybacking, whacking, joyriding, war-chalking, air-hopping or war-driving, does that mean it's ethical to do so? While many people believe that tapping into other people's wireless networks is a harmless activity and has no disadvantages for the owner of the wireless network, in reality there are negative consequences and therefore the practice cannot be considered ethical. Courts have ruled that using another's wireless network is a case of hacking the owner's router because this action could cause harm by slowing network speeds and/or introducing viruses to the network. The person accessing someone else's Wi-Fi also causes damage to the Internet service provider. These companies are in business to sell Internet access. Using someone else's account without their permission denies businesses legitimate profit. There's also the potential harm that comes from someone not securing their Wi-Fi network. It allows unauthorized access and in some cases allows you to bypass and bypass established firewalls and filters for safety and security, especially for minors. A...... middle of the document......u.edu/administration/legal_computing/policy/main_policies.htmlKashi, J. (2004, May). Wireless insecurity. Legal practice today. Retrieved September 27, 2008, from http://www.abanet.org/lpm/lpt/articles/tch05041.htmlKern, B. (2006, March 1). Whacking, joyriding and war-driving: roaming use of Wi-Fi and law. The lawyer specializing in IT and Internet. Retrieved September 16, 2008, from the Gale database.Marriott, M. (2006, March 5). Hey neighbor, stop carrying my wireless on your shoulders. New York Times. Retrieved October 1, 2008, from http://www.nytimes.com/2006/03/05/technology/05wireless.html?_r=2&ex=1163394000&en=33084aa17e24f649&ei=5070&oref=slogin&oref=sloginSnow, N. (2006). Accessing the Internet via your neighbor's wireless Internet connection: physical violation of virtual reality. Nebraska Law Review, 84, 1226-65. Retrieved September 16, 2008, from the Lexis Nexis database.
tags