Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Chapter 6: I CT Ethics and Professionalism Page 1

Impact of ICT in Business and Society


Chapter 6: ICT Ethics and Professionalism
Understanding Ethical and Social issues related to systems

6.1. Ethics
Ethics are moral standards that help guide behaviour, actions, and choices.
Ethics: the study of principles that individuals and organizations can use to determine right and wrong
courses of action.

Ethics are grounded in the notion of responsibility (as free moral agents, individuals, organizations, and
societies are responsible for the actions that they take) and accountability (individuals, organizations, and
society should be held accountable to others for the consequences of their actions). In most societies, a
system of laws codifies the most significant ethical standards and provides a mechanism for holding
people, organizations, and even governments accountable. (Laudon, et al, 1996)

Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make
choices to guide their behaviours. Ethics has to do with making a principle-based choice between
competing alternatives. In the simplest ethical dilemmas, the choice is between right and wrong.
Information systems raise new ethical questions for both individuals and societies because they create
opportunities for intense social change, and thus threaten existing distribution of power, money, rights and
obligations. Information technology can be used to achieve social progress, but is can also be used to
commit crimes and threaten cherished social values.

6.2. Ethics in An Information Society
Basic Concepts: Responsibility, Accountability, And Liability
Ethical choices are decisions made by individuals who are responsible for the consequences of their
actions.
Responsibility is a key element of ethical action. Responsibility means that you accept the potential
costs, duties, and obligations for the decisions you make.
Accountability is a feature of systems and social institutions: It means that mechanisms are in place
to determine who took responsible action, who is responsible. Systems and institutions in which it is
impossible to find out who took what action are inherently incapable of ethical analysis or ethical
action.
Liability is a feature of political systems in which a body of laws is in place that permits individuals
to recover the damages done to them by other actors, systems, or organizations.
Due process is a related feature of law-governed societies and is a process in which laws are known
and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied
correctly.

The following are the basic concepts that form the underpinning ethical analysis of information systems
and those who manage them: -
1. Information technologies are filtered through social institutions, organizations, and individuals.
Systems do not have impacts by themselves.
2. Responsibility for the consequences of technology falls clearly on the institutions, organizations,
and individual managers who choose to use the technology.
3. In an ethical, political society, individuals and others can recover damages done to them through a
set of laws characterized by due process.
Chapter 6: I CT Ethics and Professionalism Page 2


6.4. Features of ICT and their potential Ethical, Legal, Social and /or Political implications
E-Commerce Technology Dimension Potential ethical, Social and Political significance
Ubiquity internet/Web technology is
available everywhere; at work, at home and
elsewhere via mobile devices
Work and shopping can invade family life, shopping
can distract workers at work, lowering productivity,
use of mobile devices can lead to automobile and
industrial accidents. Presents confusing issues of
nexus to taxation authorities
Global reach: The technology reaches across
national boundaries around the Earth
Reduces cultural diversity in products, weakens local
small firms while strengthening large global firms;
moves manufacturing production to low-wage areas
of the world; weakens the ability of all nations large
and small to control their information density
Universal standards: there is one set of
technology standards, namely internet
standards
Increases vulnerability to viruses and hacking attacks
worldwide affecting millions of people at once.
Increases the likelihood of information crime,
crimes against systems and deception.
Richness: Video, audio, and text messages
are possible
A screen technology that reduces use of text and
potentially the ability to read by focusing instead on
video and audio messages. Potentially very persuasive
messages that may reduce reliance on multiple
independent sources of information
Interactivity: The technology works through
interaction with the user
The nature of interactivity at commercial sites can be
shallow and meaningless. Customers e-mails are
frequently not read by human beings. Customers do
not really co-produce the product as much as they
co-produce the sale. The amount of customization
of products that occurs is minimal, occurring within
predefined platforms and plug-in options.
Information density: The technology reduces
information costs, raises quality
While the total amount of information available to all
parties increases, so does the possibility of false and
misleading information, unwanted information and
invasion of solitude, trust, authenticity, accuracy,
completeness and other quality features of
information can be degraded. The ability of
individuals and organizations to make sense out of
this plethora of information is limited.
Personalization /Customization: The
technology allows personalized messages to
be delivered to individuals as well as groups
Opens up the possibility of intensive invasion of
privacy for commercial and governmental purposes
that is unprecedented.
Social Technology: The technology enables
user content generation and social
networking.
Creates opportunities for cyber-bullying, abusive
language, and predation; challenges concepts of
privacy, fair use and consent to use posted
information; creates new opportunities for
surveillance by authorities and corporations into
private lives

Chapter 6: I CT Ethics and Professionalism Page 3

6.5. Moral Dimensions of Information Age
Globalization and digital convergence in the emerging knowledge society has raised complex ethical, legal
and societal issues. We are faced with complex and difficult questions regarding the freedom of
expression, access to information, the right to privacy, intellectual property rights, and cultural diversity.
ICT is an instrumental need of all humans for the gathering of information and knowledge, and as such,
should be guaranteed as a basic right to all human beings. All over the world, rights that are already legally
recognised are daily being violated, whether in the name of economic advancement, political stability,
religious causes, the campaign against terrorism, or for personal greed and interests.

Violations of these rights have created new problems in human social systems, such as;
The digital divide: refers to any inequalities between groups, broadly construed, in terms of access to,
use of, or knowledge of information and communication technologies (ICT).
Cybercrime; Offences that are committed against individuals or groups of individuals with a criminal
motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim
directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails,
notice boards and groups) and mobile phones (SMS/MMS)".
Digital security and privacy concerns,
'Digital Security' gives individuals the freedom to embrace the digital lifestyle to confidently engage
in everyday interactions across all digital devices.
All of which have affected peoples lives either directly or indirectly.

It is important that the countries come up with an assessment of the situation, followed by guidelines for
action to combat the incidence of malicious attacks on the confidentiality, integrity and availability of
electronic data and systems, computer-related crimes, such as forgery and fraud, content related offenses,
such as those related to child pornography, and violations of intellectual property rights (IPRs). Further,
threats to critical infrastructure and national interests arising from the use of the internet for criminal and
terrorist activities are of growing concern after the September 11 incident.

The harm incurred to businesses, governments and individuals in those countries in which the internet is
used widely, is gaining in scope and importance, while in other countries, cybercrime threatens the
application of information and communication technology for government services, health care, trade, and
banking. As users start losing confidence in transactions and business, the opportunity costs may become
substantial.

Ethical, Social, and Political issues Raised by information systems include the following five (5) moral
dimensions: -
1. Information Rights and Obligations
2. Property Rights and Obligations
3. Accountability and Control
4. System Quality
5. Quality of life

Ethical, Social and political issues are closely linked as shown in the Fig 1. Society is a delicate ecosystem
in partial equilibrium with individuals and with social and political institutions. Individuals know how to
act in the society because social institutions (family, Education, Organisations) have developed well honed
behaviour, and these are supported by the laws developed in the political sector that prescribe behaviour
and promise sanctions for violations. When the information technology is adopted in the society it
Chapter 6: I CT Ethics and Professionalism Page 4

destabilises the existing harmony in the society. Suddenly, individual actors are confronted with new
situations often not covered by the old rules. Social institutions cannot respond overnight to these changes
and it may take years to develop etiquette, expectations, social responsibility, political correct attitudes or
approved rules.


FIG: 1 The Relationship between Ethical, Social and Political issues in an Information Society

1. Information Rights: Privacy and freedom in the internet age
Privacy is the claim of individuals to be left alone, free from surveillance or interference from other
individuals or organisations, including the state. Information Technology threaten individual claims to
privacy by making the invasion of privacy cheap, Profitable and effective. In some countries privacy is
protect by the laws.
Issue;
What rights to their own personal information do individuals have in a public marketplace or in
their private homes, when internet technologies make information collection so pervasive and
efficient
What rights do individuals have to access information about business firms and other
organizations.

The basic concepts of privacy;
Privacy: The right to be left alone and free from surveillance or interference from other individuals or
organizations including the state.
Information privacy;
the claim that certain information should not be collected at all by the government or business
firms
the claims that individuals to control the use of whatever information that is collected about them

Fair Information Practices (FIP) Was developed by the US federal government advisory committee
to set principles governing the collection and use of information about individuals. FIP principles are
based on the notion of a mutuality of interest between the record holder and the individual. The
individual has an interest in engaging in a transaction, and the record keep usually an organisation or
Chapter 6: I CT Ethics and Professionalism Page 5

government requires information about the individual to support the transaction. Once the
information is gathered, the individual maintains an interest in the record, and the record may not be
used support other activities without the individuals consent. In 1998, the Federal Trade Commission
(FTC) restated and extended the original FIP to provide guidelines for protecting online privacy. Table
1 describes the FTCs Fair Information Practice principles.

Table 1: federal trade commission fair information practice principles
1 Notice/awareness
(core principle).
Web sites must disclose their information practices before collecting
data. Includes identification of collector; uses of data; other
recipients of data; nature of collection (active/inactive); voluntary or
required status; consequences of refusal; and steps taken to protect
confidentiality, integrity, and quality of the data.
2 Choice/consent
(core principle).
There must be a choice regime in place allowing consumers to
choose how their information will be used for secondary purposes
other than supporting the transaction, including internal use and
transfer to third parties.
3 Access/participation. Consumers should be able to review and contest the accuracy and
completeness of data collected about them in a timely, inexpensive
process.
4 Security. Data collectors must take responsible steps to assure that consumer
information is accurate and secure from unauthorized use.
5 Enforcement. There must be in place a mechanism to enforce FIP principles. This
can involve self-regulation, legislation giving consumers legal
remedies for violations, or federal statutes and regulations.

Internet Challenges to Privacy - Internet technology has posed new challenges for the protection of
individual privacy. Information sent over this vast network of networks may pass through many
different computer systems before it reaches its final destination. Each of these systems is capable of
monitoring, capturing, and storing communications that pass through it. Companies can also collect
their site users information without the site users knowing or giving consent for such information to
be collected. This is done using Cookies (are tiny files deposited on a computer hard drive when a user
visits certain Web sites) or Web bugs (are tiny graphic files embedded in e-mail messages and Web
pages that are designed to monitor who is reading the e-mail message or Web page and transmit that
information to another computer).

2. Property rights: intellectual property
Issue;
How can traditional intellectual property rights be enforced in an Internet world where perfect
copies of protected works can be made and easily distributed worldwide in seconds
Intellectual property: Creations of the mind, such as inventions, literary and artistic works, and
symbols, names, images and designs used in commerce.

Intellectual property is considered to be intangible property created by individuals or corporations.
Information technology has made it difficult to protect intellectual property because computerized
information can be so easily copied or distributed on networks.

Chapter 6: I CT Ethics and Professionalism Page 6

Intellectual property is subject to a variety of protections under three different legal traditions: trade
secrets / marks, copyright, and patent law
Trade secrets: Any intellectual work producta formula, device, pattern, or compilation of data-used
for a business purpose can be classified as a trade secret, provided it is not based on information in
the public domain
Trademark: A symbol used by businesses to identify their goods and services; government
registration of the trademark confers exclusive legal rights to its use.

Copyright - is a statutory grant that protects creators of intellectual property from having their work
copied by others for any purpose during the life of the author plus an additional 70 years after the
authors death. It is an exclusive right of the author or creator of a book, movie, musical composition
or other artistic property to print, copy, sell, license, distribute, transform to another medium, translate,
record, perform or otherwise use.

For corporate-owned works, copyright protection lasts for 95 years after their initial creation.
Copyright protection is extended to books, periodicals, lectures, dramas, musical compositions, maps,
drawings, artwork of any kind, and motion pictures. The intent behind copyright laws has been to
encourage creativity and authorship by ensuring that creative people receive the financial and other
benefits of their work.

A patent grants the owner an exclusive monopoly on the ideas behind an invention (fixed number of
years (for 20 years). The intent behind patent law is to ensure that inventors of new machines, devices,
or methods receive the full financial and other rewards of their labour and yet still makes widespread
use of the invention possible by providing detailed diagrams for those wishing to use the idea under
license from the patents owner.

Challenges to Intellectual Property Rights - Digital media differ from physical media like books,
periodicals, CDs, and newspapers in terms of ease of replication; ease of transmission; ease of alteration;
difficulty in classifying a software work as a program, book, or even music; compactnessmaking theft
easy; and difficulties in establishing uniqueness. The proliferation of electronic networks, including the
Internet, has made it even more difficult to protect intellectual property. Using networks, information can
be more widely reproduced and distributed.

3. Responsibility and Control: Who is responsible and who controls the use and abuse of information
from the People.
Who can and will be held accountable and liable for the harm done to individual and collective
information and property rights?
Computer-related liability problems: If software fails, who is responsible?
The new information technologies are challenging existing laws regarding liability and social
practices, to force individuals and institutions accountable for their actions.

4. System quality: data quality and system errors
What data standards, information processing programs should be required (or demanded) to ensure the
protection of individual rights and safety of society?
System quality is very important in the sense that the errors arising from these systems can cause
injuries to someone either physically or economically which the company can be held accountable.
The gray area is that some system errors are foreseeable and correctable only at very great expense, an
Chapter 6: I CT Ethics and Professionalism Page 7

expense so great that pursuing this level of perfection is not feasible economicallyno one could
afford the product.
Three principal sources of poor system performance are (1) software bugs and errors, (2) hardware or
facility failures caused by natural or other causes, and (3) poor input data quality.

5. Quality of life: equity, access, and boundaries
What values should be preserved and protected in a society based on information and knowledge?
What institutions should be protect from violation? What cultural values and practices are
supported by the new information technology?.
The negative social costs of introducing information technologies and systems are growing along
with the power of technology. Computers and information technologies can destroy valuable
elements of culture and society, while providing benefits.

Negative Consequences of ICT
The following are some of the negative social consequences of information systems, considering
individual, social, and political responses: -
Balancing Power: Center Versus Periphery - Lower-level employees may be empowered to make
minor decisions, but the key policy decisions may be as centralized as in the past.
Rapidity of Change: Reduced Response Time to Competition - Time-based competition has an
ugly side: The businesses may not have enough time to respond to global competitors and may be
wiped out in a year, along with employees job.
Maintaining Boundaries: Family, Work, and Leisure - Time spent on the computer threatens these
close social relationships. Workers can be able to do their work from home thus reducing the time
they are interacting with their families.
Dependence and Vulnerability - Today, our businesses, governments, schools, and private
associations, are incredibly dependent on information systems and are, therefore, highly vulnerable
if these systems fail.
Computer Crime and Abuse - Computer crime is the commission of illegal acts through the use
of a computer or against a computer system. Computer abuse is the commission of acts involving
a computer that may not be illegal but that are considered unethical such as Spamming.
Employment: Trickle-Down Technology and Reengineering Job Loss - redesigning business
processes could potentially cause millions of mid-level managers and clerical workers to lose their
jobs.
Equity and Access: Increasing Racial and Social Class Cleavages - digital divide is a situation
where distribution of ICT resources is depended on social classes. The families with the higher
income will be able to afford more ICT devices while those with lower income will just have a few
of these devices.
Health Risks: RSI, CVS, and Technostress - Repetitive stress injury (RSI) occurs when muscle
groups are forced through repetitive actions often with high-impact loads (such as tennis) or tens of
thousands of repetitions under low-impact loads (such as working at a computer keyboard).
Computer vision syndrome (CVS) refers to any eyestrain condition related to computer display
screen use. Its symptoms, which are usually temporary, include headaches, blurred vision, and dry
and irritated eyes. Technostress is the stress induced by computer use. Its symptoms include
aggravation, hostility toward humans, impatience, and fatigue. According to experts, humans
working continuously with computers come to expect other humans and human institutions to
behave like computers, providing instant responses, attentiveness, and an absence of emotion.

Chapter 6: I CT Ethics and Professionalism Page 8


6.6. Key technology trends that raise ethical issues
There are four key technological trends responsible for these ethical stresses and they are summarized in
Table 2.
TREND IMPACT
Computing power doubles every 18 months More organizations depend on computer systems for
critical operations.
Data storage costs rapidly declining Organizations can easily maintain detailed databases on
individuals.
Data analysis advances Companies can analyze vast quantities of data gathered
on individuals to develop detailed profiles of individual
behaviour.
Networking advances and the Internet Copying data from one location to another and
accessing personal data from remote locations are much
easier.
Table 2: technology trends that raise ethical issues

The use of computers to combine data from multiple sources and create electronic dossiers of detailed
information on individuals is called profiling.

Example: A new data analysis technology called nonobvious relationship awareness (NORA) has given
both the government and the private sector even more powerful profiling capabilities. NORA can take
information about people from many disparate sources, such as employment applications, telephone
records, customer listings, and wanted lists, and correlate relationships to find obscure hidden
connections that might help identify criminals or terrorists

6.7. Analyzing an Ethical Dilemma
When confronted with a situation that seems to present ethical issues, how should you analyze it?

Dilemma: a situation in which there are at least two diametrically opposed actions, each of which supports a
desirable outcome.

The following five-step process should help you to confront a situation that seems to present ethical issues:
1. Identify and describe clearly the facts - The facts will help you understand the situation at hand better.
2. Define the conflict or dilemma and identify the higher-order values involved - Ethical, social, and
political issues always reference higher values. The parties to a dispute all claim to be pursuing higher
values (e.g., freedom, privacy, protection of property, and the free enterprise system). Typically, an
ethical issue involves a dilemma: two diametrically opposed courses of action that support worthwhile
values.
3. Identify the stakeholders - Every ethical, social, and political issue has stakeholders: players in the
game who have an interest in the outcome, who have invested in the situation, and usually who have
vocal opinions. Find out the identity of these groups and what they want.
4. Identify the options that you can reasonably take - You may find that none of the options satisfy all the
interests involved, but that some options do a better job than others.
5. Identify the potential consequences of your options - Some options may be ethically correct but
disastrous from other points of view. Other options may work in one instance but not in other similar
instances.

Chapter 6: I CT Ethics and Professionalism Page 9

6.8. Ethical Principles
The following are the ethical principles with deep roots in many cultures that have survived throughout
recorded history.
1. Do unto others as you would have them do unto you (the Golden Rule). Putting yourself into the place
of others, and thinking of yourself as the object of the decision, can help you think about fairness in
decision making.
2. If an action is not right for everyone to take, it is not right for anyone (Immanuel Kants Categorical
Imperative). Ask yourself, If everyone did this, could the organization, or society, survive?
3. If an action cannot be taken repeatedly, it is not right to take at all (Descartes rule of change). This is
the slippery-slope rule: An action may bring about a small change now that is acceptable, but if it is
repeated, it would bring unacceptable changes in the long run. It might be stated as once started down
a slippery path, you may not be able to stop.
4. Take the action that achieves the higher or greater value (the Utilitarian Principle). This rule assumes
you can prioritize values in a rank order and understand the consequences of various courses of action.
5. Take the action that produces the least harm or the least potential cost (Risk Aversion Principle). Some
actions have extremely high failure costs of very low probability (e.g., building a nuclear generating
facility in an urban area) or extremely high failure costs of moderate probability (speeding and
automobile accidents). Avoid these high-failure-cost actions, paying greater attention obviously to
high-failure-cost potential of moderate to high probability.
6. Assume that virtually all tangible and intangible objects are owned by someone else unless there is a
specific declaration otherwise. (This is the ethical no free lunch rule.) If something someone else has
created is useful to you, it has value, and you should assume the creator wants compensation for this
work.

6.9. IT Profession and Ethical Issues?
For the purpose of this discourse, the key areas are those that relate to the Attitude, Skill and Knowledge of
the IT professional. Interestingly these are the same areas of change that training focuses on. Training
seeks to close or fill any gaps that an individual has in these areas.

Professional codes of conduct
When groups of people claim to be professionals, they take on special rights and obligations because of
their special claims to knowledge, wisdom, and respect. Professional codes of conduct are promulgated by
associations of professionals, the Association of Information Technology Professionals (AITP), and the
Association of Computing Machinery (ACM). These professional groups take responsibility for the partial
regulation of their professions by determining entrance qualifications and competence. Codes of ethics are
promises by professions to regulate themselves in the general interest of society.

However, does having superior IT skills, knowledge and certification make you a true professional
What is your attitude towards business ethics? In today's fast and slick business environment, how
relevant is ethics when you can take the easy way out?
The right attitude also extends to how you treat your clients or employers. Are you dependable and
trustworthy?
Is it truly ethical, for example, for a professional to take longer than necessary to perform a job? To say
that he/she is sick in order to take a day off for leisure? To fail to report rule violations by a co-worker?
The public expects the IT professional to be socially responsible and disciplined and should be a role
model for the youth.
Chapter 6: I CT Ethics and Professionalism Page 10

Some real-world ethical dilemmas
Information systems have created new ethical dilemmas in which one set of interests is pitted against
another. For example, many of the large telephone companies are using information technology to reduce
the sizes of their workforces. Voice recognition software reduces the need for human operators by enabling
computers to recognize a customers responses to a series of computerized questions. Many companies
monitor what their employees are doing on the Internet to prevent them from wasting company resources
on non business activities

In each instance, you can find competing values at work, with groups lined up on either side of a debate. A
company may argue, for example, that it has a right to use information systems to increase productivity and
reduce the size of its workforce to lower costs and stay in business. Employees displaced by information
systems may argue that employers have some responsibility for their welfare. Business owners might feel
obligated to monitor employee e-mail and Internet use to minimize drains on productivity. Employees
might believe they should be able to use the Internet for short personal tasks in place of the telephone. A
close analysis of the facts can sometimes produce compromised solutions that give each side half a loaf.

Ethical Issues and ICT Profession.
These are common unethical and unprofessional business habits and serves as current challenges of most
companies:
1. Plagiarism - Plagiarism is where the work of others is copied, but the author presents it as his or her
own work. This is a highly unethical practice, but happens quite frequently, and with all the
information that is now available on the Internet it is much easier to do and is happening more often.
2. Hacking - Unauthorized used or access of networked computer systems. Hackers break into, or hack
into a system. Hacking can be undertaken for a variety of reasons, such as the wish to damage a system
or the wish to understand how a system works, so that money can be made out of it. Alternatively,
there might be a desire to alert people to the fact that a system is insecure and needs improving.
3. Viruses - Clearly writing and spreading virus programs are unethical acts, they have very serious
consequences, and cause systems to crash and organisations to cease operating for certain periods.
4. Spamming sending unsolicited email to many users and usually for commercial purposes.
5. Flaming sending grave and offensive email or posting offensive messages to social / group bulletins.
6. Forwardi ng non- busi ness emai l s
7. Moonlighting - doing side jobs or personal business using companys network and computer system
8. Sharing of password, data and access to other users
9. Internet hijacking unauthorized use of another users email account and information.
10. Use of internet for personal use such as online shopping, browsing, social networking etc.
11. Acts which threatens the security of companys information.
12. Ergonomics/health issues - Responsible/ethically-minded employers will, hopefully, give due
consideration to this. This includes issues such as the importance of taking adequate breaks from using
the computer and ensuring that the screens comply with the regulations. Also, ensuring that the
positioning of the chair and the computer is appropriate for the user and providing foot rests, when
required.
13. Nanotechnology - Nanotechnology presents a new set of ethical dilemmas. Nanotechnology could
help humankind and help to provide adequate food and shelter. On the other hand, it could be very
dangerous. There are also various environmental issues to consider, such as the effect that
nanomaterials have on living systems.
14. Netiquette - There are also ethical/moral codes that should be adhered to, in the use of networks and
email correspondence. The setting up of such codes has become necessary as people have not always
Chapter 6: I CT Ethics and Professionalism Page 11

addressed each other in an appropriate manner through this means of communication, and in this way
they have behaved unethically.
15. Speed of computers - The pure speed at which computers operate can cause ethical problems in
themselves. It can allow people to perform unethical issues quickly, or perform operations that it was
difficult or impossible to perform before, such as browsing through files that one is not authorised to. It
can also mean that people do not give enough consideration before performing various actions.
16. Vendor-client issues - Ethical issues also arise in regard to vendor-client relationships, the vendor
being the computer supplier and the client being the person that is buying the computer system,
whether this be the hardware or software or both. If the user continually changes the system
specification, for example, to what extent should the vendor be prepared to adjust the system
specification accordingly? Other unethical acts include, for example, consultants selling the program to
the second client, after being paid to develop the program for the first client only. Also, the vendor
might provide hardware maintenance according to a written contract and for hardware to be repaired in
a timely manner, but the client might not believe that the repairs have been timely. Drawing up more
precise contracts might help here, but in some instances the outcome can probably only depend on
peoples individual moral consciences.
17. Wardriving it is the act of searching for Wi-Fi networks by moving vehicle. The tools used to locate
open networks are now freely available on the Internet and they are allowing people to liberally search
for free connections. Many are using GPS devices to measure the locations of networks and then log
these locations onto websites for others to use.

Reference
Ken Laudon et al..., Management of Information system, Elevenths Edition, Pearson, 2010

You might also like