메뉴 건너뛰기




Volumn 9, Issue 3, 2007, Pages 179-186

Theft in a wireless world

Author keywords

802.11; Broadband; Ethics; Internet; Morality; Network; Theft; Value; WEP; Wireless; WPA

Indexed keywords

802.11; BROADBAND; ETHICS; MORALITY; THEFT; VALUE; WEP; WPA;

EID: 36949008550     PISSN: 13881957     EISSN: 15728439     Source Type: Journal    
DOI: 10.1007/s10676-007-9139-1     Document Type: Article
Times cited : (3)

References (12)
  • 1
    • 84876617466 scopus 로고    scopus 로고
    • Attorney General's Department. Criminal Code Act 1995 (accessed 7 February 2007)
    • Attorney General's Department. Criminal Code Act 1995. In Office of Legislative Drafting and Publishing, http://www.comlaw.gov.au/ComLaw/ Legislation/ActCompilation1.nsf/framelodgmentattachments/ 2088CEAEEE78C48BCA25725C00838526 (accessed 7 February, 2007), 2006
    • (2006) In Office of Legislative Drafting and Publishing
  • 2
    • 84876631206 scopus 로고    scopus 로고
    • Australian Communications Authority. Wireless Local Area Networks: Frequently Asked Questions. In (accessed 22 June, 2005)
    • Australian Communications Authority. Wireless Local Area Networks: Frequently Asked Questions. In https://www.aca.gov.au/consumer_info/ frequently_asked_questions/WLANs_FAQ.pdf (accessed 22 June, 2005), 2004
    • (2004)
  • 5
    • 84876618645 scopus 로고    scopus 로고
    • In (accessed 22 June, 2005)
    • J.C. Dvorak. The Looming Legal Threat to Wi-Fi. In http://www.pcmag.com/ article2/0,1759,1565274,00.asp?kc=PCRSS03079TX1K0000584 (accessed 22 June, 2005), 2004
    • (2004) The Looming Legal Threat to Wi-Fi
    • Dvorak, J.C.1
  • 6
    • 84876619051 scopus 로고    scopus 로고
    • In (accessed 7 February, 2007)
    • S. Fogie, Cracking Wi-Fi Protected Access (WPA), Part 1. In http://www.informit.com/articles/printerfriendly.asp?p=369221&rl=1 (accessed 7 February, 2007), 2005
    • (2005) Cracking Wi-Fi Protected Access (WPA) , Issue.PART 1
    • Fogie, S.1
  • 7
    • 84876655673 scopus 로고    scopus 로고
    • In (accessed 7 February, 2007)
    • S. Fogie, Cracking Wi-Fi Protected Access (WPA), Part 2. In http://www.informit.com/articles/printerfriendly.asp?p=370636&rl=1 (accessed 7 February, 2007), 2005
    • (2005) Cracking Wi-Fi Protected Access (WPA) , Issue.PART 2
    • Fogie, S.1
  • 8
    • 2342647845 scopus 로고    scopus 로고
    • Value-Sensitive Design
    • Friedman, B. (1996) Value-Sensitive Design. Interactions 3(6): 16-23
    • (1996) Interactions , vol.3 , Issue.6 , pp. 16-23
    • Friedman, B.1
  • 9
    • 84876630901 scopus 로고    scopus 로고
    • Law Reform Commission. Discussion Paper 22 (1991) - In (accessed 22 June, 2005)
    • Law Reform Commission. Discussion Paper 22 (1991) - Community Law Reform Program: Neighbour and Neighbour Relations. In http://www.lawlink.nsw.gov.au/lrc.nsf/pages/DP22CHP3 (accessed 22 June, 2005), 2002
    • (2002) Community Law Reform Program: Neighbour and Neighbour Relations
  • 10
    • 84876626765 scopus 로고
    • Ministry of Justice. Theft Act 1968 (C. 60). In (accessed 30 July, 2007)
    • Ministry of Justice. Theft Act 1968 (C. 60). In Ministry of Justice, http://www.statutelaw.gov.uk/content.aspx?activeTextDocId=1204238 (accessed 30 July, 2007), 1991
    • (1991) Ministry of Justice
  • 11
    • 85008025259 scopus 로고    scopus 로고
    • How Computer Systems Embody Values
    • March
    • H. Nissenbaum. How Computer Systems Embody Values. Computer, 118-120, March 2001
    • (2001) Computer , pp. 118-120
    • Nissenbaum, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.