Sample Essay on:
Wireless Technology And Security

Here is the synopsis of our sample research paper on Wireless Technology And Security. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

A 9 page paper that begins by identifying some of the many benefits of wireless technologies, including the fact that research studies reveal a substantial increase in worker productivity. Security concerns are discussed along with an explanation of the standards intended to reduce risks, such as Bluetooth and 802.11b standards. Hot spots are defined and discussed, including the fact that their numbers are growing exponentially. The essay ends with a discussion of the use of wireless technologies in hospitals and the concerns about installing them. Bibliography lists 8 sources.

Page Count:

9 pages (~225 words per page)

File: MM12_PGwep.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

independent (Posluns, 2002). Studies have revealed that after a company installed a WLAN (wireless local area network), employees spent 1.75 more hours per day when they are connected to the network (Boyle, 2002). Another study conducted by Intel of its own employees found that WLANs "deliver 23 minutes of additional productivity per day" (Boyle, 2002, p. 205). Furthermore, employees estimated the network saved them between 30 and 90 minutes per day (Boyle, 2002). * It is easy to share and transfer information (Posluns, 2002). * It is a cost-effective set-up, especially in locations that are hard to wire, such as old buildings (Posluns, 2002). * Doctors and other health care providers can access needed information about the patient more quickly (Posluns, 2002). Boyle reported the results of one study that revealed the use of Wi-Fi (wireless fidelity) cut the time a patient spends in the Oschner Clinic and Hospital emergency room by 20 to 25 minutes since it installed a WLAN (2002). Both doctors and nurses use the WLAN network to register patients at their bedside (Boyle, 2002). * Requires minimal information technology equipment for setting up networks (Posluns, 2002). There are also security issues that concern many. Some of the issues of concern include: authentication, authorization, encryption, misuse and abuse in addition to hackers (Posluns, 2002). One of these issues is the malicious misuse of authorized personnel, which relates to an individual being authenticated as a valid user to access the database and that individual fraudulently uses the accessible information (Posluns, 2002). Unintentional misuse by a person is a concern (Posluns, 2002). This refers to those users who do not use or implement security tools, such as most home users (Posluns, 2002). They just let their operating systems and/or software work in its default setting (Posluns, 2002). This ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now