Here is the synopsis of our sample research paper on Wireless Technology And Security. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
A 9 page paper that begins by identifying some of the many benefits of wireless technologies, including the fact that research studies reveal a substantial increase in worker productivity. Security concerns are discussed along with an explanation of the standards intended to reduce risks, such as Bluetooth and 802.11b standards. Hot spots are defined and discussed, including the fact that their numbers are growing exponentially. The essay ends with a discussion of the use of wireless technologies in hospitals and the concerns about installing them. Bibliography lists 8 sources.
Page Count:
9 pages (~225 words per page)
File: MM12_PGwep.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
independent (Posluns, 2002). Studies have revealed that after a company installed a WLAN (wireless local area network), employees spent 1.75 more hours per day when they are connected to the
network (Boyle, 2002). Another study conducted by Intel of its own employees found that WLANs "deliver 23 minutes of additional productivity per day" (Boyle, 2002, p. 205). Furthermore, employees estimated
the network saved them between 30 and 90 minutes per day (Boyle, 2002). * It is easy to share and transfer information (Posluns, 2002). * It is a cost-effective set-up,
especially in locations that are hard to wire, such as old buildings (Posluns, 2002). * Doctors and other health care providers can access needed information about the patient more quickly
(Posluns, 2002). Boyle reported the results of one study that revealed the use of Wi-Fi (wireless fidelity) cut the time a patient spends in the Oschner Clinic and Hospital emergency
room by 20 to 25 minutes since it installed a WLAN (2002). Both doctors and nurses use the WLAN network to register patients at their bedside (Boyle, 2002). * Requires
minimal information technology equipment for setting up networks (Posluns, 2002). There are also security issues that concern many. Some of the issues of concern include: authentication, authorization, encryption, misuse
and abuse in addition to hackers (Posluns, 2002). One of these issues is the malicious misuse of authorized personnel, which relates to an individual being authenticated as a valid user
to access the database and that individual fraudulently uses the accessible information (Posluns, 2002). Unintentional misuse by a person is a concern (Posluns, 2002). This refers to those users who
do not use or implement security tools, such as most home users (Posluns, 2002). They just let their operating systems and/or software work in its default setting (Posluns, 2002). This
...