{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:01:49Z","timestamp":1760061709668,"version":"3.41.0"},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"8","license":[{"start":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T00:00:00Z","timestamp":1185926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2007,8]]},"abstract":"<jats:p>Unauthorized users risk civil and criminal liability; Wi-Fi network providers risk system intrusion and disruption.<\/jats:p>","DOI":"10.1145\/1278201.1278209","type":"journal-article","created":{"date-parts":[[2007,9,14]],"date-time":"2007-09-14T13:44:55Z","timestamp":1189777495000},"page":"72-77","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Unintended invitation"],"prefix":"10.1145","volume":"50","author":[{"given":"Janice C.","family":"Sipior","sequence":"first","affiliation":[{"name":"Villanova University, Villanova, PA"}]},{"given":"Burke T.","family":"Ward","sequence":"additional","affiliation":[{"name":"Villanova University, Villanova, PA"}]}],"member":"320","published-online":{"date-parts":[[2007,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1076211.1076229"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015864.1015879"},{"key":"e_1_2_1_3_1","volume-title":"July 30","author":"Frost","year":"2003","unstructured":"Frost &amp; Sullivan. Free Hotspots Restrict Revenues for Wi-Fi service Providers. Presss Release , July 30 , 2003 ; www.frost.com\/prod\/servlet\/press-release.pag?docid=5115637&ctxixpLink=FcmCtx6 &ctxixpLabel=FcmCtx7. Frost &amp; Sullivan. Free Hotspots Restrict Revenues for Wi-Fi service Providers. Presss Release, July 30, 2003; www.frost.com\/prod\/servlet\/press-release.pag?docid=5115637&ctxixpLink=FcmCtx6 &ctxixpLabel=FcmCtx7."},{"key":"e_1_2_1_4_1","first-page":"5","volume":"64","author":"Goldsborough R.","year":"2004","unstructured":"Goldsborough , R. Leveraging the Internet's marketplace of ideas. Tech Directions 64 , 5 ( Dec. 2004 ), 9. Goldsborough, R. Leveraging the Internet's marketplace of ideas. Tech Directions 64, 5 (Dec. 2004), 9.","journal-title":"Tech Directions"},{"key":"e_1_2_1_5_1","author":"Hines M.","year":"2005","unstructured":"Hines , M. Worried about Wi-Fi security? CNET News.com ( Jan. 19, 2005 ); news.com.com\/Worried+about+Wi-Fi+security\/2100-7347_3-5540969.html. Hines, M. Worried about Wi-Fi security? CNET News.com (Jan. 19, 2005); news.com.com\/Worried+about+Wi-Fi+security\/2100-7347_3-5540969.html.","journal-title":"News.com"},{"key":"e_1_2_1_6_1","volume-title":"R., and Thornton, F. WarDriving: Drive, Detect, Defend, A Guide to Wireless Security","author":"Hurley C.","year":"2004","unstructured":"Hurley , C. , Puchol , M. (Ed.), Rogers , R., and Thornton, F. WarDriving: Drive, Detect, Defend, A Guide to Wireless Security . Syngress Publishing, Inc. , Rockland, MA , 2004 . Hurley, C., Puchol, M. (Ed.), Rogers, R., and Thornton, F. WarDriving: Drive, Detect, Defend, A Guide to Wireless Security. Syngress Publishing, Inc., Rockland, MA, 2004."},{"key":"e_1_2_1_7_1","volume-title":"Toronto (Feb. 25, 2004","author":"Kapica J.","year":"2004","unstructured":"Kapica , J. Consumers still hazy on Wi-Fi facts: Study. Globeandmail.com, a division of CTVglobalmedia Publishing, Inc ., Toronto (Feb. 25, 2004 ); www.globetechnology.com\/servlet\/story\/RTGAM. 2004 0225.gtWi-ifeb25\/ BNStory \/Technology. Kapica, J. Consumers still hazy on Wi-Fi facts: Study. Globeandmail.com, a division of CTVglobalmedia Publishing, Inc., Toronto (Feb. 25, 2004); www.globetechnology.com\/servlet\/story\/RTGAM.20040225.gtWi-ifeb25\/ BNStory \/Technology."},{"key":"e_1_2_1_8_1","volume-title":"Be aware of wireless threats. TechRepublic, a CNET Networks site (Oct. 21","author":"Mullins M.","year":"2005","unstructured":"Mullins , M. Be aware of wireless threats. TechRepublic, a CNET Networks site (Oct. 21 , 2005 ); insight.zdnet.co.uk\/communications\/wireless\/0,39020430,39232729,00.htm. Mullins, M. Be aware of wireless threats. TechRepublic, a CNET Networks site (Oct. 21, 2005); insight.zdnet.co.uk\/communications\/wireless\/0,39020430,39232729,00.htm."},{"key":"e_1_2_1_9_1","first-page":"7","volume":"9","author":"Ryan P.","year":"2004","unstructured":"Ryan , P. War , peace, or stalemate: Wargames , wordily, wardriving, and the emerging market for hacker ethics. Virginia Journal of Law &amp; Technology 9 , 7 (Summer 2004 ), 1--57. Ryan, P. War, peace, or stalemate: Wargames, wordily, wardriving, and the emerging market for hacker ethics. Virginia Journal of Law &amp; Technology 9, 7 (Summer 2004), 1--57.","journal-title":"Technology"},{"key":"e_1_2_1_10_1","first-page":"3","volume":"42","author":"Webb R.","year":"2005","unstructured":"Webb , R. The untethered business. Communication News 42 , 3 ( Mar. 2005 ), 50. Webb, R. The untethered business. Communication News 42, 3 (Mar. 2005), 50.","journal-title":"Communication News"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066051.1066065"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1278201.1278209","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1278201.1278209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:52:26Z","timestamp":1750258346000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1278201.1278209"}},"subtitle":["organizational wi-fi use by external roaming users"],"short-title":[],"issued":{"date-parts":[[2007,8]]},"references-count":11,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2007,8]]}},"alternative-id":["10.1145\/1278201.1278209"],"URL":"https:\/\/doi.org\/10.1145\/1278201.1278209","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2007,8]]},"assertion":[{"value":"2007-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}