How does one place a good candidate in the remote computing environment without creating a secure human interactive business environment which allows daily communication, dedicated work schedules, and assurance of compensation?
One of the biggest issues remote computing faces in the internet environment is integrity and trust. Ethical business isn’t just about setting a code of conduct for the remote computing environment. The internet includes every type of business and we are not free to govern the type of businesses that reside in it. Therefore, we don’t just struggle with issues of identity theft, data breach, and financial loss; we struggle with finding suitable employment or employment candidates without compromising safety.
Federal Bureau of Investigations states: “Peer-to-peer networks are a primary source of abuse by hackers.” However, for the remote computing environment, peer-to-peer networks are a standard of communication. Peer-to-peer networks offer flexibility in expanding the network to handle a large number of clients as connections can be made on-demand rather than being fixed; client-server functionality is not dedicated. The theory that wide-area networks are more secure for public use just isn’t realistic based on recent data breach statistics, as local-area networks emulate peer-to-peer across wide-area networks. Efficient IP tracking exists in the peer-to-peer environment.
Most business security requirements include some measure of an anti-virus program and restricted access to combat intrusions. There are even enforceable laws that may assist at some level should a lawsuit be filed in effort to prove a case of “fraud in connection with computers;” i.e., 18 U.S.C. § 1030. But, proving internet fraud is as complex as filing the lawsuit.