Joseph Kizza


Joseph M. Kizza, currently a professor of Computer Science at the University of Tennessee at Chattanooga, received his Ph.D. in Computer Science from the University of Nebraska-Lincoln. He is a member of ACM, and an internationally renowned speaker on social computing and information security and assurance. He has published extensively in journals and conference proceedings and authored seven books on computer ethics, network security and cyber ethics. Some of these books have been translated into several languages.

Publications

Is the Cloud the Future of Computing?
Joseph M. Kizza, Li Yang. © 2015. 16 pages.
Cloud computing as a technology is difficult to define because it is evolving without a clear start point and no clear prediction of its future course. Even though this is the...
Is the Cloud the Future of Computing?
Joseph M. Kizza, Li Yang. © 2014. 16 pages.
Cloud computing as a technology is difficult to define because it is evolving without a clear start point and no clear prediction of its future course. Even though this is the...
An Electronic Contract Signing Protocol Using Fingerprint Biometrics
Harkeerat Bedi, Li Yang, Joseph M. Kizza. © 2013. 27 pages.
Fair exchange between a pair of parties can be defined as the fundamental concept of trade where none of the parties involved in the exchange have an unfair advantage over the...
International Journal of Cyber Ethics in Education (IJCEE)
Jeffrey Hsu. Est. 2011.
The International Journal of Cyber Ethics in Education (IJCEE) provides state-of-the-art research on the impact and general principles of ethical computer use in academics, while...
An Electronic Contract Signing Protocol Using Fingerprint Biometrics
Harkeerat Bedi, Li Yang, Joseph M. Kizza. © 2011. 28 pages.
Fair exchange between a pair of parties can be defined as the fundamental concept of trade where none of the parties involved in the exchange have an unfair advantage over the...
Securing the Information Infrastructure
Joseph Kizza, Florence Migga Kizza. © 2008. 386 pages.
As computer networks spread throughout the globe and as technology advances, we are increasingly dependent upon these networks to initiate and complete our daily tasks. However...
Building Trust in the Information Infrastructure
Joseph Kizza, Florence Migga Kizza. © 2008. 9 pages.
The rapid advances in computer technology, the plummeting prices of information processing and indexing devices, and the development of sprawling global networks have all made...
Need for Morality and Ethics
Joseph Kizza, Florence Migga Kizza. © 2008. 12 pages.
In Chapter I we discussed the rising rate of computer-related crimes and, in particular, information-related crimes. We pointed out that the information infrastructure is made up...
Building an Ethical Framework for Decision Making
Joseph Kizza, Florence Migga Kizza. © 2008. 19 pages.
We closed the last chapter on a note about building a good ethical framework and its central role in securing the information infrastructure. A good ethical framework is...
Security, Anonymity, and Privacy
Joseph Kizza, Florence Migga Kizza. © 2008. 24 pages.
All recent social, economic, and technological advances can be attributed to the dramatic advances in availability of information and the ability to access it easily and quickly....
Software Standards, Reliability, Safety, and Risk
Joseph Kizza, Florence Migga Kizza. © 2008. 22 pages.
Software, more than anything else, is at the heart of the information communication infrastructure. It is in fact one of the three main components of the infrastructure, together...
Network Basics and Securing the Network Infrastructure
Joseph Kizza, Florence Migga Kizza. © 2008. 31 pages.
In Chapter I, we outlined the many causes of insecurity in the information communication technology (ICT) infrastructure. We indicated one particular weakness as users with...
Security Threats and Vulnerabilities
Joseph Kizza, Florence Migga Kizza. © 2008. 18 pages.
Perhaps some of the biggest security problems facing all of us using computers and other information systems are the security threats and vulnerabilities that an average computer...
Security Policies and Risk Analysis
Joseph Kizza, Florence Migga Kizza. © 2008. 24 pages.
In the last chapter, we discussed the basics of network security. Among the issues that we briefly touched on are the techniques and best practices that are currently being used...
Security Analysis, Assessment, and Assurance
Joseph Kizza, Florence Migga Kizza. © 2008. 19 pages.
In the previous chapter, we discussed the important role security policies play in the security of networks, in particular, and in the information communication technology (ICT)...
Access Control, Authentication, and Authorization
Joseph Kizza, Florence Migga Kizza. © 2008. 29 pages.
If we were not to allow users into the system, then we would have no problems of security. However, the system would not be utilized, hence, useless. The system must be used, and...
Perimeter Defense; The Firewall
Joseph Kizza, Florence Migga Kizza. © 2008. 30 pages.
As companies increasingly build private networks and connect them onto the Internet, securing such private networks has become a great concern. These networks are facing threats...
Intrusion Detection and Prevention Systems
Joseph Kizza, Florence Migga Kizza. © 2008. 20 pages.
Let us make a statement of fact here that three principles define computer network security. These principles are: prevention, detection, and response. The high degree of...
Security in Wireless Systems
Joseph Kizza, Florence Migga Kizza. © 2008. 21 pages.
Seeing wireless technology in action around us today, it is difficult to image that just about 20 years ago, the technology and the industry were still in their infancy. Wireless...
Biometrics for Access Control
Joseph Kizza, Florence Migga Kizza. © 2008. 17 pages.
In today’s highly wired, mobile, and multitasking information society, the problems of verifying, identifying, and authenticating an individual continue to pose a great...
Digital Evidence and Computer Crime
Joseph Kizza, Florence Migga Kizza. © 2008. 20 pages.
Throughout Section II of the book, we presented a variety of security mechanisms, technologies, tools, and best practices being used in order to harden up and secure computer...
Digital Crime Investigation and Forensics
Joseph Kizza, Florence Migga Kizza. © 2008. 17 pages.
In Chapter XIV we discussed digital evidence and the process of collecting this evidence. In this chapter, we are going to focus on the investigative process. In fact, we are...
Trends in Information Assurance
Joseph Kizza, Florence Migga Kizza. © 2008. 19 pages.
In Chapter I, we discussed the global status of information security. Based on the findings of the report The.Global.State.of.Information.Security.2005, a worldwide study by CIO...
Workplace Surveillance
Joseph Migga Kizza, Jackline Ssanyu. © 2005. 18 pages.
This chapter identifies factors that are encouraging the growth in the monitoring of employees at work and investigates the reasons for this growth. Technologies, both old and...