Joseph Kizza

Joseph Kizza
University of Tennessee at Chattanooga | Chatt · College of Engineering and Computer Science

Ph.D. Computer Science, The University of Nebraska, Lincoln, NE, USA

About

128
Publications
32,525
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
590
Citations
Citations since 2017
0 Research Items
228 Citations
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060

Publications

Publications (128)
Chapter
This chapter surveys the traditional ethical and privacy issues including security, anonymity and the analysis of how these issues are influenced by computer technology. This dialog also looks at privacy and the protection of civil rights. But in the absence of and agreed upon set of civil liberties by scholars, the discussion focuses on the follow...
Chapter
This chapter builds upon Chap. 1 in setting up the philosophical framework and analysis tools for discussing moral theories and problems in ethical relativism. We discusses the moral and ethical premises and their corresponding values in the changing technology arena. In particular, we give two fitting definitions of ethics: the traditional definit...
Chapter
This defines and examines personal and public morality, identifying assumptions and values and the law, looking at both conventional and natural law and the intertwining of morality and the law. We define morality as a system that, in addition to setting standards of virtuous conduct for people, also consists of mechanisms to self-regulate through...
Chapter
This chapter discusses the foundations of intellectual property rights and how computer technology has influenced and changed the traditional issues of property rights. The reader is immersed in a discussion of controversial issues of ownership in rapidly amalgamating global cultures, languages, beliefs, and values as a result of rapid globalizatio...
Chapter
This chapter surveys the history and examples of computer crimes, their types, costs to society, and strategies of detection and prevention. In the discussion, it is noted that a great number of computer attacks fall into two categories, penetration and denial-of-service attacks, and these are discussed in depth. Attack motives are also discussed....
Chapter
This chapter—Ethical, Privacy and Security Issues in the Online Social Network EcoSystem discusses the new realities of global computer online social network ecosystems, including moral and ethical dynamisms. Because we believe that a sound and details discuss of online social networks is based on a good understanding of the underlying network infr...
Chapter
This chapter discusses the growing threat and effects of repeated and deliberate harm or harassment of other people by using electronic technology that may include devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites. In particular, a thoroug...
Chapter
Artificial Intelligence discusses the new frontiers of ethics in the new artificial intelligent (AI) technologies, virtualization and virtual reality and cyberspace. The chapter explorers how these new frontiers are affecting the traditional ethical and social values. Our discussion is on based on the premise that artificial intelligence technologi...
Chapter
In this chapter we focuses on the issues that arise out of the relationship between the developer and the buyer, including claims, user expectations, and the legal ramifications that may follow an unhealthy relationship. The discussion touches on standards, reliability, security, safety, quality of software, quality of service of software products,...
Chapter
This chapter, considers social issues in computing including the digital divide, workplace issues such as employee monitoring, health risks from computer use, and how these issues are changing with the changing computer technology. The chapter also covers a detailed discussion on a number of obstacles to overcoming the digital divide through digita...
Chapter
This chapter—Ethical, Privacy and Security Issues in the Mobile Ecosystems begins by presenting rather a frightening and quickly evolving mobile telecommunication and computing technologies, their unprecedented global reach and inclusion, unparalleled social, financial and cultural prowess and the yet to be defined social, moral and ethical value s...
Chapter
This chapter examines the changing nature of the professions and how they cope with the impact of technology on their fields. An ethical framework for decision making is developed. Professional and ethical responsibilities based on community values and the law are also discussed. Social issues including harassment and discrimination are thoroughly...
Chapter
So much has been said and so much has been gained; thousands of lives have been lost, and empires have fallen because a secret was not kept. Efforts to keep secrets have been made by humans probably since the beginning of humanity itself. Long ago, humans discovered the essence of secrecy. The art of keeping secrets resulted in victories in wars an...
Chapter
Webster’s Dictionary defines disaster as a sudden misfortune, a catastrophe that affects society (Allee JG (ed) Webster’s Dictionary. 1998. Literary Press, 1958). It is the effect of a hazardous event caused by either man or nature. Man-made disasters are those disasters that involve a human element like intent, error, or negligence. Natural disast...
Chapter
In February, 2002, the Internet security watch group CERT Coordination Center first disclosed to the global audience that global networks, including the Internet, phone systems, and the electrical power grid, are vulnerable to attack because of weakness in programming in a small but key network component. The component, an Abstract Syntax Notation...
Chapter
The rapid advances in computer technology, the plummeting prices of information processing and indexing devices, and the development of sprawling global networks have all made the generation, collection, processing, indexing, and storage of information easy. Massive information is created, processed, and moved around on a daily basis. The value of...
Chapter
The psychology and politics of ownership have historically dictated that individuals and groups tend to protect valuable resources. This grew out of the fact that once a resource has been judged to have value, no matter how much protection given to it, there is always a potential that the security provided for the resource will at some point fail....
Chapter
One of the system administrator’s biggest problems, which can soon turn into a nightmare if it is not well handled, is controlling access of who gets in and out of the system and who uses what resources, when, and in what amounts. Access control is restricting this access to a system or system resources based on something other than the identity of...
Chapter
Before we talk about network security, we need to understand in general terms what security is. Security is a continuous process of protecting an object from unauthorized access. It is a state of being or feeling protected from harm. That object in that state may be a person, an organization such as a business, or property such as a computer system...
Chapter
The rapid growth of the Internet and its ability to offer services have made it the fastest-growing medium of communication today. Today’s and tomorrow’s business transactions involving financial data, product development and marketing, storage of sensitive company information, and the creation, dissemination, sharing, and storing of information ar...
Chapter
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure, or technical, physical, or other controls that could be explo...
Chapter
As digital technology conquers new territory and there is ubiquitous use of technology, the last frontier has fallen in the digital invasion, and the digital activity hub has come home. It is almost a paradox that as more technological activities have come home to make the lives of millions of people easier and more enjoyable, the threat to their c...
Chapter
Authentication is the process of validating the identity of someone or something. It uses information provided to the authenticator to determine whether someone or something is in fact who or what it is declared to be. In private and public computing systems, for example, in computer networks, the process of authentication commonly involves someone...
Chapter
In Chap. 18 and 19, we dealt with wireless communication but restricted our discussion to sensor networks, wireless communication networks, and cellular networks. We discussed a good number of communication devices and their communication protocols. We also discussed the security problems, and we proposed solutions in some cases. What we did not do...
Chapter
The rapid growth of the Internet has led to a corresponding growth of both users and activities in cyberspace. Unfortunately, not all these users and their activities are reputable; thus, the Internet has been increasingly, at least to many individuals and businesses, turning into a “bad Internet.” Bad people are plowing the Internet with evil acti...
Chapter
Virtualization is a process through which one can create something that is there in effect and performance but in reality not there – that is virtual. It is a physical abstraction of the company computing resources like storage, network servers, memory, and others. VMware.com, a software developer and a global leader in the virtualization market, d...
Conference Paper
Browser security as an important and relatively new area is yet not part of existing IA curriculum or National Security Agency (NSA) knowledge units. Browser security incorporate threats, vulnerabilities, risks, and countermeasures faced by browsers and browser-based applications ranging from design principles, security architecture to applications...
Conference Paper
Though many Information Assurance (IA) educators agree that hands-on exercises and case studies improve student learning, hands-on exercises and case studies are not widely adopted due to the time needed to develop them and integrate them into curriculum. Under the support of National Science Foundation (NSF) Scholarship for Service program, we imp...
Article
The proliferation of computer technology, including wireless technology and telecommunication, the plummeting prices of these technologies, the miniaturization of computing and telecommunication devices, and globalization forces have all together contributed to our ever growing dependence on computer technology. This growing dependence has been a b...
Chapter
Cloud computing as a technology is difficult to define because it is evolving without a clear start point and no clear prediction of its future course. Even though this is the case, one can say that it is a continuous evolution of a computer network technology going beyond the client–server technology. It is a technology extending the realms of a c...
Chapter
Webster’s Dictionary defines disaster as a sudden misfortune, a catastrophe that affects society [1]. It is the effect of a hazardous event caused by either man or nature. Man-made disasters are those disasters that involve a human element like intent, error, or negligence. Natural disasters are those caused by the forces of nature like hurricanes,...
Chapter
So much has been said, and so much has been gained; thousands of lives have been lost, and empires have fallen because a secret was not kept. Efforts to keep secrets have been made by humans probably since the beginning of humanity itself. Long ago, humans discovered the essence of secrecy. The art of keeping secrets resulted in victories in wars a...
Chapter
In February, 2002, the Internet security watch group CERT Coordination Center first disclosed to the global audience that global networks, including the Internet, phone systems, and the electrical power grid, are vulnerable to attack because of weakness in programming in a small but key network component. The component, an Abstract Syntax Notation...
Chapter
It is not feasible to discuss security in wireless networks without a thorough understanding of the working of wireless networks. In fact, as we first set out to teach the computer network infrastructure in Chap. 1 in order to teach network security, we are going, in the first parts of this chapter, to discuss the wireless network infrastructure. A...
Article
Africa had a late start in the race to acquire most technologies and more so the information communication technologies (ICT). This last place in the race, compared to other continents, created the largest and deepest digital divide ever recorded in any technology for Africa. But the wind of change has unexpectedly started blowing across the contin...
Chapter
This chapter discusses the new realities of global computer online social network ecosystems, including moral and ethical dilemmas. Because we believe that a sound and detailed discussion of online social networks is based on a good understanding of the underlying network infrastructure, we start the chapter with a brief discussion of the computer...
Chapter
This chapter discusses the new developments and consequences of the virtualization technology and its implications on our participation and how the technology informs our behavior based on our traditional moral and ethical values. In a more detailed way, we define virtualization as a process which embodies both abstraction and reconstruction and as...
Chapter
This chapter defines and examines personal and public morality, identifying assumptions and values and the law, looking at both conventional and natural law, and the intertwining of morality and the law. We define morality as a system that, in addition to setting standards of virtuous conduct for people, also consists of mechanisms to self-regulate...
Chapter
This chapter begins by presenting rather a frightening and quickly evolving mobile telecommunication and computing technologies; their unprecedented global reach and inclusion; unparalleled social, financial, and cultural prowess; and the yet to be defined social, moral, and ethical value systems. We discuss the crucial role of the mobile operating...
Chapter
This chapter discusses the new frontiers of ethics in the new artificial intelligent (AI) technologies and how these new frontiers are affecting the traditional ethical and social values. Our discussion is based on the premise that artificial intelligence technologies create possibilities to understand and extend human knowledge to create intellige...
Chapter
This chapter examines the changing nature of the professions and how they cope with the impact of technology on their fields. An ethical framework for decision making is developed. Professional and ethical responsibilities based on community values and the law are also discussed. Social issues including harassment and discrimination are thoroughly...
Chapter
This chapter discusses what constitutes digital evidence, the collection and analysis of digital evidence, chain of custody, the writing of the report, and the possible appearance in court as an expert witness. We give an in-depth discussion of digital evidence acquisition rule of thumb and the candidates for evidence extraction. On preserving of e...
Chapter
This chapter gives an overview of the history of computing science in hardware, software, and networking, covering prehistoric (prior to 1946) computing devices and computing pioneers since the Abacus. The emergency of social and ethical problems in computing is discussed via the history of computer crimes which started with the invention of the co...
Chapter
This chapter starts off by discussing. Biometric technologies as access and identification processes. Biometric technologies confirm a person’s identity by scanning physical characteristics such as a fingerprint, voice, eye movement, and facial recognition. We discuss how a typical biometric system operates in two distinct stages: the enrollment st...
Article
The rapid growth of information technology (IT), our growing dependence on it, and the corresponding skyrocketing security problems arising from it have all created a high demand for comprehensive security mechanisms and best practices to mitigate these security problems. Solutions on two fronts are sought for. First well-implemented mechanisms and...
Article
The rapid development in both computer and telecommunication technologies has resulted in massive interconnectivity and interoperability of systems. The world is getting more and more interconnected every day. Most major organization systems are interconnected to other systems through networks. The bigger the networks, the bigger the security probl...
Chapter
The rapid development of wireless technology in the last few years has created new interest in low-cost wireless sensor networks. Wireless sensor networks (WSNs) or just sensor networks are grids or networks made of spatially distributed autonomous but cooperating tiny devices called sensors, all of which have sensing capabilities that are used to...
Chapter
In the previous two Chaps. 18 and 19, we dealt with wireless communication but restricted our discussion to sensor networks, wireless communication networks, and cellular networks. We discussed a good number of communication devices and their communication protocols. We also discussed the security problems, and we propose solutions in some cases. W...
Chapter
Virtualization is a process through which one can create something that is there in effect and performance but in reality not there – that is virtual. It is a physical abstraction of the company computing resources like storage, network servers, and memory. VMware.com, a software developer and a global leader in the virtualization market, defines v...
Chapter
The psychology and politics of ownership have historically dictated that individuals and groups tend to protect valuable resources. This grew out of the fact that once a resource has been judged to have value, no matter how much protection given to it, there is always a potential that the security provided for the resource will at some point fail....
Chapter
Authentication is the process of validating the identity of someone or something. It uses information provided to the authenticator to determine whether someone or something is in fact who or what it is declared to be. In private and public computing systems, for example, in computer networks, the process of authentication commonly involves someone...
Chapter
The rapid growth of the Internet has led to a corresponding growth of both users and activities in cyberspace. Unfortunately, not all these users and their activities are reputable; thus, the Internet has been increasingly, at least to many individuals and businesses, turning into a “bad Internet.” Bad people are plowing the Internet with evil acti...
Chapter
One of the system administrator’s biggest problems, which can soon turn into a nightmare if it is not well handled, is controlling access of who gets in and what is taken out of the system and who uses what resources, when, and in what amounts. Access control is restricting this access to a system or system resources based on something other than t...
Article
Teaching cryptography is essential in undergraduate information assurance (IA) education as it is an indispensable component in the IA knowledge domain and plays a key role in ensuring information confidentiality, integrity and availability. Hands-on method in cryptography is a good approach to achieve this as it engages students in real-world sett...
Article
Full-text available
In networks and entity groupings that have sensitive resources, user identification is a crucial requirement for secure access, communication and transactions involving those resources. However, there are networks and entity groupings that require entity authentication while preserving the privacy of the entity being authenticated. There are severa...
Chapter
Learning Objectives After reading this chapter, the reader should be able to: 1. Understand the science of digital crime investigation. 2. Understand the fundamental steps in digital crime investigation. 3. Understand digital evidence. 4. Learn to handle digital evidence. 5. Acquire the techniques required in digital crime investigation....
Chapter
Learning Objectives After reading this chapter, the reader should be able to: 1. Understand cyberspace. 2. Learn how to safeguard cyberspace. 3. Understand the issues of cyberspace. 4. Learn the complexity of cyberspace issues. 5. Acquire knowledge and understand where in cyberspace ethics is essential. 6. Learn the ethical framework o...
Article
This chapter focuses on the issues that arise out of the relationship between software developer and the buyer, including claims, user expectations, and the legal ramifications that may follow an unhealthy relationship. The discussion touches on standards, reliability, security, safety, quality of software, quality of service of software products,...
Article
After reading this chapter, the reader should be able to: 1. Interpret the social context of a particular software/hardware implementation. 2. Identify assumptions and values embedded in a particular computer product design including those of a cultural nature. 3. Evaluate a particular computing tool implementation through the use of empirical data...
Article
After reading this chapter, the reader should be able to: 1.Describe trends in computer crimes and protection against viruses and denial-of-service attacks. 2.Enumerate techniques to combat “cracker” attacks. 3.Discuss the history of computer crimes. 4.Describe several different cyber-attacker approaches and motivations. 5.Identify the professional...
Article
Learning Objectives After reading this chapter, the reader should be able to: 1. Describe the evolution and types of computer networks. 2. Understand networking fundamentals, including network services and transmission media. 3. Understand network software and hardware, including media access control, network topologies, and protocols, as well as c...
Article
After reading this chapter, the reader should be able to: 1. Understand the value of ethics in automated decision making. 2. Identify and discuss the different forms of automated decision making. 3. Recognize the role ethics plays in artificial environments. 4. Identify and discuss credible safeguards to ensure privacy concerns and prevent run-away...
Article
This chapter builds upon Chap. 2 in setting up the philosophical framework and analysis tools for discussing moral theories and problems in ethical relativism. We discuss the moral and ethical premises and their corresponding values in the changing technology arena. In particular, we give two fitting definitions of ethics: the traditional definitio...
Chapter
After reading this chapter, the reader should be able to: 1. Understand biometric science. 2. Learn to use biometric data in access control. 3. Understand how biometric data are used to fight crimes. 4. Learn where and when biometric data can be used. 5. Acquire the techniques required in biometric data acquisition. 6. Recognize the difficulties en...
Conference Paper
Analysis of dark Websites is important for developing effective combating strategies against terrorism or extremists when more and more scattered terrorist cells use the ubiquity of the Internet to form communities in virtual space with fairly low costs. Terrorists or extremists anonymously set up various Web sites embedded in the public Internet,...
Chapter
The greatest threats to the security, privacy, and reliability of computer networks and other related information systems in general are cyber crimes committed by cyber criminals, but most importantly hackers. Judging by the damage caused by past cyber criminal and hacker attacks to computer networks in businesses, governments, and individuals, res...
Chapter
Full-text available
This is a special chapter dealing with security projects. We have arranged the projects in three parts. Part one consists of projects that can be done on a weekly or biweekly basis. Part two consists of projects that can be done in a group or individually on a semi-semester or on a semester basis. Part three consists of projects that demand a great...
Chapter
It is not feasible to discuss security in wireless networks without a thorough understanding of the working of wireless devices and networks. In fact, as we first set out to teach the computer network infrastructure in Chap. 1 in order to teach network security, we are going, in the first parts of this chapter, to discuss the wireless network infra...
Article
Fair exchange between two parties can be defined as where: either both parties acquire what they expected or neither does. Protocols that facilitate such transactions are known as "fair exchange protocols". We analyze one such protocol for contract signing that was presented by Micali. In this paper we show that Micali's protocol is not completely...
Article
The basic ideas in all types of communication are that there must be three ingredients for the communication to be effective. First, there must be two entities, dubbed a sender and a receiver. These two must have something they need to share. Second, there must be a medium through which the sharable item is channeled. This is the transmission mediu...
Article
The rapid advances in computer technology, the plummeting prices of information processing and indexing devices, and the development of sprawling global networks have all made the generation, collection, processing, indexing, and storage of information easy. Massive information is created, processed, and moved around on a daily basis. The value of...
Article
The rapid growth of the Internet and corresponding Internet communities have fueled a rapid growth of both individual and business communications leading to the growth of e-mail and e-commerce. In fact, studies now show that the majority of the Internet communication content is e-mail content. The direct result of this has been the growing concern...
Article
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Donald Pipkin defines system vulnerability as a condition, a weakness of or an absence of security procedure or technical, physical, or other controls that could be exploi...
Article
Before we talk about network security, we need to understand in general terms what security is. Security is a continuous process of protecting an object from unauthorized access. It is as state of being or feeling protected from harm. That object in that state may be a person, an organization such as a business, or property such as a computer syste...
Article
The rapid growth of the Internet and its ability to offer services have made it the fastest growing medium of communication today. Today’s and tomorrow’s business transactions involving financial data; product development and marketing; storage of sensitive company information; and the creation, dissemination, sharing, and storing of information ar...
Conference Paper
Full-text available
Biometrics is an emerging field via the automated use of unique and measurable physiological or behavioral characteristics to determine or verify identity. Biometrics has a variety of applications in governments, military and commercial areas. The Department of Computer Science and Engineering at the University of Tennessee at Chattanooga offers a...
Conference Paper
Full-text available
Intrusion detection has drawn much attention in the past two decades. Signature analysis and statistical anomaly detection are two typical methods to identify network security breaches. Signature analysis requires access to a large database of known intrusion signatures and a way to match current behavior against the signatures to detect intrusions...
Chapter
In today’s highly wired, mobile, and multitasking information society, the problems of verifying, identifying, and authenticating an individual continue to pose a great challenge. To see how complex this problem is we will take a look at all current technologies used in personal identification and authentication. All these technologies need you to...
Chapter
Seeing wireless technology in action around us today, it is difficult to image that just about 20 years ago, the technology and the industry were still in their infancy. Wireless technology has grown in leaps and bounds in the last few years. It is also mind bogging to imagine what will happen to the technology in the next 10 years, if it keeps the...
Chapter
The rapid advances in computer technology, the plummeting prices of information processing and indexing devices, and the development of sprawling global networks have all made the generation, collection, processing, indexing, and storage of and access to information easy and have made the information infrastructure an enjoyable environment. The inf...
Chapter
Perhaps some of the biggest security problems facing all of us using computers and other information systems are the security threats and vulnerabilities that an average computer user has little to no idea about. Even those who have some knowledge of these threats are still in the dark as to how prepare for and avoid them. The focus of this chapter...
Chapter
In Chapter I, we outlined the many causes of insecurity in the information communication technology (ICT) infrastructure. We indicated one particular weakness as users with little knowledge of the working of the communication infrastructure. In this chapter, we intend to address that concern. We give a very elementary treatment of the theory of net...
Chapter
All recent social, economic, and technological advances can be attributed to the dramatic advances in availability of information and the ability to access it easily and quickly. The increasing demand for information has driven the need for easier access to it. This almost obsessive demand for information together with the abundance of it on almost...
Chapter
In the previous chapter, we discussed the important role security policies play in the security of networks, in particular, and in the information communication technology (ICT) infrastructure, in general. The security policy should always be considered as the baseline security piece that dictates what other security mechanism are to be used and ho...
Chapter
In Chapter XIV we discussed digital evidence and the process of collecting this evidence. In this chapter, we are going to focus on the investigative process. In fact, we are going to divide this process into two processes that are both related. The first process is known as computer forensics in which we investigate crime scenes that involve data...
Chapter
In the last chapter, we discussed the basics of network security. Among the issues that we briefly touched on are the techniques and best practices that are currently being used by many security personnel in a variety of networks that make up the communication infrastructure. In this chapter, we are going to start with what is considered to be the...
Chapter
We closed the last chapter on a note about building a good ethical framework and its central role in securing the information infrastructure. A good ethical framework is essential for good decision making. Decision making is a staple for human beings. As we get more and more dependent on computer technology, we are slowly delegating the right to ma...
Chapter
This chapter surveys the traditional ethical and privacy issues including security, anonymity, and the analysis of how these issues are influenced by computer technology. This dialog also looks at privacy and the protection of civil rights. But in the absence of and agreed upon set of civil liberties by scholars, the discussion focuses on the follo...
Conference Paper
Mobile ad-hoc networks (MANETs) are the best choice for instant networks when no fixed infrastructure is available. MANETs can support applications in a variety of areas like emergency assistance and inter-vehicle communications. Most developed wireless ad-hoc routing protocols are designed to discover and maintain an active path from source to des...
Chapter
Just before the 2000 New York senatorial campaign, Chris Hayden paid 70 each for the exclusive two-year rights to the following Internet addresses: www.hillary2000.com, www.hillaryclinton 2000.com, and www.clinton2000.com. A few weeks later, Mrs. Hillary Clinton, then the U.S. first lady, declared her candidacy for the state of New York senatorial...

Network

Cited By

Projects