Catálogo de publicaciones - libros

Compartir en
redes sociales


Ethical and Social Issues in the Information Age

Joseph Migga Kizza

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-1-84628-658-2

ISBN electrónico

978-1-84628-659-9

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag London Limited 2007

Tabla de contenidos

Cyberspace And Cyberethics

Joseph Migga Kizza

Pp. 283-321

Computer Networks And Online Crimes

Joseph Migga Kizza

A is a distributed system consisting of loosely coupled computing elements and other devices. In this configuration, any two of these devices can communicate with each other through a communications medium. The medium may be wired or wireless. To be considered a communicating network, the distributed system must communicate based on a set of communicating rules called . Each communicating device in the network must then follow these rules to communicate with others. A standard wired computer network would look like the network in Figure 12.1.

Pp. 323-342

Computer Crime Investigations-Computer Forensics

Joseph Migga Kizza

In both Chapters 9 and 12, we have discussed computer crimes in depth. In Chapter 12, we confined ourselves to looking at online crimes and what needs to be done not only to protect the enterprise network, but also to mitigate the rate of their growth. Following on the discussion in the preface to this edition, a good basket of techniques, solutions, and best practices to address the problem of security or lack of in this information age is to have a three prolonged approach. First we need to teach morality and ethics to our young people. Second we need to define, develop, and build the best security protocols possible both hardware-based and software-based. And third we need to follow through with persecution of those responsible for committing any form of computer crime. In this we need to develop a strong and enforceable legal framework to meet the growing challenge.

Pp. 343-358

Biometrics

Joseph Migga Kizza

In both Chapters 9 and 12, we have discussed computer crimes in depth. In Chapter 12, we confined ourselves to looking at online crimes and what needs to be done not only to protect the enterprise network, but also to mitigate the rate of their growth. Following on the discussion in the preface to this edition, a good basket of techniques, solutions, and best practices to address the problem of security or lack of in this information age is to have a three prolonged approach. First we need to teach morality and ethics to our young people. Second we need to define, develop, and build the best security protocols possible both hardware-based and software-based. And third we need to follow through with persecution of those responsible for committing any form of computer crime. In this we need to develop a strong and enforceable legal framework to meet the growing challenge.

Pp. 359-375