Catálogo de publicaciones - libros
Ethical and Social Issues in the Information Age
Joseph Migga Kizza
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2007 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-1-84628-658-2
ISBN electrónico
978-1-84628-659-9
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2007
Información sobre derechos de publicación
© Springer-Verlag London Limited 2007
Cobertura temática
Tabla de contenidos
Computer Networks And Online Crimes
Joseph Migga Kizza
A is a distributed system consisting of loosely coupled computing elements and other devices. In this configuration, any two of these devices can communicate with each other through a communications medium. The medium may be wired or wireless. To be considered a communicating network, the distributed system must communicate based on a set of communicating rules called . Each communicating device in the network must then follow these rules to communicate with others. A standard wired computer network would look like the network in Figure 12.1.
Pp. 323-342
Computer Crime Investigations-Computer Forensics
Joseph Migga Kizza
In both Chapters 9 and 12, we have discussed computer crimes in depth. In Chapter 12, we confined ourselves to looking at online crimes and what needs to be done not only to protect the enterprise network, but also to mitigate the rate of their growth. Following on the discussion in the preface to this edition, a good basket of techniques, solutions, and best practices to address the problem of security or lack of in this information age is to have a three prolonged approach. First we need to teach morality and ethics to our young people. Second we need to define, develop, and build the best security protocols possible both hardware-based and software-based. And third we need to follow through with persecution of those responsible for committing any form of computer crime. In this we need to develop a strong and enforceable legal framework to meet the growing challenge.
Pp. 343-358
Biometrics
Joseph Migga Kizza
In both Chapters 9 and 12, we have discussed computer crimes in depth. In Chapter 12, we confined ourselves to looking at online crimes and what needs to be done not only to protect the enterprise network, but also to mitigate the rate of their growth. Following on the discussion in the preface to this edition, a good basket of techniques, solutions, and best practices to address the problem of security or lack of in this information age is to have a three prolonged approach. First we need to teach morality and ethics to our young people. Second we need to define, develop, and build the best security protocols possible both hardware-based and software-based. And third we need to follow through with persecution of those responsible for committing any form of computer crime. In this we need to develop a strong and enforceable legal framework to meet the growing challenge.
Pp. 359-375