Joseph M. Kizza
Phone: (423) 425-4043; Fax: (423) 425-5442
Ph.D. 1990 Computer Science, The
M.A. 1986 Mathematics, The
M.S. 1980 Engineering
B.S. 1975 Math-Computer
2002 – present Professor,
2007 – present Director,
1997 - 2002 Associate
1989 - 1997 Assistant Professor,
1995 Visiting Professor,
1980 - 1981 Lecturer,
Ø 2007 CHOICE OUTSTANDING ACADEMIC TITLE: Computer Network Security and Cyber Ethics, 2d ed., McFarland Publishers, 2006. 223pp. softcover ISBN 978-0-7864-2595-2
Ø Best Engineering and Computer Science Researcher, UTC, 2006.
Ø Outstanding Computer Science Teaching Award, UTC, 2005.
Ø Outstanding Scholarly Contribution Award - from the International Institute for Advanced Studies in Systems Research and Cybernetics (IIAS). The award is given for outstanding scholarly research and educational work and for providing an exemplary contribution to the integration of engineering and social issues- 2004.
Senior Fulbright Scholar Award to
Fulbright Scholar 2003-2004 to
“Outstanding Academic Title”
Computer Network Security and CyberEthics. McFarland Publishers, Inc.,
§ Journal of Emerging Mechanical Engineering Technology of the International
§ International Cyber crimes Journal Society of Productivity Enhancements (ISPE)
HONORARY AND PROFESSIONAL SOCIETY MEMBERSHIPS
J.M. Kizza. "Combating Computer Crimes: A Long Time Strategy".
Ethics in the Computer Age Conference Proceedings,
J. M. Kizza. "A Method for Verifying Rule-Based Knowledge-Bases". Mathematical Modeling and Scientific Computing, vol. 3, sec. A, 1994.
J. M. Kizza. "Legislate
or Teach Information Ethics". Association of Management Eleventh Annual Conference Proceedings.
J.M. Kizza. "A Method for Verifying Rule-Based Knowledge-Bases". Ninth Intentional
Conference on Mathematical and Computer Modeling Proceeding .
J. M. Kizza. "Modeling Techniques for Analyzing Complex Systems". Mathematical Modeling and Scientific Computing, vol. 2, sec. A, 1993.
J. M. Kizza and 1. N. Kizza. "Untangling the Campus Computer Maze: A Freshman Experience".
Collegiate Microcomputer Quarterly, vol. XI, 2, May, 1993.
J. M. Kizza. "Computers: The First Encounter”. Journal of Computing in Small Colleges.
January 1993 , vol. 8, No. 3,
J. M. Kizza. “Towards a Virus and Worm free Computing Environment", Journal of Information Ethics, Vol. 2, 1, Spring, 1993.
J. M. Kizza. “Towards a Virus and Worm free Computing Environment". Association
J. M. Kizza. "
Journal of Computing in Small Colleges , vol. 7, No. 3, January 1992
J. M. Kizza. " Ethics in the Computer and Information Professions". The Association of Management Annual National Conference Proceedings, August, 1991.
J. M. Kizza. "Modeling
Techniques for Analyzing Complex Systems", Eighth International Conference on Mathematical and Computer
J. M. Kizza. " On the lower bound for the number of n-ominoes". Ph. D. Dissertation,
J. M. Kizza. "System
Modeling: A technique for analyzing complex developmental systems". African Mathematical
Annual Conference Proceedings, June 1981,
PAPERS PRESENTED AT CONFERENCES
Joseph M. Kizza. “Why We Do Research”. LOG-IN Africa
e-Local Governance International Conference,
Kizza, Li Yang,
Joseph M. Kizza, Li Yang, Raimund K. Ege, Malek Adjouadi, A Relationship-based Flexible Authorization Framework for Mediation Systems, Proceedings of Software Engineering and Knowledge Engineering (SEKE06), pages 381-385, San Francisco, CA, July, 2006.
M. Kizza, Li Yang, Andy Novobilski, Kathy Winters, TMAS Capstone Project., Proceedings of Computer Forensics Conference,
Joseph M. Kizza, Li Yang, Raimund K. Ege, A Flexible Context-Aware Authorization Framework for Mediation Systems, Proceedings of IEEE Intelligence and Security Informatics Conference, San Diego, CA, pages 684-685, Lecture Notes in Computer Science, 2006.
J. M. Kizza. “ Roundtable Discussion: Preparing for the National Security
Agency (NSA) Certification for the
J.M. Kizza. “ Wireless and Computer Communication Technologies: Bridging the African
Digital” at the 45th Annual Meeting of the
African Studies Association,
J.M. Kizza. “Efforts to Define and Uphold a Common Morality in Cyberspace”.
The International Conference
of Moral Science. The
J.M. Kizza. "Cyber
Crimes: Causes, Costs, and Social Consequences”.
J.M. Kizza. "Your Net
My Net and Other Privacy Tales”.
J.M. Kizza. "Internet Convergence and Technical Control". IFIP Fifth World
J.M. Kizza. "Much A Do About Nothing: The Internet Dream". IFIP W4.9.2 Working Workshop.
J. M. Kizza. " Introducing Computer Ethics in the K-12
Curriculum". Third National Computer Ethics Conference,
J. M. Kizza and
J. M. Kizza. "A Method for Verifying Rule-Based Knowledge-Bases".
J. M. Kizza and 1. N. Kizza. "Untangling the Campus Computer Maze: A Freshman
Experience". Computers Across the Curriculum: A Conference on Technology in the Freshman
J., M. Kizza. " On Certification of Knowledge-based Systems".
J. M. Kizza. "Computers and Development: An African Perspective". Proceedings, Intentional
on Information Technology in Support of Economic Development.
· Proposal Review Panelist -- NSF CCLI Program Reviews (2005, 6, 7).
· NSF Scholar Summer Workshops ( 1995, 2007)
CONFERENCES / MEETINGS ORGANIZED
Annual ACM Mid-Southeast Conference, Gatlinburg, TN 2004- 6.
"European Philosophical And Computer Ethics" Conference at Rotterdam, The Netherlands, January/February 1997, with Jeroen vanden Hoven, Erasmus University and David Preston, University of East London.
in the Computer Age". Lecture Series 1994-95 at the
in the Computer Age International Conference” in collaboration with ACM,
"Ethics in the Computer Age". Conference, November, 1992 at the
the Computer Age". Conference,
Computers Forensics, Summer Workshop at UTC, 2005
and Research Workshop.
Computers, Ethics, and Decision
Making: Global Perspectives - conducted at
The Social Effects of the Computer Revolution: Where do we go from here? - conducted at The
and Research Workshop.
J. M. Kizza. “The History Hacking.” In James Ciment,
Encyclopedia on Social Issues in
J.M. Kizza and Jackie Ssanyu. “ Workplace Surveillance”.
In Electronic Monitoring in the Workplace: Controversies and Solutions by John Weckert. Idea Group Inc. Publishers,
J. M. Kizza. “Global ICT and
the Digital Divide: Creating a Sustainable Infrastructure and Positive Outcomes
to Narrow the Gap”. In The World in the Information Age: Challenges and
Opportunities” (to appear ) published in
J. M. Kizza, "Internet Convergence
and Technical Control". In Jacques Berleur
and Diane Whitehouse (eds.) Governance of the Internet: Ethical Point of
View. Chapman and Hill.
J. M. Kizza, "Ethics in
the Computer Age". In
Allen Kent and James G. Williams (eds.) Encyclopedia of
Computer Science and Technology, vol. 36. Marcel Dekker, Inc.
J. M. Kizza. "Much A Do About Nothing: The Internet Dream". In Jacques Berleur
and Diane Whitehouse (eds.) Ethical Global Information Society: Culture
and Democracy Revisited. Chapman and Hill.
J. M. Kizza, "A new
lower bound to the number of n-ominoes". In M. Rahman (ed.) Ocean Waves Mechanics, Computational Fluid Dynamics, and
Mathematical Modeling. Computational Mechanics Publication.
Detection Systems” In The Internet Encyclopedia, Volume 2 Hossein Bidgoli (Editor) , 2003. “Passwords” In The Internet Encyclopedia, Volume 3. Hossein Bidgoli (Editor) , 2003.
Ethics of Computing: Codes, Spaces for Discussion and Law. Jacques Berluer and Klaus Brunstein, eds.
Systems Software. Second Edition, by Leland Beck, Addison-Wesley, 1990.
J. M. Kizza. Guide
to Computer Network Security. Springer-Verlag, 2009.
Kizza, Janet Aisbett, Greg Gibson, Anthony J. Rodridges, Revi Nath and Gerald
R. Renardel (Editors). Special Topics in Computing and ICT
Research: Strengthening the Role of ICT in Development. Fountain Publishers,
J.M. Kizza, Jackson Muhirwe, Janet Aisbett, Katherine
Getao, Victor W. Mbarika,
Dilip Patel, and Anthony J. Rodrigues
(Editors). Strengthing the Role of ICT in Development. Fountain
J. M. Kizza, Janet Aisbett, Andrew Vince, and Tom Wanyama (Editors).
Topics in Computing and ICT Research: Advances in Systems Modelling
and ICT Applications. Fountain
J.M. Kizza. Securing
the Information Infrastructure, IGI Global,
J. M. Kizza. Ethical and Social Issues in the Information Age. Third Edition,
J. M. Kizza. Computer Network Security and CyberEthics, Second Edition. McFarland & Company, 2006.
J.M. Kizza. Computer Network Security.
J. M. Kizza. Ethical and Social Issues in the Information Age.
J.M. Kizza. Computer Network Security and
CyberEthics. McFarland Publishers,
J. M. Kizza. Ethical and Social Issues in the Information Age. Japanese translation. Springer-Verlag
GmbH & Co. KG through The English Agency, (
J.M. Kizza. Civilizing
the Internet: Global Concerns and Efforts Towards
Regulation. McFarland Publishers, Inc.,
J. M. Kizza. Ethical and Social
Issues in the Information Age. Springer-Verlag.
J. M. Kizza. Social and Ethical
Effects of the Computer Revolution. McFarland Publishers Inc.
J. M. Kizza. Ethics in the Computer
Age Conference Proceedings. ACM Press.
Computer Science (B.S.) and
(M.S): Information Security and Assurance Concentration -
Computer Science (B.S.):
Information Systems (B.S.):
Also the following courses at UTC:
PROGRAM EVALUATION ACTIVITIES
High Education Commission (THEC) Program Reviewer, Graduate
programs in Computer Science,
ABET - Computer Science Accreditation Board (CSAB) Program Evaluator.
· IASP (DOD) - $62,279 from the Department of Defense to establish a scholarship program for undergraduate ISA students.
· Odor Wheeler, Sustainable and Scalable Wireless Sensor Network to Monitor Chemical Concentration (with Mina Sartipi and Joseph Kizza), awarded, 2008-2009 - $20,000.
· A Fast Response and Planning System in Disaster Management (with Li Yang), Tennessee Higher Education Commission's Center of Excellence in Applied Computational Science and Engineering, awarded, 2009-2010. - $25,000.
A secure and
reliable wireless ad-hoc network in disaster management,
· Eyes and Ears in the Closet: Sensor Technology and Security, Instructional Excellence from UTC, $1630.00, 2007-2008.
· Lab Support for Undergraduate and Graduate Courses in Information Assurance, Instructional Excellence from UTC, $1200, 2006-2007.
Communications Mediator Model in Disaster Management,
· Lupton Fund - $25,000 for setting up the InfoSec Laboratory.
· Numerous Faculty Summer and Development Grants.
· National Science Foundation – Summer Workshop 2002
· National Science Foundation - Summer Workshop 2001