CRIME INVESTIGATION: A COURSE IN COMPUTER FORENSICS

被引:0
|
作者
Lim, Nena [1 ]
机构
[1] Univ Melbourne, Dept Accounting & Business Informat Syst, Melbourne, Vic, Australia
关键词
Computer forensics; course development;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing amount of crime, such as corporate frauds and virus attacks, in the last two decades highlights not only the importance of computer forensics in crime investigations but also the lack of forensic specialists in this area. An urgent need exists for universities to provide courses on computer forensics to ease the shortage of forensic specialists. This paper proposes a six-dimensional knowledge model for computer forensic courses. The six dimensions include categories of crime, computer technology, security, legislation, investigation process, and forensic tools. The paper describes in detail how the model was implemented in a postgraduate introductory computer forensic course. A brief summary of the lessons learned by the author in the course development and delivery is also presented.
引用
收藏
页码:205 / 225
页数:21
相关论文
共 50 条
  • [1] The Construction of Electronic Examination for the Course of Information Crime and Computer Forensics
    Tang, Ling
    [J]. PROCEEDINGS OF THE 2019 5TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND HIGHER EDUCATION (ICSSHE 2019), 2019, 336 : 734 - 737
  • [2] Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations
    Montasari, Reza
    Peltola, Pekka
    Evans, David
    [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 83 - 95
  • [3] Teaching a Computer Forensics Course
    Ali, Farha
    [J]. ACMSE 2021: PROCEEDINGS OF THE 2021 ACM SOUTHEAST CONFERENCE, 2021, : 33 - 39
  • [4] The Class of Information Crime and Computer Forensics
    Ling, Tang
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL SEMINAR ON EDUCATION INNOVATION AND ECONOMIC MANAGEMENT (SEIEM 2016), 2016, 75 : 477 - 480
  • [5] Digital Forensics and Crime Scene Investigation
    Cooper M.
    [J]. ITNOW, 2022, 64 (03): : 38 - 40
  • [6] Research on Relevant Problems of Computer Crime Forensics
    Wang Xue-Guang
    [J]. PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 3: COMPUTER NETWORKS AND ELECTRONIC ENGINEERING, 2011, 112 : 169 - 173
  • [7] Applications of Association Rules in Computer Crime Forensics
    Tan, Yuesheng
    Qi, Zhansheng
    Wang, Jingyu
    [J]. MECHATRONICS AND APPLIED MECHANICS, PTS 1 AND 2, 2012, 157-158 : 1281 - 1286
  • [8] Computer forensics: The modern crime fighting tool
    Busing, ME
    Null, JD
    Forcht, KA
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2005, 46 (02) : 115 - 119
  • [9] Study on Cyber Crime Investigation and Forensics Based on Internet Traceability of Computer Firewall Protocol
    Yang, Ping
    [J]. FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 511 - 516
  • [10] APPROACH OF CRIME SCENE PROTECTION CONCERNING COMPUTER FORENSICS
    Hang, Qiangwei
    Zhang, Ying
    [J]. 2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 1, 2012, : 21 - 25