The future of computer forensics: a needs analysis survey

被引:54
|
作者
Rogers, MK [1 ]
Seigfried, K [1 ]
机构
[1] Purdue Univ, Ctr Educ & Res Informat Assurance & Secur, W Lafayette, IN 47907 USA
关键词
digital forensics; computer forensics; cyber crime; computer crime; cyber forensics;
D O I
10.1016/j.cose.2004.01.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The current study was a pilot study and attempted to add to the growing body of knowledge regarding inherent issues in computer forensics. The study consisted of an Internet-based survey that asked respondents to identify the top five issues in computer forensics. Sixty respondents answered the survey using a free form text field. The results indicated that education/training and certification were the most reported issue (18%) and lack of funding was the least reported (4%). These findings are consistent with a similar law enforcement community study (Stambaugh, Beaupre, Icove, Cassaday, Williams. State and local law enforcement needs to combat electronic crime. National Institute of Justice Research in Brief (2001)). The findings emphasize the fragmented nature of the computer forensics discipline. Currently there is a lack of a national framework for curricula and training development, and no gold standard for professional certification. The findings further support the criticism that there is a disproportional focus on the applied aspects of computer forensics, at the expense of the development of fundamental theories. Further implications of the findings are discussed and suggestions for future research in the area are presented. (C) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:12 / 16
页数:5
相关论文
共 50 条
  • [41] Baccalaureate Programs in Computer Forensics
    Liu, Jigang
    2016 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2016, : 615 - 620
  • [42] Tools and methods of computer forensics
    Strumenti e metodi della computer forensics
    Bassetti, Nanni, 1600, Associazione Italiana per l'Informatica e il Calcolo Automatico, Piazzale Rodolfo Morandi, 2, Milano, 20121, Italy (13):
  • [43] Computer forensics: Are you qualified?
    Comput. Fraud Secur., 2008, 12 (18-20):
  • [44] Offensive and defensive computer forensics
    Wolfe, HB
    CHALLENGES OF INFORMATION TECHNOLOGY MANAGEMENT IN THE 21ST CENTURY, 2000, : 805 - 807
  • [45] Teaching a Computer Forensics Course
    Ali, Farha
    ACMSE 2021: PROCEEDINGS OF THE 2021 ACM SOUTHEAST CONFERENCE, 2021, : 33 - 39
  • [46] A Survey on Cloud Gaming: Future of Computer Games
    Cai, Wei
    Shea, Ryan
    Huan, Chun-Ying
    Chen, Kuan-Ta
    Liu, Jiangchuan
    Leung, Victor C. M.
    Hsu, Cheng-Hsin
    IEEE ACCESS, 2016, 4 : 7605 - 7620
  • [47] New perspectives on computer forensics
    Sinar, H
    FORENSIC SCIENCE INTERNATIONAL, 2003, 136 : 200 - 200
  • [48] Automated abduction for computer forensics
    Doncescu, Andrei
    Inoue, Katsumi
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 493 - 499
  • [49] eDiscovery versus Computer Forensics
    Matthews, David R.
    INFORMATION SECURITY JOURNAL, 2010, 19 (03): : 118 - 123
  • [50] Computer forensics chain of custody
    Enrique Arellano, Luis
    Mario Castaneda, Carlos
    CUADERNO ACTIVA, 2012, (03): : 67 - 81