Crime Investigation: A Course in Computer Forensics
The growing amount of crime, such as corporate frauds and virus attacks, in the last two decades highlights not only the importance of computer forensics in crime investigations but also the lack of forensic specialists in this area. An urgent need exists for universities to provide courses on compu...
Gespeichert in:
Veröffentlicht in: | Communications of the Association for Information Systems 2006, Vol.18, p.10 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | 10 |
container_title | Communications of the Association for Information Systems |
container_volume | 18 |
creator | Lim, Nena |
description | The growing amount of crime, such as corporate frauds and virus attacks, in the last two decades highlights not only the importance of computer forensics in crime investigations but also the lack of forensic specialists in this area. An urgent need exists for universities to provide courses on computer forensics to ease the shortage of forensic specialists. This paper proposes a six-dimensional knowledge model for computer forensic courses. The six dimensions include categories of crime, computer technology, security, legislation, investigation process, and forensic tools. The paper describes in detail how the model was implemented in a postgraduate introductory computer forensic course. A brief summary of the lessons learned by the author in the course development and delivery is also presented. |
doi_str_mv | 10.17705/1CAIS.01810 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2500547994</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2500547994</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1030-b29ee3c84c2aa249ce6896d55cf28deb8b05cbfffa7df95ffcd9bf59f7eaacef3</originalsourceid><addsrcrecordid>eNpNkEFLxDAQhYMouK7e_AEFr3adJM228VaKq4UFD-o5pOmMdHHbmrSC_96wuwdP8wYeM-99jN1yWPE8B_XAq7J-WwEvOJyxBVdCpzIu5__0JbsKYQfAM6XFgsnKd3tM6v4Hw9R92qkb-sekTKph9gGTro9qP84T-mQzeOxD58I1uyD7FfDmNJfsY_P0Xr2k29fnuiq3qeMgIW2ERpSuyJywVmTa4brQ61YpR6JosSkaUK4hIpu3pBWRa3VDSlOO1jokuWR3x7ujH77nmM_sYqo-vjRCAags1zqLrvujy_khBI9kxljJ-l_DwRywmAMWc8Ai_wCIN1V3</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2500547994</pqid></control><display><type>article</type><title>Crime Investigation: A Course in Computer Forensics</title><source>Digital Commons Online Journals</source><creator>Lim, Nena</creator><creatorcontrib>Lim, Nena</creatorcontrib><description>The growing amount of crime, such as corporate frauds and virus attacks, in the last two decades highlights not only the importance of computer forensics in crime investigations but also the lack of forensic specialists in this area. An urgent need exists for universities to provide courses on computer forensics to ease the shortage of forensic specialists. This paper proposes a six-dimensional knowledge model for computer forensic courses. The six dimensions include categories of crime, computer technology, security, legislation, investigation process, and forensic tools. The paper describes in detail how the model was implemented in a postgraduate introductory computer forensic course. A brief summary of the lessons learned by the author in the course development and delivery is also presented.</description><identifier>ISSN: 1529-3181</identifier><identifier>EISSN: 1529-3181</identifier><identifier>DOI: 10.17705/1CAIS.01810</identifier><language>eng</language><publisher>Atlanta: Association for Information Systems</publisher><subject>Computer forensics ; Crime ; Criminal investigations ; Forensic computing ; Forensic sciences ; Legislation</subject><ispartof>Communications of the Association for Information Systems, 2006, Vol.18, p.10</ispartof><rights>Copyright Association for Information Systems 2006</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,4024,27923,27924,27925</link.rule.ids></links><search><creatorcontrib>Lim, Nena</creatorcontrib><title>Crime Investigation: A Course in Computer Forensics</title><title>Communications of the Association for Information Systems</title><description>The growing amount of crime, such as corporate frauds and virus attacks, in the last two decades highlights not only the importance of computer forensics in crime investigations but also the lack of forensic specialists in this area. An urgent need exists for universities to provide courses on computer forensics to ease the shortage of forensic specialists. This paper proposes a six-dimensional knowledge model for computer forensic courses. The six dimensions include categories of crime, computer technology, security, legislation, investigation process, and forensic tools. The paper describes in detail how the model was implemented in a postgraduate introductory computer forensic course. A brief summary of the lessons learned by the author in the course development and delivery is also presented.</description><subject>Computer forensics</subject><subject>Crime</subject><subject>Criminal investigations</subject><subject>Forensic computing</subject><subject>Forensic sciences</subject><subject>Legislation</subject><issn>1529-3181</issn><issn>1529-3181</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2006</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNpNkEFLxDAQhYMouK7e_AEFr3adJM228VaKq4UFD-o5pOmMdHHbmrSC_96wuwdP8wYeM-99jN1yWPE8B_XAq7J-WwEvOJyxBVdCpzIu5__0JbsKYQfAM6XFgsnKd3tM6v4Hw9R92qkb-sekTKph9gGTro9qP84T-mQzeOxD58I1uyD7FfDmNJfsY_P0Xr2k29fnuiq3qeMgIW2ERpSuyJywVmTa4brQ61YpR6JosSkaUK4hIpu3pBWRa3VDSlOO1jokuWR3x7ujH77nmM_sYqo-vjRCAags1zqLrvujy_khBI9kxljJ-l_DwRywmAMWc8Ai_wCIN1V3</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Lim, Nena</creator><general>Association for Information Systems</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>M0C</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>2006</creationdate><title>Crime Investigation: A Course in Computer Forensics</title><author>Lim, Nena</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1030-b29ee3c84c2aa249ce6896d55cf28deb8b05cbfffa7df95ffcd9bf59f7eaacef3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Computer forensics</topic><topic>Crime</topic><topic>Criminal investigations</topic><topic>Forensic computing</topic><topic>Forensic sciences</topic><topic>Legislation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lim, Nena</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Global</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Communications of the Association for Information Systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lim, Nena</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Crime Investigation: A Course in Computer Forensics</atitle><jtitle>Communications of the Association for Information Systems</jtitle><date>2006</date><risdate>2006</risdate><volume>18</volume><spage>10</spage><pages>10-</pages><issn>1529-3181</issn><eissn>1529-3181</eissn><abstract>The growing amount of crime, such as corporate frauds and virus attacks, in the last two decades highlights not only the importance of computer forensics in crime investigations but also the lack of forensic specialists in this area. An urgent need exists for universities to provide courses on computer forensics to ease the shortage of forensic specialists. This paper proposes a six-dimensional knowledge model for computer forensic courses. The six dimensions include categories of crime, computer technology, security, legislation, investigation process, and forensic tools. The paper describes in detail how the model was implemented in a postgraduate introductory computer forensic course. A brief summary of the lessons learned by the author in the course development and delivery is also presented.</abstract><cop>Atlanta</cop><pub>Association for Information Systems</pub><doi>10.17705/1CAIS.01810</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1529-3181 |
ispartof | Communications of the Association for Information Systems, 2006, Vol.18, p.10 |
issn | 1529-3181 1529-3181 |
language | eng |
recordid | cdi_proquest_journals_2500547994 |
source | Digital Commons Online Journals |
subjects | Computer forensics Crime Criminal investigations Forensic computing Forensic sciences Legislation |
title | Crime Investigation: A Course in Computer Forensics |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T22%3A46%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Crime%20Investigation:%20A%20Course%20in%20Computer%20Forensics&rft.jtitle=Communications%20of%20the%20Association%20for%20Information%20Systems&rft.au=Lim,%20Nena&rft.date=2006&rft.volume=18&rft.spage=10&rft.pages=10-&rft.issn=1529-3181&rft.eissn=1529-3181&rft_id=info:doi/10.17705/1CAIS.01810&rft_dat=%3Cproquest_cross%3E2500547994%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2500547994&rft_id=info:pmid/&rfr_iscdi=true |