Demonstrating Operating System Principles via Computer Forensics Exercises
We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system...
Gespeichert in:
Veröffentlicht in: | Journal of information systems education 2010-06, Vol.21 (2), p.195 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 2 |
container_start_page | 195 |
container_title | Journal of information systems education |
container_volume | 21 |
creator | Duffy, Kevin P Davis, Martin H., Jr Sethi, Vikram |
description | We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer forensics investigation. Students were asked to indicate their perception of the practicality of the course material before and after completing the exercises. Based upon a t-test, we conclude that students find the course material to be of greater practical significance when course materials are linked to forensics topics. (Contains 1 table.) |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_745597249</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A234790565</galeid><ericid>EJ893898</ericid><sourcerecordid>A234790565</sourcerecordid><originalsourceid>FETCH-LOGICAL-e1529-503d21c2b621868b26598c5e21ab1c71bd1569a0eaf01faf9afca8fab03f91a23</originalsourceid><addsrcrecordid>eNptj09Lw0AQxYMoWKvfwEPQq5H9k93sHktt1VKooJ7DZjtbtzSbuJOI_fYG6sGCDLwZht97w5wkIyaKPOOqYKfJiBIhMk60PE8uELeEUKGlHCWLB6ibgF00nQ-bdNXC7_S6xw7q9CX6YH27A0y_vEmnTd32HcR03kQI6C2ms2-I1iPgZXLmzA7h6rePk_f57G36lC1Xj8_TyTIDKpjOBOFrRi2rJKNKqopJoZUVwKipqC1otaZCakPAOEKdcdo4a5QzFeFOU8P4OLk55Lax-ewBu3Lb9DEMJ8siF0IXLNcDdHuANmYHpQ-uGV60tUdbThjPC02EFAN1_w811Bpqb5sAzg_7I8PdH0PVow-Ag6DffHS4MT3iMX59wCF6W7bR1ybuy9lCaa604j9aHn6J</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>745597249</pqid></control><display><type>article</type><title>Demonstrating Operating System Principles via Computer Forensics Exercises</title><source>EBSCOhost Business Source Complete</source><source>EZB-FREE-00999 freely available EZB journals</source><source>EBSCOhost Education Source</source><creator>Duffy, Kevin P ; Davis, Martin H., Jr ; Sethi, Vikram</creator><creatorcontrib>Duffy, Kevin P ; Davis, Martin H., Jr ; Sethi, Vikram</creatorcontrib><description>We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer forensics investigation. Students were asked to indicate their perception of the practicality of the course material before and after completing the exercises. Based upon a t-test, we conclude that students find the course material to be of greater practical significance when course materials are linked to forensics topics. (Contains 1 table.)</description><identifier>ISSN: 1055-3096</identifier><identifier>EISSN: 2574-3872</identifier><language>eng</language><publisher>West Lafayette: Journal of Information Systems Education (JISE)</publisher><subject>Case Studies ; Chat rooms ; Class Activities ; College Students ; Computer forensics ; Computer industry ; Computer Science Education ; Computer Security ; Computer Software ; Computers ; Course Content ; Criminal investigations ; Curricula ; Cybercrime ; Educational aspects ; Educational materials ; Educational Strategies ; Educational technology ; Evidence ; Forensic sciences ; Hard disks ; Independent study ; Information systems ; Instructional Effectiveness ; Internet ; Law Enforcement ; Learner Engagement ; Lesson Plans ; Linux ; Management Information Systems ; Meetings ; Operating systems ; Perceptions ; Relevance (Education) ; School Holding Power ; Student Attitudes ; Student Interests ; Students ; Studies ; T Test ; Teaching Methods ; Technology adoption ; Vignettes</subject><ispartof>Journal of information systems education, 2010-06, Vol.21 (2), p.195</ispartof><rights>COPYRIGHT 2010 Journal of Information Systems Education</rights><rights>Copyright EDSIG Summer 2010</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids><backlink>$$Uhttp://eric.ed.gov/ERICWebPortal/detail?accno=EJ893898$$DView record in ERIC$$Hfree_for_read</backlink></links><search><creatorcontrib>Duffy, Kevin P</creatorcontrib><creatorcontrib>Davis, Martin H., Jr</creatorcontrib><creatorcontrib>Sethi, Vikram</creatorcontrib><title>Demonstrating Operating System Principles via Computer Forensics Exercises</title><title>Journal of information systems education</title><description>We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer forensics investigation. Students were asked to indicate their perception of the practicality of the course material before and after completing the exercises. Based upon a t-test, we conclude that students find the course material to be of greater practical significance when course materials are linked to forensics topics. (Contains 1 table.)</description><subject>Case Studies</subject><subject>Chat rooms</subject><subject>Class Activities</subject><subject>College Students</subject><subject>Computer forensics</subject><subject>Computer industry</subject><subject>Computer Science Education</subject><subject>Computer Security</subject><subject>Computer Software</subject><subject>Computers</subject><subject>Course Content</subject><subject>Criminal investigations</subject><subject>Curricula</subject><subject>Cybercrime</subject><subject>Educational aspects</subject><subject>Educational materials</subject><subject>Educational Strategies</subject><subject>Educational technology</subject><subject>Evidence</subject><subject>Forensic sciences</subject><subject>Hard disks</subject><subject>Independent study</subject><subject>Information systems</subject><subject>Instructional Effectiveness</subject><subject>Internet</subject><subject>Law Enforcement</subject><subject>Learner Engagement</subject><subject>Lesson Plans</subject><subject>Linux</subject><subject>Management Information Systems</subject><subject>Meetings</subject><subject>Operating systems</subject><subject>Perceptions</subject><subject>Relevance (Education)</subject><subject>School Holding Power</subject><subject>Student Attitudes</subject><subject>Student Interests</subject><subject>Students</subject><subject>Studies</subject><subject>T Test</subject><subject>Teaching Methods</subject><subject>Technology adoption</subject><subject>Vignettes</subject><issn>1055-3096</issn><issn>2574-3872</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>N95</sourceid><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNptj09Lw0AQxYMoWKvfwEPQq5H9k93sHktt1VKooJ7DZjtbtzSbuJOI_fYG6sGCDLwZht97w5wkIyaKPOOqYKfJiBIhMk60PE8uELeEUKGlHCWLB6ibgF00nQ-bdNXC7_S6xw7q9CX6YH27A0y_vEmnTd32HcR03kQI6C2ms2-I1iPgZXLmzA7h6rePk_f57G36lC1Xj8_TyTIDKpjOBOFrRi2rJKNKqopJoZUVwKipqC1otaZCakPAOEKdcdo4a5QzFeFOU8P4OLk55Lax-ewBu3Lb9DEMJ8siF0IXLNcDdHuANmYHpQ-uGV60tUdbThjPC02EFAN1_w811Bpqb5sAzg_7I8PdH0PVow-Ag6DffHS4MT3iMX59wCF6W7bR1ybuy9lCaa604j9aHn6J</recordid><startdate>20100622</startdate><enddate>20100622</enddate><creator>Duffy, Kevin P</creator><creator>Davis, Martin H., Jr</creator><creator>Sethi, Vikram</creator><general>Journal of Information Systems Education (JISE)</general><general>Journal of Information Systems Education</general><general>EDSIG</general><scope>7SW</scope><scope>BJH</scope><scope>BNH</scope><scope>BNI</scope><scope>BNJ</scope><scope>BNO</scope><scope>ERI</scope><scope>PET</scope><scope>REK</scope><scope>WWN</scope><scope>N95</scope><scope>0-V</scope><scope>3V.</scope><scope>4T-</scope><scope>4U-</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88B</scope><scope>8AL</scope><scope>8AO</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ALSLI</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>CJNVE</scope><scope>CNYFK</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>M0C</scope><scope>M0N</scope><scope>M0P</scope><scope>M1O</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEDU</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>S0X</scope></search><sort><creationdate>20100622</creationdate><title>Demonstrating Operating System Principles via Computer Forensics Exercises</title><author>Duffy, Kevin P ; Davis, Martin H., Jr ; Sethi, Vikram</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-e1529-503d21c2b621868b26598c5e21ab1c71bd1569a0eaf01faf9afca8fab03f91a23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Case Studies</topic><topic>Chat rooms</topic><topic>Class Activities</topic><topic>College Students</topic><topic>Computer forensics</topic><topic>Computer industry</topic><topic>Computer Science Education</topic><topic>Computer Security</topic><topic>Computer Software</topic><topic>Computers</topic><topic>Course Content</topic><topic>Criminal investigations</topic><topic>Curricula</topic><topic>Cybercrime</topic><topic>Educational aspects</topic><topic>Educational materials</topic><topic>Educational Strategies</topic><topic>Educational technology</topic><topic>Evidence</topic><topic>Forensic sciences</topic><topic>Hard disks</topic><topic>Independent study</topic><topic>Information systems</topic><topic>Instructional Effectiveness</topic><topic>Internet</topic><topic>Law Enforcement</topic><topic>Learner Engagement</topic><topic>Lesson Plans</topic><topic>Linux</topic><topic>Management Information Systems</topic><topic>Meetings</topic><topic>Operating systems</topic><topic>Perceptions</topic><topic>Relevance (Education)</topic><topic>School Holding Power</topic><topic>Student Attitudes</topic><topic>Student Interests</topic><topic>Students</topic><topic>Studies</topic><topic>T Test</topic><topic>Teaching Methods</topic><topic>Technology adoption</topic><topic>Vignettes</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Duffy, Kevin P</creatorcontrib><creatorcontrib>Davis, Martin H., Jr</creatorcontrib><creatorcontrib>Sethi, Vikram</creatorcontrib><collection>ERIC</collection><collection>ERIC (Ovid)</collection><collection>ERIC</collection><collection>ERIC</collection><collection>ERIC (Legacy Platform)</collection><collection>ERIC( SilverPlatter )</collection><collection>ERIC</collection><collection>ERIC PlusText (Legacy Platform)</collection><collection>Education Resources Information Center (ERIC)</collection><collection>ERIC</collection><collection>Gale Business: Insights</collection><collection>ProQuest Social Sciences Premium Collection</collection><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>University Readers</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Education Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Social Science Premium Collection</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Education Collection</collection><collection>Library & Information Science Collection</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Education Database</collection><collection>Library Science Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Education</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>SIRS Editorial</collection><jtitle>Journal of information systems education</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Duffy, Kevin P</au><au>Davis, Martin H., Jr</au><au>Sethi, Vikram</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><ericid>EJ893898</ericid><atitle>Demonstrating Operating System Principles via Computer Forensics Exercises</atitle><jtitle>Journal of information systems education</jtitle><date>2010-06-22</date><risdate>2010</risdate><volume>21</volume><issue>2</issue><spage>195</spage><pages>195-</pages><issn>1055-3096</issn><eissn>2574-3872</eissn><abstract>We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer forensics investigation. Students were asked to indicate their perception of the practicality of the course material before and after completing the exercises. Based upon a t-test, we conclude that students find the course material to be of greater practical significance when course materials are linked to forensics topics. (Contains 1 table.)</abstract><cop>West Lafayette</cop><pub>Journal of Information Systems Education (JISE)</pub><tpages>8</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1055-3096 |
ispartof | Journal of information systems education, 2010-06, Vol.21 (2), p.195 |
issn | 1055-3096 2574-3872 |
language | eng |
recordid | cdi_proquest_journals_745597249 |
source | EBSCOhost Business Source Complete; EZB-FREE-00999 freely available EZB journals; EBSCOhost Education Source |
subjects | Case Studies Chat rooms Class Activities College Students Computer forensics Computer industry Computer Science Education Computer Security Computer Software Computers Course Content Criminal investigations Curricula Cybercrime Educational aspects Educational materials Educational Strategies Educational technology Evidence Forensic sciences Hard disks Independent study Information systems Instructional Effectiveness Internet Law Enforcement Learner Engagement Lesson Plans Linux Management Information Systems Meetings Operating systems Perceptions Relevance (Education) School Holding Power Student Attitudes Student Interests Students Studies T Test Teaching Methods Technology adoption Vignettes |
title | Demonstrating Operating System Principles via Computer Forensics Exercises |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T05%3A53%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Demonstrating%20Operating%20System%20Principles%20via%20Computer%20Forensics%20Exercises&rft.jtitle=Journal%20of%20information%20systems%20education&rft.au=Duffy,%20Kevin%20P&rft.date=2010-06-22&rft.volume=21&rft.issue=2&rft.spage=195&rft.pages=195-&rft.issn=1055-3096&rft.eissn=2574-3872&rft_id=info:doi/&rft_dat=%3Cgale_proqu%3EA234790565%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=745597249&rft_id=info:pmid/&rft_galeid=A234790565&rft_ericid=EJ893898&rfr_iscdi=true |