Demonstrating Operating System Principles via Computer Forensics Exercises

We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of information systems education 2010-06, Vol.21 (2), p.195
Hauptverfasser: Duffy, Kevin P, Davis, Martin H., Jr, Sethi, Vikram
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 2
container_start_page 195
container_title Journal of information systems education
container_volume 21
creator Duffy, Kevin P
Davis, Martin H., Jr
Sethi, Vikram
description We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer forensics investigation. Students were asked to indicate their perception of the practicality of the course material before and after completing the exercises. Based upon a t-test, we conclude that students find the course material to be of greater practical significance when course materials are linked to forensics topics. (Contains 1 table.)
format Article
fullrecord <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_745597249</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A234790565</galeid><ericid>EJ893898</ericid><sourcerecordid>A234790565</sourcerecordid><originalsourceid>FETCH-LOGICAL-e1529-503d21c2b621868b26598c5e21ab1c71bd1569a0eaf01faf9afca8fab03f91a23</originalsourceid><addsrcrecordid>eNptj09Lw0AQxYMoWKvfwEPQq5H9k93sHktt1VKooJ7DZjtbtzSbuJOI_fYG6sGCDLwZht97w5wkIyaKPOOqYKfJiBIhMk60PE8uELeEUKGlHCWLB6ibgF00nQ-bdNXC7_S6xw7q9CX6YH27A0y_vEmnTd32HcR03kQI6C2ms2-I1iPgZXLmzA7h6rePk_f57G36lC1Xj8_TyTIDKpjOBOFrRi2rJKNKqopJoZUVwKipqC1otaZCakPAOEKdcdo4a5QzFeFOU8P4OLk55Lax-ewBu3Lb9DEMJ8siF0IXLNcDdHuANmYHpQ-uGV60tUdbThjPC02EFAN1_w811Bpqb5sAzg_7I8PdH0PVow-Ag6DffHS4MT3iMX59wCF6W7bR1ybuy9lCaa604j9aHn6J</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>745597249</pqid></control><display><type>article</type><title>Demonstrating Operating System Principles via Computer Forensics Exercises</title><source>EBSCOhost Business Source Complete</source><source>EZB-FREE-00999 freely available EZB journals</source><source>EBSCOhost Education Source</source><creator>Duffy, Kevin P ; Davis, Martin H., Jr ; Sethi, Vikram</creator><creatorcontrib>Duffy, Kevin P ; Davis, Martin H., Jr ; Sethi, Vikram</creatorcontrib><description>We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer forensics investigation. Students were asked to indicate their perception of the practicality of the course material before and after completing the exercises. Based upon a t-test, we conclude that students find the course material to be of greater practical significance when course materials are linked to forensics topics. (Contains 1 table.)</description><identifier>ISSN: 1055-3096</identifier><identifier>EISSN: 2574-3872</identifier><language>eng</language><publisher>West Lafayette: Journal of Information Systems Education (JISE)</publisher><subject>Case Studies ; Chat rooms ; Class Activities ; College Students ; Computer forensics ; Computer industry ; Computer Science Education ; Computer Security ; Computer Software ; Computers ; Course Content ; Criminal investigations ; Curricula ; Cybercrime ; Educational aspects ; Educational materials ; Educational Strategies ; Educational technology ; Evidence ; Forensic sciences ; Hard disks ; Independent study ; Information systems ; Instructional Effectiveness ; Internet ; Law Enforcement ; Learner Engagement ; Lesson Plans ; Linux ; Management Information Systems ; Meetings ; Operating systems ; Perceptions ; Relevance (Education) ; School Holding Power ; Student Attitudes ; Student Interests ; Students ; Studies ; T Test ; Teaching Methods ; Technology adoption ; Vignettes</subject><ispartof>Journal of information systems education, 2010-06, Vol.21 (2), p.195</ispartof><rights>COPYRIGHT 2010 Journal of Information Systems Education</rights><rights>Copyright EDSIG Summer 2010</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids><backlink>$$Uhttp://eric.ed.gov/ERICWebPortal/detail?accno=EJ893898$$DView record in ERIC$$Hfree_for_read</backlink></links><search><creatorcontrib>Duffy, Kevin P</creatorcontrib><creatorcontrib>Davis, Martin H., Jr</creatorcontrib><creatorcontrib>Sethi, Vikram</creatorcontrib><title>Demonstrating Operating System Principles via Computer Forensics Exercises</title><title>Journal of information systems education</title><description>We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer forensics investigation. Students were asked to indicate their perception of the practicality of the course material before and after completing the exercises. Based upon a t-test, we conclude that students find the course material to be of greater practical significance when course materials are linked to forensics topics. (Contains 1 table.)</description><subject>Case Studies</subject><subject>Chat rooms</subject><subject>Class Activities</subject><subject>College Students</subject><subject>Computer forensics</subject><subject>Computer industry</subject><subject>Computer Science Education</subject><subject>Computer Security</subject><subject>Computer Software</subject><subject>Computers</subject><subject>Course Content</subject><subject>Criminal investigations</subject><subject>Curricula</subject><subject>Cybercrime</subject><subject>Educational aspects</subject><subject>Educational materials</subject><subject>Educational Strategies</subject><subject>Educational technology</subject><subject>Evidence</subject><subject>Forensic sciences</subject><subject>Hard disks</subject><subject>Independent study</subject><subject>Information systems</subject><subject>Instructional Effectiveness</subject><subject>Internet</subject><subject>Law Enforcement</subject><subject>Learner Engagement</subject><subject>Lesson Plans</subject><subject>Linux</subject><subject>Management Information Systems</subject><subject>Meetings</subject><subject>Operating systems</subject><subject>Perceptions</subject><subject>Relevance (Education)</subject><subject>School Holding Power</subject><subject>Student Attitudes</subject><subject>Student Interests</subject><subject>Students</subject><subject>Studies</subject><subject>T Test</subject><subject>Teaching Methods</subject><subject>Technology adoption</subject><subject>Vignettes</subject><issn>1055-3096</issn><issn>2574-3872</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>N95</sourceid><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNptj09Lw0AQxYMoWKvfwEPQq5H9k93sHktt1VKooJ7DZjtbtzSbuJOI_fYG6sGCDLwZht97w5wkIyaKPOOqYKfJiBIhMk60PE8uELeEUKGlHCWLB6ibgF00nQ-bdNXC7_S6xw7q9CX6YH27A0y_vEmnTd32HcR03kQI6C2ms2-I1iPgZXLmzA7h6rePk_f57G36lC1Xj8_TyTIDKpjOBOFrRi2rJKNKqopJoZUVwKipqC1otaZCakPAOEKdcdo4a5QzFeFOU8P4OLk55Lax-ewBu3Lb9DEMJ8siF0IXLNcDdHuANmYHpQ-uGV60tUdbThjPC02EFAN1_w811Bpqb5sAzg_7I8PdH0PVow-Ag6DffHS4MT3iMX59wCF6W7bR1ybuy9lCaa604j9aHn6J</recordid><startdate>20100622</startdate><enddate>20100622</enddate><creator>Duffy, Kevin P</creator><creator>Davis, Martin H., Jr</creator><creator>Sethi, Vikram</creator><general>Journal of Information Systems Education (JISE)</general><general>Journal of Information Systems Education</general><general>EDSIG</general><scope>7SW</scope><scope>BJH</scope><scope>BNH</scope><scope>BNI</scope><scope>BNJ</scope><scope>BNO</scope><scope>ERI</scope><scope>PET</scope><scope>REK</scope><scope>WWN</scope><scope>N95</scope><scope>0-V</scope><scope>3V.</scope><scope>4T-</scope><scope>4U-</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88B</scope><scope>8AL</scope><scope>8AO</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ALSLI</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>CJNVE</scope><scope>CNYFK</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>M0C</scope><scope>M0N</scope><scope>M0P</scope><scope>M1O</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEDU</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>S0X</scope></search><sort><creationdate>20100622</creationdate><title>Demonstrating Operating System Principles via Computer Forensics Exercises</title><author>Duffy, Kevin P ; Davis, Martin H., Jr ; Sethi, Vikram</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-e1529-503d21c2b621868b26598c5e21ab1c71bd1569a0eaf01faf9afca8fab03f91a23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Case Studies</topic><topic>Chat rooms</topic><topic>Class Activities</topic><topic>College Students</topic><topic>Computer forensics</topic><topic>Computer industry</topic><topic>Computer Science Education</topic><topic>Computer Security</topic><topic>Computer Software</topic><topic>Computers</topic><topic>Course Content</topic><topic>Criminal investigations</topic><topic>Curricula</topic><topic>Cybercrime</topic><topic>Educational aspects</topic><topic>Educational materials</topic><topic>Educational Strategies</topic><topic>Educational technology</topic><topic>Evidence</topic><topic>Forensic sciences</topic><topic>Hard disks</topic><topic>Independent study</topic><topic>Information systems</topic><topic>Instructional Effectiveness</topic><topic>Internet</topic><topic>Law Enforcement</topic><topic>Learner Engagement</topic><topic>Lesson Plans</topic><topic>Linux</topic><topic>Management Information Systems</topic><topic>Meetings</topic><topic>Operating systems</topic><topic>Perceptions</topic><topic>Relevance (Education)</topic><topic>School Holding Power</topic><topic>Student Attitudes</topic><topic>Student Interests</topic><topic>Students</topic><topic>Studies</topic><topic>T Test</topic><topic>Teaching Methods</topic><topic>Technology adoption</topic><topic>Vignettes</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Duffy, Kevin P</creatorcontrib><creatorcontrib>Davis, Martin H., Jr</creatorcontrib><creatorcontrib>Sethi, Vikram</creatorcontrib><collection>ERIC</collection><collection>ERIC (Ovid)</collection><collection>ERIC</collection><collection>ERIC</collection><collection>ERIC (Legacy Platform)</collection><collection>ERIC( SilverPlatter )</collection><collection>ERIC</collection><collection>ERIC PlusText (Legacy Platform)</collection><collection>Education Resources Information Center (ERIC)</collection><collection>ERIC</collection><collection>Gale Business: Insights</collection><collection>ProQuest Social Sciences Premium Collection</collection><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>University Readers</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Education Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Social Science Premium Collection</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Education Collection</collection><collection>Library &amp; Information Science Collection</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Education Database</collection><collection>Library Science Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Education</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>SIRS Editorial</collection><jtitle>Journal of information systems education</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Duffy, Kevin P</au><au>Davis, Martin H., Jr</au><au>Sethi, Vikram</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><ericid>EJ893898</ericid><atitle>Demonstrating Operating System Principles via Computer Forensics Exercises</atitle><jtitle>Journal of information systems education</jtitle><date>2010-06-22</date><risdate>2010</risdate><volume>21</volume><issue>2</issue><spage>195</spage><pages>195-</pages><issn>1055-3096</issn><eissn>2574-3872</eissn><abstract>We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer forensics investigation. Students were asked to indicate their perception of the practicality of the course material before and after completing the exercises. Based upon a t-test, we conclude that students find the course material to be of greater practical significance when course materials are linked to forensics topics. (Contains 1 table.)</abstract><cop>West Lafayette</cop><pub>Journal of Information Systems Education (JISE)</pub><tpages>8</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1055-3096
ispartof Journal of information systems education, 2010-06, Vol.21 (2), p.195
issn 1055-3096
2574-3872
language eng
recordid cdi_proquest_journals_745597249
source EBSCOhost Business Source Complete; EZB-FREE-00999 freely available EZB journals; EBSCOhost Education Source
subjects Case Studies
Chat rooms
Class Activities
College Students
Computer forensics
Computer industry
Computer Science Education
Computer Security
Computer Software
Computers
Course Content
Criminal investigations
Curricula
Cybercrime
Educational aspects
Educational materials
Educational Strategies
Educational technology
Evidence
Forensic sciences
Hard disks
Independent study
Information systems
Instructional Effectiveness
Internet
Law Enforcement
Learner Engagement
Lesson Plans
Linux
Management Information Systems
Meetings
Operating systems
Perceptions
Relevance (Education)
School Holding Power
Student Attitudes
Student Interests
Students
Studies
T Test
Teaching Methods
Technology adoption
Vignettes
title Demonstrating Operating System Principles via Computer Forensics Exercises
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T05%3A53%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Demonstrating%20Operating%20System%20Principles%20via%20Computer%20Forensics%20Exercises&rft.jtitle=Journal%20of%20information%20systems%20education&rft.au=Duffy,%20Kevin%20P&rft.date=2010-06-22&rft.volume=21&rft.issue=2&rft.spage=195&rft.pages=195-&rft.issn=1055-3096&rft.eissn=2574-3872&rft_id=info:doi/&rft_dat=%3Cgale_proqu%3EA234790565%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=745597249&rft_id=info:pmid/&rft_galeid=A234790565&rft_ericid=EJ893898&rfr_iscdi=true