Show simple item record

dc.contributor.authorNance, K.
dc.contributor.authorArmstrong, Helen
dc.contributor.authorArmstrong, Colin
dc.contributor.editorRalph H Sprague, Jr
dc.identifier.citationNance, Kara and Armstrong, Helen and Armstrong, Colin. 2010. Digital forensics: defining an education agenda, in Ralph H Sprague, Jr (ed), HICSS 43, Jan 5 2010. Hawaii: IEEE Computer Society.

While many fields have well-defined education agendas, this is not the case for digital forensics. A unique characteristic of the evolution of digital forensics is that it has been largely driven by practitioners in the field. As a result, the majority of the educational experiences have been developed in response to identified weaknesses in the system or to train individuals on the use of a specific tool or technique, rather than as a result of educational needs assessments based on an accepted common body of knowledge. In June, 2008 a group of digital forensics researchers, educators and practitioners met as a working group at the colloquium for Information Systems Security Education (CISSE 2008) to brainstorm ideas for the development of a research, education, and outreach agenda for Digital Forensics. This paper presents the research in education needs that the group identified associated with the development of a digital forensics education agenda.

dc.publisherIEEE Computer Society
dc.titleDigital forensics: defining an education agenda
dc.typeConference Paper
dcterms.source.titleProceedings of the forty third annual Hawaii international conference on system sciences
dcterms.source.seriesProceedings of the forty third annual Hawaii international conference on system sciences
dcterms.source.conferenceHICSS 43
dcterms.source.conference-start-dateJan 5 2010

Copyright © 2010 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder

curtin.accessStatusOpen access
curtin.facultyCurtin Business School
curtin.facultySchool of Information Systems

Files in this item


This item appears in the following Collection(s)

Show simple item record