Digital forensics: defining an education agenda
While many fields have well-defined education agendas, this is not the case for digital forensics. A unique characteristic of the evolution of digital forensics is that it has been largely driven by practitioners in the field. As a result, the majority of the educational experiences have been develo...
| Main Authors: | Nance, K., Armstrong, Helen, Armstrong, Colin |
|---|---|
| Other Authors: | Ralph H Sprague, Jr |
| Format: | Conference Paper |
| Published: |
IEEE Computer Society
2010
|
| Online Access: | http://hdl.handle.net/20.500.11937/5166 |
Similar Items
Including stakeholder perspectives in digital forensic programs
by: Armstrong, Colin
Published: (2012)
by: Armstrong, Colin
Published: (2012)
Modeling forensic evidence systems using design science
by: Armstrong, Colin, et al.
Published: (2010)
by: Armstrong, Colin, et al.
Published: (2010)
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders
by: Armstrong, Helen, et al.
Published: (2013)
by: Armstrong, Helen, et al.
Published: (2013)
Advanced IT education for the vision impaired via e-learning
by: Armstrong, Helen
Published: (2009)
by: Armstrong, Helen
Published: (2009)
Future technology: Software-defined network (SDN) forensic
by: Waseem, Quadri, et al.
Published: (2021)
by: Waseem, Quadri, et al.
Published: (2021)
Reaching today's information security students
by: Armstrong, Helen, et al.
Published: (2009)
by: Armstrong, Helen, et al.
Published: (2009)
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Remote and local delivery of Cisco Education for the vision impaired
by: Armstrong, Helen, et al.
Published: (2007)
by: Armstrong, Helen, et al.
Published: (2007)
Applying the NIMSAD Framework to Evaluating IA Education Projects
by: Armstrong, Helen, et al.
Published: (2005)
by: Armstrong, Helen, et al.
Published: (2005)
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
Spanning the digital divide: a remote IT learning environment for the vision impaired
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Forensic investigation of link fabrication attack in software defined networks / Suleman Khan
by: Suleman , Khan
Published: (2017)
by: Suleman , Khan
Published: (2017)
An approach to visualising information security knowledge
by: Armstrong, Colin
Published: (2011)
by: Armstrong, Colin
Published: (2011)
On the matter of classifying node connections
by: Armstrong, Colin
Published: (2011)
by: Armstrong, Colin
Published: (2011)
Mapping Social Media Insider Threat Attack Vectors
by: Armstrong, Colin
Published: (2013)
by: Armstrong, Colin
Published: (2013)
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
Traceability in Digital Forensic Investigation
Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Evaluating an IA virtual network education program
by: Armstrong, Helen, et al.
Published: (2007)
by: Armstrong, Helen, et al.
Published: (2007)
A soft approach to management of information security.
by: Armstrong, Helen
Published: (1999)
by: Armstrong, Helen
Published: (1999)
Who Has the Keys to the Vault? Protecting Secrets on Laptops
by: Armstrong, Helen
Published: (2004)
by: Armstrong, Helen
Published: (2004)
Two Approaches to Information Security Doctoral Research
by: Armstrong, Helen
Published: (2011)
by: Armstrong, Helen
Published: (2011)
Australia's Proposal to Define Digital Currency
by: Allen, Christina
Published: (2023)
by: Allen, Christina
Published: (2023)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Digital forensics investigation framework for Raspberry Pi
by: Manavi, Sina
Published: (2015)
by: Manavi, Sina
Published: (2015)
Mapping Process of Digital Forensic Investigation Framework
by: Selamat, S. R., et al.
Published: (2008)
by: Selamat, S. R., et al.
Published: (2008)
Engineering education - the hidden agenda
by: Abdul Mukti, Mohamad Afifi, et al.
Published: (2004)
by: Abdul Mukti, Mohamad Afifi, et al.
Published: (2004)
Defining a rhombus
by: Foster, Colin, et al.
Published: (2018)
by: Foster, Colin, et al.
Published: (2018)
Digital forensics subdomains: The state of the art and future directions
by: Al-Dhaqm, Arafat, et al.
Published: (2021)
by: Al-Dhaqm, Arafat, et al.
Published: (2021)
Digital Forensic Automation Model For Online Social Networks
by: Arshad, Humaira
Published: (2019)
by: Arshad, Humaira
Published: (2019)
Internet paradox: defining media globalisation and the digital divide
by: Masrur Alam Khan,, et al.
Published: (2005)
by: Masrur Alam Khan,, et al.
Published: (2005)
Research agendas for the sustainable management of tropical peatland in Malaysia
by: Padfield, Rory, et al.
Published: (2015)
by: Padfield, Rory, et al.
Published: (2015)
From Pupil Referral Units (PRUs) to mainstream education: a Q methodological study exploring the perceptions of PRU and mainstream secondary school professionals on reintegration
by: Armstrong, Hayley
Published: (2017)
by: Armstrong, Hayley
Published: (2017)
Revisiting a summer vacation: digital restoration and typesetter forensics
by: Bagley, Steven R., et al.
Published: (2013)
by: Bagley, Steven R., et al.
Published: (2013)
Digital Forensics Investigation Frameworks for Cloud
Computing and Internet of Things
by: Pichan, Ameer
Published: (2022)
by: Pichan, Ameer
Published: (2022)
Proposed intelligence systems based on digital Forensics : Review paper
by: Ismael Sahib, Hussein, et al.
Published: (2023)
by: Ismael Sahib, Hussein, et al.
Published: (2023)
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Formalization in digital forensic triage for identification of malicious IoT devices
by: Ibrahim, Mohammed, et al.
Published: (2019)
by: Ibrahim, Mohammed, et al.
Published: (2019)
Similar Items
-
Including stakeholder perspectives in digital forensic programs
by: Armstrong, Colin
Published: (2012) -
Modeling forensic evidence systems using design science
by: Armstrong, Colin, et al.
Published: (2010) -
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders
by: Armstrong, Helen, et al.
Published: (2013) -
Advanced IT education for the vision impaired via e-learning
by: Armstrong, Helen
Published: (2009) -
Future technology: Software-defined network (SDN) forensic
by: Waseem, Quadri, et al.
Published: (2021)