Journal of Applied Science and Engineering

Published by Tamkang University Press

1.30

Impact Factor

1.60

CiteScore

Hai-Cheng Chu1 , Whe Dar Lin2 and Kuo-Hsiung Chang This email address is being protected from spambots. You need JavaScript enabled to view it.3

1Department of Information Management/International Business, Tunghai University, Taichung, Taiwan 407, R.O.C.
2Department of Accounting & Information Technology, The Overseas Chinese Institute of Technology, Taiwan, R.O.C.
3Department of International Business, Tunghai University, Taichung, Taiwan 407, R.O.C.


 

Received: January 8, 2010
Accepted: March 3, 2010
Publication Date: March 3, 2010

Download Citation: ||https://doi.org/10.6180/jase.2010.13.1.10  


ABSTRACT


Due to the unprecedentedly ubiquitous wireless computer networks and mobile devices become prevalent, more unscrupulous technology hacktivists commit illegal conspiracies towards innocent victims via the ever growing Internet technology. Indeed, cybercrimes are relentlessly reported worldwide. The law enforcement agencies have the indispensable responsibility to crack the well-funded crime syndicate in our computer society. Consequently, Digital Forensics (DF) emerges and becomes the critical success factor to prosecute the culprit and prevent the associate cybercrime incidents from occurring. In the meanwhile, the computer society has an urgent demand for competent DF professionals to gather convincing digital evidences to assist indicting heinous perpetrators in order to allay the fears of everlasting computer crimes events in both private and public sectors. The research provides a vivid roadmap and suggested core curriculum design guidelines for higher education institutions to be integrated into their existing similar program or adopting as a groundbreaking reference model. A serial, cross-discipline, and functional approach were combined in order to design the suggested curriculum. Furthermore, the paper is attempting to minimize the theorypractice gap in DF and provide a milestone for higher education institutions to contemplate if necessary.


Keywords: Digital Forensics Core Curriculum, Cybercrime, Internet Technology, Exploited Security Leakage


REFERENCES


  1. [1] McGuire, T. J. and Murff, K. N., “Issues in the Development of a Digital Forensics Curriculum,” Journal of Computing in Small College, Vol. 22, pp. 274280 (2006).
  2. [2] Nena, L., “Crime Investigation: A Course in Computer Forensics,” Communications of AIS, Vol. 18, pp. 234 (2006).
  3. [3] West Virginia University, Certificate in computer forensics, http://www.lcsee.cemr.wvu.edu/forensics/index. php visited on July 25 (2009).
  4. [4] Lacey, T. H., Peterson, G. L. and Mills, R. F., “The Enhancement of Graduate Digital Forensics Education via the DC3 Digital Forensics Challenge,” Proceedings of The 42nd Hawaii International Conference on System Sciences, pp. 19 (2009).
  5. [5] Computer Forensics Option, Bachelor of Science in CIS and Bachelor of Science in Criminal Justice, Missouri Southern State University, Joplin, Missouri, http://www.mssu.edu/schtech/criminaljustice/BSFore nsics.htm, retrieved April 14 (2009).
  6. [6] Benson, R. J., “The Increasing Significance of Computer Forensics in Litigation,” Intellectual Property & Technology Law Journal, Vol. 16, pp. 14 (2004).
  7. [7] Hilley, S., “US Cybercrime Statistics: FBI Hotline Gets more than 200,000 Complaints,” Digital Investigation, Vol. 4, pp. 5455 (2007).
  8. [8] Internet Crime Report (2007), The Internet Cybercrime Complaint Center, Retrieved July 15, 2009, from http://www.ic3.gov/media/ annualreports.aspx.
  9. [9] Nelson, B., Phillips, A., Enfinger, F. and Steuart, C., Guide to Computer Forensics and Investigations, 3rd edition, Course Technology, Boston, Massachusetts (2008).
  10. [10] Craiger, P., “Training and Education in Digital Evidence, Handbook of Digital and Multimedia Forensic Evidence,” Human Press Inc., pp. 1122 (2007).
  11. [11] Boyd, C. and Forster, P., “Time and Date Issues in Forensic Computing: A Case Study,” Digital Investigation, Vol. 1, pp. 1823 (2004).
  12. [12] Figg, W. and Zhou, Z. A., “Computer Forensics Minor Curriculum Proposal,” Journal of Computing Sciences in Colleges, Vol. 22, pp. 3238 (2007).
  13. [13] Wassenaar, D., Woo, D. and Wu, P., “A Certificate Program in Computer Forensics,” Journal of Computing Sciences in Colleges, Vol. 24, pp. 158167 (2009).
  14. [14] Casey, E., “Investigating Sophisticated Security Breaches,” Communication of the ACM, Vol. 49, pp. 48 54 (2006).
  15. [15] Brinson, A., Robinson, A. and Rogers, M., “A Cyber Forensic Ontology: Creating a New Approach to Studying Cyber Forensics,” Digital Investigation, Vol. 3, pp. 3743 (2006).
  16. [16] Computer Forensics Certificate, Forensic Science Center, Marshall University, Huntington, West Virginia, http://forensics.marshall.edu/MISDE/MISDECertProg.html, retrieved April 14 (2009).
  17. [17] Bachelor of Science in Computer Forensics and Digital Investigations, online program, Division of Continuing Professional Studies, Champlain College, Burlington, Vermont, http://digitalforensics.champlain. edu/details_CPS_2008.html, retrieved April 14 (2009).
  18. [18] Yasinsac, A., Erbacher, R. F., Marks, D. G., Pollitt, M. M. and Sommer, P. M., “Computer Forensics Education,” IEEE Security & Privacy, pp. 1523 (2003).
  19. [19] Kessler, G. C., “Online Education in Computer and Digital Forensics: A Case Study,” Proceedings of the 40th Hawaii International Conference on Systems Sciences (HICSS 40), pp. 110 (2007).
  20. [20] Bem, D. and Huebner, E., “Computer Forensics Workshop for Undergraduate Students,” Proceedings of the Tenth Conference on Australasian Computing Education, Vol. 78, pp. 2933 (2008).
  21. [21] Rubin, B. S. and Misra, B. S., “Creating a Computer Security Curriculum in a Software Engineering Program,” 29th International Conference on Software Engineering (ICSE’07), pp. 732735 (2007).
  22. [22] Liu, J., “Implementing a Baccalaureate Program in Computer Forensics,” Journal of Computing Sciences in Colleges, Vol. 25, pp. 101109 (2010).