Abstract
It could be argued that the academic perspective of computer forensic practitioner requirements reflecting the thinking world (and is based on scientific methods) does not accurately reflect those requirements considered important by some people universities would desire as students, the computer forensic practitioners. This paper presents an analysis of data collected from full time practitioners representing three perspectives; military, law enforcement, and forensic scientist. It also examines the needs of practitioners and compares these with academic contributions intended to meet these needs.
Keywords
Please use the following format when citing this chapter: Armstrong, C., 2007. in IFIP International Federation for Information Processing, Volume 237. Fifth World Conference on Information Security Education, eds. Futcher, L., Dodge, R., (Boston: Springer), pp. 1–8.
Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Armstrong, C. J., 2003. Developing A Framework for Evaluating Computer Forensic Tools. Australian Institute of Criminology Conference, Canberra ACT, Australia.
Armstrong, C. J., 2003, Mastering Computer Forensics, in Security Education and Critical Infrastructures, Irvine, Cynthia and Armstrong, Helen, (Ed’s), Kluwer Academic Publishers, Boston, pp 151–158
Armstrong, C. J., 2005, Development of a Research Framework for Selecting Computer Forensic Tools. Masters Thesis, Curtin University of Technology, Perth, Western Australia.
Armstrong, H. and Forde, P., 2003, Cyber criminals and their use of the Internet, Journal of Information Management & Computer Security, October, Vol. 11, No. 5.
Armstrong, H. and Russo, P., 2004, Electronic Forensics Education Needs of Law Enforcement. Conference Proceedings of CISSE8 2004, United States Military Academy, West Point, NY June 2004
Armstrong, H. and Russo, P., 2005, Walking the Beat on the path to technology, Developing computer savvy Police. Conference Proceedings of WISE4 — 4th World Conference on Information Security Education, May 18–20, Moscow, Russia
Armstrong, C. and Jayaratna, N., 2004. Teaching Computer Forensics: Uniting Practice with Intellect. CISSE8, United States Military Academy, West Point, NY
Broersma, M, 2004, UK Internet Crime Efforts are Criminal says Study, Computerworld (Sunday, 23 May 2004), Available on-line @ WWW: http://www.computerworld.co.nz/news.nsf/UNID/BB017D2244CD06D3CC256E9 A0073384A
EURIM, 2004, Supplying the Skills for Justice, Available on-line @ WWW: http://www.eurim.org/consult/ecrime/may_04/ECS_DP3_Skills_040 505_web.htm
Jayaratna, N. 1999, Understanding and Evaluating Methodologies. N1MSAD: A Systemic Framework, McGraw-Hill Book Company, Maidenhead.
Kruse Warren G. & Heiser Jay G., 2002, Computer Forensics: Incident Response Essentials, Addison-Wesley, Boston
Littlejohn Shinder Debra, and Tittel Ed, 2002, Scene of the Cybercrime: Computer Forensics Handbook, Syngress
Roast, S., Lavender, P. and Wisniewski, T., 2001, Global Impacts, Future Challenges and Current Issues in training within the Police Computer Crime Unit, Proceedings of the Second World Conference on Information Security Education, July, Western Australia, pp 7–23
Slade Robert, 2004, Software Forensics: Collecting evidence from the scene of a digital crime, McGraw-Hill
Vatis, M. A., 2002. Law Enforcement Tools and Technologies for Investigating Cyber Attacks. A National Needs Assessment. Hanover, NH, Institute for Security Technology Studies at Dartmouth College.
Warren, M., 2003, Australia’s Agenda for E-security Education and Research, in Security Education and Critical Infrastructures, Irvine, Cynthia and Armstrong, Helen, (Ed’s), Kluwer Academic Publishers, Boston, pp 109–114
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 International Federation for Information Processing
About this paper
Cite this paper
Armstrong, C.J. (2007). An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements. In: Futcher, L., Dodge, R. (eds) Fifth World Conference on Information Security Education. WISE 2007. IFIP Advances in Information and Communication Technology, vol 237. Springer, New York, NY. https://doi.org/10.1007/978-0-387-73269-5_1
Download citation
DOI: https://doi.org/10.1007/978-0-387-73269-5_1
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-73268-8
Online ISBN: 978-0-387-73269-5
eBook Packages: Computer ScienceComputer Science (R0)