Advertisement

An Analysis of Computer Forensic Practitioners Perspectives on Education and Training Requirements

  • Colin J. Armstrong
Conference paper
  • 589 Downloads
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 237)

Abstract

It could be argued that the academic perspective of computer forensic practitioner requirements reflecting the thinking world (and is based on scientific methods) does not accurately reflect those requirements considered important by some people universities would desire as students, the computer forensic practitioners. This paper presents an analysis of data collected from full time practitioners representing three perspectives; military, law enforcement, and forensic scientist. It also examines the needs of practitioners and compares these with academic contributions intended to meet these needs.

Keywords

Academic education programs Vendor training courses practitioner education and training needs 

References

  1. 1.
    Armstrong, C. J., 2003. Developing A Framework for Evaluating Computer Forensic Tools. Australian Institute of Criminology Conference, Canberra ACT, Australia.Google Scholar
  2. 2.
    Armstrong, C. J., 2003, Mastering Computer Forensics, in Security Education and Critical Infrastructures, Irvine, Cynthia and Armstrong, Helen, (Ed’s), Kluwer Academic Publishers, Boston, pp 151–158CrossRefGoogle Scholar
  3. 3.
    Armstrong, C. J., 2005, Development of a Research Framework for Selecting Computer Forensic Tools. Masters Thesis, Curtin University of Technology, Perth, Western Australia.Google Scholar
  4. 4.
    Armstrong, H. and Forde, P., 2003, Cyber criminals and their use of the Internet, Journal of Information Management & Computer Security, October, Vol. 11, No. 5.Google Scholar
  5. 5.
    Armstrong, H. and Russo, P., 2004, Electronic Forensics Education Needs of Law Enforcement. Conference Proceedings of CISSE8 2004, United States Military Academy, West Point, NY June 2004Google Scholar
  6. 6.
    Armstrong, H. and Russo, P., 2005, Walking the Beat on the path to technology, Developing computer savvy Police. Conference Proceedings of WISE4 — 4th World Conference on Information Security Education, May 18–20, Moscow, RussiaGoogle Scholar
  7. 7.
    Armstrong, C. and Jayaratna, N., 2004. Teaching Computer Forensics: Uniting Practice with Intellect. CISSE8, United States Military Academy, West Point, NYGoogle Scholar
  8. 8.
    Broersma, M, 2004, UK Internet Crime Efforts are Criminal says Study, Computerworld (Sunday, 23 May 2004), Available on-line @ WWW: http://www.computerworld.co.nz/news.nsf/UNID/BB017D2244CD06D3CC256E9 A0073384A
  9. 9.
    EURIM, 2004, Supplying the Skills for Justice, Available on-line @ WWW: http://www.eurim.org/consult/ecrime/may_04/ECS_DP3_Skills_040 505_web.htm
  10. 10.
    Jayaratna, N. 1999, Understanding and Evaluating Methodologies. N1MSAD: A Systemic Framework, McGraw-Hill Book Company, Maidenhead.Google Scholar
  11. 11.
    Kruse Warren G. & Heiser Jay G., 2002, Computer Forensics: Incident Response Essentials, Addison-Wesley, BostonGoogle Scholar
  12. 12.
    Littlejohn Shinder Debra, and Tittel Ed, 2002, Scene of the Cybercrime: Computer Forensics Handbook, SyngressGoogle Scholar
  13. 13.
    Roast, S., Lavender, P. and Wisniewski, T., 2001, Global Impacts, Future Challenges and Current Issues in training within the Police Computer Crime Unit, Proceedings of the Second World Conference on Information Security Education, July, Western Australia, pp 7–23Google Scholar
  14. 14.
    Slade Robert, 2004, Software Forensics: Collecting evidence from the scene of a digital crime, McGraw-HillGoogle Scholar
  15. 15.
    Vatis, M. A., 2002. Law Enforcement Tools and Technologies for Investigating Cyber Attacks. A National Needs Assessment. Hanover, NH, Institute for Security Technology Studies at Dartmouth College.Google Scholar
  16. 16.
    Warren, M., 2003, Australia’s Agenda for E-security Education and Research, in Security Education and Critical Infrastructures, Irvine, Cynthia and Armstrong, Helen, (Ed’s), Kluwer Academic Publishers, Boston, pp 109–114CrossRefGoogle Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Colin J. Armstrong
    • 1
  1. 1.Gailaad Pry LtdPerthAustralia

Personalised recommendations