Advertisement

Developing a Digital Forensics Curriculum: Exploring Trends from 2007 to 2017

  • Roshan HarnekerEmail author
  • Adrie Stander
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1136)

Abstract

The young science of digital forensics has made great strides in the last decade, but so, too, has cyber crime. The growing complexity of cyber crime has necessitated that traditional forensics methods be updated to accommodate new technologies, and that further research is carried out to keep up with the rate of technological innovation. The main purpose of this paper is to determine how academic teaching and research can support the needs of the industry in investigating cyber crime. Current digital forensics curricula in higher education are discussed, followed by an analysis of academic research trends for this discipline for the years 2007 to 2017. We conclude by highlighting trends for which more research is required and which could possibly contribute towards shaping future teaching and learning of digital forensics in higher education.

Keywords

Digital forensics Trends Curriculum 

References

  1. 1.
    Almulhem, A.: Network forensics: notions and challenges. In: Proceedings of IEEE ISSPIT International Symposium on Signal Processing and Information Technology, pp. 463–466 (2009)Google Scholar
  2. 2.
    Bagby, J.W.: The cyber forensic war room: an immersion into IT aspects of public policy. In: Carroll, J.M. (ed.) Innovative Practices in Teaching Information Sciences and Technology: Experience Reports and Reflections, pp. 117–132. Springer, Cham (2014).  https://doi.org/10.1007/978-3-319-03656-4_11CrossRefGoogle Scholar
  3. 3.
    Bryhn, A.C., Dimberg, P.H.: An operational definition of a statistically meaningful trend. PLoS ONE 6(4), e19241 (2011)CrossRefGoogle Scholar
  4. 4.
    Casey, E.: Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Academic Press, Orlando (2011)Google Scholar
  5. 5.
    Endicott-Popovsky, B., Frinke, D.: Embedding forensic capabilities into networks: addressing inefficiencies in digital forensics investigations. In: Proceedings of IEEE Workshop on Information Assurance, pp. 133–139 (2006) Google Scholar
  6. 6.
    Farid, H.: Image forgery detection. IEEE Sign. Proc. Mag. 26(2), 16–25 (2009)CrossRefGoogle Scholar
  7. 7.
    Gottschalk, L., Liu, J., Dathan, B., Fitzgerald, S., Stein, M.: Computer forensics programs in higher education: a preliminary study. ACM SIGCSE Bull. 37(1), 147–151 (2005)CrossRefGoogle Scholar
  8. 8.
    Kim, H.J., Lim, S., Kim, B., Jung, E.S.: A new approach to photography forensics using 3D analysis for correcting perception errors: a case study. In: Proceedings of ACM Workshop on Surreal Media and Virtual Cloning, pp. 27–30 (2010)Google Scholar
  9. 9.
    Lang, A., Bashir, M., Campbell, R., de Stefano, L.: Developing a new digital forensics curriculum. Digit. Investig. 11, s76–s84 (2014)CrossRefGoogle Scholar
  10. 10.
    Leung, W.S.: Cheap latex, high-end thrills: a fantasy exercise in search and seizure. In: Liebenberg, J., Gruner, S. (eds.) SACLA 2017. CCIS, vol. 730, pp. 265–277. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-69670-6_19CrossRefGoogle Scholar
  11. 11.
    Marturana, F., Me, G., Berte, R., Tacconi, S.: A quantitative approach to triaging in mobile forensics. In: Proceedings of the IEEE TrustCom 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 582–588 (2011)Google Scholar
  12. 12.
    Olivier, M., Gruner, S.: On the scientific maturity of digital forensics research. In: Peterson, G., Shenoi, S. (eds.) DigitalForensics 2013. IAICT, vol. 410, pp. 33–49. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-41148-9_3CrossRefGoogle Scholar
  13. 13.
    Reith, M., Carr, C., Gunsch, G.: An examination of digital forensic models. Int. J. Digit. Evid. 1(3), 1–12 (2002)Google Scholar
  14. 14.
    Stenvert, M., Brown, I.: Qualifications and skill levels of digital forensics practitioners in South Africa: an exploratory study. In: Kabanda, S., Suleman, H., Gruner, S. (eds.) SACLA 2018. CCIS, vol. 963, pp. 345–361. Springer, Cham (2019).  https://doi.org/10.1007/978-3-030-05813-5_23CrossRefGoogle Scholar
  15. 15.
    Wu, D., Fulmer, J., Johnson, S.: Teaching information security with virtual laboratories. In: Carroll, J.M. (ed.) Innovative Practices in Teaching Information Sciences and Technology: Experience Reports and Reflections, pp. 179–192. Springer, Cham (2014).  https://doi.org/10.1007/978-3-319-03656-4_16CrossRefGoogle Scholar
  16. 16.
    Zawoad, S., Hasan, R.: Cloud forensics: a meta-study of challenges, approaches, and open problems. Technical report, arXiv:1302.6312 (2013)

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Information SystemsUniversity of Cape TownCape TownSouth Africa
  2. 2.Digital Forensics and E-Discovery Research UnitLeiden University of Applied SciencesLeidenThe Netherlands

Personalised recommendations