2010 Information Security Curriculum Development Conference 2010
DOI: 10.1145/1940941.1940956
|View full text |Cite
|
Sign up to set email alerts
|

Designing a computer forensics concentration for cross-disciplinary undergraduate students

Abstract: In this paper, we design and expand the highly successful Information Assurance (IA) program through education and training opportunities in digital forensics for students in other disciplines, and for local law enforcement professionals. Faculty development efforts will focus on the formation of a rich, lab-based teaching environment for instruction and applied research in digital forensics technology. In this project, two academic departments, Computer & Information Sciences (CIS), and Sociology and Criminal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Furthermore, the Data Protection Act, 2012 known as Act 843 [ 29 ] is legislation created for the protection of individual data and privacy and prescribes punishment for offenders. Just like the coming into force of General Data Protection Regulations (GDPR) for countries of the European Union (EU) in 2018, the Data Protection Act of Ghana provides mechanism to safeguard individuals’ privacy, risk and security and further protect them from unlawful usage of their private data.…”
Section: Existing Legal Infrastructurementioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the Data Protection Act, 2012 known as Act 843 [ 29 ] is legislation created for the protection of individual data and privacy and prescribes punishment for offenders. Just like the coming into force of General Data Protection Regulations (GDPR) for countries of the European Union (EU) in 2018, the Data Protection Act of Ghana provides mechanism to safeguard individuals’ privacy, risk and security and further protect them from unlawful usage of their private data.…”
Section: Existing Legal Infrastructurementioning
confidence: 99%
“… 6 Electronic Communication [ 28 ] (Act 775, 2008) Mandates law enforcement agencies to arrest and prosecute individuals who commit offenses related to the electronic media 7 Mutual Legal Assistance [ 30 ] (Act 807, 2010) Allows Ghana to provide assistance to external entities to locate and identify persons who have committed an offence. 8 Data Protection [ 29 ] (Act 843, 2012) Legislation created for the protection of individual data and privacy and prescribes punishment for offenders 9 Criminal Offenses (Amendment) [ 31 ] (Act 849, 2012) Criminalises the participation in organised crime groups, racketeering and other related crimes …”
Section: Existing Legal Infrastructurementioning
confidence: 99%
“…In addition, a lot of students want to know how the evidence from the computer and the network can be better to guide practice activities, such as the legal professional students interested in electronic data forensics, they can better understand and use electronic data forensics knowledge in the case. However, designing a electronic data forensics course for a variety of professional students is very difficult [10].…”
Section: B Designing a Interdisciplinary Course System Of Electronicmentioning
confidence: 99%
“…There is a particular need for specialists who can lead computer crime investigations [10]. The students who choose to study computer forensics expect to gain deep knowledge and technical skills of computer crime, law, operating systems, examination of storage media, networking, communication protocols, and use of forensic tools.…”
Section: Introductionmentioning
confidence: 99%