Exploring the learning efficacy of digital forensics concepts and bagging & tagging of digital devices in immersive virtual reality

C Hassenfeldt, J Jacques, I Baggili - Forensic Science International: Digital …, 2020 - Elsevier
This work presents the first account of evaluating learning inside a VR experience created to
teach Digital Forensics (DF) concepts, and a hands-on laboratory exercise in Bagging & …

[HTML][HTML] What do incident response practitioners need to know? A skillmap for the years ahead

R Hranický, F Breitinger, O Ryšavý, J Sheppard… - Forensic Science …, 2021 - Elsevier
Digital forensics incident response (DFIR) specialists are expected to possess
multidisciplinary skills including expert knowledge of computer-related principles and …

MAC protocol adaptation in cognitive radio networks: An experimental study

KC Huang, X Jing… - 2009 Proceedings of 18th …, 2009 - ieeexplore.ieee.org
This paper presents an adaptive MAC (AMAC) protocol for supporting MAC layer adaptation
in cognitive radio networks. MAC protocol adaptation is motivated by the flexibility of …

[PDF][PDF] Toward the integration of big data into forensic accounting education

Z Rezaee, J Wang, B Lam - … of Forensic and …, 2018 - nacva.com.s3.amazonaws.com
Information technology (IT) advances (eg, cloud computing, electronic social media,
analytics) in the recent decades provide organizations of all types and sizes with an …

Online education in computer and digital forensics: A case study

GC Kessler - … 40th Annual Hawaii International Conference on …, 2007 - ieeexplore.ieee.org
Computer forensics is a relatively new, but growing, field of study at the undergraduate
college and university level. This paper describes some of the course design aspects of …

On the development of a digital forensics curriculum

M Tu, D Xu, S Wira, C Balan… - Journal of Digital …, 2012 - commons.erau.edu
Computer Crime and computer related incidents continue their prevalence and frequency,
resulting in losses approaching billions of dollars. To fight against these crimes and frauds, it …

A comparative study of forensic science and computer forensics

R Hankins, T Uehara, J Liu - 2009 Third IEEE International …, 2009 - ieeexplore.ieee.org
As the Internet has reached every corner of the world as well as every aspect of our life,
illegal activities go with it as well. In dealing with this phenomenon, a new professional and …

[PDF][PDF] Determinants of cyber fraud investigation in Nigeria

SO Abu, OM Lateef, J Echobu - Accounting and taxation review, 2018 - zbw.eu
This paper examines the determinants of cyber fraud investigation in Nigeria. The use of
computer and internet technology in recent times has evolved electronic financial …

Forensics education: Assessment and measures of excellence

C Taylor, B Endicott-Popovsky… - … Workshop on Systematic …, 2007 - ieeexplore.ieee.org
In this paper we assess current academic and certificate based education and training
programs in digital forensics education. Strong interest in the digital forensics field has led to …

Project design and implementation for digital forensics education

X Wang, Y Bai, B Goda - Proceedings of the 20th Annual SIG …, 2019 - dl.acm.org
As with other disciplines in cybersecurity, hands-on activities are an important component in
digital forensics education to help students gain better understanding of basic concepts and …