{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T23:57:37Z","timestamp":1704499057545},"reference-count":30,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T00:00:00Z","timestamp":1251763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Digital Investigation"],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1016\/j.diin.2009.05.002","type":"journal-article","created":{"date-parts":[[2009,7,8]],"date-time":"2009-07-08T10:18:00Z","timestamp":1247048280000},"page":"82-90","source":"Crossref","is-referenced-by-count":19,"title":["Digital Investigation as a distinct discipline: A pedagogic perspective"],"prefix":"10.1016","volume":"6","author":[{"given":"A.D.","family":"Irons","sequence":"first","affiliation":[]},{"given":"P.","family":"Stephens","sequence":"additional","affiliation":[]},{"given":"R.I.","family":"Ferguson","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.diin.2009.05.002_bib2","unstructured":"Armstrong C, Jayaratna N. Teaching computer forensics, uniting practice with intellect. In: Proceedings of the 8th colloquium for information systems security education. West Point New York, June 2004."},{"key":"10.1016\/j.diin.2009.05.002_bib43","unstructured":"Association of Chief Police Officers. Good Practice Guide for Computer Based Electronic Evidence, version 3, London; 2003."},{"key":"10.1016\/j.diin.2009.05.002_bib44","unstructured":"Association of Chief Police Officers. Good Practice Guide for Computer Based Electronic Evidence, version 4, London; 2007."},{"issue":"11","key":"10.1016\/j.diin.2009.05.002_bib3","doi-asserted-by":"crossref","DOI":"10.1145\/581571.581603","article-title":"Texas licensing of software engineers: all's quiet for now","volume":"45","author":"Bagert","year":"2002","journal-title":"Communications of the ACM"},{"issue":"8","key":"10.1016\/j.diin.2009.05.002_bib4","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/859670.859687","article-title":"The discipline of internet forensics","volume":"46","author":"Berghel","year":"2003","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.diin.2009.05.002_bib5","series-title":"Digital evidence and computer crime: forensic science, computers and the Internet","author":"Casey","year":"2004"},{"key":"10.1016\/j.diin.2009.05.002_bib8","doi-asserted-by":"crossref","unstructured":"Cooper P. Speciation in the computing sciences: digital forensics as an emerging academic discipline. In: Proceedings of the 2nd annual conference on Information security curriculum development InfoSecCD '05. Kennesaw, GA; 2005.","DOI":"10.1145\/1107622.1107628"},{"key":"10.1016\/j.diin.2009.05.002_bib9","unstructured":"Crane WN. High tech crime training: a model outline and how it maps to academic programmes. In: Proceedings of the 1st international Conference on Cybercrime Education and Training (CFET 2007), Canterbury Christ Church University, Canterbury, United Kingdom, September 6\u20137, 2007."},{"key":"10.1016\/j.diin.2009.05.002_bib12","unstructured":"Dornseif M, Gaertner F, Mink M, Pimenidis L. Teaching data security at university degree level. In: Paper presented at Graduiertenkolleg 643, RWTH Aachen; 2004. Available at: http:\/\/pi1.informatik.uni-mannheim.de\/presentations\/show\/teaching-data-security-at-university-degree-level [accessed 07.06]."},{"key":"10.1016\/j.diin.2009.05.002_bib42","unstructured":"Edgar-Nevill, D. \u2018Proposal to the BCS Specialist Groups Executive Committee for a Cybercrime Forensics Specialist Group\u2019, 26th September 2008."},{"issue":"4","key":"10.1016\/j.diin.2009.05.002_bib15","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.diin.2005.11.003","article-title":"Forensics \u2013 cred or crud","volume":"2","author":"Everett","year":"2005","journal-title":"Digital Investigation"},{"key":"10.1016\/j.diin.2009.05.002_bib16","series-title":"Network forensics: tapping the internet","author":"Garfinkel","year":"2002"},{"key":"10.1016\/j.diin.2009.05.002_bib17","doi-asserted-by":"crossref","unstructured":"Gottschalk L, Liu J, Datham B, Fitzgerland S, Stein M. Computer forensics programmes in higher education: a preliminary study. In: Proceedings of ACM SIGCSE Conference, February 2005. St. Louis, Missouri; 2005. p. 147\u201351.","DOI":"10.1145\/1047124.1047403"},{"issue":"2","key":"10.1016\/j.diin.2009.05.002_bib18","first-page":"65","article-title":"A professionalism in digital forensics","volume":"4","author":"Irons","year":"2007","journal-title":"Digital Evidence Journal"},{"key":"10.1016\/j.diin.2009.05.002_bib19","unstructured":"Irons AD, Laing C, Anderson P. Pedagogic innovation in teaching computer forensics. In: Paper presented at 7th annual HE academy conference for subject centre for Information and computer sciences. Trinity College, Dublin, 29th\u201331st August 2006."},{"key":"10.1016\/j.diin.2009.05.002_bib20","series-title":"Internet forensics","author":"Jones","year":"2005"},{"issue":"11","key":"10.1016\/j.diin.2009.05.002_bib23","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/581571.581601","article-title":"Should software engineers be licensed","volume":"45","author":"Knight","year":"2002","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.diin.2009.05.002_bib24","series-title":"Grand challenges in computing: education","author":"McGettrick","year":"2004"},{"key":"10.1016\/j.diin.2009.05.002_bib26","article-title":"What is forensic computing?","volume":"vol. 118","author":"McKemmish","year":"1999"},{"issue":"12","key":"10.1016\/j.diin.2009.05.002_bib27","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/1101779.1101796","article-title":"Challenges in forensic computing","volume":"48","author":"Mercuri","year":"2005","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.diin.2009.05.002_bib30","series-title":"Academic standards \u2013 computing","author":"QAA","year":"2000"},{"key":"10.1016\/j.diin.2009.05.002_bib31","series-title":"Academic standards \u2013 computing","author":"QAA","year":"2007"},{"issue":"65","key":"10.1016\/j.diin.2009.05.002_bib33","article-title":"Computer forensics: science or fad","volume":"5","author":"Rogers","year":"2003","journal-title":"Security Wire Digest"},{"key":"10.1016\/j.diin.2009.05.002_bib32","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.cose.2004.01.003","article-title":"The future of computer forensics: a needs analysis survey","volume":"23","author":"Rogers","year":"2004","journal-title":"Computers and Security"},{"key":"10.1016\/j.diin.2009.05.002_bib34","series-title":"Software forensics: collecting evidence from the scene of a digital crime","author":"Slade","year":"2004"},{"key":"10.1016\/j.diin.2009.05.002_bib35","doi-asserted-by":"crossref","unstructured":"Soe LL, Manson D, Wright M. Establishing network computer forensics classes. In: Proceedings of the 1st annual conference on Information security curriculum development. ACM Press; 2004. p. 76\u201381.","DOI":"10.1145\/1059524.1059540"},{"key":"10.1016\/j.diin.2009.05.002_bib38","unstructured":"Stephens P. Cybercrime training versus computer forensics education. In: Proceedings of the 1st International Conference on Cybercrime Education and Training (CFET 2007): Canterbury Christ Church University, September 6\u20137, 2007, Canterbury, United Kingdom; 2007a. ISBN: 1899253-041."},{"key":"10.1016\/j.diin.2009.05.002_bib39","unstructured":"Stephens P. Should training be part of an educational computer forensics programme?. In: Paper presented at the 3rd Higher Education Academy (HEA) ICS Workshop on Teaching Computer Forensics, Newcastle, November 2007b. Available at: http:\/\/www.ics.heacademy.ac.uk\/events\/presentations\/720_Northumbria_2007_Stephens_Presentation.pdf (visited September 2008)."},{"key":"10.1016\/j.diin.2009.05.002_bib40","doi-asserted-by":"crossref","unstructured":"Troell L, Pan Y, Stackpole B. Forensic course development. In: Conference proceedings of ACM CITC4 \u201903, October 2003, Lafyette, Indiana; 2003. p. 265\u201369.","DOI":"10.1145\/947121.947180"},{"issue":"4","key":"10.1016\/j.diin.2009.05.002_bib41","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/MSECP.2003.1219052","article-title":"Computer forensics education","volume":"1","author":"Yasinsac","year":"2003","journal-title":"IEEE Security & Privacy"}],"container-title":["Digital Investigation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287609000309?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287609000309?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T09:06:32Z","timestamp":1558429592000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1742287609000309"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":30,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2009,9]]}},"alternative-id":["S1742287609000309"],"URL":"https:\/\/doi.org\/10.1016\/j.diin.2009.05.002","relation":{},"ISSN":["1742-2876"],"issn-type":[{"value":"1742-2876","type":"print"}],"subject":[],"published":{"date-parts":[[2009,9]]}}}