{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:44:42Z","timestamp":1772163882247,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,2,23]],"date-time":"2005-02-23T00:00:00Z","timestamp":1109116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,2,23]]},"DOI":"10.1145\/1047344.1047403","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T04:31:47Z","timestamp":1123043507000},"page":"147-151","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Computer forensics programs in higher education"],"prefix":"10.1145","author":[{"given":"Larry","family":"Gottschalk","sequence":"first","affiliation":[{"name":"Metropolitan State University, St. Paul, MN"}]},{"given":"Jigang","family":"Liu","sequence":"additional","affiliation":[{"name":"Metropolitan State University, St. Paul, MN"}]},{"given":"Brahma","family":"Dathan","sequence":"additional","affiliation":[{"name":"Metropolitan State University, St. Paul, MN"}]},{"given":"Sue","family":"Fitzgerald","sequence":"additional","affiliation":[{"name":"Metropolitan State University, St. Paul, MN"}]},{"given":"Michael","family":"Stein","sequence":"additional","affiliation":[{"name":"Metropolitan State University, St. Paul, MN"}]}],"member":"320","published-online":{"date-parts":[[2005,2,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Pinkerton Consulting & Investigations","author":"Computer Forensics","year":"2001","unstructured":"Computer Forensics & Electronic Discovery : The Corporate Security Guide for Recovering Electronic Digital Evidence , Pinkerton Consulting & Investigations , 2001 . Computer Forensics & Electronic Discovery: The Corporate Security Guide for Recovering Electronic Digital Evidence, Pinkerton Consulting & Investigations, 2001."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/859670.859687"},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/www.blueridge.edu\/ContinuingEducation\/Programs\/CyberCrimeInvest.htm.  http:\/\/www.blueridge.edu\/ContinuingEducation\/Programs\/CyberCrimeInvest.htm."},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/cte.bridgew.edu\/certifications\/cdfe.cfm  http:\/\/cte.bridgew.edu\/certifications\/cdfe.cfm"},{"key":"e_1_3_2_1_5_1","unstructured":"http:\/\/programs.bcit.ca\/845CBTECH.  http:\/\/programs.bcit.ca\/845CBTECH."},{"key":"e_1_3_2_1_6_1","unstructured":"http:\/\/web.bryant.edu\/ edc\/forensics.htm  http:\/\/web.bryant.edu\/ edc\/forensics.htm"},{"key":"e_1_3_2_1_7_1","unstructured":"http:\/\/www.bc3.edu\/academics\/technology\/compforensics.htm.  http:\/\/www.bc3.edu\/academics\/technology\/compforensics.htm."},{"key":"e_1_3_2_1_8_1","unstructured":"http:\/\/www.canyoncollege.edu\/lawenforce.htm.  http:\/\/www.canyoncollege.edu\/lawenforce.htm."},{"key":"e_1_3_2_1_9_1","unstructured":"http:\/\/digitalforensics.champlain.edu.  http:\/\/digitalforensics.champlain.edu."},{"key":"e_1_3_2_1_10_1","unstructured":"http:\/\/a-s.clayton.edu\/cj\/curriculum%20-%20overview.htm.  http:\/\/a-s.clayton.edu\/cj\/curriculum%20-%20overview.htm."},{"key":"e_1_3_2_1_11_1","unstructured":"http:\/\/www.curry.edu\/Academics\/Continuing+Education\/Certificate+Programs\/Computer+Crime+Investigations+and+Computer+Forensics.htm.  http:\/\/www.curry.edu\/Academics\/Continuing+Education\/Certificate+Programs\/Computer+Crime+Investigations+and+Computer+Forensics.htm."},{"key":"e_1_3_2_1_12_1","unstructured":"http:\/\/www.gwu.edu\/ mastergw\/programs\/com_fraud\/.)  http:\/\/www.gwu.edu\/ mastergw\/programs\/com_fraud\/.)"},{"key":"e_1_3_2_1_13_1","unstructured":"http:\/\/www.icmschool.com\/business-medical-careers-criminal-justice-cybercrime.html.  http:\/\/www.icmschool.com\/business-medical-careers-criminal-justice-cybercrime.html."},{"key":"e_1_3_2_1_14_1","volume-title":"Computer Forensics: An Emerging Practice in the Battle Against Cyber Crime","author":"Isner J.","year":"2003","unstructured":"Isner , J. Computer Forensics: An Emerging Practice in the Battle Against Cyber Crime , SANS Institute , Bethesda, Maryland . 2003 . Isner, J. Computer Forensics: An Emerging Practice in the Battle Against Cyber Crime, SANS Institute, Bethesda, Maryland. 2003."},{"key":"e_1_3_2_1_15_1","unstructured":"http:\/\/www.jjay.cuny.edu\/programsGraduate\/progGraduateForensicComputing.asp.  http:\/\/www.jjay.cuny.edu\/programsGraduate\/progGraduateForensicComputing.asp."},{"key":"e_1_3_2_1_16_1","unstructured":"http:\/\/www.kennesaw.edu\/coned\/sci\/index.htm  http:\/\/www.kennesaw.edu\/coned\/sci\/index.htm"},{"key":"e_1_3_2_1_17_1","volume-title":"Security Bulletin","author":"Kruse W.","year":"2004","unstructured":"Kruse , W. and Heiser , J . What Exactly is Computer Forensics ? Security Bulletin , July 2004 . Hong Kong CERT\/CC, 1--7. Kruse, W. and Heiser, J. What Exactly is Computer Forensics? Security Bulletin, July 2004. Hong Kong CERT\/CC, 1--7."},{"key":"e_1_3_2_1_18_1","unstructured":"http:\/\/www.lwtc.ctc.edu\/future\/programs\/list\/cfor.htm.  http:\/\/www.lwtc.ctc.edu\/future\/programs\/list\/cfor.htm."},{"key":"e_1_3_2_1_19_1","volume-title":"Dec. 6","author":"Lang D.","year":"1999","unstructured":"Lang , D. Design and Development of a Distance Education Paradigm for Training Computer Forensics Examiners: A Limited Review of Literature , Dec. 6 , 1999 , http:\/\/www.computerteacher.org\/CFLR.htm. Lang, D. Design and Development of a Distance Education Paradigm for Training Computer Forensics Examiners: A Limited Review of Literature, Dec. 6, 1999, http:\/\/www.computerteacher.org\/CFLR.htm."},{"key":"e_1_3_2_1_20_1","unstructured":"http:\/\/www.lccc.edu\/academics\/credit\/computer-forensics-aas.asp.  http:\/\/www.lccc.edu\/academics\/credit\/computer-forensics-aas.asp."},{"key":"e_1_3_2_1_21_1","unstructured":"http:\/\/www.bus.oregonstate.edu\/services\/nti.htm.  http:\/\/www.bus.oregonstate.edu\/services\/nti.htm."},{"key":"e_1_3_2_1_22_1","unstructured":"http:\/\/www.polk.edu\/INSTRUCT\/wfd\/ips\/programscoursedescriptions.htm.  http:\/\/www.polk.edu\/INSTRUCT\/wfd\/ips\/programscoursedescriptions.htm."},{"key":"e_1_3_2_1_23_1","unstructured":"http:\/\/www.southwest.cc.nc.us\/acadprog\/cct.htm.  http:\/\/www.southwest.cc.nc.us\/acadprog\/cct.htm."},{"key":"e_1_3_2_1_24_1","unstructured":"http:\/\/tech.spokanefalls.edu\/InfoSys\/default.asp?menu=2&page=CertForensics.  http:\/\/tech.spokanefalls.edu\/InfoSys\/default.asp?menu=2&page=CertForensics."},{"key":"e_1_3_2_1_25_1","unstructured":"St. Petersburg College Florida http:\/\/www.spcollege.edu\/webcentral\/acad\/compcrime.htm.  St. Petersburg College Florida http:\/\/www.spcollege.edu\/webcentral\/acad\/compcrime.htm."},{"key":"e_1_3_2_1_26_1","unstructured":"http:\/\/www.starkstate.edu\/ACADEMICS\/it_tech\/compnetadmin_secur.htm.  http:\/\/www.starkstate.edu\/ACADEMICS\/it_tech\/compnetadmin_secur.htm."},{"key":"e_1_3_2_1_27_1","unstructured":"http:\/\/www.sunytccc.edu\/academic\/forensic\/main.asp.  http:\/\/www.sunytccc.edu\/academic\/forensic\/main.asp."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/947121.947180"},{"key":"e_1_3_2_1_29_1","unstructured":"http:\/\/www.graduate.ucf.edu\/currentGradCatalog\/content\/degrees\/ACAD_PROG_71.cfm  http:\/\/www.graduate.ucf.edu\/currentGradCatalog\/content\/degrees\/ACAD_PROG_71.cfm"},{"key":"e_1_3_2_1_30_1","unstructured":"http:\/\/www.newhaven.edu\/psps\/gradforensicscience.html.  http:\/\/www.newhaven.edu\/psps\/gradforensicscience.html."},{"key":"e_1_3_2_1_31_1","unstructured":"http:\/\/www.extension.washington.edu\/ext\/certificates\/cpf\/cpf_gen.asp.  http:\/\/www.extension.washington.edu\/ext\/certificates\/cpf\/cpf_gen.asp."},{"key":"e_1_3_2_1_32_1","unstructured":"http:\/\/www.ecii.edu\/edu_eci.html  http:\/\/www.ecii.edu\/edu_eci.html"},{"key":"e_1_3_2_1_33_1","unstructured":"http:\/\/www.lcsee.cemr.wvu.edu\/forensics\/.  http:\/\/www.lcsee.cemr.wvu.edu\/forensics\/."},{"key":"e_1_3_2_1_34_1","unstructured":"http:\/\/wright.ccc.edu\/department\/forensics\/index.asp.  http:\/\/wright.ccc.edu\/department\/forensics\/index.asp."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219052"}],"event":{"name":"SIGCSE05: Technical Symposium on Computer Science Education","location":"St. Louis Missouri USA","acronym":"SIGCSE05","sponsor":["ACM Association for Computing Machinery","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 36th SIGCSE technical symposium on Computer science education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1047344.1047403","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1047344.1047403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:07:47Z","timestamp":1750248467000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1047344.1047403"}},"subtitle":["a preliminary study"],"short-title":[],"issued":{"date-parts":[[2005,2,23]]},"references-count":35,"alternative-id":["10.1145\/1047344.1047403","10.1145\/1047344"],"URL":"https:\/\/doi.org\/10.1145\/1047344.1047403","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1047124.1047403","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2005,2,23]]},"assertion":[{"value":"2005-02-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}