{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T15:17:54Z","timestamp":1771082274492,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000138","name":"U.S. Department of Education","doi-asserted-by":"publisher","award":["P120A080094"],"award-info":[{"award-number":["P120A080094"]}],"id":[{"id":"10.13039\/100000138","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1145\/1940941.1940956","type":"proceedings-article","created":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T13:21:09Z","timestamp":1297171269000},"page":"52-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Designing a computer forensics concentration for cross-disciplinary undergraduate students"],"prefix":"10.1145","author":[{"given":"Hongmei","family":"Chi","sequence":"first","affiliation":[{"name":"Florida A&amp;M University, Tallahassee, FL"}]},{"given":"Felecia","family":"Dix-Richardson","sequence":"additional","affiliation":[{"name":"Florida A&amp;M University, Tallahassee, FL"}]},{"given":"Deidre","family":"Evans","sequence":"additional","affiliation":[{"name":"Florida A&amp;M University, Tallahassee, FL"}]}],"member":"320","published-online":{"date-parts":[[2010,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the Tenth Conference on Australasian Computing Education -","volume":"78","author":"Bem D.","year":"2008","unstructured":"Bem , D. and Huebner , E . 2008. Computer forensics workshop for undergraduate students . In Proceedings of the Tenth Conference on Australasian Computing Education - Volume 78 (Wollongong, NSW, Australia, January 01--01 , 2008 ). S. Hamilton and M. Hamilton, Eds. Conferences in Research and Practice in Information Technology Series, vol. 315. Australian Computer Society, Darlinghurst, Australia, 29--33. Bem, D. and Huebner, E. 2008. Computer forensics workshop for undergraduate students. In Proceedings of the Tenth Conference on Australasian Computing Education - Volume 78 (Wollongong, NSW, Australia, January 01--01, 2008). S. Hamilton and M. Hamilton, Eds. Conferences in Research and Practice in Information Technology Series, vol. 315. Australian Computer Society, Darlinghurst, Australia, 29--33."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1121341.1121352"},{"key":"e_1_3_2_1_3_1","first-page":"6","article-title":"Using the DC3 forensic challenge as a basis for a special topics digital forensics upper level undergraduate course","volume":"23","author":"Collins D.","year":"2008","unstructured":"Collins , D. and McGuire , T. 2008 . Using the DC3 forensic challenge as a basis for a special topics digital forensics upper level undergraduate course . J. Comput. Small Coll. 23 , 6 (Jun. 2008), 8--14. Collins, D. and McGuire, T. 2008. Using the DC3 forensic challenge as a basis for a special topics digital forensics upper level undergraduate course. J. Comput. Small Coll. 23, 6 (Jun. 2008), 8--14.","journal-title":"J. Comput. Small Coll."},{"key":"e_1_3_2_1_4_1","first-page":"4","article-title":"Computer forensics: a critical need in computer science programs","volume":"20","author":"Fernandez J. D.","year":"2005","unstructured":"Fernandez , J. D. , Smith , S. , Garcia , M. , and Kar , D. 2005 . Computer forensics: a critical need in computer science programs . J. Comput. Small Coll. 20 , 4 (Apr. 2005), 315--322. Fernandez, J. D., Smith, S., Garcia, M., and Kar, D. 2005. Computer forensics: a critical need in computer science programs. J. Comput. Small Coll. 20, 4 (Apr. 2005), 315--322.","journal-title":"J. Comput. Small Coll."},{"key":"e_1_3_2_1_5_1","first-page":"4","article-title":"A computer forensics minor curriculum proposal","volume":"22","author":"Figg W.","year":"2007","unstructured":"Figg , W. and Zhou , Z. 2007 . A computer forensics minor curriculum proposal . J. Comput. Small Coll. 22 , 4 (Apr. 2007), 32--38. Figg, W. and Zhou, Z. 2007. A computer forensics minor curriculum proposal. J. Comput. Small Coll. 22, 4 (Apr. 2007), 32--38.","journal-title":"J. Comput. Small Coll."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047124.1047403"},{"key":"e_1_3_2_1_7_1","first-page":"6","article-title":"An interdisciplinary accounting forensics course to improve computer science enrollments","volume":"23","author":"Herath S.","year":"2008","unstructured":"Herath , S. , Herath , A. , Kachur , R. , and Herath , S. 2008 . An interdisciplinary accounting forensics course to improve computer science enrollments . J. Comput. Small Coll. 23 , 6 (Jun. 2008), 74--81. Herath, S., Herath, A., Kachur, R., and Herath, S. 2008. An interdisciplinary accounting forensics course to improve computer science enrollments. J. Comput. Small Coll. 23, 6 (Jun. 2008), 74--81.","journal-title":"J. Comput. Small Coll."},{"key":"e_1_3_2_1_8_1","first-page":"3","article-title":"Implementing a baccalaureate program in computer forensics","volume":"25","author":"Liu J.","year":"2010","unstructured":"Liu , J. 2010 . Implementing a baccalaureate program in computer forensics . J. Comput. Small Coll. 25 , 3 (Jan. 2010), 101--109. Liu, J. 2010. Implementing a baccalaureate program in computer forensics. J. Comput. Small Coll. 25, 3 (Jan. 2010), 101--109.","journal-title":"J. Comput. Small Coll."},{"key":"e_1_3_2_1_9_1","first-page":"2","article-title":"Issues in the development of a digital forensics curriculum","volume":"22","author":"McGuire T. J.","year":"2006","unstructured":"McGuire , T. J. and Murff , K. N. 2006 . Issues in the development of a digital forensics curriculum . J. Comput. Small Coll. 22 , 2 (Dec. 2006), 274--280. McGuire, T. J. and Murff, K. N. 2006. Issues in the development of a digital forensics curriculum. J. Comput. Small Coll. 22, 2 (Dec. 2006), 274--280.","journal-title":"J. Comput. Small Coll."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368506.1368512"},{"key":"e_1_3_2_1_11_1","volume-title":"Journal of Applied Security Research","volume":"3","author":"Peterson R. A.","unstructured":"G. L. Peterson , R. A. Raines , and R. O. Baldwin , Digital Forensics Educational Needs in the Miami Valley Region , Journal of Applied Security Research , Vol. 3 , No. 3\/4, June 2008, pp. 429--439. G. L. Peterson, R. A. Raines, and R. O. Baldwin, Digital Forensics Educational Needs in the Miami Valley Region, Journal of Applied Security Research, Vol. 3, No. 3\/4, June 2008, pp. 429--439."},{"key":"e_1_3_2_1_12_1","volume-title":"Teaching information systems security courses: A hands-on approach. Computers &amp","author":"Sharma S. K.","unstructured":"Sharma , S. K. &amp; Sefchek , J. , 2007. Teaching information systems security courses: A hands-on approach. Computers &amp ; Security , 26, 290--299. Sharma, S. K. &amp; Sefchek, J., 2007. Teaching information systems security courses: A hands-on approach. Computers &amp; Security, 26, 290--299."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107622.1107641"},{"key":"e_1_3_2_1_14_1","first-page":"4","article-title":"A certificate program in computer forensics","volume":"24","author":"Wassenaar D.","year":"2009","unstructured":"Wassenaar , D. , Woo , D. , and Wu , P. 2009 . A certificate program in computer forensics . J. Comput. Small Coll. 24 , 4 (Apr. 2009), 158--167. Wassenaar, D., Woo, D., and Wu, P. 2009. A certificate program in computer forensics. J. Comput. Small Coll. 24, 4 (Apr. 2009), 158--167.","journal-title":"J. Comput. Small Coll."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219052"},{"key":"e_1_3_2_1_16_1","unstructured":"Maxwell R. Building a Virtual Digital Forensics Lab http:\/\/www.educause.edu\/Resources\/BuildingaVirtualDigitalForensi\/170542  Maxwell R. Building a Virtual Digital Forensics Lab http:\/\/www.educause.edu\/Resources\/BuildingaVirtualDigitalForensi\/170542"},{"key":"e_1_3_2_1_17_1","unstructured":"EnCase http:\/\/www.guidancesoftware.com\/  EnCase http:\/\/www.guidancesoftware.com\/"},{"key":"e_1_3_2_1_18_1","unstructured":"FTK (Forensic Toolkit) http:\/\/www.accessdata.com\/  FTK (Forensic Toolkit) http:\/\/www.accessdata.com\/"},{"key":"e_1_3_2_1_19_1","unstructured":"NIST Computer Forensic Tool Testing Program http:\/\/www.cftt.nist.gov\/  NIST Computer Forensic Tool Testing Program http:\/\/www.cftt.nist.gov\/"},{"key":"e_1_3_2_1_20_1","unstructured":"The Electronic Evidence Information Center http:\/\/www.e-evidence.info\/education.html  The Electronic Evidence Information Center http:\/\/www.e-evidence.info\/education.html"},{"key":"e_1_3_2_1_21_1","unstructured":"http:\/\/www.cnn.com\/2010\/CRIME\/05\/07\/craigslist.diamond.killing\/index.html  http:\/\/www.cnn.com\/2010\/CRIME\/05\/07\/craigslist.diamond.killing\/index.html"},{"key":"e_1_3_2_1_22_1","volume-title":"John Jay College of Criminal Justice","author":"Master","year":"2010","unstructured":"Master of Science Program in Forensic Computing , John Jay College of Criminal Justice , The City University of New York , New York City, New York, retrieved May 24, 2010 , http:\/\/web.jjay.cuny.edu\/~forensiccomputing\/ Master of Science Program in Forensic Computing, John Jay College of Criminal Justice, The City University of New York, New York City, New York, retrieved May 24, 2010, http:\/\/web.jjay.cuny.edu\/~forensiccomputing\/"},{"key":"e_1_3_2_1_23_1","volume-title":"retrieved","year":"2010","unstructured":"2000 DOJ statistics , retrieved May 24, 2010 , http:\/\/www.ojp.gov\/bjs\/abstract\/csllea00.htm 2000 DOJ statistics, retrieved May 24, 2010, http:\/\/www.ojp.gov\/bjs\/abstract\/csllea00.htm"},{"key":"e_1_3_2_1_24_1","first-page":"3","article-title":"Making CS0 fun: an active learning approach using toys, games and Alice. J. Computing","volume":"23","author":"Anewalt K.","year":"2008","unstructured":"Anewalt , K. 2008 . Making CS0 fun: an active learning approach using toys, games and Alice. J. Computing in. Small Colleges 23 , 3 (Jan. 2008), 98--105 Anewalt, K. 2008. Making CS0 fun: an active learning approach using toys, games and Alice. J. Computing in. Small Colleges 23, 3 (Jan. 2008), 98--105","journal-title":"Small Colleges"},{"key":"e_1_3_2_1_25_1","volume-title":"Computer Forensics-Principles &amp","author":"Volonino L","year":"2007","unstructured":"Volonino , L , Anzaldua , Rand Godwin, J. Computer Forensics-Principles &amp ; Practices, Prentice Hall , 2007 Volonino, L, Anzaldua, Rand Godwin, J. Computer Forensics-Principles &amp; Practices, Prentice Hall, 2007"},{"key":"e_1_3_2_1_26_1","series-title":"Spring 2002","volume-title":"International Journal of Digital Evidence 1, 1","author":"Whitcomb C.","unstructured":"Whitcomb , C. An Historical Perspective of Digital Evidence: A Forensic Scientist's View . International Journal of Digital Evidence 1, 1 ( Spring 2002 ) Whitcomb, C. An Historical Perspective of Digital Evidence: A Forensic Scientist's View. International Journal of Digital Evidence 1, 1 (Spring 2002)"}],"event":{"name":"InfoSecCD '10: 2010 Information Security Curriculum Development Conference","location":"Kennesaw Georgia","acronym":"InfoSecCD '10","sponsor":["KSU - CISE KSU Center for InfoSec Education","ISSA The Metro Atlanta Information Systems Security Association","SIGMIS ACM Special Interest Group on Management Information Systems"]},"container-title":["2010 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940956","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1940941.1940956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:50Z","timestamp":1750249070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940956"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":26,"alternative-id":["10.1145\/1940941.1940956","10.1145\/1940941"],"URL":"https:\/\/doi.org\/10.1145\/1940941.1940956","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]},"assertion":[{"value":"2010-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}