{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T09:29:44Z","timestamp":1753522184313,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T00:00:00Z","timestamp":1569456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,26]]},"DOI":"10.1145\/3349266.3351402","type":"proceedings-article","created":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T12:17:48Z","timestamp":1569500268000},"page":"33-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Project Design and Implementation for Digital Forensics Education"],"prefix":"10.1145","author":[{"given":"Xinli","family":"Wang","sequence":"first","affiliation":[{"name":"Grand Valley State University, Allendale, MI, USA"}]},{"given":"Yan","family":"Bai","sequence":"additional","affiliation":[{"name":"University of Washington Tacoma, Tacoma, WA, USA"}]},{"given":"Bryan","family":"Goda","sequence":"additional","affiliation":[{"name":"University of Washington Tacoma, Tacoma, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,9,26]]},"reference":[{"volume-title":"Last Accessed in May","year":"2019","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CR.2018.8626819"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.74"},{"volume-title":"Blauw and Wai Sze Leung","year":"2018","author":"Frans","key":"e_1_3_2_1_4_1"},{"edition":"5","volume-title":"Lab Manual for Guide to Computer Forensics and Investigations: Processing Digital Evidence","author":"Blitz Andrew","key":"e_1_3_2_1_5_1"},{"volume-title":"Hex Workshop Web page. Online.","year":"2019","author":"Software BreakPoint","key":"e_1_3_2_1_6_1"},{"volume-title":"The Evolution of Digital Forensics: Civilizing the Cyber Frontier. White Paper. (January","year":"2009","author":"Charters Ian","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1940941.1940956"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.254"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTCS.2017.65"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MP.2005.1594001"},{"key":"e_1_3_2_1_12_1","first-page":"5","article-title":"Digital Forensics Laboratory Projects","volume":"21","author":"Francia Guillermo A","year":"2006","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.002"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.06.016"},{"key":"e_1_3_2_1_15_1","unstructured":"S. E. Goodison R. C. Davis and B. A. Jackson. 2015. Digital Evidence and the U.S. Criminal Justice System: Identifying Technology and Other Needs to More Effectively Acquire and Utilize Digital Evidence. Online. (2015). https:\/\/www.rand.org\/pubs\/research_reports\/RR890.html. Retrieved in May 2019.  S. E. Goodison R. C. Davis and B. A. Jackson. 2015. Digital Evidence and the U.S. Criminal Justice System: Identifying Technology and Other Needs to More Effectively Acquire and Utilize Digital Evidence. Online. (2015). https:\/\/www.rand.org\/pubs\/research_reports\/RR890.html. Retrieved in May 2019."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047124.1047403"},{"key":"e_1_3_2_1_17_1","volume-title":"Digital Archaeology: The Art and Science of Digital Forensics","author":"Graves Michael W.","year":"2014","edition":"1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2009.42"},{"volume-title":"Shumba","year":"2014","author":"Hawthorne Elizabeth K.","key":"e_1_3_2_1_19_1"},{"edition":"1","volume-title":"A Practical Guide to Computer Forensics Investigations","author":"Hayes Darren R.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.05.002"},{"volume-title":"Online Education in Computer and Digital Forensics: A Case Study. In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)","year":"2007","author":"Kessler G. C.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","first-page":"37","article-title":"The Design of an Undergraduate Degree Program in Computer & Digital Forensics","volume":"1","author":"Kessler Gary C.","year":"2006","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2015.16"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2006.322593"},{"key":"e_1_3_2_1_26_1","first-page":"3","article-title":"Implementing a Baccalaureate Program in Computer Forensics","volume":"25","author":"Liu Jigang","year":"2010","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_27_1","first-page":"2","article-title":"An Analysis of the Students' Academic Background in a Computer Forensics Program","volume":"28","author":"Liu Jigang","year":"2012","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2016.7535309"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2978192.2978226"},{"volume-title":"Proceedings of Annual ADFSL Conference on Digital Forensics, Security and Law . 141--146","year":"2007","author":"Liu Jigang","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/1478601X.2016.1170281"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON.2019.8725129"},{"edition":"3","volume-title":"Guide to Computer Forensics and Investigations","author":"Nelson Bill","key":"e_1_3_2_1_33_1"},{"edition":"4","volume-title":"Lab Manual for Nelson\/Phillips\/Steuart's Guide to Computer Forensics and Investigations","author":"Nelson Bill","key":"e_1_3_2_1_34_1"},{"edition":"5","volume-title":"Guide to Computer Forensics and Investigations","author":"Nelson Bill","key":"e_1_3_2_1_35_1"},{"edition":"6","volume-title":"Guide to Computer Forensics and Investigations","author":"Nelson Bill","key":"e_1_3_2_1_36_1"},{"volume-title":"Joshua I. James and Frank Breitinger (Eds.)","author":"Palmer Imani","key":"e_1_3_2_1_37_1"},{"volume-title":"Last Accessed in May","year":"2019","author":"Software PassMark","key":"e_1_3_2_1_38_1"},{"volume-title":"Last Accessed in May","year":"2019","author":"RARLAB.","key":"e_1_3_2_1_39_1"},{"volume-title":"Proceedings of ADFSL Conference on Digital Forensics, Security and Law. 123--130","year":"2010","author":"Riley John H.","key":"e_1_3_2_1_40_1"},{"volume-title":"Last Accessed in May","year":"2019","author":"Web Page Sleuth Kit","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.28945\/1857"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/947121.947180"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029533.1029547"},{"volume-title":"Proceedings of ADFSL Conference on Digital Forensics, Security and Law . 123--134","year":"2011","author":"Woods Kam","key":"e_1_3_2_1_45_1"},{"volume-title":"Hex Editor","year":"2019","key":"e_1_3_2_1_46_1"},{"volume-title":"Data Corpora for Digital Forensics Education and Research. Advances in Digital Forensics X ,","author":"Yannikos Y.","key":"e_1_3_2_1_47_1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219052"}],"event":{"name":"SIGITE '19: The 20th Annual Conference on Information Technology Education","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Tacoma WA USA","acronym":"SIGITE '19"},"container-title":["Proceedings of the 20th Annual SIG Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3349266.3351402","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3349266.3351402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:07Z","timestamp":1750201987000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3349266.3351402"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,26]]},"references-count":48,"alternative-id":["10.1145\/3349266.3351402","10.1145\/3349266"],"URL":"https:\/\/doi.org\/10.1145\/3349266.3351402","relation":{},"subject":[],"published":{"date-parts":[[2019,9,26]]},"assertion":[{"value":"2019-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}