The work about the cybercrime and computer forensics course

被引:0
|
作者
Tang, Ling [1 ]
机构
[1] East China Univ Polit Sci & Law, Dept Informat Sci & Technol, Shanghai, Peoples R China
来源
ICITCE 2015 - 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND CAREER EDUCATION | 2016年 / 25卷
关键词
computer forensics; cybercrime; teaching; research;
D O I
10.1051/shsconf/20162502014
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Currently, along with the maturity and widespread of computer technology and Internet, cybercrime are worsening. Therefore, it not only brings harm to the society, but also brings problems to traditional forensics. So it is very important for the university to develop a related course and train students to deal with information crime and computer forensics. East China University of Politics and Law has set up a college course named cybercrime and computer forensics for undergraduate students for six years and done some researches. Both of them get great achievements.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Applying the Process Assessment Method into Computer Forensics Course in Police Higher Education
    Wang, Ning
    Liu, Zhi-Jun
    2015 2ND INTERNATIONAL CONFERENCE ON EDUCATION AND SOCIAL DEVELOPMENT, ICESD 2015, 2015, : 496 - 501
  • [22] Conception of a course for professional training and education in the field of computer and mobile forensics - Part III: Network Forensics and Penetration Testing
    Kroeger, Knut
    Creutzburg, Reiner
    MOBILE DEVICES AND MULTIMEDIA: ENABLING TECHNOLOGIES, ALGORITHMS, AND APPLICATIONS 2014, 2014, 9030
  • [23] Computer forensics and culture
    Lin, Yi-Chi
    Slay, Jill
    Lin, I. -Long
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 288 - +
  • [24] Advances in Computer Forensics
    Abdullah, Mohd Taufik
    Mahmod, Ramlan
    Ab Ghani, Abdul Azim
    Abdullah, Mohd Zain
    Sultan, Abu Bakar Md
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (02): : 215 - 219
  • [25] An introduction to computer forensics
    Furneaux, Nick
    MEDICINE SCIENCE AND THE LAW, 2006, 46 (03) : 213 - 218
  • [26] EXPERIENCE IN THE DEVELOPMENT OF A COURSE IN CYBERSECURITY AND CYBERCRIME
    Mollar, Manuel
    Chalmeta, Ricardo
    INTED2016: 10TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE, 2016, : 5771 - 5773
  • [27] COMPUTER SIMULATIONS OF COURSE-WORK ASSESSMENT
    HARTLEY, J
    BRANTHWAITE, A
    BULLETIN OF THE BRITISH PSYCHOLOGICAL SOCIETY, 1977, 30 (MAY): : 168 - 168
  • [28] Computer forensics in forensis
    Peisert, Sean
    Bishop, Matt
    Marzullo, Keith
    SADFE 2008: THIRD INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS, 2008, : 102 - +
  • [29] Mastering computer forensics
    Armstrong, CJ
    SECURITY EDUCATION AND CRITICAL INFRASTRUCTURES, 2003, 125 : 151 - 158
  • [30] DNS in Computer Forensics
    Wright, Neil Fowler
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2012, 7 (02) : 11 - 41