Abstract
Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day’s workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the trainees’ Competency Based-Assessment implementation. The study finds that Cyber Forensics training or education has inappropriate trainees’ Competency Based-Assessment below 50%.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Figg, W., Zhou, Z.: computer Forensics Minor Curriculum Proposal, Department of Computer Information Systems. Dakota State University, Madison, SD 57042, portal.acm.org/ft_gateway.cfm?id=1229642&type=pdf (last visit July 10, 2007)
Fernandez, J., Smith, S., Garcia, M., Kar, D.: Computer forensics: a critical need in computer science programs. Journal of Computing Sciences in Colleges, 20(4) (2005), Consortium for Computing Sciences in Colleges
Taylor, C., Endicott-Popovsky, B., Phillips, A.: Forensics Education: Assessment and Measures of Excellence. In: Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2007 (2007)
Venter, J.: Process Flows for Cyber Forensics Training and Operation. Pretoria, South Africa (2006), http://researchspace.csir.co.za/dspace/bitstream/10204/1073/1/Venter_2006.pdf (last visit July 15, 2010)
Pidanick, R.: An Investigation of Computer Forensics. Information System Control Journal vol. 3 (2004), http://www.isaca.org/Journal/Past-Issues/2004/Volume3/Documents/jpdf043-InvestigationofComputerForensics.pdf (last visit August 10 2010)
Hamzah, Z.: E-Security Law & Strategy. Malayan Law Journal Sdn Bhd, 47301 Kelana Jaya Malaysia, KL, ISBN 967-962-632-6
Figg, W., Zhou, Z.: Computer Forensics Minor Curriculum Proposal: Department of Computer Information Systems. Dakota State University, Madison, SD 57042, portal.acm.org/ft_gateway.cfm?id=1229642&type=pdf (2007) (last visit August 20, 2010)
Hopkins, D.: Innovative Corporation Solutions, Inc. (2006), http://www.michigantechnologyleaders.com/../InnovativeNewsImportanceofComputerForensics.pdf (last visit August 20, 2010)
Schroeder, S.C.: How to be a Digital Forensic Expert Witness. In: First International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 69–85 (2005)
Bem, D., Huebner, E.: Computer Forensics Workshop for Undergraduate Students (2008), crpit.com/confpapers/CRPITV78Bem.pdf , (last visit September 10 2010)
Zhijun, L., Ning, W.: Developing a Computer Forensics Program in Police Higher Education. In: ICCSE 2009. 4th International Conference on Computer Science & Education 2009, pp. 1431–1436 (2009)
Lim, S.: Demand up, supply short for forensic professionals Anonymous, p. 5. New Straits Times, Kuala Lumpur (2009)
Nance, K., Armstrong, H., Armstrong, C.: Defining an Education Agenda. In: 43rd Hawaii International Conference on System Sciences, HICSS 2010, pp. 1–10 (2010)
Barbara, J.J.: Certification and Accreditation Overview (2008), http://www.springerlink.com/index/t5852u690qhv5512.pdf , (last visit October 10, 2010)
Sabeil, E., Manaf, A.A., Ismail, Z.: Analysing the Quality Assurance of Trainees Competency Assessment and Accreditation of Cyber Forensic Education/Training Programs. In: ICMLC (2011), the 3rd International Conference on Machine Learning and Computing, Singapore (February 2011)
ILO (CINTERFOR).: What is labour competencies assessment , http://www.ilo.org/public/english/region/ampro/cinterfor/temas/complab/xxxx/31.htm (last visit, January 1, 2011)
Graeme, D.: A Guide to Writing Competency Based Training Materials (2003), http://www.volunteeringaustralia.org/../Revised%20Writers%20Guide%202.pdf (last visit January 3, 2011),
EURIM.: Supplying the Skills for Justice (2004), http://www.eurim.org/consult/e-crime/may_04/ECS_DP3_Skills_040505_web.htm , (last visit, June 10, 2010)
Greatorex, J.: How can NVQ assessors’ judgements be standardised (2003), http://www.cambridgeassessment.org.uk/ca/digitalAssets/113886_How_can_NVQ_Assessors__Judgements_be_Standardised.pdf , (last visit January 3, 2011)
NVQs - national vocational qualifications, http://www.businessballs.com/nvqs_national_vocational_qualifications.htm , ( last visit January 3, 2011),
John, W.: Competency based education and training. British Library Cataloguing in Publication Data Competency based education and training. 1. Competency-based education I. Burke, John 371.3 (2005)
West Virginia University.: The Technical Working Group on Education and Training in Digital Forensics (2007), http://www.ncjrs.gov/pdffiles1/nij/grants/219380.pdf , (last visit, (June 15, 2010)
Liu, Z., Wang: Developing a computer forensics program in police higher education. In: 4th International Conference on Computer Science & Education. ICCSE 2009, pp. 1431–1436 (2009)
Yasinsac, A., et al.: Computer forensics education. Security & Privacy. 1(4), 15–23 (2003)
Larry, G., et al.: Computer forensics programs in higher education: a preliminary study. In: Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education. ACM, New York (2005)
Stephens, P., Induruwa, A.: Cybercrime investigation training and specialist education for the European Union. In: Proceedings - 2nd International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2007, pp. 28–37 (2007), Compendex
McGuire, T., Murff, K.: Issues in the development of a digital forensics Curriculum. Journal of Computing Sciences in Colleges 22(2) (2006), Consortium for Computing Sciences in Colleges
Irons, A.D., et al.: Digital Investigation as a distinct discipline: A pedagogic perspective. Digital Investigation 6(1-2), 82–90 (2009)
Murdoch University.: Cyber Forensics, http://www.murdoch.edu.au/Courses/Cyber-Forensics-Information-Security-and-Management/ (last visit October 15, 2010)
Deakin university.: Bachelor of Information Technology (I.T. Security), http://www.deakin.edu.au/futurestudents/courses/course.php?course=S334&stutype=local&keywords=digital%20forensic (last visit 15 October 2010)
Louise, L., et al.: Establishing network computer forensics classes. In: InfoSecCD 2004: Proceedings of the 1st Annual Conference on Information Security Curriculum Development. ACM, New York (2004)
Luther, T., et al.: Forensic Course Development. In: Proceedings of the 4th Conference on Information Technology Curriculum, CITC4 2003. ACM, New York (2003)
Luther, T., et al.: Forensic Course Development – One Year Later. In: SIGITE 2004. ACM, Salt Lake City (2004)
Batten, L., Lei, P.: Teaching Digital Forensics to Undergraduate Students, vol. 6(3), pp. 54–56 (2008)
Kevin, R., Hongmei, C.: Framework for the design of web-based learning for digital forensics labs. In: Proceedings of the 47th Annual Southeast Regional Conference, ACM-SE 47. ACM, New York (2009)
John Jay College of Criminal Justice.: Master of Science in Forensic Computing, http://www.jjay.cuny.edu/academics/690.php , (last visit November 12, 2010)
Philip, C., et al.: Master’s Degree in Digital Forensics. In: 40th Annual Hawaii International Conference on System Sciences, HICSS 2007 (January 2007)
Training Programs.: EnCE Certification Program, https://guidancesoftware.com/training/training_programs.aspx (last visit November 12, 2010)
Lane Department of Computer Science and Electrical Engineering.: Computer Forensics Certificate, http://www.csee.wvu.edu/ , (last visit July 7 2009)
Lee H.C.: College of Criminal Justice and Forensic Sciences.: Forensic Computer Investigation Certificate, http://www.newhaven.edu/5930/ (last visit October 5, 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sabeil, E., Bt Abdul Manaf, A., Ismail, Z., Abas, M. (2011). Trainees’ Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes – A Review. In: Mohamad Zain, J., Wan Mohd, W.M.b., El-Qawasmeh, E. (eds) Software Engineering and Computer Systems. ICSECS 2011. Communications in Computer and Information Science, vol 179. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22170-5_44
Download citation
DOI: https://doi.org/10.1007/978-3-642-22170-5_44
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22169-9
Online ISBN: 978-3-642-22170-5
eBook Packages: Computer ScienceComputer Science (R0)