ABSTRACT
In evolutionary terms, speciation occurs when members of a species, pressured by the environment, diverge to the point where they are recognizable as separate species. This paper explores the concept as applied to Digital Forensics as a distinct academic discipline from other computing sciences. What are the pressures that have resulted in the emergence of Digital Forensics, how might the domain be defined and, what interdisciplinary connections does Digital Forensics have?This paper examines the domain content of Digital Forensics and its potential in the development of viable undergraduate and graduate degree programs to satisfy professional and scholarly demand.
- "ACM Committee on Computer Science. (1968). Curriculum 68: Recommendations for Academic Programs in Computer Science." Communications of the ACM 11(3). 151--196]] Google ScholarDigital Library
- Encyclopædia Britannica. Retrieved March 29, 2005, from Encyclopædia Britannica Premium Service. http://www.britannica.com/eb/article?tocId=49890]]Google Scholar
- Center for Education and Research in Information Assurance and Security. www.cerias.purdue.edu]]Google Scholar
- Champlain College Computer and Digital Forensics. http://digitalforensics.champlain.edu/]]Google Scholar
- Digital Forensics Research Workshop 2001. www.dfrws.org]]Google Scholar
- Digital Forensics Research Workshop Call for papers. www.dfrws.org/04-callforpapers.html]]Google Scholar
- Emerson, B. C. & Kolm, N. (2005). "Species Diversity can Drive Speciation" Nature 434, pp 1015--1017.]]Google ScholarCross Ref
- Evenden, M. L. et al. (2002). "Inheritance and Evolution of Male Response to Sex Pheromone in Trichoplusia ni (Lepidoptera: Noctudidae)". Chemoecology 12(1) 53--59]]Google ScholarCross Ref
- Farrel, B. D., & Sequeira, A. S. (2004). "Evolutionary Rates in the Adaptive Radiation of Beetles on Plants". Evolution 58(9). 1984--2001.]]Google Scholar
- Haigh, Y. T. (2001). "The Birth of the Systems Man". Working Knowledge. August edition. Harvard Business School.]]Google Scholar
- Hodges A. (2000). Alan Turing: the Enigma. Walker & Company, New York.]] Google ScholarDigital Library
- Howard, D. J., & Berlocher, S. H. (Eds). (1998). Endless Forms: Species and Speciation. Oxford University Press.]]Google Scholar
- International High Technology Crime Investigation Association. http;//www.htcia.org/]]Google Scholar
- Kahin, B. (1990). "Commercialization of the Internet" Summary report, Science, Technology and Public Policy Program, John F. Kennedy School of government. Subsequently published by the Internet Activities Board as RFC 1192)]] Google ScholarDigital Library
- Knuth, D. E. (1968). The Art of Computer Programming. Addison-Wesley.]] Google ScholarDigital Library
- http://www3.kyoto-su.ac.jp/english/school/history.html]]Google Scholar
- History of the School of Computer Science: Manchester University. http://www.cs.manchester.ac.uk/About/history.php]]Google Scholar
- National INFOSEC Training and Education Program. http://www.nsa.gov/ia/academia/acade00001.cfm]]Google Scholar
- History of the Department of Computer Sciences at Purdue University http://www.cs.purdue.edu/history/history.html]]Google Scholar
- Shedlock, A. M., Takehashi, K., & Okada, N. (2004). "SINEs of Speciation: Tracking lineages with Retroposons." Trends in Ecology and Evolution, 19(10) 545--553.]]Google ScholarCross Ref
- Sum Houston State University Center of Excellence in Digital Forensics. www.df.shsu.edu]]Google Scholar
- Weik, M. H. (1961). The ENIAC Story. http://ftp.arl.mil/~mike/comphist/eniac-story.html]]Google Scholar
- Weir, J. T., & Schluter, D. (2004). "Ice Sheets Promote Speciation in Boreal Birds". Proceedings of the Royal Society Biological Sciences Series B (271(1551) 1881--1887.]]Google ScholarCross Ref
- Wexelblat, R. L. (ed.) (1981). History of Programming Languages. Academic Press.]] Google Scholar
Index Terms
- Speciation in the computing sciences: digital forensics as an emerging academic discipline
Recommendations
Developing the BS-ISA: lessons learned and future directions - sponsored by NSF grant # DUE-0516192
InfoSecCD '06: Proceedings of the 3rd annual conference on Information security curriculum developmentIn April 2004, Kennesaw State University was designated as a National Center of Academic Excellence in Information Assurance Education by the DHS and the NSA. As a benefit of the program CAE institutions are eligible for a special NSF Grant program: the ...
Planning, building and operating the information security and assurance laboratory
InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum developmentWith increasing interest by students and faculty in Information Security (InfoSec) Curriculum, and increasing demand for information security professionals from industry, many institutions are beginning the task of creating an information security ...
Designing and teaching information security curriculum
InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum developmentWith increasing interest by students and faculty in Information Security Curriculum, and increasing demand for information security professionals from industry, many institutions are beginning the task of creating a meaningful information security ...
Comments