Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 3 |
Law Enforcement | 3 |
Teaching Methods | 3 |
Computer Science Education | 2 |
Crime | 2 |
Information Security | 2 |
Case Studies | 1 |
Class Activities | 1 |
College Students | 1 |
Community Colleges | 1 |
Computer Software | 1 |
More ▼ |
Author
Belshaw, Scott H. | 2 |
Colaiuta, Alexandrea | 1 |
Davis, Martin H., Jr. | 1 |
Duffy, Kevin P. | 1 |
Nodeland, Brooke | 1 |
Sethi, Vikram | 1 |
Underwood, Lorrin | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Two Year Colleges | 1 |
Audience
Location
Texas | 2 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Next Generation of Evidence Collecting: The Need for Digital Forensics in Criminal Justice Education
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security
Duffy, Kevin P.; Davis, Martin H., Jr.; Sethi, Vikram – Journal of Information Systems Education, 2010
We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer…
Descriptors: Student Attitudes, Relevance (Education), Lesson Plans, Learner Engagement