skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Digital Forensics Education Modules for Judicial Officials
As our lives become more dependent on digital technology, cyber crime is increasing in our society. There is now an ever-increasing need to counter cyber crime through digital forensics investigations. With rapid developments in technology such as cloud computing, the Internet of Things, and mobile computing, it is vital to ensure proper training of law enforcement personnel and judges in the theory and practice of digital forensics. In this paper, we describe our methods and approach to create curricula, educational materials, and courses for training law en- forcement and judicial personnel in digital forensics. We partnered with legal experts to design a series of modules/courses on digital forensics to educate the actual target demographics. Training materials have been designed to be not only scalable to nationwide law enforcement and ju- dicial professionals, but also amenable to regular updates to respond to rapidly changing attacks and forensic techniques.  more » « less
Award ID(s):
1723768
PAR ID:
10189358
Author(s) / Creator(s):
; ;
Date Published:
Journal Name:
National Cyber Summit
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. It is essential to initiate a curriculum concerning mobile device forensics and law enforcement in the intermediate grades in Mississippi using a facet of multidisciplinary subjects: biology, chemistry, computer science, criminology, and physics. The students participated in engaged teams who gathered the evidence (critical thinking), analyzed the evidence (deductive reasoning), and drew conclusions (inference) in a story-based scenario entitled “Cyberbullying Mobile Device Criminal Investigation.” This research presents cyberbullying while bringing awareness to the law enforcement community by understanding digital forensics; furthermore, it shows how STEM and Criminology are presented to intermediate students by solving a middle school mystery based on a multidisciplinary framework. By including a multidisciplinary curriculum in this process, students developed an appreciation of the interrelatedness between the STEM Sciences and Liberal Arts Education. 
    more » « less
  2. The proliferation of software tools and automated techniques in digital forensics has brought about some controversies regarding bias and fairness. Different biases exist and have been proven in some civil and criminal cases. In our research, we analyze and discuss these biases present in software tools and automation systems used by law enforcement organizations and in court proceedings. Furthermore, we present real-life cases and scenarios where some of these biases have determined or influenced these cases. We were also able to provide recommendations for reducing bias in software tools, which we hope will be the foundation for a framework that reduces or eliminates bias from software tools used in digital forensics. In conclusion, we anticipate that this research can help increase validation in digital forensics software tools and ensure users' trust in the tools and automation techniques. 
    more » « less
  3. The study of cyber security is an interdisciplinary pursuit that includes STEM disciplines as well as the social sciences. While research on cyber security appears to be central in STEM disciplines, it is not yet clear how central cyber security and cyber crime is to criminal justice scholarship. In order to examine the connections between cyber security and criminal justice, in this study attention is given to the way that criminal justice scholars have embraced cyber crime research and coursework. Results show that while there are a number of cyber crime courses included in criminal justice majors there are not a large number of cyber crime research studies incorporated in mainstream criminal justice journals. ________________________________________________________________________ 
    more » « less
  4. The rise in crime rates over the past few years is a major issue and is a huge source of worry for police departments and law enforcement organizations. Crime severely harms the lives of victims and the communities they live in many places throughout the world. It is an issue of public disturbance, and large cities often see criminal activity. Many studies, media, and websites include statistics on crime and it is contributing elements, such as population, unemployment, and poverty rate. This paper compares and visualizes the crime data for four different cities in the USA, namely Chicago, Baltimore, Dallas, and Denton. We assess areas that are significantly affected based on zip codes and variations in crime categories. As the crime rates have significantly changed both upward and downward throughout time, these changes are compared to their external causes such as population, unemployment, and poverty. The results show crime frequency and distribution across four different cities and supply valuable information about the complex relationship between social factors and criminal behavior. These results and outcomes will help the police department and law enforcement organizations better understand crime issues, map crime incidents onto a geographical map, and supply insight into factors affecting crime that will help them deploy resources and help in their decision-making process. 
    more » « less
  5. Abstract Data breaches have become a formidable challenge for business operations in the twenty-first century. The emergence of big data in the ever-growing digital economy has created the necessity to secure critical organizational information. The lack of cybersecurity awareness exposes organizations to potential cyber threats. Thus, this research aims to identify the various dimensions of cybersecurity awareness capabilities. Drawing on the dynamic capabilities framework, the findings of the study show personnel (knowledge, attitude and learning), management (training, culture and strategic orientation) and infrastructure capabilities (technology and data governance) as thematic dimensions to tackle cybersecurity awareness challenges. 
    more » « less