First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05) 2005
DOI: 10.1109/sadfe.2005.7
|View full text |Cite
|
Sign up to set email alerts
|

Computer forensics, information security and law: a case study

Abstract: Providing security and assurance to information systems and communications is one of the highest national priorities .It is our task to prepare computer information system security professionals with current security and assurance information to achieve this objective. To meet this urgent need, the faculty must have the knowledge and skills to be taught in the classroom. For several semesters, we have been developing information system security curriculum with a computer forensics course for the students. Acti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…The weight per unit area and thickness of the fabrics are higher but the air permeability, the pilling grade, and the spirality are lower. Herath [3] Studied the dimensional characteristics of a core spun cotton /spandex interlock structure. The results were compared with those for similar fabrics knitted from 100% cotton.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…The weight per unit area and thickness of the fabrics are higher but the air permeability, the pilling grade, and the spirality are lower. Herath [3] Studied the dimensional characteristics of a core spun cotton /spandex interlock structure. The results were compared with those for similar fabrics knitted from 100% cotton.…”
Section: Literature Surveymentioning
confidence: 99%
“…Most of the researches [2][3][4][5][6][7][8][9] studied the dimensional and physical properties of the knitted fabric produced from core spun yarn and few of these researches investigated the properties of the knitted fabric produced from cotton and Lycra yarns. As Lycra yarns are often used in alternating courses (half plating) instead of every the course (full plating) either for economical reasons or for better fabric quality, there is a necessity to compare these two cases under different levels of the lycra extension percent.…”
Section: Literature Surveymentioning
confidence: 99%
“…Theme (Cremonini & Nizovtsev, 2006) Opportunity cost of attacking a given target (Herath & Herath, 2006) Opportunity cost of lost productivity (Brecht & Nowey, 2013) Opportunity cost of security investments (Ioannidis et al, 2013) Opportunity cost of security investments (Kaivanto, 2014) Opportunity cost of misclassifying spam (Lefouili et al, 2017) Opportunity cost of information sharing (Anderson et al, 2019) Opportunity cost of cybercrime to society (Zhou & Hui, 2019) Opportunity cost of not attacking Practitioners may be discouraged from exploring alternatives given the perceived vagueness of opportunity cost and a lack of precise measurements. We believe that an approachable starting point is to consider the null baseline.…”
Section: Referencementioning
confidence: 99%
“…We suggest works by Genest and MacKay (1986), Frees andValdez (1997), andEmberechts (2009) for further reference. Copulas have been used before to model the cyber risk ;Herath et. al.…”
Section: Analysis Of a CLI Contract When Sub -Cyber Risks Are Correla...mentioning
confidence: 99%