Prior Publisher

The Association of Digital Forensics, Security and Law (ADFSL)


Forensic Computing is a new and quickly developing field. It is in the process of becoming an academic discipline or sub-discipline with all the features from full undergraduate and postgraduate course provision to conferences and journals. An important question in this process of turning into an established discipline is whether it will coincide with the recognition of the graduates as professionals. This paper hopes to stimulate the debate as to whether forensic computing is or should be a discipline. In order to approach this question, the paper will discuss the concept of forensic computing including the most salient topics of interest and the problems it has to contend with. This will lead to a discussion of the notion of professions and professionals, which will be expanded with a view to the debate on computing as a profession. Based on these considerations the paper will conclude by asking whether there is merit in promoting the debate on the status of forensic computing as a profession above and beyond the arguments already rehearsed for computing in general.


Broucek, Vlasti & Turner, Paul (2004): Intrusion Detection: Issues and Challenges in Evidence Acquisition. In: International Review of Law, Computers & Technology (18:2): 149 - 164

Buchanan, Elizabeth A. (2001): Ethical Considerations for the Information Professions. In: Spinello, Richard A. & Tavani, Herman T. (eds.) (2001): Readings in Cyberethics. Sudbury, Massachusetts et al.: Jones and Bartlett: 523 - 534

Dinant, Jean-Marc (2004): The Long Way from Electronic Traces to Electronic Evidence. In: International Review of Law, Computers & Technology (18:2): 173 - 183

Forester, Tom & Morrison, Perry (1994): Computer Ethics - Cautionary Tales and Ethical Dilemmas in Computing. 2nd edition, Cambridge, Massachusetts / London: MIT Press

Gleason, David H. (2002): ICT Professionalism. In: Alvarez, Isabel et al. (eds.) (2002): The Transformation of Organisations in the Information Age: Social and Ethical Implications. Proceedings of the sixth ETHICOMP Conference, 13 - 15 November 2002, Lisbon, Portugal. Lisbon: Universidade Lusiada: 113 - 124

Gotterbarn, Don (2004) On Licensing Computer Professionals. In. Bynum, Terry & Rogerson, Simon (eds.) (2004): Computer Ethics and Professional Responsibility. Blackwell: Oxford, 157 – 164

Jenkins, Milton A. (1985) Research Methodologies and MIS Research. In: Mumford, Enid; Hirschheim, Rudy; Fitzgerald, Guy & Wood-Harper, Trevor (eds) (1985): Research Methods in Information Systems (IFIP 8.2 Proceedings). Amsterdam: North-Holland: 103 - 117

Johnson, Deborah G. (2001): Computer Ethics. 3rd edition, Upper Saddle River, New Jersey: Prentice Hall

Johnson, Deborah G. & Mulvey, John M. (1995): Accountability and Computer Decision Systems. In: Communications of the ACM (38:12): 58 - 64

Johnson, Deborah, G. & Nissenbaum, Helen (1995): What is Computer Ethics? In: Johnson, Deborah G. & Nissenbaum, Helen (eds.) Computers, Ethics & Social Values. Upper Saddle River: Prentice Hall: 1 - 15

Kenneally, Erin (2002): Computer Forensics: Beyond the Buzzword. In:;login: (27:4): 8 - 11

Klang, Mathias (2003): A Critical Look at the Regulation of Computer Viruses. In: International Journal of Law and Information Technology 11: 162-183

Kultgen, John (1998): The Ideological Use of Professional Codes. In: Stichler, Richard N. & Hauptman, Robert (eds.) (1998): Ethics, Information and Technology: Readings. Jefferson, North Carolina: MacFarland & Company: 273 - 290

Ladd, John (1995): The Quest for a Code of Professional Ethics: An Intellectual and Moral Confusion. In: Johnson, Deborah G. & Nissenbaum, Helen (eds.) (1995): Computers, Ethics & Social Values. Upper Saddle River: Prentice Hall: 580 - 585

Levy, Neil (2002): Virtual Child Pornography: The Eroticization of Inequality. In: Ethics and Information Technology (4:4): 319 - 323

Mason, Richard O.; Mason, Florence & Culnan, Mary J. (1995): Ethics of Information Management. Thousand Oaks, London, New Delhi 1995: SAGE

May, Larry (1992): Sharing Responsibility. Chicago: University of Chicago Press

Myers, Matthew & Rogers, Marc (2004): Computer Forensics: The Need for Standardization and Certification. In: International Journal of Digital Evidence (3:2): 1 - 11

Newton, Lisa (1998): The Origin of Professionalism: Sociological Conclusions and Ethical Implications. In: Stichler, Richard N.& Hauptman, Robert (eds.) (1998): Ethics, Information and Technology: Readings. Jefferson, North Carolina: MacFarland & Company: 261 - 272

Oz, Effy (1992): Ethical Standards for Information Systems Professionals: A Case for a Unified Code. In: MIS Quarterly 16: 423 - 433

Poullet, Yves (2004): The Fight against Crime and/or the Protection of Privacy: A Thorny Debate! In: International Review of Law, Computers & Technology (18:2): 251 - 273

Rogers, Marcus K. & Seigfried, Kate (2004): The Future of Computer Forensics: A Needs Analysis Survey. In: Computers & Security (23:1): 12 - 16

Rogerson, Simon (1998): Ethical Aspects of Information Technology - Issues for senior executives. London: Institute of Business Ethics

Sommer, Peter (2002): Evidence in Internet Paedophilia Cases. In: Computer and Telecommunications Law Review 8: 176 - 184

Spinello, Richard (1997): Case studies in information and computer ethics. Upper Saddle River, NJ: Prentice Hall

Stahl, Bernd Carsten; Prior, Mary; Wilford, Sara & Collins, Dervla (2005): Electronic Monitoring in the Workplace: If People Don't Care, then What is the Relevance? In: Weckert, John (ed.): Electronic Monitoring in the Workplace: Controversies and Solutions. Idea-Group Publishing, Hershey PA: 50 - 78

Stahl, Bernd Carsten & El-Beltagi, Ibrahim (2004): Cultural Universality versus Particularity in CMC. In: Journal of Global Information Technology Management (7:4): 47 - 65

von Weltzien Hoivik, Heidi (2002): Professional Ethics - a Managerial Opportunity in Emerging Organizations. In: Journal of Business Ethics 39: 3 - 11

Wall, Christopher & Paroff, Jason (2005): Cracking the Computer Forensics Mystery. In: The Computer & Internet Lawyer (22:4): 1 - 6

Weckert, John & Adeney, Douglas (1997): Computer and Information Ethics. Westport, Connecticut / London: Greenwood Press

Yasinsac, Alec; Erbacher, Robert F.; Marks, Donald G.; Pollitt, Mark M. & Sommer, Peter M. (2003): Computer Forensics Education. In: IEEE Security & Privacy (1:4): 15 - 23



To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.