ADFSL Conference on Digital Forensics, Security and Law, 2014
145
three courses in computer related knowledge and skills. First is an introductory computer class that
covers productivity software including word processing, spreadsheets, database, email and slide
presentation software. Second is a management information systems (MIS) class that covers the
foundations of information resources, system management and security techniques, database concepts
and IS management principles. Third is a course in accounting information systems (AIS) that focuses
on internal controls for IS, transaction systems, systems design and documentation, system security,
computer fraud, and IT governance. The AIS class may also cover advanced spreadsheet and database
knowledge and generalized audit software such as Audit Control Language (Coglitore and Matson,
2007).
Some accounting programs now offer courses in forensic accounting and a few colleges have full
programs in forensic accounting. Graduate programs may offer an emphasis or track in forensic
accounting in the MBA or Masters of Accountancy programs. The composition of the courses varies
depending upon the number of courses offered. Schools that offer a full program or major will have a
broader offering than those that only offer an emphasis or track in forensic accounting. Acquiring
these skills can increase market appeal particularly for accounting students who wish to work as
internal auditors or as IT or fraud auditors or as agents for the IRS or FBI. As a result of the increasing
need for digital security and the importance of uncovering corporate fraud many universities are also
creating courses in computer forensics (Busing et al., 2006).
Forensic accounting represents an integration of accounting, auditing and investigative skills that
support the acquisition, maintenance, and analysis of relevant information in a manner that would be
acceptable for judicial review and meet the requirements of professional oversight. It also extends to
the formulation and presentation of findings in formal reports and court testimony as an expert
witness. Forensic accountants command a set of skills that transcends the traditional expectations of
accountants. These skills are acquired and enhanced through audit experience and increased
investigative training. This allows the forensic accountant to analyze and interpret more complex
business and non-business issues in a manner that meets the highest requirements of reliability and
integrity. As such, forensic accountants may be employed in a public or private capacity and play
important roles in internal auditing departments of banks and insurance companies, governmental and
law enforcement agencies, and as self-employed contractors for individuals and attorneys. Thus, the
market for forensic accountants and the required skill sets are very well defined.
4. COMPUTER FORENSICS COURSE EXERCISES AND PROJECTS
Forensic accountants are often deficient in the understanding of computer forensics for several
reasons. Many schools do not offer such a course because they lack qualified instructors. Also, the
topics are not covered on the CPA exam and a large percentage of accounting students plan to acquire
a CPA or similar certification such as CMA or CIA, none of which require the technical skills of
computer forensics. Finally, accounting students who plan to take the CPA exam may have to meet the
150 hour rule adopted by many states and may see forensic skills as ones they can acquire in the future
(Seda et al., 2008).
This deficiency, however, directly impacts the ability and effectiveness of the forensic accountant and
makes him or her more reliant upon IT for all steps requiring computer forensic analysis. Also,
students may recognize that the computer forensic skills are special and may lead to careers in forensic
accounting and IT auditing. Educators who recognize the importance of computer forensic skills will
be interested in exercises and projects that provide the accounting student with basic computer
forensic techniques. The exercises and projects that follow introduce several widely recognized
software products that are important to forensic analysis. Among other things, these projects illustrate
how fraudsters can hide important information in files, how to inspect files for hidden data, how to
acquire images from a suspect drive, how to recover deleted files and how to calculate hash values to