{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:50Z","timestamp":1750306310128,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T00:00:00Z","timestamp":1454284800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1145\/2843043.2843356","type":"proceedings-article","created":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T20:06:43Z","timestamp":1454357203000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["I know what you did last summer... an investigation into remnant data on USB storage devices sold in Australia in 2015"],"prefix":"10.1145","author":[{"given":"Nikki","family":"Robins","sequence":"first","affiliation":[{"name":"Edith Cowan University, Western Australia"}]},{"given":"Patricia A. H.","family":"Williams","sequence":"additional","affiliation":[{"name":"Edith Cowan University, Western Australia"}]},{"given":"Krishnun","family":"Sansurooah","sequence":"additional","affiliation":[{"name":"Edith Cowan University, Western Australia"}]}],"member":"320","published-online":{"date-parts":[[2016,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Trends in Communications and Media Technologies, Applications and Use","author":"ACMA","year":"2015","unstructured":"ACMA ( 2015 ): Trends in Communications and Media Technologies, Applications and Use . http:\/\/www.acma.gov.au\/webwr\/_assets\/main\/lib310658\/trends_comms_media_technology_applications_and_use.doc\/. Accessed 27 Mar 2015. ACMA (2015): Trends in Communications and Media Technologies, Applications and Use. http:\/\/www.acma.gov.au\/webwr\/_assets\/main\/lib310658\/trends_comms_media_technology_applications_and_use.doc\/. Accessed 27 Mar 2015."},{"key":"e_1_3_2_1_2_1","volume-title":"Greater Manchester Police fined over stolen data stick","author":"News","year":"2012","unstructured":"BBC News ( 2012 ): Greater Manchester Police fined over stolen data stick . http:\/\/www.bbc.com\/news\/uk-england-manchester-19960966\/. Accessed 15 may 2015. BBC News (2012): Greater Manchester Police fined over stolen data stick. http:\/\/www.bbc.com\/news\/uk-england-manchester-19960966\/. Accessed 15 may 2015."},{"key":"e_1_3_2_1_3_1","volume-title":"The Challenges Facing Computer Forensics Investigators in Obtaining Information from Mobile Devices for Use in Criminal Investigations","author":"Bennett D., W.","year":"2011","unstructured":"Bennett , D., W. ( 2011 ): The Challenges Facing Computer Forensics Investigators in Obtaining Information from Mobile Devices for Use in Criminal Investigations . http:\/\/articles.forensicfocus.com\/2011\/08\/22\/the-challenges-facing-computer-forensics-investigators-in-obtaining-information-from-mobile-devices-for-use-in-criminal-investigations\/. Accessed 21 Jan 2015. Bennett, D., W. (2011): The Challenges Facing Computer Forensics Investigators in Obtaining Information from Mobile Devices for Use in Criminal Investigations. http:\/\/articles.forensicfocus.com\/2011\/08\/22\/the-challenges-facing-computer-forensics-investigators-in-obtaining-information-from-mobile-devices-for-use-in-criminal-investigations\/. Accessed 21 Jan 2015."},{"key":"e_1_3_2_1_4_1","volume-title":"FBI sees Chinese involvement amid sharp rise in economic espionage cases","author":"Bruer W.","year":"2015","unstructured":"Bruer , W. ( 2015 ): FBI sees Chinese involvement amid sharp rise in economic espionage cases . http:\/\/edition.cnn.com\/2015\/07\/24\/politics\/fbi-economic-espionage\/. Accessed 21 Aug 2015. Bruer, W. (2015): FBI sees Chinese involvement amid sharp rise in economic espionage cases. http:\/\/edition.cnn.com\/2015\/07\/24\/politics\/fbi-economic-espionage\/. Accessed 21 Aug 2015."},{"key":"e_1_3_2_1_5_1","volume-title":"Manchester Police dump terror secrets in the street","author":"Daily Star Sunday","year":"2010","unstructured":"Daily Star Sunday ( 2010 ): Manchester Police dump terror secrets in the street . http:\/\/www.dailystar.co.uk\/news\/latest-news\/152395\/Manchester-Police-dump-terror-secrets-in-the-street\/. Accessed 17 May 2015. Daily Star Sunday (2010): Manchester Police dump terror secrets in the street. http:\/\/www.dailystar.co.uk\/news\/latest-news\/152395\/Manchester-Police-dump-terror-secrets-in-the-street\/. Accessed 17 May 2015."},{"key":"e_1_3_2_1_6_1","volume-title":"Year of Mega Breaches & Identity Theft. Findings from the 2014 Breach Level Index. Retrieved","author":"Gemalto","year":"2014","unstructured":"Gemalto ( 2014 ): Year of Mega Breaches & Identity Theft. Findings from the 2014 Breach Level Index. Retrieved June 6, 2015 from http:\/\/breachlevelindex.com\/pdf\/Breach-Level-Index-Annual-Report-2014.pdf\/. Accessed 6 Jun 2015. Gemalto (2014): Year of Mega Breaches & Identity Theft. Findings from the 2014 Breach Level Index. Retrieved June 6, 2015 from http:\/\/breachlevelindex.com\/pdf\/Breach-Level-Index-Annual-Report-2014.pdf\/. Accessed 6 Jun 2015."},{"key":"e_1_3_2_1_7_1","volume-title":"Lost USB Drive Exposes Hong Kong Hospital Patients' Data http:\/\/www.esecurityplanet.com\/network-security\/lost-usb-drive-exposes-hong-kong-hospital-patients-data.html\/. Accessed","author":"Goldman J.","year":"2014","unstructured":"Goldman , J. ( 2014 ): Lost USB Drive Exposes Hong Kong Hospital Patients' Data http:\/\/www.esecurityplanet.com\/network-security\/lost-usb-drive-exposes-hong-kong-hospital-patients-data.html\/. Accessed 12 Jul 2015. Goldman, J. (2014): Lost USB Drive Exposes Hong Kong Hospital Patients' Data http:\/\/www.esecurityplanet.com\/network-security\/lost-usb-drive-exposes-hong-kong-hospital-patients-data.html\/. Accessed 12 Jul 2015."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 11th Australian digital Forensics Conference. http:\/\/ro.ecu.edu.au\/cgi\/viewcontent.cgi?article=1126&context=adf\/. Accessed","author":"Hope H.","year":"2013","unstructured":"Hope , H. , Almutairi , H. , Alnazawi , F. , Jiang , Y. & Sansurooah , K. ( 2013 ): An Investigation into The Efficiency Of Forensics Data Erasure Tools For removable USB Flash memory Storage Devices . Proceedings of the 11th Australian digital Forensics Conference. http:\/\/ro.ecu.edu.au\/cgi\/viewcontent.cgi?article=1126&context=adf\/. Accessed 11 Apr 2015. Hope, H., Almutairi, H., Alnazawi, F., Jiang, Y. & Sansurooah, K. (2013): An Investigation into The Efficiency Of Forensics Data Erasure Tools For removable USB Flash memory Storage Devices. Proceedings of the 11th Australian digital Forensics Conference. http:\/\/ro.ecu.edu.au\/cgi\/viewcontent.cgi?article=1126&context=adf\/. Accessed 11 Apr 2015."},{"key":"e_1_3_2_1_9_1","volume-title":"The 2009 Analysis of Information Remaining on USB flash memory storage devices Offered for Sale on the Second Hand Market. Paper presented at the 7th Australian Digital Forensics Conference","author":"Jones A.","year":"2009","unstructured":"Jones , A. , Valli , C. , & Dabibi , G. ( 2009 ): The 2009 Analysis of Information Remaining on USB flash memory storage devices Offered for Sale on the Second Hand Market. Paper presented at the 7th Australian Digital Forensics Conference , Edith Cowan University , Western Australia , Perth. Jones, A., Valli, C., & Dabibi, G. (2009): The 2009 Analysis of Information Remaining on USB flash memory storage devices Offered for Sale on the Second Hand Market. Paper presented at the 7th Australian Digital Forensics Conference, Edith Cowan University, Western Australia, Perth."},{"key":"e_1_3_2_1_10_1","volume-title":"Data Traveler for Enterprise","author":"Kingston Technology","year":"2014","unstructured":"Kingston Technology ( 2014 ): Data Traveler for Enterprise . http:\/\/www.kingston.com\/flash\/DataTravelers_enterprise.asp\/. Accessed 11 Aug 2915. Kingston Technology (2014): Data Traveler for Enterprise. http:\/\/www.kingston.com\/flash\/DataTravelers_enterprise.asp\/. Accessed 11 Aug 2915."},{"key":"e_1_3_2_1_11_1","volume-title":"Spend police USB stick data loss mega-fine on IT lessons for cops","author":"Leyden J.","year":"2012","unstructured":"Leyden , J. ( 2012 ): Spend police USB stick data loss mega-fine on IT lessons for cops . http:\/\/www.theregister.co.uk\/2012\/11\/15\/invest_data_breach_fine_gmp_security_training\/. Accessed 23 Apr 2015. Leyden, J. (2012): Spend police USB stick data loss mega-fine on IT lessons for cops. http:\/\/www.theregister.co.uk\/2012\/11\/15\/invest_data_breach_fine_gmp_security_training\/. Accessed 23 Apr 2015."},{"key":"e_1_3_2_1_12_1","volume-title":"McAfee Encrypted USB","author":"McAfee","year":"2011","unstructured":"McAfee . ( 2011 ): McAfee Encrypted USB . http:\/\/www.mcafee.com\/au\/products\/encrypted-usb.aspx\/. Accessed 29 Mar 2015. McAfee. (2011): McAfee Encrypted USB. http:\/\/www.mcafee.com\/au\/products\/encrypted-usb.aspx\/. Accessed 29 Mar 2015."},{"key":"e_1_3_2_1_13_1","volume-title":"Lost USB drive leads to breach of 6,000 patient records","author":"Narisi S.","year":"2013","unstructured":"Narisi , S. ( 2013 ): Lost USB drive leads to breach of 6,000 patient records . http:\/\/www.healthcarebusinesstech.com\/data-breach-lost-usb-drive\/. Accessed 22 Mar 2015. Narisi, S. (2013): Lost USB drive leads to breach of 6,000 patient records. http:\/\/www.healthcarebusinesstech.com\/data-breach-lost-usb-drive\/. Accessed 22 Mar 2015."},{"key":"e_1_3_2_1_14_1","volume-title":"Lost unencrypted USB stick costs council &pound;80,000 data breach fine","author":"Out-Law","year":"2013","unstructured":"Out-Law .com ( 2013 ): Lost unencrypted USB stick costs council &pound;80,000 data breach fine . http:\/\/www.out-law.com\/en\/articles\/2012\/october\/ico-reiterates-warning-over-encryption-as-it-fines-council-120k-over-second-data-protection-breach\/. Accessed 21 Jun 2015. Out-Law.com (2013): Lost unencrypted USB stick costs council &pound;80,000 data breach fine. http:\/\/www.out-law.com\/en\/articles\/2012\/october\/ico-reiterates-warning-over-encryption-as-it-fines-council-120k-over-second-data-protection-breach\/. Accessed 21 Jun 2015."},{"key":"e_1_3_2_1_15_1","volume-title":"The 2015 Cost of Data Breach: Global Analysis","author":"Ponemon Institute","year":"2015","unstructured":"Ponemon Institute ( 2015 ): The 2015 Cost of Data Breach: Global Analysis . http:\/\/www.ponemon.org\/blog\/ponemon-institute-releases-2014-cost-of-data-breach-global-analysis\/. Accessed 17 June 2015. Ponemon Institute (2015): The 2015 Cost of Data Breach: Global Analysis. http:\/\/www.ponemon.org\/blog\/ponemon-institute-releases-2014-cost-of-data-breach-global-analysis\/. Accessed 17 June 2015."},{"key":"e_1_3_2_1_16_1","volume-title":"Care provider rapped by UK and Isle of Man data commissioners over lost memory stick","author":"Raywood D","year":"2012","unstructured":"Raywood , D ( 2012 ): Care provider rapped by UK and Isle of Man data commissioners over lost memory stick . http:\/\/www.scmagazineuk.com\/care-provider-rapped-by-uk-and-isle-of-man-data-commissioners-over-lost-memory-stick\/article\/223769\/. Accessed 9 May 2015. Raywood, D (2012): Care provider rapped by UK and Isle of Man data commissioners over lost memory stick. http:\/\/www.scmagazineuk.com\/care-provider-rapped-by-uk-and-isle-of-man-data-commissioners-over-lost-memory-stick\/article\/223769\/. Accessed 9 May 2015."},{"key":"e_1_3_2_1_17_1","volume-title":"Lost USB stick contained details of more than 1,000 school children","author":"Magazine UK","year":"2012","unstructured":"SC Magazine UK ( 2012 ): Lost USB stick contained details of more than 1,000 school children . http:\/\/www.scmagazineuk.com\/lost-usb-stick-contained-details-of-more-than-1000-school-children\/article\/226867\/. Accessed 11 Jul 2015. SC Magazine UK (2012): Lost USB stick contained details of more than 1,000 school children. http:\/\/www.scmagazineuk.com\/lost-usb-stick-contained-details-of-more-than-1000-school-children\/article\/226867\/. Accessed 11 Jul 2015."},{"key":"e_1_3_2_1_18_1","volume-title":"Technical note CMU\/SEI-2013-TN-003","author":"Silowash G., J.","year":"2013","unstructured":"Silowash , G., J. & Lewellen , T., B ( 2013 ): Insider threat Control: Using Universal Serial Bus (USB) Device Auditing to Detect Possible Data Exfiltration by Malicious Insiders. CERT program , Technical note CMU\/SEI-2013-TN-003 . http:\/\/www.sei.cmu.edu\/reports\/13tn003.pdf\/. Accessed 18 May 2015. Silowash, G., J. & Lewellen, T., B (2013): Insider threat Control: Using Universal Serial Bus (USB) Device Auditing to Detect Possible Data Exfiltration by Malicious Insiders. CERT program, Technical note CMU\/SEI-2013-TN-003. http:\/\/www.sei.cmu.edu\/reports\/13tn003.pdf\/. Accessed 18 May 2015."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 10th Australian Information Security Management Conference, 83--91","author":"Sansurooah K.","year":"2012","unstructured":"Sansurooah , K. ( 2012 ): A study of remnant data found on USB storage devices offered for sale on the Australian second hand market in 2011 . Proceedings of the 10th Australian Information Security Management Conference, 83--91 , Perth, Western Australia. Sansurooah, K. (2012): A study of remnant data found on USB storage devices offered for sale on the Australian second hand market in 2011. Proceedings of the 10th Australian Information Security Management Conference, 83--91, Perth, Western Australia."},{"key":"e_1_3_2_1_20_1","volume-title":"10th Australian Digital Forensics Conference. Perth","author":"Szewczyk P.","year":"2012","unstructured":"Szewczyk , P. , & Sansurooah , K. ( 2012 ): The 2012 investigation into remnant data on second hand memory cards sold in Australia . 10th Australian Digital Forensics Conference. Perth , Western Australia: Edith Cowan University. http:\/\/ro.ecu.edu.au\/adf\/110\/. Accessed 10 June 2015. Szewczyk, P., & Sansurooah, K. (2012): The 2012 investigation into remnant data on second hand memory cards sold in Australia. 10th Australian Digital Forensics Conference. Perth, Western Australia: Edith Cowan University. http:\/\/ro.ecu.edu.au\/adf\/110\/. Accessed 10 June 2015."},{"key":"e_1_3_2_1_21_1","volume-title":"The Proceedings of 11th Australian Digital Forensics Conference, 135--140","author":"Szewczyk P.","year":"2013","unstructured":"Szewczyk , P. , Robins , N. , Sansurooah , K. ( 2013 ): Sellers continue to give away confidential information on second hand memory cards sold in Australia . The Proceedings of 11th Australian Digital Forensics Conference, 135--140 , Joondalup, WA. Szewczyk, P., Robins, N., Sansurooah, K. (2013): Sellers continue to give away confidential information on second hand memory cards sold in Australia. The Proceedings of 11th Australian Digital Forensics Conference, 135--140, Joondalup, WA."},{"key":"e_1_3_2_1_22_1","volume-title":"Barclays to compensate customers for losing USB stick containing personal data","author":"The Inquirer","year":"2015","unstructured":"The Inquirer ( 2015 ): Barclays to compensate customers for losing USB stick containing personal data . http:\/\/www.theinquirer.net\/inquirer\/news\/2417610\/barclays-to-compensate-customers-for-losing-usb-stick-containing-personal-data\/. Accessed 16 Jun 2015. The Inquirer (2015): Barclays to compensate customers for losing USB stick containing personal data. http:\/\/www.theinquirer.net\/inquirer\/news\/2417610\/barclays-to-compensate-customers-for-losing-usb-stick-containing-personal-data\/. Accessed 16 Jun 2015."},{"key":"e_1_3_2_1_23_1","volume-title":"Tough on data leaks, tough on the causes of data leaks","author":"The Register","year":"2012","unstructured":"The Register ( 2012 ): Tough on data leaks, tough on the causes of data leaks . http:\/\/www.out-law.com\/en\/articles\/2012\/october\/ico-reiterates-warning-over-encryption-as-it-fines-council-120k-over-second-data-protection-breach\/. Accessed 27 Jul 2015. The Register (2012): Tough on data leaks, tough on the causes of data leaks. http:\/\/www.out-law.com\/en\/articles\/2012\/october\/ico-reiterates-warning-over-encryption-as-it-fines-council-120k-over-second-data-protection-breach\/. Accessed 27 Jul 2015."},{"key":"e_1_3_2_1_24_1","volume-title":"Medicaid contractor loses provider's personal information","author":"Wral","year":"2013","unstructured":"Wral .com ( 2013 ): Medicaid contractor loses provider's personal information . http:\/\/www.wral.com\/medicaid-contractor-loses-provider-s-personal-information\/12201020\/#1cJcqJdmGPo2JwS2.99\/. Accessed 30 may 2015. Wral.com (2013): Medicaid contractor loses provider's personal information. http:\/\/www.wral.com\/medicaid-contractor-loses-provider-s-personal-information\/12201020\/#1cJcqJdmGPo2JwS2.99\/. Accessed 30 may 2015."},{"key":"e_1_3_2_1_25_1","volume-title":"David Guetta World Tour Cancelled After Losing USB Containing His Entire Set. Retrieved","author":"Wunderground","year":"2014","unstructured":"Wunderground ( 2014 ): David Guetta World Tour Cancelled After Losing USB Containing His Entire Set. Retrieved April 6, 2015 from http:\/\/wundergroundmusic.com\/david-guetta-world-tour-cancelled-after-losing-usb-containing-his-entire-set-2\/. Accessed 6 Apr 2015. Wunderground (2014): David Guetta World Tour Cancelled After Losing USB Containing His Entire Set. Retrieved April 6, 2015 from http:\/\/wundergroundmusic.com\/david-guetta-world-tour-cancelled-after-losing-usb-containing-his-entire-set-2\/. Accessed 6 Apr 2015."}],"event":{"name":"ACSW '16: Australasian Computer Science Week","acronym":"ACSW '16","location":"Canberra Australia"},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2843043.2843356","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2843043.2843356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:53:49Z","timestamp":1750222429000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2843043.2843356"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2]]},"references-count":25,"alternative-id":["10.1145\/2843043.2843356","10.1145\/2843043"],"URL":"https:\/\/doi.org\/10.1145\/2843043.2843356","relation":{},"subject":[],"published":{"date-parts":[[2016,2]]},"assertion":[{"value":"2016-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}