{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:57:21Z","timestamp":1721455041579},"reference-count":47,"publisher":"IGI Global","issue":"4","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10,1]]},"abstract":"<p>Consumers demand fast, high capacity, upgradeable memory cards for portable electronic devices, with secure digital (SD) and microSD the most popular. Despite this demand, secure erasure of data is still not a composite part of disposure practices. To investigate the extent of this problem, second-hand memory cards were procured from the Australian eBay site between 2011 and 2015. Digital forensic tools were used to acquire and analyze each memory card to determine the type and quantity of remnant data. This paper presents the results of the 2014 and 2015 studies and compares these findings to the 2011\u20132013 research studies. The longitudinal comparison indicates resold memory cards are disposed insecurely, with personal, confidential and business data undeleted or easily recoverable. The impact of such discoveries, where information is placed in the public domain, has the potential to cause embarrassment and financial loss to individuals, business, and government organizations.<\/p>","DOI":"10.4018\/ijisp.2018100106","type":"journal-article","created":{"date-parts":[[2018,10,18]],"date-time":"2018-10-18T11:43:05Z","timestamp":1539862985000},"page":"82-97","source":"Crossref","is-referenced-by-count":3,"title":["An Australian Longitudinal Study Into Remnant Data Recovered From Second-Hand Memory Cards"],"prefix":"10.4018","volume":"12","author":[{"given":"Patryk","family":"Szewczyk","sequence":"first","affiliation":[{"name":"Edith Cowan University, Joondalup, Australia"}]},{"given":"Krishnun","family":"Sansurooah","sequence":"additional","affiliation":[{"name":"Edith Cowan University, Joondalup, Australia"}]},{"given":"Patricia A. H.","family":"Williams","sequence":"additional","affiliation":[{"name":"Flinders University, Adelaide, Australia"}]}],"member":"2432","reference":[{"key":"IJISP.2018100106-0","first-page":"39","article-title":"Digital camcorder forensics.","author":"A.Ariffin","year":"2013","journal-title":"Proceedings of the Eleventh Australasian Information Security Conference (AISC \u201913)"},{"key":"IJISP.2018100106-1","unstructured":"Arthur, C. (2009, Jan 8). Before you sell your computer, smash the hard drive, says Which? The Guardian. Retrieved from http:\/\/www.theguardian.com\/technology\/2009\/jan\/08\/hard-drive-security-which"},{"key":"IJISP.2018100106-2","unstructured":"Australian Privacy Principles. (2012). Australian Privacy Principles. Australian Government, Office of the Australian Information Commissioner. Retrieved from https:\/\/www.oaic.gov.au\/privacy-law\/privacy-act\/australian-privacy-principles"},{"key":"IJISP.2018100106-3","unstructured":"Bulk Extractor. (2014). Bulk Extractor (version 1.5.5) [Software]. Available from http:\/\/digitalcorpora.org\/downloads\/bulk_extractor\/"},{"key":"IJISP.2018100106-4","unstructured":"Carrier, B. (2016). The Sleuth Kit (Version 3.0.9\/4.0) [Software]. Available from http:\/\/www.sleuthkit.org\/autopsy\/download.php"},{"key":"IJISP.2018100106-5","unstructured":"Chaerani, W., Clarke, N., & Bolan, C. (2011). Information leakage through second hand USB flash drives within the United Kingdom. In Proceedings of the 9th Australian Digital Forensics Conference. Perth, Australia: Academic Press."},{"key":"IJISP.2018100106-6","unstructured":"Clarke, T. (2013). Government data found on old memory sticks. The Australian. Retrieved from http:\/\/www.theaustralian.com.au\/news\/latest-news\/government-data-found-on-old-memory-sticks\/story-fn3dxiwe-1226772717895"},{"key":"IJISP.2018100106-7","unstructured":"DeCeglie, A. (2011, December 10). WA study reveals private details exposed in sale of second-hand memory cards. Sunday Times. Retrieved from http:\/\/www.perthnow.com.au\/news\/your-secrets-exposed\/story-e6frg12c-1226218988783"},{"key":"IJISP.2018100106-8","unstructured":"Dolcourt, J. (2014). Cross Country watch ridiculously encapsulates all of Android (hands-on). Retrieved from http:\/\/www.cnet.com\/products\/cross-country-smartwatch\/"},{"key":"IJISP.2018100106-9","unstructured":"Donovan, F. (2014). Bad tech at work puts pressure on enterprises to go BYOD. Retrieved from http:\/\/www.fiercemobileit.com\/story\/bad-tech-work-puts-pressure-enterprises-go-byod\/2014-10-15"},{"key":"IJISP.2018100106-10","unstructured":"eSafety. (2016). eSafety. Australian Government, Office of the eSafety Commissioner. Retrieved from https:\/\/esafety.gov.au\/"},{"key":"IJISP.2018100106-11","doi-asserted-by":"publisher","DOI":"10.1310\/hpj5001-84"},{"key":"IJISP.2018100106-12","unstructured":"Frauenfelder, M. (2004). Hobby: buying used hard drives on eBay and unerasing the data for fun. Retrieved from http:\/\/boingboing.net\/2004\/03\/23\/hobby-buying-used-ha.html"},{"key":"IJISP.2018100106-13","unstructured":"Global Industry Analysts. (2016). Secure Digital (SD) Memory Cards \u2013 A Global Strategic Business Report. Retrieved from http:\/\/www.strategyr.com\/PressMCP-7679.asp"},{"key":"IJISP.2018100106-14","unstructured":"Gompertz, S. (2012). Watchdog finds undeleted data on second-hand disk drives. BBC News. Retrieved from http:\/\/www.bbc.com\/news\/technology-17827562"},{"key":"IJISP.2018100106-15","unstructured":"Goodin, D. (2011). Flash drives dangerously hard to purge of sensitive data. The Register. Retrieved from http:\/\/www.theregister.co.uk\/2011\/02\/21\/flash_drive_erasing_peril\/"},{"key":"IJISP.2018100106-16","unstructured":"Gribbin, C. (2013). Selling second-hand memory cards online could bring serious risk of identity fraud: experts. ABC News. Retrieved from http:\/\/www.abc.net.au\/news\/2013-12-02\/selling-second-hand-memory-cards-bring-risk-of-identity-fraud\/5129848"},{"key":"IJISP.2018100106-17","article-title":"The bleak future of NAND flash memory.","author":"L. M.Grupp","year":"2012","journal-title":"Proceedings of the 10th USENIX conference on File and Storage Technologies"},{"key":"IJISP.2018100106-18","unstructured":"Imager, F. T. K. (2015). Forensic Toolkit Imager (Version3.12) [Software]. Available from http:\/\/accessdata.com\/support\/adownloads#FTKImager"},{"key":"IJISP.2018100106-19","doi-asserted-by":"crossref","unstructured":"Jones, A., Valli, C., & Dabibi, G. (2009). The 2009 Analysis of Information Remaining on USB Storage Devices Offered for Sale on the Second Hand Market. In Proceedings of the 7th Australian Digital Forensics Conference. Perth, Australia: Academic Press.","DOI":"10.15394\/jdfsl.2010.1083"},{"key":"IJISP.2018100106-20","unstructured":"Kessler, G. (2013). Cybersecurity and Your Computer: What\u2019s At Risk and What Can You Do.? Retrieved from http:\/\/www.garykessler.net\/presentations\/201303_TBE.pdf"},{"key":"IJISP.2018100106-21","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-012-0653-6"},{"key":"IJISP.2018100106-22","unstructured":"McColgan, J. (2014). Tens of thousands of Americans sell themselves online every day. Retrieved from https:\/\/blog.avast.com\/2014\/07\/08\/tens-of-thousands-of-americans-sell-themselves-online-every-day\/"},{"key":"IJISP.2018100106-23","unstructured":"Meyer, J. (2012). 49 seriously good Canon DSLR tips, tricks, time savers and shortcuts. Techradar. Retrieved from http:\/\/www.digitalcameraworld.com\/2012\/07\/12\/49-seriously-good-canon-dslr-tips-tricks-time-savers-and-shortcuts\/3\/"},{"key":"IJISP.2018100106-24","unstructured":"Munson, L. (2013). What Should We Do With Governments And IT Consultants Who Can\u2019t Look After Their Data? BH Consulting. Retrieved from http:\/\/bhconsulting.ie\/securitywatch\/?p=1858"},{"key":"IJISP.2018100106-25","unstructured":"Obire, T. (2015). Between technological obsolescence and consumer spending. Vanguard. Retrieved from http:\/\/www.vanguardngr.com\/2015\/01\/technological-obsolescence-consumer-spending\/"},{"key":"IJISP.2018100106-26","unstructured":"Orr, A. (2013). Homemade sex tapes and identity details sold on old digital devices. WA Today, WA News. Retrieved from http:\/\/www.watoday.com.au\/wa-news\/homemade-sex-tapes-and-identity-details-sold-on-old-digital-devices-20121202-2am5i.html"},{"key":"IJISP.2018100106-27","unstructured":"Page, C. (2016). Galaxy S8 release date, price, specs and features. The Inquirer. Retrieved from http:\/\/www.theinquirer.net\/inquirer\/news\/2462247\/galaxy-s8-release-date-price-specs-and-features"},{"key":"IJISP.2018100106-28","unstructured":"Pultarova, T. (2016). Improper disposal of electronic devices puts data at risk. Engineering & Technology. Retrieved from http:\/\/eandt.theiet.org\/news\/2016\/mar\/hard-drives-disposal.cfm"},{"key":"IJISP.2018100106-29","unstructured":"Reischmann, S. (2016). X-Ways Software Technology (Version 17.5) [Software]. Available from http:\/\/www.winhex.com\/winhex\/"},{"key":"IJISP.2018100106-30","doi-asserted-by":"publisher","DOI":"10.1145\/2843043.2843356"},{"key":"IJISP.2018100106-31","unstructured":"SanDisk. (2015). Formatting a memory card, flash drive or device using a PC. SanDisk. Retrieved from http:\/\/kb.sandisk.com\/app\/answers\/detail\/a_id\/312"},{"key":"IJISP.2018100106-32","unstructured":"Sansurooah, K., Hope, H., Almutairi, H., Alnazawi, F., & Jiang, Y. (2013). An Investigation in the efficiency of forensic data erasure tools for removable USB flash memory storage devices. In Proceedings of the 11th Australian Digital Forensics Conference. Perth, Australia: Academic Press."},{"key":"IJISP.2018100106-33","unstructured":"Scalpel. (2014). Scalpel (Version 1.60) [Software]. Available from https:\/\/github.com\/sleuthkit\/scalpel"},{"key":"IJISP.2018100106-34","unstructured":"Simao, A. M., Sicoli, F. C., Melo, L. P., & Sousa, R. T. (2011). Acquisition of digital evidence in android smartphones. In Proceedings of the 9th Australian Digital Forensics Conference. Perth, Australia: Academic Press."},{"key":"IJISP.2018100106-35","unstructured":"StaySmartOnline. (2015). Android smartphones not securely deleting user data. Australian Government. Retrieved from https:\/\/www.communications.gov.au\/what-we-do\/internet\/stay-smart-online\/alert-service\/android-phones-not-securely-deleting-user-data"},{"key":"IJISP.2018100106-36","unstructured":"StaySmartOnline. (2016). Stay Smart Online. Australian Government. Retrieved from https:\/\/www.communications.gov.au\/what-we-do\/internet\/stay-smart-online"},{"key":"IJISP.2018100106-37","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.05.019"},{"key":"IJISP.2018100106-38","unstructured":"Szewczyk, P., Robins, N., & Sansurooah, K. (2013). Sellers Continue to Give Away Confidential Information on Second Hand Memory Cards Sold in Australia In Proceedings of the 11th Australian Digital Forensics Conference. Perth, Australia: Academic Press."},{"key":"IJISP.2018100106-39","unstructured":"Szewczyk, P., & Sansurooah, K. (2011). A 2011 investigation into remnant data on second hand memory cards sold in Australia. In Proceedings of the 9th Australian Digital Forensics Conference. Perth, Australia: Academic Press."},{"key":"IJISP.2018100106-40","unstructured":"Szewczyk, P., & Sansurooah, K. (2012). The 2012 Investigation into Remnant Data on Second Hand Memory Cards Sold in Australia. In Proceedings of the 10th Australian Digital Forensics Conference. Perth, Australia: Academic Press."},{"key":"IJISP.2018100106-41","unstructured":"Telstra. (2015). Safeguarding Your Devices: Cyber Safety Tips. Telstra. Retrieved from http:\/\/www.telstra.com.au\/consumer-advice\/download\/document\/cyber-safety-consumer-safe-guarding.pdf"},{"key":"IJISP.2018100106-42","unstructured":"The Australian Business Review. (2013, Dec 2). Government data found on memory sticks. The Australian. Retrieved from http:\/\/www.theaustralian.com.au\/business\/technology\/government-data-found-on-memory-sticks\/story-e6frgakx-1226773129880"},{"key":"IJISP.2018100106-43","article-title":"Bring Your Own Device Security Issues and Challenges.","author":"Y.Wang","year":"2014","journal-title":"Proceedings of the 11th Annual IEEE Consumers Communications & Networking Conference"},{"key":"IJISP.2018100106-44","article-title":"Reliably Erasing Data From Flash-Based Solid State Drives.","author":"M.Wei","year":"2011","journal-title":"Proceedings of the 9th USENIX Conference on File and Storage Technologies"},{"key":"IJISP.2018100106-45","unstructured":"White, N. (2013). Personal data recovered in USB swipes. Retrieved from http:\/\/www.sciencewa.net.au\/topics\/technology-a-innovation\/item\/2417-personal-data-recovered-in-usb-swipes\/2417-personal-data-recovered-in-usb-swipes"},{"key":"IJISP.2018100106-46","doi-asserted-by":"publisher","DOI":"10.4108\/icst.bodynets.2013.253725"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=216851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T23:52:38Z","timestamp":1651881158000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2018100106"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,10,1]]},"references-count":47,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2018100106","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,1]]}}}