Security Without Obscurity: Managing Personally Identifiable Information in Born-Digital Archives

2013 ◽  
Vol 26 (1-2) ◽  
pp. 37-55
Author(s):  
Ben Goldman ◽  
Timothy D. Pyatt
Author(s):  
Ivan D. Kotlyarov

For the purpose of improving the training of highly qualified specialists the author suggests to create the inner university digital archives of translations of texts on a speciality (from within the exam candidate minimum foreign language) and reports on the history and philosophy of science.


Drones ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 49
Author(s):  
Miloš Stanković ◽  
Mohammad Meraj Mirza ◽  
Umit Karabiyik

Rapid technology advancements, especially in the past decade, have allowed off-the-shelf unmanned aerial vehicles (UAVs) that weigh less than 250 g to become available for recreational use by the general population. Many well-known manufacturers (e.g., DJI) are now focusing on this segment of UAVs, and the new DJI Mini 2 drone is one of many that falls under this category, which enables easy access to be purchased and used without any Part 107 certification and Remote ID registration. The versatility of drones and drone models is appealing for customers, but they pose many challenges to forensic tools and digital forensics investigators due to numerous hardware and software variations. In addition, different devices can be associated and used for controlling these drones (e.g., Android and iOS smartphones). Moreover, according to the Federal Aviation Administration (FAA), the adoption of Remote ID is not going to be required for people without the 107 certifications for this segment at least until 2023, which creates finding personally identifiable information a necessity in these types of investigations. In this research, we conducted a comprehensive investigation of DJI Mini 2 and its data stored across multiple devices (e.g., SD cards and mobile devices) that are associated with the drone. The aim of this paper is to (1) create several criminal-like scenarios, (2) acquire and analyze the created scenarios using leading forensics software (e.g., Cellebrite and Magnet Axiom) that are commonly used by law enforcement agencies, (3) and present findings associated with potential criminal activities.


2017 ◽  
Vol 20 (9) ◽  
pp. 3304-3322 ◽  
Author(s):  
Holger Pötzsch

This article reconceptualizes the archive in the context of digital media ecologies. Drawing upon archival theory and critical approaches to the political economy of the Internet, I account for new dynamics and implications afforded by digital archives. Operating at both a user-controlled explicit and a state- and corporate-owned implicit level, the digital archive at once facilitates empowerment and enables unprecedented forms of management and control. Connecting the politics and economy of digital media with issues of identity formation and curation on social networking sites, I coin the terms iArchive and predictive retention to highlight how recent technological advances both provide new means for self-expression, mobilization and resistance and afford an almost ubiquitous tracking, profiling and, indeed, moulding of emergent subjectivities.


Sign in / Sign up

Export Citation Format

Share Document