scholarly journals An Australian Longitudinal Study Into Remnant Data Recovered From Second-Hand Memory Cards

Author(s):  
Patryk Szewczyk ◽  
Krishnun Sansurooah ◽  
Patricia A. H. Williams

Consumers demand fast, high capacity, upgradeable memory cards for portable electronic devices, with secure digital (SD) and microSD the most popular. Despite this demand, secure erasure of data is still not a composite part of disposure practices. To investigate the extent of this problem, second-hand memory cards were procured from the Australian eBay site between 2011 and 2015. Digital forensic tools were used to acquire and analyze each memory card to determine the type and quantity of remnant data. This paper presents the results of the 2014 and 2015 studies and compares these findings to the 2011–2013 research studies. The longitudinal comparison indicates resold memory cards are disposed insecurely, with personal, confidential and business data undeleted or easily recoverable. The impact of such discoveries, where information is placed in the public domain, has the potential to cause embarrassment and financial loss to individuals, business, and government organizations.

2018 ◽  
Vol 12 (4) ◽  
pp. 82-97
Author(s):  
Patryk Szewczyk ◽  
Krishnun Sansurooah ◽  
Patricia A. H. Williams

Consumers demand fast, high capacity, upgradeable memory cards for portable electronic devices, with secure digital (SD) and microSD the most popular. Despite this demand, secure erasure of data is still not a composite part of disposure practices. To investigate the extent of this problem, second-hand memory cards were procured from the Australian eBay site between 2011 and 2015. Digital forensic tools were used to acquire and analyze each memory card to determine the type and quantity of remnant data. This paper presents the results of the 2014 and 2015 studies and compares these findings to the 2011–2013 research studies. The longitudinal comparison indicates resold memory cards are disposed insecurely, with personal, confidential and business data undeleted or easily recoverable. The impact of such discoveries, where information is placed in the public domain, has the potential to cause embarrassment and financial loss to individuals, business, and government organizations.


2020 ◽  
Author(s):  
Jolien van Breen ◽  
Maja Kutlaca ◽  
Yasin Koc ◽  
Bertus F. Jeronimus ◽  
Anne Margit Reitsema ◽  
...  

In this work, we study how social contacts and feelings of solidarity shape experiences of loneliness during the COVID-19 lockdown in early 2020. We draw on cross-national data, collected across four time points between mid-March until early May 2020. We situate our work within the public debate on these issues and discuss to what extent the public understanding of the impact of lockdown is borne out in the data. Results show, first, that although online contacts are beneficial in combating feelings of loneliness, people who feel more lonely are less likely to make use of this strategy. Second, online contacts do not function as a substitute to face-to-face contacts - in fact, more frequent online contacts in earlier weeks predicted an increase in face-to-face contacts in later weeks. Finally, solidarity played only a small role in shaping people’s feelings of loneliness during lockdown. In sum, our findings suggest that we must look beyond the current focus on online contact and solidarity, if we want to help people address their feelings of loneliness. We hope that this work will be instrumental not only in understanding the impact of the lockdown in early 2020, but also in preparing for possible future lockdown periods.


2007 ◽  
Vol 7 ◽  
pp. 55-62
Author(s):  
Kgomotso H Moahi

This paper considers the impact that globalization and the knowledge economy have on the protection and promotion of indigenous knowledge. It is asserted that globalization and the knowledge economy have opened up the world and facilitated the flow of information and knowledge. However, the flow of knowledge has been governed by uneven economic and political power between the developed countries and the devel-oping countries. This has a number of ramifications for IK. The dilemma faced is that whichever method is taken to protect IK (IPR regimes, documenting IK etc) exposes IK to some misappropriation. Protecting it through IPR is also fraught with problems. Documenting IK exposes IK to the public domain and makes it that much easier to be misused. However, not protecting IK runs the danger of having it disappear as the custodians holding it die off, or as communities become swamped by the effects of globalization. The conclu-sion therefore is that governments have to take more interest in protecting, promoting and using IK than they have been doing.


2018 ◽  
Vol 37 (4) ◽  
pp. 333-340
Author(s):  
Saša Baškarada ◽  
Brian Hanlon

PurposeAlthough corporate portfolio management (CPM) has been a popular tool for strategic management of multi-business portfolios in the private sector since the late 1960s, it has received limited attention in the public sector. Accordingly, empirical research on the use of CMP in government organizations is virtually non-existent. The purpose of this paper is to partially fill that gap in the literature by highlighting and discussing some of the key points that public sector organizations may need to consider when adopting CPM.Design/methodology/approachRather than deductively proposing and testing narrowly specified hypotheses, this study aims to answer a broad research question, namely: What are the key points that public sector organizations may need to consider when adopting CMP? Hence, the study adopts the qualitative interpretive research paradigm. The findings are based on empirical research conducted in a large Australian publicly funded research organization. Potential application of CPM was iteratively and incrementally explored with a reference group comprising 15 middle management representatives and several members of the senior leadership group over the course of one year.FindingsAssessment criteria traditionally used in CPM (e.g. growth potential and market share) are generally not applicable in public sector organizations. This paper suggests that government organizations should instead consider past performance and future potential of individual business units, which may be operationalized via capability (a function of human capital and associated resources/infrastructure) and delivery (a function of the demand for, and the impact of, relevant business units). The paper also highlights the importance of organization-wide consultation, evidence-based decision making, and contestability.Originality/valueFrom a practical perspective, the paper may assist public sector organizations with adapting and applying CPM. From a theoretical perspective, the paper highlights an important and relatively neglected research problem, and suggests several avenues for future research.


10.1068/c24m ◽  
2002 ◽  
Vol 20 (5) ◽  
pp. 741-756 ◽  
Author(s):  
Neil Ravenscroft ◽  
David Uzzell ◽  
Rachel Leach

In this paper we discuss the incidence of actual and perceived victimisation in people's recreational use of nonmotorised shared-use routes. Using the findings from eight focus groups, we show that, despite encountering very few conflictual situations when on shared-use routes, the fear of accidents and assaults has a significant impact on some people in some environments. The findings lend support to broader theorisations about people's insecurity when outside the home, where fear is an increasingly systemic reaction to the ways in which understandings of the public domain are shifting.


2017 ◽  
Vol 3 (2) ◽  
pp. 27
Author(s):  
Mustafa Ngam Elbushari

This paper has focused on the impact of commitment to control regulations in the elimination of corruption, trickery and fraud in the course of the implementing of the public budget that is applicable to some of the government institutions. It has indicated the impact of limiting of corruption , trickery ,fraud and counterfeit on the financial statements and the case problem has been represented by the corruption in some of the government institutions and corporations and what it breeds of problems that pose a hindrance to the objectives of the public budget plan, as a general target. The importance of this paper has sprung from the increase of concern toward control regulations as a vital tool to help combating the current of trickery ,fraud and corruption as it aims to shed light on some of the obstacles those minimize the control process within the authority of the auditor general related to corruption, as well, the papers’ inquiries included :the types of corruption, and how it takes place in government organizations and corporations? What are the effects of corruption on the economic rates such as poverty and the slowdown of the common growth? What is the impact of financial corruption on the deepening of the deficit in the public budget and governmental common revenues? In addition, what is the impact of corruption on attraction of private investments?


Super Bomb ◽  
2020 ◽  
pp. 18-39
Author(s):  
Ken Young ◽  
Warner R. Schilling

This chapter is an account of the impact on U.S. thinking and policy of the first Soviet atomic bomb test. It ended the U.S. monopoly of atomic weapons—a development that some had foreseen and others had discounted as a possibility. An atomic Russia triggered fears of a “bolt from the blue” assault on U.S. cities. One reaction was to seek to prioritize U.S. air defenses. Another was to confirm the program agreed to that summer to accelerate the production of fissionable material for atomic bombs. The surge of anxiety also brought hitherto obscure speculations about thermonuclear physics into the public domain. It seemed apparent to some that the Soviet nuclear threat should be countered not by a multiplication of atomic bombs but by an American “superbomb.”


2011 ◽  
pp. 2395-2408
Author(s):  
Ibrahim Kushchu ◽  
Seda Arat ◽  
Chet Borucki

Adoption of mobile technologies by government organizations not only bene?ts the parties who use these services, but also has positive impact on the internal workings of the public sector. Those government entities which initiated mobile applications have visible gains in productivity and cost and operational savings. This new way of performing tasks also undoubtedly has some repercussions on the organizational structure, civil worker, and the business processes. This chapter tries to underline some of the issues that might arise in these areas by examining some ongoing mobile government projects.


Sign in / Sign up

Export Citation Format

Share Document