scholarly journals An Australian Longitudinal Study Into Remnant Data Recovered From Second-Hand Memory Cards

2018 ◽  
Vol 12 (4) ◽  
pp. 82-97
Author(s):  
Patryk Szewczyk ◽  
Krishnun Sansurooah ◽  
Patricia A. H. Williams

Consumers demand fast, high capacity, upgradeable memory cards for portable electronic devices, with secure digital (SD) and microSD the most popular. Despite this demand, secure erasure of data is still not a composite part of disposure practices. To investigate the extent of this problem, second-hand memory cards were procured from the Australian eBay site between 2011 and 2015. Digital forensic tools were used to acquire and analyze each memory card to determine the type and quantity of remnant data. This paper presents the results of the 2014 and 2015 studies and compares these findings to the 2011–2013 research studies. The longitudinal comparison indicates resold memory cards are disposed insecurely, with personal, confidential and business data undeleted or easily recoverable. The impact of such discoveries, where information is placed in the public domain, has the potential to cause embarrassment and financial loss to individuals, business, and government organizations.

Author(s):  
Patryk Szewczyk ◽  
Krishnun Sansurooah ◽  
Patricia A. H. Williams

Consumers demand fast, high capacity, upgradeable memory cards for portable electronic devices, with secure digital (SD) and microSD the most popular. Despite this demand, secure erasure of data is still not a composite part of disposure practices. To investigate the extent of this problem, second-hand memory cards were procured from the Australian eBay site between 2011 and 2015. Digital forensic tools were used to acquire and analyze each memory card to determine the type and quantity of remnant data. This paper presents the results of the 2014 and 2015 studies and compares these findings to the 2011–2013 research studies. The longitudinal comparison indicates resold memory cards are disposed insecurely, with personal, confidential and business data undeleted or easily recoverable. The impact of such discoveries, where information is placed in the public domain, has the potential to cause embarrassment and financial loss to individuals, business, and government organizations.


2020 ◽  
Vol 9 (2) ◽  
pp. 61-81
Author(s):  
Paul Joseph ◽  
Jasmine Norman

Cybercrimes catastrophically caused great financial loss in the year 2018 as powerful obfuscated malware known as ransomware continued to be a continual threat to governments and organizations. Advanced malwares capable of system encryption with sophisticated obscure keys left organizations paying the ransom that hackers demand. Since every individual is vulnerable to this assault, cyber forensics play a vital role either in educating society or combating the attacks. As cyber forensics is classified into many subdomains, memory forensics is the domain that leads in curbing these types of attacks. This article gives insight on importance of memory forensics and provides widespread analysis on working of ransomware, recognizes the workflow, provides the ways to overcome this attack. Furthermore, this article implements user defined rules by integrating into powerful search tools known as YARA to detect and prevent the ransomware attacks.


2018 ◽  
Vol 37 (4) ◽  
pp. 333-340
Author(s):  
Saša Baškarada ◽  
Brian Hanlon

PurposeAlthough corporate portfolio management (CPM) has been a popular tool for strategic management of multi-business portfolios in the private sector since the late 1960s, it has received limited attention in the public sector. Accordingly, empirical research on the use of CMP in government organizations is virtually non-existent. The purpose of this paper is to partially fill that gap in the literature by highlighting and discussing some of the key points that public sector organizations may need to consider when adopting CPM.Design/methodology/approachRather than deductively proposing and testing narrowly specified hypotheses, this study aims to answer a broad research question, namely: What are the key points that public sector organizations may need to consider when adopting CMP? Hence, the study adopts the qualitative interpretive research paradigm. The findings are based on empirical research conducted in a large Australian publicly funded research organization. Potential application of CPM was iteratively and incrementally explored with a reference group comprising 15 middle management representatives and several members of the senior leadership group over the course of one year.FindingsAssessment criteria traditionally used in CPM (e.g. growth potential and market share) are generally not applicable in public sector organizations. This paper suggests that government organizations should instead consider past performance and future potential of individual business units, which may be operationalized via capability (a function of human capital and associated resources/infrastructure) and delivery (a function of the demand for, and the impact of, relevant business units). The paper also highlights the importance of organization-wide consultation, evidence-based decision making, and contestability.Originality/valueFrom a practical perspective, the paper may assist public sector organizations with adapting and applying CPM. From a theoretical perspective, the paper highlights an important and relatively neglected research problem, and suggests several avenues for future research.


2017 ◽  
Vol 3 (2) ◽  
pp. 27
Author(s):  
Mustafa Ngam Elbushari

This paper has focused on the impact of commitment to control regulations in the elimination of corruption, trickery and fraud in the course of the implementing of the public budget that is applicable to some of the government institutions. It has indicated the impact of limiting of corruption , trickery ,fraud and counterfeit on the financial statements and the case problem has been represented by the corruption in some of the government institutions and corporations and what it breeds of problems that pose a hindrance to the objectives of the public budget plan, as a general target. The importance of this paper has sprung from the increase of concern toward control regulations as a vital tool to help combating the current of trickery ,fraud and corruption as it aims to shed light on some of the obstacles those minimize the control process within the authority of the auditor general related to corruption, as well, the papers’ inquiries included :the types of corruption, and how it takes place in government organizations and corporations? What are the effects of corruption on the economic rates such as poverty and the slowdown of the common growth? What is the impact of financial corruption on the deepening of the deficit in the public budget and governmental common revenues? In addition, what is the impact of corruption on attraction of private investments?


Author(s):  
Rauhulloh Ayatulloh Bintang ◽  
Rusydi Umar ◽  
Anton Yudhana

Social Media is becoming very popular among the public today, and the increasing number of social media use has of course a good or bad impact on the course of human life, for example the bad impact is doing cyberbully or chating on social media. Digital forensics is one of the sciences for how to catch criminals in digital which will be needed in evidence in court. Social media criminals need Smartphones to commit digital cybercrime. This research will raise evidence of digital crimes on the Facebook Lite application using forensics. In this study, the forensic tool that will be used is the MOBILEedit Forensic Pro forensic tools with the help of using methods NIST National Institute Of Standars Techlogogy. NIST has a good workflow for extracting digital forensic data. The research results will be obtained in the form of accounts Id, audio, conversations, and images


2011 ◽  
pp. 2395-2408
Author(s):  
Ibrahim Kushchu ◽  
Seda Arat ◽  
Chet Borucki

Adoption of mobile technologies by government organizations not only bene?ts the parties who use these services, but also has positive impact on the internal workings of the public sector. Those government entities which initiated mobile applications have visible gains in productivity and cost and operational savings. This new way of performing tasks also undoubtedly has some repercussions on the organizational structure, civil worker, and the business processes. This chapter tries to underline some of the issues that might arise in these areas by examining some ongoing mobile government projects.


2007 ◽  
pp. 134-153 ◽  
Author(s):  
Ibrahim Kushchu ◽  
Seda Arat ◽  
Chet Borucki

Adoption of mobile technologies by government organizations not only bene?ts the parties who use these services, but also has positive impact on the internal workings of the public sector. Those government entities which initiated mobile applications have visible gains in productivity and cost and operational savings. This new way of performing tasks also undoubtedly has some repercussions on the organizational structure, civil worker, and the business processes. This chapter tries to underline some of the issues that might arise in these areas by examining some ongoing mobile government projects.


2019 ◽  
Vol 17 (1) ◽  
Author(s):  
Ann George ◽  
Duane Blaauw ◽  
Jarred Thompson ◽  
Lionel Green-Thompson

Abstract Background Doctor emigration from low- and middle-income countries represents a financial loss and threatens the equitable delivery of healthcare. In response to government imperatives to produce more health professionals to meet the country’s needs, South African medical schools increased their student intake and changed their selection criteria, but little is known about the impact of these changes. This paper reports on the retention and distribution of doctors who graduated from the University of the Witwatersrand, South Africa (SA), between 2007 and 2011. Methods Data on 988 graduates were accessed from university databases. A cross-sectional descriptive email survey was used to gather information about graduates’ demographics, work histories, and current work settings. Frequency and proportion counts and multiple logistic regressions of predictors of working in a rural area were conducted. Open-ended data were analysed using content analysis. Results The survey response rate was 51.8%. Foreign nationals were excluded from the analysis because of restrictions on them working in SA. Of 497 South African respondents, 60% had completed their vocational training in underserved areas. At the time of the study, 89% (444) worked as doctors in SA, 6.8% (34) practised medicine outside the country, and 3.8% (19) no longer practised medicine. Eighty percent of the 444 doctors still in SA worked in the public sector. Only 33 respondents (6.6%) worked in rural areas, of which 20 (60.6%) were Black. Almost half (47.7%) of the 497 doctors still in SA were in specialist training appointments. Conclusions Most of the graduates were still in the country, with an overwhelmingly urban and public sector bias to their distribution. Most doctors in the public sector were still in specialist training at the time of the study and may move to the private sector or leave the country. Black graduates, who were preferentially selected in this graduate cohort, constituted the majority of the doctors practising in rural areas. The study confirms the importance of selecting students with rural backgrounds to provide doctors for underserved areas. The study provides a baseline for future tracking studies to inform the training of doctors for underserved areas.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan ◽  
Muhammad Dharma Tuah Putra Nasution

Simple negligence can be a fatal impact. The threat of cyber in 2017 is feeble, and it starts from “wanna cry” until “nopetya” that the impact is relatively weak. The public also feels the threat of cybercrime even in many countries who have become the target of cyber-war, the society became the most disadvantaged. Cybercrimes have an impact on the National Security, financial loss and consumer confidence. Therefore, in the middle of the more high dependency, man will use information technology, cybersecurity must be the primary priority for a state. The Indonesian people still believe that only the information is available on the internet. Even though the information may unnecessarily is accurate. The results of a survey conducted by the CIGI Ipsos in 2016 released in 2017 shows that 65 percent of Indonesia receives the information is available on the internet without filtering the first.


Sign in / Sign up

Export Citation Format

Share Document