University of Hertfordshire

From the same journal

Standard

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In the UAE. / Jones, Andrew; Martin, Thomas; Alzaabi, Mohammed.

In: Journal of Digital Forensics, Security and Law, Vol. 11, No. 4, 6, 31.12.2016, p. 23-33.

Research output: Contribution to journalArticle

Harvard

APA

Vancouver

Author

Bibtex

@article{5aac38793bea43e7a261e3066e836fd3,
title = "The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In the UAE",
abstract = "This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased in the UAE, as well as any changes that have occurred since the previous survey. We will also compare these results to those produced in other regions of the world to gain an understanding of the relative level of the problem of residual data in the UAE. The core methodology of the research adopted for this study was the same as has been used for the other global studies. The methodology included the acquisition of a number of second hand computer disks from a range of sources and their subsequent analysis. The goal of the analysis was to determine whether any data could be recovered from the disk and if so, whether the data that it contained could be used to determine the previous owner or user. If information was found on the disks and the previous user or owner could be identified, the research examined whether the information was of a sensitive nature or in a sufficient volume to represent a risk.",
keywords = "computer forensics, disk analysis, data recovery, data disposal, data destruction, data leakage, privacy",
author = "Andrew Jones and Thomas Martin and Mohammed Alzaabi",
note = "This is an Open Access article made available in accordance with the Creative Commons Attribution Non Commercial (CC BY-NC 4.0) license, which permits others to distribute, remix, adapt, build upon this work non-commercially, and license their derivative works on different terms, provided the original work is properly cited and the use is non-commercial. See: http://creativecommons.org/licenses/by-nc/4.0/",
year = "2016",
month = "12",
day = "31",
doi = "10.15394/jdfsl.2016.1428",
language = "English",
volume = "11",
pages = "23--33",
journal = "Journal of Digital Forensics, Security and Law",
issn = "1558-7215",
number = "4",

}

RIS

TY - JOUR

T1 - The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In the UAE

AU - Jones, Andrew

AU - Martin, Thomas

AU - Alzaabi, Mohammed

N1 - This is an Open Access article made available in accordance with the Creative Commons Attribution Non Commercial (CC BY-NC 4.0) license, which permits others to distribute, remix, adapt, build upon this work non-commercially, and license their derivative works on different terms, provided the original work is properly cited and the use is non-commercial. See: http://creativecommons.org/licenses/by-nc/4.0/

PY - 2016/12/31

Y1 - 2016/12/31

N2 - This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased in the UAE, as well as any changes that have occurred since the previous survey. We will also compare these results to those produced in other regions of the world to gain an understanding of the relative level of the problem of residual data in the UAE. The core methodology of the research adopted for this study was the same as has been used for the other global studies. The methodology included the acquisition of a number of second hand computer disks from a range of sources and their subsequent analysis. The goal of the analysis was to determine whether any data could be recovered from the disk and if so, whether the data that it contained could be used to determine the previous owner or user. If information was found on the disks and the previous user or owner could be identified, the research examined whether the information was of a sensitive nature or in a sufficient volume to represent a risk.

AB - This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased in the UAE, as well as any changes that have occurred since the previous survey. We will also compare these results to those produced in other regions of the world to gain an understanding of the relative level of the problem of residual data in the UAE. The core methodology of the research adopted for this study was the same as has been used for the other global studies. The methodology included the acquisition of a number of second hand computer disks from a range of sources and their subsequent analysis. The goal of the analysis was to determine whether any data could be recovered from the disk and if so, whether the data that it contained could be used to determine the previous owner or user. If information was found on the disks and the previous user or owner could be identified, the research examined whether the information was of a sensitive nature or in a sufficient volume to represent a risk.

KW - computer forensics

KW - disk analysis

KW - data recovery

KW - data disposal

KW - data destruction

KW - data leakage

KW - privacy

U2 - 10.15394/jdfsl.2016.1428

DO - 10.15394/jdfsl.2016.1428

M3 - Article

VL - 11

SP - 23

EP - 33

JO - Journal of Digital Forensics, Security and Law

JF - Journal of Digital Forensics, Security and Law

SN - 1558-7215

IS - 4

M1 - 6

ER -