23
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Consumer’s PCs: A Study of Hard Drive Forensics, Data Recovery, and Exploitation

Pages 3-15 | Published online: 10 Sep 2014
 

Abstract

In this paper, we explore discarded hard disks that were obtained in second-hand markets and attempted to find the types of personal and sensitive files that still remained. With careful observation and scanning, we found that most of the hard disks were not adequately cleaned, and included a rather large of amount of private and sensitive information that could be used in computer crimes. Between 50,000 and 300,000 files containing identifiable information were found on the fifty-five hard drives studied. The results of this study indicate a need for further training concerning proper hard drive erasure.

Additional information

Notes on contributors

B. Dawn Medlin

B. Dawn Medlin is the Chair of the Department of Computer Information Systems, John A. Walker College of Business, and Appalachian State University in Boone, NC. Her teaching and research activities have mainly been in the area of security, health care informatics, and e-commerce. She has published in journals such as The Journal of Information Systems Security, Information Systems Security, International Journal of Electronic Marketing and Retailing, and the International Journal of Healthcare Information Systems and Informatics.

Joseph A. Cazier

Joseph A. Cazier is an Assistant Dean - Graduate Programs and Research at Appalachian State University. He has a keen interest in information ethics, trust and security and conducts research in this area. He has published in The Journal of Information Systems Security, Information and Management, Information Systems Frontiers, International Journal of Electronic Marketing and Retailing, International Journal of Information Security and Privacy, and the International Journal of Healthcare Information Systems and Informatics.

Robert M. Weaver

Robert M. Weaver is a graduate of Appalachian State University, the Walker College of Business and the Computer Information Systems Department. Robert has presented his research at regional conferences and is currently working on several publications related to security and privacy issues. Robert is employed as a Systems Analyst in the Virginia School System.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.