• Login
    View Item 
    •   Scholarly Works @ SHSU Home
    • Faculty Research
    • Department of Computer Science
    • View Item
    •   Scholarly Works @ SHSU Home
    • Faculty Research
    • Department of Computer Science
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    In-The-Wild Residual Data Research and Privacy

    Thumbnail
    View/Open
    Article (751.8Kb)
    Date
    2016
    Author
    Glisson, William Bradley
    Storer, Tim
    Blyth, Andrew
    Grispos, George
    Campbell, Matt
    Metadata
    Show full item record
    Abstract
    As the world becomes increasingly dependent on technology, researchers in industry and academia endeavor to understand how technology is used, the impact it has on everyday life, the artifact life-cycle and overall integrations of digital information. In doing so, researchers are increasingly gathering ‘real-world’ or ‘in-the-wild’ residual data, obtained from a variety of sources, without the explicit consent of the original owners. This data gathering raises significant concerns regarding privacy, ethics and legislation, as well as practical considerations concerning investigator training, data storage, overall security and data disposal. This research surveys recent studies of residual data gathered in-the-wild and analyzes the challenges that were confronted. Amalgamating these insights, the research presents a compendium of practices for addressing the issues that can arise in-the-wild when conducting residual data research. The practices identified in this research can be used to critique current projects and assess the feasibility of proposed future research.
    URI
    https://hdl.handle.net/20.500.11875/3192
    Collections
    • Cyber Forensics Intelligence Center
    • Department of Computer Science
    Citation
    Glisson, William B.; Storer, Tim; Blyth, Andrew; Grispos, George; and Campbell, Matt (2016) "In-The-Wild Residual Data Research and Privacy," Journal of Digital Forensics, Security and Law: Vol. 11 : No. 1 , Article 1. DOI: https://doi.org/10.15394/jdfsl.2016.1371
    Description
    Copy of article co-written by William B. Glisson that was published in the Journal of Digital Forensics, Security and Law

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    TDL
    Theme by 
    Atmire NV
     

     

    Browse

    All of Scholarly Works @ SHSUCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsDepartmentThis CollectionBy Issue DateAuthorsTitlesSubjectsDepartment

    My Account

    LoginRegister

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    TDL
    Theme by 
    Atmire NV