Lempogo Forgor, W. Brown-Acquaye, J. K. Arthur, Stephen Owoo
{"title":"非洲电子垃圾设备的数据安全:加纳的案例","authors":"Lempogo Forgor, W. Brown-Acquaye, J. K. Arthur, Stephen Owoo","doi":"10.1109/ICCSPN46366.2019.9150166","DOIUrl":null,"url":null,"abstract":"As computers become old and are discarded, it is imperative that they are effectively cleansed of all personal data. As the study showed, by using a simple data recovery software, remnant data can be retrieved from some disposed computer hard drives even after they have been formatted. If hard drives are not properly cleansed of data before they are discarded, individuals and organizations run the risk of having their information recovered and exploited by people with criminal intent. The study examined discarded computer hard drives obtained from some electronic waste dumpsites and other second hand computer dealers in Ghana, in an attempt to recover remnant information from them using a data recovery software. Out of 50 hard drives examined, 39 of them representing 78% contained identifiable individual information present in them. The results from this study indicated that most individuals and organizations are oblivious of data that still remains on computer hard drive even after files have been deleted and thus, it is necessary to highlight best approaches to asset disposal such as proper hard disk erasure techniques.","PeriodicalId":177460,"journal":{"name":"2019 International Conference on Communications, Signal Processing and Networks (ICCSPN)","volume":"423 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security of Data on E-waste equipment to Africa: The Case of Ghana\",\"authors\":\"Lempogo Forgor, W. Brown-Acquaye, J. K. Arthur, Stephen Owoo\",\"doi\":\"10.1109/ICCSPN46366.2019.9150166\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As computers become old and are discarded, it is imperative that they are effectively cleansed of all personal data. As the study showed, by using a simple data recovery software, remnant data can be retrieved from some disposed computer hard drives even after they have been formatted. If hard drives are not properly cleansed of data before they are discarded, individuals and organizations run the risk of having their information recovered and exploited by people with criminal intent. The study examined discarded computer hard drives obtained from some electronic waste dumpsites and other second hand computer dealers in Ghana, in an attempt to recover remnant information from them using a data recovery software. Out of 50 hard drives examined, 39 of them representing 78% contained identifiable individual information present in them. The results from this study indicated that most individuals and organizations are oblivious of data that still remains on computer hard drive even after files have been deleted and thus, it is necessary to highlight best approaches to asset disposal such as proper hard disk erasure techniques.\",\"PeriodicalId\":177460,\"journal\":{\"name\":\"2019 International Conference on Communications, Signal Processing and Networks (ICCSPN)\",\"volume\":\"423 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Communications, Signal Processing and Networks (ICCSPN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSPN46366.2019.9150166\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Communications, Signal Processing and Networks (ICCSPN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSPN46366.2019.9150166","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security of Data on E-waste equipment to Africa: The Case of Ghana
As computers become old and are discarded, it is imperative that they are effectively cleansed of all personal data. As the study showed, by using a simple data recovery software, remnant data can be retrieved from some disposed computer hard drives even after they have been formatted. If hard drives are not properly cleansed of data before they are discarded, individuals and organizations run the risk of having their information recovered and exploited by people with criminal intent. The study examined discarded computer hard drives obtained from some electronic waste dumpsites and other second hand computer dealers in Ghana, in an attempt to recover remnant information from them using a data recovery software. Out of 50 hard drives examined, 39 of them representing 78% contained identifiable individual information present in them. The results from this study indicated that most individuals and organizations are oblivious of data that still remains on computer hard drive even after files have been deleted and thus, it is necessary to highlight best approaches to asset disposal such as proper hard disk erasure techniques.