The e-waste-privacy challenge: A grounded theory approach

7Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Hardware is replaced with increasing frequency, whether it is broken or not. The constantly increasing pile of e-waste contains hardware that has been used for producing, processing, and storing data. Although mechanisms exist to erase data before disposal, it is unclear how companies apply them to different types of hardware. In this exploratory research based on a grounded theory approach, we developed a framework showing relationships between privacy awareness, hardware types, end-of-life handling, and data protection measures. Based on the sample data, we identified types of hardware that are experienced as being critical storage devices, whereas the storage capacity of others is not perceived as being critical. Based on the framework, research could begin to further elaborate solutions to this problem. This work also recommends the development of guidelines that integrate e-waste and privacy or data protection.

Cite

CITATION STYLE

APA

Krumay, B. (2016). The e-waste-privacy challenge: A grounded theory approach. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9857 LNCS, pp. 48–68). Springer Verlag. https://doi.org/10.1007/978-3-319-44760-5_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free