Hardware is replaced with increasing frequency, whether it is broken or not. The constantly increasing pile of e-waste contains hardware that has been used for producing, processing, and storing data. Although mechanisms exist to erase data before disposal, it is unclear how companies apply them to different types of hardware. In this exploratory research based on a grounded theory approach, we developed a framework showing relationships between privacy awareness, hardware types, end-of-life handling, and data protection measures. Based on the sample data, we identified types of hardware that are experienced as being critical storage devices, whereas the storage capacity of others is not perceived as being critical. Based on the framework, research could begin to further elaborate solutions to this problem. This work also recommends the development of guidelines that integrate e-waste and privacy or data protection.
CITATION STYLE
Krumay, B. (2016). The e-waste-privacy challenge: A grounded theory approach. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9857 LNCS, pp. 48–68). Springer Verlag. https://doi.org/10.1007/978-3-319-44760-5_4
Mendeley helps you to discover research relevant for your work.