{"id":25925,"date":"2024-05-16T14:57:17","date_gmt":"2024-05-16T14:57:17","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/privacy-risks-and-environmental-impacts-of-end-of-use-electronic-devices-an-empirical-analysis\/"},"modified":"2024-05-16T14:57:17","modified_gmt":"2024-05-16T14:57:17","slug":"privacy-risks-and-environmental-impacts-of-end-of-use-electronic-devices-an-empirical-analysis","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/privacy-risks-and-environmental-impacts-of-end-of-use-electronic-devices-an-empirical-analysis\/","title":{"rendered":"&#8216;Privacy Risks and Environmental Impacts of End-of-Use Electronic Devices: An Empirical Analysis.&#8217;"},"content":{"rendered":"<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&#8216;Privacy Risks and Environmental Impacts&nbsp;of End-of-Use Electronic<br \/>\nDevices: An Empirical Analysis.&#8217;&nbsp;&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">Summary: The study investigates the dual challenges of data security and<br \/>\nenvironmental&nbsp;sustainability concerning the disposal of electronic<br \/>\ndevices. To gather the data, a survey was conducted across the ten most used<br \/>\ninternet-connected device categories, collecting over 4000 responses based on<br \/>\nthe latest US census population. The responses collected helps in understanding<br \/>\nUS consumers&#8217; disposal &amp; security behaviours with end-of-use electronic<br \/>\ndevices, the risks of residual data and the effectiveness of data wiping<br \/>\nprotocols. In order to quantitatively analyse these aspects, regression<br \/>\nanalysis will be employed to identify the relationships and predict outcomes<br \/>\nbased on the collected data. This approach will allow for a detailed<br \/>\nexamination of the factors influencing both privacy and environmental<br \/>\npractices, thereby suggesting a need for improved strategies&nbsp;and policy<br \/>\ninterventions.<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">List of 10 Device Categories:<\/span><\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">1.<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<br \/>\n<\/span><\/span><\/span><span style=\"cursor: auto; color: inherit;\">SmartKitchen<br style=\"cursor: auto; color: inherit;\"><br \/>\n1a. Coffee&nbsp;Maker<br style=\"cursor: auto; color: inherit;\"><br \/>\n1b. Fridge<br style=\"cursor: auto; color: inherit;\"><br \/>\n1c. Oven<br style=\"cursor: auto; color: inherit;\"><br \/>\n<br style=\"cursor: auto; color: inherit;\"><br \/>\n2. Security Devices<br style=\"cursor: auto; color: inherit;\"><br \/>\n2a. Security Camera<br style=\"cursor: auto; color: inherit;\"><br \/>\n2b. Smart Lock<br style=\"cursor: auto; color: inherit;\"><br \/>\n2c. Video Baby Monitor<br style=\"cursor: auto; color: inherit;\"><br \/>\n2d. Video Doorbell<br style=\"cursor: auto; color: inherit;\"><br \/>\n<br style=\"cursor: auto; color: inherit;\"><br \/>\n3. Gaming Device<br style=\"cursor: auto; color: inherit;\"><br \/>\n<br style=\"cursor: auto; color: inherit;\"><br \/>\n4. ARVR<br style=\"cursor: auto; color: inherit;\"><br \/>\n<br style=\"cursor: auto; color: inherit;\"><br \/>\n5. Smarthome<br style=\"cursor: auto; color: inherit;\"><br \/>\n5a. Lawnmower<br style=\"cursor: auto; color: inherit;\"><br \/>\n5b. Lightbulb<br style=\"cursor: auto; color: inherit;\"><br \/>\n5c. Thermostat<br style=\"cursor: auto; color: inherit;\"><br \/>\n5d. Vacuum&nbsp;Cleaner<br style=\"cursor: auto; color: inherit;\"><br \/>\n<br style=\"cursor: auto; color: inherit;\"><br \/>\n6. Smart TV<br style=\"cursor: auto; color: inherit;\"><br \/>\n<br style=\"cursor: auto; color: inherit;\"><br \/>\n7. SmartPhone<br style=\"cursor: auto; color: inherit;\"><br \/>\n<br style=\"cursor: auto; color: inherit;\"><br \/>\n8. Streaming Device<br style=\"cursor: auto; color: inherit;\"><br \/>\n<br style=\"cursor: auto; color: inherit;\"><br \/>\n9. Tablet<br style=\"cursor: auto; color: inherit;\"><br \/>\n<br style=\"cursor: auto; color: inherit;\"><br \/>\n10.Wearable<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"margin-left: 18pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">Project summary:<\/span><\/p>\n<p style=\"margin-left: 18pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\">What are the major goals of the project?<\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The<br \/>\nresearch project addresses the following questions:<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<ol style=\"margin-top: 0cm; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">What are the data security and post-use behaviors for electronic<br \/>\n     devices of U.S. consumers?<\/span><\/li>\n<li style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">What are the security risks associated with data remaining on<br \/>\n     post-use electronics devices?<\/span><\/li>\n<li style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">Can security and post-use behaviors of consumers be modelled so as<br \/>\n     to inform interventions to improve sustainability and privacy outcomes?<\/span><\/li>\n<\/ol>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The goals of the project are the to address these questions<br \/>\nvia the following research activities: <\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">1.<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;<br \/>\n<\/span><\/span><\/span><span style=\"cursor: auto; color: inherit;\">For a set of electronic devices, survey consumers on<br \/>\ntheir security knowledge, practices and end-of-use knowledge and<br \/>\npractices.<span style=\"cursor: auto; color: inherit;\">&nbsp; <\/span><\/span><span style=\"cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">2.<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;<br \/>\n<\/span><\/span><\/span><span style=\"cursor: auto; color: inherit;\">Construct a model that predicts security and end-of-use<br \/>\nbehaviors for different consumer groups. <\/span><span style=\"cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">3.<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;<br \/>\n<\/span><\/span><\/span><span style=\"cursor: auto; color: inherit;\">Use the results of the above three research to suggest<br \/>\neffective interventions to improve security and sustainability outcomes.<\/span><span style=\"cursor: auto; color: inherit;\"><\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">What was accomplished under<br \/>\nthese goals and objectives <\/span><\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">Major Activities:<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"margin-left: 72pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">1.<span style=\"font-weight: normal; font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;<br \/>\n<\/span><\/span><\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">Analysis<br \/>\nto determine device choice and aggregation<\/span><\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">The goal of these is to determine what consumer electronicdevices<br \/>\nwill be considered and how to group them. Consumers own many types of<br \/>\nelectronic devices, and in general there are multiple manufacturers and models<br \/>\nfor each device.<span style=\"cursor: auto; color: inherit;\">&nbsp; <\/span>It is infeasible to<br \/>\nstudy all device types and models, a conceptual structure and practical aggregation<br \/>\nis needed to categorize devices expected to be similar with respect to study<br \/>\ngoals. For example, all smartphones are probably more similar to each other in<br \/>\nterms of privacy risks and end-of-use behavior than a smart plug or smart thermostat.<br \/>\nThis aggregation will enable survey design and also selection of specific<br \/>\ndevices to purchase for penetration and usability studies. <span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>It is important to cover the range of security<br \/>\nrisks posed by different devices.<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">Rather than looking at individual brands, we decided to first<br \/>\ngroup electronic devices according to their use-cases. Regardless of<br \/>\nmanufacturer, most smartphones and tablets offer similar features to a given<br \/>\nuser. The same principle applies to how all smart speakers utilize a companion<br \/>\napplication to store user credentials and respond to voice commands that are<br \/>\ncollected using built-in microphones. Similarly, all smart entertainment<br \/>\ndevices provide access to streaming services or gaming platforms.<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">In the second stage, and with the purpose of further<br \/>\naggregating device categories, we examined multiple Electronic taxonomy<br \/>\nstandards to better understand the categorization of information stored by Electronic<br \/>\ndevices. Smart lightbulbs and smart thermostats may appear different in terms<br \/>\nof their functionality, however they both store activity logs that show when<br \/>\nthey were activated or disabled. They also capture information from the<br \/>\nenvironment using light or temperature sensors. Based on our findings, we<br \/>\ndevised a PII sensitivity ranking system in order to prioritize the devices which<br \/>\nwould capture more sensitive PII that could subsequently be exploited for<br \/>\nmalicious purposes. Having created umbrella categories that encompassed devices<br \/>\nin a more comprehensive manner, the following criteria was ultimately developed<br \/>\nto select the parent device categories and the instances that were chosen from<br \/>\neach for penetration testing:<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin-left: 108pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&#8211;<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<br \/>\n<\/span><\/span><\/span>Ownership: chosen devices should be owned by a<br \/>\nconsiderable percentage of the US population to ensure the statistical<br \/>\nsignificance of our behavioral findings.<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin-left: 108pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&#8211;<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<br \/>\n<\/span><\/span><\/span>PII type and sensitivity: The type of personally<br \/>\nidentifiable information stored on an Electronic device could vary depending on<br \/>\nits features and use cases. A smart lightbulb could store an activity log while<br \/>\na smart gaming device might store banking information to facilitate the<br \/>\npurchase of a game. On the other hand, the sensitivity of the stored information<br \/>\nis equally crucial in our selection process. While an activity log on the<br \/>\nmentioned smart light bulb might appear insignificant, it could be used to<br \/>\ndetect patterns of presence at a given location.<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin-left: 108pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&#8211;<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<br \/>\n<\/span><\/span><\/span>Duration of software\/hardware support: How long<br \/>\na manufacturer is willing to offer software\/firmware patches and updates for a<br \/>\ndevice, will impact its capability of storing information securely and how long<br \/>\nthe consumer will hold on to it.<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin-left: 108pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&#8211;<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<br \/>\n<\/span><\/span><\/span>Resale value: More expensive devices usually<br \/>\nreceive higher trade-in\/resell values in secondary markets; which means that at<br \/>\nthe end of their first use, the correct wiping of PII by the previous owner is<br \/>\nvery important.<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin-left: 72pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">2.<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<br \/>\n<\/span><\/span><\/span>Development of survey of e-waste and security<br \/>\nattitudes, knowledge and behavior<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">A survey will be developed on e-waste and security<br \/>\nattitudes, knowledge, and behavior which will involve various important<br \/>\nactivities. It starts off with an in depth understanding of e-waste and<br \/>\nsecurity issues so that the relevant topics and questions are determined for<br \/>\nthe survey. This includes thoroughly doing research on latest trends and best<br \/>\npractices in e-waste management and data security. It is followed by the survey<br \/>\ndevelopment process encompassing designing clear and concise questions that will<br \/>\nhelp us in capturing the respondents attitudes, knowledge and behavior<br \/>\naccurately. The survey will be structured in a logical and organized manner to<br \/>\nensure ease of completion and data analysis, ensuring that all aspects are<br \/>\nadequately covered and that the survey instruments are valid and reliable. But,<br \/>\nthe rapidly evolving nature of e-waste and security issues is one of the major<br \/>\nchallenges and requires continuous monitoring of industry developments and<br \/>\nemerging trends. Also, another challenge is to ensure the accuracy and<br \/>\nreliability of the data collected because the respondents may have varying<br \/>\nlevels of understanding or they may lead to biased responses. In order to<br \/>\novercome these challenges careful design and validation of survey questions, as<br \/>\nwell as employing appropriate data analysis techniques is necessary.<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">This activity is development of a survey to query typical<br \/>\nU.S. consumers on their attitudes, knowledge and behavior with regard to<br \/>\npersonal and home electronic devices. The goal is to understand linkages<br \/>\nbetween these in order to inform interventions in security and sustainability<br \/>\noutcomes. For example, it might be that old smartphones are being stockpiled at<br \/>\nhome because users are concerned about personal data on the device and unsure<br \/>\nof how to remove it. In this case, more useable and prominent interfaces and<br \/>\napplications on smart phones could help address the problem. The survey results<br \/>\nwill be analyzed for statistical correlations and also form the core for<br \/>\ncalibrating a machine learning model predicting consumer behavior. <\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">Significant results:<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">Analysis to determine device choice and aggregation<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">The main result is establishment of a categorical structure<br \/>\nfor devices grouped according to basic qualities of personal information<br \/>\ncontained, how consumers interact with them, and ownership. <\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">Development of survey of e-waste and security attitudes,<br \/>\nknowledge and behavior<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">For the 10 set of selected device categories, a 15 minutes<br \/>\nsurvey is developed using Qualtrics software, which consists of approximately<br \/>\n52* questions. It will be administered online via the Prolific platform to a<br \/>\nrepresentative sample of the US population, aiming for 400 responses per device<br \/>\ncategory. Screening of participants ensures statistically significant data for<br \/>\neach device category. Questions address security attitudes, knowledge, and<br \/>\nbehaviors as well as end of use practices including device duration and disposition<br \/>\ne.g., store, discard, donate, recycle, resell. Reporting both actual behaviors<br \/>\nand expectations for future behaviors may introduce some inaccuracy, but this<br \/>\nwill serve as the best proxy in the absence of prior experience. This<br \/>\ncomprehensive survey aims to inform interventions for improved security and<br \/>\nsustainability outcomes in electronic device usage.<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin-left: 18pt; cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin-left: 18pt; cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin-left: 18pt; cursor: auto; color: inherit;\">Deployment and analysis of survey<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">The survey questions will next be refined by working with<br \/>\ncohort of test respondents who will take the survey and provide feedback. On<br \/>\nfinalization, the firm Prolific has been <span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>contracted to administer the survey to a<br \/>\ncohort of 4,000 individual representative of the U.S. population, with 400<br \/>\nrespondents per product category. <\/p>\n<p style=\"cursor: auto; color: inherit;\">Statistical analysis of the survey responses will be done to<br \/>\nestablish correlations between demographics, knowledge, attitudes, and<br \/>\nbehaviors. This analysis will be developed into a journal submission. <\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">What is the impact on the development of the principal<br \/>\ndiscipline(s) of the project?<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">In the world of data security there is a need for formalized<br \/>\nwork assessing data security for Electronic devices, and to work towards<br \/>\ninterventions to improve outcomes. The privacy of data on end-of-life consumer<br \/>\nelectronics is largely unexplored in computing security. <\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">We aim to write a set of \u201cflag-planting\u201d papers and engage<br \/>\nin outreach activities that raises the importance of the topic among academia,<br \/>\nindustry and policy-makers, leading to increased research activities and<br \/>\ninterventions.<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">What is the impact on other disciplines?<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">In the world of sustainability, assessing and managing electronic<br \/>\nwaste is a research area in its own right. Thus far the role of privacy<br \/>\nconcerns in the management of e-waste is largely unexplored. In particular this<br \/>\nwork aims to promote beneficial reuse and repair of devices. Anecdotally it is<br \/>\nknown that concerns over data contained in devices leads to stockpiling at<br \/>\nhome, which inhibits reuse and recycling. However, there is no formal research<br \/>\ncharacterizing the extent of security concern\/stockpiling effect or how to<br \/>\nmanage it. We expect that the research of this project will bring attention,<br \/>\nand hopefully intervention, to improving sustainability outcomes of end-of-life<br \/>\nelectronics through better management of security concerns. <\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\">What is the impact on society beyond science and technology?<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">The research is directly relevant to managing issues of<br \/>\nconcern to modern society: data security and waste management. Outreach<br \/>\nactivities are planned to bring the journal research to broader audiences, such<br \/>\nas popular media articles. The goal is for the research to inform interventions<br \/>\nin device design and informing consumers that will improve security and<br \/>\nsustainability outcomes.<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 22pt; cursor: auto; color: inherit;\">Guidelines<br \/>\nto write the paper:<\/span><\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The research paper should be of publication-level<br \/>\nquality.<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The paper must include all of the&nbsp;<b style=\"cursor: auto; color: inherit;\">following<br \/>\nsections and address each component<\/b>&nbsp;mentioned therein:<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u2022 Abstract \u2013 summarizing the key points of the<br \/>\nresearch motivations, approach, and findings in a focused and concise format<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u2022 Introduction and literature review \u2013 providing<br \/>\nthe context, motivation, and importance of the research problem, particularly<br \/>\nas it relates to&nbsp;<b style=\"cursor: auto; color: inherit;\">addressing a sustainability challenge<\/b>. This must<br \/>\ndemonstrate the student\u2019s ability to review and critically evaluate scientific<br \/>\nliterature to document and explain past work on the research topic and identify<br \/>\nthe knowledge gap that the student\u2019s research seeks to fill. The student may<br \/>\nchoose to provide integrated or separate introduction and literature review<br \/>\nsections, following conventions of journal articles in their domain.<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u2022 Methods \u2013 presenting a clear and reproducible<br \/>\nmethodology used to carry out research, collect data, and analyze findings, and<br \/>\nalso justifying why the selected method is appropriate for addressing the<br \/>\nidentified research problem. Format and content of the methods section will<br \/>\nvary significantly across analytical, empirical, and\/or qualitative research<br \/>\napproaches, and students are encouraged to follow the conventions of published<br \/>\njournal articles within their specific domain.<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u2022 Results and discussion \u2013 effectively presenting<br \/>\nresults that illustrate the key research findings and interpreting these<br \/>\nresults in the context of both the student\u2019s research goal and the novelty and<br \/>\nsignificance of results relative to past work in the field.<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u2022 Conclusions \u2013 summarizing key points of the<br \/>\narticle relative to the&nbsp;<b style=\"cursor: auto; color: inherit;\">sustainability challenge being addressed<\/b>&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8216;Privacy Risks and Environmental Impacts&nbsp;of End-of-Use Electronic Devices: An Empirical Analysis.&#8217;&nbsp;&nbsp; &nbsp; Summary: The study investigates the dual challenges of data security and environmental&nbsp;sustainability concerning the disposal of electronic devices. To gather the data, a survey was conducted across the ten most used internet-connected device categories, collecting over 4000 responses based on the latest US [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/25925"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=25925"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/25925\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=25925"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=25925"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=25925"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=25925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}