The contribution of this paper is two-fold. To accomplish this, the researchers conducted a single-case, pretest-posttest, quasi experiment using a smartphone device and a suite of Google mobile applications. This research presents a preliminary investigation into the idea that residual artifacts generated by cloud-based synchronized applications can be used to identify broad user behavior patterns. Although security and forensic researchers have been able to recover a variety of artifacts, empirical research has not examined a suite of application artifacts from the perspective of high-level pattern identification. ![]() ![]() As the distinction between personal and organizational device usage continues to blur, the combination of applications that interact increases the need to investigate potential security issues.
0 Comments
Leave a Reply. |