Enhancing Digital Forensic Investigation: A Focus on Compact Electronic Devices and Social Media Metadata
Abstract
The rise of portable electronic devices and social media has led to new criminal activities, necessitating advancements in digital forensics. This paper introduces Small-Scale Digital Device Forensics (SSDDF), focusing on the forensic examination of miniature digital devices often used in crimes. SSDDF addresses the challenges posed by these devices, particularly in extracting and analyzing data from them. A key aspect of this research is exploring ontology in social media forensics, particularly within the Android operating system. This involves extracting digital evidence like user accounts, messages, and images from social media platforms. While the paper primarily focuses on social media data, it acknowledges the importance of the devices used in crimes. The integration of SSDDF and the analysis of Android system structures are highlighted as key advancements in digital forensic methodologies. These enhancements are expected to improve the process of collecting and analyzing digital evidence from both compact electronic devices and social media platforms. The study offers significant contributions to the field of digital forensics. It provides new strategies for more efficient and effective forensic investigations, especially in the context of extracting and analyzing digital evidence from small electronic devices and social media, thus paving the way for more robust digital evidence handling in future forensic inquiries.
Downloads
References
We Are Social, “Digital 2022: Indonesia - DataReportal - Global Digital Insights,” DateReportal. Accessed: Sep. 15, 2022. [Online]. Available: https://datareportal.com/reports/digital-2022-indonesia
P. Qurrota Ayun, “Fenomena Remaja Menggunakan Media Sosial dalam Membentuk Identitas,” CHANNEL Jurnal Komunikasi, vol. 3, no. 2, pp. 1–16, Oct. 2015, doi: 10.12928/channel.v3i2.3270.
Mulawarman and A. D. Nurfitri, “Perilaku Pengguna Media Sosial beserta Implikasinya Ditinjau dari Perspektif Psikologi Sosial Terapan,” Buletin Psikologi, vol. 25, no. 1, pp. 36–44, Jun. 2017, doi: 10.22146/buletinpsikologi.22759.
A. Sagiyanto and N. Ardiyanti, “Self Disclosure melalui media sosial Instagram (Studi Kasus Pada Anggota Galeri Quote),” Nyimak (Journal of Communication), vol. 2, no. 1, pp. 81–94, Aug. 2018, doi: 10.31000/nyimak.v2i1.687.
R. Aditia, “Fenomena Phubbing: Suatu Degradasi Relasi Sosial Sebagai Dampak Media Sosial,” KELUWIH: Jurnal Sosial dan Humaniora, vol. 2, no. 1, pp. 8–14, Apr. 2021, doi: 10.24123/soshum.v2i1.4034.
Y. N. Bulele and T. Wibowo, “Analisis fenomena sosial media dan kaum milenial: Studi kasus Tiktok,” Conference on Business, Social Sciences and Innovation Technology, vol. 1, no. 1, pp. 565–572, 2020, [Online]. Available: http://journal.uib.ac.id/index.php/cbssit
M. Rifauddin, “Fenomena Cyberbullying pada Remaja,” Khizanah al-Hikmah : Jurnal Ilmu Perpustakaan, Informasi, dan Kearsipan, vol. 4, no. 1, pp. 35–44, Jun. 2016, doi: 10.24252/kah.v4i1a3.
R. Pakpahan, “Analisis fenomena Hoax diberbagai media sosial dan cara menanggulangi Hoax,” Konferensi Nasional Ilmu Sosial & Teknologi (KNiST), vol. 1, no. 1, pp. 479–484, Mar. 2017, Accessed: Sep. 17, 2022. [Online]. Available: http://seminar.bsi.ac.id/knist/index.php/UnivBSI/article/view/184
R. Rustandi, “Analisis Framing Kontra Narasi Terorisme dan Radikalisme di Media Sosial (Studi Kasus pada Akun @dutadamaijabar),” Jurnal Komunikatif, vol. 9, no. 2, pp. 134–153, Dec. 2020, doi: 10.33508/jk.v9i2.2698.
M. Nur Faiz, W. Adi Prabowo, and M. Fajar Sidiq, “Journal of Informatics, Information System, Software Engineering and Applications Studi Komparasi Investigasi Digital Forensik pada Tindak Kriminal,” vol. 1, no. 1, pp. 63–70, 2018, doi: 10.20895/INISTA.V1I1.
D. Ranđelović and D. Stojković, “Possibilities of autopsy tool use for forensic purposes,” Nauka, bezbednost, policija, vol. 17, no. 3, pp. 19–33, 2012.
N. M. Karie and H. S. Venter, “Toward a general ontology for digital forensic disciplines,” J Forensic Sci, vol. 59, no. 5, pp. 1231–1241, 2014, doi: 10.1111/1556-4029.12511.
D. C. Harrill and R. P. Mislan, “A Small Scale Digital Device Forensics ontology,” Small Scale Digital Device Forensics Journal, vol. 1, no. 1, pp. 1–7, 2007.
E. Kalemi and S. Yildirim-yayilgan, “Ontologies for Social Media Digital Evidence,” no. January, 2016.
E. Kalemi, S. Yildirim-Yayilgan, E. Domnori, and O. Elezaj, “SMoNt: An ontology for crime solving through social media,” Int J Metadata Semant Ontol, vol. 12, no. 2–3, pp. 71–81, 2017, doi: 10.1504/IJMSO.2017.090756.
“Download Magisk Manager Latest Version 26.3 For Android 2023.” Accessed: Sep. 18, 2023. [Online]. Available: https://magiskmanager.com/
“GitHub - topjohnwu/Magisk: The Magic Mask for Android.” Accessed: Sep. 18, 2023. [Online]. Available: https://github.com/topjohnwu/Magisk
M.-R. Boueiz, “Importance of rooting in an Android data acquisition,” in 2020 8th International Symposium on Digital Forensics and Security (ISDFS), IEEE, Jun. 2020, pp. 1–4. doi: 10.1109/ISDFS49300.2020.9116445.
“Android Debug Bridge (adb) | Android Studio | Android Developers.” Accessed: Sep. 18, 2023. [Online]. Available: https://developer.android.com/tools/adb
H. H. Lwin, W. P. Aung, and K. K. Lin, “Comparative Analysis of Android Mobile Forensics Tools.”
T. Almehmadi and O. Batarfi, “Impact of Android Phone Rooting on User Data Integrity in Mobile Forensics,” in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), IEEE, May 2019, pp. 1–6. doi: 10.1109/CAIS.2019.8769520.
“BusyBox.” Accessed: Sep. 18, 2023. [Online]. Available: https://www.busybox.net/
Download PDF: 707 times
Copyright (c) 2023 Journal of Information Systems and Informatics
This work is licensed under a Creative Commons Attribution 4.0 International License.
- I certify that I have read, understand and agreed to the Journal of Information Systems and Informatics (Journal-ISI) submission guidelines, policies and submission declaration. Submission already using the provided template.
- I certify that all authors have approved the publication of this and there is no conflict of interest.
- I confirm that the manuscript is the authors' original work and the manuscript has not received prior publication and is not under consideration for publication elsewhere and has not been previously published.
- I confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- I confirm that the paper now submitted is not copied or plagiarized version of some other published work.
- I declare that I shall not submit the paper for publication in any other Journal or Magazine till the decision is made by journal editors.
- If the paper is finally accepted by the journal for publication, I confirm that I will either publish the paper immediately or withdraw it according to withdrawal policies
- I Agree that the paper published by this journal, I transfer copyright or assign exclusive rights to the publisher (including commercial rights)