Forensic Investigation of Drug and Food Crimes in Digital Marketplace
Abstract
This research holds great significance as it is anticipated to safeguard customers from harmful frug and food products in cyberspace and to enforce the law by offering solid evidence to bring criminals to justice. Furthermore, this research helps to better understand how crimes that take place in the marketplace are committed, which enables the implementation of more effective preventive measures. Besides, in order to combat cybercrime, the findings of this study may serve as the foundation for the creation of more effective digital forensic investigation techniques. In order to perform digital forensic investigations of drug and food offenses using the marketplace, this study aims to develop an efficient and successful model or implementation guideline. This seeks to methodically direct the inquiry process while adhering to relevant norms. The objective of this research endeavor is to provide a model or practical guideline that is both effective and efficient for using the marketplace to undertake digital forensic investigations of drug and food crimes. This seeks to methodically direct the research process while adhering to relevant criteria. The following stages make up the Design Science Research (DSR) method of research: The issue in this project is "How to conduct a digital forensic investigation for Drug and Food crimes using the marketplace so that it can be used as evidence in court?" Then, in order to adopt answers from related research and make adjustments linked to research difficulties, a literature review is conducted to locate prior research. A model or implementation guideline for performing digital forensic investigations of the marketplace is the type of solution or artifact anticipated in this project. The next phase is solution design, which involves using an existing forensic investigation framework to create an artifact design. Following every step of the framework, case study experiments are then conducted to test the artifact design. The examination of the artifact design by both experts and consumers is the last phase.
Downloads
References
E. A. Wibowo, “Pemanfaatan Teknologi e-Commerce Dalam Proses Bisnis,” Equilibria, vol. 1, no. 1, pp. 95–108, 2014.
M. I. Alghamdi, “Digital Forensics in Cyber Security—Recent Trends, Threats, and Opportunities,” in Cybersecurity Threats with New Perspectives (CSTNP), 2021.
William and H. W. Aripradono, “Faktor Keputusan Pembelian Konsumen Online Marketplace Indonesia,” Teknika, vol. 9, no. 1, pp. 48–57, Jul. 2020, doi: 10.34148/teknika.v9i1.269.
BPOM RI, “Laporan Kinerja 2021 Deputi Bidang Penindakan,” Badan Pengawas Obat dan Makanan Republik Indonesia (BPOM), Jakarta, 2021.
N. Yalçın and B. Kılıç, “ISO/IEC 27037, ISO/IEC 27041, ISO/IEC 27042 ve ISO/IEC 27043 Standartlarına Göre Sayısal Kanıtlar,” in Proc. 4th Int. Symp. Innovative Approaches Eng. Natural Sci., Jul. 2019, pp. 444–449, doi: 10.36287/setsci.4.6.118.
G. Dorai, S. Hutchinson, B. Rodriguez, and U. Karabiyik, “Mobile Commerce - Analysis and Investigation of the Online Safety, Privacy, and Data Forensics of Amazon and Etsy Apps,” in Proc. Hawaii Int. Conf. Syst. Sci., 2023, doi: 10.24251/HICSS.2023.533.
S. S. Zehra and S. Qadir, “Forensic Data Analysis of Delivery and Transport Applications,” in Proc. Int. Conf. Cyber Warfare Secur., IEEE, Dec. 2022, pp. 62–68, doi: 10.1109/ICCWS56285.2022.9998473.
K. K. Kiptoo, “A Forensic Investigation Framework For Android On-Demand Ride Applications,” M.S. thesis, Strathmore Univ., Nairobi, Kenya, 2020.
S. Pasha and S. Saleem, “Forensics Analysis of Wish-Shopping Made Fun Application on Android,” in Proc. Int. Conf. Frontiers Inf. Technol., IEEE, Dec. 2019, pp. 144–1445, doi: 10.1109/FIT47737.2019.00036.
D. Hayes, C. Snow, and S. Altuwayjiri, “A Dynamic and Static Analysis of the Uber Mobile Application from a Privacy Perspective,” J. Inf. Syst. Appl. Res., vol. 11, no. 1, pp. 11–22, 2018.
M. R. Nasution, Y. Prayudi, and A. Luthfi, “Investigating Social Media User Activity on Android Smartphone,” Int. J. Comput. Appl., vol. 183, no. 48, pp. 46–52, Jan. 2022, doi: 10.5120/ijca2022921890.
N. Anwar, S. A. Akbar, A. Azhari, and I. Suryanto, “Ekstraksi Logis Forensik Mobile pada Aplikasi E-Commerce Android,” Mobile Forensics, vol. 2, no. 1, pp. 1–10, Mar. 2020, doi: 10.12928/mf.v2i1.1791.
A. Luthfi and Y. Prayudi, “Process Model of Digital Forensics Readiness Scheme (DFRS) as a Recommendation of Digital Evidence Preservation,” in Proc. Int. Conf. Cyber Secur., Cyber Warfare Digit. Forensic, IEEE, Oct. 2015, pp. 117–122, doi: 10.1109/CyberSec.2015.31.
D. K. Wibowo, A. Luthfi, Y. Prayudi, E. Ramadhani, and M. Maulana, “Faux Insider Hazard Investigation on Non-Public Cloud Computing by Using ADAM’s Technique,” J. RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 6, no. 6, pp. 1028–1036, Dec. 2022, doi: 10.29207/resti.v6i6.4714.
A. Hevner, S. March, J. Park, and S. Ram, “Design Science in Information Systems Research,” MIS Q., vol. 28, no. 1, p. 75, 2004, doi: 10.2307/25148625.


Copyright (c) 2025 Journal of Information Systems and Informatics

This work is licensed under a Creative Commons Attribution 4.0 International License.
- I certify that I have read, understand and agreed to the Journal of Information Systems and Informatics (Journal-ISI) submission guidelines, policies and submission declaration. Submission already using the provided template.
- I certify that all authors have approved the publication of this and there is no conflict of interest.
- I confirm that the manuscript is the authors' original work and the manuscript has not received prior publication and is not under consideration for publication elsewhere and has not been previously published.
- I confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- I confirm that the paper now submitted is not copied or plagiarized version of some other published work.
- I declare that I shall not submit the paper for publication in any other Journal or Magazine till the decision is made by journal editors.
- If the paper is finally accepted by the journal for publication, I confirm that I will either publish the paper immediately or withdraw it according to withdrawal policies
- I Agree that the paper published by this journal, I transfer copyright or assign exclusive rights to the publisher (including commercial rights)