Forensic Investigation of Drug and Food Crimes in Digital Marketplace
DOI:
https://doi.org/10.51519/journalisi.v7i1.882Keywords:
Digital Forensics, Marketplace, Drug and Food, Crime, CyberspaceAbstract
This research holds great significance as it is anticipated to safeguard customers from harmful frug and food products in cyberspace and to enforce the law by offering solid evidence to bring criminals to justice. Furthermore, this research helps to better understand how crimes that take place in the marketplace are committed, which enables the implementation of more effective preventive measures. Besides, in order to combat cybercrime, the findings of this study may serve as the foundation for the creation of more effective digital forensic investigation techniques. In order to perform digital forensic investigations of drug and food offenses using the marketplace, this study aims to develop an efficient and successful model or implementation guideline. This seeks to methodically direct the inquiry process while adhering to relevant norms. The objective of this research endeavor is to provide a model or practical guideline that is both effective and efficient for using the marketplace to undertake digital forensic investigations of drug and food crimes. This seeks to methodically direct the research process while adhering to relevant criteria. The following stages make up the Design Science Research (DSR) method of research: The issue in this project is "How to conduct a digital forensic investigation for Drug and Food crimes using the marketplace so that it can be used as evidence in court?" Then, in order to adopt answers from related research and make adjustments linked to research difficulties, a literature review is conducted to locate prior research. A model or implementation guideline for performing digital forensic investigations of the marketplace is the type of solution or artifact anticipated in this project. The next phase is solution design, which involves using an existing forensic investigation framework to create an artifact design. Following every step of the framework, case study experiments are then conducted to test the artifact design. The examination of the artifact design by both experts and consumers is the last phase.
Downloads
References
E. A. Wibowo, “Pemanfaatan Teknologi e-Commerce Dalam Proses Bisnis,” Equilibria, vol. 1, no. 1, pp. 95–108, 2014.
M. I. Alghamdi, “Digital Forensics in Cyber Security—Recent Trends, Threats, and Opportunities,” in Cybersecurity Threats with New Perspectives (CSTNP), 2021.
William and H. W. Aripradono, “Faktor Keputusan Pembelian Konsumen Online Marketplace Indonesia,” Teknika, vol. 9, no. 1, pp. 48–57, Jul. 2020, doi: 10.34148/teknika.v9i1.269.
BPOM RI, “Laporan Kinerja 2021 Deputi Bidang Penindakan,” Badan Pengawas Obat dan Makanan Republik Indonesia (BPOM), Jakarta, 2021.
N. Yalçın and B. Kılıç, “ISO/IEC 27037, ISO/IEC 27041, ISO/IEC 27042 ve ISO/IEC 27043 Standartlarına Göre Sayısal Kanıtlar,” in Proc. 4th Int. Symp. Innovative Approaches Eng. Natural Sci., Jul. 2019, pp. 444–449, doi: 10.36287/setsci.4.6.118.
G. Dorai, S. Hutchinson, B. Rodriguez, and U. Karabiyik, “Mobile Commerce - Analysis and Investigation of the Online Safety, Privacy, and Data Forensics of Amazon and Etsy Apps,” in Proc. Hawaii Int. Conf. Syst. Sci., 2023, doi: 10.24251/HICSS.2023.533.
S. S. Zehra and S. Qadir, “Forensic Data Analysis of Delivery and Transport Applications,” in Proc. Int. Conf. Cyber Warfare Secur., IEEE, Dec. 2022, pp. 62–68, doi: 10.1109/ICCWS56285.2022.9998473.
K. K. Kiptoo, “A Forensic Investigation Framework For Android On-Demand Ride Applications,” M.S. thesis, Strathmore Univ., Nairobi, Kenya, 2020.
S. Pasha and S. Saleem, “Forensics Analysis of Wish-Shopping Made Fun Application on Android,” in Proc. Int. Conf. Frontiers Inf. Technol., IEEE, Dec. 2019, pp. 144–1445, doi: 10.1109/FIT47737.2019.00036.
D. Hayes, C. Snow, and S. Altuwayjiri, “A Dynamic and Static Analysis of the Uber Mobile Application from a Privacy Perspective,” J. Inf. Syst. Appl. Res., vol. 11, no. 1, pp. 11–22, 2018.
M. R. Nasution, Y. Prayudi, and A. Luthfi, “Investigating Social Media User Activity on Android Smartphone,” Int. J. Comput. Appl., vol. 183, no. 48, pp. 46–52, Jan. 2022, doi: 10.5120/ijca2022921890.
N. Anwar, S. A. Akbar, A. Azhari, and I. Suryanto, “Ekstraksi Logis Forensik Mobile pada Aplikasi E-Commerce Android,” Mobile Forensics, vol. 2, no. 1, pp. 1–10, Mar. 2020, doi: 10.12928/mf.v2i1.1791.
A. Luthfi and Y. Prayudi, “Process Model of Digital Forensics Readiness Scheme (DFRS) as a Recommendation of Digital Evidence Preservation,” in Proc. Int. Conf. Cyber Secur., Cyber Warfare Digit. Forensic, IEEE, Oct. 2015, pp. 117–122, doi: 10.1109/CyberSec.2015.31.
D. K. Wibowo, A. Luthfi, Y. Prayudi, E. Ramadhani, and M. Maulana, “Faux Insider Hazard Investigation on Non-Public Cloud Computing by Using ADAM’s Technique,” J. RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 6, no. 6, pp. 1028–1036, Dec. 2022, doi: 10.29207/resti.v6i6.4714.
A. Hevner, S. March, J. Park, and S. Ram, “Design Science in Information Systems Research,” MIS Q., vol. 28, no. 1, p. 75, 2004, doi: 10.2307/25148625.
Downloads
Published
Issue
Section
License
Authors Declaration
- The Authors certify that they have read, understood, and agreed to the Journal of Information Systems and Informatics (JournalISI) submission guidelines, policies, and submission declaration. The submission has been prepared using the provided template.
- The Authors certify that all authors have approved the publication of this manuscript and that there is no conflict of interest.
- The Authors confirm that the manuscript is their original work, has not received prior publication, is not under consideration for publication elsewhere, and has not been previously published.
- The Authors confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- The Authors confirm that the manuscript is not copied from or plagiarized from any other published work.
- The Authors declare that the manuscript will not be submitted for publication in any other journal or magazine until a decision is made by the journal editors.
- If the manuscript is finally accepted for publication, the Authors confirm that they will either proceed with publication immediately or withdraw the manuscript in accordance with the journal’s withdrawal policies.
- The Authors agree that, upon publication of the manuscript in this journal, they transfer copyright or assign exclusive rights to the publisher, including commercial rights














