Enhancing Digital Forensic Investigation: A Focus on Compact Electronic Devices and Social Media Metadata
DOI:
https://doi.org/10.51519/journalisi.v5i4.594Keywords:
Ontology, Social Media, Digital Forensic, Smartphone, SSDDFAbstract
The rise of portable electronic devices and social media has led to new criminal activities, necessitating advancements in digital forensics. This paper introduces Small-Scale Digital Device Forensics (SSDDF), focusing on the forensic examination of miniature digital devices often used in crimes. SSDDF addresses the challenges posed by these devices, particularly in extracting and analyzing data from them. A key aspect of this research is exploring ontology in social media forensics, particularly within the Android operating system. This involves extracting digital evidence like user accounts, messages, and images from social media platforms. While the paper primarily focuses on social media data, it acknowledges the importance of the devices used in crimes. The integration of SSDDF and the analysis of Android system structures are highlighted as key advancements in digital forensic methodologies. These enhancements are expected to improve the process of collecting and analyzing digital evidence from both compact electronic devices and social media platforms. The study offers significant contributions to the field of digital forensics. It provides new strategies for more efficient and effective forensic investigations, especially in the context of extracting and analyzing digital evidence from small electronic devices and social media, thus paving the way for more robust digital evidence handling in future forensic inquiries.
Downloads
References
We Are Social, “Digital 2022: Indonesia - DataReportal - Global Digital Insights,” DateReportal. Accessed: Sep. 15, 2022. [Online]. Available: https://datareportal.com/reports/digital-2022-indonesia
P. Qurrota Ayun, “Fenomena Remaja Menggunakan Media Sosial dalam Membentuk Identitas,” CHANNEL Jurnal Komunikasi, vol. 3, no. 2, pp. 1–16, Oct. 2015, doi: 10.12928/channel.v3i2.3270.
Mulawarman and A. D. Nurfitri, “Perilaku Pengguna Media Sosial beserta Implikasinya Ditinjau dari Perspektif Psikologi Sosial Terapan,” Buletin Psikologi, vol. 25, no. 1, pp. 36–44, Jun. 2017, doi: 10.22146/buletinpsikologi.22759.
A. Sagiyanto and N. Ardiyanti, “Self Disclosure melalui media sosial Instagram (Studi Kasus Pada Anggota Galeri Quote),” Nyimak (Journal of Communication), vol. 2, no. 1, pp. 81–94, Aug. 2018, doi: 10.31000/nyimak.v2i1.687.
R. Aditia, “Fenomena Phubbing: Suatu Degradasi Relasi Sosial Sebagai Dampak Media Sosial,” KELUWIH: Jurnal Sosial dan Humaniora, vol. 2, no. 1, pp. 8–14, Apr. 2021, doi: 10.24123/soshum.v2i1.4034.
Y. N. Bulele and T. Wibowo, “Analisis fenomena sosial media dan kaum milenial: Studi kasus Tiktok,” Conference on Business, Social Sciences and Innovation Technology, vol. 1, no. 1, pp. 565–572, 2020, [Online]. Available: http://journal.uib.ac.id/index.php/cbssit
M. Rifauddin, “Fenomena Cyberbullying pada Remaja,” Khizanah al-Hikmah : Jurnal Ilmu Perpustakaan, Informasi, dan Kearsipan, vol. 4, no. 1, pp. 35–44, Jun. 2016, doi: 10.24252/kah.v4i1a3.
R. Pakpahan, “Analisis fenomena Hoax diberbagai media sosial dan cara menanggulangi Hoax,” Konferensi Nasional Ilmu Sosial & Teknologi (KNiST), vol. 1, no. 1, pp. 479–484, Mar. 2017, Accessed: Sep. 17, 2022. [Online]. Available: http://seminar.bsi.ac.id/knist/index.php/UnivBSI/article/view/184
R. Rustandi, “Analisis Framing Kontra Narasi Terorisme dan Radikalisme di Media Sosial (Studi Kasus pada Akun @dutadamaijabar),” Jurnal Komunikatif, vol. 9, no. 2, pp. 134–153, Dec. 2020, doi: 10.33508/jk.v9i2.2698.
M. Nur Faiz, W. Adi Prabowo, and M. Fajar Sidiq, “Journal of Informatics, Information System, Software Engineering and Applications Studi Komparasi Investigasi Digital Forensik pada Tindak Kriminal,” vol. 1, no. 1, pp. 63–70, 2018, doi: 10.20895/INISTA.V1I1.
D. Ranđelović and D. Stojković, “Possibilities of autopsy tool use for forensic purposes,” Nauka, bezbednost, policija, vol. 17, no. 3, pp. 19–33, 2012.
N. M. Karie and H. S. Venter, “Toward a general ontology for digital forensic disciplines,” J Forensic Sci, vol. 59, no. 5, pp. 1231–1241, 2014, doi: 10.1111/1556-4029.12511.
D. C. Harrill and R. P. Mislan, “A Small Scale Digital Device Forensics ontology,” Small Scale Digital Device Forensics Journal, vol. 1, no. 1, pp. 1–7, 2007.
E. Kalemi and S. Yildirim-yayilgan, “Ontologies for Social Media Digital Evidence,” no. January, 2016.
E. Kalemi, S. Yildirim-Yayilgan, E. Domnori, and O. Elezaj, “SMoNt: An ontology for crime solving through social media,” Int J Metadata Semant Ontol, vol. 12, no. 2–3, pp. 71–81, 2017, doi: 10.1504/IJMSO.2017.090756.
“Download Magisk Manager Latest Version 26.3 For Android 2023.” Accessed: Sep. 18, 2023. [Online]. Available: https://magiskmanager.com/
“GitHub - topjohnwu/Magisk: The Magic Mask for Android.” Accessed: Sep. 18, 2023. [Online]. Available: https://github.com/topjohnwu/Magisk
M.-R. Boueiz, “Importance of rooting in an Android data acquisition,” in 2020 8th International Symposium on Digital Forensics and Security (ISDFS), IEEE, Jun. 2020, pp. 1–4. doi: 10.1109/ISDFS49300.2020.9116445.
“Android Debug Bridge (adb) | Android Studio | Android Developers.” Accessed: Sep. 18, 2023. [Online]. Available: https://developer.android.com/tools/adb
H. H. Lwin, W. P. Aung, and K. K. Lin, “Comparative Analysis of Android Mobile Forensics Tools.”
T. Almehmadi and O. Batarfi, “Impact of Android Phone Rooting on User Data Integrity in Mobile Forensics,” in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), IEEE, May 2019, pp. 1–6. doi: 10.1109/CAIS.2019.8769520.
“BusyBox.” Accessed: Sep. 18, 2023. [Online]. Available: https://www.busybox.net/
Downloads
Published
Issue
Section
License
Authors Declaration
- The Authors certify that they have read, understood, and agreed to the Journal of Information Systems and Informatics (JournalISI) submission guidelines, policies, and submission declaration. The submission has been prepared using the provided template.
- The Authors certify that all authors have approved the publication of this manuscript and that there is no conflict of interest.
- The Authors confirm that the manuscript is their original work, has not received prior publication, is not under consideration for publication elsewhere, and has not been previously published.
- The Authors confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- The Authors confirm that the manuscript is not copied from or plagiarized from any other published work.
- The Authors declare that the manuscript will not be submitted for publication in any other journal or magazine until a decision is made by the journal editors.
- If the manuscript is finally accepted for publication, the Authors confirm that they will either proceed with publication immediately or withdraw the manuscript in accordance with the journal’s withdrawal policies.
- The Authors agree that, upon publication of the manuscript in this journal, they transfer copyright or assign exclusive rights to the publisher, including commercial rights














