CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

Web Forensic for Hate Speech Content on Twitter Services using National Institute of Standard Technology Method

by Suryani, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 40
Year of Publication: 2021
Authors: Suryani, Imam Riadi

Suryani, Imam Riadi . Web Forensic for Hate Speech Content on Twitter Services using National Institute of Standard Technology Method. International Journal of Computer Applications. 183, 40 ( Dec 2021), 30-38. DOI=10.5120/ijca2021921798

@article{ 10.5120/ijca2021921798,
author = { Suryani, Imam Riadi },
title = { Web Forensic for Hate Speech Content on Twitter Services using National Institute of Standard Technology Method },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2021 },
volume = { 183 },
number = { 40 },
month = { Dec },
year = { 2021 },
issn = { 0975-8887 },
pages = { 30-38 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2021921798 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-07T01:19:17.723794+05:30
%A Suryani
%A Imam Riadi
%T Web Forensic for Hate Speech Content on Twitter Services using National Institute of Standard Technology Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 40
%P 30-38
%D 2021
%I Foundation of Computer Science (FCS), NY, USA

Technological developments in addition to bringing many positive impacts also have negative impacts. The sophistication of various applications today allows the increase in crime cases online. These cases include gambling online, spreading hoax news, fraud, hate speech, cyberbullying, cyberporn, and other cyber cases. These crimes online are very often found in various social media applications, one of which is the Twitter application which is a social networking site that allows users to share things or events that are happening around the world. Users post tweets that can contain photos, videos, links, and text. This research conducts forensics on the Twitter application accessed via the web browser Chrome as the browser with the most users in Indonesia in 2020 according to Stat Counter. The research was conducted using case scenarios based on original cases obtained from various sources. The stages used in this research are the stages from the National Institute of Standards and Technology. These stages are collection, examination, analysis, and reporting. The process of collecting digital evidence is carried out using several forensic tools, namely Belkasoft RAM Capturer, FTK Imager, Browser History Capturer, and Browser History Viewer. This research produces digital evidence in the form of tweets previously deleted or posts that can be retrieved, along with other data. The percentage of results of the digital evidence that has been found successfully 100%.InBelkasoft RAM Capturer and FTK Imager is 50% with digital evidence of text posted, username, password, and web browser history. In Browser History Capturer and Browser History Viewer is 50%with digital evidence of image posted, web browser history, profile photo of the twitter account, and time accessed. The results of this research managed to find evidence of posts that have been deleted.

  1. P. Widiandana, I. Riadi, and Sunardi, “Cyberbullying Forensic Investigation Analysis on Whatsapp Messenger Using the NIST Method” Semin. Nas. Teknol. Fak. Tekinik Univ. Krisnadwipayana, pp. 488–493, 2019, [Online]. Available:
  2. D. Hariyadi and I. Y. Pasa, “Dual Apps Whatsapp on Xiaomi Smartphones” J. INTEK, vol. 1, pp. 1–7, 2018.
  3. G. H. A. Kusuma and Y. Fadhilah, “Digital Forensic Analysis of E-Commerce on Car Rental Websites Using the NIST Method” Pros. Semin. Nas. SISFOTEK, vol. 3, no. 1, pp. 228–234, 2019.
  4. R. Umar and Sahiruddin, “NIST Method For Forensic Analysis Of Digital Evidence On Android Devices” Pros. SENDU_U_2019, pp. 978–979, 2019.
  5. W. A. Mukti, S. U. Masruroh, and D. Khairani, “Analysis and Comparison of Forensic Evidence Facebook and Twitter Social Media Applications on Android Smartphones” J. Tek. Inform., vol. 10, no. 1, pp. 73–84, 2018, doi: 10.15408/jti.v10i1.6820.
  6. N. Iman, A. Susanto, and R. Inggi, “Analysis of the Digital Forensics in Cybercrime Investigations in Indonesia (Systematic Review)” J. Telekomun. dan Komput., vol. 9, no. 3, p. 186, 2020, doi: 10.22441/incomtech.v9i3.7210.
  7. I. Riadi, R. Umar, and A. Firdonsyah, “Identification Of Digital Evidence On Android’s Blackberry Messenger Using NIST Mobile Forensic Method,” Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 5, pp. 3–8, 2017.
  8. A. Fauzan, I. Riadi, and A. Fadlil, “Digital Forensic Analysis On Line Messenger For Cybercrime Handling” Annu. Res. Semin., vol. 2, no. 1, pp. 159–163, 2017, [Online]. Available:
  9. S. Marini, “Digital Forensic Studies in Regulation in Indonesia” Semin. Nas. Energi Tek, pp. 103–106, 2018.
  10. T. Rochmadi, “Live Forensics for Anti-Forensic Analysis on a Web Browser Browzar Study Case” Indones. J. Bus. Intell., vol. 1, no. 1, p. 32, 2019, doi: 10.21927/ijubi.v1i1.878.
  11. M. Jannah, “Forensic Browser on Line Messenger Services for Handling Cyberfraud using National Institute of Standard Technology Method,” vol. 183, no. 30, pp. 9–16, 2021.
  12. T. Pandela and I. Riadi, “Browser Forensics on Web-based Tiktok Applications,” Int. J. Comput. Appl., vol. 175, no. 34, pp. 47–52, 2020, doi: 10.5120/ijca2020920897.
  13. D. Setiawan, R. Setiawan, R. Karunia, and I. W. S. Wicaksana, “Comparing Web Browser Performances” Ilmu Komput. Univ. Gunadarma, vol. 1, no. 1, pp. 1–6, 2007.
  14. K. Widatama, “Digital Evidence Storage Cabinet Concept Using XML Language Structure” no. September, pp. 8–14, 2017.
  15. A. Ivanović, The Wa y of Handling Evidence of Criminal Offences of Computer Crime. 2018.
  16. Y. Prayudi and D. S. Afrianto, “Anticipate Cybercrime Using Forensic Computer Techniques” J. Fak. Huk. UII, vol. 2005, no. Snati, 2005, [Online]. Available:
  17. M. S. Ahmad, I. Riadi, and Y. Prayudi, “Live Forensics Investigation From User Side To Analyze Man in the Middle Attack Attack Based on Evil Twin” Ilk. J. Ilm., vol. 9, no. 1, pp. 1–8, 2017, doi: 10.33096/ilkom.v9i1.103.1-8.
  18. M. Saifulloh and A. Ernanda, “Communication Privacy Management for Teenagers Alter Ego Account Users on Twitter” WACANA, J. Ilm. Ilmu Komun., vol. 17, no. 2, p. 235, 2018, doi: 10.32509/wacana.v17i2.652.
  19. R. Saputra and I. Riadi, “Forensic Browser of Twitter based on Web Services,” Int. J. Comput. Appl., vol. 175, no. 29, pp. 34–39, 2020, doi: 10.5120/ijca2020920832.
  20. M. Musyafaa, “Hate Speech: Perspectives and Ethics in Cyber Media” J. Ilm. Syi’ar, vol. 17, no. 2, p. 21, 2017, doi: 10.29300/syr.v17i2.891.
  21. H. Nurhairani and I. Riadi, “Analysis Forensics Mobile on Twitter Application using the National Institute of Justice (NIJ) Method,” Int. J. Comput. Appl., vol. 177, no. 27, pp. 35–42, 2019, doi: 10.5120/ijca2019919749.
  22. D. J. Ningrum, S. Suryadi, and D. E. Chandra Wardhana, “Hate Speech Study on Social Media” J. Ilm. KORPUS, vol. 2, no. 3, pp. 241–252, 2019, doi: 10.33369/jik.v2i3.6779.
  23. T. Davidson, D. Warmsley, M. Macy, and I. Weber, “Automated hate speech detection and the problem of offensive language,” Proc. 11th Int. Conf. Web Soc. Media, ICWSM 2017, pp. 512–515, 2017.
  24. A. Yudhana, I. Riadi, and I. Anshori, “Facebook Messenger Digital Evidence Analysis Using the NIST Method” It J. Res. Dev., vol. 3, no. 1, pp. 13–21, 2018, doi: 10.25299/itjrd.2018.vol3(1).1658.
  25. C. K. Herawati, “Forensic Browser on Facebook Services using National Institute of Standards Technology Method,” vol. 183, no. 30, pp. 17–24, 2021.
Index Terms

Computer Science
Information Sciences


Forensic Hate speech Twitter Browser NIST