CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Digital Forensic Signal Instant Messages Services in Case of Cyberbullying using Digital Forensic Research Workshop Method

by Aji Gelar Prayogo, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 32
Year of Publication: 2022
Authors: Aji Gelar Prayogo, Imam Riadi
10.5120/ijca2022922393

Aji Gelar Prayogo, Imam Riadi . Digital Forensic Signal Instant Messages Services in Case of Cyberbullying using Digital Forensic Research Workshop Method. International Journal of Computer Applications. 184, 32 ( Oct 2022), 21-29. DOI=10.5120/ijca2022922393

@article{ 10.5120/ijca2022922393,
author = { Aji Gelar Prayogo, Imam Riadi },
title = { Digital Forensic Signal Instant Messages Services in Case of Cyberbullying using Digital Forensic Research Workshop Method },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2022 },
volume = { 184 },
number = { 32 },
month = { Oct },
year = { 2022 },
issn = { 0975-8887 },
pages = { 21-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number32/32518-2022922393/ },
doi = { 10.5120/ijca2022922393 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:22:56.905615+05:30
%A Aji Gelar Prayogo
%A Imam Riadi
%T Digital Forensic Signal Instant Messages Services in Case of Cyberbullying using Digital Forensic Research Workshop Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 32
%P 21-29
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Advances in information technology have a negative impact, including the public can freely act in cybercrimes. One of the popular instant messaging services is Signal Instant Messenger, which can trigger cyber crimes such as cyberbullying, pornography, gambling, fraud, and phishing. Cyberbullying crimes can occur as long as the application used provides features to send text messages, pictures, or videos. This study aims to analyze digital evidence so that it can be identified as a case of cyberbullying on the Signal Instant Messenger application.The investigation process uses one of the methods of the Digital Forensic Research Workshop (DFRWS) framework, with stages including identification, preservation, collection, examination, analysis, and presentation in the digital evidence search process. The digital forensic tools used to collect evidence are MOBILedit Forensic Express Pro, Belkasoft Evidence Center, and SQLite DB Browser. The process of identifying digital evidence uses a repetition of words that contain ridicule or insult to the victim so that the perpetrator is identified as committing cyberbullying.The results of this study are in the form of digital evidence in the form of reports to be analyzed and used to support cyberbullying investigations in court. This study obtained the results that the actions or conversations that led to cyberbullying were as many as 4 people, 2 as victims, and 1 as witness in accordance with the expected research objectives, even though they had not been able to read deleted or accidentally deleted chats.

References
  1. A. Sugeng Cahyono, “The Influence of Social Media on Social Changes in Indonesian,” Asy Syar’Iyyah J. Shari’ah Sci. Islam. Bank., vol. 5, no. 2, pp. 202–225, 2020, doi: 10.32923/asy.v5i2.1586.
  2. G. Fanani, I. Riadi, and A. Yudhana, “Michat Application Forensic Analysis Using Digital Forensics Research Workshop Method,” vol. 6, no. April, pp. 1263–1271, 2022, doi: 10.30865/mib.v6i2.3946.
  3. I. Riadi, Herman, and N. H. Siregar, “Mobile Forensics in Cyber Fraud Cases on Signal Messenger Service Using the NIST Method,” vol. 3, no. 28, pp. 137–144, 2021.
  4. A. Widiastuti, “Positive And Negative Impacts of Technology,” Http://Staffnew.Uny.Ac.Id, 2012, [Online]. Available: http://dheanda478.blogspot.co.id/2012/11/dampak-positif-dan-negatif-teknologi.html
  5. R. Hughes, “Chapter II. Cyber Crime,” J. Chem. Inf. Model., vol. 53, no. 9, p. 287, 2008.
  6. A. P. Utama Siahaan, “Cybercrime Violations and the Power of Jurisdiction in Indonesian,” J. Eng. Informatics, vol. 5, no. 1, pp. 6–9, 2018.
  7. “Facts + Statistics: Identity theft and cybercrime | III.” https://www.iii.org/fact-statistic/facts-statistics-identity-theft-and-cybercrime (accessed Aug. 21, 2022).
  8. “Indonesian Police handle 4,656 cyber cases, with defamation being the most common.” https://www.cnnindonesia.com/nasional/20201229094838-12-587280/polri-tangani-4656-kasus-siber-pencemaran-nama-baik-dominan (accessed Aug. 25, 2022).
  9. M. Yusuf and A. Cherid, “Implementation of the Cosine Similarity Algorithm and PHP-Based TF-IDF Method to Generate Seminar Recommendations,” Sci. J. Fac. Comput. Sci., vol. 9, no. 1, pp. 8–16, 2020.
  10. A. Ababneh, M. A. Awwad, and M. I. Al-Saleh, “IMO forensics in Android and windows systems,” 2017 8th Int. Conf. Information, Intell. Syst. Appl. IISA 2017, vol. 2018-Janua, pp. 1–6, Mar. 2018, doi: 10.1109/IISA.2017.8316377.
  11. M. Button and C. Cross, “Cyber Frauds.,” p. 232, 2017, [Online]. Available: https://books.google.co.uk/books?hl=en&lr=&id=GggqDwAAQBAJ&oi=fnd&pg=PP1&dq=ransomware+targeting+charities&ots=yWNs5vQOHj&sig=-lzDnFxe0e0kfYMHkJ0VGSHPZx0#v=onepage&q&f=false
  12. M. Van Uden, “Rocchio : Relevance Feedback in Learning Classification Algorithms,” Proc. ACM SIGIR Conf., 1998, [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.53.3960&rep=rep1&type=pdf
  13. W. Sanjaya, B. Sugiantoro, and Y. Prayudi, “An Offline Forensic Method For Digital Artifact Analysis In The TOR Browser On Linux Operating System,” JITU J. Inform. Technol. Commun., vol. 4, no. 2, pp. 41–51, 2020, doi: 10.36596/jitu.v4i2.345.
  14. “Digital Evidence and Forensics | National Institute of Justice.” https://nij.ojp.gov/digital-evidence-and-forensics (accessed May 22, 2022).
  15. B. Rahardjo, “Digital Forensics at a Glance,” Sociotechnology, vol. 29, pp. 384–387, 2013.
  16. A. Satria S and D. M. A. Mansyur, “Chapter I Application of Digital Forensics,” Inf. Technol., pp. 1–19, 2005, [Online]. Available: https://repository.unair.ac.id/97887/9/BAB I.pdf
  17. “Signal >> Home Page.” https://signal.org/id/ (accessed Aug. 24, 2022).
  18. D. A. Arifah, “Indonesia’s Cybercrime Case,” J. Bus. Econ., vol. 18, no. 2, pp. 185–195, 2011, [Online]. Available: https://media.neliti.com/media/publications/24189-ID-kasus-cybercrime-di-indonesia.pdf
  19. F. G. Becker et al., “AN EXAMPLE OF CYBER CRIME CASES AND ITS RESOLUTION,” Syria Stud., vol. 7, no. 1, pp. 37–72, 2015, [Online]. Available: https://www.researchgate.net/publication/269107473_What_is_governance/link/548173090cf22525dcb61443/download%0Ahttp://www.econ.upf.edu/~reynal/Civil wars_12December2010.pdf%0Ahttps://think-asia.org/handle/11540/8282%0Ahttps://www.jstor.org/stable/41857625
  20. A. Kharisma, “What is Android?,” Linux You, vol. 15, no. 1, pp. 137–138, 140, 2008, [Online]. Available: https://www.academia.edu/2537177/What_is_Android
  21. A. Yudhana, I. Riadi, and I. Zuhriyanto, “Live Forensics Analysis of Social Media Applications on Browsers Using the Digital Forensics Research Workshop (DFRWS) Method,” Techno, vol. 20, no. 2, pp. 125–130, 2019, [Online]. Available: https://core.ac.uk/download/pdf/270178608.pdf
  22. “Office of Children and Young People ’ s Services Anti- Bullying Strategy,” no. November, 2007, [Online]. Available: https://web.archive.org/web/20120118183631/http://www.cambridgeshire.gov.uk/NR/rdonlyres/470E5F18-2397-416C-B265-087B18DD8E30/0/AntiBullyingStrategyNovember07.pdf
  23. N. Yuliani, “The phenomenon of bullying at school,” J. Chem. Inf. Model., vol. 53, no. 1, pp. 1689–1699, 2013, [Online]. Available: https://www.kemenpppa.go.id/lib/uploads/list/8e022-januari-ratas-bullying-kpp-pa.pdf
  24. T. Feinberg and R. Nicole, Cyberbullying. [Online]. Available: https://www.proquest.com/openview/df7b85db5268ac4d18d07478e8fe197f/1.pdf
  25. P. Studi, T. Informatika, F. Sains, D. A. N. Teknologi, U. Islam, and N. Syarif, “Application of Sentence Tokenization and TF(Term Frequency) Method in Automatic Text Summarizer,” 2014, [Online]. Available: https://repository.uinjkt.ac.id/dspace/bitstream/123456789/57344/1/SALAMAH-FST.pdf
Index Terms

Computer Science
Information Sciences

Keywords

Cyberbullying Digital Forensic DFRWS Signal Messenger Smartphone