CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Cyberbullying Detection on TikTok using Association of Chief Police Officers

by Pangestika Rona Leonsa, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 3
Year of Publication: 2024
Authors: Pangestika Rona Leonsa, Imam Riadi
10.5120/ijca2024923359

Pangestika Rona Leonsa, Imam Riadi . Cyberbullying Detection on TikTok using Association of Chief Police Officers. International Journal of Computer Applications. 186, 3 ( Jan 2024), 6-13. DOI=10.5120/ijca2024923359

@article{ 10.5120/ijca2024923359,
author = { Pangestika Rona Leonsa, Imam Riadi },
title = { Cyberbullying Detection on TikTok using Association of Chief Police Officers },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2024 },
volume = { 186 },
number = { 3 },
month = { Jan },
year = { 2024 },
issn = { 0975-8887 },
pages = { 6-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number3/33051-2024923359/ },
doi = { 10.5120/ijca2024923359 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:29:35.945410+05:30
%A Pangestika Rona Leonsa
%A Imam Riadi
%T Cyberbullying Detection on TikTok using Association of Chief Police Officers
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 3
%P 6-13
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Along with increasingly rapid technological developments, the growth of social media users is also increasing, as is cybercrime activity. Social media applications in Indonesia, such as TikTok are ranked second with the most users in the world. So this application is vulnerable to cyber crimes such as cyberbullying. This research aims to investigate the TikTok application in cases of cyberbullying. The research object that will be discussed in this research is the Tiktok application which runs on Android-based smartphones. This research uses the Association of Chief Police Officers (ACPO) method which has four research stages: planning, collection, analysis, and presentation. The tools used in this research are MOBILedit Forensic Express, Magnet AXIOM, and DB Browser for SQLite. The research results show that the MOBILedit Forensic Express forensic tool obtained forensic accuracy calculation results with a percentage of 85%. AXIOM Magnet obtained forensic accuracy calculation results with a percentage of 91%. DB Browser for SQLite obtained forensic accuracy calculation results with a percentage of 87%. Based on research results, the tool can retrieve evidence in the form of application information, usernames, messages, contacts, and deleted messages.

References
  1. N. Al Mutawa, I. Baggili, and A. Marrington, “Forensic Analysis of Social Networking Applications on Mobile Devices,” Digit. Investig., vol. 9, no. 3, pp. 24–33, 2020, doi: 10.1016/j.diin.2012.05.007.
  2. C. Pasquini, I. Amerini, and G. Boato, “Media Forensics on Social Media Platforms: a Survey,” Eurasip J. Inf. Secur., vol. 1, no. 4, pp. 2–19, 2021, doi: 10.1186/s13635-021-00117-2.
  3. R. Junco and S. R. Cotten, “Perceived Academic Effects of Instant Messaging use,” Comput. Educ., vol. 56, no. 2, pp. 370–378, Feb. 2011, doi: 10.1016/j.compedu.2010.08.020.
  4. M. R. Nasution, Y. Prayudi, and A. Luthfi, “Investigating Social Media User Activity on Android Smartphone,” Int. J. Comput. Appl., vol. 183, no. 48, pp. 46–52, 2022, doi: 10.5120/ijca2022921890.
  5. C. Wu and J. Wang, “Analysis of Cyberterrorism and Online Social Media,” 4th Int. Conf. Mod. Manag. Educ. Technol. Soc. Sci. (MMETSS 2019), vol. 351, no., pp. 925–927, 2019, doi: 10.2991/mmetss-19.2019.189.
  6. we are social dan hootsuite, “Hootsuite (We are Social): Indonesian Digital Report 2023.” Accessed: Sep. 12, 2023. [Online]. Available: https://andi.link/hootsuite-we-are-social-indonesian-digital-report-2023/
  7. V. L. Schul’tz, V. V. Kul’ba, A. B. Shelkov, and L. V. Bogatyryova, “Scenario Analysis of Improving the Effectiveness of Cybercrime Investigation Management Problems,” Int. Fed. Autom. Control - Pap. OnLine, vol. 54, no. 13, pp. 155–160, 2021, doi: 10.1016/j.ifacol.2021.10.437.
  8. https://datareportal.com/, “Tiktok Users, Stats, Data & Trends.” Accessed: Sep. 16, 2023. [Online]. Available: https://datareportal.com/essential-tiktok-stats?utm_source=DataReportal&utm_medium=Country_Article_Hyperlink&utm_campaign=Digital_2023&utm_term=Indonesia&utm_content=Facebook_Stats_Link
  9. P. Domingues, R. Nogueira, J. C. Francisco, and M. Frade, “Analyzing tiktok from a digital forensics perspective,” J. Wirel. Mob. Networks, Ubiquitous Comput. Dependable Appl., vol. 12, no. 3, pp. 87–115, 2021, doi: 10.22667/JOWUA.2021.09.30.087.
  10. N. Hoang Khoa, P. The Duy, H. Do Hoang, D. Thi Thu Hien, and V. H. Pham, “Forensic Analysis of TikTok Application to Seek Digital Artifacts on Android Smartphone,” Proc. - 2020 RIVF Int. Conf. Comput. Commun. Technol. RIVF 2020, vol. 8, no. 4, pp. 6–11, 2020, doi: 10.1109/RIVF48685.2020.9140739.
  11. P. Widiandana, I. Riadi, and Sunardi, “Investigasi Cyberbullying pada WhatsApp Menggunakan Digital Forensics Research Workshop,” J. Eng. Sci. Technol., vol. 1, no. 3, pp. 730–735, 2019.
  12. T. Milosevic et al., “Effectiveness of Artificial Intelligence Based Cyberbullying Interventions From Youth Perspective,” Soc. Media Soc., vol. 9, no. 1, pp. 2–12, 2023, doi: 10.1177/20563051221147325.
  13. Z. Khyioon Abdalrdha, A. Mohsin Al-Bakry, and A. K. Farhan, “A Survey on Cybercrime Using Social Media,” Iraqi J. Comput. Informatics, vol. 49, no. 1, pp. 52–65, 2023, doi: 10.25195/ijci.v49i1.404.
  14. W. N. A. W. Ali, T. Q. Ni, and S. Z. S. Idrus, “Social Media Cyberbullying: Awareness and Prevention through Anti Cyberbully Interactive Video (ACIV),” J. Phys. Conf. Ser., vol. 1529, no. 3, pp. 1–12, 2020, doi: 10.1088/1742-6596/1529/3/032071.
  15. A. A. A. Aradhana and C. S. Pangaribuan, “Cyberbullying in Media Social: A Mainstreaming the Victim Protection Principles in Indonesian Criminal Justice System,” Indones. Media Law Rev., vol. 1, no. 2, pp. 99–122, 2022, doi: 10.15294/imrev.v1i2.60587.
  16. N. Muthi’ah, U. Mono, and A. B. Perangin-Angin, “Indonesian Cyberbullying Issues: The Impoliteness in Communication,” Int. J. Educ. Lang. Relig., vol. 4, no. 2, p. 96, 2022, doi: 10.35308/ijelr.v4i2.5684.
  17. D. Setiana, T. Marlina, N. Norainna, B. Alifya, and S. Susanto, “Managing Cyberbullying Impacts In Time of Digital Ecosystem (Lesson Learned from TeensVictims-Actors Evidence from Jakarta ),” Adv. Soc. Sci. Educ. Humanit. Res., vol. 592, no. Iclhr, pp. 172–181, 2021.
  18. Y. W. Riyayanatasya and R. Rahayu, “Involvement of Teenage-Students in Cyberbullying on WhatsApp,” J. Komun. Indones., vol. 9, no. 1, pp. 1–9, 2020, doi: 10.7454/jki.v9i1.11824.
  19. P. V Chavan, “Digital Forensics Based Analysis of Mobile Phones,” J. Android IOS Appl. Test., vol. 4, no. 3, pp. 5–8, 2019.
  20. H. Arshad, A. Bin Jantan, and O. I. Abiodun, “Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence,” J. Inf. Process. Syst., vol. 14, no. 2, pp. 346–376, 2020, doi: 10.3745/JIPS.03.0095.
  21. I. Riadi, A. Yudhana, and G. P. Inngam Fanani, “Mobile Forensic Tools for Digital Crime Investigation: Comparison and Evaluation,” Int. J. Saf. Secur. Eng., vol. 13, no. 1, pp. 11–19, 2023, doi: 10.18280/ijsse.130102.
  22. M. Reith, C. Carr, and G. Gunsch, “An Examination of Digital Forensic Models,” 2002. doi: 10.1.1.13.9683.
  23. S. H. Belshaw, “Next Generation of Evidence Collecting: The Need for Digital Forensics in Criminal Justice Education,” J. Cybersecurity Educ. Res. Pract., vol. 1, no. 3, pp. 1–19, 2019, doi: 10.1109/JCERSP53098.2021.0011.
  24. J. P. A. Yaacoub, H. N. Noura, O. Salman, and A. Chehab, “Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations,” Internet of Things (Netherlands), vol. 19, no. 4, pp. 56–66, 2022, doi: 10.1016/j.iot.2022.100544.
  25. P. Sukamto, Ispandi, Arman Syah Putra, Nurul Aisyah, and Rohmat Toufiq, “Forensic Digital Analysis for CCTV Video Recording,” Int. J. Sci. Technol. Manag., vol. 3, no. 1, pp. 284–291, 2022, doi: 10.46729/ijstm.v3i1.460.
  26. A. T. Banowati and S. Nugraha, “Pengaruh Kepribadian Dark Triad terhadap Perilaku Cyberbullying pada Pengguna Media Sosial,” Bandung Conf. Ser. Psychol. Sci., vol. 4, no. 2, pp. 682–689, 2022, [Online]. Available: https://proceedings.unisba.ac.id/index.php/BCSPS/article/view/2879
  27. A. Monica Hartono, M. Syukron Febriananda, D. Vita Achmada, P. Ilmu Komunikasi, and J. Ilmu Sosial, “Tiktok Sebagai PlatformVenting Mendorong Cyberbullying Gen-Z,” Pros. Semin. Nas. Ilmu Ilmu Sos. 2022, vol. 2022, no. 13, pp. 13–22, 2022.
  28. A. R. Javed, W. Ahmed, M. Alazab, Z. Jalil, K. Kifayat, and T. R. Gadekallu, “A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions,” IEEE Access, vol. 10, no. 5, pp. 11065–11089, 2022, doi: 10.1109/ACCESS.2022.3142508.
  29. I. Riadi, R. Umar, and G. Fauzan, “Audio Forensics on Smartphone with Digital Forensics Research Workshop (DFRWS) Method,” 2021. doi: https://doi.org/10.21512/commit.v15i1.6739.
  30. H. H. Lwin, W. P. Aung, and K. K. Lin, “Comparative Analysis of Android Mobile Forensics Tools,” 2020 IEEE Conf. Comput. Appl., vol. 3, no. 1, pp. 1–6, 2020, doi: 10.1109/ICCA49400.2020.9022838.
  31. M. Iqbal and B. Soewito, “Digital Forensics on Solid State Drive (SSD) with TRIM Feature Enabled and Deep Freeze Configuration Using Static Forensic Methods and ACPO Framework Muhammad,” Int. J. Comput. Sci. Inf. Secur., vol. 18, no. 11, pp. 44–56, 2020, doi: https://doi.org/10.5281/zenodo.4428141.
  32. K. A. Latif, R. Hammad, T. T. Sujaka, K. Marzuki, and A. S. Anas, “Forensic Whatsapp Investigation Analysis on Bluestack Simulator Device Using Live Forensic Method With ACPO Standard,” Int. J. Inf. Syst. Technol., vol. 5, no. 3, pp. 331–338, 2021, doi: https://doi.org/10.30645/ijistech.v5i3.148.
  33. H. Lallie and L. Pimlott, “Applying the ACPO Principles in Public Cloud Forensic Investigations,” J. Digit. Forensics, Secur. Law, 2012, doi: 10.15394/jdfsl.2012.1113.
  34. I. Riadi, A. Yudhana, and G. Fanani, “Comparative Analysis of Forensic Software on Android-based MiChat using ACPO and DFRWS Framework,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 7, no. 2, pp. 286–292, Mar. 2023, doi: 10.29207/resti.v7i2.4547.
  35. R. Y. Prasongko, A. Yudhana, and I. Riadi, “Analisis Penggunaan Metode ACPO (Association of Chief Police Officer) pada Forensik WhatsApp,” J. Sains Komput. Inform., vol. 6, no. 2, pp. 1112–1120, 2022, doi: 10.30645/j-sakti.v6i2.520.
Index Terms

Computer Science
Information Sciences

Keywords

ACPO Cyberbullying Forensics Mobile TikTok.