Forensics Investigation Analysis of Cyberbullying on IMO Messenger Services Using Association of Chief Police Officers Method

  • Imam Riadi Universitas Ahmad Dahlan
  • Sunardi Sunardi Universitas Ahmad Dahlan
  • Yana Safitri Universitas Ahmad Dahlan
Keywords: ACPO, Cyberbullying, Digital Forensic, Mobile Forensic, IMO Messenger

Abstract

The development of computer technology is increasing very rapidly. This has both positive and negative impacts. One of the negative impact is committing acts of cyberbullying. This study uses the ACPO method to investigate the cyberbullying crimes through evidence that will be found. The ACPO method in the Imo Messenger investigation has four stages, namely Plan, Capture, Analysis, and Present. Digital data in the form of 16 conversation text, 29 user ID, 6 deleted data, and a group used as parameters in the research process. The test was performed using the tool of MOBILEdit Forensic Express. The results based on the digital data obtained 100% of conversation text, user ID, and group, while 0% for deleted data.

References

[1] J. Li, Y. Wu, and T. Hesketh, “Computers in Human Behavior Internet use and cyberbullying : Impacts on psychosocial and psychosomatic wellbeing among Chinese adolescents,” Computers in Human Behavior, vol. 138, no. February 2022, p. 107461, 2023.
[2] M. Sari, I. Sembiring, and H. D. Purnomo, “Analisis Kualitas Layanan Jaringan Internet di Daerah Perbatasan Analysis o f Frontier ’ s Internet Network Quality,” vol. 4, no. 2, pp. 205–216, 2022.
[3] B. Fakiha, “Effectiveness of Forensic Firewall in Protection of Devices from Cyberattacks,” vol. 12, no. 1, pp. 77–82, 2022.
[4] P. M. Nirmala Dharmapatni and N. L. P. Merawati, “Penerapan Algoritma Support Vector Machine Dalam Sentimen Analisis Terkait Kenaikan Tarif BPJS Kesehatan,” Jurnal Bumigora Information Technology (BITe), vol. 2, no. 2, pp. 105–112, 2020.
[5] S. R. Ardiningtias, “Forensik Digital Kasus Penyebaran Pornografi pada Aplikasi Facebook Messenger Berbasis Android Menggunakan Kerangka Kerja National Institute of Justice,” vol. 7, no. 3, pp. 322–328, 2021.
[6] I. Riadi, A. Yudhana, S. Informasi, U. A. Dahlan, T. Elektro, F. T. Industri, U. A. Dahlan, T. Informatika, F. T. Industri, and U. A. Dahlan, “Forensik Mobile pada Layanan Media Sosial LinkedIn,” vol. 6, no. 1, pp. 9–20, 2021.
[7] R. N. Dasmen, F. Kurniawan, T. Komputer, U. B. Darma, S. Inggris, U. B. Darma, and D. Forensik, “Digital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media Sosial,” vol. 20, no. 4, pp. 527–539, 2021.
[8] O. C. Hang and A. S. Media, “Cyberbullying Lexicon for Social Media,” 2019.
[9] M. Yao, C. Chelmis, and D. S. Zois, “Cyberbullying ends here: Towards robust detection of cyberbullying in social media,” The Web Conference 2019 - Proceedings of the World Wide Web Conference, 2019, pp. 3427–3433, 2019.
[10] M. A. Al-Garadi, M. R. Hussain, N. Khan, G. Murtaza, H. F. Nweke, I. Ali, G. Mujtaba, H. Chiroma, H. A. Khattak, and A. Gani, “Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms: Review of Literature and Open Challenges,” IEEE Access, vol. 7, pp. 70 701–70 718, 2019.
[11] K. Gibson, “Bridging the digital divide: Reflections on using WhatsApp instant messenger interviews in youth research,” Qualitative Research in Psychology, vol. 19, no. 3, pp. 611–631, 2022.
[12] J. Son, Y. Woong, D. Bin, and K. Kim, “Forensic Science International : Digital Investigation Forensic analysis of instant messengers : Decrypt Signal , Wickr , and Threema,” Forensic Science International: Digital Investigation, vol. 40, p. 301347, 2022.
[13] G. Fanani, I. Riadi, and A. Yudhana, “Analisis Forensik Aplikasi Michat Menggunakan Metode Digital Forensics Research Workshop,” JURNAL MEDIA INFORMATIKA BUDIDARMA, vol. 6, no. 2, p. 1263, apr 2022.
[14] R. A. Ramadhan and D. Mualfah, “Implementasi Metode National Institute of Justice (NIJ) Pada Fitur TRIM SOLID STATE DRIVE (SSD) Dengan Objek Eksperimental Sistem Operasi Windows, Linux dan Macintosh,” IT Journal Research and Development, vol. 5, no. 2, pp. 183–192, 2020.
[15] H. H. Lwin, W. P. Aung, and K. K. Lin, “Comparative Analysis of Android Mobile Forensics Tools,” 2020 IEEE Conference on Computer Applications, ICCA 2020, pp. 1–6, 2020
16] I. Riadi, “Analisis Forensik Smartphone Android Menggunakan Metode NIST dan Tool MOBILedit Forensic Express,” vol. 5, no. 1, pp. 89–94, 2020.
[17] G. Humphries, R. Nordvik, H. Manifavas, P. Cobley, and M. Sorell, “Forensic Science International : Digital Investigation Law enforcement educational challenges for mobile forensics,” Forensic Science International: Digital Investigation, vol. 38, p. 301129, 2021.
[18] T. Hermawan and L. Roselina, “Android Forensic Tools Analysis for Unsend Chat on Social Media,” pp.233–238, 2021.
[19] S. R. A. Muhammad Abdul Aziz, Wicaksono Yuli Sulistyo, “Komparatif Anti Forensik Aplikasi Instant Messaging Berbasis Web Menggunakan Metode Association of Chief Police Officers ( ACPO ),” vol. 1, no. 1, pp. 8–15, 2021.
[20] M. Riskiyadi, “Investigasi Forensik Terhadap Bukti Digital Dalam Mengungkap Cybercrime,” Cyber Security dan Forensik Digital, vol. 3, no. 2, pp. 12–21, 2020.
[21] R. Sistem, S. S. Informasi, U. A. Dahlan, S. T. Elektro, U. A. Dahlan, P. Studi, T. Informatika, and U. A. Dahlan, “Investigasi Cyberbullying pada WhatsApp Menggunakan Digital Forensics,” vol. 1, no. 10, pp.730–735, 2021.
[22] S. Sunardi and I. Riadi, “Penerapan Metode Static Forensics untuk Ekstraksi File Steganografi,” June, 2020.
[23] R. A. Bintang, R. Umar, and A. Yudhana, “Analisis Media Sosial Facebook Lite dengan tools Forensik menggunakan Metode NIST,” Techno (Jurnal Fakultas Teknik, Universitas Muhammadiyah Purwokerto), vol. 21, no. 2, p. 125, 2020.
Published
2023-06-30
Section
Articles