Mobile Forensic for Body Shaming Investigation Using Association of Chief Police Officers Framework
DOI:
https://doi.org/10.30812/matrik.v22i3.2987Keywords:
Body Shaming, Digital Forensic, Mobile Forensic, IMO MessengerAbstract
Body shaming is the act of making fun of or embarrassing someone because of their appearance, including the shape or form of their body. Body shaming can occur directly or indirectly. MOBILEdit Forensic Express and Forensic ToolKit (FTK) Imager are used to perform testing of evidence gathered through Chat, User ID, Data Deletion, and Groups based on digital data obtained on IMO Messenger tokens on Android smartphones. This study aimed to collect evidence of conversations in body shaming cases using the Association of Chiefs of Police (ACPO) framework with MOBILedit Forensic Express and FTK Imager as a tool for testing. Based on the research findings, MOBILedit Forensic Express got an extraction yield of 0.75%. In contrast, using the FTK Imager got an extraction yield of 0.25%. The ACPO framework can be used to investigate cases of body shaming using mobile forensics tools so that the extraction results can be found. The results of this study contributed to forensic mobile knowledge in cases of body shaming or cyberbullying ACPO framework as well as for the investigators.
Downloads
References
U. A. Dahlan, “Forensik Mobile pada Layanan Media Sosial LinkedIn,†vol. 6, no. 1, pp. 9–20, 2021.
[2] B. Fakiha, “Effectiveness of Forensic Firewall in Protection of Devices from Cyberattacks,†vol. 12, no. 1, pp. 77–82, 2022.
[3] A. Alanda, D. Satria, H. A. Mooduto, and B. Kurniawan, “Mobile Application Security Penetration Testing Based on OWASP,â€
IOP Conference Series: Materials Science and Engineering, vol. 846, no. 1, pp. 1–13, 2020.
[4] N. Setyaningsih, “Metode NIJ Untuk Analisis Forensik Layanan Dropbox Pada Smartphone Android,†vol. 2, no. 6, pp. 1–10,
2022.
[5] I. Riadi, “Analisis Forensik Smartphone Android Menggunakan Metode NIST dan Tool MOBILedit Forensic Express,†vol. 5,
no. 1, pp. 89–94, 2020.
[6] R. Y. Patil and S. R. Devane, “Network Forensic Investigation Protocol to Identify True Origin of Cyber Crime,†Journal of
King Saud University - Computer and Information Sciences, vol. 34, no. 5, pp. 2031–2044, 2022.
[7] K. Gibson, “Bridging the digital divide: Reflections on using WhatsApp instant messenger interviews in youth research,â€
Qualitative Research in Psychology, vol. 19, no. 3, pp. 611–631, 2022.
[8] R. Sistem, S. S. Informasi, U. A. Dahlan, S. T. Elektro, U. A. Dahlan, P. Studi, T. Informatika, and U. A. Dahlan, “Investigasi
Cyberbullying pada WhatsApp Menggunakan Digital Forensics,†vol. 1, no. 10, pp. 730–735, 2021.
[9] G. M. Abaido, “Cyberbullying on social media platforms among university students in the United Arab Emirates,†International
Journal of Adolescence and Youth, vol. 25, no. 1, pp. 407–420, 2020.
[10] S. R. Ardiningtias, “Forensik Digital Kasus Penyebaran Pornografi pada Aplikasi Facebook Messenger Berbasis Android Menggunakan
Kerangka Kerja National Institute of Justice,†vol. 7, no. 3, pp. 322–328, 2021.
[11] O. C. Hang and A. S. Media, “Cyberbullying Lexicon for Social Media,†2019.
[12] I. Anshori, K. Eka, S. Putri, and U. Ghoni, “Analisis Barang Bukti Digital Aplikasi Facebook Messenger Pada Smartphone
Android Menggunakan Metode NIJ,†vol. 5, no. 2, pp. 118–134, 2021.
[13] S. Sotnik, T. Shakurova, and V. Lyashenko, “Development Features Web-Applications,†vol. 7, no. 1, pp. 79–85, 2023.
[14] S. Sunardi and I. Riadi, “Penerapan Metode Static Forensics untuk Ekstraksi File Steganografi,†no. June, 2020.
[15] A. K. Priyanka and S. S. Smruthi, “WebApplication Vulnerabilities:Exploitation and Prevention,†Proceedings of the 2nd International
Conference on Inventive Research in Computing Applications, ICIRCA 2020, pp. 729–734, 2020.
[16] R. N. Dasmen, F. Kurniawan, T. Komputer, U. B. Darma, S. Inggris, U. B. Darma, and D. Forensik, “Digital Forensik Deleted
Cyber Crime Evidence pada Pesan Instan Media Sosial,†vol. 20, no. 4, pp. 527–539, 2021.
[17] M. El-tayeb, A. Taha, and Z. Taha, “Ing´enierie des Syst`emes d ’ Information Streamed Video Reconstruction for Firefox
Browser Forensics,†vol. 26, no. 4, pp. 337–344, 2021.
[18] J. Son, Y. Woong, D. Bin, and K. Kim, “Forensic Science International : Digital Investigation Forensic analysis of instant
messengers : Decrypt Signal , Wickr , and Threema,†Forensic Science International: Digital Investigation, vol. 40, p. 301347,
2022.
[19] J. Mobile, “FORENSIK WEB LAYANAN INSTANT MESSAGING MENGGUNAKAN METODE ASSOCIATION OF
CHIEF,†vol. 1, no. 1, pp. 29–38, 2019.
[20] T. Hermawan and L. Roselina, “Android Forensic Tools Analysis for Unsend Chat on Social Media,†pp. 233–238, 2021.
[21] R. Y. Prasongko, A. Yudhana, and I. Riadi, “Analisis Penggunaan Metode ACPO (Association of Chief Police Officer) pada
Forensik WhatsApp,†Jurnal Sains Komputer & Informatika (J-SAKTI, vol. 6, no. 2, pp. 1112–1120, 2022.
[22] I. A. Plianda and R. Indrayani, “Analisa dan Perbandingan Performa Tools Forensik Digital pada Smartphone Android menggunakan
Instant Messaging Whatsapp,†Jurnal Media Informatika Budidarma, vol. 6, no. 1, p. 500, 2022.
[23] I. Riadi, H. Herman, and N. H. Siregar, “Mobile Forensic of Vaccine Hoaxes on Signal Messenger using DFRWS Framework,â€
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer, vol. 21, no. 3, pp. 489–502, 2022.
[24] G. Fanani, I. Riadi, and A. Yudhana, “Analisis Forensik Aplikasi Michat Menggunakan Metode Digital Forensics Research
Workshop,†vol. 6, no. April, pp. 1263–1271, 2022.
[25] K. A. Latif, R. Hammad, T. T. Sujaka, K. Marzuki, and A. S. Anas, “Forensic Whatsapp Investigation Analysis on Bluestack
Simulator Device Using Live Forensic Method With ACPO Standard,†International Journal of Information System &
Technology Akreditasi, vol. 5, no. 3, pp. 331–338, 2021.
[26] F. Anggraini, H. Herman, and A. Yudhana, “Analisis Forensik Aplikasi TikTok Pada Smartphone Android Menggunakan Framework
Association of Chief Police Officers,†JURIKOM (Jurnal Riset Komputer), vol. 9, no. 4, p. 1117, 2022.
[27] M. R. Setyawan and F. Tella, “Forensic Analysis Of Dana Applications Using The ACPO Framework,†vol. 8, pp. 1–8, 2023.
Downloads
Published
Issue
Section
How to Cite
Similar Articles
- Imam Riadi, Herman Herman, Nur Hamida Siregar, Mobile Forensic of Vaccine Hoaxes on Signal Messenger using DFRWS Framework , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- William Barkem, Jeckson Sidabutar, Digital Forensic Analysis of WhatsApp Business Applications on Android-Based Smartphones Using NIST , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Sri Nawangsari, Robby Kurniawan Harahap, Harun Al Rasyid, Nina Herlina, Erik Ekowati, Anugriaty Indah Asmarany, Design of Mobile Digital Healthcare Application For Pregnant Women Based on Android , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 2 (2022)
- Muhammad Furqan Nazuli, Muhammad Fachrurrozi, Muhammad Qurhanul Rizqie, Abdiansah Abdiansah, Muhammad Ikhsan, A Image Classification of Poisonous Plants Using the MobileNetV2 Convolutional Neural Network Model Method , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 2 (2025)
- Nur Fitrianingsih Hasan, Muhammad Salis Amin Iribaram, Digitalisasi Kamus Bahasa Daerah Papua Menggunakan Metode Rapid Application Development , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Eddy Prasetyo Nugroho, Irawan Afrianto, Rini Nuraini Sukmana, Pengukuran Kelayakan Simulator Forensik Digital Menggunakan Metode Multimedia Mania , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 2 (2022)
- Danang Wahyu Utomo, Christy Atika Sari, Folasade Olubusola Isinkaye, Quality Improvement for Invisible Watermarking using Singular Value Decomposition and Discrete Cosine Transform , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 3 (2024)
- Imam Riadi, Abdul Fadlil, Muhammad Amirul Mu'min, OWASP Framework-based Network Forensics to Analyze the SQLi Attacks on Web Servers , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Pradita Dwi Rahman, Heri Wijayanto, Royana Afwani, Wirarama Wesdawara, Ahmad Zafrullah Mardiansyah, Blockchain-Based TraditionalWeaving Certification and Elliptic Curve Digital Signature , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 1 (2024)
- Hafizd Ardiansyah, Agung Fatwanto, Comparison of Memory usage between REST API in Javascript and Golang , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 1 (2022)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Miftahuddin Fahmi, Anton Yudhana, Sunardi Sunardi, Image Processing Using Morphology on Support Vector Machine Classification Model for Waste Image , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- sri suharti, Anton Yudhana, Imam Riadi, Forensik Jaringan DDoS menggunakan Metode ADDIE dan HIDS pada Sistem Operasi Proprietary , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Imam Riadi, Abdul Fadlil, Muhammad Amirul Mu'min, OWASP Framework-based Network Forensics to Analyze the SQLi Attacks on Web Servers , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Joko Supriyanto, Abdul Fadlil, Sunardi Sunardi, Pengujian Kualitatif Aplikasi Informasi Gempa Bumi dalam Bentuk Suara untuk Tunanetra , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Imam Riadi, Herman Herman, Fitriah Fitriah, Suprihatin Suprihatin, Optimizing Inventory with Frequent Pattern Growth Algorithm for Small and Medium Enterprises , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 1 (2023)
- Virdiana Sriviana Fatmawaty, Imam Riadi, Herman Herman, Higher Education Institution Clustering Based on Key Performance Indicators using Quartile Binning Method , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 1 (2024)
- Imam Riadi, Herman Herman, Nur Hamida Siregar, Mobile Forensic of Vaccine Hoaxes on Signal Messenger using DFRWS Framework , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Lilik Widyawati, Imam Riadi, Yudi Prayudi, Comparative Analysis of Image Steganography using SLT, DCT and SLT-DCT Algorithm , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 1 (2020)