Mobile Forensic for Body Shaming Investigation Using Association of Chief Police Officers Framework
DOI:
https://doi.org/10.30812/matrik.v22i3.2987Keywords:
Body Shaming, Digital Forensic, Mobile Forensic, IMO MessengerAbstract
Body shaming is the act of making fun of or embarrassing someone because of their appearance, including the shape or form of their body. Body shaming can occur directly or indirectly. MOBILEdit Forensic Express and Forensic ToolKit (FTK) Imager are used to perform testing of evidence gathered through Chat, User ID, Data Deletion, and Groups based on digital data obtained on IMO Messenger tokens on Android smartphones. This study aimed to collect evidence of conversations in body shaming cases using the Association of Chiefs of Police (ACPO) framework with MOBILedit Forensic Express and FTK Imager as a tool for testing. Based on the research findings, MOBILedit Forensic Express got an extraction yield of 0.75%. In contrast, using the FTK Imager got an extraction yield of 0.25%. The ACPO framework can be used to investigate cases of body shaming using mobile forensics tools so that the extraction results can be found. The results of this study contributed to forensic mobile knowledge in cases of body shaming or cyberbullying ACPO framework as well as for the investigators.
Downloads
References
U. A. Dahlan, “Forensik Mobile pada Layanan Media Sosial LinkedIn,†vol. 6, no. 1, pp. 9–20, 2021.
[2] B. Fakiha, “Effectiveness of Forensic Firewall in Protection of Devices from Cyberattacks,†vol. 12, no. 1, pp. 77–82, 2022.
[3] A. Alanda, D. Satria, H. A. Mooduto, and B. Kurniawan, “Mobile Application Security Penetration Testing Based on OWASP,â€
IOP Conference Series: Materials Science and Engineering, vol. 846, no. 1, pp. 1–13, 2020.
[4] N. Setyaningsih, “Metode NIJ Untuk Analisis Forensik Layanan Dropbox Pada Smartphone Android,†vol. 2, no. 6, pp. 1–10,
2022.
[5] I. Riadi, “Analisis Forensik Smartphone Android Menggunakan Metode NIST dan Tool MOBILedit Forensic Express,†vol. 5,
no. 1, pp. 89–94, 2020.
[6] R. Y. Patil and S. R. Devane, “Network Forensic Investigation Protocol to Identify True Origin of Cyber Crime,†Journal of
King Saud University - Computer and Information Sciences, vol. 34, no. 5, pp. 2031–2044, 2022.
[7] K. Gibson, “Bridging the digital divide: Reflections on using WhatsApp instant messenger interviews in youth research,â€
Qualitative Research in Psychology, vol. 19, no. 3, pp. 611–631, 2022.
[8] R. Sistem, S. S. Informasi, U. A. Dahlan, S. T. Elektro, U. A. Dahlan, P. Studi, T. Informatika, and U. A. Dahlan, “Investigasi
Cyberbullying pada WhatsApp Menggunakan Digital Forensics,†vol. 1, no. 10, pp. 730–735, 2021.
[9] G. M. Abaido, “Cyberbullying on social media platforms among university students in the United Arab Emirates,†International
Journal of Adolescence and Youth, vol. 25, no. 1, pp. 407–420, 2020.
[10] S. R. Ardiningtias, “Forensik Digital Kasus Penyebaran Pornografi pada Aplikasi Facebook Messenger Berbasis Android Menggunakan
Kerangka Kerja National Institute of Justice,†vol. 7, no. 3, pp. 322–328, 2021.
[11] O. C. Hang and A. S. Media, “Cyberbullying Lexicon for Social Media,†2019.
[12] I. Anshori, K. Eka, S. Putri, and U. Ghoni, “Analisis Barang Bukti Digital Aplikasi Facebook Messenger Pada Smartphone
Android Menggunakan Metode NIJ,†vol. 5, no. 2, pp. 118–134, 2021.
[13] S. Sotnik, T. Shakurova, and V. Lyashenko, “Development Features Web-Applications,†vol. 7, no. 1, pp. 79–85, 2023.
[14] S. Sunardi and I. Riadi, “Penerapan Metode Static Forensics untuk Ekstraksi File Steganografi,†no. June, 2020.
[15] A. K. Priyanka and S. S. Smruthi, “WebApplication Vulnerabilities:Exploitation and Prevention,†Proceedings of the 2nd International
Conference on Inventive Research in Computing Applications, ICIRCA 2020, pp. 729–734, 2020.
[16] R. N. Dasmen, F. Kurniawan, T. Komputer, U. B. Darma, S. Inggris, U. B. Darma, and D. Forensik, “Digital Forensik Deleted
Cyber Crime Evidence pada Pesan Instan Media Sosial,†vol. 20, no. 4, pp. 527–539, 2021.
[17] M. El-tayeb, A. Taha, and Z. Taha, “Ing´enierie des Syst`emes d ’ Information Streamed Video Reconstruction for Firefox
Browser Forensics,†vol. 26, no. 4, pp. 337–344, 2021.
[18] J. Son, Y. Woong, D. Bin, and K. Kim, “Forensic Science International : Digital Investigation Forensic analysis of instant
messengers : Decrypt Signal , Wickr , and Threema,†Forensic Science International: Digital Investigation, vol. 40, p. 301347,
2022.
[19] J. Mobile, “FORENSIK WEB LAYANAN INSTANT MESSAGING MENGGUNAKAN METODE ASSOCIATION OF
CHIEF,†vol. 1, no. 1, pp. 29–38, 2019.
[20] T. Hermawan and L. Roselina, “Android Forensic Tools Analysis for Unsend Chat on Social Media,†pp. 233–238, 2021.
[21] R. Y. Prasongko, A. Yudhana, and I. Riadi, “Analisis Penggunaan Metode ACPO (Association of Chief Police Officer) pada
Forensik WhatsApp,†Jurnal Sains Komputer & Informatika (J-SAKTI, vol. 6, no. 2, pp. 1112–1120, 2022.
[22] I. A. Plianda and R. Indrayani, “Analisa dan Perbandingan Performa Tools Forensik Digital pada Smartphone Android menggunakan
Instant Messaging Whatsapp,†Jurnal Media Informatika Budidarma, vol. 6, no. 1, p. 500, 2022.
[23] I. Riadi, H. Herman, and N. H. Siregar, “Mobile Forensic of Vaccine Hoaxes on Signal Messenger using DFRWS Framework,â€
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer, vol. 21, no. 3, pp. 489–502, 2022.
[24] G. Fanani, I. Riadi, and A. Yudhana, “Analisis Forensik Aplikasi Michat Menggunakan Metode Digital Forensics Research
Workshop,†vol. 6, no. April, pp. 1263–1271, 2022.
[25] K. A. Latif, R. Hammad, T. T. Sujaka, K. Marzuki, and A. S. Anas, “Forensic Whatsapp Investigation Analysis on Bluestack
Simulator Device Using Live Forensic Method With ACPO Standard,†International Journal of Information System &
Technology Akreditasi, vol. 5, no. 3, pp. 331–338, 2021.
[26] F. Anggraini, H. Herman, and A. Yudhana, “Analisis Forensik Aplikasi TikTok Pada Smartphone Android Menggunakan Framework
Association of Chief Police Officers,†JURIKOM (Jurnal Riset Komputer), vol. 9, no. 4, p. 1117, 2022.
[27] M. R. Setyawan and F. Tella, “Forensic Analysis Of Dana Applications Using The ACPO Framework,†vol. 8, pp. 1–8, 2023.
Downloads
Published
Issue
Section
How to Cite
Similar Articles
- Ahmat Adil, ANALYSIS PROXIMITY MENENTUKAN LOKASI PERKEBUNAN DI LOMBOK BARAT , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 15 No. 1 (2015)
- Nora Dery Sofya, Shinta Esabella, Rodianto Rodianto, RANCANG BANGUN APLIKASI KAMUS BAHASA SUMBAWA BERBASIS ANDROID , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 17 No. 1 (2017)
- Muhamad Azwar, Eka Nurul Qomaliyah, Nurul Indriani, Development of a Smart System for Optimizing Treatment Using Forward Chaining Method , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
- Ismarmiaty Ismarmiaty, Adam Bachtiar, ANALISIS PENGARUH VARIABEL MODEL UTAUT TERHADAP PENERIMAAN DAN PENGGUNAAN APLIKASI BADAN PENYELENGGARA JAMINAN SOSIAL (BPJS) KESEHATAN DI KOTA MATARAM , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 17 No. 1 (2017)
- Kasiyanto Kasiyanto, Aripriharta Aripriharta, Dekki Widiatmoko, Dodo Irmanto, Muhammad Cahyo Bagaskoro, Hostage Liberation Operations using Wheeled Robots Based on LIDAR (Light Detection and Ranging) Sensors , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
- Elly Mufida, Martini Martini, Ady Hermawan, Perancangan Apilkasi Parenting Penguatan Perilaku Positif Anak oleh Orang Tua Berbasis Android , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 17 No. 2 (2018)
- Heru Pramono Hadi, Eko Hari Rachmawanto, Rabei Raad Ali, Comparison of DenseNet-121 and MobileNet for Coral Reef Classification , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
- Gustin Setyaningsih, Muhamad Awiet Wiedanto Prasetyo, Debby Ummul Hidayah, Penerapan Aplikasi Media Pembelajaran pada SMP N 1 Nusawungu Berbasis Smartphone Android , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 18 No. 2 (2019)
- Imanuddin Imanuddin, Fachrid Alhadi, Raza Oktafian, Ahmad Ihsan, Deteksi Mata Mengantuk pada Pengemudi Mobil Menggunakan Metode Viola Jones , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 18 No. 2 (2019)
- Achmad Lukman, Wahju Tjahjo Saputro, Erni Seniwati, Improving Performance Convolutional Neural Networks Using Modified Pooling Function , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- sri suharti, Anton Yudhana, Imam Riadi, Forensik Jaringan DDoS menggunakan Metode ADDIE dan HIDS pada Sistem Operasi Proprietary , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Imam Riadi, Abdul Fadlil, Muhammad Amirul Mu'min, OWASP Framework-based Network Forensics to Analyze the SQLi Attacks on Web Servers , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Miftahuddin Fahmi, Anton Yudhana, Sunardi Sunardi, Image Processing Using Morphology on Support Vector Machine Classification Model for Waste Image , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Imam Riadi, Herman Herman, Fitriah Fitriah, Suprihatin Suprihatin, Optimizing Inventory with Frequent Pattern Growth Algorithm for Small and Medium Enterprises , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 1 (2023)
- Joko Supriyanto, Abdul Fadlil, Sunardi Sunardi, Pengujian Kualitatif Aplikasi Informasi Gempa Bumi dalam Bentuk Suara untuk Tunanetra , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Virdiana Sriviana Fatmawaty, Imam Riadi, Herman Herman, Higher Education Institution Clustering Based on Key Performance Indicators using Quartile Binning Method , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 1 (2024)
- Imam Riadi, Herman Herman, Nur Hamida Siregar, Mobile Forensic of Vaccine Hoaxes on Signal Messenger using DFRWS Framework , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Lilik Widyawati, Imam Riadi, Yudi Prayudi, Comparative Analysis of Image Steganography using SLT, DCT and SLT-DCT Algorithm , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 1 (2020)