Social Media Metadata Forensic Ontology Model

Authors

  • Ibnu Rohan Tuharea Universitas Islam Indonesia
  • Ahmad Luthfi Universitas Islam Indonesia
  • Erika Ramadani Universitas Islam Indonesia

DOI:

https://doi.org/10.12928/mf.v5i2.8937

Keywords:

Ontology, RDF, OWL, Social Media, Digital Forensics, Smartphone

Abstract

The escalating use of compact electronic gadgets like smartphones and smartwatches, along with social media platforms, has led to a new dimension of criminal activities. Advancements in digital forensics, which investigates digital evidence, have become noteworthy. Researchers David Christopher Harrill and Richard P. Mislan devised Small-Scale Digital Device Forensics (SSDDF) for examining miniature digital devices used in criminal undertakings. Edlira Kalemi and Sule Yildirim-Yayilgan demonstrated the application of ontology in social media forensics, deciphering Android system frameworks related to social media data extraction. However, their investigations mainly focused on social media, overlooking the role of gadgets used by criminals and victims. Extracting digital data from these devices remains pivotal for securing relevant evidence from social media. Notwithstanding, incorporating SSDDF and understanding Android system structures have significantly contributed to digital forensic methodologies. These enhancements can bolster the investigation process, capturing and analyzing critical digital evidence from compact electronic appliances and social media platforms. The advent of SSDDF and elucidating Android system structures have offered invaluable inputs to digital forensics, enhancing efficacy in amassing significant evidence from small electronic devices and social media platforms.

References

We Are Social, “Digital 2022: Indonesia - DataReportal - Global Digital Insights,” DateReportal, 2022. https://datareportal.com/reports/digital-2022-indonesia (accessed Sep. 15, 2022).

P. Qurrota Ayun, “Fenomena Remaja Menggunakan Media Sosial dalam Membentuk Identitas,” CHANNEL Jurnal Komunikasi, vol. 3, no. 2, pp. 1–16, Oct. 2015, doi: 10.12928/channel.v3i2.3270.

Mulawarman and A. D. Nurfitri, “Perilaku Pengguna Media Sosial beserta Implikasinya Ditinjau dari Perspektif Psikologi Sosial Terapan,” Buletin Psikologi, vol. 25, no. 1, pp. 36–44, Jun. 2017, doi: 10.22146/buletinpsikologi.22759.

A. Sagiyanto and N. Ardiyanti, “SELF DISCLOSURE MELALUI MEDIA SOSIAL INSTAGRAM (Studi Kasus Pada Anggota Galeri Quote),” Nyimak (Journal of Communication), vol. 2, no. 1, pp. 81–94, Aug. 2018, doi: 10.31000/nyimak.v2i1.687.

R. Aditia, “Fenomena Phubbing: Suatu Degradasi Relasi Sosial Sebagai Dampak Media Sosial,” KELUWIH: Jurnal Sosial dan Humaniora, vol. 2, no. 1, pp. 8–14, Apr. 2021, doi: 10.24123/soshum.v2i1.4034.

Y. N. Bulele and T. Wibowo, “ANALISIS FENOMENA SOSIAL MEDIA DAN KAUM MILENIAL: STUDI KASUS TIKTOK,” Conference on Business, Social Sciences and Innovation Technology, vol. 1, no. 1, pp. 565–572, 2020, [Online]. Available: http://journal.uib.ac.id/index.php/cbssit

M. Rifauddin, “Fenomena Cyberbullying pada Remaja,” Khizanah al-Hikmah : Jurnal Ilmu Perpustakaan, Informasi, dan Kearsipan, vol. 4, no. 1, pp. 35–44, Jun. 2016, doi: 10.24252/kah.v4i1a3.

R. Pakpahan, “ANALISIS FENOMENA HOAX DIBERBAGAI MEDIA SOSIAL DAN CARA MENANGGULANGI HOAX,” Konferensi Nasional Ilmu Sosial & Teknologi (KNiST), vol. 1, no. 1, pp. 479–484, Mar. 2017, Accessed: Sep. 17, 2022. [Online]. Available: http://seminar.bsi.ac.id/knist/index.php/UnivBSI/article/view/184

R. Rustandi, “Analisis Framing Kontra Narasi Terorisme dan Radikalisme di Media Sosial (Studi Kasus pada Akun @dutadamaijabar),” Jurnal Komunikatif, vol. 9, no. 2, pp. 134–153, Dec. 2020, doi: 10.33508/jk.v9i2.2698.

M. Nur Faiz, W. Adi Prabowo, and M. Fajar Sidiq, “Journal of Informatics, Information System, Software Engineering and Applications Studi Komparasi Investigasi Digital Forensik pada Tindak Kriminal,” vol. 1, no. 1, pp. 63–70, 2018, doi: 10.20895/INISTA.V1I1.

D. Ranđelović and D. Stojković, “Possibilities of autopsy tool use for forensic purposes,” Nauka, bezbednost, policija, vol. 17, no. 3, pp. 19–33, 2012.

D. C. Harrill and R. P. Mislan, “A Small Scale Digital Device Forensics ontology,” Small Scale Digital Device Forensics Journal, vol. 1, no. 1, pp. 1–7, 2007.

N. M. Karie and H. S. Venter, “Toward a general ontology for digital forensic disciplines,” J Forensic Sci, vol. 59, no. 5, pp. 1231–1241, 2014, doi: 10.1111/1556-4029.12511.

E. Kalemi and S. Yildirim-yayilgan, “Ontologies for Social Media Digital Evidence,” no. January, 2016.

E. Kalemi, S. Yildirim-Yayilgan, E. Domnori, and O. Elezaj, “SMoNt: An ontology for crime solving through social media,” Int J Metadata Semant Ontol, vol. 12, no. 2–3, pp. 71–81, 2017, doi: 10.1504/IJMSO.2017.090756.

“Download Magisk Manager Latest Version 26.3 For Android 2023.” https://magiskmanager.com/ (accessed Sep. 18, 2023).

“GitHub - topjohnwu/Magisk: The Magic Mask for Android.” https://github.com/topjohnwu/Magisk (accessed Sep. 18, 2023).

M.-R. Boueiz, “Importance of rooting in an Android data acquisition,” in 2020 8th International Symposium on Digital Forensics and Security (ISDFS), IEEE, Jun. 2020, pp. 1–4. doi: 10.1109/ISDFS49300.2020.9116445.

H. H. Lwin, W. P. Aung, and K. K. Lin, “Comparative Analysis of Android Mobile Forensics Tools.”

“Android Debug Bridge (adb) | Android Studio | Android Developers.” https://developer.android.com/tools/adb (accessed Sep. 18, 2023).

T. Almehmadi and O. Batarfi, “Impact of Android Phone Rooting on User Data Integrity in Mobile Forensics,” in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), IEEE, May 2019, pp. 1–6. doi: 10.1109/CAIS.2019.8769520.

“BusyBox.” https://www.busybox.net/ (accessed Sep. 18, 2023).

Downloads

Published

2023-09-30

Issue

Section

Articles