Mobile and Forensics http://journal2.uad.ac.id/index.php/mf <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div> <p><strong>Mobile and Forensics (MF)</strong>, ISSN: <a href="https://portal.issn.org/resource/ISSN/2656-6257" target="_blank" rel="noopener">2656-6257</a> E-ISSN:<a href="https://portal.issn.org/resource/ISSN/2714-6685" target="_blank" rel="noopener">2714-6685</a> ,is a international peer-reviewed open access journal organized by the Department of Magister Informatika, Universitas Ahmad Dahlan. It is a <strong>semi-annual journal</strong> published in <strong>March and September.</strong> The main objective of the publication is to create a platform to publish original articles, researches results, case studies, and book reviews related to the field of Mobile Technology and Digital Forensics. The editorial board welcomes original contributions of the author in English which never been published or under consideration for publication in any other publication. All publications are available in full text and are free to download.</p> </div> </div> </div> <table class="m_1585562839703316051image_block" style="width: 100%;" border="0" cellspacing="0" cellpadding="10"> <tbody> <tr> <td> <div style="line-height: 10px;" align="center"><img style="height: auto; display: block; border: 0; max-width: 225px; width: 50%;" src="http://journal2.uad.ac.id/public/site/images/aazhari/cover-mf.jpg" alt="" width="225" /></div> </td> </tr> </tbody> </table> <table style="width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="text-align: center; width: 100%; padding: 0 10px 5px 10px;"> <h2 style="margin: 0; color: #555; direction: ltr; font-family: Arial,Helvetica,sans-serif; font-size: 21px; font-weight: bold; letter-spacing: normal; line-height: 120%; text-align: left; margin-top: 0; margin-bottom: 0;">Mobile and Forensics</h2> </td> </tr> </tbody> </table> <table style="word-break: break-word; width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="padding: 0 10px 5px 10px;"> <div style="color: #101112; direction: ltr; font-family: Arial,Helvetica,sans-serif; font-size: 16px; font-weight: 400; letter-spacing: 0; line-height: 120%; text-align: left;"> <p style="margin: 0;"><em>Open Access <img src="https://cfp.iaesprime.com/BEEI/open.png" alt="" /> </em></p> </div> </td> </tr> </tbody> </table> <table style="word-break: break-word; width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="padding: 0 10px 0 10px;"> <div style="color: #101112; direction: ltr; font-family: Georgia,Times,'Times New Roman',serif; font-size: 16px; font-weight: 400; letter-spacing: 0; line-height: 140%; text-align: left;"> <p style="margin: 0;">Publisher:Universitas Ahmad Dahlan (UAD)<br />ISSN: 2656-6257 E-ISSN:2714-6685<br />Subject area:</p> </div> </td> </tr> </tbody> </table> <table style="width: 100%;" border="0" cellspacing="0" cellpadding="5"> <tbody> <tr> <td> <div align="left"> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"> <span style="word-break: break-word;">Computer Science: Cybersecurity and Computer forensics</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Computer Networks and Communications</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Artificial intelligence</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 11px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word; line-height: 0p;">Computer Science: Image Processing &amp; computer vision</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Internet of Things</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Computer Science (miscellaneous)</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Engineering: Software Engineering</span> </span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"> <span style="word-break: break-word;">Engineering: Electronics Engineering</span></span></div> </div> </td> </tr> </tbody> </table> <table style="border-collapse: collapse; width: 100%;" border="0"> <tbody> <tr> <td style="width: 24%; padding-left: 10px; padding-top: 15px;"><a style="outline: 0;" href="http://journal2.uad.ac.id/index.php/mf/submission/wizard" target="_blank" rel="noopener" data-saferedirecturl="http://journal2.uad.ac.id/index.php/mf/submission/wizard"> <img style="height: auto; display: block; border: 0; max-width: 135px; width: 100%;" src="https://cfp.iaesprime.com/BEEI/submit.png" alt="" width="135" /> </a></td> <td style="width: 76%; padding-left: 10px; padding-top: 15px;"><a style="outline: 0;" href="https://docs.google.com/document/d/1Fz_SHzAGe4RrB1wFwSawENCSFCwGSU73/edit?usp=sharing&amp;ouid=104327450475612404767&amp;rtpof=true&amp;sd=true" target="_blank" rel="noopener" data-saferedirecturl="https://iaescore.com/gfa/beei.docx"> <img style="height: auto; display: block; border: 0; max-width: 135px; width: 100%;" src="https://cfp.iaesprime.com/BEEI/docx.png" alt="" width="135" /> </a></td> </tr> </tbody> </table> <div id="additionalHomeContent"> <p> </p> </div> <div id="additionalHomeContent"> <p><strong>Mobile Forensics has been cited by <a href="https://www.scopus.com/results/results.uri?src=dm&amp;sort=plf-f&amp;st1=%22Mobile+and+Forensics%22&amp;st2=%22Mob.+Forensics%22&amp;sid=0bc95bcb81b6dd3473c4963df21dafee&amp;sot=b&amp;sdt=b&amp;sl=54&amp;s=%28REF%28%22Mobile+and+Forensics%22%29+OR+REF%28%22Mob.+Forensics%22%29%29&amp;cl=t&amp;ss=plf-f&amp;ws=r-f&amp;ps=r-f&amp;cs=r-f&amp;origin=resultslist&amp;zone=queryBar&amp;sessionSearchId=0bc95bcb81b6dd3473c4963df21dafee&amp;limit=10" target="_blank" rel="noopener">SCOPUS Journal (Need Login)</a>: </strong></p> <ul> <li><strong>Emerging Science Journal (Q1)</strong></li> <li><strong>Clinical Practice and Epidemiology in Mental Health (Q2)</strong></li> <li><strong>Journal of Robotics and Control (Q3)</strong></li> <li><strong>Applied Computer Science (Q3)</strong></li> <li><strong>International Journal on Smart Sensing and Intelligent Systems (Q3)</strong></li> <li><strong>International Journal of Sustainable Development and Planning (Q3)</strong></li> <li><strong>International Journal of Safety and Security Engineering (Q3)</strong></li> <li><strong>Advances in Intelligent Systems and Computing (Q4)</strong></li> <li><strong>Journal of Applied Data Sciences</strong></li> <li><strong>AIP Conference Proceedings</strong></li> <li><strong>ACM International Conference Proceeding Series</strong></li> <li><strong>International Conference on Engineering, Science and Advanced Technology, ICESAT </strong></li> <li><strong>International Conference on Artificial Intelligence in Information and Communication, ICAIIC </strong></li> <li><strong>International Conference on Cybernetics and Intelligent Systems, ICORIS</strong></li> <li><strong>International Conference on Science in Information Technology, ICSITech</strong></li> </ul> <p><iframe style="border: 0px #ffffff none;" src="https://author.my.id/widget/statistik.php?sinta=8108&amp;gs=NDzfOxEAAAAJ&amp;sc=13" name="statistik" width="800px" height="115px" frameborder="0" marginwidth="0px" marginheight="0px" scrolling="no"></iframe></p> <p><iframe id="datawrapper-chart-XCjD9" style="width: 0; min-width: 100% !important; border: none;" title="Mobile and Forensics Author's Diversity" src="https://datawrapper.dwcdn.net/XCjD9/1/" height="367" frameborder="0" scrolling="no" aria-label="Map" data-external="1"></iframe></p> </div> </div> </div> </div> </div> </div> </div> </div> Universitas Ahmad Dahlan en-US Mobile and Forensics 2656-6257 <p><strong>Start from 2019 issues, authors who publish with JURNAL MOBILE AND FORENSICS agree to the following terms:</strong></p> <ol start="1"> <li>Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="http://creativecommons.org/licenses/by-sa/4.0/" target="_blank" rel="noopener">Creative Commons Attribution License (CC BY-SA 4.0)</a> that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.</li> <li>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.</li> <li>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.</li> </ol> <p> </p> <p><a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license"><img src="https://i.creativecommons.org/l/by-sa/4.0/88x31.png" alt="Creative Commons License" /></a><br />This work is licensed under a <a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license">Creative Commons Attribution-ShareAlike 4.0 International License</a>.</p> Social Media Metadata Forensic Ontology Model http://journal2.uad.ac.id/index.php/mf/article/view/8937 <p><em>The escalating use of compact electronic gadgets like smartphones and smartwatches, along with social media platforms, has led to a new dimension of criminal activities. Advancements in digital forensics, which investigates digital evidence, have become noteworthy. Researchers David Christopher Harrill and Richard P. Mislan devised Small-Scale Digital Device Forensics (SSDDF) for examining miniature digital devices used in criminal undertakings. Edlira Kalemi and Sule Yildirim-Yayilgan demonstrated the application of ontology in social media forensics, deciphering Android system frameworks related to social media data extraction. However, their investigations mainly focused on social media, overlooking the role of gadgets used by criminals and victims. Extracting digital data from these devices remains pivotal for securing relevant evidence from social media. Notwithstanding, incorporating SSDDF and understanding Android system structures have significantly contributed to digital forensic methodologies. These enhancements can bolster the investigation process, capturing and analyzing critical digital evidence from compact electronic appliances and social media platforms. The advent of SSDDF and elucidating Android system structures have offered invaluable inputs to digital forensics, enhancing efficacy in amassing significant evidence from small electronic devices and social media platforms.</em></p> Ibnu Rohan Tuharea Ahmad Luthfi Erika Ramadani Copyright (c) 2023 Ibnu Rohan Tuharea, Ahmad Luthfi, Erika Ramadani https://creativecommons.org/licenses/by-sa/4.0 2023-09-30 2023-09-30 5 2 1 14 10.12928/mf.v5i2.8937 Impact of Banking Fraud Awareness Booklet Among The Students of Satara http://journal2.uad.ac.id/index.php/mf/article/view/7881 <p>With the growth of information and communication technology, the structure and nature of financial services delivery has also changed. Online banking or internet banking has emerged as a new and convenient way for using financial services like funds transfer, viewing account statement, bill payment, use of e-wallets etc. An upsurge in the use of devices connected with the internet and the convenience of online financial services has increased the risk of our hard-earned money being duped by cybercriminals.</p> <p>The main aim of this study is to assess the impact of Banking fraud awareness Booklet regarding online among students of Satara.</p> <p>&nbsp;The objectives of this study are to assess knowledge regarding awareness of online banking frauds among college going students, to determine the effectiveness of information booklet among college going students and also to find out association between socio-demographic variables and the booklet.</p> <p>The results show the significant increase in mean scores as (mean pre 16.92 SD=2.591 to mean post 18.32 SD=1.842). The paired 't' test applied showed the calculated paired t value (5.291 at 0.05 level of significance). The study reveals that there is association between, class, department &amp; course of the subjects and level of knowledge regarding awareness on online banking frauds.</p> <p>The information booklet was effective in improving the knowledge of awareness regarding online banking frauds among the Undergraduate students.</p> <p><strong>Keywords</strong>: Online banking frauds, Banking fraud awareness booklet.</p> Samidha Walvekar Samidha Copyright (c) 2023 Samidha Walvekar Samidha https://creativecommons.org/licenses/by-sa/4.0 2023-09-30 2023-09-30 5 2 15 20 10.12928/mf.v5i2.7881 Forensic Digital Analysis of Telegram Applications Using the National Institute Of Justice and Naïve Bayes Methods http://journal2.uad.ac.id/index.php/mf/article/view/7893 <p><em>Currently, Telegram is an instant messaging application that is often used by the Indonesian people as a means of long-distance communication with other users. Telegram also has good security features to protect all data from its users. However, Telegram has a positive impact on its users. This security feature can be used by several people to protect against digital crimes, especially cases of sexual harassment. To overcome the existing crimes, analysis, and forensic methods are needed to help solve crimes. This research is guided by the investigation process using the National Institute Of Justice (NIJ) method and the Naïve Bayes method to classify the conversations found. It can be concluded that MOBILedit Forensic Express has a poor performance in finding digital evidence in the Telegram application and FTK Imager is very good at finding digital evidence in the Telegram application. In this research, the classification process using the Naïve Bayes method has been able to classify conversations that contain sexual harassment or not. Evaluation of the classification method uses a confusion matrix to determine the best classification model. </em></p> Meyti Eka Apriyani Rahmad Alfian Maskuri M.Hasyim Ratsanjani Agung Pramudhita Rawansyah Rawansyah Copyright (c) 2023 meyti eka https://creativecommons.org/licenses/by-sa/4.0 2023-09-30 2023-09-30 5 2 21 30 10.12928/mf.v5i2.7893 Development of Mandarin Education Quiz Game Using Android-Based Multimedia Development Life Cycle http://journal2.uad.ac.id/index.php/mf/article/view/7947 <p style="font-weight: 400;">Mandarin is a language that is widely spoken and studied by people all over the world. Parents who start enrolling their children in Mandarin language courses from an early age with the hope that their children will become accustomed and proficient in using Mandarin. However, for elementary school children, the difficulty of constructing sentences in Mandarin is a major obstacle for children in the process of learning Mandarin. The purpose of this research is to create a unity-based mandarin quiz educational game application that is useful as an alternative media in the learning process to make it easier to learn. which is useful for a. Help make it easier for tutors in learning activities teaching by utilizing media technology in the form of Android-based educational games. Help students learn Chinese HSK material with a happy feeling and don't feel bored, because the content in the educational game "Mandarin Quiz" is displayed in an attractive way with audio, animation, and games on an Android smartphone. Helping children's enthusiasm for learning to know Mandarin.</p> <p style="font-weight: 400;">System development for users will be developed using the Multimedia Development Life Cycle (MDLC) methodology. Each step or stage of this method is suitable for system development in multimedia applications and these stages can swap positions according to research needs. It is hoped that the results of testing and designing the Mandarin Quiz educational game application using Unity 2D can be further developed so that this application can help increase interest in learning.</p> <p>The test results and feasibility of this educational game used the Usability Scale System (SUS) which consisted of 46 functions with 10 questions, the final test result was obtained with a score of 88, so that the mandarin quiz educational game was declared acceptable.</p> Muhammad Alfikri Maida Topani Ahmad Azhari Copyright (c) 2023 Muhammad Alfikri Maida Topani, Ahmad Azhari https://creativecommons.org/licenses/by-sa/4.0 2023-09-30 2023-09-30 5 2 31 41 10.12928/mf.v5i2.7947 Hybird Autokey Cipher Algorithm Implementation Reverse Key and Standard Data Encryption for App-Based Text Messages http://journal2.uad.ac.id/index.php/mf/article/view/8451 <p><em>The development of the internet facilitates public communication in sharing information. &nbsp;Along with the advancement of technology in the communication segment, there were various threats to it. Many applications had sophisticated security systems, but the actions in exploiting these security systems were also increasingly diverse. This study implemented a combination of classic and modern algorithms, namely autokey cipher reverse key and DES to protect data from these crimes. This research develops encryption and decryption applications using the agile method, the technique used because of the time spent on the built progress of applications with a cycle for the development process. With this cycle utilized, the method was suitable for developing applications in the short term and revising or improving applications in each cycle. The research resulted in security applications having the function of helping people secure data so that they could prevent and complicate digital criminal acts.</em></p> Risandio Ilham Lazuardi Nuril Anwar Copyright (c) 2023 Risandio Ilham Lazuardi, Nuril Anwar https://creativecommons.org/licenses/by-sa/4.0 2023-09-30 2023-09-30 5 2 42 48 10.12928/mf.v5i2.8451