Mobile and Forensics http://journal2.uad.ac.id/index.php/mf <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div> <p><strong>Mobile and Forensics (MF)</strong>, ISSN: <a href="https://portal.issn.org/resource/ISSN/2656-6257" target="_blank" rel="noopener">2656-6257</a> E-ISSN:<a href="https://portal.issn.org/resource/ISSN/2714-6685" target="_blank" rel="noopener">2714-6685</a> ,is a international peer-reviewed open access journal organized by the Department of Magister Informatika, Universitas Ahmad Dahlan. It is a <strong>semi-annual journal</strong> published in <strong>March and September.</strong> The main objective of the publication is to create a platform to publish original articles, researches results, case studies, and book reviews related to the field of Mobile Technology and Digital Forensics. The editorial board welcomes original contributions of the author in English which never been published or under consideration for publication in any other publication. All publications are available in full text and are free to download.</p> </div> </div> </div> <table class="m_1585562839703316051image_block" style="width: 100%;" border="0" cellspacing="0" cellpadding="10"> <tbody> <tr> <td> <div style="line-height: 10px;" align="center"><img style="height: auto; display: block; border: 0; max-width: 225px; width: 50%;" src="http://journal2.uad.ac.id/public/site/images/aazhari/cover-mf.jpg" alt="" width="225" /></div> </td> </tr> </tbody> </table> <table style="width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="text-align: center; width: 100%; padding: 0 10px 5px 10px;"> <h2 style="margin: 0; color: #555; direction: ltr; font-family: Arial,Helvetica,sans-serif; font-size: 21px; font-weight: bold; letter-spacing: normal; line-height: 120%; text-align: left; margin-top: 0; margin-bottom: 0;">Mobile and Forensics</h2> </td> </tr> </tbody> </table> <table style="word-break: break-word; width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="padding: 0 10px 5px 10px;"> <div style="color: #101112; direction: ltr; font-family: Arial,Helvetica,sans-serif; font-size: 16px; font-weight: 400; letter-spacing: 0; line-height: 120%; text-align: left;"> <p style="margin: 0;"><em>Open Access <img src="https://cfp.iaesprime.com/BEEI/open.png" alt="" /> </em></p> </div> </td> </tr> </tbody> </table> <table style="word-break: break-word; width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="padding: 0 10px 0 10px;"> <div style="color: #101112; direction: ltr; font-family: Georgia,Times,'Times New Roman',serif; font-size: 16px; font-weight: 400; letter-spacing: 0; line-height: 140%; text-align: left;"> <p style="margin: 0;">Publisher:Universitas Ahmad Dahlan (UAD)<br />ISSN: 2656-6257 E-ISSN:2714-6685<br />Subject area:</p> </div> </td> </tr> </tbody> </table> <table style="width: 100%;" border="0" cellspacing="0" cellpadding="5"> <tbody> <tr> <td> <div align="left"> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"> <span style="word-break: break-word;">Computer Science: Cybersecurity and Computer forensics</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Computer Networks and Communications</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Artificial intelligence</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 11px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word; line-height: 0p;">Computer Science: Image Processing &amp; computer vision</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Internet of Things</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Computer Science (miscellaneous)</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Engineering: Software Engineering</span> </span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"> <span style="word-break: break-word;">Engineering: Electronics Engineering</span></span></div> </div> </td> </tr> </tbody> </table> <table style="border-collapse: collapse; width: 100%;" border="0"> <tbody> <tr> <td style="width: 24%; padding-left: 10px; padding-top: 15px;"><a style="outline: 0;" href="http://journal2.uad.ac.id/index.php/mf/submission/wizard" target="_blank" rel="noopener" data-saferedirecturl="http://journal2.uad.ac.id/index.php/mf/submission/wizard"> <img style="height: auto; display: block; border: 0; max-width: 135px; width: 100%;" src="https://cfp.iaesprime.com/BEEI/submit.png" alt="" width="135" /> </a></td> <td style="width: 76%; padding-left: 10px; padding-top: 15px;"><a style="outline: 0;" href="https://docs.google.com/document/d/1Fz_SHzAGe4RrB1wFwSawENCSFCwGSU73/edit?usp=sharing&amp;ouid=104327450475612404767&amp;rtpof=true&amp;sd=true" target="_blank" rel="noopener" data-saferedirecturl="https://iaescore.com/gfa/beei.docx"> <img style="height: auto; display: block; border: 0; max-width: 135px; width: 100%;" src="https://cfp.iaesprime.com/BEEI/docx.png" alt="" width="135" /> </a></td> </tr> </tbody> </table> <div id="additionalHomeContent"> <p> </p> </div> <div id="additionalHomeContent"> <p><strong>Mobile Forensics has been cited by <a href="https://www.scopus.com/results/results.uri?src=dm&amp;sort=plf-f&amp;st1=%22Mobile+and+Forensics%22&amp;st2=%22Mob.+Forensics%22&amp;sid=0bc95bcb81b6dd3473c4963df21dafee&amp;sot=b&amp;sdt=b&amp;sl=54&amp;s=%28REF%28%22Mobile+and+Forensics%22%29+OR+REF%28%22Mob.+Forensics%22%29%29&amp;cl=t&amp;ss=plf-f&amp;ws=r-f&amp;ps=r-f&amp;cs=r-f&amp;origin=resultslist&amp;zone=queryBar&amp;sessionSearchId=0bc95bcb81b6dd3473c4963df21dafee&amp;limit=10" target="_blank" rel="noopener">SCOPUS Journal (Need Login)</a>: </strong></p> <ul> <li><strong>Emerging Science Journal (Q1)</strong></li> <li><strong>Clinical Practice and Epidemiology in Mental Health (Q2)</strong></li> <li><strong>Journal of Robotics and Control (Q3)</strong></li> <li><strong>Applied Computer Science (Q3)</strong></li> <li><strong>International Journal on Smart Sensing and Intelligent Systems (Q3)</strong></li> <li><strong>International Journal of Sustainable Development and Planning (Q3)</strong></li> <li><strong>International Journal of Safety and Security Engineering (Q3)</strong></li> <li><strong>Advances in Intelligent Systems and Computing (Q4)</strong></li> <li><strong>Journal of Applied Data Sciences</strong></li> <li><strong>AIP Conference Proceedings</strong></li> <li><strong>ACM International Conference Proceeding Series</strong></li> <li><strong>International Conference on Engineering, Science and Advanced Technology, ICESAT </strong></li> <li><strong>International Conference on Artificial Intelligence in Information and Communication, ICAIIC </strong></li> <li><strong>International Conference on Cybernetics and Intelligent Systems, ICORIS</strong></li> <li><strong>International Conference on Science in Information Technology, ICSITech</strong></li> </ul> <p><iframe style="border: 0px #ffffff none;" src="https://author.my.id/widget/statistik.php?sinta=8108&amp;gs=NDzfOxEAAAAJ&amp;sc=13" name="statistik" width="800px" height="115px" frameborder="0" marginwidth="0px" marginheight="0px" scrolling="no"></iframe></p> <p><iframe id="datawrapper-chart-XCjD9" style="width: 0; min-width: 100% !important; border: none;" title="Mobile and Forensics Author's Diversity" src="https://datawrapper.dwcdn.net/XCjD9/1/" height="367" frameborder="0" scrolling="no" aria-label="Map" data-external="1"></iframe></p> </div> </div> </div> </div> </div> </div> </div> </div> Universitas Ahmad Dahlan en-US Mobile and Forensics 2656-6257 <p><strong>Start from 2019 issues, authors who publish with JURNAL MOBILE AND FORENSICS agree to the following terms:</strong></p> <ol start="1"> <li>Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="http://creativecommons.org/licenses/by-sa/4.0/" target="_blank" rel="noopener">Creative Commons Attribution License (CC BY-SA 4.0)</a> that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.</li> <li>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.</li> <li>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.</li> </ol> <p> </p> <p><a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license"><img src="https://i.creativecommons.org/l/by-sa/4.0/88x31.png" alt="Creative Commons License" /></a><br />This work is licensed under a <a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license">Creative Commons Attribution-ShareAlike 4.0 International License</a>.</p> Analysis of Instagram Messages in Drug Cases using Nist Methods http://journal2.uad.ac.id/index.php/mf/article/view/11307 <p><em>The advancement of communication technology has had a significant impact on all levels of society, particularly through the use of social media platforms such as Instagram. However, this application also has negative impacts, including its misuse by criminals to facilitate the distribution of drugs, leading to transactions where anti-forensics measures are employed by sellers during conversations. This research utilizes the National Institute of Standards and Technology (NIST) method, which consists of the steps of collection, examination, analysis, and reporting. This method is applied to identify and uncover evidence in drug transaction cases on Instagram. The researchers focus on messages between buyers and sellers, whether they have been deleted or not. The results of the study indicate that digital forensic steps using the NIST method can be applied in the process of retrieving digital evidence from the Instagram application on the smartphones of buyers and sellers. The digital forensic tools used successfully revealed relevant digital evidence on the Instagram application.</em></p> Muhammad Raihandaffa Dzikrianasa Eko Aribowo Copyright (c) 2025 Muhammad Raihandaffa Dzikrianasa, Eko Aribowo https://creativecommons.org/licenses/by-sa/4.0 2025-01-20 2025-01-20 7 1 1 11