2014
DOI: 10.1016/s1353-4858(14)70112-6
|View full text |Cite
|
Sign up to set email alerts
|

Forensic investigation of social networking applications

Abstract: Forensic investigation of social networking applicationshttp://researchonline.ljmu.ac.uk/299/ Article LJMU has developed LJMU Research Online for users to access the research output of the University more effectively. Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. Users may download and/or print one copy of any article(s) in LJMU Research Online to facilitate their private study or for non-commercial research. You may not engage in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 27 publications
0
11
0
1
Order By: Relevance
“…Selain itu penelitian ini juga tidak memonitor perkembangan yang ada di media sosial yang setiap detik datanya bertambah. Sama halnya dengan penelitian yang menggunakan pendekatan taksonomi sederhana dalam memberikan ulasan mengenai tools yang digunakan untuk menganalisis media sosial, API dapat memudahkan dalam mendapatkan data tapi dengan beberapa perbedaan fitur media sosial, tingkat kedalaman data yang diambil akan berbeda [6] Pendekatan metode investigasi digital forensik pada aplikasi media sosial, dapat memberikan rekomendasi untuk melakukan investigasi pada komputer yang terpasang aplikasi media sosial [7]. Namun tentunya informasi yang didapatkan sangatlah minim dikarenakan setiap pengguna dapat menggunakan aplikasi media sosial di setiap perangkat.…”
Section: Pendahuluanunclassified
“…Selain itu penelitian ini juga tidak memonitor perkembangan yang ada di media sosial yang setiap detik datanya bertambah. Sama halnya dengan penelitian yang menggunakan pendekatan taksonomi sederhana dalam memberikan ulasan mengenai tools yang digunakan untuk menganalisis media sosial, API dapat memudahkan dalam mendapatkan data tapi dengan beberapa perbedaan fitur media sosial, tingkat kedalaman data yang diambil akan berbeda [6] Pendekatan metode investigasi digital forensik pada aplikasi media sosial, dapat memberikan rekomendasi untuk melakukan investigasi pada komputer yang terpasang aplikasi media sosial [7]. Namun tentunya informasi yang didapatkan sangatlah minim dikarenakan setiap pengguna dapat menggunakan aplikasi media sosial di setiap perangkat.…”
Section: Pendahuluanunclassified
“…Ideally a procedure of a similar standard to the UK Association of Chief Police Officers (ACPO) Good practice guide for digital evidence (ACPO, 2012) should be used. At present there do not appear to be any guidelines in widespread use specifically aimed at the process of obtaining and analyzing digital evidence from social media (Taylor et al, 2014).…”
Section: Investigating Employee Harassment Via Social Mediamentioning
confidence: 99%
“…Approaches for social media misuse investigations within organizations are typically not well defined and the approach used would also depend upon the social media involved. For example, it might be difficult to prove that a particular employee actually posted material concerning the alleged harassment if the social media service used did not supply Internet Protocol (IP) address or billing information (Taylor et al, 2014). O'Floinn and Ormerod (2012) commented upon the importance of the quality of digital evidence from social media and the need for adherence to appropriate procedures for the acquisition of digital evidence relating to social media use to ensure admissibility.…”
Section: Acquiring Digital Evidencementioning
confidence: 99%
See 1 more Smart Citation
“…Currently, Facebook is the most popular SN platform with around 1.06 billion active users 2 followed by Twitter, LinkedIn and Google+. These platforms provide users with features such as email, blogging, instant messaging and photo sharing 3 . Various types of personal information are shared on SN platforms such as name, date of birth, photos, email addresses, phone numbers and group affiliations, which could provide crucial information during a crime investigation 4 .…”
Section: Introductionmentioning
confidence: 99%