2019
DOI: 10.4018/ijose.2019010105
|View full text |Cite
|
Sign up to set email alerts
|

Digital Forensic Investigation of Social Media, Acquisition and Analysis of Digital Evidence

Abstract: Varioussocialnetworkingsites(SNSs),widelyreferredtoassocialmedia,provideservicessuchas email,blogging,instantmessagingandphotosharingforsocialandcommercialinteractions.SNSsare facilitatingnewformsofsocialinteraction,dialogue,exchangeandcollaboration.Theyallowmillions ofusersandorganisationsworldwidetoexchangeideas,postupdatesandcommentsorparticipatein activitiesandevents,whilesharingtheirwiderinterests.Atthesametime,suchaphenomenonhas ledtoanupsurgeinsignificantcriminalactivitiesbyperpetratorswhoarebecominginc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 14 publications
(2 reference statements)
0
11
0
Order By: Relevance
“…Several models and frameworks have been proposed by [6]; [10]; [15]; [2]; [5]; [16]; [14]; [23]; [24]; [11]; [13]; [7]; [25]; and [17], but very few were designed with OSNFI in mind.…”
Section: Rq2 What Are the Phases And Activities Involved In An Online Social Network Forensic Investigation Model Domain Based On The Degmentioning
confidence: 99%
See 2 more Smart Citations
“…Several models and frameworks have been proposed by [6]; [10]; [15]; [2]; [5]; [16]; [14]; [23]; [24]; [11]; [13]; [7]; [25]; and [17], but very few were designed with OSNFI in mind.…”
Section: Rq2 What Are the Phases And Activities Involved In An Online Social Network Forensic Investigation Model Domain Based On The Degmentioning
confidence: 99%
“…Different SNSs, like Facebook, Twitter, and LinkedIn, are used to connect people and enable them to communicate with one another [5]. People build personal profiles from various social networking sites to share their thoughts, photographs, images, emails, and instant messaging [11], as well as to find old friends or people with common interests or problems through various social networking sites [12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…is is done by identifying and controlling the utilization of information products in order to preserve the financial and moral rights of their owners. Albeit social media has gotten progressively applicable to lawful practice, some accept that it is not yet a legitimate field [8]. e study of civil responsibility is at the forefront among civil law topics because societies have developed in different fields that have harmed human health, feelings, and reputation.…”
Section: Introductionmentioning
confidence: 99%
“…In other words, a major concern is tracing communications through the network (live/backup) packets, i.e., to identify the traces of the apps' or users' behavior, data breaches, and other illicit activities. Thus, encrypted network traffic analysis uncovers the network-related artifacts which can be beneficial to the forensic investigator and are shown great interest [16,17]. However, the provision of end-to-end encryption protects the data during transmission.…”
Section: Introductionmentioning
confidence: 99%