Detecting Cyber Crime for Forensic Computer Handling using OSINT

Gespeichert in:
Bibliographische Detailangaben
Titel: Detecting Cyber Crime for Forensic Computer Handling using OSINT
Autoren: Salza Aulia Fitri, Muhammad Ramadhan, Raffi Ciputra, Ernis Sita Eriana, M.Irham
Quelle: International Journal of Educational and Life Sciences; Vol. 2 No. 12 (2024): December 2024; 1387-1394 ; 3026-2429 ; 10.59890/ijels.v2i12
Verlagsinformationen: MultiTech Publisher
Publikationsjahr: 2025
Schlagwörter: Cyber Crime, OSINT, Computer Forensics
Beschreibung: In handling computer forensics with backward chaining, the cybercrime detection expert system serves to detect cybercrime crimes committed by criminals. Problems encountered include how to detect cybercrime crimes committed, articles that correspond to cybercrime crimes committed, and what punishment should be given to cybercrime offenders. This article provides a brief explanation of the meaning of forensics, techniques, and applications with various applications available: This expert system uses observation, interviews, and literature studies. into a system that uses hypertext preprocessor programming (PHP) and MySQL database. The design that uses HTML and CSS during the process of making this system can help in the process of detecting and handling internet violations. to supervise the forensic stove, so as to be able to find out with the type of crime committed easily and cyber crime law. The search results show that live forensic, network forensic, and mobile forensic are the most handled crimes, with a trend topic graph above 10. In contrast, computer and database forensics only have two courses.
Publikationsart: article in journal/newspaper
Dateibeschreibung: application/pdf
Sprache: English
Relation: https://journal.multitechpublisher.com/index.php/ijels/article/view/2788/2785; https://journal.multitechpublisher.com/index.php/ijels/article/view/2788
DOI: 10.59890/ijels.v2i12.2788
Verfügbarkeit: https://journal.multitechpublisher.com/index.php/ijels/article/view/2788
https://doi.org/10.59890/ijels.v2i12.2788
Rights: Copyright (c) 2024 Salza Aulia Fitri, Muhammad Ramadhan, Raffi Ciputra, Ernis Sita Eriana, M.Irham ; https://creativecommons.org/licenses/by/4.0
Dokumentencode: edsbas.2427723B
Datenbank: BASE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://journal.multitechpublisher.com/index.php/ijels/article/view/2788#
    Name: EDS - BASE (s4221598)
    Category: fullText
    Text: View record from BASE
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Fitri%20SA
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsbas
DbLabel: BASE
An: edsbas.2427723B
RelevancyScore: 1009
AccessLevel: 3
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 1009.3056640625
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Detecting Cyber Crime for Forensic Computer Handling using OSINT
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Salza+Aulia+Fitri%22">Salza Aulia Fitri</searchLink><br /><searchLink fieldCode="AR" term="%22Muhammad+Ramadhan%22">Muhammad Ramadhan</searchLink><br /><searchLink fieldCode="AR" term="%22Raffi+Ciputra%22">Raffi Ciputra</searchLink><br /><searchLink fieldCode="AR" term="%22Ernis+Sita+Eriana%22">Ernis Sita Eriana</searchLink><br /><searchLink fieldCode="AR" term="%22M%2EIrham%22">M.Irham</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: International Journal of Educational and Life Sciences; Vol. 2 No. 12 (2024): December 2024; 1387-1394 ; 3026-2429 ; 10.59890/ijels.v2i12
– Name: Publisher
  Label: Publisher Information
  Group: PubInfo
  Data: MultiTech Publisher
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2025
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22Cyber+Crime%22">Cyber Crime</searchLink><br /><searchLink fieldCode="DE" term="%22OSINT%22">OSINT</searchLink><br /><searchLink fieldCode="DE" term="%22Computer+Forensics%22">Computer Forensics</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: In handling computer forensics with backward chaining, the cybercrime detection expert system serves to detect cybercrime crimes committed by criminals. Problems encountered include how to detect cybercrime crimes committed, articles that correspond to cybercrime crimes committed, and what punishment should be given to cybercrime offenders. This article provides a brief explanation of the meaning of forensics, techniques, and applications with various applications available: This expert system uses observation, interviews, and literature studies. into a system that uses hypertext preprocessor programming (PHP) and MySQL database. The design that uses HTML and CSS during the process of making this system can help in the process of detecting and handling internet violations. to supervise the forensic stove, so as to be able to find out with the type of crime committed easily and cyber crime law. The search results show that live forensic, network forensic, and mobile forensic are the most handled crimes, with a trend topic graph above 10. In contrast, computer and database forensics only have two courses.
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: article in journal/newspaper
– Name: Format
  Label: File Description
  Group: SrcInfo
  Data: application/pdf
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: NoteTitleSource
  Label: Relation
  Group: SrcInfo
  Data: https://journal.multitechpublisher.com/index.php/ijels/article/view/2788/2785; https://journal.multitechpublisher.com/index.php/ijels/article/view/2788
– Name: DOI
  Label: DOI
  Group: ID
  Data: 10.59890/ijels.v2i12.2788
– Name: URL
  Label: Availability
  Group: URL
  Data: https://journal.multitechpublisher.com/index.php/ijels/article/view/2788<br />https://doi.org/10.59890/ijels.v2i12.2788
– Name: Copyright
  Label: Rights
  Group: Cpyrght
  Data: Copyright (c) 2024 Salza Aulia Fitri, Muhammad Ramadhan, Raffi Ciputra, Ernis Sita Eriana, M.Irham ; https://creativecommons.org/licenses/by/4.0
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsbas.2427723B
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.2427723B
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.59890/ijels.v2i12.2788
    Languages:
      – Text: English
    Subjects:
      – SubjectFull: Cyber Crime
        Type: general
      – SubjectFull: OSINT
        Type: general
      – SubjectFull: Computer Forensics
        Type: general
    Titles:
      – TitleFull: Detecting Cyber Crime for Forensic Computer Handling using OSINT
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Salza Aulia Fitri
      – PersonEntity:
          Name:
            NameFull: Muhammad Ramadhan
      – PersonEntity:
          Name:
            NameFull: Raffi Ciputra
      – PersonEntity:
          Name:
            NameFull: Ernis Sita Eriana
      – PersonEntity:
          Name:
            NameFull: M.Irham
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Type: published
              Y: 2025
          Identifiers:
            – Type: issn-locals
              Value: edsbas
            – Type: issn-locals
              Value: edsbas.oa
          Titles:
            – TitleFull: International Journal of Educational and Life Sciences; Vol. 2 No. 12 (2024): December 2024; 1387-1394 ; 3026-2429 ; 10.59890/ijels.v2i12
              Type: main
ResultId 1