This Author published in this journals
All Journal Jupiter CESS (Journal of Computer Engineering, System and Science) Sistemasi: Jurnal Sistem Informasi Jurnal Informatika Indonesian Journal on Software Engineering (IJSE) Jurnal Teknik Komputer AMIK BSI Paradigma Jurnal Pengabdian Pada Masyarakat JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI Zero : Jurnal Sains, Matematika, dan Terapan METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Informatik : Jurnal Ilmu Komputer J-SAKTI (Jurnal Sains Komputer dan Informatika) IJISTECH (International Journal Of Information System & Technology) Jurnal Teknologi Komputer dan Sistem Informasi Jusikom: Jurnal Sistem Informasi Ilmu Komputer JATI (Jurnal Mahasiswa Teknik Informatika) JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Jurnal Infortech Infotek : Jurnal Informatika dan Teknologi Jurnal Ilmu Komputer dan Sistem Informasi (JIKOMSI) Akrab Juara : Jurnal Ilmu-ilmu Sosial International Journal Of Science, Technology & Management (IJSTM) IJISTECH JUSTIAN - Jurnal Sistem Informasi Akuntansi J-SAKTI (Jurnal Sains Komputer dan Informatika) Reputasi: Jurnal Rekayasa Perangkat Lunak Simpatik: Jurnal sistem Informasi dan Informatika PROSISKO : Jurnal Pengembangan Riset dan observasi Rekayasa Sistem Komputer Jurnal Komputer Teknologi Informasi Sistem Komputer (JUKTISI) Jurnal Informatika dan Teknologi Informasi Prosiding Seminar Nasional Rekayasa dan Teknologi (TAU SNAR- TEK) Journal of Informatics and Information Security JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi)
Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : IJISTECH

Forensic Data Analysis on Smartphone Memory Android Operating System Using Framework GRR Arman Syah Putra; Muji Santoso; I Iwan; M Mudrika; Bambang Harianto; Popon Handayani
IJISTECH (International Journal of Information System and Technology) Vol 6, No 1 (2022): June
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v6i1.226

Abstract

The background of this research is how to find out and search for hidden data that has been deleted on a hidden smartphone device so that it can be used as evidence of the crime, especially in cybercrimes. The method used in this study uses the four-step method, namely, the first stage is collecting data, the second stage is looking for data, the third stage is analyzing data and the fourth stage is reporting the existence of these four stages, the method will be able to help research. The problem raised in this research is how to find evidence on a smartphone that was deleted by the users of, the crime so that the data can be returned and can make evidence as evidence of a crime. The purpose of this study is to find evidence on a smartphone and test whether the data is really the data you are looking for so that it can be used as evidence in cybercrimes.