Claim Missing Document
Check
Articles

Found 31 Documents
Search

Investigasi Forensika Digital WhatsApp Scam dengan Menggunakan Framework D4I Nurdin, Rusydi; Ramadhani, Erika
JATISI Vol 11 No 1 (2024): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Universitas Multi Data Palembang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v11i1.6616

Abstract

WhatsApp is an application that is very well known in Indonesia and the world. The WhatsApp application is also known to be one of the applications with the most users to date. This application can make it easier for us to communicate remotely to help with work matters. With the many conveniences provided by WhatsApp in terms of communication, there are many modes of crime that use WhatsApp as a tool to commit digital crimes, one of which is WhatsApp Scam. One of the actions that can be taken to find out the perpetrators and how the perpetrators commit fraud is by digital forensics investigation. Digital forensics is a part of forensic science with the scope of material (data) investigations and discoveries on digital devices such as smartphones, computers, tablets, storage, and other networked devices. It includes the application of informatics for the presentation of evidence data from computer crimes that can assist the court in cybercrime evidence with a focus on maintaining integrity and maintaining a tight chain of custody. The D4I framework is expected to improve the implementation of digital forensics investigations at the stage of examining data and analyzing existing data. The investigation was carried out by combining the National Institute of Standards and Technology (NIST) method and artifacts from the cyber kill chain (CKC) to assist in the digital forensics process.
Osint Framework Untuk Verifikasi Pinjaman Online Pada Media Sosial R, Zulihsan; Prayudi, Yudi; Ramadhani, Erika
JATISI Vol 11 No 2 (2024): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Universitas Multi Data Palembang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v11i2.7555

Abstract

Masyarakat modern saat ini dengan penggunaan media sosial yang begitu masif sebagai media komunikasi dan alat dalam transaksi online. Media Instagram adalah media sosial yang berfungsi sebagai tempat melakukan interaksi melalui media internet. Dengan melakukan transaksi pinjam-meminjam melalui media sosial Instragram biasanya terjadi tindak pidana penipuan (Scam), sehingga peniliti, dengan melihat topik permasalahan yang biasa terjadi dalam tindak pidana penipuan (Scam). Maka dari itu peneliti mengembangkan sebuah Framework investigasi untuk verifikasi akum pinjaman online pada media sosial Instagram menggunakan metode System Development Life Cycle (SDLC) sebagai metode pengumpulan data. Dalam pengembangan Framework verifikasi untuk pengambilan data ini peneliti menggunakan aplikasi GetContact dan Cekrekening.id sebagai alat verifikasi akun dalam pembuktian identitas pelaku serta pengamanan barang bukti menggunakan tools FTK Imager yang berfungsi untuk menjaga integritas keaslian barang bukti tersebut. Framework verifikasi yang dirancang menghasilkan lima tahapan yaitu perencanaan (planning), analisis (analysis), desain (design), implementasi (implementation) dan pemeliharaan (maintenance). Adapun bukti digital yang diperoleh dari proses verifikasi akun tersebut yaitu berupa akun instagram, nama, nomor telepon, nama rekening, nomor rekening dan bank pelaku.
PERANCANGAN DESAIN UI/UX APLIKASI PEMILIHAN ALAT FORENSIK DIGITAL MENGGUNAKAN METODE DESIGN THINKING Naufal, Reyhandri Muhammad; Ramadhani, Erika
PENDIDIKAN SAINS DAN TEKNOLOGI Vol 12 No 1 (2025)
Publisher : STKIP PGRI Situbondo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47668/edusaintek.v12i1.1465

Abstract

Penelitian ini bertujuan untuk merancang aplikasi yang memfasilitasi pemilihan alat forensik digital. Dengan menerapkan prinsip desain UI/UX canggih dan metode Design Thinking, aplikasi ini diharapkan dapat memberikan informasi komprehensif serta rekomendasi yang disesuaikan dengan karakteristik kasus pengguna. Metode Design Thinking yang digunakan mencakup lima tahap: Empathize, Define, Ideate, Prototype, dan Test. Hasil penelitian menunjukkan bahwa aplikasi ini mampu meningkatkan efisiensi dan efektivitas proses pemilihan alat forensik digital, dengan menyediakan antarmuka yang intuitif dan fitur-fitur seperti filter pencarian dan rekomendasi berdasarkan kebutuhan spesifik. Pengujian menggunakan System Usability Scale (SUS) menunjukkan skor rata-rata 70,36, yang menandakan bahwa aplikasi ini memiliki tingkat kegunaan yang baik. Aplikasi ini diharapkan dapat memperkuat kapabilitas digital forensik dan membantu para profesional dalam melakukan investigasi yang lebih efektif.
A Bibliometrics Analysis of Multimedia Forensics and Deep Learning Research Based on Scopus Index Erika Ramadhani; Dedy Hariyadi
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 4 No 3 (2023)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.4.3.187

Abstract

Forensics of digital data are concerned with identifying, acquiring, processing, analysing, and reporting on electronic data. Multimedia forensics focuses on investigating computer crimes using forensic methods. The analysis of multimedia evidence is the role of multimedia forensics, on the other hand. In the analysis, digital evidence is evaluated scientifically to maintain its integrity, to find its source, and to authenticate it. There are several methods in multimedia forensics, such as the implementation of deep learning. The purpose of this research is to conduct bibliometric analysis in multimedia forensics and deep learning by using the data gathered from Scopus index on the keyword “multimedia forensics and deep learning”. The result is 68 relevant papers were found in the range of 2017-2022. The results of this research can be used by researchers as a reference when conducting research and determining the research themes to be pursued.
ANALISIS FORENSIK DEEPFAKE BERBASIS CONVOLUTIONAL NEURAL NETWORK (CNN) UNTUK DETEKSI INKONSISTENSI TEKSTUR DAN POLA PADA CITRA WAJAH Raharjo, Toto; Irfan Adristi, Fikri; Yusroni Romadhona, Frendi; Rahmadi Syahputra, Rosi; Yusuf Halim, Muhammad; Ashshidiqie Rachman, Mikhail; Nur Marjianto, Rohsan; Santicho, Desylo; Kusuma, Permadi; Ramadhani, Erika
JATI (Jurnal Mahasiswa Teknik Informatika) Vol. 9 No. 2 (2025): JATI Vol. 9 No. 2
Publisher : Institut Teknologi Nasional Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/jati.v9i2.13058

Abstract

Perkembangan teknologi artificial intelligence (AI) yang semakin pesat memunculkan teknologi deepfake yang menggunakan basis algoritma seperti generative adversarial networks (GANs) untuk memanipulasi citra wajah dengan tingkat realisme yang tinggi. Fenomena ini memunculkan tantangan dalam keamanan digital karena potensi penyalahgunaan, disinformasi, pelanggaran privasi, dan kejahatan dunia maya. Penelitian ini bertujuan mengembangkan model deteksi deepfake berbasis convolutional neural networks (CNN) yang mampu mengidentifikasi inkonsistensi tekstur dan pola biologis pada citra wajah secara efisien secara resource hadware dan efektif dalam proses deteksi image. Metode penelitian meliputi pengumpulan data dari dataset FaceForensics++ dan Celeb-DF, pra-proses data menggunakan augmentasi dan normalisasi, serta pengembangan model dengan arsitektur EfficientNetB0 yang dilatih menggunakan transfer learning pada dataset besar dengan menggunakan TensorFlow dan GPU. Hasil pengujian menunjukkan bahwa Model cenderung mengklasifikasikan gambar asli dengan nilai prediksi dari model neural network di atas 0,5, sementara gambar palsu justru dideteksi sebagai asli karena nilainya juga melebihi 0,5. Evaluasi menunjukkan bahwa model ini mencapai tingkat akurasi tinggi dalam mendeteksi manipulasi citra wajah, dengan teknik augmentasi yang meningkatkan kehandalan model terhadap berbagai skenario. Penelitian ini menyimpulkan bahwa pendekatan berbasis CNN efektif untuk deteksi deepfake, namun perlu pengembangan lebih lanjut untuk mengatasi keterbatasan pada data yang kompleks.
Design and Implementation in Frontend Development of the PLN UP3 Yogyakarta SIBER Project with Tailwind and Bootstrap Septina, Annisa Dinda; Ramadhani, Erika
Journal of Social Science Vol. 5 No. 4 (2024): Journal of Social Science
Publisher : Syntax Corporation Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46799/jss.v5i4.889

Abstract

In the Society 5.0 era which is characterized by mobility high and integration technology in everyday life, PLN UP3 Yogyakarta experienced operational obstacles, especially related to manual data processing and static websites. To overcome these challenges, a Joint Information System (SIBER) was developed as an application web- based which allows real-time data access for all employees. In SIBER development, the Scrum method is used for possible project management clear planning and flexibility in sprint iterations. In addition, the implementation of the Tailwind CSS framework and Bootstrap in the development of the SIBER user interface ensures a responsive and attractive appearance, with Tailwind providing detailed design flexibility and Bootstrap providing UI components that are tested and easy to use.
Uncovering WhatsApp Fraud Modus Operandi Through Digital Artifact Analysis and Cyber Kill Chain Mapping Ramadhani, Erika
International Journal of Computer and Information System (IJCIS) Vol 6, No 3 (2025): IJCIS : Vol 6 - Issue 3 - 2025
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v6i3.254

Abstract

WhatsApp fraud has emerged as a significant cybercrime threat, exploiting the platform’s wide user base through social engineering and malware-based attacks. This study investigates a WhatsApp fraud case by analyzing digital artifacts to uncover the perpetrator’s modus operandi and provide structured guidance for law enforcement. Using the Digital Forensics for Incident Response (D4I) Framework in conjunction with Cyber Kill Chain (CKC) mapping, five key artifacts were identified and evaluated quantitatively based on their strength of evidence (v) and reliability (r). The results show that the malicious APK and source code containing a Telegram bot token constitute primary evidence with the highest probative value, while the Manifest.xml file and hidden background application serve as supporting evidence, and contextual indicators such as sender information provide limited legal weight. These findings highlight the importance of differentiating artifacts by evidentiary significance and demonstrate the value of the proposed scoring methodology. The study has limitations, as it is based on a simulated case and relies partly on expert judgment in scoring criteria. Future research should apply the approach to other platforms and fraud scenarios, and explore automation to enhance objectivity and scalability. Beyond its academic contributions, the study offers a structured rubric for prioritizing evidence and emphasizes the need for standardized evaluation frameworks in digital forensic policy and practice, ultimately strengthening the legal robustness and societal trust in digital investigations.
Design and Implementation of a Tourism Website User Interface for Yogyakarta using the Scrum Method Bahirah, Shabrina Hazrati; Ramadhani, Erika
Sistemasi: Jurnal Sistem Informasi Vol 14, No 6 (2025): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v14i6.5658

Abstract

The Radya Kartiyasa Website, a cultural tourism promotion platform under the management of the Kawadenan Radya Kartiyasa unit, was designed and implemented as a medium for promoting cultural tourism with a user interface that emphasizes both aesthetics and local cultural values. The primary objective of developing this website is to provide comprehensive information about tourism destinations within the Keraton area and cultural events organized by the Keraton, while simultaneously enhancing the digital image of the Yogyakarta Palace as a premier cultural tourism destination. The development process adopted the Scrum methodology. This approach facilitated short development cycles, high flexibility, and strong team collaboration, as reflected in the stages of product backlog, sprint planning, sprint execution, daily scrum, sprint review, and retrospective. The outcome of this implementation includes the creation of the homepage, destination index, museum visit promotions, event index, museum gallery, about us page, event detail pages, destination detail pages, and a contact us form page. The contribution of this study lies in integrating a modern development methodology with a culturally inspired interface design, aiming to make the website an effective digital tool for promoting, educating, and preserving the cultural heritage of the Yogyakarta Palace.
Anti Forensik Voice Note Menggunakan Whatsapp Mod Mardlatillah, Hanifah; Prayudi, Yudi; Ramadhani, Erika
Jurnal Teknik Vol 21 No 2 (2023): Jurnal Teknik
Publisher : Universitas Negeri Gorontalo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37031/jt.v21i2.328

Abstract

Currently there is a social media application that provides additional features in the form of voice changers by utilizing the voice note feature of Whatsapp Mod which can blur the identity of the voice owner. In several articles, Whatsapp Mod claims that this application is an anti-banned application, so it is feared that Whatsapp Mod is an application that uses anti-forensic techniques in it. This study aims to prove whether voice modifiers using voice notes on Whatsapp Mod can be a form of anti-forensic activity which can later make it difficult for investigators to conduct investigations. This will be proven by the use of a special method in handling audio forensics in which there are four stages, namely Acquisition, Enhancement, Decoding, and Voice Recognition. Audio forensics analysis that was carried out between voice recordings modified using Whatsapp Mod voice notes and original voice recordings showed results that were not identical. This proves that the voice modifier using the Whatsapp Mod voice note is considered an effective anti-forensic tool.
The Comparison of Audio Analysis Using Audio Forensic Technique and Mel Frequency Cepstral Coefficient Method (MFCC) as the Requirement of Digital Evidence Dzulfikar, Helmy; Adinandra, Sisdarmanto; Ramadhani, Erika
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.702

Abstract

Audio forensics is the application of science and scientific methods in handling digital evidence in the form of audio. In this regard, the audio supports the disclosure of various criminal cases and reveals the necessary information needed in the trial process. So far, research related to audio forensics is more on human voices that are recorded directly, either by using a voice recorder or voice recordings on smartphones, which are available on Google Play services or iOS Store. This study compares the analysis of live voices (human voices) with artificial voices on Google Voice and other artificial voices. This study implements the audio forensic analysis, which involves pitch, formant, and spectrogram as the parameters. Besides, it also analyses the data by using feature extraction using the Mel Frequency Cepstral Coefficient (MFCC) method, the Dynamic Time Warping (DTW) method, and applying the K-Nearest Neighbor (KNN) algorithm. The previously made live voice recording and artificial voice are then cut into words. Then, it tests the chunk from the voice recording. The testing of audio forensic techniques with the Praat application obtained similar words between live and artificial voices and provided 40,74% accuracy of information. While the testing by using the MFCC, DTW, KNN methods with the built systems by using Matlab, obtained similar word information between live voice and artificial voice with an accuracy of 33.33%.