cover
Contact Name
Ahmad Azhari
Contact Email
ahmad.azhari@tif.uad.ac.id
Phone
+6281294055949
Journal Mail Official
mf.mti@uad.ac.id
Editorial Address
Magister Teknik Informatika Jl. Prof. Dr. Soepomo SH, Janturan, Warungboto, Yogyakarta 55164
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Mobile and Forensics
ISSN : 26566257     EISSN : 27146685     DOI : https://doi.org/10.12928/mf
Mobile and Forensics (MF) adalah Jurnal Nasional berbasis online dan open access untuk penelitian terapan pada bidang Mobile Technology dan Digital Forensics. Jurnal ini mengundang seluruh ilmuan dan peneliti dari seluruh dunia untuk bertukar dan menyebarluaskan topik-topik teoritis dan praktik yang berorientasi pada kemajuan teknologi mobile dan digital forensics.
Articles 99 Documents
Decision Making for Insurance Eligibility based on Mortality Differential in Southeast Asian Countries
Mobile and Forensics Vol. 4 No. 2 (2022)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v4i2.6032

Abstract

Indonesia, Malaysia, and Singapore are each at different stages of economic development, all have achieved sufficient size and economic strength that they are being prospected by several global life insurance and life annuities. Their economies have speedily been moving out of their traditional agrarian bases and becoming far more urbanized and industrialized. This study aims to compare the characteristics of various mortality risk factors between three countries in Southeast Asia (Indonesia, Malaysia, and Singapore) and analyze differences in mortality rates for the development of the life insurance business
Early Childhood Mobile Puzzle Game for Learning Hijaiyah Letters
Mobile and Forensics Vol. 4 No. 2 (2022)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v4i2.6355

Abstract

The use of Arabic in Muslim worship activities is the main and dominant thing to do, especially in the activities of praying and reading the Qur'an. The Arabic language in these two activities is presented in Hijaiyah letters, so that the ability to read Hijaiyah letters is very obligatory and necessary for Muslims from an early age, through learning and playing activities. Salman Al Farisi I Kindergarten in the Yogyakarta area, Indonesia, has taught its students to learn to read Hijaiyah letters. One of the learning activities to recognize Hijaiyah letters is a puzzle game. This study aims to develop a multimedia application for learning Hijaiyah letters. The application was developed according to the needs of early childhood with the concept of a learning environment and playing through smartphone devices. User-Centered Design (UCD) was used in this study which consisted of six steps: Identifying Needs, Determining Context of Use, Determining Needs, Generating Solution Design, Design Evaluation, and Implementation. This research produces applications that suit system requirements and user needs with good multimedia quality. The results of testing the quality of multimedia show that the application gets a score of 4.53 out of a scale of 5. This score shows that the application has a very good rating.
Convolutional Neural Network on Brain Concentration and Art of Reading the Qur'an
Mobile and Forensics Vol. 4 No. 2 (2022)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v4i2.5836

Abstract

In Islam there is a belief that reading the Qur'an can increase one's concentration power in doing something. Concentration can be influenced by several factors, to be able to identify or characterize individuals, it is necessary to measure brain wave activity. Brain waves are one of the biometric properties that can be used to identify individuals based on their physical. An electroencephalogram (EEG) can be used to measure and capture brain wave activity. To be able to naturally record brain wave activity requires constant and emergent brain activity. The activities needed are in the form of giving assignments to get the thinking process and concentration needed for the Basic Cognitive Test. The object of this research is the students of the University in Yogyakarta. EEG data recording was carried out in two stages, the first stage the respondents were given 10 minutes to work on the test questions without reading the Qur'an before working on the questions, the second stage the respondents were given 10 minutes to work on the test questions by reading the Qur'an before doing the work. about. When the respondent was working on the test, the researcher recorded the EEG signal using Neurosky Mindwave Mobile 2, so that the data in the form of brain signals was obtained. The data acquisition will undergo a preprocessing process in the form of a domain transformation signal using Fast Fourier Transform (FFT). Then enter the labeling process and after that the next process will be carried out the classification process using the CNN algorithm. The results of this study showed that 10 of 30 students' concentration levels experienced an increase, with an accuracy rate of 85% and a significant F test is 0.002
A Comparative Forensic Analysis of Android based Social Media Applications
Mobile and Forensics Vol. 4 No. 2 (2022)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v4i2.6270

Abstract

Smartphones are increasing worldwide rapidly. It works as a personal assistant that helps us master our everyday life. This is the reason why forensic experts always try to get the most crucial evidence from smartphones. While doing a forensic analysis of smartphones there is a need to identify the programs/files containing malicious actions or activity. Most of the users’ information resides inside the digital device and should be extracted carefully as it is needed for further users’ entity and behavior analytics. In this study, we used the most famous forensic tools MOBILedit and Autopsy for efficient extraction of potential evidence from the Android file system. The file system images from different android devices (rooted and unrooted) are extracted on multiple analyses (type-based, size-based). Additionally, a timeline of the log files has also been made, which can assist the investigator in locating any log files that were updated or altered at the scene of the crime by suspects or victims.
Comparison of Forensic Tool Results on Android Smartphone Backup Files Using NIST Method
Mobile and Forensics Vol. 4 No. 2 (2022)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v4i2.6496

Abstract

Smartphone technology currently developing not only has a positive impact but can also have a negative impact if it is used to commit crimes which can be called cybercrime. Choosing the right forensic tools is very important when conducting an investigation. So it is necessary to research the results of the comparative analysis of the performance of forensic tools on android smartphone backup files. The National Institute of Standards and Technology (NIST) method was used in this study as a parameter and for the digital evidence obtained. The results of the extraction of the OPPO A37f android smartphone from the MOBILedit tools acquired android backup files and the analysis results from using the Magnet AXIOM tools with a data accuracy rate of 39.3% from the predetermined variables. The Oxygen Forensic Tools obtained a data accuracy rate of 28.6% from the variable that has been determined. The Belkasoft Evidence Center tools can get a data accuracy rate of 35.7% of the predetermined variables. The results of this study can be concluded that the Magnet Axiom tool has a high level of accuracy compared to the Oxygen Forensic and Belkasoft Evidence Center tools in extracting data from android smartphone backup files.
Investigating Student Learning Outcome using Quizziz in Engineering Students
Mobile and Forensics Vol. 4 No. 2 (2022)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v4i2.7018

Abstract

Material control throughout the manufacturing and distribution process is a cycle that needs to be considered in material handling and technology identification so that the production system in the automation industry runs according to its workflow. Industrial automation in vocational learning must be provided so that students have insight related to the field of automation. Vocational learning needs to use appropriate and modern media in the era of digitalization. The purpose of this study was to determine the performance of Quizizz media for industrial automation learning outcomes. The research design used was a one-group pretest posttest pre-experimental design. The sample group used was 66 students of industrial automation courses in the Mechanical Engineering Vocational Education Study Program. The research method used is the T test. The T test is used to determine the average posttest value. The level of statistical significance used is 5% (alpha). From the results of the study, it was found that there was an increase in insight related to transport equipment; storage systems; unitizing equipment; identification and tracking systems; and automatic identification and data capture (AIDC). The use of quizizz media has a role in active, interactive, fun, and modern learning in the era of digitalization.
Impact of Banking Fraud Awareness Booklet Among The Students of Satara Samidha, Samidha Walvekar
Mobile and Forensics Vol. 5 No. 2 (2023)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v5i2.7881

Abstract

With the growth of information and communication technology, the structure and nature of financial services delivery has also changed. Online banking or internet banking has emerged as a new and convenient way for using financial services like funds transfer, viewing account statement, bill payment, use of e-wallets etc. An upsurge in the use of devices connected with the internet and the convenience of online financial services has increased the risk of our hard-earned money being duped by cybercriminals. The main aim of this study is to assess the impact of Banking fraud awareness Booklet regarding online among students of Satara. The objectives of this study are to assess knowledge regarding awareness of online banking frauds among college going students, to determine the effectiveness of information booklet among college going students and also to find out association between socio-demographic variables and the booklet. The results show the significant increase in mean scores as (mean pre 16.92 SD=2.591 to mean post 18.32 SD=1.842). The paired 't' test applied showed the calculated paired t value (5.291 at 0.05 level of significance). The study reveals that there is association between, class, department & course of the subjects and level of knowledge regarding awareness on online banking frauds. The information booklet was effective in improving the knowledge of awareness regarding online banking frauds among the Undergraduate students. Keywords: Online banking frauds, Banking fraud awareness booklet.
Improved Breadth First Search For Public Transit Line Search Optimization Kartoirono, Suprihatin; Riadi, Imam; Furizal, Furizal; Azhari, Ahmad
Mobile and Forensics Vol. 5 No. 1 (2023)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v5i1.7906

Abstract

People in general find it difficult to determine the transportation route, because to get to one destination there are many alternative paths that must be passed. This study aims to model the search for alternative bus route routes that are faster to produce routes that must be passed. The method used in this study is Improved Breadth first search by modifying BFS so that its performance is improved in producing route search completion. The improved BFS method is basically the same as BFS doing a level-by-level search stop if a false finish point is found. As the experiment above with a starting point of 175 and an end point of 54 the BFS algorithm takes 27 seconds 564 milliseconds, while the Improve BFS algorithm takes 171 milliseconds. The results showed that improved BFS can improve the performance of the BFS method. Research can be a model to be applied to other optimal route finding cases.
Forensic Artifact Discovery and Suspect Profiling through Google Assistant Rahaman, Abu Sayed Md. Mostafizur; Marzia, Saiyeda; Arnob, Tafsir Haque; Rahman, Md.Zahidur; Akhter, Jesmin
Mobile and Forensics Vol. 5 No. 1 (2023)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v5i1.8046

Abstract

It has become impossible to imagine modern society without the internet and mobile devices dominating our daily lives. As a result, popular apps like Google Assistant, Gmail, Google Home, etc., are quietly entering our veins. People aren't even aware of how much of a digital footprint they leave behind, let alone the fact that it can be completely chronologized and used to put any criminal in jail. The data that we intentionally send to Google is fully retrievable from both the client side (a mobile device) and the cloud. Even if a suspect changes his mobile device, his previous digital footprint still follows him wherever he goes. In this project, we pinpointed the location of the primary database and the major repository for Google Assistant. Here, forensic artifacts of interest from our inquiry have been revealed, including the timeline and copies of previously traded audio chats, as well as a record of deleted data. In addition to that, we have applied the K-means clustering algorithm to isolate the suspect’s voice records and their chronological order among various call records stored in the cloud, where the cluster size is determined using the Silhouette score and the CH index. The findings of the research are to identify forensic artifacts and suspect profiling so that forensic investigators make it easier to conduct criminal investigations
Social Media Metadata Forensic Ontology Model Tuharea, Ibnu Rohan; Luthfi, Ahmad; Ramadani, Erika
Mobile and Forensics Vol. 5 No. 2 (2023)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/mf.v5i2.8937

Abstract

The escalating use of compact electronic gadgets like smartphones and smartwatches, along with social media platforms, has led to a new dimension of criminal activities. Advancements in digital forensics, which investigates digital evidence, have become noteworthy. Researchers David Christopher Harrill and Richard P. Mislan devised Small-Scale Digital Device Forensics (SSDDF) for examining miniature digital devices used in criminal undertakings. Edlira Kalemi and Sule Yildirim-Yayilgan demonstrated the application of ontology in social media forensics, deciphering Android system frameworks related to social media data extraction. However, their investigations mainly focused on social media, overlooking the role of gadgets used by criminals and victims. Extracting digital data from these devices remains pivotal for securing relevant evidence from social media. Notwithstanding, incorporating SSDDF and understanding Android system structures have significantly contributed to digital forensic methodologies. These enhancements can bolster the investigation process, capturing and analyzing critical digital evidence from compact electronic appliances and social media platforms. The advent of SSDDF and elucidating Android system structures have offered invaluable inputs to digital forensics, enhancing efficacy in amassing significant evidence from small electronic devices and social media platforms.

Page 7 of 10 | Total Record : 99