Evolution and Research Opportunities of Digital Forensic Tools: A Bibliometric Analysis

Authors

  • Rischi Dwi Syahputri Universitas Trunojoyo Madura
  • Alexander Anggono Universitas Trunojoyo Madura
  • Prasetyono Prasetyono Universitas Trunojoyo Madura
  • Mohamad Djasuli Universitas Trunojoyo Madura

DOI:

https://doi.org/10.31154/cogito.v10i2.675.474-485

Keywords:

Cybersecurity, Digital Forensic Tools, Research Trends, Bibliometric Analysis

Abstract

The use of digital technology has increased rapidly, presenting new challenges such as cybercrime, online fraud and money laundering. To address these threats, digital forensic tools have become crucial in investigating and analyzing electronic evidence to combat increasingly complex digital crimes. Therefore, research and development in the field of digital forensics is crucial to address the growing digital security challenges. This study aims to conduct a bibliometric analysis of digital forensic tools research in the business, management and accounting domains over the past ten years, evaluate the evolution of the research, identify promising research opportunities and provide insights into future directions in the field. Bibliometric analysis was conducted with the help of VOSviewer software on 698 Scopus-indexed articles sourced from ScienceDirect during 2014-2023. Based on the network map analysis, it was found that despite much progress, the field continues to evolve and offers many opportunities for further research and innovation in digital forensic tools related to mobile forensics, memory forensics, anti-forensics, malware analysis, cloud forensics, cybersecurity, machine learning and deep learning, and ethics and privacy in forensic investigations.

References

S. S. Alsemairi, “The Role of Digital Technologies in Combating Cyber-Trafficking in Persons Crimes,” Comput. Inf. Sci., vol. 16, no. 1, pp. 49–64, 2023, doi: 10.5539/cis.v16n1p49.

A. R. Javed, W. Ahmed, M. Alazab, Z. Jalil, K. Kifayat, and T. R. Gadekallu, “A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions,” IEEE Access, vol. 10, no. 1, pp. 11065–11089, 2022, doi: 10.1109/ACCESS.2022.3142508.

E. K. Brown, “Digital Forensic and Distributed Evidence,” Res. Nexus IT, Law, Cyber Secur. Forensics, vol. 1, no. 1, pp. 357–362, 2022, doi: 10.22624/aims/crp-bk3-p57.

I. Riadi, A. Yudhana, and Galih Pramuja Inngam Fanani, “Comparative Analysis of Forensic Software on Android-based MiChat using ACPO and DFRWS Framework,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 7, no. 2, pp. 286–292, 2023, doi: 10.29207/resti.v7i2.4547.

I. Riadi, H. Herman, and N. H. Siregar, “Mobile Forensic of Vaccine Hoaxes on Signal Messenger using DFRWS Framework,” MATRIK J. Manajemen, Tek. Inform. dan Rekayasa Komput., vol. 21, no. 3, pp. 489–502, 2022, doi: 10.30812/matrik.v21i3.1620.

I. Riadi, Herman, and N. H. Siregar, “Mobile Forensic Analysis of Signal Messenger Application on Android using Digital Forensic Research Workshop (DFRWS) Framework,” Ing. des Syst. d’Information, vol. 27, no. 6, pp. 903–913, 2022, doi: 10.18280/ISI.270606.

G. N. Samy et al., “Proposed proactive digital forensic approach for cloud computing environment,” Int. J. Eng. Technol., vol. 7, no. 4.15, pp. 12–15, 2018, doi: 10.14419/ijet.v7i4.15.21362.

A. A. Khan, A. A. Shaikh, A. A. Laghari, and M. M. Rind, “Cloud forensics and digital ledger investigation: a new era of forensics investigation,” Int. J. Electron. Secur. Digit. Forensics, vol. 15, no. 1, pp. 1–23, 2023, doi: 10.1504/IJESDF.2023.10045851.

R. Kumar, K. S. Kakade, M. Priscilla, and B. V. S. Krishna, “An effective digital forensic paradigm for cloud computing criminal investigation,” Int. J. Electron. Secur. Digit. Forensics, vol. 15, no. 6, pp. 655–664, 2023, doi: 10.1504/IJESDF.2023.133966.

B. Kaur, K. Sood, and S. Grima, “A systematic review on forensic accounting and its contribution towards fraud detection and prevention,” J. Financ. Regul. Compliance, vol. 31, no. 1, pp. 60–95, 2023, doi: 10.1108/JFRC-02-2022-0015.

H. Yarovenko and M. Rogkova, “Dynamic and bibliometric analysis of terms identifying the combating financial and cyber fraud system,” Financ. Mark. Institutions Risks, vol. 6, no. 3, pp. 93–104, 2022, doi: 10.21272/fmir.6(3).93-104.2022.

M. Wundram, F. C. Freiling, and C. Moch, “Anti-forensics: The next step in digital forensics tool testing,” Proc. - 7th Int. Conf. IT Secur. Incid. Manag. IT Forensics, IMF 2013, vol. 7, no. 1, pp. 83–97, 2013, doi: 10.1109/IMF.2013.17.

M. Gengenbach, A. Chassanoff, and P. Olsen, “Integrating digital forensics into born-digital workflows: The BitCurator project,” Proceedings of the ASIST Annual Meeting, vol. 49, no. 1. pp. 1–4, 2012. doi: 10.1002/meet.14504901343.

V. K. Devendran, H. Shahriar, and V. Clincy, “A Comparative Study of Email Forensic Tools,” J. Inf. Secur., vol. 06, no. 02, pp. 111–117, 2015, doi: 10.4236/jis.2015.62012.

Y. Yannikos and C. Winter, “Model-based generation of synthetic disk images for digital forensic tool testing,” Proc. - 2013 Int. Conf. Availability, Reliab. Secur. ARES 2013, vol. 1, no. 1, pp. 498–505, 2013, doi: 10.1109/ARES.2013.65.

J. L. Bierstaker, R. G. Brody, and C. Pacini, “Accountants’ perceptions regarding fraud detection and prevention methods,” Manag. Audit. J., vol. 21, no. 5, pp. 520–535, 2006, doi: 10.1108/02686900610667283.

A. Parveen, Z. H. Khan, and S. N. Ahmad, “Classification and evaluation of digital forensic tools,” Telkomnika (Telecommunication Comput. Electron. Control., vol. 18, no. 6, pp. 3096–3106, 2020, doi: 10.12928/TELKOMNIKA.v18i6.15295.

O. E. Akinbowale, H. E. Klingelhöfer, and M. F. Zerihun, “An innovative approach in combating economic crime using forensic accounting techniques,” J. Financ. Crime, vol. 27, no. 4, pp. 1253–1271, 2020, doi: 10.1108/JFC-04-2020-0053.

H. Adamu, A. A. Ahmad, A. Hassan, and S. B. Gambasha, “Web Browser Forensic Tools: Autopsy, BHE and Net Analysis,” Int. J. Res. Innov. Appl. Sci., vol. 6, no. 6, pp. 56–61, 2021, doi: 10.51584/ijrias.2021.6506.

S. Subektiningsih and D. Hariyadi, “The Role of Digital Forensic Experts in Cybercrime Investigations in Indonesia Based on The Scopus Research Index,” Build. Informatics, Technol. Sci., vol. 4, no. 3, pp. 1665–1670, 2022, doi: 10.47065/bits.v4i3.2638.

P. H. Rughani, “Artificial Intelligence Based Digital Forensics Framework,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 8, pp. 10–14, 2017, doi: 10.26483/ijarcs.v8i8.4571.

Y. Guo and J. Slay, “Data Recovery Function Testing for Digital Forensic Tools,” Adv. Digit. Forensics, vol. 6, no. 1, pp. 297–311, 2010.

S. Karyana, O. Sumarna, and A. Setiawan, “Bibliometric Computational Mapping Analysis of Publications on Computational Thinking in Science Education using VOSviewer,” J. Adv. Res. Appl. Sci. Eng. Technol. J., vol. 58, no. 2, pp. 70–84, 2024.

H. N. Genc, N. Kocak, N. Bibliometric, H. N. Genc, and N. Kocak, “Bibliometric Analysis of Studies on the Artificial Intelligence in Science Education with VOSviewer,” J. Educ. Sci. Environ. Heal., vol. 10, no. 4, pp. 183–195, 2024.

Z. Guofang, M. S. Rasul, and M. Omar, “A Bibliometric Analysis of Publications on University- Industry Collaboration Using VOSviewer and R- biblioshiny,” Multidiscip. J. Educ. Soc. Technol. Sci., vol. 11, no. 2, pp. 26–50, 2024.

D. Moher, A. Liberati, J. Tetzlaff, and D. G. Altman, “Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement,” BMJ, vol. 339, no. 7716, pp. 332–336, 2009, doi: 10.1136/bmj.b2535.

A. Budiani and S. Sopiah, "Green human resource management: A systematic literature review (SLR) and bibliometric analysis," Jurnal Syntax Fusion, vol. 2, no. 11, pp. 818-832, 2022.

A. Zaskia, "Intensi berwirausaha: Analisis bibliometrik," OIKOS: J. Kajian Pendidik. Ekonomi dan Ilmu Ekonomi, vol. 7, no. 1, pp. 136-152, 2023.

Downloads

Published

2024-12-31

How to Cite

Dwi Syahputri, R. ., Anggono, A., Prasetyono, P., & Djasuli, M. (2024). Evolution and Research Opportunities of Digital Forensic Tools: A Bibliometric Analysis. CogITo Smart Journal, 10(2), 474–485. https://doi.org/10.31154/cogito.v10i2.675.474-485