- Digital Forensics,
- Fingerprint Analysis,
- Bibliometric Research,
- Individual Identification,
- Research Patterns
Copyright (c) 2023 Jaylu Kosasih, Emy Rosnawati
This work is licensed under a Creative Commons Attribution 4.0 International License.
This bibliometric analysis, conducted on December 24, 2022, aims to unravel the research landscape surrounding "fingerprints" in the realm of digital forensics. Employing the VOSviewer application and Lens.org data, we gathered 134 journal articles from 2012 to 2022, focusing on the field of law. Notably, 2019 emerged as a pivotal year with 35 journal articles, while the United Kingdom, United States, and Switzerland led in publication output. K.J.R. Liu exhibited the highest productivity with 15 journal articles, and the University of Nottingham proved to be the most prolific institution. The Journal of Business Ethics stood out as the most influential publication. Our topic analysis revealed a single cluster, with "human" being the most prevalent term. This research underscores the significance of fingerprints in individual identification, be it through smartphone or laptop sensors or DNA analysis for ancestral tracing, offering valuable insights for the global scientific community.
- Comprehensive Data Analysis: Our study analyzes 134 journal articles from 2012 to 2022, providing a comprehensive overview of research trends in digital forensics related to fingerprints.
- Productivity Insights: K.J.R. Liu's prolific output of 15 journal articles and the University of Nottingham's leading role in publication output shed light on key contributors in this field.
- Fingerprint Significance: The research underscores the critical role of fingerprints in individual identification, whether through digital sensors or DNA analysis, with implications for broader forensic applications.
Keywords: Digital Forensics, Fingerprint Analysis, Bibliometric Research, Individual Identification
- M. N. Faiz, R. Umar, and A. Yudhana, "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email," J. Inform. Sunan Kalijaga, vol. 1, no. 3, pp. 108–114, 2017.
- R. Montasari, "Review and Assessment of the Existing Digital Forensic Investigation Process Models," Int. J. Comput. Appl., vol. 147, no. 7, pp. 1–9, 2016.
- A. Valjarevic and H. Venter, "Analyses of the State-of-the-Art Digital Forensic Investigation Process Models," in South Africa Telecommunication Networks and Applications Conference, 2012.
- R. Umar, A. Yudhana, and M. N. Faiz, "Analisis Kinerja Metode Live Forensics Untuk Investigasi Random Access Memory Pada Sistem Proprietary," in Prosiding Konferensi Nasional Ke-4 Asosiasi Program Pascasarjana Perguruan Tinggi Muhammadiyah (APPPTM), 2016, pp. 207–211.
- ISO/IEC 27043, "Information technology — Security techniques — Incident investigation principles and processes," 2015.
- E. Casey, "Digital Evidence and Computer Crime - Third edition." Maryland: Elsevier, 2011.
- F. Cohen, "Chapter 2 Toward a Science of Digital Forensic Evidence Examination," in 6th IFIP WG 11.9 International Conference on Digital Forensics, 2010, pp. 17–35.
- T. Charles and M. Pollock, "Digital Forensic Investigations at Universities in South Africa," in 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), 2015, pp. 53–58.
- A. Agarwal, M. Gupta, S. Gupta, and C. S. Gupta, "Systematic Digital Forensic Investigation Model," Int. J. Comput. Sci. Secur., vol. 5, no. 1, pp. 118–131, 2011.
- S. Rani, "Digital Forensic Models: A Comparative Analysis," Int. J. Manag. IT Eng., vol. 8, no. 6, pp. 432–443, 2018.
- I. O. Ademu, C. O. Imafidon, and D. S. Preston, "A New Approach of Digital Forensic Model for Digital Forensic Investigation," Int. J. Adv. Comput. Sci. Appl., vol. 2, no. 12, pp. 175–178, 2011.
- Y. Yusoff, R. Ismail, and Z. Hassan, "Common Phases of Computer Forensics Investigation Models," Int. J. Comput. Sci. Inf. Technol., vol. 3, no. 3, pp. 17–31, 2011.
- S. Al-fedaghi and B. Al-babtain, "Modeling the Forensics Process," Int. J. Secur. Its Appl., vol. 6, no. 4, pp. 97–108, 2012.
- K. Kyei, P. Zavarsky, D. Lindskog, and R. Ruhl, "A Review and Comparative Study of Digital Forensic Investigation Models," Digit. Forensics Cybercrime, pp. 314–327, 2013.
- G. Shrivastava, K. Sharma, and A. Dwivedi, "Forensic Computing Models: Technical Overview," Comput. Sci. Inf. Technol., vol. 2, no. 2, pp. 207–216, 2012.
- A. L. Suryana, R. R. El Akbar, and N. Widiyasono, "Investigasi Email Spoofing dengan Metode Digital Forensics Research Workshop (DFRWS)," J. Edukasi dan Penelit. Inform., vol. 2, no. 2, pp. 111–117, 2016.
- Y. D. Rahayu and Y. Prayudi, "Membangun Integrated Digital Forensics Investigation Frameworks (IDFIF) Menggunakan Metode Sequential Logic," in Seminar Nasional Teknologi Informasi dan Komunikasi 2014 (SENTIKA 2014), 2014.