Vol 12 No 1 (2023): Proceedings of Data in Education, Culture, and Interdisciplinary Studies
Articles

Fingerprint Analysis in Digital Forensics: A Bibliometric Examination
Analisis Sidik Jari dalam Forensik Digital: Sebuah Pemeriksaan Bibliometrik.


Jaylu Kosasih
Universitas Muhammadiyah Sidoarjo, Indonesia
Emy Rosnawati
Universitas Muhammadiyah Sidoarjo, Indonesia
Nurhayati
Universitas Muhammadiyah Sidoarjo, Indonesia
Picture in here are illustration from public domain image or provided by the author, as part of their works
Published October 16, 2023
Keywords
  • Digital Forensics,
  • Fingerprint Analysis,
  • Bibliometric Research,
  • Individual Identification,
  • Research Patterns
How to Cite
Kosasih, J., Rosnawati, E., & Nurhayati. (2023). Fingerprint Analysis in Digital Forensics: A Bibliometric Examination. Proceedings of The ICECRS, 12(1). https://doi.org/10.21070/icecrs.v12i1.1713

Abstract

This bibliometric analysis, conducted on December 24, 2022, aims to unravel the research landscape surrounding "fingerprints" in the realm of digital forensics. Employing the VOSviewer application and Lens.org data, we gathered 134 journal articles from 2012 to 2022, focusing on the field of law. Notably, 2019 emerged as a pivotal year with 35 journal articles, while the United Kingdom, United States, and Switzerland led in publication output. K.J.R. Liu exhibited the highest productivity with 15 journal articles, and the University of Nottingham proved to be the most prolific institution. The Journal of Business Ethics stood out as the most influential publication. Our topic analysis revealed a single cluster, with "human" being the most prevalent term. This research underscores the significance of fingerprints in individual identification, be it through smartphone or laptop sensors or DNA analysis for ancestral tracing, offering valuable insights for the global scientific community.

Highlights: 

  • Comprehensive Data Analysis: Our study analyzes 134 journal articles from 2012 to 2022, providing a comprehensive overview of research trends in digital forensics related to fingerprints.
  • Productivity Insights: K.J.R. Liu's prolific output of 15 journal articles and the University of Nottingham's leading role in publication output shed light on key contributors in this field.
  • Fingerprint Significance: The research underscores the critical role of fingerprints in individual identification, whether through digital sensors or DNA analysis, with implications for broader forensic applications.

Keywords: Digital Forensics, Fingerprint Analysis, Bibliometric Research, Individual Identification
,Research Patterns

Downloads

Download data is not yet available.

References

  1. M. N. Faiz, R. Umar, and A. Yudhana, "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email," J. Inform. Sunan Kalijaga, vol. 1, no. 3, pp. 108–114, 2017.
  2. R. Montasari, "Review and Assessment of the Existing Digital Forensic Investigation Process Models," Int. J. Comput. Appl., vol. 147, no. 7, pp. 1–9, 2016.
  3. A. Valjarevic and H. Venter, "Analyses of the State-of-the-Art Digital Forensic Investigation Process Models," in South Africa Telecommunication Networks and Applications Conference, 2012.
  4. R. Umar, A. Yudhana, and M. N. Faiz, "Analisis Kinerja Metode Live Forensics Untuk Investigasi Random Access Memory Pada Sistem Proprietary," in Prosiding Konferensi Nasional Ke-4 Asosiasi Program Pascasarjana Perguruan Tinggi Muhammadiyah (APPPTM), 2016, pp. 207–211.
  5. ISO/IEC 27043, "Information technology — Security techniques — Incident investigation principles and processes," 2015.
  6. E. Casey, "Digital Evidence and Computer Crime - Third edition." Maryland: Elsevier, 2011.
  7. F. Cohen, "Chapter 2 Toward a Science of Digital Forensic Evidence Examination," in 6th IFIP WG 11.9 International Conference on Digital Forensics, 2010, pp. 17–35.
  8. T. Charles and M. Pollock, "Digital Forensic Investigations at Universities in South Africa," in 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), 2015, pp. 53–58.
  9. A. Agarwal, M. Gupta, S. Gupta, and C. S. Gupta, "Systematic Digital Forensic Investigation Model," Int. J. Comput. Sci. Secur., vol. 5, no. 1, pp. 118–131, 2011.
  10. S. Rani, "Digital Forensic Models: A Comparative Analysis," Int. J. Manag. IT Eng., vol. 8, no. 6, pp. 432–443, 2018.
  11. I. O. Ademu, C. O. Imafidon, and D. S. Preston, "A New Approach of Digital Forensic Model for Digital Forensic Investigation," Int. J. Adv. Comput. Sci. Appl., vol. 2, no. 12, pp. 175–178, 2011.
  12. Y. Yusoff, R. Ismail, and Z. Hassan, "Common Phases of Computer Forensics Investigation Models," Int. J. Comput. Sci. Inf. Technol., vol. 3, no. 3, pp. 17–31, 2011.
  13. S. Al-fedaghi and B. Al-babtain, "Modeling the Forensics Process," Int. J. Secur. Its Appl., vol. 6, no. 4, pp. 97–108, 2012.
  14. K. Kyei, P. Zavarsky, D. Lindskog, and R. Ruhl, "A Review and Comparative Study of Digital Forensic Investigation Models," Digit. Forensics Cybercrime, pp. 314–327, 2013.
  15. G. Shrivastava, K. Sharma, and A. Dwivedi, "Forensic Computing Models: Technical Overview," Comput. Sci. Inf. Technol., vol. 2, no. 2, pp. 207–216, 2012.
  16. A. L. Suryana, R. R. El Akbar, and N. Widiyasono, "Investigasi Email Spoofing dengan Metode Digital Forensics Research Workshop (DFRWS)," J. Edukasi dan Penelit. Inform., vol. 2, no. 2, pp. 111–117, 2016.
  17. Y. D. Rahayu and Y. Prayudi, "Membangun Integrated Digital Forensics Investigation Frameworks (IDFIF) Menggunakan Metode Sequential Logic," in Seminar Nasional Teknologi Informasi dan Komunikasi 2014 (SENTIKA 2014), 2014.