International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 187 - Issue 37 |
Published: September 2025 |
Authors: Jingga Musfita Maharani Rustam, Imam Riadi |
![]() |
Jingga Musfita Maharani Rustam, Imam Riadi . Website Forensic Analysis on Application X for Online Prostitution Cases using National Institute of Justice Method. International Journal of Computer Applications. 187, 37 (September 2025), 16-23. DOI=10.5120/ijca2025925636
@article{ 10.5120/ijca2025925636, author = { Jingga Musfita Maharani Rustam,Imam Riadi }, title = { Website Forensic Analysis on Application X for Online Prostitution Cases using National Institute of Justice Method }, journal = { International Journal of Computer Applications }, year = { 2025 }, volume = { 187 }, number = { 37 }, pages = { 16-23 }, doi = { 10.5120/ijca2025925636 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2025 %A Jingga Musfita Maharani Rustam %A Imam Riadi %T Website Forensic Analysis on Application X for Online Prostitution Cases using National Institute of Justice Method%T %J International Journal of Computer Applications %V 187 %N 37 %P 16-23 %R 10.5120/ijca2025925636 %I Foundation of Computer Science (FCS), NY, USA
The increasing use of social media has made communication easier but also opened opportunities for misuse, such as online prostitution. The web-based X application is one of the platforms exploited by perpetrators to operate covertly. This study aims to obtain digital evidence to support investigations by uncovering traces of the perpetrator’s activities through forensic analysis. The method applied follows the National Institute of Justice (NIJ) model, which consists of five stages: preparation, collection, examination, analysis, and reporting. Data collection was carried out through the acquisition of digital data from the perpetrator’s device, followed by the examination of metadata, cache, and hidden files. The analysis focused on conversations, uploaded images, and activity history on the X application. The results show that FTK Imager successfully revealed the perpetrator’s username and four promotional text posts. Browser History Examiner extracted access history to X, two deleted images, and one transfer proof image. HxD recovered 19 deleted conversations, including price negotiations and bank account details. These findings confirm that digital forensic approaches are effective in supporting the investigation and substantiation of web-based social media crimes.