Email Analysis in Fraud Investigation: Digital Forensic and Network Analysis Approach
(1) Direktorat Jenderal Pajak
(*) Corresponding Author
Abstract
Email is an imperative method of communication that is changing the way people share their data and information. It provides effective and efficient communication, especially in business, convenience, and easy access and replication. Those electronic data should be considered by a fraud investigator to comprehend the investigation. Email can be divided into two parts: the head of the email and the email body. The head of the email is metadata that consists of unstructured data, and the body and its attachment consist of semi-structured data. The email data usually comes in large volumes and ranges of types. Therefore, a manual investigation of an email should be avoided. This paper uses the Design Science Research Methodology to discover the most profound framework in an email fraud investigation. Using email metadata and email body, this research performs a digital forensic framework: preparation, gathering, processing, and presentation, combines with social network analysis to be applicable in the investigation. The result shows that digital forensics process, network analysis, data visualization provides a more valuable and comprehensive insight into email analysis.
Keywords
Full Text:
PDFReferences
Alamyash, Andry, Rahardjo Budi.(2013). Financial Fraud Detection using Social Network Analysis, e-Indonesia Initiatives (eII-Forum).
Association of Certified Examiners. (2019). Fraud Examiners Manual.
Banday, M. Tariq. (2011). Techniques and Tools for Forensic Investigation of E-Mail, International Journal of Network Security & Its Application (IJNSA), Vol 3, No. 6.
Baroto, Wishnu Agung and Darajat, Firman, Digital Forensic Readiness for Micro, Small, and Medium Enterprise in Indonesia. (2020). International Journal of Management and Applied Science Vol 6, Issue 1, 25-30.
Baroto, Wishnu Agung and Prasetyo, Ardhianto H. (2020). Digital Forensic Process in Fraud Investigation: A Case Study on Email Analysis. International Journal of Scientific Engineering and Science Volume 2, Issue 9, 36-40.
Devendran, V., Shahriar, H., and Clincy, V. (2015). A Comparative Study of Email Forensic Tools, Journal of Information Security, 6, 111-117.
Hevner R., A., Salvator T., Jinsoo Park, & Sudha Ram. (2004). Design Science in Information Science.
Knoke David, H., James, Kuklinski, Network Analysis. (1982). Beverly Hills:Sage Publication.
Knoke David, H., Yang S. (2008). Social network analysis. Sage Publication.
Li, Mingxiang. (2013). Social Network and Social Capital in Leadership andManagement Research: A Review of Causal Methods.” LeadershipQuarterly 24.5(2013):638–665.
Oettinger, William. (2020). Learn Computer Forensics, Packt.
Omar, Normah, Mohamed, Ismail Sanusi, Zuraidah, and Prabowo, Hendi Yogi. (2014). Understanding Social Network Analysis in Fraud Detection, Recent Trends in Social and Behavior Scieance, Taylor & Francis Group.
Peffers, Ken, Tuunanen, Tuure, Rothenberger, Marcus A., and Chatterjee, Samir (2007). A Design Science Research Methodology for Information Systems Research, Journal of Management Information Systems, Volume 24 Issue 3.
Sachowski, Jason (2016). Implementing Digital Forensic Readiness from Reactive to Proactive Process,Elsevier.
Sparrowe, Raymond T., Liden, Robert C., Wayne, Sandy J., Kraimer, Maria L. (2011). Social Networks and the Performance of Individuals and Groups. The Academy of Management Journal.
Zhang, Junlong and Luo, Yu. (2017). Degree Centrality, Betweenness Centrality, and Closeness Centrality in Social Network, Advances in Intelligent Systems Research volume 132.
DOI: http://dx.doi.org/10.21532/apfjournal.v6i2.212
Article Metrics
Abstract view : 627 timesPDF - 348 times
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0).