Forensic Analysis of Third-party Mobile Application

  • ALThebaity M
  • Mishra S
  • Kumar Shukla M
N/ACitations
Citations of this article
36Readers
Mendeley users who have this article in their library.

Abstract

The expansion of the phone's memory space and processing power comprise some of the primary contributing factors to the evolution of digital crime. Therefore, wide adoption and reliance of third-party applications expose individuals to various digital crimes. In this research both qualitative and quantitative methods are used. The recovered data items from the phone's memory were classified and facilitate the description of the recoverableapp and user information after the deletion of the social networking app like Facebook. The choice of Facebook as the subject app for investigation arises from the fact that it comprises one of the major social network platforms. Some of the recoverable data in both scenarios include but not limited to text messages, login information, friends' information, and user account details, among others. The research seeks to fill an existing gap concerning theestablishment of the location and types of recoverable data after the uninstallation of the Facebook application from a smartphone device.

Cite

CITATION STYLE

APA

ALThebaity, M., Mishra, S., & Kumar Shukla, M. (2020). Forensic Analysis of Third-party Mobile Application. HELIX, 10(4), 32–38. https://doi.org/10.29042/2020-10-4-32-38

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free