Moreover it has been shown how the main
forensic approaches can be applied, specifically on
this particular type of investigation, and how is
possible to collect the evidences.
Future work in this domain could be related to an
implementation of an automatic tool able to provide a
digital evidence collection by means of a forensic
investigation on social networking activities.
REFERENCES
Al-Saleh, I., M., & Forihat., Y. A. (2013). Skype forensics
in android devices. International Journal of Computer
Applications, (pp. 38-44).
Baca, M., Cosic, J., & Cosic, Z. (2013). Forensic analysis
of social networks (case study). Information
Technology Interfaces (ITI), Proceedings of the ITI
2013 35th International Conference on (pp. 219-223).
IEEE.
Boyd, D. m., & Ellison, N. B. (2007). Social Network Sites:
Definition, History and Scholarship. Journal of
Computer-Mediated Communication, (pp. 210-230).
FAW. (2020). https://it.fawproject.com/.
FindMyFbID. (2020). https://findmyfbid.in/.
Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., & Zhao, B.
(2010). Detecting and characterizing social spam
campaigns. Proceedings of the 10th annual conference
on Internet measurement (pp. 35-47). ACM.
Giudice, Paratore, Moltisanti, & Battiato. (2017). A
classification engine for image ballistics of social data.
International Conference on Image Analysis and
Processing, (pp. 625-636).
Jagatic, T., Johnson, N., Jakobsson, M., & Menczer, F.
(2007). Social phishing. Communications of the ACM,
(pp. 94-100).
Junjing, T., Yan, B., & Jinqiang, M. (2020). Research on
Forensics of Social Network Relationship Based on Big
Data. Journal of Physics: Conference Series 1584
012022. DMCIT 2020. doi:10.1088/1742-6596/1584/1/
012022
L. Bilge, T. S., Balzarotti, D., & Kirda, E. (2009). Allyour
contacts are belong to us: automated identity theft
attacks on social networks. Proceedings of the 18th
international conference on World wide web (pp. 551-
560). ACM.
La Stampa. (2018). Retrieved from https://www.
lastampa.it/cultura/2018/02/03/news/quanti-social-
network-esistono-1.33975738
Legal_eye. (2020). https://www.legaleye.cloud/public.
M. Huber, M. M. (2011). Friend-in-the-middle attacks:
Exploiting social networking sites for spam. Internet
Computing.
Mahajan, A., Dahiya, M. S., & Sanghvi, H. P. (2013).
Forensic analysis of instant messenger applications on
android devices. arXiv preprint arXiv:1304.4915.
Majeed, A., Zia, H., Imran, R., & Saleem, S. (2015,
December). Forensic analysis of three social media
apps in windows 10. 2015 12th International
Conference on High-capacity Optical Networks and
Enabling/Emerging Technologies (HONET), (pp. 75-
79). Islamabad (Pakistan). doi:10.1109/HONET.2015.
7395419
Mohtasebi, S., & Dehghantanha, A. (2011). Defusing the
Hazards of Social Network Services. Int. J. Digit. Inf.
Wirel. Commun., 504-516.
Moltisanti, M., Paratore, A., Battiato, S., & Saravo, L.
(2015). Image manipulation on facebook for forensics
evidence. International Conference on Image Analysis
and Processing, (pp. 506-517).
Mutawa, A., Baggili, & Marrington. (2012). Forensic
analysis of social networking applications on mobile
devices. DIgital Investigation, 9
, S24-S33.
Ortis, A., Farinella, G. M., & Battiato, S. (2020). Survey on
visual sentiment analysis. IET Image Processing, (pp.
14(8), 1440-1456).
Rocha, A., Scheirer, W. J., Forstall, C. W., Cavalcante, T.,
Theophilo, A., Shen, B., Stamatatos, E. (2016).
Authorship Attribution for Social Media Forensics.
IEEE Transactions On Information Forensics And
Security.
Smith, A., & Anderson, M. (2018, March 1). Social Media
Use in 2018. Pew Research Center. Retrieved from
www.pewresearch.org
Social Media List. (2020). Retrieved from
https://socialmedialist.org/social-media-apps.html
Thakur, N. S. (2013). Forensic analysis of WhatsApp on
Android smartphones. University of New Orleans
Theses and Dissertations.
Walnycky, D., Baggili, I., Marrington, A., Moore, J., &
Breitinger, F. (2015). Network and device forensic
analysis of Android social-messaging applications.
Digital Investigation Impact Factor: 0.99.
Wikipedia. (2020). Retrieved from https://en.wikipedia.
org/wiki/JPEG.
Wikipedia. (2020). Retrieved from https://en.wikipedia.org/
wiki/List of social networking websites.
Wondracek, G., Holz, T., Kirda, E., & Kruegel. (2010). A
Practical Attack to De-Anonymize Social Network
Users. Proceedings of the IEEE Symposium on Security
and Privacy.
Yusoff, M. N., Dehghantanha, A., & Mahmod, R. (2017).
Forensic Investigation of Social Media and Instant
Messaging Services in Firefox OS: Facebook, Twitter,
Google+, Telegram, OpenWapp and Line as Case
Studies. Contemporary Digital Forensic Investigations
Of Cloud And Mobile, Chapter 4, 41-62.