INTERNATIONAL JOURNAL OF RESEARCH AND INNOVATION IN SOCIAL SCIENCE (IJRISS)
ISSN No. 2454-6186 | DOI: 10.47772/IJRISS | Volume IX Issue X October 2025
transcends procedural boundaries. Only through such integrated reform can Malaysia and Indonesia ensure that
the digital age becomes not a barrier, but a bridge to truth and accountability.
REFERENCES
1. Adams, Richard, Hobbs, Val & Mann, Graham (2013). The Advanced Data Acquisition Model (ADAM):
A Process Model for Digital Forensic Practice. Journal of Digital Forensics, Security and Law, 8(4), 25–
48.
2. Ademu, Inikpi O., Inmafidon, Cris O., & Preston, David S. (2011). A New Approach of Digital Forensic
Model for Digital Forensic Investigation. International Journal of Advanced Computer Science and
Application, 2(12), 175–178.
3. Andrews, Lori (2012). I Know Who You Are and I Saw What You Did: Social Networks and the Death
of Privacy. Free Press.
4. Angus-Anderson, W. (2015). Authenticity and admissibility of social media website printouts. Duke L.
& Tech. Rev., 14, 33.
5. Angus-Anderson, Wendy (2016). Authenticity and Admissibility of Social Media Website Printouts.
Duke Law & Technology Review, 14, 33–51.
6. Arshad, H., Jantan, A. B., & Abiodun, O. I. (2018). Digital forensics: Review of issues in scientific
validation of digital evidence. Journal of Information Processing Systems, 14(2).
7. Arshad, H., Jantan, A., & Omolara, E. (2019). Evidence collection and forensics on social networks:
Research challenges and directions. Digital Investigation, 28, 126-138.
8. Astoni, P. Y., & Sara, Y. (2025). Peran media sosial dalam penyebaran informasi dugaan kekerasan dalam
rumah tangga (KDRT) guna penegakkan hukum tindak pidana KDRT pada era digital. Jurnal Riset
Multidisiplin Edukasi, 2(7), 212–230.
9. Bowles, Stephen & Hernandez-Castro, Julio (2015). The First 10 Years of the Trojan Horse Defence.
Computer Fraud & Security, January 2015, 5–13.
10. Boyd, d. m., & Ellison, N. B. (2007). Social Network Sites: Definition, History, and Scholarship. Journal
of Computer-Mediated Communication, 13(1).
11. Brenner, Susan W., Carrier, Brian, & Henninger, Jef (2004). The Trojan Horse Defense in Cybercrime
Cases. Santa Clara High Technology Law Journal, 21, 1–42.
12. Brown, D. B., Robertson, T. J., & Sullivan, L. L. (2012). I see what you did there: The use of social
networks to gather evidence. Southern Law Journal, 22(2), 242–266.
13. Brown, R., Robertson, D., & Sullivan, J. (2012). The risks of taking Facebook at face value: Why the
psychology of social networking evidence matters in court. Stanford Law Journal, 22(1), 45–78.
14. Budi Santoso. (2024). Evidence of social media accounts in the investigation process. Legal Brief, 13(3),
960–968.
15. Chen, L., Li, W., & Haddad, R. J. (2017). Special Issue on Mobile Systems, Mobile Networks, and
Mobile Cloud: Security, Privacy, and Digital Forensics. Information, 8(3), 99.
16. Cummings, Douglas J. Jr. (2015). Authenticating Social Media Evidence at Trial: Instruction from Parker
v. State. Delaware Law Review, 15, 107–136.
17. Daniel, Larry E., & Daniel, Lars E. (2012). Digital Forensics for Legal Professionals: Understanding
Digital Evidence from the Warrant to the Courtroom. Elsevier: Massachusetts, USA.
18. Flanagan, E. A. (2016). Guilty? Sublet v. State and the authentication of social media evidence in criminal
proceedings. Villanova Law Review, 61(2), 287–316.
19. Garfield Tenzer, L. Y. (2019). Social media, venue, and the right to a fair trial. Baylor L. Rev., 71, 421.
20. Gladysz, L. M. (2012). Status Update: When Social Media Enters the Courtroom. Journal of Law &
Policy for Information Society, 7, 691–714.
21. Glancy, G., Heintzman, M., & Wheeler, A. (2019). Battered woman syndrome: Updating the expert
checklist. International Journal of Risk and Recovery, 2(2), 4–17.
22. Grice, D., & Schwartz, B. (2012). Social Incrimination: How North American Courts Are Embracing
Social Network Evidence in Criminal and Civil Trials. Man. LJ, 36, 221.
23. Hadi, A. M. (2024). Cyber Crime in Renewing The ITE Law to Realize The Goals of Legal
Justice. Journal of Law, Society, and Islamic Civilization, 12(1), 49-60.
Page 10179