{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T19:12:43Z","timestamp":1722453163591},"reference-count":22,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Forensic Science International: Digital Investigation"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1016\/j.fsidi.2022.301479","type":"journal-article","created":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T05:12:23Z","timestamp":1669612343000},"page":"301479","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":7,"special_numbering":"C","title":["Digital forensic analysis of discord on google chrome"],"prefix":"10.1016","volume":"44","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4452-5103","authenticated-orcid":false,"given":"Khushi","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Cihan","family":"Varol","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.fsidi.2022.301479_bib1","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.diin.2019.02.001","article-title":"Evidence collection and forensics on social networks: research challenges and directions","volume":"28","author":"Arshad","year":"2019","journal-title":"Digit. Invest."},{"key":"10.1016\/j.fsidi.2022.301479_bib2","series-title":"2015 AAAI Spring Symposium Series","article-title":"Data sources for advancing cyber forensics: what the social world has to offer","author":"Baggili","year":"2015"},{"key":"10.1016\/j.fsidi.2022.301479_bib3","author":"Brewster"},{"key":"10.1016\/j.fsidi.2022.301479_bib4","author":"Campbell"},{"key":"10.1016\/j.fsidi.2022.301479_bib5","first-page":"321","article-title":"LinkedIn social media forensics on Windows 10","volume":"22","author":"Chang","year":"2020","journal-title":"Int. J. Netw. Secur."},{"key":"10.1016\/j.fsidi.2022.301479_bib6","series-title":"Reproduced in Part in Research in Organizations: Issues and Controversies","article-title":"The design and conduct of true experiments and quasi-experiments in field settings","author":"Cook","year":"1979"},{"key":"10.1016\/j.fsidi.2022.301479_bib7","article-title":"Forensic investigation of instant messaging services on linux os: discord and slack as case studies","volume":"42","author":"Davis","year":"2022","journal-title":"Forensic Sci. Int.: Digit. Invest."},{"key":"10.1016\/j.fsidi.2022.301479_bib8","author":"Dean"},{"key":"10.1016\/j.fsidi.2022.301479_bib9","series-title":"Gangs and Social Media: A Systematic Literature Review and an Identification of Future Challenges, Risks and Recommendations","author":"Fern\u00e1ndez-Planells","year":"2021"},{"key":"10.1016\/j.fsidi.2022.301479_bib10","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.paid.2017.02.037","article-title":"Assessing personality using emoji: an exploratory study","volume":"112","author":"Marengo","year":"2017","journal-title":"Pers. Indiv. Differ."},{"key":"10.1016\/j.fsidi.2022.301479_bib11","series-title":"2021 Ieee 11th Annual Computing and Communication Workshop and Conference (Ccwc)","first-page":"993","article-title":"Discord forensics: the logs keep growing","author":"Moffitt","year":"2021"},{"key":"10.1016\/j.fsidi.2022.301479_bib12","series-title":"Digital Forensic Acquisition and Analysis of Discord Applications, in: 2020 International Conference on Communications, Computing, Cybersecurity, and Informatics (Ccci)","first-page":"1","author":"Motylinski","year":"2020"},{"key":"10.1016\/j.fsidi.2022.301479_bib13","series-title":"Discord","author":"NW3C","year":"2017"},{"key":"10.1016\/j.fsidi.2022.301479_bib14","series-title":"Most Popular Web Browsers in 2022","author":"Oberlo","year":"2022"},{"key":"10.1016\/j.fsidi.2022.301479_bib15","doi-asserted-by":"crossref","first-page":"184","DOI":"10.3390\/fi12110184","article-title":"Browser forensic investigations of whatsapp web utilizing indexeddb persistent storage","volume":"12","author":"Paligu","year":"2020","journal-title":"Future Internet"},{"key":"10.1016\/j.fsidi.2022.301479_bib16","first-page":"47","article-title":"Browser forensics on web-based tiktok applications","volume":"175","author":"Pandela","year":"2020","journal-title":"Int. J. Comput. Appl."},{"key":"10.1016\/j.fsidi.2022.301479_bib17","series-title":"2017 International Conference on Computer Communication and Informatics (ICCCI)","first-page":"1","article-title":"A\u00a0theoretical review of social media usage by cyber-criminals","author":"Patel","year":"2017"},{"key":"10.1016\/j.fsidi.2022.301479_bib18","series-title":"Cybercriminals Are Doing Big Business in the Gaming Chat App Discord - Cbs News","author":"Patterson","year":"2019"},{"key":"10.1016\/j.fsidi.2022.301479_bib19","doi-asserted-by":"crossref","first-page":"896","DOI":"10.12968\/bjom.2014.22.12.896","article-title":"What is social media?","volume":"22","author":"Power","year":"2014","journal-title":"Br. J. Midwifery"},{"key":"10.1016\/j.fsidi.2022.301479_bib20","author":"Safety"},{"key":"10.1016\/j.fsidi.2022.301479_bib21","series-title":"2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","first-page":"1","article-title":"Automated twitter author clustering with unsupervised learning for social media forensics","author":"Shao","year":"2019"},{"key":"10.1016\/j.fsidi.2022.301479_bib22","series-title":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","first-page":"1","article-title":"Legal and technical aspects of web forensics","author":"Sonmez","year":"2019"}],"container-title":["Forensic Science International: Digital Investigation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2666281722001603?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2666281722001603?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,4,16]],"date-time":"2023-04-16T13:40:10Z","timestamp":1681652410000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2666281722001603"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3]]},"references-count":22,"alternative-id":["S2666281722001603"],"URL":"https:\/\/doi.org\/10.1016\/j.fsidi.2022.301479","relation":{},"ISSN":["2666-2817"],"issn-type":[{"value":"2666-2817","type":"print"}],"subject":[],"published":{"date-parts":[[2023,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Digital forensic analysis of discord on google chrome","name":"articletitle","label":"Article Title"},{"value":"Forensic Science International: Digital Investigation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.fsidi.2022.301479","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"301479"}}