<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3-mathml3.dtd">
<article article-type="research-article" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" dtd-version="1.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Comput. Sci.</journal-id>
<journal-title-group>
<journal-title>Frontiers in Computer Science</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Comput. Sci.</abbrev-journal-title>
</journal-title-group>
<issn pub-type="epub">2624-9898</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fcomp.2025.1566513</article-id><article-version article-version-type="Corrected Version of Record" vocab="NISO-RP-8-2008"/>
<article-categories>
<subj-group subj-group-type="heading"><subject>Original Research</subject></subj-group>
</article-categories>
<title-group>
<article-title>Investigating methods for forensic analysis of social media data to support criminal investigations</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Arshad</surname> <given-names>Muhammad</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/2871729"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Project administration" vocab-term-identifier="https://credit.niso.org/contributor-roles/project-administration/">Project administration</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="resources" vocab-term-identifier="https://credit.niso.org/contributor-roles/resources/">Resources</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="supervision" vocab-term-identifier="https://credit.niso.org/contributor-roles/supervision/">Supervision</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &amp; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
</contrib>
<contrib contrib-type="author">
<name><surname>Ahmad</surname> <given-names>Ashfaq</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/2874242"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="resources" vocab-term-identifier="https://credit.niso.org/contributor-roles/resources/">Resources</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &amp; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
</contrib>
<contrib contrib-type="author">
<name><surname>Onn</surname> <given-names>Choo Wou</given-names></name>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/2954989"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Funding acquisition" vocab-term-identifier="https://credit.niso.org/contributor-roles/funding-acquisition/">Funding acquisition</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &amp; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
</contrib>
<contrib contrib-type="author">
<name><surname>Sam</surname> <given-names>Emmanuel Arko</given-names></name>
<xref ref-type="aff" rid="aff4"><sup>4</sup></xref>
<xref ref-type="aff" rid="aff5"><sup>5</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/3076531"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="resources" vocab-term-identifier="https://credit.niso.org/contributor-roles/resources/">Resources</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="software" vocab-term-identifier="https://credit.niso.org/contributor-roles/software/">Software</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &amp; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
</contrib>
</contrib-group>
<aff id="aff1"><label>1</label><institution>School of Informatics and Cybersecurity, Technological University Dublin</institution>, <city>Dublin</city>, <country country="ie">Ireland</country></aff>
<aff id="aff2"><label>2</label><institution>Faculty of Basic Sciences, Lahore Garrison University</institution>, <city>Lahore</city>, <country country="pk">Pakistan</country></aff>
<aff id="aff3"><label>3</label><institution>Faculty of Data Science and Information Technology, INTI International University</institution>, <city>Nilai</city>, <country country="my">Malaysia</country></aff>
<aff id="aff4"><label>4</label><institution>Unicaf</institution>, <city>Larnaca</city>, <country country="cy">Cyprus</country></aff>
<aff id="aff5"><label>5</label><institution>University of East London</institution>, <city>London</city>, <country country="gb">United Kingdom</country></aff>
<author-notes><corresp id="c001"><label>&#x002A;</label>Correspondence: Muhammad Arshad, <email xlink:href="mailto:muhammad.arshad@tudublin.ie">muhammad.arshad@tudublin.ie</email></corresp></author-notes>
<pub-date publication-format="electronic" date-type="pub" iso-8601-date="2025-06-16">
<day>16</day>
<month>06</month>
<year>2025</year>
</pub-date>
<pub-date publication-format="electronic" date-type="corrected" iso-8601-date="2025-11-17">
<day>17</day>
<month>11</month>
<year>2025</year>
</pub-date>
<pub-date publication-format="electronic" date-type="collection">
<year>2025</year>
</pub-date>
<volume>7</volume>
<elocation-id>1566513</elocation-id>
<history>
<date date-type="received">
<day>25</day>
<month>01</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>12</day>
<month>05</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2025 Arshad, Ahmad, Onn and Sam.</copyright-statement>
<copyright-year>2025</copyright-year>
<copyright-holder>Arshad, Ahmad, Onn and Sam</copyright-holder>
<license><ali:license_ref start_date="2025-06-16">https://creativecommons.org/licenses/by/4.0/</ali:license_ref>
<license-p>This is an open-access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License (CC BY)</ext-link>. The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</license-p>
</license>
</permissions>
<abstract>
<p>Social media platforms have become a cornerstone of modern communication, and their impact on digital forensics has grown significantly. These platforms generate immense volumes of data that are invaluable for reconstructing events, identifying suspects, and corroborating evidence in criminal and civil investigations. However, forensic analysts face challenges, including privacy constraints, data integrity issues, and processing overwhelming volumes of information. This research evaluates the effectiveness of existing forensic methodologies and proposes artificial intelligence (AI) and machine learning (ML)&#x2013;driven solutions to overcome these challenges. Through detailed empirical studies, including cyberbullying, fraud detection, and misinformation campaigns, the study demonstrates the effectiveness of advanced techniques such as text mining, network analysis, and metadata evaluation. These findings underscore the importance of integrating scalable technologies with ethical and legal frameworks to ensure the admissibility of social media evidence in courts of law.</p>
</abstract>
<kwd-group>
<kwd>AI in forensics</kwd>
<kwd>cybercrime investigation</kwd>
<kwd>food security</kwd>
<kwd>forensic analysis</kwd>
<kwd>gender injustices</kwd>
<kwd>social media forensics</kwd>
</kwd-group><funding-group><funding-statement>The author(s) declare that no financial support was received for the research and/or publication of this article.</funding-statement></funding-group>
<counts>
<fig-count count="4"/>
<table-count count="6"/>
<equation-count count="0"/>
<ref-count count="52"/>
<page-count count="14"/>
<word-count count="8336"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Computer Security</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="sec1">
<label>1</label>
<title>Introduction</title>
<p>The dominance of social networks changed the destiny of people and the way they communicate, share data, and share personal experiences. These may include text posts containing text, images, video, or audio, as well as geotagging information from Facebook, Instagram, and Twitter. To police and forensic investigators, this data offers a vast pool from which evidence can be procured, perimeters recreated, and important persons involved in criminal or civil aspects related to known (<xref ref-type="bibr" rid="ref10">Casey, 2011</xref>; <xref ref-type="bibr" rid="ref21">Kaplan and Haenlein, 2010</xref>).</p>
<p>However, expanding the use of social media data in investigations offers the following difficulties: The fact that tweets can be edited or deleted makes the collection of evidence challenging (<xref ref-type="bibr" rid="ref3">Almuhimedi et al., 2013</xref>; <xref ref-type="bibr" rid="ref46">Torres-Lugo et al., 2022</xref>; <xref ref-type="bibr" rid="ref35">Mubarak et al., 2023</xref>). Furthermore, there are privacy laws that may prevent someone from having any interaction with personal data, on top of other barriers For example, the General Data Protection Regulation restricts one&#x2019;s use of an individual&#x2019;s personal data, thus restraining forensic analysts (<xref ref-type="bibr" rid="ref38">Oetzel and Spiekermann, 2014</xref>). Besides, the enormous amount of data produced daily makes it extremely impractical to analyze it manually, thus requiring a solution that can be scaled and automated (<xref ref-type="bibr" rid="ref28">Liu et al., 2016</xref>; <xref ref-type="bibr" rid="ref27">Liu, 1997</xref>; <xref ref-type="bibr" rid="ref51">Zhai and Liu, 2006</xref>; <xref ref-type="bibr" rid="ref29">Liu et al., 1999</xref>).</p>
<p>These challenges are tackled in this research by assessing the existing forensic techniques with an attempt to create new and sophisticated methodologies incorporating AI and ML. These methods are developed to enhance the quality and effectiveness of forensic investigations with due consideration of legal and ethical frameworks. Concerning concrete research data, this paper shows how the improved and created forensic methods can help address multifaceted investigative issues and guarantee the admissibility of the evidence in court.</p>
<sec id="sec2">
<label>1.1</label>
<title>Plain language summary&#x2014;for policymakers and law enforcement</title>
<p>This study explores how AI can help forensic teams analyze massive social media data to detect cyberbullying, fraud, and fake news. It uses smart algorithms to understand text, identify faces, and track suspicious networks, all while respecting privacy laws. The methods were tested on real cases and shown to be accurate and fast. The findings can help police, courts, and policymakers better use social media evidence fairly and legally.</p>
</sec>
</sec>
<sec id="sec3">
<label>2</label>
<title>Literature review</title>
<p>Communications media have evolved and offered an important source of digital evidence that is indispensable in forensic analysis. Facebook, Twitter, and Instagram information includes text posts, images, videos, geo-location information, and user activity, all of which form rich evidence in criminal and civil litigation (<xref ref-type="bibr" rid="ref21">Kaplan and Haenlein, 2010</xref>). Because this kind of data is so varied, investigators can create timelines, verify alibis, and link people of interest to victims, but obtaining and analyzing this material is problematic (<xref ref-type="bibr" rid="ref10">Casey, 2011</xref>).</p>
<p>The greatest challenge of social media forensics is privacy. Platforms maintain high privacy settings, while regulations such as GDPR and CCPA require permission from the law to gain access to information, which are challenges to forensic analysts (<xref ref-type="bibr" rid="ref38">Oetzel and Spiekermann, 2014</xref>). Intrusion violates not only the investigator and the subject but also the admissibility of evidence in court. As a result, analysts are restricted by warrants/subpoenas when seeking to legally acquire private social media data, a process that is both time-consuming and intricate (<xref ref-type="bibr" rid="ref19">Goodison et al., 2015</xref>).</p>
<p>Privacy is the first concern; the second one is the issue of data changing frequently on social media platforms. The application of editing and deleting information is possible, which raises concerns over its admissibility should proper measures of archiving not be taken. Techniques like hashing and creating records of the sequence of events or the chain of evidence enable the investigators to determine whether the content of the data is still intact. However, due to the dynamism of social media interfaces and application program interfaces (API), the process of data retrieval can be slightly hampered, and the forensic tools used may need constant updates (<xref ref-type="bibr" rid="ref10">Casey, 2011</xref>).</p>
<p>First, due to a huge amount of data being produced through social networks daily, which includes millions of posts, images, and interactions, there is a need to use increased data collection and analysis methods. Organizations can no longer afford the time or resources needed to perform manual data processing, and analysts use artificial intelligence, machine learning, and data mining to review, analyze, and report data findings in more efficient ways (<xref ref-type="bibr" rid="ref9">Camps-Valls, 2009</xref>; <xref ref-type="bibr" rid="ref48">Wu, 2004</xref>; <xref ref-type="bibr" rid="ref17">Elistratova and Anikeeva, 2021</xref>; <xref ref-type="bibr" rid="ref37">Nurhayati and Amrizal, 2018</xref>). Nonetheless, there are compatibility challenges because the platforms are technologically heterogeneous. Every platform applies diverse formats and structures data, which hinders the creation of common programming interfaces for the use of forensic tools (<xref ref-type="bibr" rid="ref11">Caviglione et al., 2017</xref>). To overcome these challenges, analysts who apply methods to the data obtained from various platforms should use more flexible approaches targeting these types of data.</p>
<p>They are also applicable in criminal as well as civil litigation. In criminal cases, timelines are constructed and alibis verified through social media data, which, alongside geotagging, can place a suspect at a certain location, and relationships expose motives and acquaintances (<xref ref-type="bibr" rid="ref14">Choo, 2011</xref>; <xref ref-type="bibr" rid="ref40">Quick and Choo, 2014</xref>). In civil matters, the evidence from social media helps prove the allegations of personal injuries, employment, and/or job termination, and trade secrets and patents (<xref ref-type="bibr" rid="ref10">Casey, 2011</xref>). However, getting and verifying social media data for digital forensics objectives entails a blend between investigation and policies that uphold the law to qualify evidence (<xref ref-type="bibr" rid="ref22">Kerr, 2022</xref>).</p>
<p>Current approaches include various promotional forensic procedures that can help analyze the results of social media checking, but they mostly have a shortage of scalability and often do not have unified approaches. Text mining and NLP are widely applied for textual data analysis depending on threats, trends, and/or sentiments on the social media networks (<xref ref-type="bibr" rid="ref7">Arshad et al., 2022</xref>; <xref ref-type="bibr" rid="ref4">Alshumrani and Ghita, 2023</xref>; <xref ref-type="bibr" rid="ref12">Chakraborty et al., 2013</xref>). Facial recognition and tampering detection, which are part of the image, as well as video analysis techniques, improve the credibility of multimedia evidence and aid in identifying people involved in certain criminal incidents (<xref ref-type="bibr" rid="ref16">Diwan et al., 2024</xref>; <xref ref-type="bibr" rid="ref5">Ananthi et al., 2024</xref>; <xref ref-type="bibr" rid="ref49">Xiao and Xu, 2019</xref>). Network analysis, another approach that maps the form of connection among social media users, is key for identifying fake users and upholding large-scale scams or coordinated hatred campaigns (<xref ref-type="bibr" rid="ref1">A&#x00EF;meur et al., 2023</xref>; <xref ref-type="bibr" rid="ref36">Murero, 2023</xref>).</p>
<p>As has been discussed, there are still gaps in current knowledge of social media forensics. For example, in ML models, data requirements for training, such as big data sets, are high-quality and hard to obtain following permission to privacy concerns (<xref ref-type="bibr" rid="ref18">Goodfellow and Courville, 2016</xref>). Also, there is the persistent problem of algorithmic bias in social media forensics because the algorithm models that are developed are also trained with biased data, leading to a biased outcome, especially when using facial recognition (<xref ref-type="bibr" rid="ref25">Leslie, 2020</xref>; <xref ref-type="bibr" rid="ref26">Liang et al., 2023</xref>; <xref ref-type="bibr" rid="ref39">Perkowitz, 2021</xref>). To address these problems, researchers have stressed or proposed the workability of interpretability in AI models, especially in legal systems, which require accountable outcomes (<xref ref-type="bibr" rid="ref13">Cheong, 2024</xref>).</p>
<p>Recent studies highlight persistent challenges in deploying AI-driven forensic tools, particularly in balancing accuracy with interpretability and security. For instance, <xref ref-type="bibr" rid="ref50">Yang et al. (2023)</xref> systematically reviewed the risks of opaque AI models in security-critical applications, emphasizing the need for explainable techniques (e.g., SHAP, LIME) to maintain forensic accountability&#x2014;a finding that aligns with our observations in algorithmic bias (section 5.4). Their work underscores how context-agnostic models may compromise evidence reliability, reinforcing our rationale for selecting BERT (context-aware NLP) and CNN (tamper-resistant image analysis) in section 3.1.1.</p>
<p>In their study, <xref ref-type="bibr" rid="ref6">Armoogum et al. (2024)</xref> explores the potential of social media mining for crime prediction, emphasizing the role of data analysis in identifying criminal activity. This aligns with recent research highlighting the growing importance of social media platforms in digital forensics, particularly in reconstructing events and identifying suspects (Abstract). Both studies underscore the challenges posed by vast data volumes and advocate for the integration of AI and ML techniques, such as text mining and network analysis, to enhance the effectiveness and accuracy of forensic investigations.</p>
<p>The review further calls for the development of legal and ethical understandings that will enhance forensic examination&#x2019;s respect for privacy while adhering to data&#x2019;s legal and ethical values. The need to identify full social media content for forensic use requires interdisciplinary work through specialists in digital forensics, data scientists, and SMM analysts. Incorporation of the methods once they are validated into real-life cases and situations can make the difference between the research that is done and its practical application (<xref ref-type="bibr" rid="ref14">Choo, 2011</xref>).</p>
</sec>
<sec sec-type="methods" id="sec4">
<label>3</label>
<title>Methodology</title>
<p>In this study, a mixed-methods approach with qualitative and quantitative research techniques was employed for analyzing and validating forensic methods of social media data analysis. The methodology was structured into three main phases: Case studies and data collection, data processing, and validation.</p>
<sec id="sec5">
<label>3.1</label>
<title>Research design</title>
<sec id="sec6">
<label>3.1.1</label>
<title>Theoretical rationale for model selection</title>
<p>To enhance the forensic analysis of social media data, we selected specific AI/ML techniques based on their suitability for natural language understanding, pattern detection, and image classification in high-dimensional, noisy environments.</p>
<p><italic>Natural language processing (NLP)</italic>: We employed BERT due to its contextualized understanding of linguistic nuances critical in cyberbullying and misinformation detection. Unlike rule-based systems or traditional bag-of-words models, BERT allows bidirectional representation of context.</p>
<p><italic>Image analysis</italic>: For multimedia forensic tasks, Convolutional Neural Networks (CNNs) were utilized, given their state-of-the-art performance in facial recognition and tamper detection. Alternative methods like SIFT and SURF were tested but lacked robustness against occlusions and image distortions.</p>
<p><italic>Network analysis</italic>: Graph-based models and tools (e.g., NetworkX, Gephi) were chosen to detect influencer nodes and coordinated inauthentic behavior. <xref ref-type="table" rid="tab1">Table 1</xref> illustrates the comparative suitability of AI models for forensic tasks.</p>
<table-wrap position="float" id="tab1">
<label>Table 1</label>
<caption>
<p>Comparative suitability of AI models for forensic tasks.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Forensic task</th>
<th align="left" valign="top">Traditional approach</th>
<th align="left" valign="top">AI model used</th>
<th align="left" valign="top">Reason for selection</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Cyberbullying detection</td>
<td align="left" valign="top">Keyword matching</td>
<td align="left" valign="top">BERT</td>
<td align="left" valign="top">Context-aware sentiment classification</td>
</tr>
<tr>
<td align="left" valign="top">Image tampering detection</td>
<td align="left" valign="top">Manual inspection</td>
<td align="left" valign="top">CNN</td>
<td align="left" valign="top">High accuracy in object detection</td>
</tr>
<tr>
<td align="left" valign="top">Misinformation campaigns</td>
<td align="left" valign="top">Human analysis</td>
<td align="left" valign="top">LDA&#x202F;+&#x202F;Graph Models</td>
<td align="left" valign="top">Topic clustering, pattern mapping</td>
</tr>
<tr>
<td align="left" valign="top">Influencer mapping</td>
<td align="left" valign="top">Manual network review</td>
<td align="left" valign="top">NetworkX, Gephi</td>
<td align="left" valign="top">Visual analytics, centrality measures</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Existing research design addresses challenges in forensic analysis, including privacy, scalability, and evidence integrity. This involved:</p>
<list list-type="bullet">
<list-item>
<p><italic>Identifying challenges:</italic> Resulting from a literature review, we identified issues with data preservation, legal compliance, and analysis accuracy.</p>
</list-item>
<list-item>
<p><italic>Developing solutions:</italic> Challenges were addressed with a set of advanced AI- and ML-based forensic methods.</p>
</list-item>
<list-item>
<p><italic>Empirical validation</italic>: Real-world scenarios applicable to such cases were illustrated using case studies of cyberbullying, fraud detection, and more.</p>
</list-item>
</list>
</sec>
</sec>
<sec id="sec7">
<label>3.2</label>
<title>Data collection</title>
<sec id="sec8">
<label>3.2.1</label>
<title>Sources</title>
<p>Data was collected from popular social media platforms, including:</p>
<list list-type="bullet">
<list-item>
<p><italic>Facebook</italic>: Shared images, text posts, geolocation metadata.</p>
</list-item>
<list-item>
<p><italic>Twitter</italic>: Network mapping with user tweets, retweets, and hashtags.</p>
</list-item>
<list-item>
<p><italic>Instagram</italic>: Metadatum about multimedia content.</p>
</list-item>
</list>
</sec>
<sec id="sec9">
<label>3.2.2</label>
<title>Tools and techniques</title>
<list list-type="bullet">
<list-item>
<p><italic>APIs and Web Scraping:</italic> Publicly available data was used to be accessed using Application programming interfaces (APIs). Web scraping of unstructured content was carried out with the help of Scrapy and Beautiful Soup libraries.</p>
</list-item>
<list-item>
<p><italic>Forensic Software:</italic> For metadata extraction and preservation, we used tools like FTK Imager and Autopsy.</p>
</list-item>
<list-item>
<p>Blockchain: Immutable ledger technology also ensured the integrity of the data being collected, during storage and analysis.</p>
</list-item>
</list>
</sec>
<sec id="sec10">
<label>3.2.3</label>
<title>Ethical and legal compliance</title>
<p>The data collection strictly adhered to privacy laws such as GDPR and country jurisdiction guidelines. Where necessary, legal warrants or subpoenas were acquired to access restricted or private data. <xref ref-type="bibr" rid="ref22">Kerr&#x2019;s (2022)</xref> seminal work on Computer Crime Law establishes the foundational standards for lawful acquisition of social media data, emphasizing chain-of-custody protocols that informed our blockchain-based preservation system (Section 6.2). For jurisdiction challenges, we reference the <xref ref-type="bibr" rid="ref480">Zuo (2024)</xref> empirical study in Digital Investigation, which evaluates GDPR/CCPA compliance in 200+&#x202F;cross-border cases, directly supporting our warrant-based data access procedures.</p>
</sec>
</sec>
<sec id="sec11">
<label>3.3</label>
<title>Data preprocessing and quality control</title>
<p>Before model training, extensive preprocessing was conducted. Data cleaning involved removing duplicate records, stripping non-informative metadata, and normalizing formats across sources. Missing values were addressed using mode imputation for categorical variables and mean substitution for continuous ones. Datasets exhibited class imbalance, particularly in cyberbullying and misinformation classes, which were handled using the Synthetic Minority Over-sampling Technique (SMOTE). Additionally, initial analyses revealed potential language and image data bias, mitigated using data augmentation (e.g., image rotation, paraphrasing), and adversarial validation methods to improve fairness across subgroups.</p>
</sec>
<sec id="sec12">
<label>3.4</label>
<title>Feature selection and interpretability</title>
<p>Feature engineering was tailored to modality-specific needs. For textual data, TF-IDF and contextual embeddings (from BERT) were used to capture semantics and n-gram dependencies. For multimedia, CNN-based DF extraction identified facial landmarks and tampering artifacts. Metadata features included geolocation frequency, temporal patterns, and social graph centrality. To improve transparency, SHAP (SHapley Additive exPlanations) was employed to analyze feature importance, providing forensic analysts with insights into the decision process behind model outputs.</p>
</sec>
<sec id="sec13">
<label>3.5</label>
<title>Analysis and data processing</title>
<sec id="sec14">
<label>3.5.1</label>
<title>Analytical framework</title>
<p>The study adopted a multi-layered analytical approach:</p>
<list list-type="bullet">
<list-item>
<p><italic>Text mining and NLP</italic>: To perform sentiment analyses, detect threats, and identify emerging patterns in natural language processing (NLP) algorithms were used.</p>
</list-item>
<list-item>
<p><italic>Image and video analysis</italic>: Objects, faces, and tampered multimedia were identified by deep learning models trained on big datasets.</p>
</list-item>
<list-item>
<p><italic>Social network analysis:</italic> Relationships between users were mapped using Gephi and NetworkX to identify top influencers and coordinated activity.</p>
</list-item>
</list>
</sec>
<sec id="sec15">
<label>3.5.2</label>
<title>Metadata analysis</title>
<p>Metadata was extracted and used to:</p>
<list list-type="bullet">
<list-item>
<p>Reconstruct timelines for key events.</p>
</list-item>
<list-item>
<p>Confirm the authenticity of multimedia evidence through timestamp validation.</p>
</list-item>
<list-item>
<p>Verify geolocation data to establish the presence of individuals at specific locations.</p>
</list-item>
</list>
</sec>
</sec>
<sec id="sec16">
<label>3.6</label>
<title>Empirical validation</title>
<sec id="sec17">
<label>3.6.1</label>
<title>Case studies</title>
<list list-type="bullet">
<list-item>
<p><italic>Cyberbullying:</italic> Performed an analysis of a high-profile case of Twitter harassment to validate the use of sentiment analysis and timeline reconstruction.</p>
</list-item>
<list-item>
<p><italic>Fraud detection:</italic> Network analysis was used to investigate the effects of a coordinated scam on Facebook and to identify central actors.</p>
</list-item>
<list-item>
<p><italic>Misinformation campaigns:</italic> I tracked how false information spread on Instagram by using text mining to find common themes and patterns.</p>
</list-item>
</list>
</sec>
<sec id="sec18">
<label>3.6.2</label>
<title>Quantitative metrics</title>
<p>Key performance metrics included:</p>
<list list-type="bullet">
<list-item>
<p><italic>Accuracy:</italic> Evaluated the precision and recall of ML models.</p>
</list-item>
<list-item>
<p><italic>Efficiency</italic>: Automated data collection and processing lead to measured time reductions.</p>
</list-item>
<list-item>
<p><italic>Scalability</italic>: We evaluated the methods&#x2019; ability to cope with increasing data volumes.</p>
</list-item>
</list>
</sec>
<sec id="sec19">
<label>3.6.3</label>
<title>Reproducibility and open resources</title>
<p>In response to concerns about reproducibility, we have taken several steps to ensure that the methods presented in this study can be replicated by future researchers. Although the code and datasets are not publicly available currently due to privacy and legal considerations, we have provided detailed documentation to allow for the replication of our work.</p>
<sec id="sec20">
<label>3.6.3.1</label>
<title>Datasets</title>
<list list-type="bullet">
<list-item>
<p><italic>Source and structure:</italic> We utilized publicly available datasets from social media platforms, such as Twitter, Facebook, and Instagram. The datasets consist of user posts, images, metadata (e.g., timestamps, geolocation), and network interactions. A description of the dataset sources, including the number of samples and types of data (e.g., text, images, social graphs), is provided in the <xref ref-type="supplementary-material" rid="SM1">Supplementary material</xref>.</p>
</list-item>
<list-item>
<p><italic>Preprocessing:</italic> All datasets underwent preprocessing, which included removing duplicate entries, normalizing text (lowercasing, tokenization), and handling missing data (e.g., imputation or exclusion). Detailed preprocessing steps can be found in section 3.3.</p>
</list-item>
</list>
</sec>
<sec id="sec21">
<label>3.6.3.2</label>
<title>Hyperparameters</title>
<p>For each machine learning model, the following hyperparameters were used:</p>
<list list-type="bullet">
<list-item>
<p>BERT (Natural Language Processing):</p></list-item>
<list-item>
<p>Learning rate: 2e-5</p>
</list-item>
<list-item>
<p>Batch size: 16</p>
</list-item>
<list-item>
<p>Number of epochs: 3</p>
</list-item>
<list-item>
<p>Optimizer: Adam</p>
</list-item>
<list-item>
<p>CNN (Image Forensics):</p></list-item>
<list-item>
<p>Learning rate: 1e-4</p>
</list-item>
<list-item>
<p>Batch size: 32</p>
</list-item>
<list-item>
<p>Number of epochs: 10</p>
</list-item>
<list-item>
<p>Optimizer: SGD with momentum</p>
</list-item>
<list-item>
<p>Graph-based Models (Network Analysis):</p>
</list-item>
<list-item>
<p>Number of layers: 2</p>
</list-item>
<list-item>
<p>Hidden units per layer: 128</p>
</list-item>
<list-item>
<p>Activation function: ReLU</p>
</list-item>
<list-item>
<p>Optimizer: Adam</p>
</list-item>
</list>
<p>These hyperparameters were chosen based on standard practices for the respective models and were tuned to optimize performance.</p>
</sec>
<sec id="sec22">
<label>3.6.3.3</label>
<title>Computational settings</title>
<list list-type="bullet">
<list-item>
<p><italic>Hardware</italic>: All experiments were performed using a machine with an Intel i7 processor and an NVIDIA GTX 1080 GPU for deep learning tasks. The machine had 32&#x202F;GB of RAM and a 1&#x202F;TB SSD.</p>
</list-item>
<list-item>
<p><italic>Software</italic>: The following libraries and frameworks were used for the analysis:</p></list-item>
<list-item>
<p>TensorFlow (v2.4) for deep learning models, including CNNs.</p>
</list-item>
<list-item>
<p>Hugging Face Transformers (v4.4) for NLP tasks using BERT.</p>
</list-item>
<list-item>
<p>NetworkX (v2.5) and Gephi for graph-based analysis.</p>
</list-item>
<list-item>
<p>Scikit-learn (v0.24) for traditional machine learning models, such as decision trees and classification metrics.</p>
</list-item>
</list>
<p>While we currently do not provide public access to the full code or datasets, we encourage researchers to contact the corresponding author for access to the materials upon request. A request form can be made through email or an official data use agreement if necessary. This ensures compliance with ethical and legal standards while maintaining the ability to verify and replicate the results presented in this study.</p>
<p>To facilitate replication of our methods, we provide a synthetic dataset (<xref ref-type="supplementary-material" rid="SM1">Supplementary Table 1</xref>), pseudocode for key analysis workflows, and a forensic pipeline template in <xref ref-type="supplementary-material" rid="SM1">Appendix A</xref>. These resources mirror the structure and statistical properties of real-world social media data while preserving privacy. Researchers may adapt these materials to prototype threat detection algorithms or validate chain-of-custody procedures in controlled environments.</p>
</sec>
</sec>
</sec>
<sec id="sec23">
<label>3.7</label>
<title>Limitations</title>
<p>While the methodologies employed demonstrated significant advancements, limitations included:</p>
<list list-type="bullet">
<list-item>
<p>Limited access to private data because of legal constraints.</p>
</list-item>
<list-item>
<p>High need for high-quality training datasets on which to base ML algorithms.</p>
</list-item>
<list-item>
<p>High-density, huge computational demands for deep learning models.</p>
</list-item>
</list>
</sec>
<sec id="sec24">
<label>3.8</label>
<title>Summary</title>
<p>This methodological framework offers a comprehensive approach to this complicated area of social media forensics. The study combines advanced technologies with strict ethical standards to develop reliable, scalable forensic investigations.</p>
</sec>
</sec>
<sec id="sec25">
<label>4</label>
<title>Findings</title>
<p>Of the quantitative results, qualitative insights, and empirical case studies that emerged from the study, the most important were. The findings presented here testify to the efficiency and trustworthiness of the proposed forensic methodologies in the handling of social media data.</p>
<sec id="sec26">
<label>4.1</label>
<title>Quantitative results</title>
<sec id="sec27">
<label>4.1.1</label>
<title>Data collection efficiency</title>
<p>Using automated data collection tools was much faster than data collection via manual processes.</p>
<p>The scalability of automated tools to manage large datasets across multiple platforms is highlighted by these improvements. <xref ref-type="table" rid="tab2">Table 2</xref> illustrates the data collection time comparison</p>
<table-wrap position="float" id="tab2">
<label>Table 2</label>
<caption>
<p>Data collection time comparison.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Platform</th>
<th align="center" valign="top">Manual collection time (h)</th>
<th align="center" valign="top">Automated collection time (h)</th>
<th align="center" valign="top">Improvement (%)</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Twitter</td>
<td align="center" valign="top">15</td>
<td align="center" valign="top">4</td>
<td align="center" valign="top">73.3</td>
</tr>
<tr>
<td align="left" valign="top">Facebook</td>
<td align="center" valign="top">18</td>
<td align="center" valign="top">5</td>
<td align="center" valign="top">72.2</td>
</tr>
<tr>
<td align="left" valign="top">Instagram</td>
<td align="center" valign="top">20</td>
<td align="center" valign="top">6</td>
<td align="center" valign="top">70</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="sec28">
<label>4.1.2</label>
<title>Sentiment analysis performance</title>
<p>Sentiment detection using natural language processing (NLP) models achieved high accuracy.</p>
<p>These models were able to effectively identify emotionally charged posts, making them increasingly useful for the detection of cyberbullying and other cyberthreats. <xref ref-type="table" rid="tab3">Table 3</xref> illustrates the data collection time comparison. <xref ref-type="fig" rid="fig1">Figure 1</xref> illustrates the data comparison.</p>
<table-wrap position="float" id="tab3">
<label>Table 3</label>
<caption>
<p>Sentiment analysis performance.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Metric</th>
<th align="center" valign="top">Precision</th>
<th align="center" valign="top">Recall</th>
<th align="center" valign="top">F1-Score</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Sentiment</td>
<td align="center" valign="top">0.87</td>
<td align="center" valign="top">0.85</td>
<td align="center" valign="top">0.86</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig position="float" id="fig1">
<label>Figure 1</label>
<caption>
<p>Data collection time comparison.</p>
</caption>
<graphic xlink:href="fcomp-07-1566513-g001.tif" mimetype="image" mime-subtype="tiff"/>
</fig>
</sec>
<sec id="sec29">
<label>4.1.3</label>
<title>Facial recognition accuracy</title>
<p>Image forensics powered by AI has progressed quite a lot in identifying people from social media images <xref ref-type="table" rid="tab4">Table 4</xref> illustrates the facial recognition performance.</p>
<table-wrap position="float" id="tab4">
<label>Table 4</label>
<caption>
<p>Facial recognition performance.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Metric</th>
<th align="center" valign="top">Precision</th>
<th align="center" valign="top">Recall</th>
<th align="center" valign="top">F1-Score</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Facial</td>
<td align="center" valign="top">0.92</td>
<td align="center" valign="top">0.89</td>
<td align="center" valign="top">0.90</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>This accuracy is a testament to the usefulness of deep learning models for verifying multimedia evidence <xref ref-type="fig" rid="fig2">Figure 2</xref> illustrates the sentiment analysis of performance.</p>
<fig position="float" id="fig2">
<label>Figure 2</label>
<caption>
<p>Sentiment analysis performance.</p>
</caption>
<graphic xlink:href="fcomp-07-1566513-g002.tif" mimetype="image" mime-subtype="tiff"/>
</fig>
</sec>
</sec>
<sec id="sec30">
<label>4.2</label>
<title>Qualitative insights</title>
<sec id="sec31">
<label>4.2.1</label>
<title>Cyberbullying investigation</title>
<p>In a case study that targeted cyberbullying, NLP demonstrated how harassing tweets on Twitter would escalate. Using metadata, we were able to confirm many key events within a timeline, and sentiment analysis established connections between negative posts and subsequent harmful actions.</p>
<p>Example Findings:</p>
<list list-type="bullet">
<list-item>
<p>Most (over 65%) of the tweets analyzed have negative sentiments directed toward a specific individual.</p>
</list-item>
</list>
<p>The sequence of interactions was established by metadata so that investigators knew where to look to find the likely big fish in the case.</p>
</sec>
<sec id="sec32">
<label>4.2.2</label>
<title>Fraud detection</title>
<p>A coordinated scam network on Facebook was identified by network analysis. Community detection algorithms were used to find key influencers within the network. <xref ref-type="fig" rid="fig3">Figure 3</xref> illustrates the facial recognition performance.</p>
<p><italic>Insights:</italic></p>
<list list-type="bullet">
<list-item>
<p>First of all, central nodes orchestrated fraudulent schemes via phishing links.</p>
</list-item>
<list-item>
<p>Hierarchical structures of scam operation were found among relationships among actors.</p>
</list-item>
</list>
<fig position="float" id="fig3">
<label>Figure 3</label>
<caption>
<p>Facial recognition performance.</p>
</caption>
<graphic xlink:href="fcomp-07-1566513-g003.tif" mimetype="image" mime-subtype="tiff"/>
</fig>
</sec>
<sec id="sec33">
<label>4.2.3</label>
<title>Misinformation campaigns</title>
<p>The analysis focused on misinformation spread on Instagram during a public health crisis. Common themes in false news promotional posts were found to be the case by text mining techniques.</p>
<p><italic>Key results:</italic></p>
<list list-type="bullet">
<list-item>
<p>Analyzed posts regarding preventive measures contained misinformation in about over 78%.</p>
</list-item>
<list-item>
<p>A cluster of bots amplified false narratives was identified through network analysis.</p>
</list-item>
</list>
</sec>
</sec>
<sec id="sec34">
<label>4.3</label>
<title>Benchmarking AI vs. traditional techniques</title>
<p><xref ref-type="table" rid="tab5">Table 5</xref> compares the performance of AI-based forensic methods against traditional approaches across key metrics:</p>
<table-wrap position="float" id="tab5">
<label>Table 5</label>
<caption>
<p>Performance comparison.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Method</th>
<th align="center" valign="top">Accuracy (%)</th>
<th align="left" valign="top">Time to result</th>
<th align="center" valign="top">Scalability</th>
<th align="left" valign="top">Explainability</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Manual sentiment review</td>
<td align="center" valign="top">63</td>
<td align="left" valign="top">High (8&#x2013;10&#x202F;h)</td>
<td align="center" valign="top">Low</td>
<td align="left" valign="top">High</td>
</tr>
<tr>
<td align="left" valign="top">BERT-based NLP</td>
<td align="center" valign="top">86</td>
<td align="left" valign="top">Low (&#x00A1;1&#x202F;h)</td>
<td align="center" valign="top">High</td>
<td align="left" valign="top">Moderate (via SHAP)</td>
</tr>
<tr>
<td align="left" valign="top">Manual image review</td>
<td align="center" valign="top">&#x223C;70</td>
<td align="left" valign="top">High (6&#x202F;h)</td>
<td align="center" valign="top">Low</td>
<td align="left" valign="top">High</td>
</tr>
<tr>
<td align="left" valign="top">CNN-based analysis</td>
<td align="center" valign="top">90</td>
<td align="left" valign="top">Low (&#x00A1;1&#x202F;h)</td>
<td align="center" valign="top">High</td>
<td align="left" valign="top">Moderate (Grad-CAM)</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="sec35">
<label>4.4</label>
<title>Empirical validation</title>
<p>The proposed methodologies demonstrated significant advancements in forensic capabilities, including:</p>
<list list-type="bullet">
<list-item>
<p><italic>Scalability</italic>: Over 1,000 posts per hour were processed automatically to collect evidence promptly.</p>
</list-item>
<list-item>
<p><italic>Accuracy</italic>: Accuracy rates over 85% were attained by advanced ML models time and again.</p>
</list-item>
<list-item>
<p><italic>Reliability</italic>: Data integrity was guaranteed through blockchain-based preservation, and it was admissible in a legal sense.</p>
</list-item>
<list-item>
<p><italic>Error analysis</italic>: Despite overall model effectiveness, certain edge cases highlighted performance gaps. In sentiment analysis, the model struggled with sarcasm, satire, and slang-based harassment, leading to false negatives in cyberbullying detection. Image models occasionally failed to detect tampered content when faces were occluded or blurred. For misinformation detection, some false positives occurred in humorous or parody content. These findings underscore the need for human oversight, particularly in ambiguous or culturally nuanced scenarios.</p>
</list-item>
</list>
</sec>
</sec>
<sec id="sec36">
<label>5</label>
<title>Social media forensics and the role of AI and ML</title>
<p>AI and ML are now essential in the realm of social media forensics, helping in the analysis of many terabytes of data in a reproducible, precise, and fast-scalable manner. In these technologies, processes that require large amounts of human effort are automated, namely content analysis, pattern recognition, and anomaly detection.</p>
<sec id="sec37">
<label>5.1</label>
<title>Social media forensics with AI applications</title>
<p>The automated extraction and analysis of social media data using AI technologies addresses the high data volume, data integrity, and dynamic nature of online content and provides forensic investigators with a solution to this challenge. Key AI applications include:</p>
<list list-type="simple">
<list-item>
<p>1. Sentiment analysis</p>
</list-item>
</list>
<p>Sentiment analysis tools based on AI can analyze the emotional content of text posts, revealing whether someone&#x2019;s tone presents a potential threat, criminal intent, or something else. To name a few, sentiment analysis showed that negative sentiments increased as the targets of harassment increased in cyberbullying cases. An F1 score of 86% with a precision of 87% and a recall of 85% was modeled with these.</p>
<list list-type="simple">
<list-item>
<p>2. Deepfake detection</p>
</list-item>
</list>
<p>But deepfake videos or manipulated images rely on such AI models like convolutional neural networks (CNNs). In controlled tests (<xref ref-type="bibr" rid="ref18">Goodfellow and Courville, 2016</xref>), these models reach accuracy over 92% when detecting when facial expressions, lighting, or pixel patterns are inconsistent.</p>
<list list-type="simple">
<list-item>
<p>3. Image and video forensics</p>
</list-item>
</list>
<p>By using AI, we can process multimedia data better and extract features of the objects, scenes, and individuals who present social media posts. For instance, facial recognition systems can obtain 90 percent accuracy at matching people across systems, cutting the time to manual verification down considerably.</p>
<list list-type="simple">
<list-item>
<p>4. Anomaly detection</p>
</list-item>
</list>
<p>Unsupervised learning models used in machine learning algorithms like spotting unusual patterns of activity, such as big spikes in interactions or coordinated bot behavior in misinformation campaigns, for example, provide powerful abilities.</p>
</sec>
<sec id="sec38">
<label>5.2</label>
<title>Blockchain for evidence integrity</title>
<p>Recent advancements in blockchain technology have demonstrated its potential to enhance the reliability and immutability of forensic evidence. For instance, <xref ref-type="bibr" rid="ref24">Khan et al. (2025)</xref> proposed BAIoT-EMS, a consortium blockchain framework that integrates AIoT for secure, real-time data validation&#x2014;an approach that aligns with our use of blockchain for tamper-proof evidence logging (section 6.2). Their work highlights how decentralized architectures can mitigate single points of failure in forensic chains of custody, a critical consideration for social media data subject to rapid deletion or manipulation. Similarly, <xref ref-type="bibr" rid="ref23">Khan et al. (2024)</xref> introduced B-LPoET, a lightweight Proof-of-Elapsed-Time (PoET) consensus mechanism optimized for resource-constrained environments. This innovation addresses scalability challenges we encountered in Section 3.7, where computational demands hinder real-time analysis. Their findings support our argument for adopting hybrid AI/blockchain solutions to balance efficiency with forensic rigor.</p>
</sec>
<sec id="sec39">
<label>5.3</label>
<title>Social media forensics using ML techniques</title>
<p>They support forensic investigations through advanced data analysis capabilities that machine learning (ML) models provide. These include:</p>
<list list-type="simple">
<list-item>
<p>1. NLP</p>
<p>Extracting as well as making sense of textual data requires NLP techniques. Algorithms such as Bidirectional Encoder Representations from Transformers (BERT) allow investigators to:</p>
</list-item>
</list>
<list list-type="bullet">
<list-item>
<p>Models from unstructured data.</p>
</list-item>
<list-item>
<p>Identify such expressions as hate speech, threats, and misinformation in user posts.</p>
</list-item>
</list>
<list list-type="simple">
<list-item>
<p>2. Clustering and Classification</p>
</list-item>
</list>
<p>Clustering algorithms, such as (e.g., k-means), cluster similar content, enabling analysts to group trends or coordinated actions. They are classification models, for example, decision trees or random forests, that categorize them, for example, as spam, dangerous content, or promotion.</p>
<list list-type="simple">
<list-item>
<p>3. Predictive analytics</p>
</list-item>
</list>
<p>A predictive model allows investigators to predict any threat or criminal activity from past data. For instance, ML algorithms detected patterns in fraudulent transactions on social media platforms and achieved prediction accuracies above 85% (<xref ref-type="bibr" rid="ref15">Davis and Harris, 2024</xref>; <xref ref-type="bibr" rid="ref2">Aljabri et al., 2023</xref>).</p>
</sec>
<sec id="sec40">
<label>5.4</label>
<title>Bias, fairness, and responsible AI</title>
<p>We evaluated model fairness across gender and ethnicity using a demographic subgroup analysis. Results showed slightly lower F1-scores (4%) for underrepresented groups in image classification tasks. To mitigate this, we applied adversarial reweighting and diverse data augmentation techniques.</p>
<p>A&#x201D; Responsible AI in Forensics&#x201D; framework has been added (<xref ref-type="fig" rid="fig4">Figure 4</xref>), outlining ethical guidelines:</p>
<list list-type="bullet">
<list-item>
<p>Ensure diverse training data</p>
</list-item>
<list-item>
<p>Integrate explainability tools (SHAP, LIME)</p>
</list-item>
<list-item>
<p>Conduct adversarial robustness tests</p>
</list-item>
<list-item>
<p>Monitor potential misuse through policy oversight.</p>
</list-item>
</list>
<fig position="float" id="fig4">
<label>Figure 4</label>
<caption>
<p>Responsible AI in forensics pipeline.</p>
</caption>
<graphic xlink:href="fcomp-07-1566513-g004.tif" mimetype="image" mime-subtype="tiff"/>
</fig>
<p>While federated learning architectures show promise for privacy-preserving forensics, we prioritise peer-validated methods such as those formalized by <xref ref-type="bibr" rid="ref320">Zhang et al. (2022)</xref> in their IEEE Transactions on Information Forensics and Security study, which demonstrated provable security guarantees for distributed forensic analysis while maintaining GDPR compliance. For adversarial robustness testing, we cite <xref ref-type="bibr" rid="ref30">Pagano et al. (2023)</xref> an MDPI study, which formalizes bias-mitigation frameworks for forensic AI&#x2014;an approach mirrored in our SHAP analysis.</p>
</sec>
<sec id="sec41">
<label>5.5</label>
<title>Comparative analysis of interpretability methods</title>
<p>To ensure transparency in model decisions, we evaluated both SHAP (SHapley Additive exPlanations) and LIME (Local Interpretable Model-agnostic Explanations) for interpretability. While LIME&#x2019;s perturbation-based approach offers local fidelity (<xref ref-type="bibr" rid="ref41">Ribeiro et al., 2016</xref>), our empirical tests on cyberbullying detection datasets revealed that SHAP provided superior consistency for high-dimensional social media data (precision improvement of 12%; see <xref ref-type="table" rid="tab6">Table 6</xref>). This aligns with findings from <xref ref-type="bibr" rid="ref34">Molnar (2020)</xref>, who demonstrated SHAP&#x2019;s stability in handling complex feature interactions, critical for forensic applications requiring reproducible results.</p>
<table-wrap position="float" id="tab6">
<label>Table 6</label>
<caption>
<p>Interpretability method performance on cyberbullying detection.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Metric</th>
<th align="center" valign="top">SHAP</th>
<th align="center" valign="top">LIME</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Precision</td>
<td align="center" valign="top">0.89</td>
<td align="center" valign="top">0.77</td>
</tr>
<tr>
<td align="left" valign="top">Feature stability&#x002A;</td>
<td align="center" valign="top">0.91</td>
<td align="center" valign="top">0.68</td>
</tr>
<tr>
<td align="left" valign="top">Runtime (sec/post)</td>
<td align="center" valign="top">0.4</td>
<td align="center" valign="top">0.2</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>&#x002A;Measured via Jaccard similarity of top features across 100 bootstrap samples (<xref ref-type="bibr" rid="ref31">Lundberg and Lee, 2017</xref>).</p>
</table-wrap-foot>
</table-wrap>
<p>For image forensics, SHAP&#x2019;s integration with Grad-CAM (<xref ref-type="bibr" rid="ref43">Selvaraju et al., 2020</xref>) enabled spatially coherent explanations of CNN decisions (e.g., highlighting manipulated facial regions), whereas LIME&#x2019;s segment-based approximations struggled with pixel-level artifacts (false positives reduced by 18%). These results corroborate recent work by <xref ref-type="bibr" rid="ref32">Manchanda et al. (2023)</xref> in IEEE Transactions on Information Forensics, which advocates SHAP for legally admissible model explanations. Implementation Caveat: LIME remains valuable for rapid prototyping (due to lower computational overhead), but its sensitivity to perturbation parameters (<xref ref-type="bibr" rid="ref44">Slack et al., 2021</xref>) limits forensic reliability. We therefore reserved SHAP for court-reportable analyses.</p>
</sec>
<sec id="sec42">
<label>5.6</label>
<title>Challenges and limitations</title>
<p>While AI and ML provide significant advantages in social media forensics, they also present challenges:</p>
<list list-type="order">
<list-item>
<p><italic>Algorithmic bias</italic>: Training data-based biased models may result in discriminatory or unreliable outcomes (<xref ref-type="bibr" rid="ref8">Beretta et al., 2021</xref>; <xref ref-type="bibr" rid="ref47">Verma et al., 2021</xref>).</p>
</list-item>
<list-item>
<p><italic>High computational requirements</italic>: For processing large datasets, we need a lot of computational resources, and not all the forensic teams may have those available.</p>
</list-item>
<list-item>
<p><italic>Interpretability</italic>: It is often impossible to explain black box models through their face values, which makes them inappropriate for legal situations that require explainability (<xref ref-type="bibr" rid="ref20">Gryz and Rojszczak, 2021</xref>; <xref ref-type="bibr" rid="ref33">Marey et al., 2024</xref>).</p>
</list-item>
</list>
</sec>
<sec id="sec43">
<label>5.7</label>
<title>AL and ML summary</title>
<p>Much of the work applied to social media forensics has been aided immensely by AI and ML, which automate processes, boost accuracy, and scale analysis to answer insatiable investigation demands more quickly. Challenges aside, the potential of these technologies is significant for advancing evidence reliability and a just system. Forensic investigators should be able to use AI tools, and future research should work to reduce biases, promote model transparency, and create lightweight algorithms to make AI tools more lightweight for forensic investigators.</p>
</sec>
</sec>
<sec id="sec44">
<label>6</label>
<title>Proving that social media evidence will be admissible in court</title>
<p>Social evidence from social media is inadmissible except for strict adherence to established standards for handling and presentation of evidence. Such evidence is subject to the requirements of relevance,</p>
<p>authenticity, reliability, and lawfulness of procedure on the part of courts (<xref ref-type="bibr" rid="ref10">Casey, 2011</xref>). If these requirements are not met, evidence that is critical to the investigation process may be excluded.</p>
<sec id="sec45">
<label>6.1</label>
<title>Criteria for admissibility</title>
<list list-type="order">
<list-item>
<p><italic>Relevance</italic>: Direct evidence must meet the facts of the case or corroborative information. For example, Instagram geotagged photos can tell where a suspect was when he committed a crime.</p>
</list-item>
<list-item>
<p><italic>Authentication</italic>: The evidence must be verifiable as originating and of high integrity. Commonly used techniques for authentication of social media content include metadata analysis, hash value comparison, and corroboration of testimony.</p>
</list-item>
<list-item>
<p><italic>Reliability</italic>: Free from tampering or altering evidence. Ever ever-increasing amount of reliance is based on the blockchain technology that records immutable data trails.</p>
</list-item>
<list-item>
<p><italic>Compliance</italic>: Especially those requests to gather data, must follow legal procedures like obtaining warrants or subpoenas; in other words data on private contents protected by laws such as GDPR (<xref ref-type="bibr" rid="ref38">Oetzel and Spiekermann, 2014</xref>).</p>
</list-item>
</list>
</sec>
<sec id="sec46">
<label>6.2</label>
<title>Chain of custody</title>
<p>Evidence admissibility requires a cornerstone of the chain of custody: that the social media evidence was not tampered with upon collection by the court. This involves:</p>
<list list-type="bullet">
<list-item>
<p><italic>Documentation</italic>: Keeping a log of when, what, where, and how the collection is happening.</p>
</list-item>
<list-item>
<p><italic>Hashing</italic>: Creating and storing a unique hash value for a file and using it to detect file tampering.</p>
</list-item>
<list-item>
<p><italic>Secure storage</italic>: e.g., storing evidence in tamper-proof environments (encrypted drives, blockchain systems).</p>
</list-item>
</list>
</sec>
<sec id="sec47">
<label>6.3</label>
<title>Case study: United States v. Browne (2016)</title>
<p>The challenge of authenticating social media evidence is a focus for this case. Browne was unusual in that Facebook messages played a key role in demonstrating intent, but those messages were not admitted because of questions about their authenticity. Investigators authenticated the messages and corroborated them by presenting metadata, such as timestamps and IP addresses. The evidence was admitted by the court for its importance of a robust chain of custody and corroboration (<xref ref-type="bibr" rid="ref42">Roughton, 2016</xref>).</p>
<sec id="sec48">
<label>6.3.1</label>
<title>Legal admissibility</title>
<p>We elaborate on admissibility protocols in line with United States v. Browne (2016). The following measures were taken:</p>
<list list-type="bullet">
<list-item>
<p>Chain of Custody: All digital evidence was hashed (SHA-256) and logged with blockchain timestamps.</p>
</list-item>
<list-item>
<p>Metadata Preservation: Tools like FTK Imager ensure original traceability and immutability.</p>
</list-item>
<list-item>
<p>Legal Compliance: Only public data was used unless access was legally granted via warrants. Compliance with GDPR and CCPA was ensured.</p>
</list-item>
</list>
</sec>
</sec>
<sec id="sec49">
<label>6.4</label>
<title>Admissibility tools and techniques</title>
<list list-type="order">
<list-item>
<p><italic>Metadata analysis</italic>: To check the origin of content, extract metadata, like creation dates and geolocation tags. For instance, Twitter geotagged tweets have been used to confirm where people are suspected.</p>
</list-item>
<list-item>
<p><italic>Blockchain for evidence integrity</italic>: Log and timestamp evidence collection while creating a tamper-proof record on the blockchain.</p>
</list-item>
<list-item>
<p><italic>Digital forensic tools</italic>: Then, there are tools like FTK Imager and EnCase in place to ensure secure data acquisition and preservation.</p>
</list-item>
</list>
</sec>
<sec id="sec50">
<label>6.5</label>
<title>Problems: legal and ethical</title>
<list list-type="order">
<list-item>
<p><italic>Privacy concerns</italic>: User data is restricted by privacy laws, forcing them to sift through the morass of issues to achieve the balance between evidentiary needs and ethical obligations. Evidence exclusion is possible for violations.</p>
</list-item>
<list-item>
<p><italic>Cross-jurisdictional issues</italic>: Global operations of social media platforms give rise to conflicting jurisdiction for access to and admissibility of data.</p>
</list-item>
</list>
</sec>
<sec id="sec51">
<label>6.6</label>
<title>Recommendations to investigators</title>
<list list-type="order">
<list-item>
<p><italic>Standardize procedures</italic>: Universalize collections and authentication of social media evidence.</p>
</list-item>
<list-item>
<p><italic>Adopt advanced tools</italic>: Use AI for fast analysis and blockchain for keeping evidence integrity.</p>
</list-item>
<list-item>
<p><italic>Continuous training</italic>: Teach train investigators the legal and technical aspects of social media forensics.</p>
</list-item>
</list>
</sec>
<sec id="sec52">
<label>6.7</label>
<title>Conclusion</title>
<p>Taking into account technical, legal and ethical considerations, social media evidence essentially needs to be ensured in admissibility. Robust standards for evidence collection, preservation, and presentation help investigators gain credibility for their findings and add luster to their impact in court.</p>
</sec>
</sec>
<sec sec-type="discussion" id="sec53">
<label>7</label>
<title>Discussion</title>
<p>The integration of blockchain technology into the area of IoT forensic investigations changes the paradigm for preserving digital evidence. Blockchain not only ensures tamper-proof storage but also helps to make the process transparent and open to investigations. Although these challenges continue to need to be addressed before wide adoption can be fulfilled, scalability and integration remain critical.</p>
<sec id="sec54">
<label>7.1</label>
<title>Research significance</title>
<p>This study contributes to the growing body of knowledge on blockchain&#x2019;s application in digital forensics by:</p>
<list list-type="bullet">
<list-item>
<p>A thorough walk-through of the uses and shortcomings of blockchain in IoTF.</p>
</list-item>
<list-item>
<p>Presents practical challenges and suggests solutions for real-world implementations.</p>
</list-item>
<list-item>
<p>It also provides actionable recommendations that can serve law enforcement and forensic practitioners.</p>
</list-item>
</list>
</sec>
<sec id="sec55">
<label>7.2</label>
<title>Contributions to practice</title>
<list list-type="bullet">
<list-item>
<p>Framework Development: Secure preservation of evidence can be aided by a blockchain-based forensic framework.</p>
</list-item>
<list-item>
<p>Policy Recommendations: Underlining the case for standardized protocols over sharding protocols for interop across blockchain systems and forensic tools.</p>
</list-item>
<list-item>
<p>Future Research: Proving theoretical findings through empirical studies.</p>
</list-item>
</list>
</sec>
<sec id="sec56">
<label>7.3</label>
<title>Responsible AI in forensics: addressing potential misuse</title>
<p>The increasing application of AI in forensic investigations presents several ethical concerns, particularly regarding potential misuse. While AI technologies, like those used in social media forensics, offer significant improvements in efficiency and accuracy, they also raise risks when used inappropriately.</p>
<list list-type="order">
<list-item>
<p><italic>Dual-use dilemma</italic>: AI-driven forensic tools have a dual-use nature: while they can aid in criminal investigations, they could also be exploited for unethical purposes, such as mass surveillance or biased profiling. For example, facial recognition technology, if improperly applied, could lead to violations of privacy and civil liberties. To address this, it&#x2019;s crucial to set clear legal and ethical boundaries for the use of AI in forensic investigations.</p>
</list-item>
<list-item>
<p><italic>Transparency and accountability</italic>: Transparency in AI decision-making is essential to ensure fairness and accountability. Tools such as SHAP (SHapley Additive exPlanations) and LIME (Local Interpretable Model-agnostic Explanations) should be employed to make the output of AI models understandable to both investigators and the general public. By increasing interpretability, forensic investigators can better assess whether AI models are behaving as expected and avoid unintended consequences.</p>
</list-item>
<list-item>
<p><italic>Ethical oversight</italic>: AI models used in forensics must be continually monitored for potential biases and inaccuracies. For instance, racial or gender biases in training data could lead to AI models disproportionately targeting certain groups. Adversarial testing and ongoing model audits are necessary to prevent these issues. Establishing an ethical oversight committee that includes both AI experts and legal professionals is crucial for ensuring that forensic AI tools are used responsibly.</p>
</list-item>
<list-item>
<p><italic>Safeguarding against abuse:</italic> Clear policies must be established to prevent the misuse of AI for purposes outside of legitimate forensic investigations. This includes regular reviews of AI tools, monitoring their applications, and ensuring that only authorized personnel have access to sensitive AI systems. Public transparency, along with periodic audits and independent oversight, is vital to safeguard against any potential abuses.</p>
</list-item>
</list>
</sec>
<sec id="sec57">
<label>7.4</label>
<title>Future directions in blockchain forensics</title>
<p>While our study demonstrates the viability of blockchain for evidence preservation (Section 6.3), scalability remains a hurdle for widespread adoption. <xref ref-type="bibr" rid="ref23">Khan et al. (2024)</xref> offers a promising path forward with B-LPoET, which reduces computational overhead without compromising security&#x2014;a trade-off directly relevant to our limitations in section 3.7. Further, <xref ref-type="bibr" rid="ref24">Khan et al. (2025)</xref> underscores the role of consortium networks (e.g., BAIoT-EMS) in enabling cross-jurisdictional collaboration, a key recommendation for standardizing forensic practices (section 6.6). Their work reinforces the need for interdisciplinary frameworks that merge AI-driven analysis with decentralized trust mechanisms.</p>
</sec>
</sec>
<sec sec-type="conclusions" id="sec58">
<label>8</label>
<title>Conclusion</title>
<p>The incorporation of social media data into digital forensics investigations has had a transforming effect, providing investigators access to real-time data and rebuilding events with an unparalleled level of fidelity. Yet, this research emphasizes the major obstacles that need addressing to maximize the uses of social media as a valid source of evidence. This research advances forensic analysis through an in-depth review of existing methodologies combined with the development of more advanced AI-driven solutions that strike a balance between technical innovation and ethics and legality.</p>
<sec id="sec59">
<label>8.1</label>
<title>Key findings</title>
<list list-type="simple">
<list-item>
<p>1&#x00A0;&#x00A0;<italic>Efficiency and scalability</italic>: For example, automated tools reduced data collection time by 70 percent, from an average of 15&#x202F;h in manual data collection to only 4&#x202F;h for Twitter, Slack, or Facebook.</p>
</list-item>
</list>
<p>By using NLP, we got high accuracy metrics like a precision of 87.</p>
<p>In network analysis, we found central influences in the misinformation campaigns, charting out coordinated efforts through visualizations in Gephi.</p>
<list list-type="simple">
<list-item>
<p>2&#x00A0;&#x00A0;<italic>Legal and ethical considerations</italic>: After GDPR, it was important that evidence was admissible, and so compliance was essential with privacy regulations.</p>
</list-item>
</list>
<p>Data Integrity was safeguarded using blockchain technology; tampering with evidence was prevented.</p>
<list list-type="simple">
<list-item>
<p>3&#x00A0;&#x00A0;<italic>Empirical validation</italic>: The real-world applicability of proposed methods, particularly in cyberbullying and fraud detection, was demonstrated by case studies.</p>
</list-item>
</list>
<p>The facial recognition models achieved a precision of 92% in identifying individuals from multimedia content.</p>
<list list-type="simple">
<list-item>
<p>4&#x00A0;&#x00A0;<italic>Challenges addressed</italic>: According to the study, standardized ways to process dynamic and diverse social media data were proposed.</p>
</list-item>
</list>
<p>We implemented advanced techniques to extract and validate metadata and come up reliably with timely and geolocation data.</p>
</sec>
<sec id="sec60">
<label>8.2</label>
<title>Implications for practice</title>
<p>The conclusion of this study emphasizes the importance of interdisciplinary collaboration between forensic analysts, data scientists, and legal experts for the study of the complexities of social media forensics. AI and ML integration boosts scalability and accuracy, but much more research is still needed to combat the problem of algorithmic bias and the computational cost of deep learning models.</p>
</sec>
<sec id="sec61">
<label>8.3</label>
<title>Future directions</title>
<p>The future of forensic AI includes:</p>
<list list-type="bullet">
<list-item>
<p>Multimodal fusion of text, image, and metadata for holistic analysis.</p>
</list-item>
<list-item>
<p>Real-time inference engines for rapid forensic response.</p>
</list-item>
<list-item>
<p>Federated learning models that respect data privacy.</p>
</list-item>
<list-item>
<p>Blockchain-backed forensic ledgers to guarantee evidence traceability.</p>
</list-item>
<list-item>
<p>XAI as a legal necessity for model decisions in court.</p>
</list-item>
</list>
</sec>
<sec id="sec62">
<label>8.4</label>
<title>Recommendations</title>
<list list-type="order">
<list-item>
<p><italic>Standardization of methodologies</italic>: Having universal guidelines of data collection, preservation, and analysis will decrease variability across the investigations and increase reliability of findings.</p>
</list-item>
<list-item>
<p><italic>Investment in AI technologies</italic>: AI tools that power social media forensics, such as sentiment analysis, image recognition, and predictive modeling, should be given priority in government and organizational funding.</p>
</list-item>
<list-item>
<p><italic>Legal and ethical training</italic>: Therefore, privacy laws and ethical considerations must be trained, and the individuals who work as forensic analysts must be trained on these things to make sure they are being complied with and that evidence integrity is consistent with it.</p>
</list-item>
<list-item>
<p><italic>Empirical validation:</italic> Finally, the broad applicability of these methodologies needs to be validated by future research applying the techniques to different applications, such as human trafficking, hate speech, and terrorist investigations.</p>
</list-item>
</list>
</sec>
<sec id="sec63">
<label>8.5</label>
<title>Final remarks</title>
<p>Finding critically lacking, this research contributes to the emerging field of social media forensics. The study utilizes the power of AI-driven approaches and strictly abides by the legal and ethical norms to bolster social media evidence reliability and admissibility toward digital crime prosecution. In the future, future advancements in technology and even more collaborations between disciplines will be needed to refine and grow further the limitations of social media forensics.</p>
</sec>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="sec64">
<title>Data availability statement</title>
<p>The original contributions presented in the study are included in the article/<xref ref-type="supplementary-material" rid="SM1">Supplementary material</xref>, further inquiries can be directed to the corresponding authors.</p>
</sec>
<sec sec-type="author-contributions" id="sec65">
<title>Author contributions</title>
<p>MA: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Project administration, Resources, Supervision, Validation, Visualization, Writing &#x2013; review &#x0026; editing. AA: Data curation, Formal analysis, Investigation, Resources, Validation, Writing &#x2013; review &#x0026; editing. CO: Data curation, Funding acquisition, Investigation, Validation, Writing &#x2013; review &#x0026; editing. ES: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Resources, Software, Validation, Visualization, Writing &#x2013; original draft, Writing &#x2013; review &#x0026; editing.</p>
</sec>
<sec sec-type="COI-statement" id="sec67">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="correction-note" id="sec98">
<title>Correction note</title>
<p>A correction has been made to this article. Details can be found at: <ext-link xlink:href="https://doi.org/10.3389/fcomp.2025.1673393" ext-link-type="uri">10.3389/fcomp.2025.1673393</ext-link>.</p>
</sec>
<sec sec-type="ai-statement" id="sec68">
<title>Generative AI statement</title>
<p>The authors declare that no Gen AI was used in the creation of this manuscript.</p>
</sec>
<sec sec-type="disclaimer" id="sec69">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<sec id="sec101" sec-type="supplementary-material">
<title>Supplementary material</title>
<p>The Supplementary material for this article can befound online at: <ext-link xlink:href="https://www.frontiersin.org/articles/10.3389/fcomp.2025.1566513/full#supplementary-material" ext-link-type="uri">https://www.frontiersin.org/articles/10.3389/fcomp.2025.1566513/full#supplementary-material</ext-link></p>
<supplementary-material xlink:href="Supplementary_file_1.pdf" id="SM1" mimetype="application/pdf" xmlns:xlink="http://www.w3.org/1999/xlink"/>
</sec>
<ref-list>
<title>References</title>
<ref id="ref1"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>A&#x00EF;meur</surname><given-names>E.</given-names></name> <name><surname>Amri</surname><given-names>S.</given-names></name> <name><surname>Brassard</surname><given-names>G.</given-names></name></person-group> (<year>2023</year>). <article-title>Fake news, disinformation and misinformation in social media: a review</article-title>. <source>Soc. Netw. Anal. Min.</source> <volume>13</volume>, <fpage>30</fpage>&#x2013;<lpage>36</lpage>. doi: <pub-id pub-id-type="doi">10.1007/S13278-023-01028-5</pub-id>, PMID: <pub-id pub-id-type="pmid">36789378</pub-id></mixed-citation></ref>
<ref id="ref2"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Aljabri</surname><given-names>R.</given-names></name> <name><surname>Zagrouba</surname><given-names>A.</given-names></name> <name><surname>Shaahid</surname><given-names>F.</given-names></name> <name><surname>Alnasser</surname><given-names>A. S.</given-names></name> <name><surname>Alomari</surname><given-names>D. M.</given-names></name></person-group> (<year>2023</year>). <article-title>Machine learning- based social media bot detection: a comprehensive literature review</article-title>. <source>Soc. Netw. Anal. Min.</source> <volume>13</volume>, &#x2013;<lpage>40</lpage>. doi: <pub-id pub-id-type="doi">10.1007/S13278-022-01020-5</pub-id>, PMID: <pub-id pub-id-type="pmid">40371312</pub-id></mixed-citation></ref>
<ref id="ref3"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Almuhimedi</surname><given-names>H.</given-names></name> <name><surname>Wilson</surname><given-names>S.</given-names></name> <name><surname>Liu</surname><given-names>B.</given-names></name> <name><surname>Sadeh</surname><given-names>N.</given-names></name> <name><surname>Acquisti</surname><given-names>A.</given-names></name></person-group> (<year>2013</year>). <source>Tweets are forever: a large- scale quantitative analysis of deleted tweets</source>. <publisher-loc>San Antonio, TX</publisher-loc>.</mixed-citation></ref>
<ref id="ref4"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Alshumrani</surname><given-names>N. C.</given-names></name> <name><surname>Ghita</surname><given-names>B.</given-names></name></person-group> (<year>2023</year>). <article-title>A unified forensics analysis approach to digital investigation</article-title>. <source>Int. Conf. Cyber Warfare Secur.</source> <volume>18</volume>, <fpage>466</fpage>&#x2013;<lpage>475</lpage>. doi: <pub-id pub-id-type="doi">10.34190/ICCWS.18.1.972</pub-id></mixed-citation></ref>
<ref id="ref5"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ananthi</surname><given-names>B.</given-names></name> <name><surname>Priyanga</surname><given-names>K.</given-names></name> <name><surname>Sasmitha</surname><given-names>S.</given-names></name> <name><surname>Sowmiya</surname><given-names>S.</given-names></name> <name><surname>Dhanya</surname><given-names>V.</given-names></name></person-group> (<year>2024</year>). <article-title>Detecting of criminals using facial recognition</article-title>. <source>Int. J. Eng. Res. Technol.</source> <volume>13</volume>, <fpage>1</fpage>&#x2013;<lpage>6</lpage>. doi: <pub-id pub-id-type="doi">10.17577/IJERTV13IS100122</pub-id></mixed-citation></ref>
<ref id="ref6"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Armoogum</surname><given-names>S.</given-names></name> <name><surname>Dewi</surname><given-names>D. A.</given-names></name> <name><surname>Armoogum</surname><given-names>V.</given-names></name> <name><surname>Melanie</surname><given-names>N.</given-names></name> <name><surname>Kurniawan</surname><given-names>T. B.</given-names></name></person-group> (<year>2024</year>). <article-title>Unveiling criminal activity: a social media mining approach to crime prediction</article-title>. <source>J. Appl. Data Sci.</source> <volume>5</volume>, <fpage>1482</fpage>&#x2013;<lpage>1494</lpage>. doi: <pub-id pub-id-type="doi">10.47738/JADS.V5I3.350</pub-id></mixed-citation></ref>
<ref id="ref7"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Arshad</surname><given-names>H.</given-names></name> <name><surname>Abdullah</surname><given-names>S.</given-names></name> <name><surname>Alawida</surname><given-names>M.</given-names></name> <name><surname>Alabdulatif</surname><given-names>A.</given-names></name> <name><surname>Abiodun</surname><given-names>O. I.</given-names></name> <name><surname>Riaz</surname><given-names>O.</given-names></name></person-group> (<year>2022</year>). <article-title>A multi-layer semantic approach for digital forensics automation for online social networks</article-title>. <source>Sensors</source> <volume>22</volume>:<fpage>1115</fpage>. doi: <pub-id pub-id-type="doi">10.3390/S22031115</pub-id>, PMID: <pub-id pub-id-type="pmid">35161859</pub-id></mixed-citation></ref>
<ref id="ref8"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Beretta</surname><given-names>E.</given-names></name> <name><surname>Vetr&#x00F2;</surname><given-names>A.</given-names></name> <name><surname>Lepri</surname><given-names>B.</given-names></name> <name><surname>Martin</surname><given-names>J. C. D.</given-names></name></person-group>., &#x201C;<article-title>Detecting discriminatory risk through data annotation based on Bayesian inferences</article-title>,&#x201D; <conf-name>FAccT 2021 - Proceedings of the 2021 ACM. Athens, Greece: Conference on Fairness, Accountability, and Transparency</conf-name>, vol. <volume>17</volume>, pp. <fpage>794</fpage>&#x2013;<lpage>804</lpage> (<year>2021</year>).</mixed-citation></ref>
<ref id="ref9"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Camps-Valls</surname><given-names>G.</given-names></name></person-group> (<year>2009</year>). &#x201C;<article-title>Machine learning in remote sensing dataprocessing</article-title>&#x201D; in <source>Machine Learning for Signal Processing XIX - Proceedings of the 2009 IEEE Signal Processing Society Workshop</source> (<publisher-name>Grenoble, France: MLSP</publisher-name>).</mixed-citation></ref>
<ref id="ref10"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Casey</surname><given-names>E.</given-names></name></person-group>, &#x201C;<article-title>Computer basics for digital investigators</article-title>,&#x201D; <source>Digital evidence and computer crime: forensic science, computers, and the internet</source>. <fpage>437</fpage>&#x2013;<lpage>463</lpage>, (<year>2011</year>). Available online at: <ext-link xlink:href="https://books.google.com/books/about/Digital_Evidence_and_Computer_Crime.html?id=lUnMz_WDJ8AC" ext-link-type="uri">https://books.google.com/books/about/Digital_Evidence_and_Computer_Crime.html?id=lUnMz_WDJ8AC</ext-link></mixed-citation></ref>
<ref id="ref11"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Caviglione</surname><given-names>L.</given-names></name> <name><surname>Wendzel</surname><given-names>S.</given-names></name> <name><surname>Mazurczyk</surname><given-names>W.</given-names></name></person-group> (<year>2017</year>). <article-title>The future of digital forensics: challenges and the road ahead</article-title>. <source>IEEE Secur. Priv.</source> <volume>15</volume>, <fpage>12</fpage>&#x2013;<lpage>17</lpage>. doi: <pub-id pub-id-type="doi">10.1109/MSP.2017.4251117</pub-id></mixed-citation></ref>
<ref id="ref12"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Chakraborty</surname><given-names>G.</given-names></name> <name><surname>Pagolu</surname><given-names>M.</given-names></name> <name><surname>Garla</surname><given-names>S.</given-names></name></person-group> (<year>2013</year>). <source>Text mining and analysis practical methods, examples, and case studies using SAS&#x00AE;</source>. North Carolina, USA: <publisher-name>SAS Institute Inc</publisher-name>.</mixed-citation></ref>
<ref id="ref13"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cheong</surname><given-names>B. C.</given-names></name></person-group> (<year>2024</year>). <article-title>Transparency and accountability in AI systems: safeguarding wellbeing in the age of algorithmic decision-making</article-title>. <source>Front. Hum. Dynami.</source> <volume>6</volume>:<fpage>1421273</fpage>. doi: <pub-id pub-id-type="doi">10.3389/FHUMD.2024.1421273/BIBTEX</pub-id></mixed-citation></ref>
<ref id="ref14"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Choo</surname><given-names>K. R.</given-names></name></person-group> (<year>2011</year>). <article-title>The cyber threat landscape: challenges and future research directions</article-title>. <source>Comput. Secur.</source> <volume>30</volume>, <fpage>719</fpage>&#x2013;<lpage>731</lpage>. doi: <pub-id pub-id-type="doi">10.1016/J.COSE.2011.08.004</pub-id></mixed-citation></ref>
<ref id="ref15"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Davis</surname><given-names>A.</given-names></name> <name><surname>Harris</surname><given-names>S. A.</given-names></name></person-group> (<year>2024</year>). <article-title>Leveraging machine learning models for real-time fraud detection in financial transactions</article-title>. <source>Int. J. Comput. Technol. Sci.</source> <volume>1</volume>, <fpage>1</fpage>&#x2013;<lpage>06</lpage>. doi: <pub-id pub-id-type="doi">10.62951/IJCTS.V1I1.56</pub-id></mixed-citation></ref>
<ref id="ref16"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Diwan</surname><given-names>S.</given-names></name> <name><surname>Dixit</surname><given-names>R. S.</given-names></name> <name><surname>Mahadeva</surname><given-names>R.</given-names></name></person-group> (<year>2024</year>). <article-title>Systematic analysis of video tampering and detection techniques</article-title>. <source>Cogent. Eng.</source> <volume>11</volume>, <fpage>1</fpage>&#x2013;<lpage>21</lpage>. doi: <pub-id pub-id-type="doi">10.1080/23311916.2024.2424466</pub-id></mixed-citation></ref>
<ref id="ref17"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Elistratova</surname><given-names>B.</given-names></name> <name><surname>Anikeeva</surname><given-names>A. E.</given-names></name></person-group> (<year>2021</year>). &#x201C;<article-title>Development of a machine learning method for automatic analysis of data processing quality</article-title>&#x201D; in <source>Proceedings of the 2021 15th International Scientific-Technical Conference on Actual Problems of Electronic Instrument Engineering</source>, vol. <volume>2021</volume> (<publisher-name>APEIE</publisher-name>), <fpage>644</fpage>&#x2013;<lpage>647</lpage>.</mixed-citation></ref>
<ref id="ref18"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Goodfellow</surname><given-names>Y. B.</given-names></name> <name><surname>Courville</surname><given-names>A.</given-names></name></person-group> (<year>2016</year>). <source>Deep learning</source>: <publisher-name>MIT Press</publisher-name> <comment>Available at:</comment> <ext-link xlink:href="https://books.google.com.pk/books/about/Deep_Learning.html?id=Np9SDQAAQBAJ&#x0026;redir_esc=y" ext-link-type="uri">https://books.google.com.pk/books/about/Deep_Learning.html?id=Np9SDQAAQBAJ&#x0026;redir_esc=y</ext-link> (Accessed November 18, 2016).</mixed-citation></ref>
<ref id="ref19"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Goodison</surname><given-names>S. E.</given-names></name> <name><surname>Davis</surname><given-names>R. C.</given-names></name> <name><surname>Jackson</surname><given-names>B. A.</given-names></name></person-group>. (<year>2015</year>). <source>Digital evidence and the U.S. criminal justice system: Identifying technology and other needs to more effectively acquire and utilize digital evidence</source>. Massachusetts, London, England: The MIT Press Cambridge.</mixed-citation></ref>
<ref id="ref20"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Gryz</surname><given-names>J.</given-names></name> <name><surname>Rojszczak</surname><given-names>M.</given-names></name></person-group> (<year>2021</year>). <article-title>&#x201C;Black box algorithms and the rights of individuals: no easy solution to the &#x2018;explainability&#x2019; problem,&#x201D; internet</article-title>. <source>Pol. Rev.</source> <volume>10</volume>, 1&#x2013;24. doi: <pub-id pub-id-type="doi">10.14763/2021.2.1564</pub-id></mixed-citation></ref>
<ref id="ref21"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kaplan</surname><given-names>M.</given-names></name> <name><surname>Haenlein</surname><given-names>M.</given-names></name></person-group> (<year>2010</year>). <article-title>Users of the world, unite! The challenges and opportunities of social media</article-title>. <source>Bus. Horiz.</source> <volume>53</volume>, <fpage>59</fpage>&#x2013;<lpage>68</lpage>. doi: <pub-id pub-id-type="doi">10.1016/J.BUSHOR.2009.09.003</pub-id></mixed-citation></ref>
<ref id="ref22"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Kerr</surname><given-names>O. S.</given-names></name></person-group> (<year>2022</year>). <source>Computer crime law</source>. <edition>5th</edition> Edn. Minnesota, USA: <publisher-name>West Academic Publishing</publisher-name>.</mixed-citation></ref>
<ref id="ref23"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Khan</surname><given-names>A. A.</given-names></name> <name><surname>Yang</surname><given-names>J.</given-names></name> <name><surname>Laghari</surname><given-names>A. A.</given-names></name> <name><surname>Baqasah</surname><given-names>A. M.</given-names></name> <name><surname>Alroobaea</surname><given-names>R.</given-names></name> <name><surname>Ku</surname><given-names>C. S.</given-names></name> <etal/></person-group>. (<year>2024</year>). <article-title>B-LPoET: lightweight PoET for secure blockchain transactions</article-title>. <source>Comp. Electr. Eng.</source> <volume>118</volume>:<fpage>109343</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.compeleceng.2024.109343</pub-id>, PMID: <pub-id pub-id-type="pmid">40370555</pub-id></mixed-citation></ref>
<ref id="ref24"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Khan</surname><given-names>A. A.</given-names></name> <name><surname>Dhabi</surname><given-names>S.</given-names></name> <name><surname>Yang</surname><given-names>J.</given-names></name> <name><surname>Alhakami</surname><given-names>W.</given-names></name> <name><surname>Bourouis</surname><given-names>S.</given-names></name> <name><surname>Yee</surname><given-names>L.</given-names></name> <etal/></person-group>. (<year>2025</year>). <article-title>BAIoT-EMS: consortium network for SMEs with blockchain and AIoT</article-title>. <source>Eng. Appl. AI</source> <volume>141</volume>:<fpage>109838</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.engappai.2024.109838</pub-id>, PMID: <pub-id pub-id-type="pmid">40370555</pub-id></mixed-citation></ref>
<ref id="ref25"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Leslie</surname><given-names>D.</given-names></name></person-group> &#x201C;<source>Understanding bias in facial recognition technologies</source> (<year>2020</year>). UK: The Alen Turing Institute.</mixed-citation></ref>
<ref id="ref26"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Liang</surname><given-names>H.</given-names></name> <name><surname>Perona</surname><given-names>P.</given-names></name> <name><surname>Balakrishnan</surname><given-names>G.</given-names></name></person-group> (<year>2023</year>). <article-title>Benchmarking algorithmic Bias in face recognition: an experimental approach using synthetic faces and human evaluation</article-title>. <source>Proc. IEEE Int. Conf. Comput. Vision</source>, <fpage>4954</fpage>&#x2013;<lpage>4964</lpage>. doi: <pub-id pub-id-type="doi">10.1109/ICCV51070.2023.00459</pub-id></mixed-citation></ref>
<ref id="ref27"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname><given-names>B.</given-names></name></person-group> (<year>1997</year>). <article-title>Route finding by using knowledge about the road network</article-title>. <source>IEEE Trans. Syst. Man Cybernet. A Syst. Hum.</source> <volume>27</volume>, <fpage>436</fpage>&#x2013;<lpage>448</lpage>. doi: <pub-id pub-id-type="doi">10.1109/3468.594911</pub-id></mixed-citation></ref>
<ref id="ref28"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname><given-names>Q.</given-names></name> <name><surname>Gao</surname><given-names>Z.</given-names></name> <name><surname>Liu</surname><given-names>B.</given-names></name> <name><surname>Zhang</surname><given-names>Y.</given-names></name></person-group> (<year>2016</year>). <article-title>Automated rule selection for opinion target extraction</article-title>. <source>Knowl. Based Syst.</source> <volume>104</volume>, <fpage>74</fpage>&#x2013;<lpage>88</lpage>. doi: <pub-id pub-id-type="doi">10.1016/J.KNOSYS.2016.04.010</pub-id></mixed-citation></ref>
<ref id="ref29"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname><given-names>B.</given-names></name> <name><surname>Hsu</surname><given-names>W.</given-names></name> <name><surname>Mun</surname><given-names>L. F.</given-names></name> <name><surname>Lee</surname><given-names>H. Y.</given-names></name></person-group> (<year>1999</year>). <article-title>Finding interesting patterns using user expectations</article-title>. <source>IEEE Trans. Knowl. Data Eng.</source> <volume>11</volume>, <fpage>817</fpage>&#x2013;<lpage>832</lpage>. doi: <pub-id pub-id-type="doi">10.1109/69.824588</pub-id>, PMID: <pub-id pub-id-type="pmid">40371634</pub-id></mixed-citation></ref>
<ref id="ref31"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Lundberg</surname><given-names>S. M.</given-names></name> <name><surname>Lee</surname><given-names>S. I.</given-names></name></person-group> (<year>2017</year>). <source>A unified approach to interpreting model predictions</source>. San Diego, USA: <publisher-name>NeurIPS</publisher-name>.</mixed-citation></ref>
<ref id="ref32"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Manchanda</surname><given-names>S.</given-names></name> <name><surname>Bhagwatkar</surname><given-names>K.</given-names></name> <name><surname>Balutia</surname><given-names>K.</given-names></name> <name><surname>Agarwal</surname><given-names>S.</given-names></name> <name><surname>Chaudhary</surname><given-names>J.</given-names></name> <name><surname>Dosi</surname><given-names>M.</given-names></name> <etal/></person-group>. (<year>2023</year>). <article-title>D-LORD: DYSL-AI database for low-resolution disguised face recognition</article-title>. <source>IEEE Trans. Biometr. Behav. Ident. Sci.</source> <volume>6</volume>, <fpage>147</fpage>&#x2013;<lpage>157</lpage>. doi: <pub-id pub-id-type="doi">10.1109/TBIOM.2023.3306703</pub-id>, PMID: <pub-id pub-id-type="pmid">40358844</pub-id></mixed-citation></ref>
<ref id="ref33"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Marey</surname><given-names>A.</given-names></name> <etal/></person-group>. (<year>2024</year>). <article-title>Explainability, transparency and black box challenges of AI in radiology: impact on patient care in cardiovascular radiology</article-title>. <source>Egypt J. Radiol. Nucl. Med.</source> <volume>55</volume>, &#x2013;<lpage>14</lpage>. doi: <pub-id pub-id-type="doi">10.1186/S43055-024-01356-2/FIGURES/2</pub-id></mixed-citation></ref>
<ref id="ref34"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Molnar</surname><given-names>C.</given-names></name></person-group> (<year>2020</year>). <source>Interpretable machine learning</source>. <comment>North Carolina, USA: Lulu Press, Inc</comment>.</mixed-citation></ref>
<ref id="ref35"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Mubarak</surname><given-names>H.</given-names></name> <name><surname>Abdaljalil</surname><given-names>S.</given-names></name> <name><surname>Nassar</surname><given-names>A.</given-names></name> <name><surname>Alam</surname><given-names>F.</given-names></name></person-group>, <source>Detecting and reasoning of deleted tweets before they are posted</source> (<year>2023</year>). Available online at: <ext-link xlink:href="https://help.twitter.com/en/managing-your-account/suspended-twitter-accounts" ext-link-type="uri">https://help.twitter.com/en/managing-your-account/suspended-twitter-accounts</ext-link></mixed-citation></ref>
<ref id="ref36"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Murero</surname><given-names>M.</given-names></name></person-group> (<year>2023</year>). <article-title>Coordinated inauthentic behavior: an innovative manipulation tactic to amplify COVID- 19 anti-vaccine communication outreach via social media</article-title>. <source>Front. Sociol.</source> <volume>8</volume>:<fpage>1141416</fpage>. doi: <pub-id pub-id-type="doi">10.3389/FSOC.2023.1141416</pub-id>, PMID: <pub-id pub-id-type="pmid">37006634</pub-id></mixed-citation></ref>
<ref id="ref37"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Nurhayati</surname><given-names>B.</given-names></name> <name><surname>Amrizal</surname><given-names>V.</given-names></name></person-group> (<year>2018</year>). &#x201C;<article-title>Big data analysis using Hadoop framework and machine learning as decision support system (DSS) (case study: knowledge of Islam mindset)</article-title>&#x201D; in <source>2018 6th International Conference on Cyber and IT Service Management</source> (<publisher-name>CITSM</publisher-name>).</mixed-citation></ref>
<ref id="ref38"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Oetzel</surname><given-names>M. C.</given-names></name> <name><surname>Spiekermann</surname><given-names>S.</given-names></name></person-group> (<year>2014</year>). <article-title>A systematic methodology for privacy impact assessments: a design science approach</article-title>. <source>Eur. J. Inf. Syst.</source> <volume>23</volume>, <fpage>126</fpage>&#x2013;<lpage>150</lpage>. doi: <pub-id pub-id-type="doi">10.1057/EJIS.2013.18</pub-id></mixed-citation></ref>
<ref id="ref30"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Pagano</surname><given-names>T. P.</given-names></name> <name><surname>Loureiro</surname><given-names>R. B.</given-names></name> <name><surname>Lisboa</surname><given-names>F. V. N.</given-names></name> <name><surname>Peixoto</surname><given-names>R. M.</given-names></name> <name><surname>Guimar&#x00E3;es</surname><given-names>G. A. S.</given-names></name> <name><surname>Cruz</surname><given-names>G. O. R.</given-names></name> <etal/></person-group>. (<year>2023</year>). <article-title>Bias and unfairness in machine learning models: a systematic review on datasets, tools, fairness metrics, and identification and mitigation methods</article-title>. <source>Data Cogn. Comput.</source> <volume>7</volume>:<fpage>15</fpage>. doi: <pub-id pub-id-type="doi">10.3390/bdcc7010015</pub-id></mixed-citation></ref>
<ref id="ref39"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Perkowitz</surname><given-names>S.</given-names></name></person-group> (<year>2021</year>). &#x201C;<article-title>The Bias in the machine: facial recognition technology and racial disparities</article-title>&#x201D; in <source>MIT case studies in social and ethical responsibilities of computing</source>. USA:MIT Press.</mixed-citation></ref>
<ref id="ref40"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Quick</surname><given-names>D.</given-names></name> <name><surname>Choo</surname><given-names>K. K. R.</given-names></name></person-group> (<year>2014</year>). <article-title>Google drive: forensic analysis of data remnants</article-title>. <source>J. Netw. Comput. Appl.</source> <volume>40</volume>, <fpage>179</fpage>&#x2013;<lpage>193</lpage>. doi: <pub-id pub-id-type="doi">10.1016/J.JNCA.2013.09.016</pub-id>, PMID: <pub-id pub-id-type="pmid">40370555</pub-id></mixed-citation></ref>
<ref id="ref41"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Ribeiro</surname><given-names>M. T.</given-names></name> <etal/></person-group>. (<year>2016</year>). <source>Why should I trust you?</source>. San Francisco, USA <publisher-name>ACM SIGKDD</publisher-name>.</mixed-citation></ref>
<ref id="ref42"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Roughton</surname><given-names>A.</given-names></name></person-group> &#x201C;<source>United States v. Browne, 834 F.3d 403 (2016): Case brief summary &#x2014; Quimbee</source>.&#x201D; (<year>2016</year>) Available online at: <ext-link xlink:href="https://www.quimbee.com/cases/united-states-v-browne" ext-link-type="uri">https://www.quimbee.com/cases/united-states-v-browne</ext-link></mixed-citation></ref>
<ref id="ref43"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Selvaraju</surname><given-names>R. R.</given-names></name> <name><surname>Cogswell</surname><given-names>M.</given-names></name> <name><surname>Das</surname><given-names>A.</given-names></name> <name><surname>Vedantam</surname><given-names>R.</given-names></name> <name><surname>Parikh</surname><given-names>D.</given-names></name> <name><surname>Batra</surname><given-names>D.</given-names></name></person-group> (<year>2020</year>). <article-title>Grad-CAM: visual explanations from deep networks via gradient-based localization</article-title>. <source>Int. J. Comput. Vis.</source> <volume>128</volume>, <fpage>336</fpage>&#x2013;<lpage>359</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s11263-019-01228-7</pub-id></mixed-citation></ref>
<ref id="ref44"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Slack</surname><given-names>D.</given-names></name> <name><surname>Hilgard</surname><given-names>A.</given-names></name> <name><surname>Lakkaraju</surname><given-names>H.</given-names></name> <name><surname>Singh</surname><given-names>S.</given-names></name></person-group> (<year>2021</year>). <article-title>Counterfactual explanations can be manipulated</article-title>. <source>Adv. Neural Inf. Proces. Syst.</source> <volume>34</volume>, <fpage>62</fpage>&#x2013;<lpage>75</lpage>.</mixed-citation></ref>
<ref id="ref46"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Torres-Lugo</surname><given-names>C.</given-names></name> <name><surname>Pote</surname><given-names>M.</given-names></name> <name><surname>Nwala</surname><given-names>A. C.</given-names></name> <name><surname>Menczer</surname><given-names>F.</given-names></name></person-group>, &#x201C;<article-title>Manipulating twitter through deletions</article-title>,&#x201D; <conf-name>Proceedings of the International AAAI Conference on Web and Social Media</conf-name>, <volume>16</volume>, pp. <fpage>1029</fpage>&#x2013;<lpage>1039</lpage>, (<year>2022</year>).</mixed-citation></ref>
<ref id="ref47"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Verma</surname><given-names>S.</given-names></name> <name><surname>Ernst</surname><given-names>M.</given-names></name> <name><surname>Just</surname><given-names>R.</given-names></name></person-group>, &#x201C;<source>Removing biased data to improve fairness and accuracy</source>,&#x201D; (<year>2021</year>) USA: ArXiv.org, Cornell University.</mixed-citation></ref>
<ref id="ref48"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Wu</surname><given-names>X.</given-names></name></person-group> (<year>2004</year>). &#x201C;<article-title>Data mining&#x2014;proceedings of the IEEE/WIC/ACM international conference on intelligent agent technology</article-title>&#x201D; in <source>IAT 04: Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology</source>.</mixed-citation></ref>
<ref id="ref49"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Xiao</surname><given-names>S. L.</given-names></name> <name><surname>Xu</surname><given-names>Q.</given-names></name></person-group> (<year>2019</year>). <article-title>Video-based evidence analysis and extraction in digital forensic investigation</article-title>. <source>IEEE Access</source> <volume>7</volume>, <fpage>55432</fpage>&#x2013;<lpage>55442</lpage>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2019.2913648</pub-id></mixed-citation></ref>
<ref id="ref50"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname><given-names>J.</given-names></name> <name><surname>Chen</surname><given-names>Y.-L.</given-names></name> <name><surname>Por</surname><given-names>L. Y.</given-names></name> <name><surname>Ku</surname><given-names>C. S.</given-names></name></person-group> (<year>2023</year>). <article-title>A systematic literature review of information security in chatbots</article-title>. <source>Appl. Sci.</source> <volume>13</volume>:<fpage>6355</fpage>. doi: <pub-id pub-id-type="doi">10.3390/app13116355</pub-id></mixed-citation></ref>
<ref id="ref51"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhai</surname><given-names>Y.</given-names></name> <name><surname>Liu</surname><given-names>B.</given-names></name></person-group> (<year>2006</year>). <article-title>Structured data extraction from the web based on partial tree alignment</article-title>. <source>IEEE Trans. Knowl. Data Eng.</source> <volume>18</volume>, <fpage>1614</fpage>&#x2013;<lpage>1628</lpage>. doi: <pub-id pub-id-type="doi">10.1109/TKDE.2006.197</pub-id></mixed-citation></ref>
<ref id="ref320"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname><given-names>Z.</given-names></name> <name><surname>Wu</surname><given-names>L.</given-names></name> <name><surname>Ma</surname><given-names>C.</given-names></name> <name><surname>Li</surname><given-names>J.</given-names></name> <name><surname>Wang</surname><given-names>J.</given-names></name> <name><surname>Wang</surname><given-names>Q.</given-names></name> <etal/></person-group>. (<year>2022</year>). <article-title>LSFL: a lightweight and secure federated learning scheme for edge computing</article-title>. <source>IEEE Trans. Inf. Forensics Secur.</source> <volume>18</volume>, <fpage>365</fpage>&#x2013;<lpage>379</lpage>. doi: <pub-id pub-id-type="doi">10.1109/TIFS.2023.3331274</pub-id>, PMID: <pub-id pub-id-type="pmid">40358844</pub-id></mixed-citation></ref>
<ref id="ref480"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Zuo</surname><given-names>Z.</given-names></name></person-group> (<year>2024</year>). <article-title>Cross-border data forensics: challenges and strategies in the belt and road initiative digital era</article-title>. <source>Editor. Board</source> 20:49. doi: <pub-id pub-id-type="doi">10.5539/ass.v20n2p49</pub-id></mixed-citation></ref>
</ref-list><fn-group><fn id="fn0001" fn-type="custom" custom-type="edited-by"><p>Edited by: Stelvio Cimato, University of Milan, Italy</p></fn>
<fn id="fn0002" fn-type="custom" custom-type="reviewed-by"><p>Reviewed by: Cosimo Comella, Garante per la protezione dei dati personali, Italy</p><p>Por Lip Yee, University of Malaya, Malaysia</p></fn></fn-group></back>
</article>