{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:42:53Z","timestamp":1775745773366,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031565793","type":"print"},{"value":"9783031565809","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56580-9_6","type":"book-chapter","created":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T05:02:23Z","timestamp":1712034143000},"page":"96-113","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Retruth Reconnaissance: A Digital Forensic Analysis of\u00a0Truth Social"],"prefix":"10.1007","author":[{"given":"Joseph","family":"Brown","sequence":"first","affiliation":[]},{"given":"Ibrahim","family":"Baggili","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,3]]},"reference":[{"key":"6_CR1","unstructured":"Social media platform parler is back online on \u2018independent technology\u2019 (2021). https:\/\/www.cnbc.com\/2021\/02\/15\/social-media-platform-parler-back-online-after-being-banned-by-major-tech-companies.html"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"S24","DOI":"10.1016\/j.diin.2012.05.007","volume":"9","author":"N Al Mutawa","year":"2012","unstructured":"Al Mutawa, N., Baggili, I., Marrington, A.: Forensic analysis of social networking applications on mobile devices. Digit. Investig. 9, S24\u2013S33 (2012)","journal-title":"Digit. Investig."},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Aliapoulios, M., et al.: A large open dataset from the Parler social network. In: ICWSM, pp. 943\u2013951 (2021)","DOI":"10.1609\/icwsm.v15i1.18117"},{"issue":"3","key":"6_CR4","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1109\/TBIOM.2021.3078073","volume":"3","author":"F Alonso-Fernandez","year":"2021","unstructured":"Alonso-Fernandez, F., Belvisi, N.M.S., Hernandez-Diaz, K., Muhammad, N., Bigun, J.: Writer identification using microblogging texts for social media forensics. IEEE Trans. Biometr. Behav. Identity Sci. 3(3), 405\u2013426 (2021)","journal-title":"IEEE Trans. Biometr. Behav. Identity Sci."},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"35264","DOI":"10.1109\/ACCESS.2019.2903876","volume":"7","author":"I Amerini","year":"2019","unstructured":"Amerini, I., Li, C.T., Caldelli, R.: Social network identification through image classification with CNN. IEEE Access 7, 35264\u201335273 (2019)","journal-title":"IEEE Access"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.diin.2019.02.001","volume":"28","author":"H Arshad","year":"2019","unstructured":"Arshad, H., Jantan, A., Omolara, E.: Evidence collection and forensics on social networks: research challenges and directions. Digit. Investig. 28, 126\u2013138 (2019)","journal-title":"Digit. Investig."},{"key":"6_CR7","first-page":"1","volume":"1","author":"B Auxier","year":"2021","unstructured":"Auxier, B., Anderson, M.: Social media use in 2021. Pew Res. Cent. 1, 1\u20134 (2021)","journal-title":"Pew Res. Cent."},{"key":"6_CR8","unstructured":"Billeaud, J.: Rioters accused of erasing content from social media, phones (2021). https:\/\/apnews.com\/article\/joe-biden-capitol-siege-business-electoral-college-media-efe0ea1092bc11c6d3f42ea4ef752d98. Section: Donald Trump"},{"key":"6_CR9","unstructured":"Byman, D.L.: How hateful rhetoric connects to real-world violence (2021). https:\/\/www.brookings.edu\/blog\/order-from-chaos\/2021\/04\/09\/how-hateful-rhetoric-connects-to-real-world-violence\/"},{"key":"6_CR10","unstructured":"Clayton, J., Cabral, S.: Truth social: banned from twitter, trump returns with a new platform (2022). https:\/\/www.bbc.com\/news\/technology-60419008"},{"key":"6_CR11","unstructured":"Conger, K., Isaac, M., Mac, R., Hsu, T.: Two weeks of chaos: inside Elon Musk\u2019s takeover of twitter (2022). https:\/\/www.nytimes.com\/2022\/11\/11\/technology\/elon-musk-twitter-takeover.html"},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"S64","DOI":"10.1016\/j.diin.2010.05.009","volume":"7","author":"SL Garfinkel","year":"2010","unstructured":"Garfinkel, S.L.: Digital forensics research: the next 10 years. Digit. investig. 7, S64\u2013S73 (2010)","journal-title":"Digit. investig."},{"key":"6_CR13","doi-asserted-by":"publisher","unstructured":"Goda, B.S., Bair, J.W., Costarella, C.E.: Cell phone forensics. In: Proceedings of the 16th Annual Conference on Information Technology Education, pp. 39\u201342. ACM (2015). https:\/\/doi.org\/10.1145\/2808006.2808022, https:\/\/dl.acm.org\/doi\/10.1145\/2808006.2808022","DOI":"10.1145\/2808006.2808022"},{"key":"6_CR14","unstructured":"Grant, N.: Google says trump\u2019s truth social must scrub violent content to join play store (2022). https:\/\/www.nytimes.com\/2022\/08\/30\/technology\/google-trump-truth-social-violent-content.html"},{"key":"6_CR15","doi-asserted-by":"publisher","unstructured":"Harichandran, V.S., Walnycky, D., Baggili, I., Breitinger, F.: CuFA: a more formal definition for digital forensic artifacts 18, S125\u2013S137 (2016). https:\/\/doi.org\/10.1016\/j.diin.2016.04.005, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1742287616300366","DOI":"10.1016\/j.diin.2016.04.005"},{"key":"6_CR16","unstructured":"Harwell, D.: Trump\u2019s truth social\u2019s disastrous launch raises doubts about its long-term viability (2022). https:\/\/www.washingtonpost.com\/technology\/2022\/02\/22\/trump-truth-social-disaster\/"},{"key":"6_CR17","unstructured":"Harwell, D., Kornfield, M.: FBI attacker was prolific contributor to trump\u2019s truth social website (2022). https:\/\/www.washingtonpost.com\/technology\/2022\/08\/12\/shiffer-trump-truth-social-fan\/"},{"key":"6_CR18","unstructured":"Hsu, T., Frenkel, S.: On truth social, F.B.I. search prompts talk of war, then conspiracy (2022). https:\/\/www.nytimes.com\/2022\/08\/12\/technology\/truth-social-conspiracy-fbi-trump.html"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., Weippl, E.: Social snapshots: digital forensics for online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 113\u2013122 (2011)","DOI":"10.1145\/2076732.2076748"},{"key":"6_CR20","first-page":"301406","volume":"42","author":"H Johnson","year":"2022","unstructured":"Johnson, H., Volk, K., Serafin, R., Grajeda, C., Baggili, I.: Alt-tech social forensics: forensic analysis of alternative social networking applications. Forensic Sci. Int.: Digit. Investig. 42, 301406 (2022)","journal-title":"Forensic Sci. Int.: Digit. Investig."},{"key":"6_CR21","unstructured":"Kan, M.: Mastodon threatens to sue trump\u2019s social media site for violating open-source license (2021). https:\/\/www.pcmag.com\/news\/mastodon-threatens-to-sue-trumps-social-media-site-for-violating-open-source"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"49","DOI":"10.5120\/ijca2018917200","volume":"179","author":"C Khawas","year":"2018","unstructured":"Khawas, C., Shah, P.: Application of firebase in android app development-a study. Int. J. Comput. Appl. 179, 49\u201353 (2018). https:\/\/doi.org\/10.5120\/ijca2018917200","journal-title":"Int. J. Comput. Appl."},{"key":"6_CR23","unstructured":"Kleinfeld, R.: The rise in political violence in the united states and damage to our democracy (2022). https:\/\/carnegieendowment.org\/2022\/03\/31\/rise-in-political-violence-in-united-states-and-damage-to-our-democracy-pub-87584"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Menahil, A., Iqbal, W., Iftikhar, M., Shahid, W.B., Mansoor, K., Rubab, S.: Forensic analysis of social networking applications on an android smartphone. Wirel. Commun. Mob. Comput. 2021 (2021)","DOI":"10.1155\/2021\/5567592"},{"issue":"1","key":"6_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13635-020-00115-w","volume":"2021","author":"C Pasquini","year":"2021","unstructured":"Pasquini, C., Amerini, I., Boato, G.: Media forensics on social media platforms: a survey. EURASIP J. Inf. Secur. 2021(1), 1\u201319 (2021)","journal-title":"EURASIP J. Inf. Secur."},{"issue":"1","key":"6_CR26","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TIFS.2016.2603960","volume":"12","author":"A Rocha","year":"2016","unstructured":"Rocha, A., et al.: Authorship attribution for social media forensics. IEEE Trans. Inf. Forensics Secur. 12(1), 5\u201333 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR27","doi-asserted-by":"publisher","first-page":"S77","DOI":"10.1016\/j.diin.2015.05.009","volume":"14","author":"D Walnycky","year":"2015","unstructured":"Walnycky, D., Baggili, I., Marrington, A., Moore, J., Breitinger, F.: Network and device forensic analysis of android social-messaging applications. Digit. Investig. 14, S77\u2013S84 (2015)","journal-title":"Digit. Investig."},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Wu, S., Sun, W., Liu, X., Zhang, Y.: Forensics on Twitter and WeChat using a customised android emulator. In: 2018 IEEE 4th International Conference on Computer and Communications (ICCC), pp. 602\u2013608. IEEE (2018)","DOI":"10.1109\/CompComm.2018.8781056"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56580-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T05:07:21Z","timestamp":1712034441000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56580-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031565793","9783031565809"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56580-9_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDF2C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Forensics and Cyber Crime","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdf2c2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"105","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}