<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-05-02T14:24:36Z</responseDate>
  <request metadataPrefix="oai_dc" identifier="oai:meral.edu.mm:recid/4898" verb="GetRecord">https://meral.edu.mm/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:meral.edu.mm:recid/4898</identifier>
        <datestamp>2021-12-13T03:35:40Z</datestamp>
        <setSpec>1582963302567:1597824273898</setSpec>
        <setSpec>user-ucsy</setSpec>
      </header>
      <metadata>
        <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns="http://www.w3.org/2001/XMLSchema" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
          <dc:title>Proposed Applicable CCFIM Framework for Cybercrime Forensics Investigation in Myanmar</dc:title>
          <dc:creator>Maung, Tin Maung</dc:creator>
          <dc:creator>Thwin, Mie Mie Su</dc:creator>
          <dc:description>The rapid increase of ICT creates new attacksurfaces for cybercrime forensics. In society,information is the new challenge for security, privacy,and cybercrime. In this paper, an applicableframework has been proposed for cybercrimeforensics investigation in Myanmar, known asCCFIM. By using standard cyber laws and policy forcybercrime forensics investigation can provide anethical, secure and monitored computingenvironment. This framework provides a secureanalysis on both logical and physical dataextractions. Acceptable Evidences can be obtained byexamining sensible clues from any digital devicessuch as computer, mobile smart phones, tablets, GPSand IoT devices via traditional or cloud. The mostimportant part of forensic investigation is to gatherthe “relevant” and “acceptable” information forcyber evidence on court. Therefore, forensicinvestigators need to emphasize how file systemtimestamps work. This paper emphasizes on thecomparative timestamps of the various file andwindow operating systems.</dc:description>
          <dc:date>2017-02-16</dc:date>
          <dc:identifier>http://hdl.handle.net/20.500.12678/0000004898</dc:identifier>
          <dc:identifier>https://meral.edu.mm/records/4898</dc:identifier>
        </oai_dc:dc>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
