Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking


Index Link

Index Tree

  • RootNode

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "5721cc13-4ac9-45c3-81e9-e4ff837ead1a"}, "_deposit": {"id": "4898", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4898"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4898", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Proposed Applicable CCFIM Framework for Cybercrime Forensics Investigation in Myanmar", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The rapid increase of ICT creates new attacksurfaces for cybercrime forensics. In society,information is the new challenge for security, privacy,and cybercrime. In this paper, an applicableframework has been proposed for cybercrimeforensics investigation in Myanmar, known asCCFIM. By using standard cyber laws and policy forcybercrime forensics investigation can provide anethical, secure and monitored computingenvironment. This framework provides a secureanalysis on both logical and physical dataextractions. Acceptable Evidences can be obtained byexamining sensible clues from any digital devicessuch as computer, mobile smart phones, tablets, GPSand IoT devices via traditional or cloud. The mostimportant part of forensic investigation is to gatherthe “relevant” and “acceptable” information forcyber evidence on court. Therefore, forensicinvestigators need to emphasize how file systemtimestamps work. This paper emphasizes on thecomparative timestamps of the various file andwindow operating systems."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "cybercrime forensics"}, {"interim": "IoT devices"}, {"interim": "cloud and social network"}, {"interim": "cyber evidence"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "proceeding_total-pages-335-341.pdf", "filesize": [{"value": "3199 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 3199000.0, "url": {"url": "https://meral.edu.mm/record/4898/files/proceeding_total-pages-335-341.pdf"}, "version_id": "f5a59c86-dd02-40e2-aa0c-5ad3d77349a3"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifteenth International Conference on Computer Applications(ICCA 2017)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Maung, Tin Maung"}, {"subitem_authors_fullname": "Thwin, Mie Mie Su"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-02-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/800"}, "item_title": "Proposed Applicable CCFIM Framework for Cybercrime Forensics Investigation in Myanmar", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004898", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4898", "relation": {}, "relation_version_is_last": true, "title": ["Proposed Applicable CCFIM Framework for Cybercrime Forensics Investigation in Myanmar"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Proposed Applicable CCFIM Framework for Cybercrime Forensics Investigation in Myanmar

http://hdl.handle.net/20.500.12678/0000004898
http://hdl.handle.net/20.500.12678/0000004898
cba81d50-57ee-42d2-9be6-f34ba6ca943a
5721cc13-4ac9-45c3-81e9-e4ff837ead1a
None
Preview
Name / File License Actions
proceeding_total-pages-335-341.pdf proceeding_total-pages-335-341.pdf (3199 Kb)
Publication type
Article
Upload type
Publication
Title
Title Proposed Applicable CCFIM Framework for Cybercrime Forensics Investigation in Myanmar
Language en
Publication date 2017-02-16
Authors
Maung, Tin Maung
Thwin, Mie Mie Su
Description
The rapid increase of ICT creates new attacksurfaces for cybercrime forensics. In society,information is the new challenge for security, privacy,and cybercrime. In this paper, an applicableframework has been proposed for cybercrimeforensics investigation in Myanmar, known asCCFIM. By using standard cyber laws and policy forcybercrime forensics investigation can provide anethical, secure and monitored computingenvironment. This framework provides a secureanalysis on both logical and physical dataextractions. Acceptable Evidences can be obtained byexamining sensible clues from any digital devicessuch as computer, mobile smart phones, tablets, GPSand IoT devices via traditional or cloud. The mostimportant part of forensic investigation is to gatherthe “relevant” and “acceptable” information forcyber evidence on court. Therefore, forensicinvestigators need to emphasize how file systemtimestamps work. This paper emphasizes on thecomparative timestamps of the various file andwindow operating systems.
Keywords
cybercrime forensics, IoT devices, cloud and social network, cyber evidence
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/800
Journal articles
Fifteenth International Conference on Computer Applications(ICCA 2017)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:28:30.202279
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL