MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "5721cc13-4ac9-45c3-81e9-e4ff837ead1a"}, "_deposit": {"id": "4898", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4898"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4898", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Proposed Applicable CCFIM Framework for Cybercrime Forensics Investigation in Myanmar", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The rapid increase of ICT creates new attacksurfaces for cybercrime forensics. In society,information is the new challenge for security, privacy,and cybercrime. In this paper, an applicableframework has been proposed for cybercrimeforensics investigation in Myanmar, known asCCFIM. By using standard cyber laws and policy forcybercrime forensics investigation can provide anethical, secure and monitored computingenvironment. This framework provides a secureanalysis on both logical and physical dataextractions. Acceptable Evidences can be obtained byexamining sensible clues from any digital devicessuch as computer, mobile smart phones, tablets, GPSand IoT devices via traditional or cloud. The mostimportant part of forensic investigation is to gatherthe “relevant” and “acceptable” information forcyber evidence on court. Therefore, forensicinvestigators need to emphasize how file systemtimestamps work. This paper emphasizes on thecomparative timestamps of the various file andwindow operating systems."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "cybercrime forensics"}, {"interim": "IoT devices"}, {"interim": "cloud and social network"}, {"interim": "cyber evidence"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "proceeding_total-pages-335-341.pdf", "filesize": [{"value": "3199 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 3199000.0, "url": {"url": "https://meral.edu.mm/record/4898/files/proceeding_total-pages-335-341.pdf"}, "version_id": "f5a59c86-dd02-40e2-aa0c-5ad3d77349a3"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifteenth International Conference on Computer Applications(ICCA 2017)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Maung, Tin Maung"}, {"subitem_authors_fullname": "Thwin, Mie Mie Su"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-02-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/800"}, "item_title": "Proposed Applicable CCFIM Framework for Cybercrime Forensics Investigation in Myanmar", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004898", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4898", "relation": {}, "relation_version_is_last": true, "title": ["Proposed Applicable CCFIM Framework for Cybercrime Forensics Investigation in Myanmar"], "weko_shared_id": -1}
Proposed Applicable CCFIM Framework for Cybercrime Forensics Investigation in Myanmar
http://hdl.handle.net/20.500.12678/0000004898
http://hdl.handle.net/20.500.12678/0000004898cba81d50-57ee-42d2-9be6-f34ba6ca943a
5721cc13-4ac9-45c3-81e9-e4ff837ead1a
Name / File | License | Actions |
---|---|---|
proceeding_total-pages-335-341.pdf (3199 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Proposed Applicable CCFIM Framework for Cybercrime Forensics Investigation in Myanmar | |||||
Language | en | |||||
Publication date | 2017-02-16 | |||||
Authors | ||||||
Maung, Tin Maung | ||||||
Thwin, Mie Mie Su | ||||||
Description | ||||||
The rapid increase of ICT creates new attacksurfaces for cybercrime forensics. In society,information is the new challenge for security, privacy,and cybercrime. In this paper, an applicableframework has been proposed for cybercrimeforensics investigation in Myanmar, known asCCFIM. By using standard cyber laws and policy forcybercrime forensics investigation can provide anethical, secure and monitored computingenvironment. This framework provides a secureanalysis on both logical and physical dataextractions. Acceptable Evidences can be obtained byexamining sensible clues from any digital devicessuch as computer, mobile smart phones, tablets, GPSand IoT devices via traditional or cloud. The mostimportant part of forensic investigation is to gatherthe “relevant” and “acceptable” information forcyber evidence on court. Therefore, forensicinvestigators need to emphasize how file systemtimestamps work. This paper emphasizes on thecomparative timestamps of the various file andwindow operating systems. | ||||||
Keywords | ||||||
cybercrime forensics, IoT devices, cloud and social network, cyber evidence | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/800 | |||||
Journal articles | ||||||
Fifteenth International Conference on Computer Applications(ICCA 2017) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |