Skip to main content

Remote Investigative Actions as the Evidentiary Information Management System

  • Chapter
  • First Online:

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 181))

Abstract

The urgent character of the research is associated with the necessity to eliminate a systemic noncompliance with the level of up-to-date information and communication technologies integration with the needs of criminal investigation activities. This qualitative characteristic reduces the efficiency of law enforcement. The further disregard of the ever-increasing innovation deficiency can lead to irreversible negative consequences.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Samygin, L.D.: Criminal investigation as the system of activities, p. 73. Moscow (1989)

    Google Scholar 

  2. Astafurova, O.A., Salnikova, N.A., Lopukhov, N.V.: Means of Computer Modeling of Microwave Devices and Numerical Methods as Their Base Communications in Computer and Information Science, vol. 466, pp. 630–642. CCIS (2014)

    Google Scholar 

  3. Seravin, L.N.: Laws of Information and Its Role in Human Society, p. 24. Saint-Petersburg (1997)

    Google Scholar 

  4. Shafer, S.A.: The Essence and Ways of Collecting Evidence in Soviet Criminal Procedure, p. 41. Moscow (1972)

    Google Scholar 

  5. Streltsov, L.: The system of cybersecurity in Ukraine: principles, actors, challenges, accomplishments. Eur. J. Secur. Res. 2, 147 (2017). https://doi.org/10.1007/s41125-017-0020-x

    Article  Google Scholar 

  6. Nan, C., Sansavini, G.: A quantitative method for assessing resilience of interdependent infrastructures. Reliab. Eng. Syst. Saf. 157, 35–53 (2017)

    Article  Google Scholar 

  7. Kröger, W.: Securing the operation of socially critical systems from an engineering perspective: new challenges, enhanced tools and novel concepts. Eur. J. Secur. Res. 2, 39 (2017). https://doi.org/10.1007/s41125-017-0013-9

    Article  Google Scholar 

  8. Scavuzzo, M., Nitto, E.D., Ardagna, D.: Experiences and challenges in building a data intensive system for data migration. Empirical Softw. Eng. 23, 52 (2018). https://doi.org/10.1007/s10664-017-9503-7

    Article  Google Scholar 

  9. Verma, T., Ellens, W., Kooij, R.: Context-independent centrality measures underestimate the vulnerability of power grids. Int. J. Crit. Infrastruct. 11(1), 62–81 (2015)

    Article  Google Scholar 

  10. Ahmadi, Z., Kramer, S.: Knowl Modeling recurring concepts in data streams: a graph-based framework. Inf. Syst. 55, 15 (2018). https://doi.org/10.1007/s10115-017-1070-0

    Article  Google Scholar 

  11. Das, S., Banerjee, M., Chaudhuri, A.: An improved video key-frame extraction algorithm leads to video watermarking. Int. J. Inf. Tecnol. 10, 21 (2018). https://doi.org/10.1007/s41870-017-0054-3

    Article  Google Scholar 

  12. Brinkhoff, S.: Big data data mining by the dutch police: criteria for a future method of investigation. Eur. J. Secur Res. 2, 57 (2017). https://doi.org/10.1007/s41125-017-0012-x

    Article  Google Scholar 

  13. Ebad, S.A.: Regulatory rules for security requirements of financial information systems: attempt to formalize. Eur. J. Secur. Res. 2, 97 (2017). https://doi.org/10.1007/s41125-017-0017-5

    Article  Google Scholar 

  14. Azizi, A., Ghafoorpoor Yazdi, P., Hashemipour, M.: Interactive design of storage unit utilizing virtual reality and ergonomic framework for production optimization in manufacturing industry. Int. J. Interact. Des. Manuf. (2018). https://doi.org/10.1007/s12008-018-0501-9

    Article  Google Scholar 

  15. Sorell, T.: Online grooming and preventive justice. Crim. Law Philos. 11, 705 (2017). https://doi.org/10.1007/s11572-016-9401-x

    Article  Google Scholar 

  16. Kravets, E.: Cognitive activity efficiency factors during investigative actions, performed using information and communication technologies. In: Kravets, E., et al. (eds.) Communications in Computer and Information Science, Knowledge-Based Software Engineering: 11th Joint Conference, JCKBSE-2014, Volgograd, Russia, T. 466, pp. 585–592. 17–20 Sept 2014.

    Google Scholar 

  17. Husak, D.: Aspiration, execution, and controversy: reply to my critics. Criminal Law Philos. 12, 351 (2018). https://doi.org/10.1007/s11572-017-9446-5

    Article  Google Scholar 

  18. Marchetti, P., Siciliano, G., Ventoruzzo, M.: Correction to: dissenting directors. Eur. Bus. Org. Law Rev. 19, 215 (2018). https://doi.org/10.1007/s40804-018-0101-y

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Evgeny Kravets .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kravets, E., Birukov, S., Pavlik, M. (2019). Remote Investigative Actions as the Evidentiary Information Management System. In: Kravets, A. (eds) Big Data-driven World: Legislation Issues and Control Technologies. Studies in Systems, Decision and Control, vol 181. Springer, Cham. https://doi.org/10.1007/978-3-030-01358-5_9

Download citation

Publish with us

Policies and ethics