FEATURES OF THE FORENSIC METHODOLOGY FOR INVESTIGATING CRIMINAL ATTACKS AGAINST THE PERSON COMMITTED USING INFORMATION AND TELECOMMUNICATION NETWORKS

Author:

Vostrikov Gleb A.1

Affiliation:

1. Middle Volga Institute (branch) of the All-Russian State University of Justice (RPA of the Ministry of Justice of Russia) in Saransk

Abstract

The development of information and telecommunication networks, in addition to the ease with which data are transmitted, provides criminals with an effective tool that can enhance the guarantees of achieving their goals. In addition to increasing the social danger of the crimes in which this tool is used, another effect is achieved, which is to make it difficult to investigate. This creates problems in establishing the truth. The purpose of the study is to determine the type of forensic methodology, the application of which is able to optimize the investigation of each specific criminal assault on a person committed using information and telecommunication networks. Materials and Methods. The objective was achieved through the application of methods such as analysis, synthesis, deduction, induction, modelling (general science), as well as systems and forensic sitology (forensic). Results. The study identified problems that arise in the practice of investigating criminal attacks against persons committed using information and telecommunication networks. Funding was analyzed for their resolution. It has been established that the forensic methodology for its effectiveness should be based on typical knowledge of the use of information and telecommunication networks in these crimes. This should be a comprehensive investigative technique. Conclusions. Comprehensive methods of investigation of criminal attacks against the person committed with the use of information. The telecommunications network makes it possible at an early stage to avoid errors and to ensure that the circumstances most relevant to a fair trial are established.

Publisher

I.N. Ulianov Chuvash State University

Subject

Pharmacology (medical),Complementary and alternative medicine,Pharmaceutical Science

Reference9 articles.

1. Artyushina O.V. Nasil’stvennaya prestupnost’ i IT-tekhnologii [Violent crime and it technologies]. Lex Russica, 2019, no. 9(154), pp. 77–84.

2. Gracheva Yu.V. Tsifrovye tekhnologii i bezopasnost’ lichnosti [Digital technologies and personal security]. Kriminalist“, 2019, no. 1(26), pp. 24–27.

3. Zemtsova S.I. Kriminalisticheskie metodiki rassledovaniya prestuplenii: ponyatie, klassifikatsiya i perspektivnye napravleniya razvitiya [Forensic techniques of crime investigation: concept, classification and perspective directions of development]. Kriminalistika: vchera, segodnya, zavtra, 2019, no. 1(9), pp. 27–39.

4. Podol’nyi N.A. Operezhayushchaya chastnaya metodika rassledovaniya prestuplenii [Anticipatory private methods of investigating crimes]. Rossiiskii sledovatel’, 2011, no. 14, pp. 5–8.

5. Podol’nyi N.A. Osobennosti i znachenie uzkospetsializirovannoi kriminalisticheskoi metodiki rassledovaniya prestuplenii [Features and significance of highly specialized forensic methods of investigating crimes]. In: Kazanskie ugolovno-protsessual’nye i kriminalisticheskie chteniya: materialy Mezhdunar. nauch.-prakt. konf.: v 2 ch. [Proc. of Int. Sci. and Pract. Conf. «Kazan Criminal Procedure and Forensic Readings». 2 parts]. Kazan, YurEksPraktik Publ., 2022, part 1, pp. 41–48.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3