Skip to main content

Part of the book series: Studies in Computational Intelligence ((SCI,volume 826))

Abstract

This chapter is devoted to the study of the main lines of IT development in criminal procedure. The purpose of the study is to reveal possible threats to traditional values, as well as to show to what extent information technologies can change the current system of the criminal proceeding. The chapter applies a method of system and complex analysis as well as comparative-law one.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kerr, O. (2005). Digital evidence and the new criminal procedure. Columbia Law Review, 105(1), 279–318.

    MathSciNet  Google Scholar 

  2. Momsen, C. (2013). Digital Beweismittel im Strafprozess. URL: https://www.strafverteidigervereinigungen.org/Material/Themen/Technik%20&%20Ueberwachung/37_momsen.html. Accessed date: 16 July, 2018.

  3. McKechnie, D. (2003). The use of the internet by courts and the judiciary: Findings from a study trip and supplementary research. International Journal of Law and Information Technology, 11(2), 109–148.

    Article  Google Scholar 

  4. Brazell, L. (2018). Electronic signatures and identities: law and regulation. Sweet & Maxwell. URL: http://www.sweetandmaxwell.co.uk/Catalogue/ProductDetails.aspx?productid=730207&recordid=7564.

  5. Shah, M.S.M.B., Saleem, Sh., & Zulqarnain, R. (2017). Protecting digital evidence integrity and preserving chain of custody. Journal of Digital Forensics, Security and Law, 12(2), Article 12.

    Google Scholar 

  6. Chang, R. (2010). Why the plain view should not apple to digital evidence? Journal of Trial and Appellate Advocacy, 12, 31–67.

    Google Scholar 

  7. Sinn, A. (2013). Cybercrime im Rechtsvergleich: Beiträge zum deutsch-japanisch-koreanischen Strafrechtssymposium. Osnabruck.

    Google Scholar 

  8. Micheal, K. Y. (2018). Digital privacy and virtues of multilateral digital constitutionalism–preliminary thoughts. International Journal of Law and Information Technology, 25(2), 115–138.

    Article  Google Scholar 

  9. Sullivan, C. (2012). Digital identity and mistake. International Journal of Law and Information Technology, 20(3), 223–241.

    Article  Google Scholar 

  10. E-justice—Electronic proceedings, study on mutual recognition of e-signatures: Update of country profiles. Belgian country profile. URL: http://ec.europa.eu/idabc/servlets/Doc3443.pdf?id=32321.

  11. Reed, C., Sathyanarayan, U., Ruan, S., & Collins, J. (2018). Beyond BitCoin—Legal impurities and off-chain assets. International Journal of Law and Information Technology, 26(2), 160–182.

    Article  Google Scholar 

  12. Cuccuru, P. (2017). Beyond bitcoin: An early overview on smart contracts. International Journal of Law and Information Technology, 25(3), 179–195.

    Article  Google Scholar 

  13. Brownsword, R. (2016). Logical management and the rule of law. Law, Innovation and Technology, 8, 100–140.

    Article  Google Scholar 

  14. Narayanan, A., & Bennun, M. (1998). Law, computer science, and artificial intelligence. Intellect Books.

    Google Scholar 

  15. Potas, I., Ash, D., Sagi, M., Cumines, S., & Marsic, N. (1998). Informing the discretion: The sentencing information system of the judicial commission of New South Wales. International Journal of Law and Information Technology, 6(2), 99–124.

    Article  Google Scholar 

  16. Hoeren, T. (2017). Big data and the legal framework for data quality. International Journal of Law and Information Technology, 25(1), 26–37.

    Google Scholar 

  17. Ulasovich, K. (2018). Avatar interviewed witnesses more efficiently than a real person. URL: https://nplus1.ru/news/2018/05/16/avatar-police.

  18. Doldi, M. (2018). The responsible use of technological power. Digital Evidence and Electronic Signature Law Review, 15. URL: http://journals.sas.ac.uk/deeslr/article/view/4889/4840.

  19. Martino, A. (1994). Artificial intelligence and law. International Journal of Law and Information Technology, 2(2), 154–193.

    Article  MathSciNet  Google Scholar 

  20. Weitzenboeck, E. (2001). Electronic agents and the formation of contracts. International Journal of Law and Information Technology, 9(3), 204–234.

    Article  Google Scholar 

  21. European Parliament Resolution dated February 16, 2017 with recommendations to the Commission on Civil Law Rules on Robotics, 2015/2103(INL). In: European Parliament. URL: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+TA+P8-TA-2017-0051+0+DOC+XML+V0//EN.

  22. Krausová, A. (2017). Intersections between law and artificial intelligence. International Journal of Computer, 27(1), 55–68.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sergey V. Zuev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zuev, S.V. (2019). Traditional Values of Criminal Procedure in Terms of IT Development. In: Popkova, E. (eds) Ubiquitous Computing and the Internet of Things: Prerequisites for the Development of ICT. Studies in Computational Intelligence, vol 826. Springer, Cham. https://doi.org/10.1007/978-3-030-13397-9_49

Download citation

Publish with us

Policies and ethics