Financing and Oversight of the Application of Invasive Measures for the Purpose of Security and Defense

Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 76 (1):601-614 (2023)
  Copy   BIBTEX

Abstract

Invasive measures, as special investigative measures are defined, are ante delictum measures. They are applied only in situations in which the evidence cannot be obtained by conventional methods, and are needed for the smooth conduct of criminal proceedings. The financial means for the application of these invasive measures for the needs of defence and security are allocated with a budget by the legislative authority. The main hypothesis of this paper states that: supervision over the application and financing of the implementation of special investigative measures has a positive impact / or is in direct correlation with the effective construction/development and functioning of the security-defence system, especially from the aspect of the principles of: good governance, transparency, accountability, proportionality, and efficient application of financial resources. Starting from the indicated hypothesis, the research in the paper is based on two variables: independent variable, i.e., the supervision over the application and financing of the implementation of the special investigative measures, and a dependent variable, i.e., the effective development and proper and efficient functioning of the security-defence system. From a methodological point of view, the paper uses a combined approach of qualitative and quantitative analysis, through research, measurement, and comparison of: adopted international standards regarding the application of special investigative measures, the regulations in the Macedonian normative framework, the content of the instructions and the implementation manuals of the special investigative measures by the relevant institutions in the Macedonian society.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,283

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Unhealthy Health Care Costs.J. K. Shelton & J. M. Janosi - 1992 - Journal of Medicine and Philosophy 17 (1):7-19.
Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
Political hermeneutics.Joy Gordon - 2015 - Philosophy and Social Criticism 41 (8):751-770.
Administrative and legal status of the national security and defence council of Ukraine as a subject of information security of the state.Anastasiia Dashkovska - 2022 - Философия И Гуманитарные Науки В Информационном Обществе 12 (3):86-96.
Does religiosity affect financing activity? Evidence from Indonesia.Ibrahim Fatwa Wijaya, Andrea Moro & Yacine Belghitar - 2023 - Business Ethics, the Environment and Responsibility 32 (2):670-697.
Diversification and energy security risks: the Japanese case.S. Hayden Lesbirel - 2004 - Japanese Journal of Political Science 5 (1):1-22.
Measures of Consciousness.Elizabeth Irvine - 2013 - Philosophy Compass 8 (3):285-297.

Analytics

Added to PP
2024-03-13

Downloads
2 (#1,808,473)

6 months
2 (#1,206,195)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references