• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 40
  • 5
  • 2
  • 1
  • Tagged with
  • 48
  • 48
  • 18
  • 18
  • 17
  • 16
  • 15
  • 14
  • 14
  • 13
  • 11
  • 11
  • 10
  • 9
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Investigation of misrepresentation in tender documents

Mynhardt, Armand Johann 11 1900 (has links)
Construction companies, in particular, abuse the objectives of BEE in order to secure multimillion-rand contracts. Misrepresentations, specifically to the Department of Public Works, are made in various forms and stages during the submission of tender documentation by contractors. The status of BEE company owners is abused in order to secure contracts. Apartheid in South Africa prevented black citizens from entering the corporate world and thereby attaining a quality education. The South African government has, since 1994, adopted the BEE policy in order to redress racial and economic imbalances of the past. Fronting (which is regarded as fraud) is detrimental to the objectives of BEE, which are governed by legislation. Fronting further negatively affects the transformation of the South African economy which could be globally competitive. Fraud detection and its investigation are two concepts which are closely linked to each other and are vitally important to any fraud investi-gator. / Police Practice / M. Tech. (Forensic Investigation)
42

A historical-legal analysis of search and seizure of electronic records for the prosecution of financial crimes in South Africa

Poyo, Unathi 30 September 2020 (has links)
Crime has been around since the beginning of time. In an evolving society, and the methodology of crime also changes. The methodology of combating and preventing crime should aim to match the speed at which crime occurs. Criminal procedure deals with the powers of the police to investigate crimes.1 The Criminal Procedure Act 51 of 1977 (CPA) contains the principles of search and seizure in chapter 2. The promulgation of the CPA was during a period where the computer was a new phenomenon. At this time, it was inconceivable that technology would ever advance and become so ubiquitous, to the point that technology would infiltrate every aspect of our lives, and laws. There has since been many developments in our law, especially a new Constitutional dispensation.2 There have been developments and technological advancements that have had a direct and indirect bearing on the CPA. People use technology to communicate, transact, and unfortunately, to commit crime. These developments require there to be amendments in the CPA. There has been no specific amendments relating to search and seizure which are of significance in addressing technological advances. It is recommended that the amendments to the CPA include definitions and guidelines for procedural aspects of collection of electronic evidence. / Criminal and Procedural Law / LL. M. (Criminal and Procedural Law)
43

Motiewe vir die pleging van bedrog; kriminologiese studie aan die hand van die misdaadgebeurtenismodel

Lambrechts, Gideon Albertus Jacobus 30 April 2005 (has links)
Text in Afrikaans / Fraud is a worldwide phenomenon that is on the increase and a reason for serious concern. It is a priority crime in South Africa with serious implications both financial and socially. Fraud costs this country R150 milliard, almost three times the cost of the controversial weapon transaction. This was the goals of the researcher to determine what motivates the offender to commit fraud and how can fraud be explained in this study. A qualitative approach was followed due to the qualitative nature of the concept motivation. This resulted in a two-phase approach namely a documentary study, which was followed by interviews with experts in the field of fraud. Ten pre-sentence court reports of fraudsters were studied where after the outcome was discussed with these experts. The criminal event model served as framework for this study. Strain was incorporated as an additional component in the explanation of fraud. / Criminology / M. A. (Criminology)
44

The Net Worth method as technique to quantify income during investigation of financial crime

Botha, Andre Eduan 11 1900 (has links)
It is a well-known fact that criminals derive an income from their illegal activities, live lavish lifestyles, flaunt their wealth for all to see and acquire luxury goods. It is also a well known fact that criminals living from the proceeds of crime do not want to not want to keep financial records of their transactions or illegitimate business for fear of being detected by the authorities and to escape being taxed. It is also a known fact that criminals do not declare income from criminal activities for income tax purposes to the revenue authorities for fear of the illegal origin of the income being made known to the investigating authorities and law enforcement. During the investigation of financial crimes, such as tax evasion and money laundering, it may be required that the amount or value of money, income or assets accrued by a subject is determined in order to determine for instance their liability to pay tax. This research project examines the Net Worth method as an indirect method to circumstantially quantify income during the investigation of financial crime. / Police Practice / M.Tech. (Forensic Investigation)
45

Motiewe vir die pleging van bedrog; kriminologiese studie aan die hand van die misdaadgebeurtenismodel

Lambrechts, Gideon Albertus Jacobus 30 April 2005 (has links)
Text in Afrikaans / Fraud is a worldwide phenomenon that is on the increase and a reason for serious concern. It is a priority crime in South Africa with serious implications both financial and socially. Fraud costs this country R150 milliard, almost three times the cost of the controversial weapon transaction. This was the goals of the researcher to determine what motivates the offender to commit fraud and how can fraud be explained in this study. A qualitative approach was followed due to the qualitative nature of the concept motivation. This resulted in a two-phase approach namely a documentary study, which was followed by interviews with experts in the field of fraud. Ten pre-sentence court reports of fraudsters were studied where after the outcome was discussed with these experts. The criminal event model served as framework for this study. Strain was incorporated as an additional component in the explanation of fraud. / Criminology and Security Science / M. A. (Criminology)
46

The Net Worth method as technique to quantify income during investigation of financial crime

Botha, Andre Eduan 11 1900 (has links)
It is a well-known fact that criminals derive an income from their illegal activities, live lavish lifestyles, flaunt their wealth for all to see and acquire luxury goods. It is also a well known fact that criminals living from the proceeds of crime do not want to not want to keep financial records of their transactions or illegitimate business for fear of being detected by the authorities and to escape being taxed. It is also a known fact that criminals do not declare income from criminal activities for income tax purposes to the revenue authorities for fear of the illegal origin of the income being made known to the investigating authorities and law enforcement. During the investigation of financial crimes, such as tax evasion and money laundering, it may be required that the amount or value of money, income or assets accrued by a subject is determined in order to determine for instance their liability to pay tax. This research project examines the Net Worth method as an indirect method to circumstantially quantify income during the investigation of financial crime. / Police Practice / M.Tech. (Forensic Investigation)
47

Examining compliance procedures in the investigation of tender irregularities

Mahlangu, Glenda Safedi 05 1900 (has links)
This study examined the investigation of tender irregularities within the City of Tshwane Metropolitan Municipality (CoT) and employed semi-structured interviews with investigators attached to the CoT Group Audit and Risk (GAR) Division within the Protection Service to obtain data. A literature study relating to aspects of tender irregularities and the investigation of non-compliance was conducted. From the results of this research, it appears that participants do not optimally investigate the non-compliance of tender procedures by service providers to reduce tender irregularities within the CoT. However, it is apparent that participants experience challenges to efficiently investigate the non-compliance of tender procedures by service providers within the CoT to reduce tender irregularities. The study makes recommendations that could assist investigators at the CoT GAR Division to enhance their investigations of the non-compliance of tender procedures by service providers. / Criminology and Security Science / M. Tech. (Forensic Investigation)
48

A critical analysis of the policing of counterfeit goods in South Africa

Thenga, Godfrey 10 1900 (has links)
The researcher conducted a critical analysis of the policing of counterfeit crime in South Africa. A pure qualitative research design and approach was adopted. A literature review, interviews and observations were conducted to provide an overview of this problem nationally and internationally. Interview schedules were designed with pre-determined open-ended questions, which allowed participants to explain their perceptions, opinions and viewpoints on the policing of counterfeit in South Africa. Some of the designed questions were mailed to respondents. Questions were posed to members of the Specialised Commercial Crime Unit, members of the South African Police Service’s Crime Prevention Unit, members of the Department of Trade and Industry who deal with counterfeit, prosecutors who normally prosecute counterfeit cases, brand owners/holders/representatives, and attorneys who assist in the policing of counterfeit crime. The findings of this study informed the proposed recommendations for preventative and reactive response mechanisms. These proposed recommendations suggest ways of improving efficiency and effectiveness in policing counterfeit in South Africa. / Criminology and Security Science / Ph. D. (Criminal Justice)

Page generated in 0.075 seconds