• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • Tagged with
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A comparative exploratory analysis of vigilante occurrences in two communities in Port Elizabeth (Kwazakhele and New Brighton)

Loqani, Anelisa January 2015 (has links)
The study explores and compares the incidents of vigilantism in two selected communities in Port Elizabeth. However, the word ‘vigilantism’ as utilized in the study can be explained as the group of people in a community who take the law into their own hands and punish alleged societal offenders on the spot. Vigilante activities have become a regular occurrence in many communities in Port Elizabeth and in South Africa as whole. This phenomenon as reported by several authors has destroyed many young men’s lives and ambitions. This is a paradoxical situation that violates human rights because South Africa is a country with a Constitution that prioritizes human dignity for all, and citizens that are totally free from violence of any kind. The aim of the study is to explore, analyze and compare the incidents of vigilantism in New Brighton and Kwazakhele communities in Port Elizabeth. The intention is to educate and enlighten the members of the selected communities, together with the public about vigilantism and its impact on communities.
2

The crime threat analysis process, an assessment

Krause, André 30 November 2007 (has links)
The study investigated the application of the crime threat analysis process at station level within the Nelson Mandela Metro City area with the objective of determining inhibiting factors (constraints) and best practices. Qualitative research methodology was applied and interviews were conducted with crime analysts and specialised investigators/intelligence analysts. The research design can be best described as descriptive and explorative in nature. The crime threat analysis process embroils the application of various crime analysis techniques and the outcomes thereof intends to have a dual purpose of generating operational crime management information in assisting crime prevention initiatives and crime detection efforts, mainly focussing on the criminal activities of group offenders (organised crime related), repeat offenders and serial offenders. During the study it became evident that crime analysts understand and thus apply the crime threat analysis process indifferently, which impeded on the relevancy and the utilisation thereof as an effective crime management tool. / Criminology / M.Tech. (Policing)
3

The crime threat analysis process, an assessment

Krause, André 30 November 2007 (has links)
The study investigated the application of the crime threat analysis process at station level within the Nelson Mandela Metro City area with the objective of determining inhibiting factors (constraints) and best practices. Qualitative research methodology was applied and interviews were conducted with crime analysts and specialised investigators/intelligence analysts. The research design can be best described as descriptive and explorative in nature. The crime threat analysis process embroils the application of various crime analysis techniques and the outcomes thereof intends to have a dual purpose of generating operational crime management information in assisting crime prevention initiatives and crime detection efforts, mainly focussing on the criminal activities of group offenders (organised crime related), repeat offenders and serial offenders. During the study it became evident that crime analysts understand and thus apply the crime threat analysis process indifferently, which impeded on the relevancy and the utilisation thereof as an effective crime management tool. / Criminology and Security Science / M.Tech. (Policing)

Page generated in 0.1001 seconds