• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 57
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 72
  • 72
  • 29
  • 29
  • 27
  • 22
  • 21
  • 19
  • 19
  • 15
  • 15
  • 14
  • 14
  • 13
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Kartering van selfoontegnologie

Lochner, Hendrik Thomas 10 1900 (has links)
It is sincerely hoped that this work will motivate other researchers and in particular my colleagues to do further research in the field of cellphone technology, especially how it can be mapped to enable it to be utilised as evidence in our courts. This research aims to develop the mapping of cellphone technology as an aid in the investigation of crime. The mapping of cellphone technology refers to how cellphone technology can be utilised in crime investigation and in particular how a criminal can be placed at the scene of a crime, as a result of a cellphone call that was either made or received. To place the suspect at the scene of a crime as a result of a call made or received, cellphone records and technology of the relevant cellphone company, as well as present computer programmes can be utilised. Shortly, it can be said that a criminal can geographically be placed within a space some where on this earth. / Criminology / M.Tech. (Forensic Investigation)
62

Modus operandi as technique in suspect identification in burglary cases

Berning, J. M. S. P. 31 August 2008 (has links)
The research attempts to establish how modus operandi can be used to identify suspects in burglary cases. To conduct effective investigation, it is important for investigators to be familiar with the concept modus operandi, its elements, its influence and its values. To achieve the goals and objectives of the practice of modus operandi, investigators must know how to apply modus operandi, what the situational factors are during a criminal act, and how to use it as technique to identify suspects in burglary cases. The direction by implication and clarification of the crime situation is hardly possible without the determination of the identity of the perpetrator or suspect of a criminal act. The recognition of the modus operandi system as any form of evidence gathering is of outmost importance. / Criminology / M.Tech. (Forensic investigation)
63

The development of a criminological intervention model for the Rosslyn industrial environment in Tshwane, Gauteng, South Africa

Pretorius, William Lyon 02 1900 (has links)
The problem investigated in this research is the ongoing crime threat and the extreme risks which impact negatively on the sustainability of the Rosslyn Industry - the industrial hub of Tshwane in the Gauteng Provence of South Africa. Businesses in Rosslyn are desperate for a solution that will mitigate these crime threats and risks, and ensure the future sustainability of this important industrial community. An intervention model is urgently required to prevent this type of crime, not only as a short term solution but as a sustainable long term intervention. This research study initiated the collaboration required for the successful implementation of a Crime Prevention Intervention Model (CPIM) in the Rosslyn industrial environment. The intended crime prevention model has been designed in such a way that it addresses the entire environment of crime that prevails in the Rosslyn area involving both the offender and the victim. This design is rooted in the ontology of Environmental Criminology and more specific on the applied epistemology of Crime Prevention Through Environmental Design (CPTED). Participants in this project are representatives who are responsible for all security functions in both big businesses and small enterprises. And with their dedicated assistance the research findings disclosed the current crime status of the Rosslyn environment regarding the threat, risk, security vulnerabilities, controls and needs: • Crime and its causal factors, in Rosslyn, are rife and no noteworthy action has been implemented to mitigate these threats. • Collaboration between Rosslyn role players (neighbours, local government and law enforcement) is for all purposes non-existent. • And to complicate matters even more, knowledge of how to effectively mitigate crime is limited and handicapped by the re-active physical security methods currently being used. • The implication of these findings is that the status quo will eventually render business in Rosslyn unsustainable. Thus a CPIM in Rosslyn is inevitable. What was crucial to this research and to the CTPED design is the detailed sourcing of accurate data addressing the experiences and the needs the respondents identified in the current Rosslyn crime situation concerning; status, the threat, risk, security, vulnerabilities and controls. In order to achieve this level of data sourcing and assimilation, the essential features of the research method were based on a mixed approach where quantitative and qualitative methods were implemented in parallel. The diverse fields, sources and respondent mix required for a Rosslyn Industry CPIM also necessitated a MIT (Multi,-Inter,-Trans,-Disciplinary) approach. This MIT requirement is successfully facilitated through the applied criminological CPTED approach. The CPIM is based on the combined outcomes of the following three research fields: • Field-one: Environmental criminology theories are researched through an in-depth literature review to demonstrate the criminological grounding of crime prevention and to guide its application through the development of an applied CPTED SUITE. • Field-two: Supply Chain Security (SCS) are researched through an in-depth literature review to establish its criminological relevance and applications. SCS requirements are identified and built into the Field-Three research process and tested for relevance and for incorporation in the CPTED SUITE. • Field-three: Based on a mixed research process, using a custom designed Criminological Risk Analyses tool incorporating scheduled interviews and questionnaires, the crime and needs profile of the Rosslyn Industry are uncovered and analysed. The results are filtered through the CPTED SUITE to indicate the correct criminological approach for mitigating the identified problems and needs. Even though this study takes an applied crime preventative approach, the criminological-philosophical mould of crime prevention is imperative for the effective application of the CPTED. Security and crime prevention training, planning and application, without this approach will remain underdeveloped and outdated. Finally the underlying intention of this research is for this Crime Prevention Intervention Model (CPIM) to be adapted and implemented and to serve as a guide or a benchmark for security practitioners in any industrial environment that has the same crime threats and crime risk challenges. / Criminology and Security Science / D. Litt. et Phil. (Criminology)
64

Modus operandi as technique in suspect identification in burglary cases

Berning, J. M. S. P. 31 August 2008 (has links)
The research attempts to establish how modus operandi can be used to identify suspects in burglary cases. To conduct effective investigation, it is important for investigators to be familiar with the concept modus operandi, its elements, its influence and its values. To achieve the goals and objectives of the practice of modus operandi, investigators must know how to apply modus operandi, what the situational factors are during a criminal act, and how to use it as technique to identify suspects in burglary cases. The direction by implication and clarification of the crime situation is hardly possible without the determination of the identity of the perpetrator or suspect of a criminal act. The recognition of the modus operandi system as any form of evidence gathering is of outmost importance. / Criminology and Security Science / M.Tech. (Forensic investigation)
65

Kartering van selfoontegnologie

Lochner, Hendrik Thomas 10 1900 (has links)
It is sincerely hoped that this work will motivate other researchers and in particular my colleagues to do further research in the field of cellphone technology, especially how it can be mapped to enable it to be utilised as evidence in our courts. This research aims to develop the mapping of cellphone technology as an aid in the investigation of crime. The mapping of cellphone technology refers to how cellphone technology can be utilised in crime investigation and in particular how a criminal can be placed at the scene of a crime, as a result of a cellphone call that was either made or received. To place the suspect at the scene of a crime as a result of a call made or received, cellphone records and technology of the relevant cellphone company, as well as present computer programmes can be utilised. Shortly, it can be said that a criminal can geographically be placed within a space some where on this earth. / Criminology and Security Science / M.Tech. (Forensic Investigation)
66

The development of a criminological intervention model for the Rosslyn industrial environment in Tshwane, Gauteng, South Africa

Pretorius, William Lyon 02 1900 (has links)
The problem investigated in this research is the ongoing crime threat and the extreme risks which impact negatively on the sustainability of the Rosslyn Industry - the industrial hub of Tshwane in the Gauteng Provence of South Africa. Businesses in Rosslyn are desperate for a solution that will mitigate these crime threats and risks, and ensure the future sustainability of this important industrial community. An intervention model is urgently required to prevent this type of crime, not only as a short term solution but as a sustainable long term intervention. This research study initiated the collaboration required for the successful implementation of a Crime Prevention Intervention Model (CPIM) in the Rosslyn industrial environment. The intended crime prevention model has been designed in such a way that it addresses the entire environment of crime that prevails in the Rosslyn area involving both the offender and the victim. This design is rooted in the ontology of Environmental Criminology and more specific on the applied epistemology of Crime Prevention Through Environmental Design (CPTED). Participants in this project are representatives who are responsible for all security functions in both big businesses and small enterprises. And with their dedicated assistance the research findings disclosed the current crime status of the Rosslyn environment regarding the threat, risk, security vulnerabilities, controls and needs: • Crime and its causal factors, in Rosslyn, are rife and no noteworthy action has been implemented to mitigate these threats. • Collaboration between Rosslyn role players (neighbours, local government and law enforcement) is for all purposes non-existent. • And to complicate matters even more, knowledge of how to effectively mitigate crime is limited and handicapped by the re-active physical security methods currently being used. • The implication of these findings is that the status quo will eventually render business in Rosslyn unsustainable. Thus a CPIM in Rosslyn is inevitable. What was crucial to this research and to the CTPED design is the detailed sourcing of accurate data addressing the experiences and the needs the respondents identified in the current Rosslyn crime situation concerning; status, the threat, risk, security, vulnerabilities and controls. In order to achieve this level of data sourcing and assimilation, the essential features of the research method were based on a mixed approach where quantitative and qualitative methods were implemented in parallel. The diverse fields, sources and respondent mix required for a Rosslyn Industry CPIM also necessitated a MIT (Multi,-Inter,-Trans,-Disciplinary) approach. This MIT requirement is successfully facilitated through the applied criminological CPTED approach. The CPIM is based on the combined outcomes of the following three research fields: • Field-one: Environmental criminology theories are researched through an in-depth literature review to demonstrate the criminological grounding of crime prevention and to guide its application through the development of an applied CPTED SUITE. • Field-two: Supply Chain Security (SCS) are researched through an in-depth literature review to establish its criminological relevance and applications. SCS requirements are identified and built into the Field-Three research process and tested for relevance and for incorporation in the CPTED SUITE. • Field-three: Based on a mixed research process, using a custom designed Criminological Risk Analyses tool incorporating scheduled interviews and questionnaires, the crime and needs profile of the Rosslyn Industry are uncovered and analysed. The results are filtered through the CPTED SUITE to indicate the correct criminological approach for mitigating the identified problems and needs. Even though this study takes an applied crime preventative approach, the criminological-philosophical mould of crime prevention is imperative for the effective application of the CPTED. Security and crime prevention training, planning and application, without this approach will remain underdeveloped and outdated. Finally the underlying intention of this research is for this Crime Prevention Intervention Model (CPIM) to be adapted and implemented and to serve as a guide or a benchmark for security practitioners in any industrial environment that has the same crime threats and crime risk challenges. / Criminology and Security Science / D. Litt. et Phil. (Criminology)
67

Motiewe vir die pleging van bedrog; kriminologiese studie aan die hand van die misdaadgebeurtenismodel

Lambrechts, Gideon Albertus Jacobus 30 April 2005 (has links)
Text in Afrikaans / Fraud is a worldwide phenomenon that is on the increase and a reason for serious concern. It is a priority crime in South Africa with serious implications both financial and socially. Fraud costs this country R150 milliard, almost three times the cost of the controversial weapon transaction. This was the goals of the researcher to determine what motivates the offender to commit fraud and how can fraud be explained in this study. A qualitative approach was followed due to the qualitative nature of the concept motivation. This resulted in a two-phase approach namely a documentary study, which was followed by interviews with experts in the field of fraud. Ten pre-sentence court reports of fraudsters were studied where after the outcome was discussed with these experts. The criminal event model served as framework for this study. Strain was incorporated as an additional component in the explanation of fraud. / Criminology / M. A. (Criminology)
68

The nature and extent of problems experienced by detectives in the collection, processing and utilisation of crime information at the Rustenburg detective service

Govender, Doraval 31 May 2008 (has links)
This research is concerned with the nature and extent of problems experienced by detectives in the collection, processing and utilisation of crime information for the investigation of crime. The problems gave rise to poor detective performance. The development of information-led policing offers an alternative to the traditional ”reactive” model of investigation of crime. Information-led policing advocates the targeting, gathering, analysis and dissemination of information which is used to inform decisions about the prioritisation of problems and allocation of resources to address the problems (Cope, as quoted by Alison, 2005:93). The purpose of this study is to determine the strengths and weaknesses in the collection, processing and utilisation of crime information at the Rustenburg Detective Service, to find new knowledge that can improve the situation, and to apply the found knowledge to enhance the performance of detectives. / Criminology / M.Tech. (Forensic Investigation)
69

The criminal career of armed robbers with specific reference to cash-in-transit robberies

Thobane, Mahlogonolo Stephina 06 1900 (has links)
Criminal career research postulates that offending behaviour develops over time during the course of one’s life. Thus, delinquency is not an isolated incident which occurs at a certain moment in time. This research comprises a mixed-method study of the criminal career of 40 offenders who perpetrated robberies against the banking and CIT industries. Through this research, an exploration is made for possibilities of using criminal career research to develop results which will guide crime prevention policies. The qualitative methodology used for this research included semi-structured interviews in order to collect information on motivations of armed robbers and the various mechanics (i.e. planning, recruitment, group dynamics) of the crime of armed robbery. Through the use of structured questionnaires, biographical data, information on risk factors and figures on the different aspects of a criminal career, such as age of offending onset, offending frequency and seriousness, and career length, were all gathered. The general findings of this research demonstrate that offending onset occurs between the ages of 11 and 15 with petty crimes, and then escalates to serious crimes. Secondly, witnessed throughout the dissertation is the fact that development of delinquent behaviour is not a result of a single risk factor but an outcome of multiple risk factors. Subsequently, a suggestion is made for the introduction of multifaceted deterrence programmes, which will holistically deal with the various offending risk factors (i.e. family, community and the offender’s personal risk factors as well as peer and school dynamics). Thirdly, armed robbers are responsible for various other crimes in the process of committing the offence of robbery. Accordingly, this study confirms the criminal career notion that a small number of chronic offenders are responsible for a large number of offences. That is why it is recommended that policy makers pay attention to disrupting the criminal career of this small number of high risk offenders. / Department of Criminology and Security Science / M.A. (Criminology)
70

Motiewe vir die pleging van bedrog; kriminologiese studie aan die hand van die misdaadgebeurtenismodel

Lambrechts, Gideon Albertus Jacobus 30 April 2005 (has links)
Text in Afrikaans / Fraud is a worldwide phenomenon that is on the increase and a reason for serious concern. It is a priority crime in South Africa with serious implications both financial and socially. Fraud costs this country R150 milliard, almost three times the cost of the controversial weapon transaction. This was the goals of the researcher to determine what motivates the offender to commit fraud and how can fraud be explained in this study. A qualitative approach was followed due to the qualitative nature of the concept motivation. This resulted in a two-phase approach namely a documentary study, which was followed by interviews with experts in the field of fraud. Ten pre-sentence court reports of fraudsters were studied where after the outcome was discussed with these experts. The criminal event model served as framework for this study. Strain was incorporated as an additional component in the explanation of fraud. / Criminology and Security Science / M. A. (Criminology)

Page generated in 0.0699 seconds