• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 84
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 93
  • 93
  • 93
  • 25
  • 20
  • 20
  • 19
  • 19
  • 15
  • 14
  • 13
  • 13
  • 12
  • 11
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

The best practices applied by forensic investigators in conducting lifestyle audits on white collar crime suspects

Gillespie, Roy Tamejen 05 1900 (has links)
This research looks at the best practices applied by forensic investigators in conducting lifestyle audits on white collar crime suspects. The researcher explored, firstly, how a lifestyle audit relates to white collar crime investigations; secondly, the best practices in performing lifestyle audits on white collar crime suspects, and lastly, the various sources of information available to forensic investigators when conducting a lifestyle audit of a white collar crime suspect. As lifestyle audits will serve as an investigative tool in future forensic investigations into white collar crime, this study’s aim was to understand and create an awareness of the current best practices applied by forensic investigators within private sector forensic investigation practices while conducting lifestyle audits during white collar crime investigations. It also makes available research data regarding the concept of lifestyle audits in white collar crime investigations, the implementation of these audits, the benefits, and the best practices of these audits. The general purpose of this study was to provide practical recommendations on the best practices for lifestyle audits for forensic investigators within private sector. / Criminology / M. Tech. (Forensic Investigation)
72

Management of security information in the security industry

Govender, Doraval 06 1900 (has links)
Incidents, threats and vulnerabilities have the potential to negatively affect an organisation’s assets. Information on these incidents, threats and vulnerabilities are important to security. It is therefore necessary for this security information to be effectively and efficiently managed, so that correct decisions may be made on the implementation of security risk control measures. This study explored the management of security information in the security industry by undertaking the following: • establishing the “status quo” of the collection and analysis of security information and the implementation of security risk control measures in practice; • identifying the nature and extent of problems experienced in the collection and analysis of security information and the implementation of security risk control measures; and the • discovery of a new Security Information Management Model (SIMM). Mixed methods research was used to study the management of security information in the security industry. The explorative research design was used for this purpose. Semi-structured and focus group interviews were conducted with senior security managers and operational security officers, respectively. The grounded theory research design was used to analyse the qualitative data in order to generate a substantive grounded theory. The theory is that security officers operate without a standardised framework to manage security information. The data from the semi-structured and the focus group interviews were used to design a questionnaire to conduct a survey using the quantitative approach. The non-experimental research design was used to conduct this self-administered questionnaire survey. The data from this questionnaire survey helped validate and confirm the substantive grounded theory. The study found that there was the need for a Security Information Management Model to manage security information in the security industry. Based on this finding the researcher recommended a new Security Information Management Model for the management of security information in the security industry. / Criminology / D. Litt. et Phil. (Criminology)
73

Exploring resilience among female sex workers in Johannesburg

Mamabolo, Lawrence Lekau 02 1900 (has links)
Sex work is a highly debatable subject in the field of psychology but little has been said about sex work and resilience. Challenges associated with criminalisation of sex work are rife but sex work continues to exist. This study explored the ability of heterosexual street based female sex workers (FSW) to ‘bounce back’ from challenges they face. The study employed qualitative paradigm and a transcendental phenomenological design was used. Snowballing sampling was used to select twelve FSW who participated in semi structured interview. Thematic analysis was used to extract recurrent themes across participants. Participants reported being victimised and physically and verbally abused by clients and the public. FSW showed their resilience by rationalising their role with having a purpose in working as FSW, obligation as bread winners and regarding sex work as legitimate work. They adopted psychological survival techniques and used various safety techniques to cope. The results emphasised importance of employing resilience and strength based approaches in researching and developing training and psychological programmes for sex workers. / Psychology / M.A. (Psychology)
74

The best practices applied by forensic investigators in conducting lifestyle audits on white collar crime suspects

Gillespie, Roy Tamejen 05 1900 (has links)
This research looks at the best practices applied by forensic investigators in conducting lifestyle audits on white collar crime suspects. The researcher explored, firstly, how a lifestyle audit relates to white collar crime investigations; secondly, the best practices in performing lifestyle audits on white collar crime suspects, and lastly, the various sources of information available to forensic investigators when conducting a lifestyle audit of a white collar crime suspect. As lifestyle audits will serve as an investigative tool in future forensic investigations into white collar crime, this study’s aim was to understand and create an awareness of the current best practices applied by forensic investigators within private sector forensic investigation practices while conducting lifestyle audits during white collar crime investigations. It also makes available research data regarding the concept of lifestyle audits in white collar crime investigations, the implementation of these audits, the benefits, and the best practices of these audits. The general purpose of this study was to provide practical recommendations on the best practices for lifestyle audits for forensic investigators within private sector. / Criminology and Security Science / M. Tech. (Forensic Investigation)
75

Management of security information in the security industry

Govender, Doraval 06 1900 (has links)
Incidents, threats and vulnerabilities have the potential to negatively affect an organisation’s assets. Information on these incidents, threats and vulnerabilities are important to security. It is therefore necessary for this security information to be effectively and efficiently managed, so that correct decisions may be made on the implementation of security risk control measures. This study explored the management of security information in the security industry by undertaking the following: • establishing the “status quo” of the collection and analysis of security information and the implementation of security risk control measures in practice; • identifying the nature and extent of problems experienced in the collection and analysis of security information and the implementation of security risk control measures; and the • discovery of a new Security Information Management Model (SIMM). Mixed methods research was used to study the management of security information in the security industry. The explorative research design was used for this purpose. Semi-structured and focus group interviews were conducted with senior security managers and operational security officers, respectively. The grounded theory research design was used to analyse the qualitative data in order to generate a substantive grounded theory. The theory is that security officers operate without a standardised framework to manage security information. The data from the semi-structured and the focus group interviews were used to design a questionnaire to conduct a survey using the quantitative approach. The non-experimental research design was used to conduct this self-administered questionnaire survey. The data from this questionnaire survey helped validate and confirm the substantive grounded theory. The study found that there was the need for a Security Information Management Model to manage security information in the security industry. Based on this finding the researcher recommended a new Security Information Management Model for the management of security information in the security industry. / Criminology and Security Science / D. Litt. et Phil. (Criminology)
76

Predictive policing : a comparative study of three hotspot mapping techniques

Vavra, Zachary Thomas 21 April 2015 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Law enforcement agencies across the U.S. use maps of crime to inform their practice and make efforts to reduce crime. Hotspot maps using historic crime data can show practitioners concentrated areas of criminal offenses and the types of offenses that have occurred; however, not all of these hotspot crime mapping techniques produce the same results. This study compares three hotspot crime mapping techniques and four crime types using the Predictive Accuracy Index (PAI) to measure the predictive accuracy of these mapping techniques in Marion County, Indiana. Results show that the grid hotspot mapping technique and crimes of robbery are most predictive. Understanding the most effective crime mapping technique will allow law enforcement to better predict and therefore prevent crimes.
77

Modus operandi as technique in suspect identification in burglary cases

Berning, J. M. S. P. 31 August 2008 (has links)
The research attempts to establish how modus operandi can be used to identify suspects in burglary cases. To conduct effective investigation, it is important for investigators to be familiar with the concept modus operandi, its elements, its influence and its values. To achieve the goals and objectives of the practice of modus operandi, investigators must know how to apply modus operandi, what the situational factors are during a criminal act, and how to use it as technique to identify suspects in burglary cases. The direction by implication and clarification of the crime situation is hardly possible without the determination of the identity of the perpetrator or suspect of a criminal act. The recognition of the modus operandi system as any form of evidence gathering is of outmost importance. / Criminology / M.Tech. (Forensic investigation)
78

The value of investigative profiling of fraud offenders by forensic investigators

Sivnarain, Ranesh 10 1900 (has links)
The problem that the researcher encountered was that forensic investigators were found not to be formally using offender profiling as an investigative technique during investigations into fraud. This research was conducted to ascertain how offender profiling may be useful in expediting the forensic investigation process. The purpose of this research was to establish what offender profiling is, and what aspects or ingredients constitute such an offender profile. As offender profiles will serve as an aid in future forensic investigations into fraud, this study attempted to create an understanding and awareness of the value of offender profiling. In order for forensic investigators to use offender profiling during routine fraud investigations, it is extremely important that they understand the concept and its practical implementation. The overall purpose of this study is to provide practical recommendations for the implementation and use of offender profiling to forensic investigators both in the public and private sectors. / Criminal and Procedural Law / (M.Tech. (Forensic Investigation))
79

Penological investigation of the offender rehabilitation path

Fitz, Lincoln Gustav 12 1900 (has links)
The thesis examine the process of rehabilitation offered by the Department of Correctional Service as from the time the offender is admitted (sentenced) until such time he is released back into society. Rehabilitation in the departmental context is based on four key delivery areas, which must be in place to ensure that offenders are rehabilitated. Faced with several challenges, e.g. demilitarization, structural defects of the facilities that are not conducive for rehabilitation or build for Unit management principles, career path developed for officials, and the transformation of the old penitentiary system to the new generation prison system, the department failed to achieve their objectives. The thesis will examine the current process of rehabilitation in the Department of Correctional Service, and identify areas of under performance to seek best practices to improve service delivery. The study will also focus on the readiness of offenders to be release as rehabilitated offenders and the After Care the Department provide to offenders upon their release. / Corrections Management / MA (Correctional Management)
80

The value of modus operandi in investigating child support grant fraud

Thenga, Godfrey 11 1900 (has links)
While establishing modus operandi information is an investigative technique that is used globally in the investigation of fraud, investigators of child support grant fraud in South Africa do not properly use this technique in their investigation. The study sought to examine the modus operandi used by civil servants in unduly accessing child support grand fraud. The study adopted a qualitative approach, with structured interviews and literature as data-collection methods. Two sample groups were used to gather data. The data was analysed using spiral method. The study found that modus operandi as a valuable investigation tool was not properly used and in other instances was never used in the investigations. On the basis of the findings, it is recommended that modus operandi captured on the police and corporate database systems be used as reference for comparing modus operandi of known grants fraudsters. Training and skills be provided to public and corporate investigators on the use of modus operandi information in the investigation of social grants. To ensure that good practice is developed, a modus operandi guideline document should be crafted by the South African Police Services' detective division at National level and corporate investigators respectively, with a view to improve conviction rate. / Criminology and Security Science / M. Tech. (Forensic Investigation)

Page generated in 0.6447 seconds