• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 107
  • 2
  • 1
  • Tagged with
  • 111
  • 111
  • 111
  • 111
  • 71
  • 64
  • 60
  • 41
  • 40
  • 34
  • 28
  • 27
  • 27
  • 25
  • 24
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Developing a checklist for examining a fraudulent cheque

Meijer, Annelie 28 February 2006 (has links)
My goal in this research was to develop a checklist for examining a cheque for information that can be used to identify, individualise and trace the perpetrator of a crime. A further intent was to share and introduce a number of important concepts, namely forensic investigation, identification, individualisation, the Locard principle and crime scene. This research will explain that forensic investigation refers to the using of sophisticated investigation techniques to obtain sufficient information to prove the true facts in a court of law. Further, that identification is the collective aspect of the set of characteristics by which an object is definitively recognisable or known, while the individual characteristics establish the individuality of a specific object. To link an individual with a crime scene, many types of evidence may be used and to associate an individual with the performed illegal handling, many types of evidence may be used. These types of evidence are commonly referred to as ”transfer” evidence. This process is also referred to as the ”Locard principle”. Lastly, a crime scene is explained as a place where a crime has occurred. It is also explained to be a ”laboratory of information” and therefore, during a cheque fraud investigation, the cheque is in most cases the only link to information to trace, identify and individualise the perpetrator. Therefore, the cheque should be treated as a crime scene. If forensic investigators use their knowledge of these concepts together with the checklist, it should enhance their investigation skills and empower them to become better equipped for the challenges they face in identifying, individualising and tracing the perpetrators in order to ensure successful prosecution and conviction. I believe all forensic investigators will benefit from what I have discovered through this research and I am very pleased to be able to introduce this checklist to you. / Criminology / M.Tech. (Forensic Investigation)
22

Professionalising criminology in South Africa

Beukman, Brenda Ann 30 November 2005 (has links)
This study explores and describes the professional role of the Criminologist in South Africa. National and international research and personal practice are used to demonstrate the role of the South African Criminologist. A qualitative research design supports the exploratory nature of this study. The areas of focus are veracity assessing, criminogenesis, assessment of juveniles, assisting victims of crime through debriefing and compiling victim impact statements and compiling pre-sentence reports. Each of these areas rely on the expert knowledge of the Criminologist and is accompanied by real life case study which is preceded by theoretical explanations and research findings. The research also highlights the quest for professionalising Criminology in South Africa by presenting and analysing the formal application for recognition. / Criminology / D.Litt. et Phil. (Criminology)
23

The processing of firearms during investigation of a crime scene

Pillay, Povendran Dorasamy 31 May 2008 (has links)
The study was conducted with the intention of identifying the current procedure employed by investigators for processing firearms evidence at a crime scene. The researcher identified shortcomings which prevent firearm evidence being found to be inadmissible in criminal proceedings. The researcher also analysed other aspects relating to the processing of firearm evidence at a crime scene, namely: Locard principle, identification, individualisation and physical integrity. In order for investigators to be successful in their investigation of cases involving firearms, it is imperative for investigators to have a clear understanding of the basic concepts surrounding firearm evidence processing. It is the strong belief of the researcher that because of improper handling, contamination and lack of integrity pertaining to firearm evidence, such evidence is being found to be inadmissible in criminal proceedings. This negative impact has a roll over effect on the conviction rate for serious crime. / Criminology / M. Tech. (Forensic Invesigation)
24

Enhancing the validity of the SAPS gold fingerprinting database through improved sample-collection techniques

Crundwell, Gordon Rhodes 30 April 2008 (has links)
This study's main focus was to analyse the methodology used by gold mines when obtaining reference samples required for gold fingerprinting analysis. Such methodology is also regulated by legislation in that in terms of the Precious Metals Act 37 of 2005 sect 22(1), "Any producer or any person who imports precious metals must submit to the Forensic Science Laboratory (FSL) of the South African Police Service (SAPS) such specimens of any precious metals produced or imported by him or her as may be prescribed". The gold mines are producers of precious metals, specifically gold, and they are therefore required to submit reference samples, which are then used by the SAPS FSL to maintain a database of gold samples. This database can then be used for comparison purposes during the forensic science of gold fingerprinting. The supporting regulations of the Precious Metals Act, Section 19 stipulate seven requirements for the submission of reference samples and this study intends to give guidelines to security officials employed on the gold mines of South Africa to ensure that these requirements are met and that the validity of the SAPS gold fingerprint database is enhanced through improved sample-collection techniques. The use of gold fingerprinting is part of the forensic investigation process used when trying to establish the origin of gold confiscated as an exhibit during police and mining security crime operations and recoveries, and this allows for victim identification in the resultant criminal trial and proper disposal of recovered gold-bearing materials that are recovered. It is important for the mine security official responsible for reference sample collection to keep in mind that the methodology used when obtaining these samples could be challenged in court and that, therefore, definitive guidelines should be followed to ensure that the most representative samples are collected and that the collection and handing over of samples meet chain of evidence requirements. / Criminology / M.Tech (Forensic Investigation)
25

The use of informers during precious medals undercover operations

Flynn, Hendrik Frans 10 1900 (has links)
The research was conducted as a result of the long standing criticism against undercover operations due to the conduct of informers and agents during these operations. Since both undercover operations and informers are controversial issues it may cause serious judicial problems if the system is not applied correctly. The problem was investigated by means of qualitative research. A thorough literature study and semi-structured interviews were used to gather the required data. Semi-structured interviews were conducted with advocates of the Director of Public Prosecutions Free State and detectives from the Organised Crime Unit of the South African Police Service. It has been found that undercover operations are an effective manner to address organised crime and especially precious metals related crimes. Undercover operations are an excellent barometer to determine the extent of organised crime. It gives investigators a clear view of the compilation of a syndicate and the roles of leaders, runners and associates. Informers are invaluable sources of information. Without the use of informers it will be virtually impossible to engage in undercover operations, since the police will have no intelligence to engage into an investigation of this nature. The implications of the findings are that it is the responsibility of investigators, agents and informers to keep the system transparent, fair and acceptable. Their conduct may never violate their mandate and the boundaries of the investigation. Undercover operations are justified when the system is properly administered, structured, controlled and without bias. / Forensic Investigation / M. Tech. (Forensic Investigation)
26

The psychological effects experienced by computer forensic examiners working with child pornography

Whelpton, Juliette 02 1900 (has links)
Convergence of technology has made access to the Internet faster, easier and cheaper. Criminals, including paedophiles, child abusers and pornography traders make use of this technology to commit criminal offences. Computer Forensic Examiners (CFEs) are members of the Cyber Crime Unit, a professional, specialised unit of the South African Police Service (SAPS) who are responsible for computer forensic examination including the investigation of child pornographic images. The aim of the study was to seek understanding on what psychological effects the CFEs experienced when working with the images and was conducted from within the social constructionism and the narrative frameworks. The images had a severe impact on the CFEs as was clearly uncovered in the stories of six CFEs who participated in this study. The participants' stories were recorded and transcribed after which the application of thematic content analysis found that the participants all suffered similar negative effects. These findings were integrated with the findings of a focus group as well as with the findings of a similar study that was conducted during the same time by the Crimes against Children Research Center at the University of New Hampshire and resulted in identifying symptoms of trauma and stress experienced by the CFEs. Based on these results recommendations regarding the support for the CFEs were made. / Psychology / M.A. (Psychology)
27

The value of docket analysis in stranger rape investigations : a case study in Port Elizabeth

Van der Watt, Marcel 11 1900 (has links)
In this research docket analysis is evaluated as an investigative tool in stranger rape cases. Owing to the fact that serial rapists mostly reside within the category of stranger rape cases, the researcher attempted to test the value of docket analysis in the identification of patterns and similarities among such cases which could be indicative of serial rape activity. A rape matrix was used as a docket analysis tool to analyse the content of 184 stranger rape cases which was closed as ‘undetected’. In addition to investigative shortcomings in the case dockets, the researcher identified 15 stranger rape cases which presented six unique patterns among them. These identified patterns could be indicative of serial rape activity. / Criminology / M.Tech. (Forensic Investigation)
28

Interviewing child victims : improve communication and understand child behaviour

Masango, Kate Iketsi 02 1900 (has links)
This research investigates the communication abilities of children who are exposed to criminal investigations because a crime was committed against them or they have witnessed a crime happening to another person. The study also determines how crime detectives can maximise their efforts in obtaining evidence from such children with the help of an interview as a technique to elicit information. The aim of the research was to understand the behaviour of children, so that more effective investigative interviews can be undertaken with child victims. The researcher wanted to identify the communication challenges associated with obtaining information from child victims and possible ways to overcome such challenges. It was found that the developmental stages of children, the manner in which interviewers/investigators conduct themselves during child interviews and the amount of knowledge possessed by interviewers to elicit information in a legally defensible manner are central to child victim interviews. / Criminology and Security Science / M. Tech. (Forensic Investigation)
29

Management of security information in the security industry

Govender, Doraval 06 1900 (has links)
Incidents, threats and vulnerabilities have the potential to negatively affect an organisation’s assets. Information on these incidents, threats and vulnerabilities are important to security. It is therefore necessary for this security information to be effectively and efficiently managed, so that correct decisions may be made on the implementation of security risk control measures. This study explored the management of security information in the security industry by undertaking the following: • establishing the “status quo” of the collection and analysis of security information and the implementation of security risk control measures in practice; • identifying the nature and extent of problems experienced in the collection and analysis of security information and the implementation of security risk control measures; and the • discovery of a new Security Information Management Model (SIMM). Mixed methods research was used to study the management of security information in the security industry. The explorative research design was used for this purpose. Semi-structured and focus group interviews were conducted with senior security managers and operational security officers, respectively. The grounded theory research design was used to analyse the qualitative data in order to generate a substantive grounded theory. The theory is that security officers operate without a standardised framework to manage security information. The data from the semi-structured and the focus group interviews were used to design a questionnaire to conduct a survey using the quantitative approach. The non-experimental research design was used to conduct this self-administered questionnaire survey. The data from this questionnaire survey helped validate and confirm the substantive grounded theory. The study found that there was the need for a Security Information Management Model to manage security information in the security industry. Based on this finding the researcher recommended a new Security Information Management Model for the management of security information in the security industry. / Criminology / D. Litt. et Phil. (Criminology)
30

The use of physical surveillance in forensic investigation

Knoesen, Andre Leon 11 1900 (has links)
The problem that was identified is that physical surveillance is not generally used by general detectives in the South African Police Service as a technique during their investigations. According to the researcher’s experience, this can be due to lack of understanding or experience or may stem from ignorance. A lack of training on the use of physical surveillance as a method to obtain information for the investigation process was also identified as a problem. This study therefore investigated the role and use of physical surveillance within the forensic investigation process. The focus of the research was on basic static (stationary), foot and vehicle surveillance as these types of surveillance are usually conducted in conjunction with each other. An empirical research design was used to conduct the research. A qualitative research approach enabled the researcher to obtain first-hand information from interviews with general detectives. Information was also obtained from a thorough literature study and from the researcher’s own experience on the topic. To conduct effective investigation, it is important for investigators to be familiar with the concept of physical surveillance, its elements, its influence and its values. A physical surveillance operation is a forensic tool used to gather evidence, to recover stolen property, and to identify and arrest the perpetrator. The use of physical surveillance during investigations serves the purpose of gathering evidence and information that can be used as intelligence. Successful forensic investigation requires skill and places extraordinary demands on detectives to utilise all available methods and techniques. The recognition of the use of physical surveillance as a method of evidence gathering is of outmost importance. The research has revealed that general detectives do not acknowledge the importance of physical surveillance as a method to obtain information for the investigation process. It is of vital importance that all detectives be properly trained with the necessary knowledge and skills to make use of this valuable investigative tool. / Police Practice / M. Tech. (Forensic Investigation)

Page generated in 0.1048 seconds