• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 50
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 52
  • 52
  • 52
  • 52
  • 46
  • 36
  • 30
  • 28
  • 23
  • 20
  • 19
  • 17
  • 12
  • 11
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

The use of blood pattern analysis to reconstruct a crime scene

Wiid, Antoinette Bedelia 02 1900 (has links)
The success or failure of any criminal investigation often depends on the recognition of physical evidence left at a crime scene and the proper analysis of that evidence. Crime scenes that involve bloodshed often contain a wealth of information in the form of blood patterns, the location, and its cause. Any criminal investigation has specific tasks, from the time when the crime is reported to the reconstruction of crime scenes. A lot of work needs to be done. Once the investigation starts at the crime scene, BPA needs to be done at the crime scene and the investigating officer must identify this evidential tool. The investigating officer should not necessarily have specialised training in blood pattern analysis, but rather know when to use these experts at their bloody crime scenes. With the interviews and docket analysis done, the researcher found that this was a problem as the investigating officers, either had no knowledge on the subject of BPA or very little knowledge on this research. The purpose of this study was to determine the use of BPA to CSR, and for the investigating officer to realise that it is not just a bloody crime scene, but also contains a wealth of evidence. The researcher had two research questions. Once the investigating officer follows the objectives of criminal investigation, they should be able to have a strong case against the perpetrators. How could BPA be used in the reconstructing of a crime scene? The researcher wanted to bring it to the investigating officers’ attention that it is not just a bloody crime scene, but rather that it contains a wealth of evidence, which can give them a perspective of the movement of both the victim and perpetrator during the commencement of the crime. Regardless of the lack of knowledge of BPA, it is proposed that investigating officers are to be informed, either through station lectures or by yearly refresher workshops and courses of the evidential tool of BPA. When the bloody crime scene is reconstructed with the use of BPA, an insight of what transpired at the crime scene will help them to finalise their cases. For recommendations, it is proposed that investigating officers are to be trained in more in depth courses in criminal investigation as well as crime scene reconstruction and evidence collection using FSL. / Criminology and Security Science / M.Tech. (Forensic Investigation)
22

The use of firearm evidence in the investigation of murder

Tshishonga, Mpho 02 1900 (has links)
In this dissertation, the researcher wants to establish the use of firearm evidence in the investigation of the crime of murder. Firearm evidence can be of significance to the investigators during murder investigations. To determine the importance of this evidence the researcher has formulated the following research questions to address the research problem:  What is the role of forensic science in the investigation of crimes?  How can firearm evidence be used in the investigation of murder? An empirical research design and qualitative research approach were used for this dissertation. International and national literature sources were consulted and the researcher conducted semi-structured interviews with the investigators from Akasia SAPS, crime scene experts from the Pretoria North LCRC and ballistics experts from the Forensic Science Laboratory in Silverton, Pretoria. The role of forensic science and the use of firearm evidence in the investigation of murder were established. Recommendations have been made for further research on aspects highlighted by the findings. / Police Practice / M. Tech. (Forensic Investigations)
23

The analysis of a cheque to identify crime

Kruger, Deidre Jacoba 28 February 2006 (has links)
In this study the main focus of the researcher was to analyse a cheque to identify crime. This study intends to give the forensic investigator a guideline to follow during the analysis of a cheque under investigation. Crimes that could be detected during the analysis of a cheque are fraud, forgery and uttering. Other aspects were also explained to ensure a better understanding of the study, namely: forensic investigation, forensic investigator, identification and crime scenes. Forensic investigation is a systematic search for the truth with the primary purpose of finding a positive solution to a crime. Forensic investigation is not a game of chance, or based on storybook types of coincidences. Therefore, forensic investigators cannot rely on coincidental success to come their way. It is true that luck sometimes plays a role in forensic investigations, but it is the thorough investigator who creates his/her own opportunities and arrives at the right place at the right time. In order for a forensic investigator to strive for excellence, he/she must have a good knowledge of his/her field of work. It is important for the forensic investigator to understand that identification plays an important role in forensic investigation. An additional benefit is derived when one can individualise something because it makes the identification much more valuable. All crime scenes should furthermore be managed in such a way that all physical evidence can be collected in order to ensure successful prosecution and conviction in a court of law. It is the belief of the researcher that because cheques are not acknowledged as crime scenes and therefore not properly handled or protected, many investigations fail in court and the accused are acquitted. / Criminology and Security Science / M. Tech. (Forensic Investigation)
24

Developing a checklist for examining a fraudulent cheque

Meijer, Annelie 28 February 2006 (has links)
My goal in this research was to develop a checklist for examining a cheque for information that can be used to identify, individualise and trace the perpetrator of a crime. A further intent was to share and introduce a number of important concepts, namely forensic investigation, identification, individualisation, the Locard principle and crime scene. This research will explain that forensic investigation refers to the using of sophisticated investigation techniques to obtain sufficient information to prove the true facts in a court of law. Further, that identification is the collective aspect of the set of characteristics by which an object is definitively recognisable or known, while the individual characteristics establish the individuality of a specific object. To link an individual with a crime scene, many types of evidence may be used and to associate an individual with the performed illegal handling, many types of evidence may be used. These types of evidence are commonly referred to as ”transfer” evidence. This process is also referred to as the ”Locard principle”. Lastly, a crime scene is explained as a place where a crime has occurred. It is also explained to be a ”laboratory of information” and therefore, during a cheque fraud investigation, the cheque is in most cases the only link to information to trace, identify and individualise the perpetrator. Therefore, the cheque should be treated as a crime scene. If forensic investigators use their knowledge of these concepts together with the checklist, it should enhance their investigation skills and empower them to become better equipped for the challenges they face in identifying, individualising and tracing the perpetrators in order to ensure successful prosecution and conviction. I believe all forensic investigators will benefit from what I have discovered through this research and I am very pleased to be able to introduce this checklist to you. / Criminology and Security Science / M.Tech. (Forensic Investigation)
25

Management of security information in the security industry

Govender, Doraval 06 1900 (has links)
Incidents, threats and vulnerabilities have the potential to negatively affect an organisation’s assets. Information on these incidents, threats and vulnerabilities are important to security. It is therefore necessary for this security information to be effectively and efficiently managed, so that correct decisions may be made on the implementation of security risk control measures. This study explored the management of security information in the security industry by undertaking the following: • establishing the “status quo” of the collection and analysis of security information and the implementation of security risk control measures in practice; • identifying the nature and extent of problems experienced in the collection and analysis of security information and the implementation of security risk control measures; and the • discovery of a new Security Information Management Model (SIMM). Mixed methods research was used to study the management of security information in the security industry. The explorative research design was used for this purpose. Semi-structured and focus group interviews were conducted with senior security managers and operational security officers, respectively. The grounded theory research design was used to analyse the qualitative data in order to generate a substantive grounded theory. The theory is that security officers operate without a standardised framework to manage security information. The data from the semi-structured and the focus group interviews were used to design a questionnaire to conduct a survey using the quantitative approach. The non-experimental research design was used to conduct this self-administered questionnaire survey. The data from this questionnaire survey helped validate and confirm the substantive grounded theory. The study found that there was the need for a Security Information Management Model to manage security information in the security industry. Based on this finding the researcher recommended a new Security Information Management Model for the management of security information in the security industry. / Criminology and Security Science / D. Litt. et Phil. (Criminology)
26

Maintaining the chain of evidence : a South African case study of blood samples in the case of driving liquour

Prins, George Anthony 04 1900 (has links)
The research attempts to evaluate the maintaining of the chain of evidence as a process of effective collection, handling and preservation of evidence. The concept "chain of evidence" refers to the process of collecting, handling and preservation of evidence until its presentation in court, as part of the investigation process. Evidence is anything that tends logically to prove or disprove a fact at issue in a judicial case. Evidence essentially consists of oral evidence, documentary evidence and real evidence. The value of evidence cannot be underestimated as evidence can make or break a case. It is therefore important that evidence is correctly and properly collected, handled and preserved to establish a strong link between an individual and a specific act. / Police Practice / Thesis ((M. Tech. (Forensic Investigation) Police Practice))
27

Maintaining the chain of evidence : a South African case study of blood samples in the case of driving liquour

Prins, George Anthony 04 1900 (has links)
The research attempts to evaluate the maintaining of the chain of evidence as a process of effective collection, handling and preservation of evidence. The concept "chain of evidence" refers to the process of collecting, handling and preservation of evidence until its presentation in court, as part of the investigation process. Evidence is anything that tends logically to prove or disprove a fact at issue in a judicial case. Evidence essentially consists of oral evidence, documentary evidence and real evidence. The value of evidence cannot be underestimated as evidence can make or break a case. It is therefore important that evidence is correctly and properly collected, handled and preserved to establish a strong link between an individual and a specific act. / Police Practice / Thesis ((M. Tech. (Forensic Investigation) Police Practice))
28

Kartering van selfoontegnologie

Lochner, Hendrik Thomas 10 1900 (has links)
It is sincerely hoped that this work will motivate other researchers and in particular my colleagues to do further research in the field of cellphone technology, especially how it can be mapped to enable it to be utilised as evidence in our courts. This research aims to develop the mapping of cellphone technology as an aid in the investigation of crime. The mapping of cellphone technology refers to how cellphone technology can be utilised in crime investigation and in particular how a criminal can be placed at the scene of a crime, as a result of a cellphone call that was either made or received. To place the suspect at the scene of a crime as a result of a call made or received, cellphone records and technology of the relevant cellphone company, as well as present computer programmes can be utilised. Shortly, it can be said that a criminal can geographically be placed within a space some where on this earth. / Criminology / M.Tech. (Forensic Investigation)
29

Modus operandi as technique in suspect identification in burglary cases

Berning, J. M. S. P. 31 August 2008 (has links)
The research attempts to establish how modus operandi can be used to identify suspects in burglary cases. To conduct effective investigation, it is important for investigators to be familiar with the concept modus operandi, its elements, its influence and its values. To achieve the goals and objectives of the practice of modus operandi, investigators must know how to apply modus operandi, what the situational factors are during a criminal act, and how to use it as technique to identify suspects in burglary cases. The direction by implication and clarification of the crime situation is hardly possible without the determination of the identity of the perpetrator or suspect of a criminal act. The recognition of the modus operandi system as any form of evidence gathering is of outmost importance. / Criminology / M.Tech. (Forensic investigation)
30

The post-mortem as a source of information in the investigation of murder

Bila, Hlengani Phanuel 05 1900 (has links)
The research is concerned with how the post-mortem report can be used as a source of information in the investigation of murder cases to identify crime, individual crimes and trace suspects, etc. The understanding of the post-mortem report, and the information which can be obtained from it, will assist the police investigators to handle murder cases in a professional way. The purpose of this research was to evaluate the existing manner in which police investigators use post-mortem reports in their investigations, with the intention of determining its strengths and weaknesses, and considering how the usage can be improved. Secondly, the researcher wanted to explore how investigators use postmortem reports as a source of information in their investigations. To accomplish this, the researcher perused international and national literature in an attempt to explore the field. The researcher wanted to apply the new research knowledge in order to develop good practice in the field. This has been done by recommending new procedures to enhance performance and to improve the conviction rate in court cases. / Police Practice / M.Tech. (Forensic Investigation)

Page generated in 0.0997 seconds