• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 78
  • 12
  • 5
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 105
  • 105
  • 60
  • 52
  • 52
  • 51
  • 41
  • 37
  • 24
  • 24
  • 23
  • 20
  • 19
  • 14
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

The feasibility of transferring cells from archived buccal swabs to FTA card for long term and simple storage of forensic samples

Khoory, Haifa January 2008 (has links)
[Truncated abstract] The collection of buccal cells is common practise in the epidemiological and forensic science. Unlike venipuncture collection of blood; it is a safer, non-invasive method for collection of biological material. The methods by which these cells are collected from the inner cheek of an individual and stored are the key elements in preserving DNA. Typically, forensic samples require long term storage. Samples are commonly collected on cotton swabs and stored moist at low to ultra-low temperatures (less than -20oC). Although this is the method of choice in most forensic facilities, there are drawbacks. The samples are inherently contaminated with microflora within the oral cavity and the moisture allows a plethora of microorganisms to grow. As the time frame that has elapsed from collection to storage increases, there is an exponential increase in bacterial cells. Storage of containers containing swabs coated with cells at temperatures below 20oC is also costly due to requirements for large freezers which are running and monitored over 24 hours. In the pass 10 to 15 years, researchers have focussed on alternative ways to store buccal cells. The FTA card system by Whatman is one such development. The FTA card is unique in that it provides a means for the collection of buccal cells for storage at room temperature. DNA profiling from samples stored in this way for 11 years has been successfully achieved. The filter paper matrix of the FTA card binds and subsequently lyses cells. ... (2) The second component of this thesis describes a study which subjected cells on buccal swabs to various conditions of increased temperature over periods of time to establish if DNA could be amplified. The aim was to mimic exposure to the vigours of field conditions, particularly in the extreme local environments that prevail in the United Arab Emirates. a. Initially, buccal cells stored at -20oC over 360 days were used to mimic standard archiving procedures. The cells were subsequently transferred to FTA cards, amplified and profiled by using ABI AmpFLSTR Identifiler PCR Amplification Kit (Applied Biosystems, Foster City, CA). Complete STR profiles were successfully recovered from the archived swabs. In most cases 100% of alleles were recovered, suggesting that it is feasible to transfer DNA from properly archived buccal swabs to FTA cards. b. The second phase involved the storage of fresh swabs that had been artificially aged by using incubation temperatures ranging from 40oC to 100oC. Partial profiles resulted from artificially aged samples, indicating that the prevailing conditions prior to low temperature storage of the swabs plays an important role in ensuring cellular integrity and thus, DNA quality. Results from this study suggest that it is possible for biological samples stored under correct conditions to be transferred from swabs to FTA card. In combination, the two chapters presented in this study show that it is feasible to transfer achieved forensic biology samples from swabs to the FTA card system. However, it is necessary to ensure that the samples are treated in the correct manner so as to minimise contamination from external sources and to maintain the correct environmental state to maintain intact cells and usable DNA.
42

The constitutionality of the Criminal Law (Forensic Procedures) Amendment Act

Laing, Samantha Robyn January 2017 (has links)
The Criminal Law (Forensic Procedures) Amendment Act 37 of 2013 came into operation in January 2015. The Act makes provision for the establishment of a National Forensic DNA Database, which will store DNA profiles of certain groups of people. This research will discuss the establishment of a forensic DNA database in South Africa. The legal position in the United States of America will also be considered, with specific reference to the states of Maryland, California and New York. This research will focus predominantly on the collection of DNA samples and profiles from arrestees. When such samples are allowed to be collected, what offences warrant the collection of such samples and the period within which the DNA samples need to be destroyed. Collecting DNA samples and profiles from certain persons could potentially violate particular rights in the Bill of Rights. The rights to privacy, bodily integrity, equality and human dignity are discussed as well as the approach the courts have adopted in dealing with such infringements or possible infringements. This research furthermore deals with the historical developments of DNA evidence and contains a brief discussion on expert evidence. This research also deals with the evidential value of DNA evidence, as well as possible problems faced by prosecutors and defence attorneys when dealing with DNA evidence. The Criminal Law (Forensic Procedures) Amendment Act is still very new, and therefore, there is not yet much case law in South Africa specifically dealing with the sections of the said Act. This research makes submissions and recommendations regarding certain sections of the Act, as well as the overall constitutionality of the Act.
43

An evaluation of the MMPI-2 using South African pre-trial forensic patients prediction of criminal responsibility and assessment of personality characteristics

Du Toit, Emile January 2004 (has links)
This study examines the utility of the MMPI-2 in predicting responsibility in pre-trial forensic patients, using a post hoc sample of 94 offenders from Sterkfontein Psychiatric Hospital in Gauteng. Firstly, the overall characteristics of the pre-trial forensic patients are discussed, following an analysis of demographic, clinical, criminal and MMPI-2 pre-trial data, as well as an overview of the Megargee typological classification of offenders. The sample is classified into Criminally Responsible (CR), Diminished Criminal Responsibility (DCR) and Not Criminally Responsible (NCR), and the CR and DCR groups are collapsed (CR/DCR) for many of the analyses when comparing them to the NCR group. Secondly, the variance of variables with responsibility is discussed, after examining one-way ANOVA’s of demographic, clinical, criminal and MMPI-2 variables, as well as an overview of high point pairs. Thirdly, discriminant analyses were conducted of demographic, clinical and MMPI-2 variables. When comparing the collapsed CR/DCR group to the NCR group, psychiatric diagnosis, presence of psychosis, the MMPI-2 Pa and Es scales, as well as race and substance abuse each had unique predictive power and created a substantial discriminative equation (F (6,70) = 45.732, p <0.0005) with a successful prediction rate of 96%. Using only MMPI-2 variables to predict responsibility showed significant unique contributions for the Pa, Es, MAC-R and Mf scales, with the BIZ scale not quite significant, and a fairly significant overall discriminant equation (F (5,73) = 6.474, p < 0.0005), with an overall successful prediction rate of 82%, with the MMPI-2 variables adding an additional 3% to the predictive power of the demographic and clinical variables. Similarly, when examining the more complex 3 group responsibility classification of CR, DCR and NCR, it was found that the demographic, clinical and MMPI-2 variables of psychiatric diagnosis, psychosis, race, substance abuse, and the Pa, Es and Ma scales all had significant contributions to a powerful discriminant analysis (F (14, 136) = 19.758, p < 0.0005) that was capable of correctly reclassifying almost 95% of the sample, and the MMPI-2 variables providing an increase in predictive power of 8%. Differences in responsible and not responsible pre-trial forensic patients are discussed, as well as the role of the MMPI-2 in assessing these differences, and the fact that it is highly likely that it adds more to the forensic assessment of responsibility than a 3% (CR/DCR versus NCR) or 8% (CR versus DCR versus NCR) increase in predictive power. Limitations of the study are discussed, together with recommendations for future research with the MMPI-2 for assessment of criminal responsibility. The suggestion is made that the MMPI-2 can become a valuable tool in South African forensic settings, not only in the assessment of responsibility and malingering, but also in the placement, management, follow-up and treatment of offenders, to maximize the limited resources in South Africa allocated for the rehabilitation of offenders, and minimize the risk of recidivism or rehospitalization.
44

Digital forensic model for computer networks

Sanyamahwe, Tendai January 2011 (has links)
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log mining is an evolution of typical digital forensics utilising evidence from network devices such as firewalls, switches and routers. Network log mining is a process supported by presiding South African laws such as the Computer Evidence Act, 57 of 1983; the Electronic Communications and Transactions (ECT) Act, 25 of 2002; and the Electronic Communications Act, 36 of 2005. Nevertheless, international laws and regulations supporting network log mining include the Sarbanes-Oxley Act; the Foreign Corrupt Practices Act (FCPA) and the Bribery Act of the USA. A digital forensic model for computer networks focusing on network log mining has been developed based on the literature reviewed and critical thought. The development of the model followed the Design Science methodology. However, this research project argues that there are some important aspects which are not fully addressed by South African presiding legislation supporting digital forensic investigations. With that in mind, this research project proposes some Forensic Investigation Precautions. These precautions were developed as part of the proposed model. The Diffusion of Innovations (DOI) Theory is the framework underpinning the development of the model and how it can be assimilated into the community. The model was sent to IT experts for validation and this provided the qualitative element and the primary data of this research project. From these experts, this study found out that the proposed model is very unique, very comprehensive and has added new knowledge into the field of Information Technology. Also, a paper was written out of this research project.
45

Identification parade as a technique for the identification of suspects : a case study in Kwazulu-Natal

Nyuswa, Campbell Msizi 05 1900 (has links)
This study explores the utilisation of the identification parade as a technique for the identification of suspects. The intention of the study is to empower the investigators with knowledge they can use during their investigations. An identification parade is the most common police identification procedure. When conducted properly, it is considered more accurate than other methods. Crime in South Africa is a serious concern and it impacts negatively on many lives. The fear of crime, the loss of life and the socioeconomic impact of crime, etc., create the impression that the battle against crime has been lost. The limited knowledge among the police investigators contributes to making the reduction of crime more difficult to achieve. This study aims to develop good practice by recommending new ideas on how identification parades should be conducted with the view to enhancing the performance of police investigators. / M.Tech. (Forensic Investigation))
46

A critical analysis of the procedures followed to conduct identification parades : a case study in Mpumalanga, South Africa

Mokonyama, William Madimetja 04 1900 (has links)
The research attempts to establish how an identification parade should be conducted, for evidence derived from it to be admissible in court. To conduct effective investigation, it is important for investigators to be familiar with the concept “identification parade”, its purpose, the procedures to conduct it and its values. To achieve the goals and objectives of the practice of an identification parade, investigators must know how to conduct it, what the value of its evidence is, and how to use it as a technique to identify suspects. The direction, by implication, and clarification of the crime situation, is hardly possible without the determination of the identity of the perpetrator or suspect of a criminal act. The recognition of the identification parade as a form of evidence gathered is of the utmost importance. / Criminology / Thesis (M.Tech. (Forensic Investigation))
47

Personal description : an investigation technique to identify suspects

Sefanyetso, Justice Thabang 11 1900 (has links)
This study investigates the use of personal description as an investigation technique to identify suspects. The study entails qualitative data obtained from interviews with investigators, literature, as well as case studies. The study found that personal description can be used as an investigation technique to identify suspects. There are eight techniques that the investigator should apply in order to identify suspects or perpetrators of a criminal act. To conduct effective investigation, it is important for the criminal investigators to be familiar with the techniques of identification and the application thereof. The description of offenders plays an important role as far as arresting offenders is concerned. The methods used - or to be used - by investigators to describe a person were also discussed. It is important that the investigators should work with other government departments, private investigators and security officials, to implement this technique in order to identify and arrest offenders. / Police Practice / (M. Tech (Forensic Investigation))
48

Identification parade as a technique for the identification of suspects : a case study in Kwazulu-Natal

Nyuswa, Campbell Msizi 05 1900 (has links)
This study explores the utilisation of the identification parade as a technique for the identification of suspects. The intention of the study is to empower the investigators with knowledge they can use during their investigations. An identification parade is the most common police identification procedure. When conducted properly, it is considered more accurate than other methods. Crime in South Africa is a serious concern and it impacts negatively on many lives. The fear of crime, the loss of life and the socioeconomic impact of crime, etc., create the impression that the battle against crime has been lost. The limited knowledge among the police investigators contributes to making the reduction of crime more difficult to achieve. This study aims to develop good practice by recommending new ideas on how identification parades should be conducted with the view to enhancing the performance of police investigators. / M.Tech. (Forensic Investigation))
49

Die List in der Strafverfolgung /

Miescher, Martin. January 2008 (has links)
Univ., Diss.--Bern, 2007.
50

A critical analysis of the procedures followed to conduct identification parades : a case study in Mpumalanga, South Africa

Mokonyama, William Madimetja 04 1900 (has links)
The research attempts to establish how an identification parade should be conducted, for evidence derived from it to be admissible in court. To conduct effective investigation, it is important for investigators to be familiar with the concept “identification parade”, its purpose, the procedures to conduct it and its values. To achieve the goals and objectives of the practice of an identification parade, investigators must know how to conduct it, what the value of its evidence is, and how to use it as a technique to identify suspects. The direction, by implication, and clarification of the crime situation, is hardly possible without the determination of the identity of the perpetrator or suspect of a criminal act. The recognition of the identification parade as a form of evidence gathered is of the utmost importance. / Criminology and Security Science / Thesis (M.Tech. (Forensic Investigation))

Page generated in 0.2348 seconds