• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 78
  • 12
  • 5
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 105
  • 105
  • 60
  • 52
  • 52
  • 51
  • 41
  • 37
  • 24
  • 24
  • 23
  • 20
  • 19
  • 14
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Personal description : an investigation technique to identify suspects

Sefanyetso, Justice Thabang 11 1900 (has links)
This study investigates the use of personal description as an investigation technique to identify suspects. The study entails qualitative data obtained from interviews with investigators, literature, as well as case studies. The study found that personal description can be used as an investigation technique to identify suspects. There are eight techniques that the investigator should apply in order to identify suspects or perpetrators of a criminal act. To conduct effective investigation, it is important for the criminal investigators to be familiar with the techniques of identification and the application thereof. The description of offenders plays an important role as far as arresting offenders is concerned. The methods used - or to be used - by investigators to describe a person were also discussed. It is important that the investigators should work with other government departments, private investigators and security officials, to implement this technique in order to identify and arrest offenders. / Police Practice / (M. Tech (Forensic Investigation))
52

Thermal Identification of Clandestine Burials: A Signature Analysis and Image Classification Approach

Servello, John A. 12 1900 (has links)
Clandestine burials, the interred human remains of forensic interest, are generally small features located in isolated environments. Typical ground searches can be both time-consuming and dangerous. Thermal remote sensing has been recognized for some time as a possible search strategy for such burials that are in relatively open areas; however, there is a paucity of published research with respect to this application. This project involved image manipulation, the analyses of signatures for "graves" of various depths when compared to an undisturbed background, and the use of image classification techniques to tease out these features. This research demonstrates a relationship between the depth of burial disturbance and the resultant signature. Further, image classification techniques, especially object-oriented algorithms, can be successfully applied to single band thermal imagery. These findings may ultimately decrease burial search times for law enforcement and increase the likelihood of locating clandestine graves.
53

The body of a perpetrator as source of physical evidence in rape : a case study in Bahir Dar/Amhara Region/Ethiopia

Bayih, Adane Genetu 10 1900 (has links)
The aim of this research is to determine what physical evidence can be found on the body of the perpetrator to link the suspect with the crime of rape. Regarding this, the researcher was trying to introduce a number of important concepts such as forensic investigation, chain of custody, evidence, information, identification, individualization, crime scene and the Locard Principle. This research will explain the meaning of forensic investigation, the objective of criminal investigation, the difference between information and evidence and individualization and identification. An important principle which all investigators and prosecutors should know is the Locard Principle. It says: "Every contact leaves a trace". The principle further explains that, whenever two objects come into contact with one another, material from the first would be transferred to the second and material from the second would be transferred to the first. Although this principle is important for investigators as well as prosecutors, most of them do not know the principle. The other important thing is the consideration of the body of the perpetrator as a crime scene to prove a crime. A crime scene is defined as an area where a criminal act has taken place. If we get evidence from the body of the perpetrator, we can then consider it as a crime scene. Lastly, regarding the legal rights to collect evidence on the body of the perpetrator, there should be specific laws in Ethiopia. However, there is no specific law. In addition to this, there is no DNA investigation in Ethiopia. Hence, this research will enhance the skills of investigators and prosecutors will benefit from what I have discovered through the research and I am very pleased to be the first Ethiopian in the introduction of the field of forensic investigation to the readers. / Forensic Investigations / M. Tech. (Forensic Investigation)
54

The body of a perpetrator as source of physical evidence in rape : a case study in Bahir Dar/Amhara Region/Ethiopia

Bayih, Adane Genetu 10 1900 (has links)
The aim of this research is to determine what physical evidence can be found on the body of the perpetrator to link the suspect with the crime of rape. Regarding this, the researcher was trying to introduce a number of important concepts such as forensic investigation, chain of custody, evidence, information, identification, individualization, crime scene and the Locard Principle. This research will explain the meaning of forensic investigation, the objective of criminal investigation, the difference between information and evidence and individualization and identification. An important principle which all investigators and prosecutors should know is the Locard Principle. It says: "Every contact leaves a trace". The principle further explains that, whenever two objects come into contact with one another, material from the first would be transferred to the second and material from the second would be transferred to the first. Although this principle is important for investigators as well as prosecutors, most of them do not know the principle. The other important thing is the consideration of the body of the perpetrator as a crime scene to prove a crime. A crime scene is defined as an area where a criminal act has taken place. If we get evidence from the body of the perpetrator, we can then consider it as a crime scene. Lastly, regarding the legal rights to collect evidence on the body of the perpetrator, there should be specific laws in Ethiopia. However, there is no specific law. In addition to this, there is no DNA investigation in Ethiopia. Hence, this research will enhance the skills of investigators and prosecutors will benefit from what I have discovered through the research and I am very pleased to be the first Ethiopian in the introduction of the field of forensic investigation to the readers. / Forensic Investigations / M. Tech. (Forensic Investigation)
55

The analysis of a cheque to identify crime

Kruger, Deidre Jacoba 28 February 2006 (has links)
In this study the main focus of the researcher was to analyse a cheque to identify crime. This study intends to give the forensic investigator a guideline to follow during the analysis of a cheque under investigation. Crimes that could be detected during the analysis of a cheque are fraud, forgery and uttering. Other aspects were also explained to ensure a better understanding of the study, namely: forensic investigation, forensic investigator, identification and crime scenes. Forensic investigation is a systematic search for the truth with the primary purpose of finding a positive solution to a crime. Forensic investigation is not a game of chance, or based on storybook types of coincidences. Therefore, forensic investigators cannot rely on coincidental success to come their way. It is true that luck sometimes plays a role in forensic investigations, but it is the thorough investigator who creates his/her own opportunities and arrives at the right place at the right time. In order for a forensic investigator to strive for excellence, he/she must have a good knowledge of his/her field of work. It is important for the forensic investigator to understand that identification plays an important role in forensic investigation. An additional benefit is derived when one can individualise something because it makes the identification much more valuable. All crime scenes should furthermore be managed in such a way that all physical evidence can be collected in order to ensure successful prosecution and conviction in a court of law. It is the belief of the researcher that because cheques are not acknowledged as crime scenes and therefore not properly handled or protected, many investigations fail in court and the accused are acquitted. / Criminology / M. Tech. (Forensic Investigation)
56

Developing a checklist for examining a fraudulent cheque

Meijer, Annelie 28 February 2006 (has links)
My goal in this research was to develop a checklist for examining a cheque for information that can be used to identify, individualise and trace the perpetrator of a crime. A further intent was to share and introduce a number of important concepts, namely forensic investigation, identification, individualisation, the Locard principle and crime scene. This research will explain that forensic investigation refers to the using of sophisticated investigation techniques to obtain sufficient information to prove the true facts in a court of law. Further, that identification is the collective aspect of the set of characteristics by which an object is definitively recognisable or known, while the individual characteristics establish the individuality of a specific object. To link an individual with a crime scene, many types of evidence may be used and to associate an individual with the performed illegal handling, many types of evidence may be used. These types of evidence are commonly referred to as ”transfer” evidence. This process is also referred to as the ”Locard principle”. Lastly, a crime scene is explained as a place where a crime has occurred. It is also explained to be a ”laboratory of information” and therefore, during a cheque fraud investigation, the cheque is in most cases the only link to information to trace, identify and individualise the perpetrator. Therefore, the cheque should be treated as a crime scene. If forensic investigators use their knowledge of these concepts together with the checklist, it should enhance their investigation skills and empower them to become better equipped for the challenges they face in identifying, individualising and tracing the perpetrators in order to ensure successful prosecution and conviction. I believe all forensic investigators will benefit from what I have discovered through this research and I am very pleased to be able to introduce this checklist to you. / Criminology / M.Tech. (Forensic Investigation)
57

The processing of firearms during investigation of a crime scene

Pillay, Povendran Dorasamy 31 May 2008 (has links)
The study was conducted with the intention of identifying the current procedure employed by investigators for processing firearms evidence at a crime scene. The researcher identified shortcomings which prevent firearm evidence being found to be inadmissible in criminal proceedings. The researcher also analysed other aspects relating to the processing of firearm evidence at a crime scene, namely: Locard principle, identification, individualisation and physical integrity. In order for investigators to be successful in their investigation of cases involving firearms, it is imperative for investigators to have a clear understanding of the basic concepts surrounding firearm evidence processing. It is the strong belief of the researcher that because of improper handling, contamination and lack of integrity pertaining to firearm evidence, such evidence is being found to be inadmissible in criminal proceedings. This negative impact has a roll over effect on the conviction rate for serious crime. / Criminology / M. Tech. (Forensic Invesigation)
58

Enhancing the validity of the SAPS gold fingerprinting database through improved sample-collection techniques

Crundwell, Gordon Rhodes 30 April 2008 (has links)
This study's main focus was to analyse the methodology used by gold mines when obtaining reference samples required for gold fingerprinting analysis. Such methodology is also regulated by legislation in that in terms of the Precious Metals Act 37 of 2005 sect 22(1), "Any producer or any person who imports precious metals must submit to the Forensic Science Laboratory (FSL) of the South African Police Service (SAPS) such specimens of any precious metals produced or imported by him or her as may be prescribed". The gold mines are producers of precious metals, specifically gold, and they are therefore required to submit reference samples, which are then used by the SAPS FSL to maintain a database of gold samples. This database can then be used for comparison purposes during the forensic science of gold fingerprinting. The supporting regulations of the Precious Metals Act, Section 19 stipulate seven requirements for the submission of reference samples and this study intends to give guidelines to security officials employed on the gold mines of South Africa to ensure that these requirements are met and that the validity of the SAPS gold fingerprint database is enhanced through improved sample-collection techniques. The use of gold fingerprinting is part of the forensic investigation process used when trying to establish the origin of gold confiscated as an exhibit during police and mining security crime operations and recoveries, and this allows for victim identification in the resultant criminal trial and proper disposal of recovered gold-bearing materials that are recovered. It is important for the mine security official responsible for reference sample collection to keep in mind that the methodology used when obtaining these samples could be challenged in court and that, therefore, definitive guidelines should be followed to ensure that the most representative samples are collected and that the collection and handing over of samples meet chain of evidence requirements. / Criminology / M.Tech (Forensic Investigation)
59

Processing of information for prosecution purposes

Van der Merwe, C. J. (Christoffel Johannes) 31 May 2008 (has links)
The purpose of the research was to establish action steps than can assist the criminal investigator in the processing of information into evidence for prosecution purposes, by focusing on the basic principles of criminal investigation from where information sources could be utilised to their full potential in the search for the truth. The researcher evaluated the current methods that investigators within the SAPS use and read extensively on the topic in international literature sources. The research used an empirical research design because of the limited information available, and a qualitative research approach which enabled real-life observations. Simple random sampling was used to interview 30 experienced investigators each with more than five years experience and purposive sampling was used to identify five expert respondents who had more than 30 years' investigation experience. Data was obtained from their real-life experiences and data was further collected through case studies of case dockets. / Criminology / M.Tech. (Forensic investigation)
60

Management of security information in the security industry

Govender, Doraval 06 1900 (has links)
Incidents, threats and vulnerabilities have the potential to negatively affect an organisation’s assets. Information on these incidents, threats and vulnerabilities are important to security. It is therefore necessary for this security information to be effectively and efficiently managed, so that correct decisions may be made on the implementation of security risk control measures. This study explored the management of security information in the security industry by undertaking the following: • establishing the “status quo” of the collection and analysis of security information and the implementation of security risk control measures in practice; • identifying the nature and extent of problems experienced in the collection and analysis of security information and the implementation of security risk control measures; and the • discovery of a new Security Information Management Model (SIMM). Mixed methods research was used to study the management of security information in the security industry. The explorative research design was used for this purpose. Semi-structured and focus group interviews were conducted with senior security managers and operational security officers, respectively. The grounded theory research design was used to analyse the qualitative data in order to generate a substantive grounded theory. The theory is that security officers operate without a standardised framework to manage security information. The data from the semi-structured and the focus group interviews were used to design a questionnaire to conduct a survey using the quantitative approach. The non-experimental research design was used to conduct this self-administered questionnaire survey. The data from this questionnaire survey helped validate and confirm the substantive grounded theory. The study found that there was the need for a Security Information Management Model to manage security information in the security industry. Based on this finding the researcher recommended a new Security Information Management Model for the management of security information in the security industry. / Criminology / D. Litt. et Phil. (Criminology)

Page generated in 0.0912 seconds