• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 60
  • 3
  • 2
  • Tagged with
  • 70
  • 70
  • 45
  • 44
  • 44
  • 35
  • 26
  • 24
  • 19
  • 18
  • 15
  • 13
  • 13
  • 13
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Exploring the value of computer forensics in the investigation of procurement fraud

Themeli, Aluwani Rufaroh 01 1900 (has links)
The research problem for this study was that forensic investigators in the Forensic Services (FS) of the City of Tshwane (CoT) are unable to successfully deal with procurement fraud as a result of the lack of knowledge, skills and resources required to conduct computer forensics during the investigation of procurement fraud. This research was conducted to ascertain the value of computer forensics in the investigation of procurement fraud. Further, the study sought to determine how to improve the CoT forensic investigators’ knowledge and competence regarding the application of computer forensics in the investigation of procurement fraud. The purpose of this study was to explore the procedures that should be followed by CoT forensic investigators when conducting computer forensics during the investigation of procurement fraud. The research also aimed to discover new information, not previously known to the researcher, related to computer forensics during the investigation of procurement fraud by exploring national and international literature. In addition, the study explored existing practices so as to use this information to improve the current CoT procedure, within the confines of the legislative requirements. The overall purpose of this study is to provide practical recommendations for best practices, based on the results of the data analysis, which address the problem and enhance the investigative skills of CoT forensic investigators. The study established that it is imperative and compulsory to apply computer forensics in any procurement fraud investigation in order to efficiently track down cyber criminals and solve complicated and complex computer crimes. It was also established that forensic investigators within the FS in the CoT lack the necessary computer skills to optimally investigate procurement fraud. It is therefore recommended that CoT forensic investigators acquire the necessary skills and essential training in computer forensics in order to improve their knowledge and competence regarding the application and understanding of the value of computer forensics in the investigation of procurement fraud. / School of Criminal Justice / M.Tech. (Forensic Investigation)
32

The use of informers during precious medals undercover operations

Flynn, Hendrik Frans 10 1900 (has links)
The research was conducted as a result of the long standing criticism against undercover operations due to the conduct of informers and agents during these operations. Since both undercover operations and informers are controversial issues it may cause serious judicial problems if the system is not applied correctly. The problem was investigated by means of qualitative research. A thorough literature study and semi-structured interviews were used to gather the required data. Semi-structured interviews were conducted with advocates of the Director of Public Prosecutions Free State and detectives from the Organised Crime Unit of the South African Police Service. It has been found that undercover operations are an effective manner to address organised crime and especially precious metals related crimes. Undercover operations are an excellent barometer to determine the extent of organised crime. It gives investigators a clear view of the compilation of a syndicate and the roles of leaders, runners and associates. Informers are invaluable sources of information. Without the use of informers it will be virtually impossible to engage in undercover operations, since the police will have no intelligence to engage into an investigation of this nature. The implications of the findings are that it is the responsibility of investigators, agents and informers to keep the system transparent, fair and acceptable. Their conduct may never violate their mandate and the boundaries of the investigation. Undercover operations are justified when the system is properly administered, structured, controlled and without bias. / Forensic Investigation / M. Tech. (Forensic Investigation)
33

Handwriting as individualisation technique in fraud investigation

Aschendorf, Cynthia Bernice 21 October 2013 (has links)
The aim of this research is to investigate how handwriting as an individualisation technique in fraud investigation can be used by police detectives, SARS investigators and forensic investigation specialists, who are responsible for the investigation and linking the perpetrator, with a view to criminal prosecution. A further intent was to share and introduce a number of important concepts, namely: criminal investigation, identification, individualisation, fraud, evidence and handwriting. The research will explain the sophisticated investigation techniques used to obtain sufficient information to prove the true facts in a court of law. Identification is the collective aspect of the set of characteristics by which an object is definitively recognisable or known, while the individual characteristics establish the individuality of a specific object. Many types of evidence may be used to link an individual with a crime scene, and associate that individual with the performed illegal handling. It also explained that during a cheque/document fraud investigation, it is in most cases the only link to information to trace, identify and individualise the perpetrator, and to obtain a handwriting specimen. It is also discussed how to eliminate a person being a writer of a document, and how to collect, package and mark a disputed document during the investigation. If the investigators use their knowledge of these concepts, it should enhance their investigative skills, and empower them to be become better equipped for the challenges they face in identifying, individualising and linking the perpetrators, in order to ensure successful prosecution and conviction. / Police Practice / M.Tech. (Forensic Investigation)
34

The best practices applied by forensic investigators in conducting lifestyle audits on white collar crime suspects

Gillespie, Roy Tamejen 05 1900 (has links)
This research looks at the best practices applied by forensic investigators in conducting lifestyle audits on white collar crime suspects. The researcher explored, firstly, how a lifestyle audit relates to white collar crime investigations; secondly, the best practices in performing lifestyle audits on white collar crime suspects, and lastly, the various sources of information available to forensic investigators when conducting a lifestyle audit of a white collar crime suspect. As lifestyle audits will serve as an investigative tool in future forensic investigations into white collar crime, this study’s aim was to understand and create an awareness of the current best practices applied by forensic investigators within private sector forensic investigation practices while conducting lifestyle audits during white collar crime investigations. It also makes available research data regarding the concept of lifestyle audits in white collar crime investigations, the implementation of these audits, the benefits, and the best practices of these audits. The general purpose of this study was to provide practical recommendations on the best practices for lifestyle audits for forensic investigators within private sector. / Criminology and Security Science / M. Tech. (Forensic Investigation)
35

Interviewing child victims : improve communication and understand child behaviour

Masango, Kate Iketsi 02 1900 (has links)
This research investigates the communication abilities of children who are exposed to criminal investigations because a crime was committed against them or they have witnessed a crime happening to another person. The study also determines how crime detectives can maximise their efforts in obtaining evidence from such children with the help of an interview as a technique to elicit information. The aim of the research was to understand the behaviour of children, so that more effective investigative interviews can be undertaken with child victims. The researcher wanted to identify the communication challenges associated with obtaining information from child victims and possible ways to overcome such challenges. It was found that the developmental stages of children, the manner in which interviewers/investigators conduct themselves during child interviews and the amount of knowledge possessed by interviewers to elicit information in a legally defensible manner are central to child victim interviews. / Criminology and Security Science / M. Tech. (Forensic Investigation)
36

Procedures for searching evidence in the investigation of computer-related crime in Bulawayo, Zimbabwe

Ncube, Njabulo 11 1900 (has links)
Text in English / The continued advancement in myriad technological, societal and legal issues has affected the investigation of computer aided crimes. The investigators are confronted with tremendous impediments as the computer aided and traditional crime scenes differ. The study sought to analyse the procedures for searching evidence in the investigation of computer-related crime with the intention to improve admissibility of such evidence. The researcher employed empirical design to reach conclusions based upon evidence collected from observations and real life experiences. This aided the researcher to obtain information through face-to-face interviews. The study was qualitative in approach as it consisted of a set of interpretive and material practices that make the real social world visible. The training curriculum for investigators should include aspects of computer-related crime investigation, search and seizure of computer evidence. Search and collection of computer-related evidence should be done preferably by qualified forensic experts, so that evidence is accepted in court. / Police Practice / M. Tech. (Forensic Investigation)
37

The use of physical surveillance in forensic investigation

Knoesen, Andre Leon 11 1900 (has links)
The problem that was identified is that physical surveillance is not generally used by general detectives in the South African Police Service as a technique during their investigations. According to the researcher’s experience, this can be due to lack of understanding or experience or may stem from ignorance. A lack of training on the use of physical surveillance as a method to obtain information for the investigation process was also identified as a problem. This study therefore investigated the role and use of physical surveillance within the forensic investigation process. The focus of the research was on basic static (stationary), foot and vehicle surveillance as these types of surveillance are usually conducted in conjunction with each other. An empirical research design was used to conduct the research. A qualitative research approach enabled the researcher to obtain first-hand information from interviews with general detectives. Information was also obtained from a thorough literature study and from the researcher’s own experience on the topic. To conduct effective investigation, it is important for investigators to be familiar with the concept of physical surveillance, its elements, its influence and its values. A physical surveillance operation is a forensic tool used to gather evidence, to recover stolen property, and to identify and arrest the perpetrator. The use of physical surveillance during investigations serves the purpose of gathering evidence and information that can be used as intelligence. Successful forensic investigation requires skill and places extraordinary demands on detectives to utilise all available methods and techniques. The recognition of the use of physical surveillance as a method of evidence gathering is of outmost importance. The research has revealed that general detectives do not acknowledge the importance of physical surveillance as a method to obtain information for the investigation process. It is of vital importance that all detectives be properly trained with the necessary knowledge and skills to make use of this valuable investigative tool. / Police Practice / M. Tech. (Forensic Investigation)
38

Utilisation of the financial intelligence centre as a crime intelligence source

Mostert, Derick 11 1900 (has links)
The research was conducted as a result of the researcher‟s concern that the possibility exists that members of the different law enforcement agencies in South Africa might have a misconception about the mandate and functions of the Financial Intelligence Centre. If such a misconception in fact exists, it poses a huge challenge towards fruitful co-operation among the Centre and the different law enforcement agencies. The researcher identified certain practical problems, namely, that investigators are not aware of the types of intelligence that the Centre could provide them with, and that investigators might not be informed about the specific procedures to follow when they need to request intelligence from the Centre. The research has shown that, in the past, the Centre has been a useful source of crime intelligence concerning a range of predicate offences including narcotics, fraud and tax related crimes. The research has further found that, although the majority of participants gained a lot of experience in law enforcement and investigations, they had limited awareness about the Financial Intelligence Centre and its functions. This research project studied the utilisation of the Financial Intelligence Centre as a crime intelligence source. / Police Practice / M. Tech. (Forensic Investigation)
39

The post-mortem as a source of information in the investigation of murder

Bila, Hlengani Phanuel 05 1900 (has links)
The research is concerned with how the post-mortem report can be used as a source of information in the investigation of murder cases to identify crime, individual crimes and trace suspects, etc. The understanding of the post-mortem report, and the information which can be obtained from it, will assist the police investigators to handle murder cases in a professional way. The purpose of this research was to evaluate the existing manner in which police investigators use post-mortem reports in their investigations, with the intention of determining its strengths and weaknesses, and considering how the usage can be improved. Secondly, the researcher wanted to explore how investigators use postmortem reports as a source of information in their investigations. To accomplish this, the researcher perused international and national literature in an attempt to explore the field. The researcher wanted to apply the new research knowledge in order to develop good practice in the field. This has been done by recommending new procedures to enhance performance and to improve the conviction rate in court cases. / Police Practice / M.Tech. (Forensic Investigation)
40

The value of investigative profiling of fraud offenders by forensic investigators

Sivnarain, Ranesh 10 1900 (has links)
The problem that the researcher encountered was that forensic investigators were found not to be formally using offender profiling as an investigative technique during investigations into fraud. This research was conducted to ascertain how offender profiling may be useful in expediting the forensic investigation process. The purpose of this research was to establish what offender profiling is, and what aspects or ingredients constitute such an offender profile. As offender profiles will serve as an aid in future forensic investigations into fraud, this study attempted to create an understanding and awareness of the value of offender profiling. In order for forensic investigators to use offender profiling during routine fraud investigations, it is extremely important that they understand the concept and its practical implementation. The overall purpose of this study is to provide practical recommendations for the implementation and use of offender profiling to forensic investigators both in the public and private sectors. / Criminal and Procedural Law / (M.Tech. (Forensic Investigation))

Page generated in 0.1737 seconds