• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 60
  • 3
  • 2
  • Tagged with
  • 70
  • 70
  • 45
  • 44
  • 44
  • 35
  • 26
  • 24
  • 19
  • 18
  • 15
  • 13
  • 13
  • 13
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Investigation of misrepresentation in tender documents

Mynhardt, Armand Johann 11 1900 (has links)
Construction companies, in particular, abuse the objectives of BEE in order to secure multimillion-rand contracts. Misrepresentations, specifically to the Department of Public Works, are made in various forms and stages during the submission of tender documentation by contractors. The status of BEE company owners is abused in order to secure contracts. Apartheid in South Africa prevented black citizens from entering the corporate world and thereby attaining a quality education. The South African government has, since 1994, adopted the BEE policy in order to redress racial and economic imbalances of the past. Fronting (which is regarded as fraud) is detrimental to the objectives of BEE, which are governed by legislation. Fronting further negatively affects the transformation of the South African economy which could be globally competitive. Fraud detection and its investigation are two concepts which are closely linked to each other and are vitally important to any fraud investi-gator. / Police Practice / M. Tech. (Forensic Investigation)
42

The value of modus operandi in investigating child support grant fraud

Thenga, Godfrey 11 1900 (has links)
While establishing modus operandi information is an investigative technique that is used globally in the investigation of fraud, investigators of child support grant fraud in South Africa do not properly use this technique in their investigation. The study sought to examine the modus operandi used by civil servants in unduly accessing child support grand fraud. The study adopted a qualitative approach, with structured interviews and literature as data-collection methods. Two sample groups were used to gather data. The data was analysed using spiral method. The study found that modus operandi as a valuable investigation tool was not properly used and in other instances was never used in the investigations. On the basis of the findings, it is recommended that modus operandi captured on the police and corporate database systems be used as reference for comparing modus operandi of known grants fraudsters. Training and skills be provided to public and corporate investigators on the use of modus operandi information in the investigation of social grants. To ensure that good practice is developed, a modus operandi guideline document should be crafted by the South African Police Services' detective division at National level and corporate investigators respectively, with a view to improve conviction rate. / Criminology and Security Science / M. Tech. (Forensic Investigation)
43

The use of body language (behaviour pattern recognition) in forensic interviewing

Naidoo, Shantell 02 1900 (has links)
With this study, the researcher wants to establish whether investigators are able to effectively interpret, report on, or pay cognisance to body language during interviews, and whether they are sufficiently trained therein. Knowledge of body language can provide the interviewer with vital clues during the interview process. Regardless of the availability of numerous literatures on nonverbal behaviour in interviewing, the application of this knowledge is lacking among investigators. An empirical research design and a qualitative research approach were used for this research. National and international literature sources were consulted, and the researcher conducted interviews with two experts, knowledgeable investigators and semi-structured interviews with detectives from the East London South African Police Service (SAPS) and forensic investigators from the Special Investigating Unit (SIU) in East London. The importance of the skill of interpreting body language during forensic interviewing was established. Evidently, many investigators do not apply their knowledge and skill to enhance the outcomes of a forensic interview. / Criminology and Security Science / M. Tech. (Forensic Investigation)
44

The value of investigative profiling of fraud offenders by forensic investigators

Sivnarain, Ranesh 10 1900 (has links)
The problem that the researcher encountered was that forensic investigators were found not to be formally using offender profiling as an investigative technique during investigations into fraud. This research was conducted to ascertain how offender profiling may be useful in expediting the forensic investigation process. The purpose of this research was to establish what offender profiling is, and what aspects or ingredients constitute such an offender profile. As offender profiles will serve as an aid in future forensic investigations into fraud, this study attempted to create an understanding and awareness of the value of offender profiling. In order for forensic investigators to use offender profiling during routine fraud investigations, it is extremely important that they understand the concept and its practical implementation. The overall purpose of this study is to provide practical recommendations for the implementation and use of offender profiling to forensic investigators both in the public and private sectors. / Criminal and Procedural Law / (M.Tech. (Forensic Investigation))
45

Forensiska Artefakter hos Mobila Applikationer : Utvinning och Analys av Applikationen Snapchat

Nordin, Anton, Liffner, Felix January 2019 (has links)
Today's smartphones and tablets use different applications and software for all sorts of purposes: communication, entertainment, fitness, to share images with each other, to keep up to date with the news and lots of different daily tasks. With the heavy usage of all these apps, it is no wonder that it comes with a few issues. Private data is stored in large quantities both on the local device and on the app-creators' servers. It is no wonder that applications advertising user secrecy and transient storage of user data. One of these applications is Snapchat, with over 500 million downloads on Google Play store, at the time of writing. Snapchat is a communication application with the niched feature that the images and messages sent, disappear once opened or after 24 hours have passed. With the illusion of privacy behind Snapchats niche it has become a breeding ground for criminal activity. The niche itself translates to a troublesome hurdle for law enforcement trying to retrieve evidence from devices of Snapchat users. This paper is aimed to investigate these issues and perform a methodology to retrieve potential evidence on a device using Snapchat to send images and messages. By performing a physical acquisition on a test device and analyzing to find artifacts pertaining to Snapchat and the test-data that was created. The method is performed on a Samsung Galaxy S4 with Android 5.0.1 running Snapchat version 10.52.3.0. Test data such as different images and messages were created and attempted to be retrieved at three points in time. First one being right after data creation. Second one after a restart and 24 hours after the data was created. And the third with 48 hours passed and the Snapchat user logged out at the time of acquisition. The acquisition resulted in the extraction of several sent images and a full text conversation between the experimental device and another party. A full video which was uploaded by the receiving user was able to be extracted even though the experimental device never actually viewed the video. The second acquisition which was made when 24h had passed gave the same results as the first one. This meant that time at least up to a day after the initial creation of the data did not have any effect on the evidence. However, when the Snapchat user was logged out from the application, the data was then unobtainable and had disappeared. Presumably Snapchat has a function which deletes personal data about the user when logged out from the application. This function might become a hurdle in law enforcement investigations where the application Snapchat is involved.
46

An evaluation of the management of deoxyrinucleic acid (DNA) evidence / An evaluation of the management of deoxyribonucleic acid (DNA) evidence

Dywaba, Zukiswa Morencia 09 1900 (has links)
DNA is identified as a powerful tool in the solving of rape cases, but it is often destroyed either by members of the public or the police officials who attend to the scene. The aim of the study was to evaluate the management of DNA evidence in rape cases in the Bishop Lavis Policing Area. To address the research topic under investigation, research questions, a legal framework and policies were used. The outcome of the study indicated poor performance in securing the crime scene and ensuring that physical evidence is preserved and not tampered with. On this basis, it was recommended that developmental workshops and intensive training on the management of DNA evidence be conducted to all members of the South African Police Service attend to rape crime scenes. This should be done to equip them with knowledge and an understanding of the management of DNA evidence. / Police Practice / M. Tech. (Forensic Investigation)
47

The exploration of appraising internal controls to detect procurement fraud during the tender stage at mines

Venter, Jan Willem Nicolaas 02 1900 (has links)
Text in English / Procurement fraud is an enormous problem and the South African news is perforated with reports of this illicit act. Procurement fraud occurs in all the phases of the procurement cycle, but this illicit act is mostly committed during the tender phase. Business does not see procurement fraud as a crime and therefor this crime is committed due to non-existent internal controls and processes to assess the adequacy of these controls. The purpose of the research was to highlight that procurement fraud occurs when internal controls are being bypassed or if an entity has an ineffective internal control system. The researcher studied the appraising of internal controls to understand the role it plays in detecting, preventing and investigating procurement fraud, specifically during the tender phase. The research design utilised was a qualitative research approach and an empirical design plan or strategy, to obtain the information. The researcher opted for this design to obtain information from literature and information from individuals in appraising internal controls. This ensured a comprehensive data gathering process. The goal of this research was to provide practical recommendations to assist investigators in private and public sectors with investigations into procurement fraud during a tender. / Police Practice / M. Tech. (Forensic Investigation)
48

The recruitment and management of agents in undercover drug trafficking criminal investigations

Naicker, Kevin 02 1900 (has links)
Text in English / The organized and sophisticated way in which criminal targets conduct the crime of drug trafficking, necessitates the use of undercover agents in undercover drug trafficking criminal investigations. The goal of this research was to determine how agents should be recruited and managed for undercover drug trafficking criminal investigations. The correct recruitment and management processes when dealing with agents in undercover drug trafficking criminal investigations, which enable investigators to follow a logical sequence, was explored by the researcher. The entire recruitment process of agents in undercover drug trafficking criminal investigations was discussed, from studying the criminal target, identification of a suitable agent and then the recruitment process itself. Legal aspects and administrative processes to be utilized to manage agents were discussed. The researcher utilized national and international literature sources to gather new and current information on the recruitment of agents in undercover drug trafficking investigations. Interviews were conducted with retired and experienced former South African Police Service (SAPS) officials who managed and recruited agents during their employment in the SAPS. The general purpose of this research was to provide practical recommendations on the best practices for the recruitment and management of agents in undercover drug trafficking criminal investigations. / Police Practice / M.Tech. (Forensic Investigation)
49

The investigative methodology to initiate internal investigations in the South African corporate environment

Ferreira, De Wet 07 1900 (has links)
Conducting internal investigations in the corporate environment in South Africa has become an everyday occurrence where companies need to take action after an incident took place. Each company has a different view regarding their processes followed when investigating internal matters, and the different objectives that drive the process. Some companies would prefer the suspects be disciplined and removed from their employment, and no further action taken after the dismissal and some companies would have a different approach and would follow the process through the disciplinary, the criminal prosecution and institute civil litigation to recover losses. Investigation differs, and the approach would be different as well with various reasons for the approach of the company. To establish what the methodology is that is followed when initiating an internal investigation and the drive behind the methodology followed was done. The methodology and process followed determines how the internal investigation process is done and concluded to ensure that similar incidents do not occur again, and thus protect the corporate environment in South Africa. / Police Practice / M. Tech. (Forensic Investigation)
50

An evaluation of the role of forensic science in crime scene reconstruction

Singh, Sherwin 06 1900 (has links)
In this research, the role of forensic science with the use of forensic photography in the crime scene reconstruction process was evaluated. The researcher identified how SAPS detectives and Crime Scene Technicians (CST‟S) are currently conducting crime scene reconstructions by adopting forensic photography; furthermore, other methods in which forensic photography could be used to conduct crime scene reconstructions were explored. The researcher made use of an empirical design, as the information available on the research topic was limited. The empirical design, together with a qualitative research approach, allowed for real-life observations. The simple random sampling method was used to select 20:10 partcipants for this research as follows: Ten (10) detectives that investigate murder cases, and another ten (10) CST‟S that conducted crime scene reconstructions in the Durban Policing Area (DPA). Data was obtained using qualitative data collection methods that included a literature study and interviews. The findings of this research provide that the value of forensic science, as well as the use of forensic photography in the crime scene reconstruction process, was established. Evidently, detectives and CST‟S are not doing everything possible to reconstruct murder crime scenes. For recommendation, this research suggests that SAPS detectives and crime scene technicians (CST'S) adopt the fundamentals of forensic science when reconstructing murder crime scenes. / Criminology and Security Science / M. Tech. (Forensic Investigation)

Page generated in 0.1099 seconds