• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 29
  • 2
  • 1
  • Tagged with
  • 35
  • 35
  • 35
  • 21
  • 19
  • 18
  • 17
  • 15
  • 11
  • 11
  • 10
  • 9
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Factors affecting implementation of enterprise applications integration (EAI) with special reference to corruption and fraud in DOD

Phalama, Mmabore S. H. 03 1900 (has links)
Thesis (MPhil)--Stellenbosch University, 2012. / ENGLISH ABSTRACT: Corporate mergers and partnerships are common in today’s competitive environment and inevitably require organisations to integrate information and telecommunication systems when such unisons take place. One of the most important challenges in each enterprise, especially forced by global markets and the resulting competition, is the capability to efficiently interact, collaborate and exchange information with business partners and within an organisation. Many software systems within organisations are not integrated into a homogeneous structure and therefore the sharing and exchange of information, not being synchronised, leads to possible misappropriation of such information. These isolated systems in organisations, could consequently become possible platforms for corruption and fraud, leading to increase in computer crime. While key risk areas remain, new dangers are emerging. Government stakeholders require departments to be accountable and responsible, which underpins the sharing and exchanging of relevant information, which in turn necessitates the integration of inter- as well as intra-departmental systems. If corruption and fraud is committed in these departments the impact may be significant, including damage to their reputation and image and even detrimental to service delivery to communities. Government and law enforcement agencies all over the world are faced with challenges of combating corruption and fraud. Fighting corruption and fraud committed via computers necessitates the need to close the gaps created by computers which were designed without consideration for future integration. Hence organisations should seek a way to link systems that were developed in isolation in order to simplify and automate business processes to the greatest extent possible. The aim of this study is to discuss factors affecting the implementation of application systems in large organisations with special reference to the South African Department of Defence (SA DOD). Current systems will be studied and a possible approach on how the DOD Vehicle Management Systems could be integrated will be recommended. This study introduces and defines the problem, describes different research methodologies including the methodology that was used. The topics of corruption and fraud, electronic commerce and e-government will be explored through intensive research of the extant literature, drawing interpretations to be applied to the empirical data gathered on fraud and corruption in DOD and on their ITC systems. Finally the findings and recommendations of this research, based on the theoretical and empirical data, will be presented. / AFRIKAANSE OPSOMMING: Korporatiewe oornames en vennootskappe is algemeen in vandag se kompeterende omgewing. Dit is dus onvermydelik dat daar van ondernemings verwag word om informasie en telekommunikasie stelsels te integreer by die paasvind van sulke verbintenisse. Een van die mees belangrike uitdagings in elke onderneming, veral in die lig van globale markte met die gevolglike kompeterende uitdagings, is die vermoë vir effektiewe interaksie, samewerking en uitruil van inligting met besigheidsvennote en ook in die onderneming self. Talle sagteware stelsels in ondernemings is nie geïntegreer in ʼn homogene struktuur nie en gevolglik, omdat dit nie gesinkroniseer is nie, lei die deel en uitruil van informasie tot moontlike wederregtelike toe-eiening van sulke informasie. Sulke geïsoleerde stelsels in ondernemings kan dus die platvorms word van korrupsie en bedrog en lei tot ʼn verhoging van rekenaarmisdywe. Terwyl sleutel risiko areas steeds van toepassing is, is daar ook weer nuwe gevare wat te voorskyn kom. Die Staat se aandeelhouers vereis dat departemente aanspreeklik en verantwoordelik sal wees wat die belangrikheid van die deel en uitruil van inligting onderstreep en wat op sy beurt weer die integrasie van inter- asook intradepartementele stelsels noodsaak. As misdaad en korrupsie gepleeg word in hierdie departemente mag die impak betekenisvol wees. Dit sluit in skade aan hul reputasie en beeld en kan selfs dienslewering aan gemeenskappe belemmer. Om korrupsie en bedrog wat met rekenaars gepleeg word te beveg, is dit nodig om die gapings toe te maak wat deur ontwerpe geskep is sonder dat toekomstige integrasie inaggeneem is. Ondernenings moet dus ‘n manier soek om stelsels te koppel wat in isolasie ontwikkel was met die doel om besigheidsprosesse tot die grootste moontlike mate te vereenvoudig en te outomatiseer. Die doel van hierdie studie is om die faktore te ondersoek wat die implementering van stelsels beïnvloed in groot ondernemings met spesifieke verwysing na die Suid Afrikaanse Departement van Verdediging (SA DVV). Huidige sisteme sal bestudeer word en ʼn moontlike benadering sal aanbeveel word oor hoe die DVV se Voertuig Bestuurstelsels geintegreer kan word. In hierdie studie word die besiheids- asook die navorsings-probleem gedefineer. Die onderwerpe van korrupsie en bedrog, elektroniese handel en e-regering sal ondersoek word deur intensiewe navorsing van bestaande literatuur te doen. Dit word aangevul deur vertolkings van die hierdie toepaslike literatuur gepaard met empiriese data versameling oor bedrog en korrupsie in die DVV en die Departement se “ITK” stelsels. As finale stap sal die bevindings en aanbevelings van hierdie navorsing, gebasseer op teoretiese en impiriese data, aangebied word.
12

An investigation into the provision of government social grants to people with disabilities in Amathole Distrcit municipality

Aplom, Thobeka January 2016 (has links)
This study seeks to investigate the efficiency and effectiveness of the process for providing government social grants to people with disabilities in the South African Social Security Agency (SASSA) Amathole District Municipality in order to determine the need for any improvement measures. Taylor’s scientific management theory and the Total Quality Management (TQM) concept were used to interpret efficiency in the functional activities of the officials working in the Disability Grant Unit in Amathole District. The study also sought to answer the question of whether exit programmes existed that were designed to assist the beneficiaries to support them and cater for their needs related to their disabilities. The study followed a qualitative method. Face-to-face interviews were conducted and the sample of this study consisted of ten participants who are working at Grant Administration. These participants included one General Manager; one District Manager; one SASSA doctor; one Head of Grants Administration in the district and six officials who are at lower levels of the hierarchy at Amathole District Municipality in East London service office. Thematic analysis was used to identify themes from the interviews. The findings of this study revealed that the majority of the respondents experienced challenges such as lack of assessment doctors, turn around-time, corruption, poor consultation, lack of managerial commitment and doctors regarding the assessment of applications. In this regards, the study made a set of recommendations on the measures and strategies that could improve efficiency in the provision of this service.
13

An evaluation of identification methods used in the investigation of counterfeit card fraud

Geldenhuys, Nicolaas D. C. 02 1900 (has links)
Today, the use of one's bank card to pay or withdraw money is common. Modern technology provides us with the convenience of instant transactions at the automated teller machine or point of sale but unfortunately, it has also brought the reality and risk of card skimming and counterfeit card fraud. Criminals have become very efficient and technologically advanced in skimming and counterfeiting cards, to such an extent that counterfeit card fraud has become a significant threat to the public, banking, retail and business in South Africa. Counterfeit card fraud is a complex, multi-faceted crime, requiring specific skills and knowledge of card counterfeiting methods from police and bank investigators. The scope of its investigation is wide. It includes different crime scenes and offenders, sophisticated equipment and various aspects that need to be identified positively. Investigators find it difficult to identify perpetrators and certain aspects unique to this crime and, as a result, many investigations are unsuccessful. This research endeavours to establish what identification methods are available to investigators and which are effective. / Police Practice / M. Tech. (Forensic Investigation)
14

The analysis of a cheque to identify crime

Kruger, Deidre Jacoba 28 February 2006 (has links)
In this study the main focus of the researcher was to analyse a cheque to identify crime. This study intends to give the forensic investigator a guideline to follow during the analysis of a cheque under investigation. Crimes that could be detected during the analysis of a cheque are fraud, forgery and uttering. Other aspects were also explained to ensure a better understanding of the study, namely: forensic investigation, forensic investigator, identification and crime scenes. Forensic investigation is a systematic search for the truth with the primary purpose of finding a positive solution to a crime. Forensic investigation is not a game of chance, or based on storybook types of coincidences. Therefore, forensic investigators cannot rely on coincidental success to come their way. It is true that luck sometimes plays a role in forensic investigations, but it is the thorough investigator who creates his/her own opportunities and arrives at the right place at the right time. In order for a forensic investigator to strive for excellence, he/she must have a good knowledge of his/her field of work. It is important for the forensic investigator to understand that identification plays an important role in forensic investigation. An additional benefit is derived when one can individualise something because it makes the identification much more valuable. All crime scenes should furthermore be managed in such a way that all physical evidence can be collected in order to ensure successful prosecution and conviction in a court of law. It is the belief of the researcher that because cheques are not acknowledged as crime scenes and therefore not properly handled or protected, many investigations fail in court and the accused are acquitted. / Criminology / M. Tech. (Forensic Investigation)
15

Developing a checklist for examining a fraudulent cheque

Meijer, Annelie 28 February 2006 (has links)
My goal in this research was to develop a checklist for examining a cheque for information that can be used to identify, individualise and trace the perpetrator of a crime. A further intent was to share and introduce a number of important concepts, namely forensic investigation, identification, individualisation, the Locard principle and crime scene. This research will explain that forensic investigation refers to the using of sophisticated investigation techniques to obtain sufficient information to prove the true facts in a court of law. Further, that identification is the collective aspect of the set of characteristics by which an object is definitively recognisable or known, while the individual characteristics establish the individuality of a specific object. To link an individual with a crime scene, many types of evidence may be used and to associate an individual with the performed illegal handling, many types of evidence may be used. These types of evidence are commonly referred to as ”transfer” evidence. This process is also referred to as the ”Locard principle”. Lastly, a crime scene is explained as a place where a crime has occurred. It is also explained to be a ”laboratory of information” and therefore, during a cheque fraud investigation, the cheque is in most cases the only link to information to trace, identify and individualise the perpetrator. Therefore, the cheque should be treated as a crime scene. If forensic investigators use their knowledge of these concepts together with the checklist, it should enhance their investigation skills and empower them to become better equipped for the challenges they face in identifying, individualising and tracing the perpetrators in order to ensure successful prosecution and conviction. I believe all forensic investigators will benefit from what I have discovered through this research and I am very pleased to be able to introduce this checklist to you. / Criminology / M.Tech. (Forensic Investigation)
16

The analysis of a cheque to identify crime

Kruger, Deidre Jacoba 28 February 2006 (has links)
In this study the main focus of the researcher was to analyse a cheque to identify crime. This study intends to give the forensic investigator a guideline to follow during the analysis of a cheque under investigation. Crimes that could be detected during the analysis of a cheque are fraud, forgery and uttering. Other aspects were also explained to ensure a better understanding of the study, namely: forensic investigation, forensic investigator, identification and crime scenes. Forensic investigation is a systematic search for the truth with the primary purpose of finding a positive solution to a crime. Forensic investigation is not a game of chance, or based on storybook types of coincidences. Therefore, forensic investigators cannot rely on coincidental success to come their way. It is true that luck sometimes plays a role in forensic investigations, but it is the thorough investigator who creates his/her own opportunities and arrives at the right place at the right time. In order for a forensic investigator to strive for excellence, he/she must have a good knowledge of his/her field of work. It is important for the forensic investigator to understand that identification plays an important role in forensic investigation. An additional benefit is derived when one can individualise something because it makes the identification much more valuable. All crime scenes should furthermore be managed in such a way that all physical evidence can be collected in order to ensure successful prosecution and conviction in a court of law. It is the belief of the researcher that because cheques are not acknowledged as crime scenes and therefore not properly handled or protected, many investigations fail in court and the accused are acquitted. / Criminology and Security Science / M. Tech. (Forensic Investigation)
17

Developing a checklist for examining a fraudulent cheque

Meijer, Annelie 28 February 2006 (has links)
My goal in this research was to develop a checklist for examining a cheque for information that can be used to identify, individualise and trace the perpetrator of a crime. A further intent was to share and introduce a number of important concepts, namely forensic investigation, identification, individualisation, the Locard principle and crime scene. This research will explain that forensic investigation refers to the using of sophisticated investigation techniques to obtain sufficient information to prove the true facts in a court of law. Further, that identification is the collective aspect of the set of characteristics by which an object is definitively recognisable or known, while the individual characteristics establish the individuality of a specific object. To link an individual with a crime scene, many types of evidence may be used and to associate an individual with the performed illegal handling, many types of evidence may be used. These types of evidence are commonly referred to as ”transfer” evidence. This process is also referred to as the ”Locard principle”. Lastly, a crime scene is explained as a place where a crime has occurred. It is also explained to be a ”laboratory of information” and therefore, during a cheque fraud investigation, the cheque is in most cases the only link to information to trace, identify and individualise the perpetrator. Therefore, the cheque should be treated as a crime scene. If forensic investigators use their knowledge of these concepts together with the checklist, it should enhance their investigation skills and empower them to become better equipped for the challenges they face in identifying, individualising and tracing the perpetrators in order to ensure successful prosecution and conviction. I believe all forensic investigators will benefit from what I have discovered through this research and I am very pleased to be able to introduce this checklist to you. / Criminology and Security Science / M.Tech. (Forensic Investigation)
18

The value of investigative profiling of fraud offenders by forensic investigators

Sivnarain, Ranesh 10 1900 (has links)
The problem that the researcher encountered was that forensic investigators were found not to be formally using offender profiling as an investigative technique during investigations into fraud. This research was conducted to ascertain how offender profiling may be useful in expediting the forensic investigation process. The purpose of this research was to establish what offender profiling is, and what aspects or ingredients constitute such an offender profile. As offender profiles will serve as an aid in future forensic investigations into fraud, this study attempted to create an understanding and awareness of the value of offender profiling. In order for forensic investigators to use offender profiling during routine fraud investigations, it is extremely important that they understand the concept and its practical implementation. The overall purpose of this study is to provide practical recommendations for the implementation and use of offender profiling to forensic investigators both in the public and private sectors. / Criminal and Procedural Law / (M.Tech. (Forensic Investigation))
19

The significance of physical surveillance as a method in the investigation of insurance fraud: a Discovery Life perspective

Visser, Bennet Louis 10 1900 (has links)
Text in English / The primary aim of this study is to determine the significance of the application of physical surveillance as a method in the investigation of insurance fraud conducted by the Surveillance Unit at the Forensic Department of Discovery Life. Various objectives were fulfilled in this study:  To explore, identify and describe the value of the application of physical surveillance, as a forensic investigation method, in order to determine the significance of this method in the investigation of insurance fraud at the Forensic Department of Discovery Life.  To determine whether the application of physical surveillance at the Forensic Department of Discovery Life is achieving its intended objective relating to the degree to which the beneficiary’s (Discovery Life) situation has changed as a result of this method.  To apply new information, acquired from the findings of this study, to further develop good practice and enhance performance in order to empower investigators at Discovery Life with new knowledge relating to the application of physical surveillance in the investigation of insurance fraud. Semi-structured interviews were conducted with forensic investigators employed at the Forensic Department at Discovery Life. The research has revealed that the majority of forensic investigators, other than the Surveillance Unit, at the Forensic Department of Discovery Life do not utilise physical surveillance during insurance fraud investigations to assist them in gathering evidence. These investigators also had a lack of knowledge and skills regarding the utilisation of physical surveillance during insurance fraud investigations and the advantages of this method during insurance fraud investigations. As a result of the non-utilisation of physical surveillance during insurance fraud investigations conducted at the Forensic Department of Discovery Life, important information and evidence with regard to the movement and actions of identified perpetrators who commit insurance fraud are lost to the investigators. However, the significance of the application of physical surveillance in the investigation of insurance fraud is emphasised by the forensic investigators attached to the Surveillance Unit of Discovery Life who utilise physical surveillance on a daily basis to investigate insurance fraud. The research has further revealed that insurance fraud is a major concern to the insurance industry, but can be mitigated through the implementation of unconventional investigative methods, such as physical surveillance, to enhance investigative capabilities. It was recommended that all forensic investigators at Discovery Life be trained in the techniques of physical surveillance to address shortcomings of general and out-dated investigation methods. / Criminology and Security Science / M. Tech. (Forensic Investigation)
20

The value of investigative profiling of fraud offenders by forensic investigators

Sivnarain, Ranesh 10 1900 (has links)
The problem that the researcher encountered was that forensic investigators were found not to be formally using offender profiling as an investigative technique during investigations into fraud. This research was conducted to ascertain how offender profiling may be useful in expediting the forensic investigation process. The purpose of this research was to establish what offender profiling is, and what aspects or ingredients constitute such an offender profile. As offender profiles will serve as an aid in future forensic investigations into fraud, this study attempted to create an understanding and awareness of the value of offender profiling. In order for forensic investigators to use offender profiling during routine fraud investigations, it is extremely important that they understand the concept and its practical implementation. The overall purpose of this study is to provide practical recommendations for the implementation and use of offender profiling to forensic investigators both in the public and private sectors. / Criminal and Procedural Law / (M.Tech. (Forensic Investigation))

Page generated in 0.0666 seconds