• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 51
  • 2
  • 1
  • Tagged with
  • 57
  • 57
  • 37
  • 37
  • 32
  • 24
  • 24
  • 19
  • 17
  • 13
  • 13
  • 13
  • 12
  • 12
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Investigation of misrepresentation in tender documents

Mynhardt, Armand Johann 11 1900 (has links)
Construction companies, in particular, abuse the objectives of BEE in order to secure multimillion-rand contracts. Misrepresentations, specifically to the Department of Public Works, are made in various forms and stages during the submission of tender documentation by contractors. The status of BEE company owners is abused in order to secure contracts. Apartheid in South Africa prevented black citizens from entering the corporate world and thereby attaining a quality education. The South African government has, since 1994, adopted the BEE policy in order to redress racial and economic imbalances of the past. Fronting (which is regarded as fraud) is detrimental to the objectives of BEE, which are governed by legislation. Fronting further negatively affects the transformation of the South African economy which could be globally competitive. Fraud detection and its investigation are two concepts which are closely linked to each other and are vitally important to any fraud investi-gator. / Police Practice / M. Tech. (Forensic Investigation)
42

The value of modus operandi in investigating child support grant fraud

Thenga, Godfrey 11 1900 (has links)
While establishing modus operandi information is an investigative technique that is used globally in the investigation of fraud, investigators of child support grant fraud in South Africa do not properly use this technique in their investigation. The study sought to examine the modus operandi used by civil servants in unduly accessing child support grand fraud. The study adopted a qualitative approach, with structured interviews and literature as data-collection methods. Two sample groups were used to gather data. The data was analysed using spiral method. The study found that modus operandi as a valuable investigation tool was not properly used and in other instances was never used in the investigations. On the basis of the findings, it is recommended that modus operandi captured on the police and corporate database systems be used as reference for comparing modus operandi of known grants fraudsters. Training and skills be provided to public and corporate investigators on the use of modus operandi information in the investigation of social grants. To ensure that good practice is developed, a modus operandi guideline document should be crafted by the South African Police Services' detective division at National level and corporate investigators respectively, with a view to improve conviction rate. / Criminology and Security Science / M. Tech. (Forensic Investigation)
43

Significance of bank records analysis as a technique in tracing fraud suspects

Myeza, Nkosinathi Wonderboy 12 1900 (has links)
Text in English / The research attempts to establish the significance of bank records analysis as a technique in tracing fraud suspects. The purposes of conducting this research was to establish the current approach by the investigators of the SAPS in respect of bank records analysis in tracing fraud suspects; to explore and report on the findings of national and international literature in an attempt to find new information thereby improving the current method of bank records analysis and its specific use in tracing fraud suspects; and to make new information, in the form of written articles and this dissertation, available to the SAPS to be considered for inclusion in the training curriculum for their investigators. In collecting data, the researcher used literature study, interviews with individual participants and case dockets analysis. Essentially, the recommendations were drawn from the conclusions of the data obtained. These recommendations may offer solutions to the problem identified. / Criminology and Security Science / M. Tech. (Forensic Investigation)
44

The significance of physical surveillance as a method in the investigation of insurance fraud: a Discovery Life perspective

Visser, Bennet Louis 10 1900 (has links)
The primary aim of this study is to determine the significance of the application of physical surveillance as a method in the investigation of insurance fraud conducted by the Surveillance Unit at the Forensic Department of Discovery Life. Various objectives were fulfilled in this study:  To explore, identify and describe the value of the application of physical surveillance, as a forensic investigation method, in order to determine the significance of this method in the investigation of insurance fraud at the Forensic Department of Discovery Life.  To determine whether the application of physical surveillance at the Forensic Department of Discovery Life is achieving its intended objective relating to the degree to which the beneficiary’s (Discovery Life) situation has changed as a result of this method.  To apply new information, acquired from the findings of this study, to further develop good practice and enhance performance in order to empower investigators at Discovery Life with new knowledge relating to the application of physical surveillance in the investigation of insurance fraud. Semi-structured interviews were conducted with forensic investigators employed at the Forensic Department at Discovery Life. The research has revealed that the majority of forensic investigators, other than the Surveillance Unit, at the Forensic Department of Discovery Life do not utilise physical surveillance during insurance fraud investigations to assist them in gathering evidence. These investigators also had a lack of knowledge and skills regarding the utilisation of physical surveillance during insurance fraud investigations and the advantages of this method during insurance fraud investigations. As a result of the non-utilisation of physical surveillance during insurance fraud investigations conducted at the Forensic Department of Discovery Life, important information and evidence with regard to the movement and actions of identified perpetrators who commit insurance fraud are lost to the investigators. However, the significance of the application of physical surveillance in the investigation of insurance fraud is emphasised by the forensic investigators attached to the Surveillance Unit of Discovery Life who utilise physical surveillance on a daily basis to investigate insurance fraud. The research has further revealed that insurance fraud is a major concern to the insurance industry, but can be mitigated through the implementation of unconventional investigative methods, such as physical surveillance, to enhance investigative capabilities. It was recommended that all forensic investigators at Discovery Life be trained in the techniques of physical surveillance to address shortcomings of general and out-dated investigation methods. / Criminology and Security Science / M. Tech. (Forensic Investigation)
45

An evaluation of identification methods used in the investigation of counterfeit card fraud

Geldenhuys, Nicolaas D. C. 02 1900 (has links)
Today, the use of one's bank card to pay or withdraw money is common. Modern technology provides us with the convenience of instant transactions at the automated teller machine or point of sale but unfortunately, it has also brought the reality and risk of card skimming and counterfeit card fraud. Criminals have become very efficient and technologically advanced in skimming and counterfeiting cards, to such an extent that counterfeit card fraud has become a significant threat to the public, banking, retail and business in South Africa. Counterfeit card fraud is a complex, multi-faceted crime, requiring specific skills and knowledge of card counterfeiting methods from police and bank investigators. The scope of its investigation is wide. It includes different crime scenes and offenders, sophisticated equipment and various aspects that need to be identified positively. Investigators find it difficult to identify perpetrators and certain aspects unique to this crime and, as a result, many investigations are unsuccessful. This research endeavours to establish what identification methods are available to investigators and which are effective. / Police Practice / M. Tech. (Forensic Investigation)
46

Vetting as a technique to investigate employment fraud in the City of Johannesburg

Mahalefa, Andries 01 1900 (has links)
The research study covers the following topic “Vetting as a Technique to Investigate Employment Fraud in the City of Johannesburg Metropolitan”. The researcher intends to evaluate the current procedures which are used in the process of forensic vetting as employment fraud investigation method in CoJ. Furthermore, to build the ground work for potential future innovation, problem solving, decision making and proper planning of the use of forensic vetting as employment fraud investigation method. The researcher applied the qualitative approach throughout the research because qualitative involves interaction between the researcher and the subject that was identified as a problem that concerned CoJ The researcher had selected ten (10) forensic investigators to partake in this study. The total population to be interviewed and collect data from was considerable and appropriate for evaluating forensic vetting as an employment fraud investigation method. The researcher used purposive sampling to choose the participants for this research. It was found that every individual within an organ of the State must be subjected to the vetting process. It was further found that the institutions in governmental, organs of the State and private spheres must adopt the forensic vetting practice to minimize fraudulent activities in their organizations. / Department of Police Practice / M. Tech. (Forensic Investigation)
47

The value of modus operandi in fraud investigation : a short-term insurance industry perspective

Govender, Prabashnie January 2018 (has links)
This study sought to examine the value of modus operandi (MO) information in the investigation of short-term insurance fraud. A comprehensive literature study was conducted concerning the dynamics of MO information in forensic investigation and short-term insurance fraud in South Africa and internationally, and individual semi-structured interviews were conducted with forensic investigators at Santam and MiWay to promote knowledge and understanding of the importance of MO information in short-term insurance fraud investigations. Results of this research indicate that participants did grasp the significance of MO information in the investigation of short-term insurance fraud. It is, however, apparent that they did not optimally exploit MO information regarding insurance fraud as a result of limited experience, ineffective databases and the inaccessibility of available data – all of which prevent the improvement of utilising MO data pertaining to short-term insurance fraud. Forensic investigators in the short-term insurance industry isolate themselves from each other and fail to share the available MO information amongst each other, resulting in a non-systematic fragmented approach to short-term insurance fraud investigation. The study identifies the challenges and shortcomings experienced by forensic investigators at Santam and MiWay that prevent the optimal utilisation of MO information in the investigation of short-term insurance fraud. The study then suggests a set of recommendations that could assist forensic investigators and other role-players in enhancing the utilisation of such information. / Criminology and Security Science / M. Tech. (Forensic Investigation)
48

Examining the unique security features of a credit card with the aim of identifying possible fraudulent use

Budhram, Trevor 09 1900 (has links)
The use of credit cards has become a way of life in many parts of the world. Credit cards have also created many new opportunities for criminal activity. It is in this light that organizations such as VISA International have explored a variety of security alternatives by constantly reviewing security measures that may be applied to cards and devote considerable resources to the maintenance of security systems and programmes. These programmes mandated by the association, include uniform card standards, security standards for manufactures, embossing and encoding of cards, standards for mailing the cards and credit background investigations of applicants. These standards assist investigators in examining counterfeit cards and distinguish a counterfeit card from a genuine card. The constant reviewing of security features and methods by the association is to create a card that is technically difficult to alter or counterfeit. / Criminology / M.Tech. (Forensic Investigation)
49

Utilising advanced accounting software to trace the reintegration of proceeds of crime, from underground banking into the formal banking system

Botes, Christo 30 April 2008 (has links)
The aim of this paper is to research how advanced accounting software can be used by police detectives, financial risk specialists and forensic investigation specialists, who are responsible for the investigation and tracing of the reintegration of proceeds of crime, from underground banking into formal banking system (pro active and reactive money laundering investigation) with a view on criminal prosecution. The research started of by looking at the basic ways how proceeds of crime are smuggled before it is integrated into the formal banking system. In that context, the phenomenon of Underground banking was researched. Currency smuggling, Hawala currency transfer schemes and the way in which it is used to move proceeds of crime were discussed in detail. Thereafter Formal banking and the way in which proceeds of crime is reintegrated from underground banking structures into formal banking systems were discussed. The use of advanced accounting software to trace the point where proceeds of crime are reintegrated into formal banking were researched extensively. Accounting software and investigative techniques on how to trace financial transactions which might be tainted with proceeds of crime were discussed. Accounting software which can be used on office computers such as laptops were discussed and more advanced automated systems which can be used to trace proceeds of crime transactions in the formal banking systems were also discussed. In specific, the investigative techniques on how to use these systems as investigative tools were discussed in great detail. This research paper gives a truly unique perspective on the financial investigative and analytical angle on proceeds of crime and money laundering detection. / Criminal Justice / M.Tech. (Forensic Investigation)
50

Motiewe vir die pleging van bedrog; kriminologiese studie aan die hand van die misdaadgebeurtenismodel

Lambrechts, Gideon Albertus Jacobus 30 April 2005 (has links)
Text in Afrikaans / Fraud is a worldwide phenomenon that is on the increase and a reason for serious concern. It is a priority crime in South Africa with serious implications both financial and socially. Fraud costs this country R150 milliard, almost three times the cost of the controversial weapon transaction. This was the goals of the researcher to determine what motivates the offender to commit fraud and how can fraud be explained in this study. A qualitative approach was followed due to the qualitative nature of the concept motivation. This resulted in a two-phase approach namely a documentary study, which was followed by interviews with experts in the field of fraud. Ten pre-sentence court reports of fraudsters were studied where after the outcome was discussed with these experts. The criminal event model served as framework for this study. Strain was incorporated as an additional component in the explanation of fraud. / Criminology / M. A. (Criminology)

Page generated in 2.4912 seconds