• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 39
  • 5
  • 3
  • 2
  • 2
  • 1
  • Tagged with
  • 57
  • 57
  • 34
  • 28
  • 28
  • 23
  • 21
  • 14
  • 11
  • 11
  • 11
  • 10
  • 10
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Gang conflict in prison

Hlongwane, Amon Lemmy 06 1900 (has links)
Gevangenisbendes in Suid-Afrika het 'n lang geskiedenis. die eerste was gestig onder Swart gevangenes in die Transvaal onmiddellik na die Anglo-Boere oorlog. Die Ninevite bende was ingestel deur Nongoloza Mathebula en het in die Witwatersrand geopereer. "Nongoloza" se bende het bestaan uit agt lede waarvan die 28 bende later ontwikkel het. Die 28 bende is ten gunste van wyfies-verhouding (homoseksuele) onder sy bende lede. "Ngelejani" se bende, waaruit die 26 bende ontwikkel het, was nie ten gunste van die wyfies-verhouding nie. Die ander bende wat in die gevangenis ontstaan het, is die Big 5 bende en die Airforce bende. / Prison gangs in South Africa have a long history. the first were established among Black prisoners in the Transvaal soon after the Anglo-Boer war. The Ninevite gang was introduced by Nongoloza Mathebula and operated in the Witwatersrand. "Nongoloza's" gang consisted of eight members, from which the 28 gang later developed. The 28 gang approved the boy-wives relationship (homo-sexual) among its gang members. "Ngelejani's" gang from which the 26 gang developed, disapproved the boy-wives relationship. Other gangs established in prison, are the Big 5 gang and the Airforce gang. / Sociology / M.A. (Penology)
22

Scripting Corruption in Public Procurement: The Italian Case

ZANELLA, MARCO 05 March 2012 (has links)
La corruzione negli appalti pubblici ha sempre destato particolare interesse. Nondimeno, un’attenta analisi della letteratura di settore dimostra come scarsa attenzione sia stata dedicata allo studio delle scelte strategiche adottate da corrotti e corruttori nel mentre decidono come pagare la tangente, come identificare il partner dell’accordo corruttivo, come contattarlo, come gestire le trattative, come raggiungere i propri obiettivi e come proteggersi da inadempimenti e tradimenti. Questa tesi si propone di studiare tali strategie, applicando per la prima volta in questo settore una particolare metodologia detta della script analysis, al fine di rispondere alle seguenti domande: come avvengono gli accordi corruttivi nel settore degli appalti pubblici? Quali sono le tattiche e i modi operandi adottati da corrotti e corruttori? Quali sono i “passaggi” necessari per la conclusione di accordi corruttivi? Come possono essere spiegati? Quali sono gli elementi che “facilitano” i protagonisti del pactum sceleris? Dopo aver passato in rassegna la letteratura (capitolo 1) ed illustrato la metodologia adottata (capitolo 2), la tesi risponde alle domande della ricerca, individuando i singoli passaggi dell’accordo corruttivo, soffermandosi sulle procedure adottate (capitolo 3) fino a circoscrivere e commentare gli elementi facilitatori (capitolo 4) nell’incontro tra domanda e offerta di utilitas. / Despite the growing concern over corruption in public procurement, there is little knowledge regarding the corruption-commission process. Scant attention has been paid to the event-decisions of corrupt agents in order to explore how an agent decides to pay, how he identifies his partner, how he contacts him, how he negotiates with him, how he manages to achieve his goal, and how he protects himself against “lemons”. The aim of this thesis is to understand the corruption-commission process by using crime script analysis to delve into the event-decisions of corrupt agents. Therefore, within the Italian context, this thesis seeks to answer the following research questions: how do corrupt deals in public procurement take place? What are the tactics, dynamics and the modi operandi of corrupt agents? What are the steps of corruption-commission in the specific area of public procurement? How can these steps be explained? What are the facilitators of corruption-commission? After the relevant literature has been reviewed (Chapter 1) and the methodology has been discussed (chapter 2), the results of the research are presented in chapters 3 and 4, where the procedural aspects and the procedural requirements of the crime are presented and discussed. Some concluding remarks close the thesis.
23

Gang conflict in prison

Hlongwane, Amon Lemmy 06 1900 (has links)
Gevangenisbendes in Suid-Afrika het 'n lang geskiedenis. die eerste was gestig onder Swart gevangenes in die Transvaal onmiddellik na die Anglo-Boere oorlog. Die Ninevite bende was ingestel deur Nongoloza Mathebula en het in die Witwatersrand geopereer. "Nongoloza" se bende het bestaan uit agt lede waarvan die 28 bende later ontwikkel het. Die 28 bende is ten gunste van wyfies-verhouding (homoseksuele) onder sy bende lede. "Ngelejani" se bende, waaruit die 26 bende ontwikkel het, was nie ten gunste van die wyfies-verhouding nie. Die ander bende wat in die gevangenis ontstaan het, is die Big 5 bende en die Airforce bende. / Prison gangs in South Africa have a long history. the first were established among Black prisoners in the Transvaal soon after the Anglo-Boer war. The Ninevite gang was introduced by Nongoloza Mathebula and operated in the Witwatersrand. "Nongoloza's" gang consisted of eight members, from which the 28 gang later developed. The 28 gang approved the boy-wives relationship (homo-sexual) among its gang members. "Ngelejani's" gang from which the 26 gang developed, disapproved the boy-wives relationship. Other gangs established in prison, are the Big 5 gang and the Airforce gang. / Sociology / M.A. (Penology)
24

Do they all act the same? : identification of the strategies associated with different types of online sex solicitors' discourses

Desjardins, Vicky 11 1900 (has links)
L’avancement des technologies a permis aux agresseurs sexuels de mineurs d’avoir de nouvelles opportunités de commettre des infractions à caractère sexuel en ligne (Fortin, Paquette, & Dupont, 2018; Seto, Hanson, & Babchishin, 2011). Avec un nombre de plaintes criminelles croissant (Wolak, Finkelhor, & Mitchell, 2012), le phénomène du leurre informatique pose de nombreux défis pour les enquêteurs qui doivent développer des méthodes d'enquête pour distinguer les dossiers ayant le plus de risque de passage à l’acte afin d’assurer la protection du public. Le projet de recherche vise à distinguer les différents types de cyber-relations basées sur les stratégies utilisées dans les discours d’auteurs de leurre. En analysant les différences entre les auteurs de leurre qui ne demande pas un contact hors ligne, ceux qui n’ont pas été capables d’obtenir un contact et ceux qui ont obtenu un contact hors ligne, on vise à identifier les stratégies associées aux discoures des interactions menant aux contacts hors ligne. L’étude utilise une combinaison d’approche qualitative et quantitative. L’analyse des conversations en ligne a été faite à partir de données policières de la Surêté du Québec . La transformation des données qualitatives en quantitative a été fait pour conduire les analyses statistiques. Les résultats suggèrent que les stratégies associées aux interactions qui ont mené au passage hors ligne sont : la persistance, la pratique en ligne des fantaisies sexuelles et d’avoir des opportunités à risque limité de détection d’une figure faisant autorité. Les auteurs de leurre avec contact ont utilisé ces stratégies de manière plus récurrente que les auteurs de leurre sans contact. En outre, les victimes qui participent plus et qui résistent le plus ont été associées à des relations menant au contact hors ligne. Les auteurs de leurre ayant eu un contact hors ligne avec leurs victimes avaient un plus grand nombre de conversations, en moyenne. Donc, ils avaient plus de temps pour utiliser différentes stratégies pour surpasser les résistances des victimes. Les implications de cette recherche suggèrent que les typologies identifiées dans la littérature scientifique n’ont pas trouver les caractéristiques scientifiquement associées à chacun des types. / The advancement of technology created new opportunities for online sex solicitors to cyber victimize minors online (Fortin et al., 2018; Seto et al., 2011). With the increasing number of police reports (Wolak et al., 2012), online sex solicitors pose numerous challenges for police practices. This research project aims to distinguish the differences between the types of interactions that seek offline contact based on the strategies seen in their discourses. By analyzing the differences between the strategies used by various types of interactions, we aimed to identify the strategies which are associated with offline contact interaction group. This study used a combination of qualitative and quantitative research methods to achieve the research goal. We used a qualitative methodology to do a thematic analysis and codify the chatlogs. The strategies used for codification were taken from previous studies and observation of the police data from the Sûreté du Québec . After the codification, we transformed the thematic results into quantitative data. The quantitative research methodology was employed to test the differences in frequency of each strategy between types of interactions. The results demonstrate that the strategies associated with offline contact are persistence, fantasy rehearsal and the presence of opportunities with limited risk of exposure. Contact group used more frequently these strategies compared to the noncontact group. Moreover, contact victims showed more participatory and oppositional behaviours. Offenders who met their victims offline showed longer interactions, on average. Consequentially, offenders from the contact group had more time to use the various strategies to surpass the victims' resistances. The implication of this research lays in the contradiction of these results compared to literature's results. The particularities of each types are not associated with previous typologies.
25

Le mode opératoire des entraîneurs ayant commis des abus sexuels

St-Pierre, Élisabeth January 2022 (has links)
Le but de la présente étude est de mieux comprendre le mode opératoire des entraîneurs ayant commis des abus sexuels en contexte sportif. Pour ce faire, le premier objectif est de décrire les stratégies précisément utilisées comme mode opératoire par les entraîneurs. Quant au second objectif, il vise à décrire l'influence de certains facteurs individuels et situationnels (sexe de la victime, niveau sportif et année du premier abus sexuel commis par l'entraîneur) sur les stratégies employées par les entraîneurs pour commettre les abus. Une grille de codification a été développée en se basant sur des travaux en sciences du sport et en criminologie portant sur les abus sexuels et le mode opératoire. Cette dernière a servi d'outil pour identifier les données pertinentes à l'étude comprises dans des jugements de Cour et des articles journalistiques au sujet de 120 entraîneurs ayant commis des abus sexuels en contexte sportif. Des analyses descriptives ainsi que des chi carrés ont été effectuées pour décrire les stratégies du mode opératoire des entraîneurs et pour déterminer s'il existe une association statistique entre certaines stratégies du mode opératoire et certaines variables individuelles et contextuelles. Les résultats montrent qu'en général, les entraîneurs gagnent la confiance de l'athlète en devenant ami avec celui-ci, n'emploient pas de stratégies pour exercer un contrôle ou développer une dépendance, emmènent l'athlète dans des endroits isolés autres que sur les lieux d'entraînement et à leur domicile, passent graduellement de touchers non sexuels à des touchers sexuels et n'emploient pas de stratégies en particulier par maintenir le silence. Les entraîneurs qui commettent des abus sexuels à l'endroit d'athlètes féminines emploient davantage des stratégies en lien avec la séduction (p. ex., déclaration d'amour) alors que ceux qui commettent ces gestes à l'égard de victimes masculines profitent du sommeil de l'athlète ou intègrent les abus pendant un jeu. Les entraîneurs de niveaux élites sont plus susceptibles d'employer des stratégies pour exercer un contrôle et développer une dépendance que ceux de niveaux non-élites. Les résultats indiquent aussi qu'un certain changement de stratégie semble s'être effectué avec le temps : les entraîneurs ayant commis leur premier abus avant 2000 ont attendu de passer une nuit avec leur athlète dans le but de l'isoler. Ceux ayant commis leur premier abus en 2000 ou après avaient davantage échangé du matériel sexuellement explicite avec leur athlète. Il s'agit de la première étude qui fournit des données sur les stratégies précisément employées par plusieurs entraîneurs pendant toutes les étapes des abus et qui montre que le sexe de la victime, le niveau sportif et l'année au premier abus sexuel ont une influence sur ces stratégies. / The purpose of this study is to explore the modus operandi of coaches who have committed sexual abuse in sport settings. The first objective is to describe the specific modus operandi strategies used by coaches. The second objective is to describe the influence of specific individual and situational factors (gender of the victim, sport level and year of the first sexual abuse committed by the coach) on the strategies used to commit the abuse. A coding grid was developed based on previous work in sport sciences and criminology on sexual abuse and modus operandi. This was used as a tool to identify data relevant to the study from court judgments and newspaper articles about 120 coaches who had committed sexual abuse in sport. Descriptive and chi-square analyses were conducted to describe the coaches' modus operandi strategies and to determine if there were statistical associations between modus operandi strategies and certain individual and contextual variables. Results showed that coaches generally gained the athlete's trust by becoming friends with the athlete, did not employ strategies to exert control or develop dependency, took the athlete to isolated locations other than training sites and their homes, gradually moved from non-sexual to sexual touching, and did not employ any strategies to maintain silence. Strategies related to seduction (e.g., declarations of love), were more frequently used by coaches who sexually abuse female athletes while strategies such as taking advantage of the athlete's sleep or incorporating the abuse into a game were more likely to be used by those who sexually abused male victims. Strategies to exert control and develop dependency were statistically associated with elite coaches. Coaches who perpetrated their first offence in 2000 or later were more likely to have exchanged sexually explicit material with their athlete. This is the first study to provide data on the specific strategies employed by multiple coaches during all stages of abuse and to demonstrate the influence of victims' gender, sport level, and year of first sexual abuse on these strategies.
26

The value of docket analysis in stranger rape investigations : a case study in Port Elizabeth

Van der Watt, Marcel 11 1900 (has links)
In this research docket analysis is evaluated as an investigative tool in stranger rape cases. Owing to the fact that serial rapists mostly reside within the category of stranger rape cases, the researcher attempted to test the value of docket analysis in the identification of patterns and similarities among such cases which could be indicative of serial rape activity. A rape matrix was used as a docket analysis tool to analyse the content of 184 stranger rape cases which was closed as ‘undetected’. In addition to investigative shortcomings in the case dockets, the researcher identified 15 stranger rape cases which presented six unique patterns among them. These identified patterns could be indicative of serial rape activity. / Criminology / M.Tech. (Forensic Investigation)
27

A critical analysis of human trafficking for sexual exploitation

Horne, Juanida Suzette 04 1900 (has links)
This study was conducted with the aim to critically analyse how the crime of human trafficking for sexual exploitation can be identified in order to develop practical guidelines to be used during the identification of this crime in South Africa. In this study the researcher conducted a review of pertinent literature, both international and national, to gain an understanding of the problem being researched. The explanatory sequential mixed-method design was used with the main purpose to use the qualitative data to help explain in more detail the initial quantitative results obtained. The explanatory sequential mixed-methods design assisted the researcher to follow a procedure whereby the mixed-mode survey design was applied to collect data through questionnaires. These questionnaires were in the form of mailed, self-administered surveys and in-person interviews with human trafficking provincial coordinators, police officials and investigators of human trafficking within the nine provinces country wide during the first quantitative phase of this study. The data were analysed and followed up during the second qualitative phase with interview schedules that were used in semi-structured one-on-one interviews with the following persons: police investigators working at the SAPS organised crime units who dealt with and investigated cases of human trafficking where victims were trafficked for sexual exploitation; state prosecutors working at the National Prosecuting Authority who dealt with, identified and prosecuted human trafficking cases where victims were trafficked for sexual exploitation in South Africa; NGOs who work in the field of counter-trafficking and victim assistance; and an international police investigator who dealt with, identified and investigated human trafficking cases where victims were trafficked for sexual exploitation. The researcher is of the opinion that this study (analysing how the crime of human trafficking for sexual exploitation can be identified in order to develop practical guidelines to be used during the identification of this crime in South Africa) presents a significant contribution to the identification of human trafficking for sexual exploitation incidents in South Africa and subsequently presents practical guidelines that can be used during the identification of this phenomenon in South Africa. SUMMARY “Modern slavery – be it bonded labour, involuntary servitude, or sexual slavery – is a crime and cannot be tolerated in any culture, community, or country... [It] is an affront to our values and our commitment to human rights.” (US Secretary of State Hillary Rodham Clinton, US Department of State, Trafficking in Persons Report, 2010) This study was conducted with the aim to critically analyse how the crime of human trafficking for sexual exploitation can be identified in order to develop practical guidelines to be used during the identification of this crime in South Africa. In this study the researcher conducted a review of pertinent literature, both international and national, to gain an understanding of the problem being researched. Relevant international legislation which informs South African legislation was accordingly considered in order to explain the current legal framework that forms the foundation to address this problem. A survey was conducted to gain insight into the phenomenon of human trafficking in South Africa. Thereafter interviews were conducted in order to understand the meaning provided by individuals to the problem researched. The researcher also explored how the federal police in Australia address the specific problem relating to the identification and investigation of human trafficking, as they have appointed a leading human trafficking task team focusing on this phenomenon in specific. Links and associations were identified through the knowledge and facts gained in this study, exploring past events and theories developed from former research relating to this topic. This formed the foundation of the study in order to describe and explain future application of findings emanating from this research. The explanatory sequential mixed-method design was used with the main purpose to use the qualitative data to help explain in more detail the initial quantitative results obtained. The explanatory sequential mixed-methods design assisted the researcher to follow a procedure whereby the mixed-mode survey design was applied to collect data through questionnaires. These questionnaires were in the form of mailed, self-administered surveys and in-person interviews with human trafficking provincial coordinators, police officials and investigators of human trafficking within the nine provinces country wide during the first quantitative phase of this study. The data were analysed and followed up during the second qualitative phase with interview schedules that were used in semi-structured one-on-one interviews with the following persons: police investigators working at the SAPS organised crime units who dealt with and investigated cases of human trafficking where victims were trafficked for sexual exploitation; state prosecutors working at the National Prosecuting Authority who dealt with, identified and prosecuted human trafficking cases where victims were trafficked for sexual exploitation in South Africa; NGOs who work in the field of counter-trafficking and victim assistance; and an international police investigator who dealt with, identified and investigated human trafficking cases where victims were trafficked for sexual exploitation. Through a critical analysis of the identification process of the phenomenon of human trafficking for sexual exploitation, the purpose of this research was to gain a better understanding of this phenomenon and establish, develop and provide practical guidelines, procedures and recommendations to the South African Police Service to identify these cases more successfully. The specific research objectives and research questions answered in this study to address the research aim were divided into five categories:  Explore and describe the phenomenon of human trafficking.  Determine the nature and extent of the legal arena to criminalise human trafficking, to prevent human trafficking, and to protect trafficking victims upon which South African legislation is based.  Explain how the identification of the phenomenon of human trafficking fits into the policing process.  Explore the current situation regarding the procedures followed to identify the phenomenon of human trafficking for sexual exploitation.  Develop practical guidelines, procedures and recommendations for police officials to identify human trafficking for sexual exploitation incidents more successfully. The trafficking of women and children for commercial sexual purposes lies in the expansion and ever growing sexual entertainment industry, which is most importantly a demand-driven phenomenon. The exploitation of victims for profit through the use of force, fraud or coercion remains the common denominator of this crime and the trade of human beings continues to evolve into new and more multifaceted forms of exploitation, using debt contracts and other means to coerce people for the purpose of profit gain. Women and children are perceived as the most exploitable and controllable and therefore are deemed to be the most in demand to contribute to this expanding and very competitive economic market driven by maximum profit. It is imperative and fundamental to have an understanding of the trafficking of persons as a crime committed against an individual and therefore it is of the utmost importance that police personnel serving in the South African Police Service (one of the key role players within the Criminal Justice System), are conversant with the means of trafficking, what it constitutes and what attributes and features this phenomenon includes. Through the development of practical guidelines, procedures and recommendations for police officials to identify human trafficking for sexual exploitation incidents more successfully, data obtained from both literature and interviews contributed immensely in the identification of incidents of human trafficking in order to prevent and address this crime successfully. The researcher is of the opinion that this study (analysing how the crime of human trafficking for sexual exploitation can be identified in order to develop practical guidelines to be used during the identification of this crime in South Africa) presents a significant contribution to the identification of human trafficking for sexual exploitation incidents in South Africa and subsequently presents practical guidelines that can be used during the identification of this phenomenon in South Africa. / Police Practice / D. Litt. et Phil. (Police Science)
28

Modus operandi van die bankrower : 'n kriminologiese introspeksie

Maree, Alice 11 1900 (has links)
Text in Afrikaans / In die ondersoek na die modus operandi van die bankrower: 'n kriminologiese introspeksie, kan die ondergemelde drie dimensies onderskei word: Die eerste dimensie is 'n kriminologiese introspeksie wat die betekenis wat bankrowers self aan die uitvoer van bankrooftogte heg, behels. Hierdie leefwereld van die subjekte word deur die navorser "betree" en mede-verken. Doelgerigtheid, morele oorwegings, teesin in geweld, charisma, kognitiewe vermoens en 'n materialistiese ingesteldheid is begrippe wat die bankrower as mens belig. Die tweede dimensie word verteenwoordig deur die begrondingsteorie as navorsingsmetode, gebaseer op die werk van Strauss en Corbin {1990), wat toegepas word ten einde sodanige navorsingsdoelstelling te fasiliteer. Tydens die aanvanklike fase van die ondersoek is daar met 28 bankrowers in aanhoud i ng, gefokusde semi -gest ruktureerde ind i epte-onderhoude gevoer. Opvolgonderhoude is met ses van die 28 subjekte gevoer, met die doel om 'n substantiewe begrondingsteorie te ontplooi, verskille op te klaar en die geldigheid van die data te verhoog. Die derde dimensie reflekteer vervolgens die ontplooiing van 'n substantiewe begrondingsteorie wat weerspieel word in proposisies en wat in vier fases van die modus operandi van die bankrower onderskei word, naamlik die beplanning-; uitvoering-; afhandeling-; en heroorwegingsfase. Elk van die ge'identifiseerde fases word gekenmerk deur progressiewe beweging, natuurlike kontinu'iteit, emosionele belewenisse en 'n individualistiese inslag. Twee kernelemente, naamlik besluitneming en rasionaliteit staan prominent binne die kader van die modus operandi van die bankrower. Die substantiewe begrondingsteorie is daarop ingestel om die verskynsel wat bestudeer word, te verklaar. Seide die oorweging van die ondersoek asook ander doelstellings van die navorser word binne die teorie geakkommodeer. Verdere vergelykende studies kan daartoe bydra om die substantiewe begrondingsteorie te verfyn, te falsifiseer, 6f by gebrek daaraan, tot 'n formele teorie uit te bou. Derhalwe word die begrondingsteorie as navorsingsmetode nie slegs as toepaslik beskou vir toekomstige navorsing oor onderwerpe waaroor daar 'n gebrek aan empiriese bevindinge bestaan en waaroor relatief min kennis in kriminologiese literatuur voorkom nie, maar hou dit ook die voordeel van 'n pluriforme navorsingstudie in. / In the investigation into the modus operandi of the bank robber: a criminological introspection, three dimensions can be distinguished. The first dimension is a criminological introspection comprising the meaning attached by bank rob.bers to the execution of bank robberies. This world of the subjects is entered and co-scouted. Sense of purpose, mora 1 considerations, aversion to violence, charisma, cognitive powers and a materialistic disposition are conceptions that elucidate the bank robber as a human. The second dimension is represented by the grounded theory as research method, based on the work of Strauss and Corbin (1990), which are applied to facilitate such research aims. During the initial phase of the investigation, focused, semi-structured, in-depth interviews were held with 28 bank robbers in detention. Subsequent interviews were held with six of the 28 subjects, aimed at expanding a substantive grounded theory, to clear up differences and to increase the validity of the data. The third dimension reflects the development of a substantive grounded theory which is revealed in propositions and signalised in four phases of the bank robber's modus operandi, namely the planning, execution, disposal and reconsideration phases. Each of these identified phases is characterised by progressive movement, natura 1 continuity, emot i ona 1 experiences and an individualistic infusion. The basic elements, namely decision-making and rationalisation, are prominent in the cadre of the bank robber's modus operandi. The substantive grounded theory is aimed at explaining the study phenomenon. Consideration of the investigation as well as other aims of the researcher are accommodated in the theory. Further comparative studies can assist in refining or falsifying the substantive grounded theory or, failing, to expand it to a formal theory. The grounded theory is therefore regarded as appropriate for future research on subjects about which there is a lack of empirical findings and relatively little knowledge in criminological literature. The theory offers, in addition, the advantage of a pluriform research study. / Sociology / D. Litt et Phil. (Kriminologie)
29

Investigating serial murder : case linkage methods employed by the South African Police Service

Govender, Pariksha 01 1900 (has links)
The aim of this descriptive research was to determine the methods of case linkage (methods to link murder cases to each other as well as to link the murder series to one offender) employed by the South African Police Service (SAPS) to investigate serial murder in South Africa and to comprehensively explain them. A qualitative approach was employed with a multi-method data collection process which included case study, interviews and literature review in order to gain an in-depth understanding of the subject. The methods of case linkage are explained within three phases of a serial murder investigation: the identification phase, the investigation and apprehension phase, and the trial and sentencing phase. The main findings of the study revealed the need for further training of the SAPS members and the need for a Standing Operating Procedure to be implemented to specifically govern the system of investigation for a serial murder case. / Criminology and Security Science / M.A. (Criminology)
30

The value of docket analysis in stranger rape investigations : a case study in Port Elizabeth

Van der Watt, Marcel 11 1900 (has links)
In this research docket analysis is evaluated as an investigative tool in stranger rape cases. Owing to the fact that serial rapists mostly reside within the category of stranger rape cases, the researcher attempted to test the value of docket analysis in the identification of patterns and similarities among such cases which could be indicative of serial rape activity. A rape matrix was used as a docket analysis tool to analyse the content of 184 stranger rape cases which was closed as ‘undetected’. In addition to investigative shortcomings in the case dockets, the researcher identified 15 stranger rape cases which presented six unique patterns among them. These identified patterns could be indicative of serial rape activity. / Criminology and Security Science / M.Tech. (Forensic Investigation)

Page generated in 0.0517 seconds