• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 137
  • 5
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 159
  • 159
  • 93
  • 55
  • 30
  • 28
  • 25
  • 25
  • 21
  • 21
  • 20
  • 20
  • 20
  • 16
  • 16
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

The best practices applied by forensic investigators in conducting lifestyle audits on white collar crime suspects

Gillespie, Roy Tamejen 05 1900 (has links)
This research looks at the best practices applied by forensic investigators in conducting lifestyle audits on white collar crime suspects. The researcher explored, firstly, how a lifestyle audit relates to white collar crime investigations; secondly, the best practices in performing lifestyle audits on white collar crime suspects, and lastly, the various sources of information available to forensic investigators when conducting a lifestyle audit of a white collar crime suspect. As lifestyle audits will serve as an investigative tool in future forensic investigations into white collar crime, this study’s aim was to understand and create an awareness of the current best practices applied by forensic investigators within private sector forensic investigation practices while conducting lifestyle audits during white collar crime investigations. It also makes available research data regarding the concept of lifestyle audits in white collar crime investigations, the implementation of these audits, the benefits, and the best practices of these audits. The general purpose of this study was to provide practical recommendations on the best practices for lifestyle audits for forensic investigators within private sector. / Criminology / M. Tech. (Forensic Investigation)
132

Management of security information in the security industry

Govender, Doraval 06 1900 (has links)
Incidents, threats and vulnerabilities have the potential to negatively affect an organisation’s assets. Information on these incidents, threats and vulnerabilities are important to security. It is therefore necessary for this security information to be effectively and efficiently managed, so that correct decisions may be made on the implementation of security risk control measures. This study explored the management of security information in the security industry by undertaking the following: • establishing the “status quo” of the collection and analysis of security information and the implementation of security risk control measures in practice; • identifying the nature and extent of problems experienced in the collection and analysis of security information and the implementation of security risk control measures; and the • discovery of a new Security Information Management Model (SIMM). Mixed methods research was used to study the management of security information in the security industry. The explorative research design was used for this purpose. Semi-structured and focus group interviews were conducted with senior security managers and operational security officers, respectively. The grounded theory research design was used to analyse the qualitative data in order to generate a substantive grounded theory. The theory is that security officers operate without a standardised framework to manage security information. The data from the semi-structured and the focus group interviews were used to design a questionnaire to conduct a survey using the quantitative approach. The non-experimental research design was used to conduct this self-administered questionnaire survey. The data from this questionnaire survey helped validate and confirm the substantive grounded theory. The study found that there was the need for a Security Information Management Model to manage security information in the security industry. Based on this finding the researcher recommended a new Security Information Management Model for the management of security information in the security industry. / Criminology / D. Litt. et Phil. (Criminology)
133

Automatisches Modellieren von Agenten-Verhalten

Wendler, Jan 26 August 2003 (has links)
In Multi-Agenten-Systemen (MAS) kooperieren und konkurrieren Agenten um ihre jeweiligen Ziele zu erreichen. Für optimierte Agenten-Interaktionen sind Kenntnisse über die aktuellen und zukünftigen Handlungen anderer Agenten (Interaktionsparter, IP) hilfreich. Bei der Ermittlung und Nutzung solcher Kenntnisse kommt dem automatischen Erkennen und Verstehen sowie der Vorhersage von Verhalten der IP auf Basis von Beobachtungen besondere Bedeutung zu. Die Dissertation beschäftigt sich mit der automatischen Bestimmung und Vorhersage von Verhalten der IP durch einen Modellierenden Agenten (MA). Der MA generiert fallbasierte, adaptive Verhaltens-Modelle seiner IP und verwendet diese zur Vorhersage ihrer Verhalten. Als Anwendungsszenario wird mit dem virtuellen Fußballspiel des RoboCup ein komplexes und populäres MAS betrachtet. Der Hauptbeitrag dieser Arbeit besteht in der Ausarbeitung, Realisierung und Evaluierung eines Ansatzes zur automatischen Verhaltens-Modellierung für ein komplexes Multi-Agenten-System. / In multi-agent-systems agents cooperate and compete to reach their personal goals. For optimized agent interactions it is helpful for an agent to have knowledge about the current and future behavior of other agents. Ideally the recognition and prediction of behavior should be done automatically. This work addresses a way of automatically classifying and an attempt at predicting the behavior of a team of agents, based on external observation only. A set of conditions is used to distinguish behaviors and to partition the resulting behavior space. From observed behavior, team specific behavior models are then generated using Case Based Reasoning. These models, which are derived from a number of virtual soccer games (RoboCup), are used to predict the behavior of a team during a new game. The main contribution of this work is the design, realization and evaluation of an automatic behavior modeling approach for complex multi-agent systems.
134

Predictive models for online human activities

Yang, Shuang-Hong 04 April 2012 (has links)
The availability and scale of user generated data in online systems raises tremendous challenges and opportunities to analytic study of human activities. Effective modeling of online human activities is not only fundamental to the understanding of human behavior, but also important to the online industry. This thesis focuses on developing models and algorithms to predict human activities in online systems and to improve the algorithmic design of personalized/socialized systems (e.g., recommendation, advertising, Web search systems). We are particularly interested in three types of online user activities, i.e., decision making, social interactions and user-generated contents. Centered around these activities, the thesis focuses on three challenging topics: 1. Behavior prediction, i.e., predicting users' online decisions. We present Collaborative-Competitive Filtering, a novel game-theoretic framework for predicting users' online decision making behavior and leverage the knowledge to optimize the design of online systems (e.g., recommendation systems) in respect of certain strategic goals (e.g., sales revenue, consumption diversity). 2. Social contagion, i.e., modeling the interplay between social interactions and individual behavior of decision making. We establish the joint Friendship-Interest Propagation model and the Behavior-Relation Interplay model, a series of statistical approaches to characterize the behavior of individual user's decision making, the interactions among socially connected users, and the interplay between these two activities. These techniques are demonstrated by applications to social behavior targeting. 3. Content mining, i.e., understanding user generated contents. We propose the Topic-Adapted Latent Dirichlet Allocation model, a probabilistic model for identifying a user's hidden cognitive aspects (e.g., knowledgability) from the texts created by the user. The model is successfully applied to address the challenge of ``language gap" in medical information retrieval.
135

Exploring resilience among female sex workers in Johannesburg

Mamabolo, Lawrence Lekau 02 1900 (has links)
Sex work is a highly debatable subject in the field of psychology but little has been said about sex work and resilience. Challenges associated with criminalisation of sex work are rife but sex work continues to exist. This study explored the ability of heterosexual street based female sex workers (FSW) to ‘bounce back’ from challenges they face. The study employed qualitative paradigm and a transcendental phenomenological design was used. Snowballing sampling was used to select twelve FSW who participated in semi structured interview. Thematic analysis was used to extract recurrent themes across participants. Participants reported being victimised and physically and verbally abused by clients and the public. FSW showed their resilience by rationalising their role with having a purpose in working as FSW, obligation as bread winners and regarding sex work as legitimate work. They adopted psychological survival techniques and used various safety techniques to cope. The results emphasised importance of employing resilience and strength based approaches in researching and developing training and psychological programmes for sex workers. / Psychology / M.A. (Psychology)
136

The best practices applied by forensic investigators in conducting lifestyle audits on white collar crime suspects

Gillespie, Roy Tamejen 05 1900 (has links)
This research looks at the best practices applied by forensic investigators in conducting lifestyle audits on white collar crime suspects. The researcher explored, firstly, how a lifestyle audit relates to white collar crime investigations; secondly, the best practices in performing lifestyle audits on white collar crime suspects, and lastly, the various sources of information available to forensic investigators when conducting a lifestyle audit of a white collar crime suspect. As lifestyle audits will serve as an investigative tool in future forensic investigations into white collar crime, this study’s aim was to understand and create an awareness of the current best practices applied by forensic investigators within private sector forensic investigation practices while conducting lifestyle audits during white collar crime investigations. It also makes available research data regarding the concept of lifestyle audits in white collar crime investigations, the implementation of these audits, the benefits, and the best practices of these audits. The general purpose of this study was to provide practical recommendations on the best practices for lifestyle audits for forensic investigators within private sector. / Criminology and Security Science / M. Tech. (Forensic Investigation)
137

Management of security information in the security industry

Govender, Doraval 06 1900 (has links)
Incidents, threats and vulnerabilities have the potential to negatively affect an organisation’s assets. Information on these incidents, threats and vulnerabilities are important to security. It is therefore necessary for this security information to be effectively and efficiently managed, so that correct decisions may be made on the implementation of security risk control measures. This study explored the management of security information in the security industry by undertaking the following: • establishing the “status quo” of the collection and analysis of security information and the implementation of security risk control measures in practice; • identifying the nature and extent of problems experienced in the collection and analysis of security information and the implementation of security risk control measures; and the • discovery of a new Security Information Management Model (SIMM). Mixed methods research was used to study the management of security information in the security industry. The explorative research design was used for this purpose. Semi-structured and focus group interviews were conducted with senior security managers and operational security officers, respectively. The grounded theory research design was used to analyse the qualitative data in order to generate a substantive grounded theory. The theory is that security officers operate without a standardised framework to manage security information. The data from the semi-structured and the focus group interviews were used to design a questionnaire to conduct a survey using the quantitative approach. The non-experimental research design was used to conduct this self-administered questionnaire survey. The data from this questionnaire survey helped validate and confirm the substantive grounded theory. The study found that there was the need for a Security Information Management Model to manage security information in the security industry. Based on this finding the researcher recommended a new Security Information Management Model for the management of security information in the security industry. / Criminology and Security Science / D. Litt. et Phil. (Criminology)
138

Predictive policing : a comparative study of three hotspot mapping techniques

Vavra, Zachary Thomas 21 April 2015 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Law enforcement agencies across the U.S. use maps of crime to inform their practice and make efforts to reduce crime. Hotspot maps using historic crime data can show practitioners concentrated areas of criminal offenses and the types of offenses that have occurred; however, not all of these hotspot crime mapping techniques produce the same results. This study compares three hotspot crime mapping techniques and four crime types using the Predictive Accuracy Index (PAI) to measure the predictive accuracy of these mapping techniques in Marion County, Indiana. Results show that the grid hotspot mapping technique and crimes of robbery are most predictive. Understanding the most effective crime mapping technique will allow law enforcement to better predict and therefore prevent crimes.
139

Modus operandi as technique in suspect identification in burglary cases

Berning, J. M. S. P. 31 August 2008 (has links)
The research attempts to establish how modus operandi can be used to identify suspects in burglary cases. To conduct effective investigation, it is important for investigators to be familiar with the concept modus operandi, its elements, its influence and its values. To achieve the goals and objectives of the practice of modus operandi, investigators must know how to apply modus operandi, what the situational factors are during a criminal act, and how to use it as technique to identify suspects in burglary cases. The direction by implication and clarification of the crime situation is hardly possible without the determination of the identity of the perpetrator or suspect of a criminal act. The recognition of the modus operandi system as any form of evidence gathering is of outmost importance. / Criminology / M.Tech. (Forensic investigation)
140

The value of investigative profiling of fraud offenders by forensic investigators

Sivnarain, Ranesh 10 1900 (has links)
The problem that the researcher encountered was that forensic investigators were found not to be formally using offender profiling as an investigative technique during investigations into fraud. This research was conducted to ascertain how offender profiling may be useful in expediting the forensic investigation process. The purpose of this research was to establish what offender profiling is, and what aspects or ingredients constitute such an offender profile. As offender profiles will serve as an aid in future forensic investigations into fraud, this study attempted to create an understanding and awareness of the value of offender profiling. In order for forensic investigators to use offender profiling during routine fraud investigations, it is extremely important that they understand the concept and its practical implementation. The overall purpose of this study is to provide practical recommendations for the implementation and use of offender profiling to forensic investigators both in the public and private sectors. / Criminal and Procedural Law / (M.Tech. (Forensic Investigation))

Page generated in 0.0787 seconds