• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 645
  • 230
  • 120
  • 106
  • 83
  • 37
  • 33
  • 20
  • 20
  • 18
  • 15
  • 14
  • 13
  • 10
  • 7
  • Tagged with
  • 1581
  • 346
  • 233
  • 227
  • 206
  • 189
  • 145
  • 143
  • 143
  • 131
  • 131
  • 127
  • 126
  • 103
  • 98
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
371

The Net Worth method as technique to quantify income during investigation of financial crime

Botha, Andre Eduan 11 1900 (has links)
It is a well-known fact that criminals derive an income from their illegal activities, live lavish lifestyles, flaunt their wealth for all to see and acquire luxury goods. It is also a well known fact that criminals living from the proceeds of crime do not want to not want to keep financial records of their transactions or illegitimate business for fear of being detected by the authorities and to escape being taxed. It is also a known fact that criminals do not declare income from criminal activities for income tax purposes to the revenue authorities for fear of the illegal origin of the income being made known to the investigating authorities and law enforcement. During the investigation of financial crimes, such as tax evasion and money laundering, it may be required that the amount or value of money, income or assets accrued by a subject is determined in order to determine for instance their liability to pay tax. This research project examines the Net Worth method as an indirect method to circumstantially quantify income during the investigation of financial crime. / Police Practice / M.Tech. (Forensic Investigation)
372

The value of the victim's statement in the investigation of rape

Van der Merwe, Elmarie 02 1900 (has links)
The purpose of this research was to evaluate the existing procedures that investigators in South Africa follow in utilising the information contained in the victim statement in the investigation of rape, with the intention of determining the strengths and weaknesses of the procedures and of considering how these procedures can be improved. The researcher explored how investigators internationally use information contained in the victim statement in the successful investigation of rape and read extensively on the topic in international literature sources. The researcher also evaluated the current methods that investigators within the South African Police Service (SAPS) use. The researcher made use of an empirical research design because of the limited information available on the topic of the research, and a qualitative research approach, which enabled real-life observations. Simple random sampling was used to select 20 uniform members as well as 20 investigators of rape incidents for interviewing. Purposive sampling was used to select two public prosecutors attached to the Sexual Offences Court. Data were obtained from their real-life experiences through interviewing them and data were further collected through case studies of case dockets. / Police Practice / M. Tech. (Forensic Investigation)
373

Digital forensic model for computer networks

Sanyamahwe, Tendai January 2011 (has links)
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log mining is an evolution of typical digital forensics utilising evidence from network devices such as firewalls, switches and routers. Network log mining is a process supported by presiding South African laws such as the Computer Evidence Act, 57 of 1983; the Electronic Communications and Transactions (ECT) Act, 25 of 2002; and the Electronic Communications Act, 36 of 2005. Nevertheless, international laws and regulations supporting network log mining include the Sarbanes-Oxley Act; the Foreign Corrupt Practices Act (FCPA) and the Bribery Act of the USA. A digital forensic model for computer networks focusing on network log mining has been developed based on the literature reviewed and critical thought. The development of the model followed the Design Science methodology. However, this research project argues that there are some important aspects which are not fully addressed by South African presiding legislation supporting digital forensic investigations. With that in mind, this research project proposes some Forensic Investigation Precautions. These precautions were developed as part of the proposed model. The Diffusion of Innovations (DOI) Theory is the framework underpinning the development of the model and how it can be assimilated into the community. The model was sent to IT experts for validation and this provided the qualitative element and the primary data of this research project. From these experts, this study found out that the proposed model is very unique, very comprehensive and has added new knowledge into the field of Information Technology. Also, a paper was written out of this research project.
374

Maintenance mishap investigation course

Semones, Gary I. 01 January 1986 (has links)
No description available.
375

The Effects of Political Disruption on African Agricultural Productivity: A Statistical and Spatial Investigation

Lukongo, Onyumbe Enumbe 17 May 2014 (has links)
Civil wars, insecurity, and ethnic disputes have imposed a high human and economic toll in Africa. In this dissertation, I examine the destructive impacts of war on agricultural productivity growth across the continent. Poor agricultural sector performance is more likely to be present around or during times of conflict. Using a panel of 51 countries from 1962-2009 I find that war impedes agricultural productivity growth. But a decline in productivity growth is not associated with the onset of civil war. Results show that low per capita income, stagnant economic growth, a large population, and lack of political freedom correspond to higher incidence of war, while conflict and lack of rainfall are associated with low agricultural productivity growth. I find that armed conflict reduces agricultural productivity growth by 0.76 percent per year and a major armed conflict reduces TFP growth by 1.16 percent. The incidence of a major armed conflict is associated with an efficiency decline in the year by 1.24 percent, substantial setback, for more than three-quarters of countries. This dissertation extends the discussion from productivity and efficiency analysis to the inclusion of the spatial dimension by applying exploratory and confirmatory spatial data analysis and capitalizing on successful spatial techniques and analytical tools proven in geospatial science. The exploratory spatial data analysis provides evidence of spatial autocorrelation in agricultural TFP growth rates in Africa. The results of hot spot analysis reveal that Algeria, Tunisia, Libya in the northern region and Nigeria and Benin in the western region constitute hot spots of agricultural performance and the cold spot, which includes areas of meager productivity, Rwanda and Burundi in central Africa. Africa suffers substantial losses in agricultural productivity when certain countries experience major armed conflict. The dissertation shows that a war may reduce productivity in a given country, but its real effects are larger because it impacts surrounding countries. Overall African TFP declined by 0.0572 percent per year as a result of conflict in Sudan. A war in the Democratic Republic of Congo caused African TFP growth to decline by 0.0285 percent per year.
376

An evaluation of money laundering investigation at the Financial and Asset Forfeiture Investigation Unit of the South African Police Service in Pretoria

Baloyi, Rhulani Portia 02 1900 (has links)
This study evaluated money laundering investigation conducted at the Financial and Asset Forfeiture Investigation (FAFI) Unit of the Directorate for Priority Crime Investigation (DPCI) in Pretoria. Data were collected through semi-structured interviews conducted with financial and asset forfeiture investigators attached to the DPCI who are responsible for investigating money laundering. From the results of this study, it became apparent that participants experience a number of challenges in the investigation of money laundering. This study makes recommendations that could empower investigators at the FAFI of the DPCI with enhanced skills and knowledge to effectively investigate cases of money laundering. / Criminology and Security Science / M.A. (Criminal Justice--Forensic Investigation)
377

The value of investigative profiling of fraud offenders by forensic investigators

Sivnarain, Ranesh 10 1900 (has links)
The problem that the researcher encountered was that forensic investigators were found not to be formally using offender profiling as an investigative technique during investigations into fraud. This research was conducted to ascertain how offender profiling may be useful in expediting the forensic investigation process. The purpose of this research was to establish what offender profiling is, and what aspects or ingredients constitute such an offender profile. As offender profiles will serve as an aid in future forensic investigations into fraud, this study attempted to create an understanding and awareness of the value of offender profiling. In order for forensic investigators to use offender profiling during routine fraud investigations, it is extremely important that they understand the concept and its practical implementation. The overall purpose of this study is to provide practical recommendations for the implementation and use of offender profiling to forensic investigators both in the public and private sectors. / Criminal and Procedural Law / (M.Tech. (Forensic Investigation))
378

Significance of bank records analysis as a technique in tracing fraud suspects

Myeza, Nkosinathi Wonderboy 12 1900 (has links)
Text in English / The research attempts to establish the significance of bank records analysis as a technique in tracing fraud suspects. The purposes of conducting this research was to establish the current approach by the investigators of the SAPS in respect of bank records analysis in tracing fraud suspects; to explore and report on the findings of national and international literature in an attempt to find new information thereby improving the current method of bank records analysis and its specific use in tracing fraud suspects; and to make new information, in the form of written articles and this dissertation, available to the SAPS to be considered for inclusion in the training curriculum for their investigators. In collecting data, the researcher used literature study, interviews with individual participants and case dockets analysis. Essentially, the recommendations were drawn from the conclusions of the data obtained. These recommendations may offer solutions to the problem identified. / Criminology and Security Science / M. Tech. (Forensic Investigation)
379

The value of investigative profiling of fraud offenders by forensic investigators

Sivnarain, Ranesh 10 1900 (has links)
The problem that the researcher encountered was that forensic investigators were found not to be formally using offender profiling as an investigative technique during investigations into fraud. This research was conducted to ascertain how offender profiling may be useful in expediting the forensic investigation process. The purpose of this research was to establish what offender profiling is, and what aspects or ingredients constitute such an offender profile. As offender profiles will serve as an aid in future forensic investigations into fraud, this study attempted to create an understanding and awareness of the value of offender profiling. In order for forensic investigators to use offender profiling during routine fraud investigations, it is extremely important that they understand the concept and its practical implementation. The overall purpose of this study is to provide practical recommendations for the implementation and use of offender profiling to forensic investigators both in the public and private sectors. / Criminal and Procedural Law / (M.Tech. (Forensic Investigation))
380

The investigative methodology to initiate internal investigations in the South African corporate environment

Ferreira, De Wet 07 1900 (has links)
Conducting internal investigations in the corporate environment in South Africa has become an everyday occurrence where companies need to take action after an incident took place. Each company has a different view regarding their processes followed when investigating internal matters, and the different objectives that drive the process. Some companies would prefer the suspects be disciplined and removed from their employment, and no further action taken after the dismissal and some companies would have a different approach and would follow the process through the disciplinary, the criminal prosecution and institute civil litigation to recover losses. Investigation differs, and the approach would be different as well with various reasons for the approach of the company. To establish what the methodology is that is followed when initiating an internal investigation and the drive behind the methodology followed was done. The methodology and process followed determines how the internal investigation process is done and concluded to ensure that similar incidents do not occur again, and thus protect the corporate environment in South Africa. / Police Practice / M. Tech. (Forensic Investigation)

Page generated in 0.4707 seconds