To see the other types of publications on this topic, follow the link: Afrika / Frau.

Dissertations / Theses on the topic 'Afrika / Frau'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Afrika / Frau.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Kpoda, Daniella. "Das Bild der afrikanischen Frau in der deutschen und der französischen Kolonialliteratur und sein Gegenentwurf in der frankophonen afrikanischen Literatur der Kolonialzeit." Frankfurt am Main ; Berlin ; Bern ; Wien [u.a.] : Lang, 2009. http://catalog.hathitrust.org/api/volumes/oclc/316137469.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kpoda, Daniella. "Das Bild der afrikanischen Frau in der deutschen und der französischen Kolonialliteratur und sein Gegenentwurf in der frankophonen afrikanischen Literatur der Kolonialzeit." Frankfurt, M. Berlin Bern Bruxelles New York, NY Oxford Wien Lang, 2007. http://d-nb.info/991179722/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Musau, Patrick Mwania. "The African woman as an agent of evangelization : her role and function in the mission activity of the Church in Africa /." Aachen : Shaker, 2009. http://d-nb.info/999024612/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Putter, Renier. "Dental fraud in South Africa." University of the Western Cape, 2016. http://hdl.handle.net/11394/5736.

Full text
Abstract:
Magister Scientiae Dentium - MSc(Dent) (Community Oral Health)<br>Healthcare fraud wastes money that could be spent in the treatment of patients. The exact amount of healthcare fraud is very difficult to determine, especially in a two-tier healthcare system like South Africa. The amount and cost of dental fraud in South Africa has never been researched. If the amount and cost of fraud in a specific area can be determined, resources can be better used to combat healthcare fraud in the future.
APA, Harvard, Vancouver, ISO, and other styles
5

Mathai, Muthoni. "Sexual decision-making and AIDS in Africa a look at the social vulnerability of women in Sub-Saharian Africa to HIV/AIDS." Kassel Kassel Univ. Press, 2006. http://www.upress.uni-kassel.de/publi/abstract.php?3-89958-226-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mathai, Muthoni. "Sexual decision-making and AIDS in Africa a look at the social vulnerability of women in Sub-Saharian Africa to HIV/AIDS : a Kenyan example /." Kassel : Kassel Univ. Press, 2007. http://nbn-resolving.de/urn:nbn:de:0002-2269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Eramus, L., and H. Fourie. "Internal audit activities performed in South Africa." Academic Journals, 2009. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001358.

Full text
Abstract:
This study was conducted to determine the perception of the chief audit executive as head of the internal audit function, on the internal audit activities that should be performed (current and future) within South African companies after which the findings were compared with the international perception in this regard. Data was also obtained on whether internal audit activities were performed inhouse or were outsourced; the importance of the internal audit activities, senior management’s rating of the value added, the internal audit approach followed, and whether the internal audit standards were being complied with. A statistical analysis was performed on data that was obtained from questionnaires and interviews. This study targeted 30 chief audit executives, and to a lesser extent 30 Chief Executive Officers/Chief Financial Officers/Chief Operating Officers, of large South African listed companies. The results prove that chief audit executives perceive themselves as performing their internal audit activities according to the internal audit Standards and that they satisfy the needs and expectations of their companies. The internal audit profession, its clients and internal audit educators may benefit from the study in the planning of future internal audit activities and educational programmes respectively.
APA, Harvard, Vancouver, ISO, and other styles
8

Labuschagne, Mario. "The role of internal auditors with specific reference to fraud investigation." Thesis, Nelson Mandela Metropolitan University, 2015. http://hdl.handle.net/10948/d1021385.

Full text
Abstract:
The role of internal auditors is evolving to enable them to provide stakeholders with assurance and to assist organisations to achieve objectives and remain competitive to ensure the future existence of their organisations. The research for this study was guided by the question of whether the Institute of Internal Auditors guidance pronouncements provide sufficient guidance in the light of expectations of both the institute and management (stakeholders) relating to the role of internal auditors in respect of fraud investigation. Literature reviewed on the role of internal auditors showed that there is limited guidance provided with regards to fraud investigation, knowledge and skills required by an internal auditor to perform fraud investigations. The research methodology used for this study consisted of a qualitative case study of the Nelson Mandela Metropolitan University committees, namely, Council, Senate and MANCO as well as a combination of deductive and inductive interpretative analysis methods. Semi-structured interviews were used to obtain data from participants who were randomly selected from Nelson Mandela Metropolitan University Council, Senate and MANCO committees. The interviews revolved around three themes, namely, the role of internal audit, the information expected from internal audits and the role that the internal audit plays with regard to fraud. The interviews were recorded by means of a digital voice recorder which were transcribed by a qualified transcriber. The collected data was then manually coded by making use of standardised coding methods to assist with the analyses of the data. After considering the participant responses in relation to the themes, it could be deduced that a greater awareness needed to be created regarding the role of the internal audit and the services which internal audits could provide to organisations and management structures. The results of the analyses revealed that an expectation gap existed with regard to the Institute of Internal Auditors, guidance pronouncements and stakeholder expectations of internal auditor roles with specific reference to fraud investigations. This study showed that the IIA’s guidance pronouncements do not provide sufficient and adequate guidance in respect of the knowledge, skills and competency capabilities in relation to fraud investigations.The results of the study further showed that the expected role of internal auditors in an organisation should include fraud investigations.
APA, Harvard, Vancouver, ISO, and other styles
9

Rama, Sobhana. "Managing Information Confidentiality Using the Chinese Wall Model to Reduce Fraud in Government Tenders." Thesis, University of Fort Hare, 2013. http://hdl.handle.net/10353/d1006956.

Full text
Abstract:
Instances of fraudulent acts are often headline news in the popular press in South Africa. Increasingly, these press reports point to the government tender process as being the main enabler used by the perpetrators committing the fraud. The cause of the tender fraud problem is confidentiality breach of information. This is accomplished, in part, by compromising the tender information contained in the government information system. This results in the biased award of a tender. Typically, the information in the tender process should be used to make decisions about a tender’s specifications, solicitation, evaluation and adjudication. The sharing of said information to unauthorised persons can be used to manipulate and corrupt the process. This in turn corrupts the tender process by awarding a tender to an unworthy recipient. This research studies the generic steps in the tender process to understand how information is used to corrupt the tender process. It proposes that conflict of interest, together with a lack of information confidentiality in the information system, paves the way for possible tender fraud. Thereafter, a system of internal controls is examined within the South African government as well as in foreign countries to investigate measures taken to reduce the breach of confidential information in the tender process. By referring to the Common Criteria Security Model, various critical security areas within the tender process are identified. This measure is assisted with the ISO/IEC 27002 (2005) standard which has guiding principles for the management of confidential information. Thereafter, an information security policy,the Chinese Wall Model will be discussed as a means of reducing instances where conflict of interest may occur. Finally, an adapted Chinese Wall Model, which includes elements of the tender process, is presented as a way of reducing fraud in the government tender process. Finally, the research objective of this study is presented in the form of Critical Success Factors that aid in reducing the breach of confidential information in the tender process. As a consequence, tender fraud is reduced. These success factors have a direct and serious impact on the effectiveness of the Chinese Wall Model to secure the confidentiality of tender information. The proposed Critical Success Factors include: the Sanitisation Policy Document, an Electronic Document Management System, the Tender Evaluation Ethics Document, the Audit Trail Log and the Chinese Wall Model Prosecution Register.
APA, Harvard, Vancouver, ISO, and other styles
10

Makhooane, Stephen Malefane. "An investigation into fraud and corruption risk management policies and procedures at institutions of higher learning." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1003898.

Full text
Abstract:
Fraud and corruption cost South Africa billions of rand yearly. Institutions of higher learning are no less vulnerable to fraud and corruption than other organisations, but are also subject to risks that are unique to academia. The Public Finance Management Act. No.1 of 1999 requires Public entities including the councils (university or college controlling body) of public institutions of higher learning to adopt enterprise risk management, which includes a fraud and corruption risk management policy and procedures. The function of the fraud and corruption policy is to provide an objective strategy to prevent, detect and investigate any possible irregularity in order to prevent further loss in line with Corporate Governance requirements. The anti-fraud and corruption strategy measures include setting the appropriate tone by management of the institution, being proactive (fraud risk assessments), and being reactive (reporting process, investigation and taking appropriate action). The actions include disciplinary action and criminal or civil proceedings in order to recover assets lost. The procedures address the implementation of the policy. This research focused on identifying the relevant issues that could be included in the formulation of fraud and corruption risk management policies and procedures for institutions of higher learning. The research was conducted using a qualitative methodology consisting of a document analysis and interviews. It was found that, out of eleven institutions of higher learning investigated only one institution meets the criteria set out in the framework developed in the research as an assessment tool. The other institutions involved in the research did not have fraud and corruption risk management policies or procedures and therefore did not comply with the Public Finance Management Act.
APA, Harvard, Vancouver, ISO, and other styles
11

Madikane, Mpumelelo Patrick. "Misconduct relating to fraud and corruption in the public service." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1018673.

Full text
Abstract:
In an article, “Corruption and Governance Challenges: The South African Experience”,1 the Public Protector commented that corruption and good governance sit at the opposite ends of the spectrum. While good governance represents the ideal for governments, corporations and nations globally, corruption is a scourge that decent people, organisations and governments seek to eradicate. In the simplest of terms, corruption involves the abuse of power for private gain.The Public Protector further stated that it should be a concern to everybody that in post-independence Africa, certainly in South Africa, the accumulation of riches (in most cases, very sudden) is venerated even in the absence of visible means of accumulating the riches. South Africa has battled with corruption since the days of apartheid. Post-apartheid South Africa is a more open society and more opportunities have been created for detecting, exposing and prosecuting corruption. South Africa‟s approach to corruption is multipronged. The main pillars according to the Public Protector are the law, anti-corruption agencies, and public mobilisation.This studyhas attempted to attend to the challenges of managing misconduct relating to fraud and corruption that appear to weaken our democracy. Fraud and corruption is a complex phenomenon that requires managers and supervisors to possess a specialist technical knowledge in order to be effective in punishing those that are involved in this type of misconduct. The tendency currently is for the managers and supervisors to place suspected corrupt employees on a prolonged pre-cautionary suspension for a period that is not supported by law. This of course weakens the employer‟s case as they tend to rely on the outcomes of the proceedings in the criminal procedure before they institute disciplinary action against such culprits. Workers could be criminally prosecuted for this type of misconduct in terms of the provisions of the Prevention and Combating of the Corrupt Activities Act. Employers always enjoy the right to criminally prosecute workers who have committed acts of fraud or corruption but that must go concurrently with the institution of the disciplinary proceedings in terms of the collective agreement, if there is any. This study will show that the act of misconduct relating to fraud and corruption is a complex phenomenon that poses a threat to the global security. This study also takes a closer view of the provisions of international instruments and institutions such as the United Nations and International Labour Organisation. It further, does a detailed analysis of the provisions in other foreign jurisdiction like Canada. This is consistent with the provisions of the Bill of Rights as enshrined in the Constitution:Section 39(1) of the Constitution of the Republic of South Africa demands that when interpreting the Bill of Rights, a court, tribunal or forum: a. Must promote the values that underlie an open and democratic society based on human dignity, equality and freedom; b. Must consider international law; and c. May consider foreign law. Section 1 of the Labour Relations Act, states that the primary objects of the Act are: (a) To give effect and regulate the fundamental rights conferred by section 23 of the Constitution; (b) To give effect to obligations incurred by the Republic as a member state of the International Labour Organisation. Section 3 of the LRA further stipulates that any person applying this Act must interpret its provisions:(a) To give effect to its primary objects; (b) in compliance with the Constitution; (c) in compliance with the public international law obligations of the Republic.This treatise further shows the importance of the Constitutional values and principles that govern the Public Administration in terms of Chapter 10, section 195.Of importance the elements of fraud and corruption are discussed in this study.This study also gives a detailed analysis of the case laws that give guidance on how best to deal with and successfully punish employees involved in misconduct relating to fraud and corruption.
APA, Harvard, Vancouver, ISO, and other styles
12

Van, Heerden Johan H. "Detecting fraud in cellular telephone networks." Thesis, Stellenbosch : Stellenbosch University, 2005. http://hdl.handle.net/10019.1/50314.

Full text
Abstract:
Thesis (MSc)--University of Stellenbosch, 2005.<br>ENGLISH ABSTRACT: Cellular network operators globally loose between 3% and 5% of their annual revenue to telecommunications fraud. Hence it is of great importance that fraud management systems are implemented to detect, alarm, and shut down fraud within minutes, minimising revenue loss. Modern proprietary fraud management systems employ (i) classification methods, most often artificial neural networks learning from classified call data records to classify new call data records as fraudulent or legitimate, (ii) statistical methods building subscriber behaviour profiles based on the subscriber’s usage in the cellular network and detecting sudden changes in behaviour, and (iii) rules and threshold values defined by fraud analysts, utilising their knowledge of valid fraud cases and the false alarm rate as guidance. The purpose of this thesis is to establish a context for and evaluate the performance of well-known data mining techniques that may be incorporated in the fraud detection process. Firstly, a theoretical background of various well-known data mining techniques is provided and a number of seminal articles on fraud detection, which influenced this thesis, are summarised. The cellular telecommunications industry is introduced, including a brief discussion of the types of fraud experienced by South African cellular network operators. Secondly, the data collection process and the characteristics of the collected data are discussed. Different data mining techniques are applied to the collected data, demonstrating how user behaviour profiles may be built and how fraud may be predicted. An appraisal of the performances and appropriateness of the different data mining techniques is given in the context of the fraud detection process. Finally, an indication of further work is provided in the conclusion to this thesis, in the form of a number of recommendations for possible adaptations of the fraud detection methods, and improvements thereof. A combination of data mining techniques that may be used to build a comprehensive fraud detection model is also suggested.<br>AFRIKAANSE OPSOMMING: Sellulêre netwerk operateurs verloor wêreldwyd tussen 3% en 5% van hul jaarlikse inkomste as gevolg van telekommunikasie bedrog. Dit is dus van die uiterse belang dat bedrog bestuurstelsels geïmplimenteer word om bedrog op te spoor, alarms te genereer, en bedrog binne minute te staak om verlies aan inkomste tot ’n minimum te beperk. Moderne gepatenteerde bedrog bestuurstelsels maak gebruik van (i) klassifikasie metodes, mees dikwels kunsmatige neurale netwerke wat leer vanaf geklassifiseerde oproep rekords en gebruik word om nuwe oproep rekords as bedrog-draend of nie bedrog-draend te klassifiseer, (ii) statistiese metodes wat gedragsprofiele van ’n intekenaar bou, gebaseer op die intekenaar se gedrag in die sellulêre netwerk, en skielike verandering in gedrag opspoor, en (iii) reëls en drempelwaardes wat deur bedrog analiste daar gestel word, deur gebruik te maak van hulle ondervinding met geldige gevalle van bedrog en die koers waarteen vals alarms gegenereer word. Die doel van hierdie tesis is om ’n konteks te bepaal vir en die werksverrigting te evalueer van bekende data ontginningstegnieke wat in bedrog opsporingstelsels gebruik kan word. Eerstens word ’n teoretiese agtergrond vir ’n aantal bekende data ontginningstegnieke voorsien en ’n aantal gedagteryke artikels wat oor bedrog opsporing handel en wat hierdie tesis beïnvloed het, opgesom. Die sellulêre telekommunikasie industrie word bekend gestel, insluitend ’n kort bespreking oor die tipes bedrog wat deur Suid-Afrikaanse sellulˆere telekommunikasie netwerk operateurs ondervind word. Tweedens word die data versamelingsproses en die eienskappe van die versamelde data bespreek. Verskillende data ontginningstegnieke word vervolgens toegepas op die versamelde data om te demonstreer hoe gedragsprofiele van gebruikers gebou kan word en hoe bedrog voorspel kan word. Die werksverrigting en gepastheid van die verskillende data ontginningstegnieke word bespreek in die konteks van die bedrog opsporingsproses. Laastens word ’n aanduiding van verdere werk in die gevolgtrekking tot hierdie tesis verskaf, en wel in die vorm van ’n aantal aanbevelings oor moontlike aanpassings en verbeterings van die bedrog opsporingsmetodes wat beskou en toegepas is. ’n Omvattende bedrog opsporingsmodel wat gebruik maak van ’n kombinasie van data ontginningstegnieke word ook voorgestel.
APA, Harvard, Vancouver, ISO, and other styles
13

Frankel, Hazel. "David Fram : Lithuanian Yiddish Poet of the South African Diaspora and Illuminating Love." Thesis, Sheffield Hallam University, 2013. http://shura.shu.ac.uk/4914/.

Full text
Abstract:
This thesis investigates the Yiddish poems of the South African Lithuanian immigrant David Fram. It locates Fram’s poetry and aesthetics in the context of Yiddish poetry in general and Lithuanian-South African Yiddish literature in particular. In doing this it identifies and investigates Fram’s main poetic themes, Diaspora, the memory of home and the condition of exile; landscape and people, nature and creator; his response to the Holocaust suggesting poetry is a legitimate means of expressing trauma. The thesis also deliberates on the potential relevance of taking Fram’s biography and personal experiences into consideration when interpreting his poetry. It reflects on the approach to and process of writing both this thesis and the novel Illuminating Love, considering how thesis and novel relate to each other and to Fram’s poetry, as well as to the notion of postmemory. Indicating the antecedents of Illuminating Love, the thesis discusses aspects of realism and postmodernism, genre and mixed genre, as well as development of voice, point of view and character in my novel. In conclusion, suggestions are made for future projects that might be undertaken to revitalise the vibrant language of Yiddish and memorialise its community. The appendix contains translations (following transliteration) of Fram’s poems. The creative component of the thesis is the novel Illuminating Love. Its narrative entwines the journeys of two Jewish women, Judith, forced to leave her home in Lithuania, Eastern Europe before World War II, and Cally her granddaughter living in contemporary South Africa. Transcribing Judith’s poems in calligraphy, Cally uncovers her family’s history and roots. The content of the love sampler she inscribes for her husband Jake, and the illuminating of a ketuba (the Jewish marriage contract) serve to counterpoint her personal circumstances. Behind the gilding lies the reality of domestic violence, Judith’s escape from the genocide and Jake’s experiences in the bush during the South African Border War.
APA, Harvard, Vancouver, ISO, and other styles
14

deMatos, Richard Bernard. "Floor limits and credit card fraud in the South African credit card industry." Thesis, University of South Africa, 2007. http://hdl.handle.net/10500/48.

Full text
Abstract:
Credit card fraud losses within the South African credit card market in 2006 exceeded R257M. A portion of these losses (R179M) are within the borders of South Africa and its common monetary area partners. This represents a startling 70% of credit card fraud on magnetic stripe cards used within the borders of South Africa. The South African credit card industry adopts floor limits at certain merchants and merchant categories. South Africa is one of a few countries in the world that still adopt floor limits on credit cards within its payment card industry. Credit card transactions on magnetic-stripe cards conducted below the merchant’s designated floor limit do not go to the issuing bank for authorization. The first time the issuing bank acknowledges these transactions is when they are settled on average two days later. The rationale for not adopting zero floor limits within the South African credit card market is the supposed inability of the existing telecommunications infrastructure to handle the volume and frequency of data submitted by merchants for authorization. The impact of reduced fraud and bad debt losses through adopting a zero floor limit in relation to merchant operational costs is the basis of the research. The research also aims to examine the Proposition that the existing telecommunications infrastructure is unable to support a zero floor limit proposal.
APA, Harvard, Vancouver, ISO, and other styles
15

Aplom, Thobeka. "An investigation into the provision of government social grants to people with disabilities in Amathole Distrcit municipality." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/5754.

Full text
Abstract:
This study seeks to investigate the efficiency and effectiveness of the process for providing government social grants to people with disabilities in the South African Social Security Agency (SASSA) Amathole District Municipality in order to determine the need for any improvement measures. Taylor’s scientific management theory and the Total Quality Management (TQM) concept were used to interpret efficiency in the functional activities of the officials working in the Disability Grant Unit in Amathole District. The study also sought to answer the question of whether exit programmes existed that were designed to assist the beneficiaries to support them and cater for their needs related to their disabilities. The study followed a qualitative method. Face-to-face interviews were conducted and the sample of this study consisted of ten participants who are working at Grant Administration. These participants included one General Manager; one District Manager; one SASSA doctor; one Head of Grants Administration in the district and six officials who are at lower levels of the hierarchy at Amathole District Municipality in East London service office. Thematic analysis was used to identify themes from the interviews. The findings of this study revealed that the majority of the respondents experienced challenges such as lack of assessment doctors, turn around-time, corruption, poor consultation, lack of managerial commitment and doctors regarding the assessment of applications. In this regards, the study made a set of recommendations on the measures and strategies that could improve efficiency in the provision of this service.
APA, Harvard, Vancouver, ISO, and other styles
16

Lindorfer, Simone. "Sharing the pain of the bitter hearts : liberation psychology and gender-related violence in Eastern Africa /." Berlin [u.a.] : Lit, 2007. http://deposit.d-nb.de/cgi-bin/dokserv?id=2984110&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Bux, Fardeen. "The deductibility of losses incurred by a taxpayer as a result of senior employee theft, fraud or embezzlement." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1020608.

Full text
Abstract:
SARS has issued a draft interpretation note dealing with the deductibility of expenditure and losses arising from embezzlement and theft by employees noting that it is not prepared to accept, as a general proposition, that embezzlement and theft by senior managers have become a risk which is inseparable from business. There is however another view that is in direct contradiction with SARS. An analysis of global fraud surveys reveal that senior employee fraud is on the increase. In South Africa, criminal cases against senior employees in the private and public sector indicate that their behaviour can lead to an expectation of theft, fraud or embezzlement at that level of employees. The tests developed by the courts for the deduction of expenditure or losses in terms of the general deduction formula require that such expenditure or loss be attached to the performance of a business operation bona fide performed for the purpose of earning income and will be deductible whether such expenditure or losses are necessary for its performance or attached to it by chance. It is submitted that the increase in fraud and behaviour of senior employees noted in the criminal courts have resulted in a change in the economic environment supporting the contention that theft, fraud or embezzlement are an inherent risk to business in South Africa. In addition, global precedence supports the view that senior employee defalcations are deductible but only to the extent that the perpetrator is not in a proprietor or shareholder role. SARS therefore appears to be turning a blind eye to the risk of theft, fraud or embezzlement by senior employees but there is sufficient evidence to support a taxpayer wishing to claim a deduction for such loss. In light of international precedence, National Treasury should enact legislation allowing a deduction or alternatively, SARS should align its view with such precedence.
APA, Harvard, Vancouver, ISO, and other styles
18

Phalama, Mmabore S. H. "Factors affecting implementation of enterprise applications integration (EAI) with special reference to corruption and fraud in DOD." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20253.

Full text
Abstract:
Thesis (MPhil)--Stellenbosch University, 2012.<br>ENGLISH ABSTRACT: Corporate mergers and partnerships are common in today’s competitive environment and inevitably require organisations to integrate information and telecommunication systems when such unisons take place. One of the most important challenges in each enterprise, especially forced by global markets and the resulting competition, is the capability to efficiently interact, collaborate and exchange information with business partners and within an organisation. Many software systems within organisations are not integrated into a homogeneous structure and therefore the sharing and exchange of information, not being synchronised, leads to possible misappropriation of such information. These isolated systems in organisations, could consequently become possible platforms for corruption and fraud, leading to increase in computer crime. While key risk areas remain, new dangers are emerging. Government stakeholders require departments to be accountable and responsible, which underpins the sharing and exchanging of relevant information, which in turn necessitates the integration of inter- as well as intra-departmental systems. If corruption and fraud is committed in these departments the impact may be significant, including damage to their reputation and image and even detrimental to service delivery to communities. Government and law enforcement agencies all over the world are faced with challenges of combating corruption and fraud. Fighting corruption and fraud committed via computers necessitates the need to close the gaps created by computers which were designed without consideration for future integration. Hence organisations should seek a way to link systems that were developed in isolation in order to simplify and automate business processes to the greatest extent possible. The aim of this study is to discuss factors affecting the implementation of application systems in large organisations with special reference to the South African Department of Defence (SA DOD). Current systems will be studied and a possible approach on how the DOD Vehicle Management Systems could be integrated will be recommended. This study introduces and defines the problem, describes different research methodologies including the methodology that was used. The topics of corruption and fraud, electronic commerce and e-government will be explored through intensive research of the extant literature, drawing interpretations to be applied to the empirical data gathered on fraud and corruption in DOD and on their ITC systems. Finally the findings and recommendations of this research, based on the theoretical and empirical data, will be presented.<br>AFRIKAANSE OPSOMMING: Korporatiewe oornames en vennootskappe is algemeen in vandag se kompeterende omgewing. Dit is dus onvermydelik dat daar van ondernemings verwag word om informasie en telekommunikasie stelsels te integreer by die paasvind van sulke verbintenisse. Een van die mees belangrike uitdagings in elke onderneming, veral in die lig van globale markte met die gevolglike kompeterende uitdagings, is die vermoë vir effektiewe interaksie, samewerking en uitruil van inligting met besigheidsvennote en ook in die onderneming self. Talle sagteware stelsels in ondernemings is nie geïntegreer in ʼn homogene struktuur nie en gevolglik, omdat dit nie gesinkroniseer is nie, lei die deel en uitruil van informasie tot moontlike wederregtelike toe-eiening van sulke informasie. Sulke geïsoleerde stelsels in ondernemings kan dus die platvorms word van korrupsie en bedrog en lei tot ʼn verhoging van rekenaarmisdywe. Terwyl sleutel risiko areas steeds van toepassing is, is daar ook weer nuwe gevare wat te voorskyn kom. Die Staat se aandeelhouers vereis dat departemente aanspreeklik en verantwoordelik sal wees wat die belangrikheid van die deel en uitruil van inligting onderstreep en wat op sy beurt weer die integrasie van inter- asook intradepartementele stelsels noodsaak. As misdaad en korrupsie gepleeg word in hierdie departemente mag die impak betekenisvol wees. Dit sluit in skade aan hul reputasie en beeld en kan selfs dienslewering aan gemeenskappe belemmer. Om korrupsie en bedrog wat met rekenaars gepleeg word te beveg, is dit nodig om die gapings toe te maak wat deur ontwerpe geskep is sonder dat toekomstige integrasie inaggeneem is. Ondernenings moet dus ‘n manier soek om stelsels te koppel wat in isolasie ontwikkel was met die doel om besigheidsprosesse tot die grootste moontlike mate te vereenvoudig en te outomatiseer. Die doel van hierdie studie is om die faktore te ondersoek wat die implementering van stelsels beïnvloed in groot ondernemings met spesifieke verwysing na die Suid Afrikaanse Departement van Verdediging (SA DVV). Huidige sisteme sal bestudeer word en ʼn moontlike benadering sal aanbeveel word oor hoe die DVV se Voertuig Bestuurstelsels geintegreer kan word. In hierdie studie word die besiheids- asook die navorsings-probleem gedefineer. Die onderwerpe van korrupsie en bedrog, elektroniese handel en e-regering sal ondersoek word deur intensiewe navorsing van bestaande literatuur te doen. Dit word aangevul deur vertolkings van die hierdie toepaslike literatuur gepaard met empiriese data versameling oor bedrog en korrupsie in die DVV en die Departement se “ITK” stelsels. As finale stap sal die bevindings en aanbevelings van hierdie navorsing, gebasseer op teoretiese en impiriese data, aangebied word.
APA, Harvard, Vancouver, ISO, and other styles
19

Naidoo, Stephanie. "The South African Criminal Law's response to the crimes of fraud and corruption within local government." Diss., University of Pretoria, 2016. http://hdl.handle.net/2263/60075.

Full text
Abstract:
The crime of fraud and corruption is rife within South African municipalities. This negatively impacts on the efficient and effective service delivery through wasteful and uneconomic expenditure incurred by Municipalities through the perpetration of the aforementioned crimes. The writer envisages researching, investigating, critically analysing and evaluating the South African criminal law?s response in combatting the scourge of fraud and corruption within local government. In order to do so the research will examine the efficacy of the Prevention and Combatting of Corrupt Activities Act 12 of 2004, in prosecuting individuals who perpetrate acts of fraud and corruption. The current Act unlike its predecessor, has enacted special provisions in sections 4 and 26(1)(a) for the prosecution of public officials who commit acts of fraud and corruption. The Act makes provisions for a general offence of corruption and also punishes various specific forms of corruption. The essential purpose of the Act is the ?unbundling? of the offence of corruption. A duty is imposed by the Act to report corrupt practices and keep record of previously convicted persons and enterprises who unlawfully received tenders and contracts as a result of such acts of corruption. This record will ensure that harsh restrictions are placed on such individuals. Furthermore, this Act is designed to reinforce South Africa?s obligations under the United Nations Convention against Corruption adopted by the General Assembly on 31 October 2003. The penal provisions of the Act, serves as a deterrent in that a conviction for corruption invokes a 15 year imprisonment term. All in all, the Act has provisions to effectively prosecute perpetrators of corruption. The same is true for the crime of common law fraud although punishment is at the court?s discretion. Detecting fraud and corruption within local government is extremely difficult because of its disguised form. In view hereof forensic investigative methods have to be adopted in order to produce the standard of proof required in our courts of law to successfully prosecute these crimes. Finally, the research will produce findings which will inform the recommendations that will be made. The writer envisages making implementable recommendations that may lead to the detection, effective investigation, successful prosecution and ultimately the prevention of the crimes of fraud and corruption within local government.<br>Dissertation (LLM)--University of Pretoria, 2016.<br>Public Law<br>LLM<br>Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
20

Opperman, Sophia Kathleen. "Perceptions on fraud and corruption policies and strategies in public procurement within the Western Cape Provincial Treasury (WCPT)." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/96104.

Full text
Abstract:
Thesis (MPA)--Stellenbosch University, 2014.<br>ENGLISH ABSTRACT: Corruption affects the lives of everyone in South Africa and can thus be characterised as a common enemy. Fraud and corruption especially in the procurement systems is one of the major contributors of annual losses the Western Cape Provincial Government incurs. Since the introduction of computerised procurement systems, also known as e-procurement, the occurrence of fraud and corruption has substantially increased as soon as individuals familiarize themselves with the system. The Western Cape Provincial Government will save a huge amount of money if fraud and corruption could be prevented and limited. These funds could be put to better use and result to better service delivery. The Government has therefore developed many policies and strategies to try to combat and prevent corruption in procurement both in the public and private sector. This study examines the perceptions of key stakeholders on the appropriateness of the strategies in place to prevent fraud and corruption in the provincial procurement system by particularly looking at the achievements and limitations that have been experienced. The focal point is the Western Cape Provincial Treasury since they are currently the owners of the computerised procurement system. The study also includes an assessment of the role of the Western Cape Provincial Treasury in general in fighting fraud and corruption in public procurement. The research methods utilised include a comprehensive review of documentation published by the provincial government with regard to fraud and corruption as well as perceptions of key stakeholders on the appropriateness of anti-corruption policies and strategies in the Western Cape Provincial Government. Government has, in its commitment to fight corruption, established various anti-corruption agencies, developed a number of programmes and introduced numerous legislative frameworks. The Western Cape Government in particular has developed a transversal Anti-corruption Strategy to provide a framework within which to combat fraud, corruption and theft in the province. All provincial departments are encouraged to maintain a zerotolerance against corruption by developing and implementing a Fraud and Corruption policy within their various departments. The proper implementation of the anti-corruption policy is imperative for the prevention of fraud and corruption. Western Cape Provincial Treasury, as the custodian of the LOGIS procurement system in the Western Cape, plays a vital role in promoting compliance to relevant legislation by implementing anti-corruption strategies. It is apparent that different anti-corruption strategies to control and manage fraud and corruption in procurement do exist, but its appropriateness differs from department to department. Anti-corruption strategies will only be successful when it eliminates the occurrence of fraud and when perpetrators are caught and executed. Management should play a vital role in identifying and combating corruption in departments. Employees should be made aware of the consequences if they should commit any fraudulent acts. Furthermore, all officials should be encouraged to report any fraudulent incidents.<br>AFRIKAANSE OPSOMMING: Korrupsie beïnvloed die lewens van almal in Suid-Afrika en kan dus gedefinieer word as 'n gemeenskaplike vyand. Bedrog en korrupsie, veral in die verkryging stelsels is een van die grootste bydraers van die jaarlikse verliese die wat die Wes-Kaapse Provinsiale Regering aangaan. Sedert die bekendstelling van die gerekenariseerde verkryging stelsels, ook bekend as e-verkryging, het die voorkoms van bedrog en korrupsie aansienlik verhoog sodra individue hulself vertroud maak met die stelsel. Die Wes-Kaapse Provinsiale Regering sal 'n groot bedrae geld bespaar as bedrog en korrupsie voorkom en beperk kan word. Hierdie fondse kan op op sy beurt beter aangewend word en kan tot beter dienslewering lei. Die Regering het baie beleide en strategieë ontwikkel om korrupsie te probeer verhoed en te bestry - beide in die openbare en private sektor. Hierdie studie ondersoek die persepsies van belanghebbendes oor die toepaslikheid van die strategieë om bedrog en korrupsie in die provinsiale verkryging stelsel te voorkom deur veral te kyk na die prestasies en beperkings wat ondervind is. Die fokuspunt is die Wes-Kaapse Provinsiale Tesourie, aangesien hulle tans die eienaars van die gerekenariseerde verkryging stelsel is. Die studie sluit ook 'n evaluering van die rol wat die Wes-Kaapse Provinsiale Tesourie speel om bedrog en korrupsie in die openbare verkryging stelsel te voorkom. Die navorsingsmetodes wat gebruik is sluit in ‘n omvattende opname van die dokumentasie wat deur die provinsiale regering gepubliseer is met betrekking tot bedrog en korrupsie asook persepsies van belanghebbendes oor die toepaslikheid van anti-korrupsie beleide en strategieë in die Wes-Kaapse Provinsiale Regering. In sy verbintenis om korrupsie te beveg, het die regering verskeie anti-korrupsie agentskappe ingestel, 'n aantal programme ontwikkel en talle wetgewende raamwerke bekend gestel. Die Wes-Kaapse regering het in die besonder 'n dwarsleggende Anti-korrupsie strategie ontwikkel om 'n raamwerk te voorsien waarbinne bedrog, korrupsie en diefstal in die provinsie bekamp kan word. Alle provinsiale departemente word aangemoedig om 'n “zero tolerance” teen korrupsie te handhaaf deur die ontwikkeling en implementering van 'n bedrog en korrupsie beleid binne hul onderskeie departemente. Die behoorlike implementering van die anti-korrupsie beleid is noodsaaklik vir die voorkoming van bedrog en korrupsie. Wes-Kaapse Provinsiale Tesourie, as die bewaarder van die LOGIS verkryging stelsel in die Wes-Kaap, speel 'n belangrike rol in die voldoening aan toepaslike wetgewing deur die implementering van anti-korrupsie strategieë. Dit is duidelik dat verskillende anti-korrupsie strategieë om bedrog en korrupsie te beheer en te voorkom wel bestaan, maar die toepaslikheid verskil van departement tot departement. Anti-korrupsie strategieë sal slegs suksesvol wees wanneer dit die voorkoms van bedrog elimineer en wanneer oortreders gevang en tereggestel word. Bestuur moet 'n belangrike rol speel in die identifisering en die bekamping van korrupsie in departemente. Werknemers moet bewus gemaak word van die gevolge indien hulle enige bedrieglike dade pleeg. Verder moet alle amptenare aangemoedig word om enige bedrieglike voorvalle aan te meld.
APA, Harvard, Vancouver, ISO, and other styles
21

Chitimira, Howard. "A comparative analysis of the enforcement of market abuse provisions." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1015008.

Full text
Abstract:
Market abuse practices may directly or indirectly give rise to diverse problems such as inaccurate stock market prices, low public investor confidence, reduced market integrity and poor efficiency in the affected financial markets. This thesis reveals that three major forms of market abuse, namely insider trading, prohibited trading practices (trade-based market manipulation) and the making or publication of false, misleading or deceptive statements, promises and forecasts relating to listed securities (disclosure-based market manipulation) are prohibited in South Africa. However, although South Africa has had market abuse legislation for about 30 years, and must be commended for its great effort to enhance market integrity by combating market abuse practices, the enforcement of such legislation is still problematic. Moreover, in spite of the fact that there is no empirical data or accurate figures quantifying the occurrence and extent of market abuse activities in the South African financial markets, this thesis submits that market abuse practices are still to be completely eradicated. Accordingly, this thesis suggests that the aforementioned problem might have been aggravated by inter alia, various gaps, flaws and/or inconsistent implementation and enforcement of the market abuse legislation in South Africa. To this end, the anti-market abuse enforcement framework under the Securities Services Act 36 of 2004 is analysed to investigate its adequacy. The co-operation and role of the Financial Services Board, the courts, the Directorate of Market Abuse and other relevant stakeholders is also examined and discussed. Moreover, the co-operation between the Financial Services Board and similar international agencies is discussed to gauge its effectiveness in relation to the combating of cross-border market abuse practices. The adequacy of the awareness and preventative measures in place to curb market abuse practices is also investigated to determine whether such measures are robust enough to combat other new challenges that were posed by the 2007 to 2009 global financial crisis. Furthermore, a comparative analysis is undertaken of the enforcement of the market abuse prohibition in other jurisdictions, namely the United States of America, the United Kingdom, the European Union and Australia. This was done to investigate the relevant lessons that can be learnt or adopted from these jurisdictions. The thesis further discusses the adequacy of the recently introduced provisions of the Financial Markets Bill as well as the subsequent market abuse provisions of the Financial Markets Bill 2012. The thesis highlights that the aforementioned Bills are positive attempts by the policy makers to improve the enforcement of the market abuse provisions in South Africa. Nonetheless, the thesis reveals that most of the shortcomings contained in the Securities Services Act 36 of 2004 were duplicated in the Financial Markets Bill and the Financial Markets Bill 2012. In light of this, it remains to be seen whether the market abuse provisions contained in the Financial Markets Bill and/or the Financial Markets Bill 2012 will improve the combating of market abuse practices in South Africa. Consequently, it is hoped that the relevant market abuse provisions of the Securities Services Act 36 of 2004, the Financial Markets Bill and/or the Financial Markets Bill 2012 will be comprehensively reviewed in regard to the recommendations made in this thesis. To this end, the thesis proposes a viable anti-market abuse model and policy framework and sets out both policy objectives and provisions which policy makers could use to strengthen some of the market abuse provisions in South Africa.
APA, Harvard, Vancouver, ISO, and other styles
22

Jachi, Adelaide Gamuchirai. "An analysis, from a South African case law perspective, of the deductibility of losses due to embezzlement, fraud, theft, damages and compensation." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/60855.

Full text
Abstract:
When calculating the income tax payable for a year of assessment, a taxpayer deducts from his or her or its income, allowable deductions in terms of the preamble to section 11 and section 11(a) as read with section 23(g) of the Income Tax Act, 58 of 1962. Amongst the expenditure and losses incurred by a taxpayer during a year of assessment, a claim may be sought for the deduction of losses incurred due to embezzlement, fraud and theft as well as damages and compensation. The requirements of the preamble and section 11(a) include the requirement that expenditure and losses must be incurred “in the production of the income”. Losses incurred due to defalcations, as well as expenditure on damages and compensation must satisfy this requirement to be allowed as deductions. The objective of the research was to analyse the judicial decisions dealing with “in the production of the income” in granting a deduction for income tax purposes in cases dealing with embezzlement, fraud and theft, and damages and compensation, to establish why the courts grant or disallow the deduction of expenditure and losses. A doctrinal research methodology was applied to the research. The provisions of the Income Tax Act, relevant case law relating to embezzlement, fraud and theft, and damages and compensation, and the contributions of the revenue authority and tax experts in articles of accredited journals, textbooks and other writings were analysed. The major conclusions drawn from the research were that losses due to defalcations are regarded as having been incurred “in the production of the income” if the taxpayer discharges the onus of proof that the risk of the act leading to misappropriation is an incidental risk of the business. Expenditure on damages and compensation is deductible provided the expense is attached to the performance of a business operation bona fide performed for the purpose of earning income and the expense is so closely connected with the business operation as to be regarded as part of the cost of performing it. Where negligence is attached to an expense or loss, the South African courts have held that negligence does not increase the likelihood of disallowing an expense or loss as not having been incurred “in the production of the income”.
APA, Harvard, Vancouver, ISO, and other styles
23

Harris, Jonathan Andrew. "Three Essays on Politics in Kenya." Thesis, Harvard University, 2012. http://dissertations.umi.com/gsas.harvard:10572.

Full text
Abstract:
This dissertation examines ethnic patronage, local conflict, and election fraud in Kenya in three separate essays. Fraud, violence, and ethnicity are difficult to measure, and they often play a central role in narratives and theories about African politics. The essays in this dissertation draw on natural language processing, spatial statistics, and demography to improve measurement of these concepts and, in turn, our understanding of how they function in Kenya. The approaches developed here can be generalized to conflict, ethnicity, and fraud in other contexts. The first essay presents a method for extracting ethnic information from names. Existing methods give biased estimates by ignoring uncertainly in the mapping between names and ethnicity. I apply my improved, approximately unbiased method to data on political appointments from 1963 to 2010 in Kenya, and find that existing narratives about distributive politics do not accord with empirical patterns. The second essay examines patterns of violent ethnic targeting during Kenya's 2007-2008 post-election violence. I focus on patterns of arson, one of the key types of violence used in the Rift Valley. I find that incidence of arson is related to the presence of ethnic outsiders, and even more strongly related to measures of land quality, accessibility, and electoral competition. Using a difference-in-differences design, I show that arson caused a significant decrease in the number of Kikuyu and other immigrant ethnic groups registered to vote; no such decline is observed in indigenous ethnic groups. The third essay documents the prevalence of dead voters on Kenya's voter register prior to the contentious 2007 presidential elections, and shows how dead registered voters may have facilitated electoral fraud. Simply accounting for the number of dead voters demonstrates that turnout was greater than 100% in several opposition constituencies, and implausibly high in most of the incumbent president's home province. Ecological inference suggests that ballot-stuffing occurred in candidate strongholds, rather than competitive constituencies. These results are consistent with the opposition party's allegations of fraud.<br>Government
APA, Harvard, Vancouver, ISO, and other styles
24

Ngoma, Wilson. "Towards a more flexible approach to the fraud exception in letters of credit under South African law: a comparative analysis with select common law approaches and the UNCITRAL Convention." Master's thesis, University of Cape Town, 2015. http://hdl.handle.net/11427/15192.

Full text
Abstract:
The aim of this dissertation is to recommend an alternative approach to the fraud exception in South African law. The Current South African position as with the English law, places more weight on upholding the sanctity of the autonomy principle in letters of credit than preventing fraud. This is mainly because the courts have traditionally taken the view that protection of the autonomy principle is central to promoting the needs of trade and maintaining the integrity of the international banking community. Hence, this dissertation argues that an approach to the fraud exception in South African law that is more in line with that of the American law and/or the UNCITRAL Convention strikes a better balance in upholding the value of letters of credit and combatting fraud than the current South African position. Based on the comparative analysis of the position in the United Kingdom, United States of America and under the UNCITRAL Convention, the dissertation seeks to draw upon important lessons and principles pivotal to a preferable approach to the fraud exception in South African law that would enhance a better balance between the autonomy arguments and deterrence of fraud.
APA, Harvard, Vancouver, ISO, and other styles
25

Petersen, Ashwin. "The effectiveness of internal control activities to combat occupational fraud risk in fast-moving consumer goods small, medium and micro enterprises (SMME’s) in the Cape Metropole." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2731.

Full text
Abstract:
Thesis submitted in fulfilment of the requirements for the degree Master of Technology: Internal Auditing in the Faculty of Business and Management Sciences at the Cape Peninsula University of Technology<br>South African Small, Medium and Micro Enterprises (SMMEs) play an important role in the stimulation of the national economy. However, according to previous research studies, these business entities have one of the worst sustainability rates in the world as approximately 80% of South African SMMEs tend to fail after being in operation for only three years. Taking the weak sustainability rate of these business entities into account, further studies suggest that South African SMMEs operate in a harsh economic environment, which, in turn, creates a breeding ground for risks to realise in, including that of occupational fraud risk. According to scholarly literature, the occurrence of occupational fraud risk is believed to stem from the utilisation of inadequate and/or ineffective internal control activities – South African SMMEs, in general, are believed to make use of inadequate and/or ineffective internal control activities. For this research study, focus was placed on investigating the effectiveness of internal control activities used within South African fast-moving consumer goods (FMCG) SMMEs to combat occupational fraud risk. This was achieved by conducting a literature review (see Chapter 2) to assist in the development of a survey to, in turn, conduct empirical research by collecting quantitative data from respondents (see Chapter 3). All relevant quantitative data gleaned were analysed using both descriptive statistics and inferential statistics (see Chapter 4). Based on the analysed data, it was found that although implemented internal control activities in sampled South African FMCG SMMEs were customised, a few internal control activities assisted in the combating of occupational fraud risk while the bulk of internal control activities did not assist in combating occupational fraud risk. Stemming from the study conducted, the inference was made that the occurrence (realisation) of occupational fraud risk may be exacerbated by the implemented internal control activities in South African FMCG SMMEs due to their ineffectiveness.
APA, Harvard, Vancouver, ISO, and other styles
26

Innhausen, u. Knyphausen Adrian zu [Verfasser], and Ralph [Akademischer Betreuer] Rupp. "A novel method for Fluorescence Recovery after Photobleaching (FRAP) analysis of chromatin proteins in pluripotent embryonic cells of the South African clawed frog X. laevis / Adrian zu Innhausen u. Knyphausen ; Betreuer: Ralph Rupp." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2020. http://d-nb.info/1221960563/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Gwanzura, Owen. "An exploration of ethical conduct in the South African public sector: a case of the Eastern Cape Department of Education." Thesis, University of Fort Hare, 2012. http://hdl.handle.net/10353/d1007121.

Full text
Abstract:
The Eastern Cape Department of Education has become like a problem child in the Republic of South Africa. It is a cause for concern to both the provincial and national government. This is a department where service delivery is problematic. Schools are not built or renovated and children are taught in dilapidated structures or sometimes under trees. Hardly a week passes without the department making the headlines in the media for the wrong reasons. It is widely accepted that the department is dysfunctional and education is in a crisis. The department has emerged as the number one culprit of engaging in corrupt activities in the province. Public officials in the department have been identified as being at the helm of these corrupt activities. In the 200/10 financial year, the Auditor General issued a disclaimer to the department and highlighted a lack of direction, accountability and a total breakdown of internal control systems and supply chain management within the department. Numerous fraud risk indicators were identified during the audit and underlined by findings that are indicative of fraud and corruption within the department. This unfortunate state of affairs is contrary to the requirements of section 195(1) of the Constitution of the Republic of South Africa which provides for the democratic values and principles governing public administration including inter alia, that: A high standard of professional ethics must be promoted and maintained. Efficient, economic and effective use of resources must be promoted. Public administration must be accountable. This raises several questions about the ethical fitness of public officials in the department as the custodians of the public resources and trust. Though several reasons abound for this unfavourable state of affairs in the department, the researcher has singled out unethical conduct by public officials in the department and its impact on service delivery. The approach followed in this research was to analyse the 2009/10 Department of Education Annual Report and the 2009/10 Auditor General’s Report to the Eastern Cape Department of Education. The analysis confirmed the existence and occurrence of multiple cases of unethical conduct in the department. At the end scientific recommendations are proposed to alleviate this ill.
APA, Harvard, Vancouver, ISO, and other styles
28

Mbabane, Simphiwe Mkhululi. "The external supervision of the municipal procurement." Thesis, University of the Western Cape, 2012. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_5803_1370594147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

van, Rensburg Rachel Janse. "Resource Description and Access (RDA): continuity in an ever-fluxing information age with reference to tertiary institutions in the Western Cape." University of the Western Cape, 2018. http://hdl.handle.net/11394/6380.

Full text
Abstract:
Magister Library and Information Studies - MLIS<br>Although Resource Description and Access (RDA) has been discussed extensively amongst the ranks of cataloguers internationally, no research on the perceptions of South African cataloguers was available at the time of this research. The aim of this study was to determine how well RDA was faring during the study's timeframe, to give a detailed description regarding cataloguer perceptions within a higher education setting in South Africa. Furthermore, to determine whether the implementation of RDA has overcome most of the limitations that AACR2 had within a digital environment, to identify advantages and/or perceived limitations of RDA as well as to assist cataloguers to adopt and implement the new standard effectively. The study employed a qualitative research design assisted by a phenomenological philosophy to gain insight into how cataloguers experienced the implementation and adoption of RDA by means of two concurrent web-based questionnaires. The study concluded that higher education cataloguing professionals residing in the Western Cape were decidedly positive towards the new cataloguing standard. Although there were some initial reservations, they were overcome to such an extent that ultimately no real limitations were identified, and that RDA has indeed overcome most of the limitations displayed by AACR2. Many advantages of RDA were identified, and participants expressed excitement about the future capabilities of RDA as it continues toward a link-data milieu, making library metadata more easily available.
APA, Harvard, Vancouver, ISO, and other styles
30

Janse, van Rensburg Rachel. "Resource Description and Access (RDA): continuity in an ever-fluxing information age with reference to tertiary institutions in the Western Cape." University of the Western Cape, 2018. http://hdl.handle.net/11394/6267.

Full text
Abstract:
Magister Library and Information Studies - MLIS<br>Although Resource Description and Access (RDA) has been discussed extensively amongst the ranks of cataloguers internationally, no research on the perceptions of South African cataloguers was available at the time of this research. The aim of this study was to determine how well RDA was faring during the study's timeframe, to give a detailed description regarding cataloguer perceptions within a higher education setting in South Africa. Furthermore, to determine whether the implementation of RDA has overcome most of the limitations that AACR2 had within a digital environment, to identify advantages and/or perceived limitations of RDA as well as to assist cataloguers to adopt and implement the new standard effectively. The study employed a qualitative research design assisted by a phenomenological philosophy to gain insight into how cataloguers experienced the implementation and adoption of RDA by means of two concurrent web-based questionnaires. The study concluded that higher education cataloguing professionals residing in the Western Cape were decidedly positive towards the new cataloguing standard. Although there were some initial reservations, they were overcome to such an extent that ultimately no real limitations were identified, and that RDA has indeed overcome most of the limitations displayed by AACR2. Many advantages of RDA were identified, and participants expressed excitement about the future capabilities of RDA as it continues toward a link-data milieu, making library metadata more easily available. As this research has revealed a distinctly positive attitude from cataloguers' two main matters for future research remains, being: ? Why South African participants in this study voiced almost no perceived limitations to RDA as a cataloguing standard. Future research might be able to relay information regarding this trend, especially in the light that it was not a global phenomenon. ? A deeper look might have to be taken at how participants' experienced RDA training as this phenomenon might be closely linked to the reasons why the participants did not mention more limitations.
APA, Harvard, Vancouver, ISO, and other styles
31

Pape, Marion. "Frauen schreiben Krieg." Doctoral thesis, Humboldt-Universität zu Berlin, Philosophische Fakultät III, 2007. http://dx.doi.org/10.18452/15584.

Full text
Abstract:
Kein anderes Thema hat die nigerianische Literatur so dominiert wie der nigerianische Bürgerkrieg, in dessen Verarbeitung sich verstärkt auch Autorinnen einmischen. Die Dissertation evaluiert 34 Texte von 16 nigerianischen Autorinnen - 12 Romane und 22 Kurzgeschichten - und analysiert sie als Gesamtkorpus, in dem die Texte miteinander und mit der Männerliteratur einen Dialog um den Bürgerkrieg führen. Die Autorinnen wenden bei ihrem "war talk" literarische Strategien wie "re-reading" und "re-writing" an, das Neu-Lesen, Fort- und Umschreiben der Texte und Diskurse des "Zentrums", durch die nicht nur die Blindstellen eines von Männern dominierten literarischen Diskurses sichtbar werden, sondern durch die auch der Prozess des Aushandelns der Geschlechterverhältnisse sowie des Krieges selbst erfolgt, seiner Ursachen, Auslöser und Folgen. Die Autorinnen stellen den Krieg als "sexuelle Unordnung" dar, als Geschlechterkrieg. Die Untersuchung zeigt, dass bei der Verortung der Perspektive der Autorinnen neben Geschlecht, ethnischer Zugehörigkeit auch andere Faktoren, wie Alter, Race, Grad der Distanz oder Nähe etc. berücksichtigt werden müssen, um vorschnelle Festschreibungen zu vermeiden. Hierbei spielen die Paratexte eine wichtige Rolle, in denen die Autorinnen sich persönlich zum Krieg äußern. Die Arbeit bewegt sich an den Schnittstellen mehrerer Disziplinen: Literatur, Historiographie und Geschlechterstudien. In der Einleitung werden die theoretischen Prämissen im Kontext von Krieg, Geschlecht und literarischer Repäsentation behandelt. Das 1. Kapitel ist dem historischen Kontext des Bürgerkrieges, einschließlich der Rolle der Frauen darin gewidmet. Im 2. Kapitel geht es um die Darstellung des Krieges, des Selbst- und Feindbildes sowie der Zukunft. Das dritte Kapitel handelt von der Beziehung zwischen Bürger- und Geschlechterkrieg, vermittelt durch das Medium literarischer Text. Die Zusammenfassung der Ergebnisse und der Ausblick auf zukünftige Forschung erfolgt im Schlussteil. Der Anhang enthält ein vorläufiges Verzeichnis der gesamten Frauenliteratur über den nigerianischen Bürgerkrieg.<br>No other topic has dominated the Nigerian literature as much as the Nigerian Civil War and female authors increasingly interfere in its literary representation. The thesis evaluates 34 literary texts by 16 female Nigerian authors - 12 novels and 22 short stories - and analyses them as distinctive corpus whose individual texts are in a state of dialogue both with each other and with texts from male authors. The female authors use, in their "war talk", literary strategies like "re-reading" and "re-writing" of texts from the "Centre". On the one hand, these strategies enable them to make the blind spots of a male dominated literary discourse apparent/visible on the other hand, they facilitate the negotiation of gender relations and of the war itself, its causes, trigger points and consequences. The female authors represent war as "sexual disorder", as gender war. The study shows that in order to be able to locate an author''s perspective (and to avoid rash conclusions) it is essential to consider the different factors determining it - besides ethnicity and gender, also age, race, the grade of emotional involvement or distance etc. It is in this regard, where the paratexts play an important part, as in these authors express their personal views and comments on the war. The thesis is located at the interfaces of several disciplines: literary, historical and gender studies. The introduction deals with the theoretical backgrounds in the context of war, literary representation and gender. The first chapter is dedicated to the historical context of the Nigerian Civil War including the role of women. The second chapter looks at the paratexts, different representations of the war''s causes, the self-image, the enemy''s image and the future. The third chapter finally deals with the question how the relationship between Civil War and gender war is negotiated/conveyed through the medium of the literary texts. In the conclusion the results are summarized and prospects for future research are discussed. The appendix contains a preliminary bibliography of all literary texts on the Nigerian Civil War written by female authors.
APA, Harvard, Vancouver, ISO, and other styles
32

Legotlo, Tsholofelo Gladys. "Mitigating fraud in South African medical schemes." Diss., 2017. http://hdl.handle.net/10500/23578.

Full text
Abstract:
The medical scheme industry in South Africa is competitive in relation to international standards. The medical scheme sector, as part of the healthcare industry, is negatively affected by the high rate of fraud perpetrated by providers, members and syndicates, which results in medical schemes funding fraudulent claims. The purpose of the study was to explore strategies to mitigate fraud in medical scheme claims. A qualitative research methodology was followed in this study, which adopted a case study approach. Empirical data was analysed through thematic analysis, with the aid of ATLAS.ti software. The study found that healthcare service providers mainly defraud medical schemes by submitting false claims. A holistic approach should be followed to mitigate fraud in medical scheme claims. This approach should encompass regularly identifying trends in fraudulent claims and implementing appropriate control strategies. Collaboration within the medical scheme industry and with other stakeholders would also help to elevate the fight against medical scheme fraud to a new level. Implementing the recommendations from the study will assist medical schemes to reduce the funds expended on fraudulent claims, thereby improving their financial viability and decreasing the rate of increase in medical scheme contributions for members.<br>Business Management<br>M. Com. (Business Management)
APA, Harvard, Vancouver, ISO, and other styles
33

Ramakgoakgoa, M. F. "The challenges brought by the fraud syndicate activities within Ritavi policing area of Limpopo Province." 2013. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001405.

Full text
Abstract:
M. Tech. Policing<br>The purpose of this study was to solicit the views of the South African Police Service (SAPS) members, both at local police and the Commercial Crime Branch levels, as well as from the wider representatives from the community, regarding the weaknesses of the SAPS Commercial Crime Branch strategies towards responding to syndicate fraud activities.
APA, Harvard, Vancouver, ISO, and other styles
34

Aschendorf, Cynthia Bernice. "Handwriting as individualisation technique in fraud investigation." Diss., 2013. http://hdl.handle.net/10500/11890.

Full text
Abstract:
The aim of this research is to investigate how handwriting as an individualisation technique in fraud investigation can be used by police detectives, SARS investigators and forensic investigation specialists, who are responsible for the investigation and linking the perpetrator, with a view to criminal prosecution. A further intent was to share and introduce a number of important concepts, namely: criminal investigation, identification, individualisation, fraud, evidence and handwriting. The research will explain the sophisticated investigation techniques used to obtain sufficient information to prove the true facts in a court of law. Identification is the collective aspect of the set of characteristics by which an object is definitively recognisable or known, while the individual characteristics establish the individuality of a specific object. Many types of evidence may be used to link an individual with a crime scene, and associate that individual with the performed illegal handling. It also explained that during a cheque/document fraud investigation, it is in most cases the only link to information to trace, identify and individualise the perpetrator, and to obtain a handwriting specimen. It is also discussed how to eliminate a person being a writer of a document, and how to collect, package and mark a disputed document during the investigation. If the investigators use their knowledge of these concepts, it should enhance their investigative skills, and empower them to be become better equipped for the challenges they face in identifying, individualising and linking the perpetrators, in order to ensure successful prosecution and conviction.<br>Police Practice<br>M.Tech. (Forensic Investigation)
APA, Harvard, Vancouver, ISO, and other styles
35

Grebe, Gerhard Philip Maree. "The management of fraud risk in South African private hospitals." Diss., 2014. http://hdl.handle.net/10500/18557.

Full text
Abstract:
The concept of sustainability has become imperative for any organisation in order to survive and prosper in the long term. As such, the management of fraud risk has become an important component for organisations in order to achieve this objective. The purpose of this study was to explore the management of fraud risk within the South African private hospital sector. The study endeavoured to ascertain how private hospitals in South Africa manage fraud risk. In this regard, problem areas in the management of fraud risk were identified, and recommendations are provided in order to improve the management of fraud risk in the South African private hospital sector. Primary data was collected by means of survey research, which involved management staff at head office level and at hospital level, as these two groups were identified to have the required expertise and experience with regard to risk management procedures and practices within South African private hospitals. The findings suggested that South African private hospitals could improve their current risk management practices, in particular with regard to fraud risk. By implementing the recommendations provided by the study, private hospitals will be able to manage fraud risk more effectively. These recommendations will not only be beneficial to private hospitals, but will also have a positive effect on numerous external stakeholders, because the effective management of fraud risk could lead to considerable cost savings. The public hospital sector of South Africa would equally find the research findings and recommendations of value because it could also be applied to their fraud risk management practices.<br>Business Management<br>MCOM (Business Management)
APA, Harvard, Vancouver, ISO, and other styles
36

Tanfa, Denis Yomi. "Advance fee fraud." Thesis, 2006. http://hdl.handle.net/10500/2304.

Full text
Abstract:
The focus of this thesis is on Advance Fee Fraud (419 scams) on how it is executed and more importantly, on how it can be prevented. The research addresses the origins of AFF, the nature and extent of this crime and how the perpetrators are able to defraud their victims. The research described, examined and analysed the crimes, the perpetrators, the victims, adjudication and the prevention strategies of this fraud. Information was gathered through literature and empirical research. A qualitative research method was used to gather information from AFF offenders who were incarcerated in South African prisons in 2005. The results of the empirical research were carefully examined, analyzed and integrated into the various chapters of this thesis. A theoretical framework was also developed in an attempt to explain this complex phenomenon. The findings and recommendations in terms of the crimes, the criminals, the victims, adjudication and prevention were also made and some suggestions for further research thereof were also cited.<br>Criminology<br>D. Litt. et Phil. (Criminology)
APA, Harvard, Vancouver, ISO, and other styles
37

Sivnarain, Ranesh. "The value of investigative profiling of fraud offenders by forensic investigators." Thesis, 2010. http://hdl.handle.net/10500/4300.

Full text
Abstract:
The problem that the researcher encountered was that forensic investigators were found not to be formally using offender profiling as an investigative technique during investigations into fraud. This research was conducted to ascertain how offender profiling may be useful in expediting the forensic investigation process. The purpose of this research was to establish what offender profiling is, and what aspects or ingredients constitute such an offender profile. As offender profiles will serve as an aid in future forensic investigations into fraud, this study attempted to create an understanding and awareness of the value of offender profiling. In order for forensic investigators to use offender profiling during routine fraud investigations, it is extremely important that they understand the concept and its practical implementation. The overall purpose of this study is to provide practical recommendations for the implementation and use of offender profiling to forensic investigators both in the public and private sectors.<br>Criminal and Procedural Law<br>(M.Tech. (Forensic Investigation))
APA, Harvard, Vancouver, ISO, and other styles
38

Thenga, Godfrey. "The value of modus operandi in investigating child support grant fraud." Diss., 2014. http://hdl.handle.net/10500/18754.

Full text
Abstract:
While establishing modus operandi information is an investigative technique that is used globally in the investigation of fraud, investigators of child support grant fraud in South Africa do not properly use this technique in their investigation. The study sought to examine the modus operandi used by civil servants in unduly accessing child support grand fraud. The study adopted a qualitative approach, with structured interviews and literature as data-collection methods. Two sample groups were used to gather data. The data was analysed using spiral method. The study found that modus operandi as a valuable investigation tool was not properly used and in other instances was never used in the investigations. On the basis of the findings, it is recommended that modus operandi captured on the police and corporate database systems be used as reference for comparing modus operandi of known grants fraudsters. Training and skills be provided to public and corporate investigators on the use of modus operandi information in the investigation of social grants. To ensure that good practice is developed, a modus operandi guideline document should be crafted by the South African Police Services' detective division at National level and corporate investigators respectively, with a view to improve conviction rate.<br>Criminology and Security Science<br>M. Tech. (Forensic Investigation)
APA, Harvard, Vancouver, ISO, and other styles
39

Geldenhuys, Nicolaas D. C. "An evaluation of identification methods used in the investigation of counterfeit card fraud." Diss., 2016. http://hdl.handle.net/10500/21185.

Full text
Abstract:
Today, the use of one's bank card to pay or withdraw money is common. Modern technology provides us with the convenience of instant transactions at the automated teller machine or point of sale but unfortunately, it has also brought the reality and risk of card skimming and counterfeit card fraud. Criminals have become very efficient and technologically advanced in skimming and counterfeiting cards, to such an extent that counterfeit card fraud has become a significant threat to the public, banking, retail and business in South Africa. Counterfeit card fraud is a complex, multi-faceted crime, requiring specific skills and knowledge of card counterfeiting methods from police and bank investigators. The scope of its investigation is wide. It includes different crime scenes and offenders, sophisticated equipment and various aspects that need to be identified positively. Investigators find it difficult to identify perpetrators and certain aspects unique to this crime and, as a result, many investigations are unsuccessful. This research endeavours to establish what identification methods are available to investigators and which are effective.<br>Police Practice<br>M. Tech. (Forensic Investigation)
APA, Harvard, Vancouver, ISO, and other styles
40

Botha, Christoffel Rudolph. "Bedrog in die Suid-Afrikaanse strafreg." Thesis, 2015. http://hdl.handle.net/10210/14168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Budhram, Trevor. "Examining the unique security features of a credit card with the aim of identifying possible fraudulent use." Diss., 2007. http://hdl.handle.net/10500/631.

Full text
Abstract:
The use of credit cards has become a way of life in many parts of the world. Credit cards have also created many new opportunities for criminal activity. It is in this light that organizations such as VISA International have explored a variety of security alternatives by constantly reviewing security measures that may be applied to cards and devote considerable resources to the maintenance of security systems and programmes. These programmes mandated by the association, include uniform card standards, security standards for manufactures, embossing and encoding of cards, standards for mailing the cards and credit background investigations of applicants. These standards assist investigators in examining counterfeit cards and distinguish a counterfeit card from a genuine card. The constant reviewing of security features and methods by the association is to create a card that is technically difficult to alter or counterfeit.<br>Criminology<br>M.Tech. (Forensic Investigation)
APA, Harvard, Vancouver, ISO, and other styles
42

Van, der Linde Carien. "Vicarious liability of banks for fraudulent conduct of their employees." Thesis, 2015. http://hdl.handle.net/10210/13973.

Full text
Abstract:
LL.M. (Banking Law)<br>When a bank employee commits fraudulent acts within the course and scope of his employment, he renders the bank vicariously liable for his fraud. The logical conundrum is that since a bank never employs someone to commit fraud, and since fraud is thus never in this sense within the course and scope of his employment, should the bank never be liable for this fraudulent conduct? If this were the law, the public could potentially be defrauded with impunity, because those defrauded would be left only with a claim against a fraudster who likely has no assets. This dissertation examines the common-law doctrine of vicarious liability and illustrates the sometimes-haphazard manner in which courts have applied the underlying principle to the varying facts that arise. It will be shown that the application of the doctrine to cases involving fraud by bank employees is particularly inconsistent and unsatisfactory. It will be proposed that the solution lies in the development of the common law so as to promote the spirit, purport and objects of the Bill of Rights, and particularly section 25 of the Constitution. 2 This paragraph conceptualises the vicarious liability doctrine. Paragraph 2 considers the application of the doctrine by the courts, and points to inconsistencies in approach. The third paragraph deals briefly with the position in two common-law jurisdictions, Canada and Britain. The final paragraph proposes a solution to the observed inconsistencies: an employee acts in the course and scope of his employment for purposes of imposing vicarious liability when the employer’s right not to be arbitrarily deprived of his property in terms of section 25 of the Constitution is acknowledged, and his vicarious liability is limited to cases where there is a rational relationship between the employee’s fraudulent conduct and the scope of his employment, and not an arbitrary deprivation. In considering the South African cases, it readily becomes apparent that the courts have already instinctively adopted the approach of examining the nature and extent of the deviation by the employee from the scope of his employment, but have not done so in the context of the property clause ...
APA, Harvard, Vancouver, ISO, and other styles
43

Motsepe, Lesiba Lolly. "A critical analysis of the investigative capacity of general detectives in handling fraud cases." Thesis, 2019. http://hdl.handle.net/10500/25550.

Full text
Abstract:
This study investigates the question of investigative capacity of South African Police Service general detectives at the local station level with regard to fraud investigation. The research presented in this thesis is based on a qualitative thematic analysis of the systemic investigative capacity of the detectives handling fraud and related offences. Fraud related crimes are consistently dismissed and perceived as less serious than violent crime, yet the impact of fraud affects individuals, organisations, and society. This study includes interviews with n = 15 (83%) participants out of 18 (100%) using a semi-structured interview schedule for data collection. The available literature indicates the increasing incidents of general fraud being inadequately investigated at the local police stations because of investigative incapacity. The complexities of any criminal investigation require sufficient resources to achieve the highest level of investigative performance. In this regard, criminals are gradually outwitting the conventional methods of fraud investigation, especially in terms of technological advancements. The study’s findings reveal how general detectives are systematically tested to their capacity in relation to fraud investigation – inter alia, participants identified the following challenges to meeting investigative objectives: ambiguous general fraud investigation directives, poor training, limited resources, abuse of available resources, unreasonably high workloads, and human resource shortages. These institutional factors need consideration to allow progress in criminal investigation procedures. This study creates the context for the recommendation that a series of systemic reforms be introduced, based on a professional model, pertaining specifically to fraud investigation at the local police station level. This means some of the distinct investigative practices that are effective be inverted and strengthened in recognition of the scope and complexity of general fraud, and the influence this complexity has on investigative methodology. For example, setting up proper and recognised station-level fraud units to handle incoming “general fraud” cases, staffed with trained detectives, who have access to adequate resources. This would create an opportunity to address institutional issues around training to rectify general detectives’ core skill deficiencies prior to them being assigned to criminal cases. Training should include case management, investigative procedures, and the use of technology (to effectively combat digital fraud). Moreover, it is vital to maintain an oversight over the fraud mandates which differentiate the scope of practice between vii specialist and general detectives, with a thorough understanding of what constitutes general fraud and complex, organised fraud. It is furthermore suggested that local and international best practice trends be implemented by general detectives in their fraud investigations.<br>Thutopatlisiso eno e sekaseka ntlha ya bokgoni jwa go batlisisa jwa matseka a kakaretso a Tirelo ya Sepodisi sa Aforikaborwa kwa legatong la seteišene sa selegae malebana le dipatlisiso tsa boferefere. Patlisiso e e tlhagisitsweng mo thesising eno e theilwe mo tshekatshekong e e supang, e tlhatlhoba le go kwala ditiragalo tsa bokgoni jwa go dira dipatlisiso jwa matseka a a dirang ka ditlolomolao tsa boferefere le tse di amanang le tseo. Bosenyi jo bo amanang le boferefere gantsi bo kgaphelwa thoko mme bo tsewa e le bosenyi jo bo sa tsenelelang go tshwana le bosenyi jwa tirisodikgoka, fela ditlamorago tsa boferefere di ama batho, ditheo le setšhaba. Thutopatlisiso eno e akaretsa dipotsolotso le banni le seabe ba le n = 15 (83%) go tswa go ba le 18 (100%), go dirisiwa sejule ya dipotsolotso e e batlileng e rulagane go kokoanya tshedimosetso. Dikwalo tse di gona di supa koketsego ya ditiragalo tsa go se batlisisiwe go go lekaneng ga boferefere jwa kakaretso kwa diteišeneng tsa selegae tsa sepodisi ka ntlha ya tlhaelo ya bokgoni jwa go batlisisa. Marara a patlisiso epe fela ya bosenyi a tlhoka ditlamelo tse di lekaneng go fitlhelela tiragatso e e kwa godimo ya patlisiso. Mo ntlheng eno, disenyi di tlhalefetse mekgwa ya tlwaelo ya dipatlisiso tsa boferefere, bogolo segolo mo ntlheng ya tswelelopele ya thekenoloji. Diphitlhelelo tsa thutopatlisiso di bontsha ka moo bokgoni jwa matseka bo lebaganang le teko e e boitshegang ka gona malebana le dipatlisiso tsa boferefere – gareng ga tse dingwe, banni le seabe ba supile dikgwetlho tse di latelang malebana le go fitlhelela maitlhomo a dipatlisiso: dikaelo tse di sa tlhamalalang ka kakaretso malebana le dipatlisiso tsa boferefere, katiso e e bokoa, ditlamelo tse di tlhaelang, tiriso e e botlhaswa ya ditlamelo tse di gona, selekano sa tiro se se kwa godimo moo go sa amogelesegeng mmogo le tlhaelo ya badiri. Dintlha tseno tsa mo setheong di tlhoka go lebelelwa go kgontsha gore go nne le tswelelopele mo ditsamaisong tsa dipatlisiso tsa bosenyi. Thutopatlisiso eno e tlhoma bokao jwa dikatlenegiso tsa gore go itsesewe diphetogo tsa thulaganyo di le mmalwa, di theilwe mo sekaong sa porofešenale, se se totileng dipatlisiso tsa boferefere kwa legatong la seteišene sa selegae sa sepodisi. viii Seno se kaya gore ditiragatso dingwe tsa dipatlisiso tse di dirang sentle di rulaganngwe sešwa le go maatlafadiwa go lebeletswe bogolo le marara a boferefere ka kakaretso, mmogo le tshusumetso ya marara ano mo mokgweng wa dipatlisiso. Seno se kaya, go naya sekai, go tlhoma diyuniti tsa boferefere tse di siameng le tse di lemogwang kwa legatong la seteišene go samagana le dikgetse tse di tsenang tsa "boferefere jwa kakaretso", di na le matseka a a katisitsweng, a a kgonang go fitlhelela ditlamelo tse di maleba. Seno se tlaa dira tšhono ya go samagana le dintlha tsa setheo malebana le katiso go lolamisa tlhaelo ya bokgoni jwa botlhokwa jwa matseka a kakaretso pele ga ba ka rebolelwa dikgetse tsa bosenyi. Katiso e tshwanetse go akaretsa tsamaiso ya dikgetse, tsamaiso ya dipatlisiso le tiriso ya thekenoloji (go lwantsha boferefere jwa dijitale ka nonofo). Mo godimo ga moo, go botlhokwa go nna le tlhokomelo ya dithomo tsa boferefere e e farologanyang tiro ya matseka a baitseanape le a kakaretso, go tlhaloganngwa sentle pharologano magareng ga boferefere jwa kakaretso le boferefere jo bo marara jo bo rulaganeng. Gape go tshitshinngwa gore matseka a kakaretso a diragatse mekgwa ya tiragatso e e gaisang ya selegae le ya boditšhabatšhaba mo dipatlisisong tsa ona tsa boferefere.<br>Police Practice<br>D. Litt. et Phil. (Police Science)
APA, Harvard, Vancouver, ISO, and other styles
44

Myeza, Nkosinathi Wonderboy. "Significance of bank records analysis as a technique in tracing fraud suspects." Diss., 2014. http://hdl.handle.net/10500/19024.

Full text
Abstract:
Text in English<br>The research attempts to establish the significance of bank records analysis as a technique in tracing fraud suspects. The purposes of conducting this research was to establish the current approach by the investigators of the SAPS in respect of bank records analysis in tracing fraud suspects; to explore and report on the findings of national and international literature in an attempt to find new information thereby improving the current method of bank records analysis and its specific use in tracing fraud suspects; and to make new information, in the form of written articles and this dissertation, available to the SAPS to be considered for inclusion in the training curriculum for their investigators. In collecting data, the researcher used literature study, interviews with individual participants and case dockets analysis. Essentially, the recommendations were drawn from the conclusions of the data obtained. These recommendations may offer solutions to the problem identified.<br>Criminology and Security Science<br>M. Tech. (Forensic Investigation)
APA, Harvard, Vancouver, ISO, and other styles
45

Benade, Dirk Christoffel. "Corporate governance and fraud: an investigation to determine whether the primary recommendations of the king report can assit in preventing management irregularities within an organisation." Thesis, 2016. http://hdl.handle.net/10539/20645.

Full text
Abstract:
A Research Report Submitted to the Faculty of Commerce University of the Witwatersrand, Johannesburg in partial fulfilment of the requirements for the degree of Mastel of Commerce Johannesburg 1995<br>The King Report released in South Africa in 1994 has the potential to revolutionise the country's existing form of Corporate Governance. The objective of the report is to improve the system by which companies in South Africa are directed and controlled (King Report, 1994:1). This objective encompasses decreasing the risk of management fraud within entities. The question which this research report addresses is whether a reduction in the risk of management irregularities in an organisation can be achieved through adherence to the King Report's proposals. To obtain this answer a South African company which experienced significant management frauds was selected for examination as a case study, and a determination was made as to whether the proposals of the King Report, had they been implemented, could have prevented the irregularities which occurred in the organisation. The finding of the research is that diligent compliance with the King Report's recommendations can assist significantly ill both preventing and detecting management fraud, but is unlikely to prevent all management irregularities within an organisatlon
APA, Harvard, Vancouver, ISO, and other styles
46

Mahalefa, Andries. "Vetting as a technique to investigate employment fraud in the City of Johannesburg." Diss., 2020. http://hdl.handle.net/10500/27197.

Full text
Abstract:
The research study covers the following topic “Vetting as a Technique to Investigate Employment Fraud in the City of Johannesburg Metropolitan”. The researcher intends to evaluate the current procedures which are used in the process of forensic vetting as employment fraud investigation method in CoJ. Furthermore, to build the ground work for potential future innovation, problem solving, decision making and proper planning of the use of forensic vetting as employment fraud investigation method. The researcher applied the qualitative approach throughout the research because qualitative involves interaction between the researcher and the subject that was identified as a problem that concerned CoJ The researcher had selected ten (10) forensic investigators to partake in this study. The total population to be interviewed and collect data from was considerable and appropriate for evaluating forensic vetting as an employment fraud investigation method. The researcher used purposive sampling to choose the participants for this research. It was found that every individual within an organ of the State must be subjected to the vetting process. It was further found that the institutions in governmental, organs of the State and private spheres must adopt the forensic vetting practice to minimize fraudulent activities in their organizations.<br>Department of Police Practice<br>M. Tech. (Forensic Investigation)
APA, Harvard, Vancouver, ISO, and other styles
47

Modikoe, Semfeng Agnes. "Evaluation of fraud prevention measures in the Unemployment Insurance Fund, North West Province / Semfeng Agnes Modikoe." Thesis, 2004. http://hdl.handle.net/10394/11305.

Full text
Abstract:
The fraud prevention measures in Unemployment Insurance Fund, North West Province, were evaluated in this study. The manual on fraud prevention measures was formulated and started implementation in 2000, and since !hen, no review was made. Different literature was reviewed to find out what other researchers say about the related problem. In reviewing literature, it was found out that fraud had an adverse effect in any business, and the best way to combat or prevent it, was to formulate and implement some preventative measures, monitor and review them at least annually. Data gathering was conducted by distributing questionnaires to different staff of Unemployment Insurance Fund throughout the North West province. The questionnaires were aimed at identifying the most vulnerable areas to fraud, evaluating the effectiveness of fraud prevention measures, identifying different types and causes of fraud and finding out whether contributors and their employers are well informed about the Unemployment Insurance Fund. The study found that the existing fraud prevention measures were not quite effective in the sense that they are reactive than preventive according to the respondents. Claims, accounts and registry sections were identified as the most vulnerable sections. The most prevalent types of frau din the UJF were found to he cheque, cash, and identity frauds, The study again found the main causes of fraud in UIF are ineffective internal controls, lack of strict supervision, income disparities and low salaries of lower level employees. It also came to light on the study that there has not been any significant change in fraud since the year 2000 after the formulation and implementation of fraud prevention measures among the ways to reduce fraud as suggested by the employees are salary review, constant supervision, intensive investigations and awareness campaigns what is essential to effectively reduce the level of fraud in the UIF is effective implementation of the preventive oriented internal controls coupled with strict supervision.<br>Thesis (MBA) North-West University, Mafikeng Campus, 2004
APA, Harvard, Vancouver, ISO, and other styles
48

Themeli, Aluwani Rufaroh. "Exploring the value of computer forensics in the investigation of procurement fraud." Diss., 2017. http://hdl.handle.net/10500/22400.

Full text
Abstract:
The research problem for this study was that forensic investigators in the Forensic Services (FS) of the City of Tshwane (CoT) are unable to successfully deal with procurement fraud as a result of the lack of knowledge, skills and resources required to conduct computer forensics during the investigation of procurement fraud. This research was conducted to ascertain the value of computer forensics in the investigation of procurement fraud. Further, the study sought to determine how to improve the CoT forensic investigators’ knowledge and competence regarding the application of computer forensics in the investigation of procurement fraud. The purpose of this study was to explore the procedures that should be followed by CoT forensic investigators when conducting computer forensics during the investigation of procurement fraud. The research also aimed to discover new information, not previously known to the researcher, related to computer forensics during the investigation of procurement fraud by exploring national and international literature. In addition, the study explored existing practices so as to use this information to improve the current CoT procedure, within the confines of the legislative requirements. The overall purpose of this study is to provide practical recommendations for best practices, based on the results of the data analysis, which address the problem and enhance the investigative skills of CoT forensic investigators. The study established that it is imperative and compulsory to apply computer forensics in any procurement fraud investigation in order to efficiently track down cyber criminals and solve complicated and complex computer crimes. It was also established that forensic investigators within the FS in the CoT lack the necessary computer skills to optimally investigate procurement fraud. It is therefore recommended that CoT forensic investigators acquire the necessary skills and essential training in computer forensics in order to improve their knowledge and competence regarding the application and understanding of the value of computer forensics in the investigation of procurement fraud.<br>School of Criminal Justice<br>M.Tech. (Forensic Investigation)
APA, Harvard, Vancouver, ISO, and other styles
49

"The doctrine of unconscionability as an independent exception to the doctrine of independence in documentary credit practice." Thesis, 2015. http://hdl.handle.net/10210/14037.

Full text
Abstract:
LL.M. (Banking Law)<br>It has long been the vogue that the traditional fraud exception is the only exception capable of defeating the doctrine of independence in documentary-credit and performance-guarantee practice. The reason for this is self-explanatory, for it has been stated authoritatively that fraud unravels all. And on construction, this must be the correct legal position. Even then however, the fraud exception is not in itself unassailable. Given the nature and exigency of the contractual relationships peculiar to documentary credits and performance guarantees, it is indubitable for their success that these unique contractual relationships be independent of one another. The latter argument is well established in the law and practice of many jurisdictions. Commercial comity, aspirations, expediency, fair trading and a measure of certainty, inter alia, dictate the necessity for the sanctity and preservation of the doctrine of independence. Without such certainty, international commercial enterprise and entrepreneurship will be the victims. Nevertheless, it would still be fair to state that there is a broad consensus within various jurisdictions regarding the application of a fraud exception to the doctrine of independence, which simply cannot be said for an exception based on unconscionability. There are cogent reasons for this disparity, some in favour of and some against an unconscionability exception. The question which begs an answer is whether the recognition of such an exception would erode the certainty and cash characteristics, inherent and integral to documentary credit and performance guarantee practice. These instruments were, after all, designed and predicated upon tenets of certainty and considered as immediately redeemable cash. Ultimately, this debate involves a choice between embracing commercial certainty on the one hand, and fairness on the other hand. In South Africa however, unconscionability does not exist as a specific concept of law with wide and uncertain parameters. But, the concept of good faith, equally confusing, awkwardly finds its place in the South African general law of contract, but in an informative capacity to the substantive requirements of the law, and not as an independent general defence. A defence in the general law of contract in South Africa, premised on the lack of good faith is bad in law, given the established brocards such as inter alia, caveat subscriptor, caveat emptor, pacta sunt servanda, 5 and the contra proferentem rule. South African legal heritage and precedent have jettisoned the exceptio doli generalis, and this precedent is peculiarly protected by the judiciary at the highest level. Good faith, in the South African context, is not the equivalent of the so called doctrine of unconscionability analysed and discussed in the academic literature and court decisions of certain common-law jurisdictions, but the exceptio doli generalis may have been, or rather, if properly developed, could have been. And so, from a South African perspective, there is the added difficulty of considering the introduction of a foreign broad-based, uncertain and undefinable doctrine grounded in equity, when the narrowly defined concept of good faith, only informative of the substantive law, finds no general application in the law of contract in South Africa. Regard will thus be had to inter alia: the nature, scope and elements (facta probanda) of this exception; certain arguments for and against its recognition; its inability to be defined with the necessary precision required for legal efficacy and practice; its lack of certainty being in essence descriptive of a host of other conduct short of fraud and inclusive of fraud; and whether the case for its recognition might perhaps have merit and applicability in relation to performance guarantees, separate and distinct from documentary credits.
APA, Harvard, Vancouver, ISO, and other styles
50

Venter, Jan Willem Nicolaas. "The exploration of appraising internal controls to detect procurement fraud during the tender stage at mines." Diss., 2016. http://hdl.handle.net/10500/22603.

Full text
Abstract:
Text in English<br>Procurement fraud is an enormous problem and the South African news is perforated with reports of this illicit act. Procurement fraud occurs in all the phases of the procurement cycle, but this illicit act is mostly committed during the tender phase. Business does not see procurement fraud as a crime and therefor this crime is committed due to non-existent internal controls and processes to assess the adequacy of these controls. The purpose of the research was to highlight that procurement fraud occurs when internal controls are being bypassed or if an entity has an ineffective internal control system. The researcher studied the appraising of internal controls to understand the role it plays in detecting, preventing and investigating procurement fraud, specifically during the tender phase. The research design utilised was a qualitative research approach and an empirical design plan or strategy, to obtain the information. The researcher opted for this design to obtain information from literature and information from individuals in appraising internal controls. This ensured a comprehensive data gathering process. The goal of this research was to provide practical recommendations to assist investigators in private and public sectors with investigations into procurement fraud during a tender.<br>Police Practice<br>M. Tech. (Forensic Investigation)
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography