dc.contributor.advisor |
Horne, Juanida
|
|
dc.contributor.author |
Naude, Charl Johannes
|
|
dc.date.accessioned |
2024-01-18T13:50:59Z |
|
dc.date.available |
2024-01-18T13:50:59Z |
|
dc.date.issued |
2019-01-30 |
|
dc.identifier.uri |
https://hdl.handle.net/10500/30730 |
|
dc.description.abstract |
The researcher's goal in this research was to identify a need on how the investigation process of identity theft should be performed within a corporate environment. The researcher noticed the dramatic increase in cases of identity theft during 2014 while working at Nashua Mobile as the Risk and Fraud Manager, and daily liaising with MTN and Cell C. The research was completed by conducting a literature review and face-to-face interviews with MTN and Cell C forensic investigators.
The aim of this research was to determine how the investigation process of identity theft should be performed within a corporate environment. The investigator needs to know how to maintain the chain of evidence and submit evidence in court for successful prosecution. Although the research focused on the telecoms industry, the study appears to be instrumental in all types of organisations that are prone to identity theft. |
en |
dc.format.extent |
1 online resource (x, 104 leaves) : color illustrations |
|
dc.language.iso |
en |
en |
dc.subject |
Identity theft |
en |
dc.subject |
Investigation |
en |
dc.subject |
Detective |
en |
dc.subject |
Investigator |
en |
dc.subject |
Forensic investigation |
en |
dc.subject |
Corporate environment |
en |
dc.subject.ddc |
363.2596330968 |
|
dc.subject.lcsh |
Identity theft -- South Africa |
en |
dc.subject.lcsh |
Data protection -- South Africa |
en |
dc.subject.lcsh |
Commercial crimes -- South Africa |
en |
dc.subject.lcsh |
Mobile device forensics -- South Africa |
en |
dc.subject.lcsh |
Cell phone services industry -- Security measures -- South Africa |
en |
dc.subject.lcsh |
Criminal investigation -- South Africa |
en |
dc.subject.other |
UCTD |
|
dc.title |
A critical discussion of the investigation process of identity theft within a corporate environment |
en |
dc.type |
Dissertation |
en |
dc.description.department |
Criminology and Security Science |
en |
dc.description.degree |
M. Tech. (Forensic Investigation) |
|