Browse > Article
http://dx.doi.org/10.7472/jksii.2016.17.3.115

Designing a Crime-Prevention System by Converging Big Data and IoT  

Jeon, Jin-ho (Graduate School of Business IT, Kookmin Univ.)
Jeong, Seung-Ryul (Graduate School of Business IT, Kookmin Univ.)
Publication Information
Journal of Internet Computing and Services / v.17, no.3, 2016 , pp. 115-128 More about this Journal
Abstract
Recently, converging Big Data and IoT(Internet of Things)has become mainstream, and public sector is no exception. In particular, this combinationis applicable to crime prevention in Korea. Crime prevention has evolved from CPTED (Crime Prevention through Environmental Design) to ubiquitous crime prevention;however, such a physical engineering method has the limitation, for instance, unexpected exposureby CCTV installed on the street, and doesn't have the function that automatically alarms passengers who pass through a criminal zone.To overcome that, this paper offers a crime prevention method using Big Data from public organizations along with IoT. We expect this work will help construct an intelligent crime-prevention system to protect the weak in our society.
Keywords
Big Data; IoT; Crime Prevention; Public Sector;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Cvijikj, I. P., Kadar, C., Ivan, B. and Te, "Towards a crowd sourcing approach for crime prevention", UBICOMP/ISWC '15, 2015, pp.1367-1372. http://dx.doi.org/10.1145/2800835.2800971
2 Wilcox, S. P., "AGENTIZING THE SOCIAL SCIENCE OF CRIME", Winter Simulation Conference, 2011.
3 Prosecutors's office, "Statistics of Sexual Crime during 10years in 2015 in Korea", Prosecutors' office, 2015. http://www.sppo.go.kr
4 Tibor Bosse, C. G., "An Agent-Based Framework to Support Crime Prevention", International Foundation for Autonomous Agents and Multiagent Systems, 2010. http://www.few.vu.nl/-{tbosse, cg}
5 Kyung, J-H, "Meaning and Limitation of technical crime prevention", Korean Criminological Review, 2013.
6 Erete, S. L., "Engaging Around Neighborhood Issues", 2015, pp1590-1601. http://dx.doi.org/10.1145/2675133.2675182   DOI
7 Erete, S. L., Miller, R. and Lewis, D. A., "Differences in technology use to support community crime prevention", The Powers of Co-location, 2014, pp.153-156. http://dx.doi.org/10.1145/2556420.2556499   DOI
8 Erete, S. L., "Empowerment Through Community Crime-Prevention Technologies", FORUM COMMUNITY + CULTURE, 2014. http://dx.doi.org/DOI:10.1145/2517444
9 Dillahunt, T. R., "Fostering social capital in economically distressed communities", 2014, pp.531-540. http://dx.doi.org/10.1145/2556288.2557123   DOI
10 Erete, S. L., "Protecting the Home, exploring the Roles of Technology and Citizen Activism from a Burglar's Perspective", Changing Perspectives, 2013.
11 Daniele Quercia, L. M. A., Rossano Schifanella, "The Digital Life of Walk able Streets", The International World Wide Web Conference Committee, 2015. http://dx.doi.org/10.1145/2736277.2741631.
12 Ghose, A., Sinha, P., Bhaumik, C., Sinha, A., Agrawal, A. and Dutta Choudhury, "A UbiHeld-Ubiquitous Healthcare Monitoring System for Elderly and Chronic Patients", UbiComp'13, 2013, pp1255-1264. http://dx.doi.org/10.1145/2494091.2497331   DOI
13 Theresa L. Hillenbrand-Gunn, M. J. H., Pamela A. Mauch, and Hyun-joo Park, "Men as Allies: The Efficacy of a High School Rape Prevention Intervention", Journal of Counseling & Development, 2010.
14 Schneider, R. M., "A Comparison of Information Security Risk Analysis in the Context of e-Government to Criminological Threat Assessment Techniques", InfoSecCD, 2010.
15 Kiyoshi Murata, Y. O. Japanese,"Risk Society: Trying to Create Complete Security and Safety Using Information and Communication Technology", SIGCAS Computers and Society, 2010, Volume 40, No. 2.
16 Kitchin, R., "Big data and human geography: Opportunities, challenges and risks", National University of Ireland, 2013. http://dx.doi.org/DOI: 10.1177/2043820613513388
17 Lazar, N., "The Big Picture: Data, Data, Everywhere ....", CHANCE2013, 2013. http://www.tandfonline.com/loi/ucha20
18 Kayode Ayankoya, A. C., Jean Greyling, "Intrinsic Relations between Data Science, Big Data, Business Analytics and Datafication", SAICSIT2014, 2014. http://dx.doi.org/10.1145/2664591.2664619
19 GANG-HOON KIM, S. T., AND JI-HYONG CHUNG, "Big-Data Applications in the Government Sector", COMMUNICATIONS OF THE ACM2014, 2014. http://dx.doi.org/10.1145/2500873
20 Lewis, S., "Examining and Designing Community Crime Prevention Technology", ACM, 2012.
21 Erete, S. L., "Crime Prevention Technologies in Low-Income Communities", XRDS, 2012, Vol .19, no.2. http://dx.doi.org/DOI: 10.1145/2382856.2382867
22 Guo, B., Wang, Z., Yu, Z., Wang, Y., Yen, N. Y., Huang, R. and Zhou, X., "Mobile Crowd Sensing and Computing", Computing Surveys, 2015, pp.1-31. http://dx.doi.org/10.1145/2794400
23 Andrew Garbett, J. K. W., Ben Kirman, Conor Linehan,Shaun Lawson, "Anti-Social Media: Communicating Risk through Open Data, Crime Maps and Locative Media", Proceedings of HCI KOREA, 2015.
24 Rexy Arulanandam, B. T. R. S., Maryam A., "Extracting Crime Information from Online Newspaper Articles", The Second Australasian Web Conference, 2014.
25 Bogomolov, A., Lepri, B., Staiano, J., Oliver, N., Pianesi, F. and Pentland, "A Once Upon a Crime", International DOI Foundation, 2014, pp.427-434. http://dx.doi.org/10.1145/2663204.2663254   DOI
26 John (Jong Uk) Choi, S. A. C., Dong Hwa Kim, Angelos Keromytis, "SecureGov: Secure Data Sharing for Government Services", the 14th Annual International Conference on Digital Government Research, 2013.
27 Youzhong Ma, X. H., JiaRao, Yu Zhang, Weisong Hu, Yunpeng Chai, Xiaofeng Meng, Chunqiu Liu, "An Efficient Index for Massive IOT Data in Cloud Environment", CIKM'12, 2012.
28 Toole, J. L., Eagle, N. and Plotkin, J. B., "Spatiotemporal correlations in criminal offense records", ACM Transactions on Intelligent Systems and Technology, 2011, pp.1-18. http://doi.acm.org/10.1145/1989734.1989742
29 Mohammad A. Tayebi, M. J., Martin Ester, Uwe Glasser, Richard Frank, "Crime Walker: A Recommendation Model for Suspect Investigation", RecSys'11, 2011.
30 Kim, J.-P., "Busan crime prevention system using the Big Data", Provincial administrative informative study, 2013. http://www.sasang.go.kr
31 Jee-Eun Kim, M. B., Noboru Koshizuka,Ken Sakamura, "Enhancing Public Transit Accessibility for the Visually Impaired Using IoT and Open Data Infrastructures", Urb-IoT 2014, 2014. http://dx.doi.org/DOI:10.4108/icst.urpb-iot.2014.257263
32 Ministry of Science, "Utilization manual for big data usage by stages (Version 1.0)", Ministry of Science, 2014.
33 Dimitropoulos, E. G. S. B. A. X.,"Visualizing big network traffic data using frequent pattern mining and hypergraphs" First IMC Workshop on Internet Visualization, 2014. http://dx.doi.org/DOI 10.1007/s00607-013-0282-8
34 Mehdi Mirakhorli, H.-M. C., Rick Kazman, "Mining Big Data for Detecting, Extracting and Recommending Architectural Design Concepts", 1st International Workshop on Big Data Software Engineering, 2015. http://dx.doi.org/DOI 10.1109/BIGDSE.2015.11
35 Wild, F.,"Latent Semantic Analysis",SnowballC, 2015.
36 Kazunari Sugiyama, K. H., Masatoshi Yoshikawa, Shunsuke Uemura, "Refinement of TF-IDF Schemes for Web Pages using their Hyperlinked Neighboring", HT' 03, 2003.
37 Claire Fautsch, J. S., "Adapting the tf idf Vector-Space Model to Domain Specific Information Retrieval", SAC'10, 2010.
38 Alexey Miroshnikov, E. M. C.,"Parallel MCMC combine: An R Package for Bayesian Methods for Big Data and Analytics", PLOS ONE 2014, 2014. http://www.plosone.org
39 Ayankoya, K., Calitz, A. and Greyling, J. "Intrinsic Relations between Data Science, Big Data, Business Analytics and Datafication", 2014, 192-198. http://dx.doi.org/10.1145/2664591.2664619   DOI
40 http://www.sppo.go.kr
41 Barros, C. P. and Alves, F. P., "Efficiency in Crime Prevention: A Case Study of the Lisbon Precincts", International Advances in Economic Research, 2005, pp.315-328. http://dx.doi.org/DOI: 10.1007/s11294-005-6660-z
42 Victor Raskin, J. M. T., Christian F., Hempelmann, "Ontological Semantic Technology for Detecting Insider Threat and Social Engineering", ACM, 2010.
43 Thomas Heverin, L. Z., "Twitter for City Police Department Information Sharing", The College of Information Science and Technology Drexel University, 2010.
44 Fatih Ozgul, J. B., Hakan Aksoy, "Mining for offender group detection and story of a police operation", Australian Computer Society, Inc., 2007.
45 Kasper L. Jensen, H. N. K. I., Sebastian Mukumbira, "Toward an mPolicing Solution for Namibia: Leveraging Emerging Mobile Platforms and Crime Mapping", SAICSIT, 2012.
46 Yokoyama, T., Akiyama, T., Kashihara, S., Kawamoto, Y. and Gurgen, L., "Considerations towards the construction of smart city test bed based on use case and testbed analysis", 2015, pp.1623-1630. http://dx.doi.org/10.1145/2800835.2801633   DOI
47 Cranshaw, J.,"Whose City of Tomorrow" Is It? On Urban Computing, Utopianism, and Ethics", UrbComp, 2013
48 Amit Sheth, P. A., "Physical Cyber Social Computing for Human Experience", WIMS, 2013.
49 Bly the, M. A., Wright, P. C. and Monk, A. F., "Little brother: could and should wearable computing technologies be applied to reducing older people's fear of crime?", Personal and Ubiquitous Computing, 2004, pp.402-415. http://dx.doi.org/DOI 10.1007/s00779-004-0309-4   DOI
50 http://www.gartner.com
51 http://www.eurotech.com
52 http://www.kics.go.kr
53 http://www.cppb.go.kr/
54 https://hadoop.apache.org/
55 http://wiki.apache.org/nutch/
56 http://www.saedsayad.com/naive_bayesian.htm
57 http://www.etsi.org/