Browse > Article
http://dx.doi.org/10.7236/JIIBC.2017.17.5.217

A Study on Construction of Crime Prevention System using Big Data in Korea  

Kim, SungJun (Dept. of Bigdata Industrial Security, Namseoul University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.17, no.5, 2017 , pp. 217-221 More about this Journal
Abstract
Proactive prevention is important for crime. Past crimes have focused on coping after death and punishing them. But with Big Data technology, crime can be prevented spontaneously. Big data can predict the behavior of criminals or potential criminals. This article discusses how to build a big data system for crime prevention. Specifically, it deals with the way to combine unstructured data of big data with basic form data, and as a result, designs crime prevention system. Through this study, it is expected that the possibility of using big data for crime prevention is described through fingerprints, and it is expected to help crime prevention program and research in future.
Keywords
Big Data; Crime Prevention; Cloud; Crime Prevention System; Big Data Analysis; Crime Forecasting; Personal Information;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 DOI: http://blog.naver.com/polinlove2/221041311948Gil
2 YC Jung,, "Bigdata", communicationbooks, 2013. DOI: http://terms.naver.com/entry.nhn?docId=1691554&cid=42171&categoryId=42183
3 Korea Instutition of korean language, DOI: http://stdweb2.korean.go.kr/(2014.10.25.) DOI: http://terms.naver.com/entry.nhn?docId=1691554&cid=42171&categoryId=42183
4 YunSoo Kim, changkook kwon, "The basic plan of police and science", police science institute, paper of policy research, 2014, p.9.
5 Wholey, Joseph S., Kathryn E. Newcomer, & Associates., Improving government performance-Evaluation strategies for strengthering public agencies and programs, San Francisco; Jossey-Bass, 1989.
6 Lockheed Martin Corporation, [Law Enforcement Technology needs asessment; future technologies to address the operational needs of law enforcement, Police executive research forum, 2009, pp. 93-98.
7 Voros, J. "A Generic Foresight Process Framework", Foresight, 5(2), 2003, pp. 10-21 DOI: http://www.emeraldinsight.com/doi/full/10.1108/14636680310698379
8 Kyung-Bae Min, Jang-Mook Kang, "Rights to Control Information and Related Security Technologies on the CyberSpace," The Journal of the Institute of Internet, Broadcasting and Communication, VOL. 10 No. 2, April 2010, pp 135-139.
9 Jang-Mook Kang, Woo-Jin Lee, You-Jin Song, "A Study for Vulnerability Analysis and Guideline about Social Personal Broadcasting Service based on Smart-Phone Environment(focus on SNS or U-Health)," The Journal of the Institute of Internet, Broadcasting and Communication, VOL. 10 No. 6, December 2010, pp. 162-165
10 Khalil Abuosba, "A logical data flow diagram of big data processing systems", Linkedin, 2016.04. DOI: https://www.linkedin.com/pulse/dataflows-bigdata-processing-system-khalil-abuosba-ph-d-