• Title/Summary/Keyword: 범죄발생 위험요소

Search Result 16, Processing Time 0.012 seconds

A study on the efficient extraction method of SNS data related to crime risk factor (범죄발생 위험요소와 연관된 SNS 데이터의 효율적 추출 방법에 관한 연구)

  • Lee, Jong-Hoon;Song, Ki-Sung;Kang, Jin-A;Hwang, Jung-Rae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.1
    • /
    • pp.255-263
    • /
    • 2015
  • In this paper, we suggest a plan to take advantage of the SNS data to proactively identify the information on crime risk factor and to prevent crime. Recently, SNS(Social Network Service) data have been used to build a proactive prevention system in a variety of fields. However, when users are collecting SNS data with simple keyword, the result is contain a large amount of unrelated data. It may possibly accuracy decreases and lead to confusion in the data analysis. So we present a method that can be efficiently extracted by improving the search accuracy through text mining analysis of SNS data.

A Study on Improvement of Women's Safety in Public Places (공공장소에서의 여성 안전 개선방안 연구)

  • Kwon, Seung-Yeon
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2023.11a
    • /
    • pp.222-223
    • /
    • 2023
  • 본 연구는 여성 안전에 대한 다양한 정책이 시행되었지만, 공공장소에서의 여성의 안전을 위협하는 사건과 사고는 지속해서 발생하고 있다. 최근 여성 대상 범죄, 특히 성폭력 범죄가 매우 높아지면서 공공장소에서의 여성 안전에 대한 문제가 대두되고 있다. 이러한 문제를 해결하기 위해서는 여성 안전사고 발생 원인을 분석하여 그 원인을 해결할 수 있는 전략과 방안들을 개발하는 연구가 필요하며, 이를 통해 여성들이 공공장소에서 안전하게 생활할 수 있는 환경을 조성할 수 있다. 따라서 공공장소에서의 여성 안전 개선방안 연구는 매우 중요하다. 그러기 위해서는 첫째 범죄율을 분석, 공공장소에서 여성 범죄의 유형 및 발생 경로에 대해 분석하여 언제, 어디서, 어떤 유형의 범죄가 발생하는지 파악한다. 둘째 교육 및 정보 제공, 여성들에게 주변 위험 요소와 대처 방법, 보호시설 위치 등을 교육하고 정보를 제공하여 위험 상황으로부터 탈출하거나 대처할 수 있도록 한다. 셋째 시설 개선, 공공장소의 설계나 조명, 치안 등을 개선하여 여성들이 안전하게 사용할 수 있는 환경을 조성한다. 넷째 적극적인 관리, 공공장소에서 범죄가 발생하거나 이에 대한 우려가 있을 때, 적극적으로 주변 상황을 관찰하고 대처한다. 다섯 번째 커뮤니티 참여, 지역사회와 함께 여성 안전에 대한 캠페인을 전개하고, 지역주민들의 적극적인 참여와 지원을 유도하여 여성 안전의식을 확산시킨다. 이러한 방법들을 적극적으로 활용하여 여성들이 더욱 안전하고 편안한 환경에서 일상생활을 영위할 수 있는 사회적으로 안전한 여성 안전 문제에 대한 개선방안을 제시한다.

  • PDF

Relationship Between Social Support Factors and Major Crimes in Korean Capital Area

  • Park, Sujeong;Kim, H. S.
    • Journal of the Korean Regional Science Association
    • /
    • v.31 no.4
    • /
    • pp.3-24
    • /
    • 2015
  • Crimes must be reduced not only because of the financial, physical, and emotional damages they bring to the victims but also because crimes increase social costs by elevating distrust in society and instilling fear. With the increasing number of crimes in Korea, finding other factors that affect the occurrence of crimes is needed beyond the current viewpoint for crime analysis. Social support factors can be candidates for studies on the social support effect on crime occurrence in their initial stage. In this study, we identified the effect of social support factors on crime occurrence or deterrence, none of which has been considered important until now, given the emergence of spatial econometrics. The resulting Moran's I values revealed the existence of a spatial autocorrelation in all three crimes: heinous crimes, theft, and violence. As shown in the analysis using spatial econometrics and ordinary least squares, social support from families is significant in reducing all crimes especially violence. Social support from the local government is significant in preventing only theft. The spatial econometrics model is only valid in heinous crimes. These different effects of social support factors and spatial factors on crime occurrences are caused by the different characteristics of crimes. Hence, policymakers should consider the social support effect when they establish policies related to social housing or welfare.

Crime Incident Prediction Model based on Bayesian Probability (베이지안 확률 기반 범죄위험지역 예측 모델 개발)

  • HEO, Sun-Young;KIM, Ju-Young;MOON, Tae-Heon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.20 no.4
    • /
    • pp.89-101
    • /
    • 2017
  • Crime occurs differently based on not only place locations and building uses but also the characteristics of the people who use the place and the spatial structures of the buildings and locations. Therefore, if spatial big data, which contain spatial and regional properties, can be utilized, proper crime prevention measures can be enacted. Recently, with the advent of big data and the revolutionary intelligent information era, predictive policing has emerged as a new paradigm for police activities. Based on 7420 actual crime incidents occurring over three years in a typical provincial city, "J city," this study identified the areas in which crimes occurred and predicted risky areas. Spatial regression analysis was performed using spatial big data about only physical and environmental variables. Based on the results, using the street width, average number of building floors, building coverage ratio, the type of use of the first floor (Type II neighborhood living facility, commercial facility, pleasure use, or residential use), this study established a Crime Incident Prediction Model (CIPM) based on Bayesian probability theory. As a result, it was found that the model was suitable for crime prediction because the overlap analysis with the actual crime areas and the receiver operating characteristic curve (Roc curve), which evaluated the accuracy of the model, showed an area under the curve (AUC) value of 0.8. It was also found that a block where the commercial and entertainment facilities were concentrated, a block where the number of building floors is high, and a block where the commercial, entertainment, residential facilities are mixed are high-risk areas. This study provides a meaningful step forward to the development of a crime prediction model, unlike previous studies that explored the spatial distribution of crime and the factors influencing crime occurrence.

Extraction of Crime Vulnerable Areas Using Crime Statistics and Spatial Big Data (공간 빅데이터와 범죄통계자료를 이용한 범죄취약지 추출)

  • Park, So-Rang;Park, Jae-Kook
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.161-171
    • /
    • 2018
  • This study set out to identify crime vulnerable areas with the GIS spatial analysis technique for the prediction of crimes. Crime vulnerable areas were extracted from the statistics of crimes with the GIS hotspot analysis technique and the inverse distance weighted(IDW) method applied to different crimes according to places and use districts. The scope of surveillance and weight were calculated for each of CPTED surveillance elements including CCTV, streetlamp, patrol division, and police substation. Maps of crime vulnerable areas were overlapped one after another to make a CPTED-based one expressed in four grades(safety, attention, warning, and risk).

Design of Information Security Management for Industrial Control System (산업제어시스템을 위한 정보보호 관리체계 설계 방안 연구)

  • Jo, Young-Hyun;Lee, Eun-Kyoung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.311-314
    • /
    • 2016
  • 지난 5년간 대표적인 산업제어시스템(Industrial Control System)인 국내 원자력 발전소에 대한 해킹 시도는 총 1,843회로 사이버공격에 대한 위험은 날로 높아지고 있다. 이러한 공격은 사이버전, 테러, 사이버범죄자들에 의해 실행되고 있다. 이러한 위험을 통제하기 위해서는 산업제어시스템이 일반적인 IT시스템과 다른 운영체제, 네트워크 등 시스템 환경을 고려하여야 한다. 본 논문에서는 기존의 IT보안 대책과 산업제어시스템 보안 대책을 비교 분석하고, 국내외에서 발생하고 있는 산업제어시스템에 대한 공격 사례를 비교 분석하여 산업제어시스템 인프라에서 고려하고 통제해야 할 정보보호 요소들을 제언한다.

  • PDF

Secure delivery system on through preventing leakage entrance password. (공동 현관 비밀번호 유출 방지를 통한 블록체인 기반의 안전한 배송 시스템)

  • Kim, Hyun-Ji;Kwon, Yong-Been;Choi, Seung-ju;Seo, Hwa-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.127-130
    • /
    • 2020
  • 최근 변화하는 소비패턴으로 인해 당일 및 새벽 배송 등의 서비스가 보편화되고 있다. 해당 서비스는 배송 정보를 입력 시 건물에 자유롭게 출입할 수 있는 공동 현관 비밀번호를 기입해야 한다. 이는 이미 빈번하게 발생하고 있는 무단 주거 침입 등의 범죄에 더 쉽게 노출되도록 할 수 있는 위험 요소이다. 본 논문에서는 신뢰할 수 있는 사용자만이 참여 가능한 프라이빗 블록체인 네트워크에서의 차량 번호판 인식 및 스마트 컨트랙트를 통해 랜덤한 마스터 비밀번호를 제공하여, 보안적으로 취약한 비밀번호 기입 절차를 없애고 검증 받은 사용자에게만 출입을 허가하는 방식을 제안한다.

A Study on the Judgment Criteria for the Trademark Dilution of Famous Marks

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.225-232
    • /
    • 2019
  • The trademark dilution of famous marks as a kind of unfair competition practice is defined and regulated in Article 2 (1) (c) of the Unfair Competition Prevention and Trade Secret Protection Act (hereinafter referred to as the Unfair Competition Prevention Act), which was newly established according to the amendment of the Act on February 3, 2001. Famous trademarks are universally protected in all around the world, which are likewise protected in the Republic of Korea by the Unfair Competition Prevention Actin line with such international trends. In order to establish the trademark dilution of famous marks, it is necessary to have the following characteristics: (1) high reputation of the original mark, (2) use of identical or similar markscompared to the original mark, (3) occurrence of blurring of discrimination or tarnishment of reputation; in particular, with respect to the degree of proof of 'blurring of discrimination or tarnishment of reputation', which is a constituent requirement of the trademark dilution of famous marks, it is reasonable to interpret the trademark dilution as concrete endangerment offense, neither harm-based offense nor abstract endangerment offense, and thus it should be considered that the crime is established if a specific realistic risk of blurring of discrimination or tarnishment of reputation occurs. Furthermore, in relation to the specific criteria of 'blurring of discrimination or tarnishment of reputation', it is necessary to comprehensively judge the degree of individual behavior in specific matters as a normative factor as well as the psychosocial viewpoint of the general public.

A Study on National Control Policy for the Use of Encryption Technologies by an Accused Person (피의자 개인의 암호이용 통제정책에 대한 연구)

  • Baek, Seung-Jo;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.271-288
    • /
    • 2010
  • In this paper, we study the dysfunctions of cryptography as dual-use goods and national domestic encryption control policies like key recovery system and decryption order. And we examine risks of the breach of the peoples' constitutional rights like the right to privacy in these policies and analyze these policies by applying the principle of the ban on the over-restriction. Finally, we propose the direction and requirements of our national domestic encryption control policy that maintains the balance of peoples' constitutional rights and investigatory powers.

A Research Survey on the Characteristics of Burglaries: Focused on How to Utilize Private Security (침입절도 특성에 관한 조사연구: 민간경비 활용방안을 중심으로)

  • Kim, Dae-Kwon
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.15-35
    • /
    • 2010
  • A larceny means stealing others' properties, as one of crime types most closely connected with common people. Along with fraud, it is the mostly common property crime; in particular, the largest number of people are exposed to a burglary. This study aims to find the schemes to utilize private guards according to the characteristics of burglary. To do so, a questionnaire survey was conducted into an actual condition of official statistics of burglary and into the criminals of burglary, with a view to understanding the behavioral characteristics of burglary and suggesting defense mechanisms to prevent the crime. Burglary is not just a major crime to be dealt with by public guards like the police but also one to be handled increasingly more by private guards. It is why this study intends to identify how to utilize private guards in preventing the crime. Investigations were made into 208 burglars, who were inmates of 10 correctional institutions (prisons or detention houses) across the country. It is found that only about 24% of burglars committed the crime through rational choice, about 60.7% were feared of their arrest at the time of their crime, and a very high percentage (69.9%) of them were assured of their successful crime. Burglaries usually happened at night, mostly in a summer day when everybody goes away from home for vacation. Primarily, the crimes took place in a private house of urban residential quarters. What burglars considered mostly for target selection includes 'profitability,' followed by 'surveillance' and 'risk.' Most (42%) of them committed the crime for the first time ever. Generally, they were not inclined to commit the crime while under the influence of alcohol or drug, which might prevent them from making reasonable decisions. 73.9% of the criminals said that they committed the crime singly without any accomplices.

  • PDF