• Title/Summary/Keyword: 범죄빈도

Search Result 62, Processing Time 0.028 seconds

The Relationship Between Social Security Network and Security Life Satisfaction in Community Residents: Scale Development and Application of Social Security Network (사회안전망과 지역사회주민의 안전생활만족의 관계: 사회안전망 척도개발과 적용)

  • Kim, Chan-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.6
    • /
    • pp.108-118
    • /
    • 2014
  • The purpose of this study is to develop a relationship of measuring method for the social security network and verify its validity and reliability and apply it to investigate the due to security life satisfaction. This study is based by setting general residents of Seoul in 2013 and using the stratified cluster random sampling method to analyze a total amount of 203 examples. The measuring methods for the social security network was developed through document research, conceptual definition and drafting the survey, experts' conference, preliminary inspection and original examination, verification of the validity and reliability of the survey. An experts' conference took pace to verify the validity of the survey, and 6 factors were extracted through exploratory factor analysis crime prevention design, street CCTV facilities, volunteer neighborhood patrol, local government security education, police public peace service, private security service. The conclusion are the following. Collected data was analyzed based on the aim of this study using SPSSWIN 18.0, and practice frequency analysis, F test, factor analysis, reliability analysis, correlation analysis, multiple regression analysis. First, the validity of the social security network measurement is very high. Thus, the factors constituting the social security network were found to be crime prevention design, street CCTV facilities, volunteer neighborhood patrol, local government security education, police public peace services, and private security services, and the crime prevention design factor was found to be most explanatory. Second, the reliability of the social security network measurement is very high. Thus, the correlation between the questions and the sector, the questions and the social security net was very high, and the internal consistency showed a Cronbach's${\alpha}$ value of over 0.865. Third, the establishment of a social security network had the biggest effect on people in their forties. Thus, when the crime prevention design, street CCTV facilities, local government security education, police public peace services are systematically established, the social anxiety of citizens was reduced.

Analysis of Newspaper Articles on Child Abuse Deaths (아동학대 사망사건에 대한 신문기사 분석)

  • Kim, Jihae;Chung, Ickjoong;Lee, Heeyoun;Kim, Kyunghee
    • Korean Journal of Social Welfare
    • /
    • v.65 no.2
    • /
    • pp.131-154
    • /
    • 2013
  • Although fatalities due to child abuse are frequently happened, there has been a dearth of research on the topic. The present research analyzes deaths due to child abuse in representative newspapers in order to examine incidences, causes, and characteristics of child abuse. The results showed that from 2000 to 2012 child abuse deaths occurred 141 cases. Most deaths due to child abuse were committed by single mothers, biological mothers, cohabiting women and stepmothers, and biological fathers. As regards the reasons of deaths due to child abuse, the frequency of newborn infant deaths as the result of abuse by single mother or single parent was the highest, and lack of parenting skills, postpartum depression, hardships of living and lack of financial abilities were followed. Also, subjects received extensive media coverage were crime compositions-stereotypes of child abusers, habitual and continual child abuse, lack of child abuse reporting and prevention system, and mild penalties. Finally, based on the results of the study, the implications to prevent and resolve deaths due to child abuse were discussed.

  • PDF

Police Officers' Perception Concerning the Roles of Private Security (민간경비의 역할에 대한 경찰관의 인식연구)

  • Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.101-118
    • /
    • 2009
  • Despite large increases in the growth of the private security industry in the last few decades, very little empirically based information has been collected on the roles of private security within current Korean literature. Attempting to address this gap, this study examined perceptions of the roles of private security by surveying 212 police officers. In order to measure the strength of police officers' perception, not only quantitative but also qualitative methods were adopted. Overall, results of the study indicate that police officers considered private security as an adjunct to the police. However, they also believed that private security industry would grow to get square with the police in the near future. Concerning the specific roles of private security, police officers rated the roles of loss prevention and protection more highly than those of crime prevention and order maintenance. This result reveals that police officers thought private security had focused more on the roles related to the pursuit of profits than on the roles tied to its public functions.

  • PDF

Case Study on the Use of CCTV for Realtime Monitoring and Recommended Improvements (상시계측시스템 모니터링을 위한 CCTV 활용사례 및 개선방안 연구)

  • Bae, Sang-Woo;Lee, Jong-Hyun;Kim, Seung-Hyun;Koo, Ho-Bon
    • The Journal of Engineering Geology
    • /
    • v.22 no.4
    • /
    • pp.417-425
    • /
    • 2012
  • CCTV cameras are used for surveillance and purposes of security, and can also be applied for monitoring infrastructure and equipment. In the Cut Slope Management System managed by KICT (Korea Institute of Construction Technology), cut slopes are continuously monitored using a real-time system, with CCTV cameras installed at 119 sites to detect slope activity. Here we compare CCTV images with displacement at three sites and perform a quantitative analysis. Methods for improving CCTV camera management and systems are also discussed with regard to communication, obstacles, and nighttime management.

Genetic Analysis study of Sasang Constitution Classification by DNA-fingerprinting methods (유전자지문법을 이용한 사상체질의 유전적 분석 연구)

  • Cho, DongWuk;Lee, ChangSoo;Ko, ByungHee;Cho, HwangSung
    • Journal of Sasang Constitutional Medicine
    • /
    • v.8 no.2
    • /
    • pp.151-163
    • /
    • 1996
  • VNTR and STR DNA typing are typical genetic analysis methods which are widely used in DNA-fingerprinting for forensic science and other genetic research purposes. In this study, genomic DNA of different constitutions(Taeun, Soyang and Soum) were analyzed by VNTR and STR DNA typing to provide scientific and objective references for Sasang Medicine. It was found out in this study that VNTR-MCT118 and YNZ22 loci showed too many different variation of allele distribution and numbers for each constitution. Therefore, it is thought that VNTR typing can not used for genetic classification study for Sasang Constitution which classifies human body into 4 groups. However, vWA locus, one of the STR loci investigated in this study, showed slight difference in allele distribution for each different constitution.

  • PDF

A Survey Research on the Effective Prevention Program of Child Sexual Abuse (아동성폭력 예방에 대한 시민의식 조사)

  • Gong, Bae-Wan
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.77-87
    • /
    • 2011
  • The child sexual abuse is a serious social problem. The children are to seek the physical ability for protecting the mselves from crime. However there is no effective prevention program for that. The reason why the lack of understanding of society and the people's attitude as a fence sitter provoke in a roundabout way to the child sexual abuse. Thus this these conducted a survey research about the child sexual abuse for the common citizen. The questionnaire s were analyzed and composed of a frequency analysis and a cross-tabulations by using the tool SPSSWIN. The res ult was that the crime for child was often occurred nearby school and any effective prevention system.

Internet of Things (IoT) Based Modeling for Dynamic Security in Nuclear Systems with Data Mining Strategy (데이터 마이닝 전략을 사용하여 원자력 시스템의 동적 보안을 위한 사물 인터넷 (IoT) 기반 모델링)

  • Jang, Kyung Bae;Baek, Chang Hyun;Kim, Jong Min;Baek, Hyung Ho;Woo, Tae Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.9-19
    • /
    • 2021
  • The data mining design incorporated with big data based cloud computing system is investigated for the nuclear terrorism prevention where the conventional physical protection system (PPS) is modified. The networking of terror related bodies is modeled by simulation study for nuclear forensic incidents. It is needed for the government to detect the terrorism and any attempts to attack to innocent people without illegal tapping. Although the mathematical algorithm of the study can't give the exact result of the terror incident, the potential possibility could be obtained by the simulations. The result shows the shape oscillation by time. In addition, the integration of the frequency of each value can show the degree of the transitions of the results. The value increases to -2.61741 in 63.125th hour. So, the terror possibility is highest in later time.

Understanding Child Abuse Based on Big Data Analysis -A Basic Study on the Development of Machine Learning Algorithm- (빅데이터 분석에 기반한 아동학대의 이해 -머신러닝 알고리즘 개발 기초연구-)

  • Bae, Jungho;Burm, Eunae
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.4
    • /
    • pp.57-63
    • /
    • 2022
  • The purpose of this study is to provide basic data on policy development using big data analysis and machine learning algorithms as part of preparing measures to prevent child abuse. In order to analyze big data for developing machine learning algorithms to prevent child abuse, frequency analysis, related word analysis, and emotional analysis were performed after defining academic databases and social network service data as big data. related words, and emotional analysis were conducted. As a result of the study, a preventive child abuse algorithm can be developed by preparing a data collection and sharing network system to prevent child abuse from the perspective of children affected by child abuse, perpetrators, and government authorities. Although it will be possible by institutionalizing infant self-esteem, depression, and anxiety tests with clues that depression and anxiety appear due to a decrease in self-concept in the characteristics of children affected by child abuse. We suggest that continuous progress of big data collection and analysis and algorithm development research to prevent child abuse, and expects that effective policies to prevent child abuse will be realized to eradicate child abuse crimes.

The Effect of Investigator's Belief about Veracity of Suspect on Distortions of Paper Records (수사관의 심증이 조서의 왜곡에 미치는 영향)

  • Lee, Hyoung Keun;Jo, Eunkyung;Yi, Mi Sun
    • Korean Journal of Forensic Psychology
    • /
    • v.11 no.3
    • /
    • pp.267-285
    • /
    • 2020
  • The Statement evidence is an important method of proof in the criminal investigation and trial. Under certain conditions set by Korean Criminal Procedure Law, paper records of interrogations are admissible in criminal courts. However, it is shown that distortions are ever-present in paper records. Therefore, this study attempted to examine the effect of the investigator's belief about the veracity of a suspect on distortions of paper records. Ninety police investigators were randomly allocated into one of the three conditions('guilty belief', 'innocent belief', 'neutral belief'), and all the investigators were then asked to document a paper record while watching a prefilmed interrogation interview of the crime. The results showed that (1) the investigator's belief had significant effects on distortions. (2) All groups did more commissions than omissions. (3) matters subject to interrogation also had significant effects on distortions. In the conclusion, implications and limitations of the study were disscussed.

  • PDF

Design and Implementation of a LSTM-based YouTube Malicious Comment Detection System (유튜브 악성 댓글 탐지를 위한 LSTM 기반 기계학습 시스템 설계 및 구현)

  • Kim, Jeongmin;Kook, Joongjin
    • Smart Media Journal
    • /
    • v.11 no.2
    • /
    • pp.18-24
    • /
    • 2022
  • Problems caused by malicious comments occur on many social media. In particular, YouTube, which has a strong character as a medium, is getting more and more harmful from malicious comments due to its easy accessibility using mobile devices. In this paper, we designed and implemented a YouTube malicious comment detection system to identify malicious comments in YouTube contents through LSTM-based natural language processing and to visually display the percentage of malicious comments, such commentors' nicknames and their frequency, and we evaluated the performance of the system. By using a dataset of about 50,000 comments, malicious comments could be detected with an accuracy of about 92%. Therefore, it is expected that this system can solve the social problems caused by malicious comments that many YouTubers faced by automatically generating malicious comments statistics.