• Title/Summary/Keyword: 범죄예측

Search Result 120, Processing Time 0.027 seconds

Development and Application of CCTV Priority Installation Index using Urban Spatial Big Data (도시공간빅데이터를 활용한 CCTV 우선설치지수 개발 및 시범적용)

  • Hye-Lim KIM;Tae-Heon MOON;Sun-Young HEO
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.27 no.2
    • /
    • pp.19-33
    • /
    • 2024
  • CCTV for crime prevention is expanding; however, due to the absence of guidelines for determining installation locations, CCTV is being installed in locations unrelated to areas with frequent crime occurrences. In this study, we developed a CCTV Priority Installation Index and applied it in a case study area. The index consists of crime vulnerability and surveillance vulnerability indexes, calculated using machine learning algorithms to predict crime incident counts per grid and the proportion of unmonitored area per grid. We tested the index in a pilot area and found that utilizing the Viewshed function in CCTV visibility analysis resolved the problem of overestimating surveillance area. Furthermore, applying the index to determine CCTV installation locations effectively improved surveillance coverage. Therefore, the CCTV Priority Installation Index can be utilized as an effective decision-making tool for establishing smart and safe cities.

In about Factor of the Crime, According to Industry Recognized Security Increase of Efficiency (민간경비 산업의 범죄성장요인에 따른 효율성 제고방안)

  • Kang, Min-Wan;Ham, Ju-il
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.1-25
    • /
    • 2010
  • This research aims to provide a solution for the improvement of private security according to the change in criminal environment. The main cause of crime can be found in the anti-functional dimensions including value set disorder, social phenomenon variation, information-based, globalization and urbanization. In this environment, the private security sector has dramatically increased in a quantitative viewpoint, but it is insufficient in a qualitative viewpoint. This paper recognized this problem and demonstrates a solution for improvement through classifying elements of private security into relevant legislation, education institutions, security companies and security associations. The analysis result is a follows: First, motivation and satisfaction rate of escort and security related major has shown to be high. However, respondents evaluated the guard educational institution negatively. Second, the motivation of entering into the private security sector for internal staffs has shown to be positive and sound. However, the job satisfaction rate has shown to be low due to excessive competition, negative perception of occupation and low earning. Third, respondents gave an average mark to the Security Association's management and operation. In addition, the mutual-aid project received the same mark. Negative feedbacks were given to the protection of member's interest and to association operation and policy, while positive feedbacks were given to the degree of member's cooperation towards association policies.

  • PDF

A Study on the Use of Criminal Justice Information Big Data in terms of the Structuralization and Categorization (형사사법정보의 빅데이터 활용방안 연구: 구조화 범주화 관점으로)

  • Kim, Mi Ryung;Roh, Yoon Ju;Kim, Seonghun
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.4
    • /
    • pp.253-277
    • /
    • 2019
  • In the era of the 4th Industrial Revolution, the importance of data is intensifying, but there are many cases where it is not easy to use data due to personal information protection. Although criminal justice information is expected to have various useful values such as crime prediction and prevention, scientific investigation of criminal investigations, and rationalization of sentencing, the use of criminal justice information is currently limited as a matter of legal interpretation related to privacy protection and criminal justice information. This study proposed to convert criminal justice information into 'crime data' and use it as big data through the structuralization and categorization of criminal justice information. And when using "crime data," legal issues, value in use, considerations for data generation and use were verified by experts, and future strategic development plans were identified. Finally we found that 'crime data' seems to have solved the privacy problem, but it is necessary to specify in the criminal justice information related law and it is urgent to be organized in a standardized form for analysis to use big data. Future directions are to derive data elements, construct a dictionary thesaurus, define and classify personal sensitive information for data grading, and develop algorithms for shaping unstructured data.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

Detecting Abnomal Behaviors Using The Situation-aware RFID System (정황인지 RFID 시스템을 이용한 비정상 행동 예측 체계)

  • Chae, Hee-Seo;In, Hoh-Peter
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.832-834
    • /
    • 2005
  • 유비쿼터스 컴퓨팅의 중요한 핵심 분야인 Situation-Aware 컴퓨팅과 RFID 시스템을 결합한 SA-RFID 시스템을 통해, 제한된 장소에서 범죄나 사고 같은 비정상적인 행동을 예측하기 위한 시스템을 제안하였다. SA-RFID 시스템을 이용한 비정상 행동 예측 시스템은 변형된 SA-RFID Reader 시스템 아키텍쳐와 그에 특화된 SA Middleware를 통해 설계되었고, 비정상 행동 판단 시나리오를 이용하여 명실상부 유비쿼터스 시대에 걸 맞는, 사용자에게 보다 더 안전하고 편안한 생활을 보장해주는 서비스를 제공하게 될 것이다.

  • PDF

경찰관서 표준인력 수요모델 개발;시스템다이내믹스 방법론을 기반으로

  • Jeong, Jae-Rim;Jeon, So-Yeon;Gwak, Mi-Ae;Yeon, Seung-Jun
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.843-848
    • /
    • 2007
  • 날로 광역화, 지능화, 디지털화된 범죄양상과 국민들의 고품질 치안서비스에 대한 관심과 욕구의 증대로 인해 치안수요가 증가하고 있다. 지금까지의 선행연구들은 경찰인력의 수요에 영향을 미치는 특정 변수를 회귀분석을 통해 찾아낸 뒤 이것을 바탕으로 경찰인력에 대한 예측을 시도하였으나, 경찰 업무 전반에 걸친 직무를 분석하여 치안 수요 및 업무량에 따른 적정인력을 산출하는 연구는 부족한 실정이다. 따라서 본 연구는 경찰관서 각 기능별 실무자 면담을 통해 직무를 분석한 후 기능별 주요 업무를 선정하였고 시스템 다이내믹스 방법론을 활용하여 기능별 경찰관서의 표준인력 수요를 예측하였다. 또한 235개의 관서 모델을 만들어 컴퓨터 시뮬레이션을 통해 관서별, 지방청별 효율적 인력 운용 방안에 대해 논의하였다.

  • PDF

An Autonomous Street Light Switch Based on Motion Vector (모션 벡터 기반 자동 점등 가로등 예측기에 대한 연구)

  • Park, Seung-Hyeon;Hong, Ji-Young;Seok, Min-Su;Um, Jin-Young;Ahn, Jong-Suk
    • Annual Conference of KIPS
    • /
    • 2016.10a
    • /
    • pp.810-813
    • /
    • 2016
  • 기존 IoT 스마트 가로등은 모션 감지 센서를 이용하여 보행자를 감지하고, 가로등의 밝기를 조정하는 형태로 구성된다. 하지만 이러한 방법은 보행자가 나아갈 길을 미리 예측하여 밝혀주지 않는다. 특히 기존 방법은 보행자 현재 위치만 밝힐 뿐, 나아갈 길은 어두운 상태이기 때문에 통행에 불편함을 겪고 있다. 본 논문에서는 보행자 경로를 미리 파악하여 가로등 밝기를 조절하는 방식을 소개한다. 보행자의 현재 위치를 파악하기 위해 모션 감지 센서를 이용하며, 보행자 경로 예측은 모션 벡터를 사용하여 가로등 밝기를 조절한다. 이러한 개선을 통하여 보행자의 편의 증대와 범죄 예방 등 긍정적인 효과를 기대 할 수 있다.

A Study on Abnormal Behavior Analysis and Pattern Prediction using Bigdata (빅데이터기반 이상행동 분석 및 패턴예측 모델 연구)

  • Jung, Yu-Jin;Yoon, Young-Ik
    • Annual Conference of KIPS
    • /
    • 2014.04a
    • /
    • pp.724-726
    • /
    • 2014
  • 본 논문에서는 범죄 발생 전 빠른 상황판단과 효과적인 의사결정을 위한 방법으로 이상 행동을 분류, 분석하여 이상행동 패턴을 발견하고 이에 따라 발생 전 상황을 예상할 수 있는 예측하는 모델을 제시하였다. 이러한 행동분석과 패턴예측 모델은 CCTV로 부터 수집된 데이터를 단계별 DB를 통해 빠르고 정확한 분석할 수 있고, 과거에 축적 및 분석된 데이터를 유사한 상황에 직면했을 때 사전에 예방하기 위한 유용한 도구로 활용이 가능할 것이다.

스마트 시대 빅데이터 기술과 주요 이슈

  • Jo, Yeong-Im
    • ICROS
    • /
    • v.18 no.4
    • /
    • pp.23-33
    • /
    • 2012
  • 빅데이터가 최근 화제이다. 빅데이터는 저장되지 않았거나 저장되더라도 분석되지 못하고 버리게 되는 방대한 양의 데이터를 말한다. 실제로 빅데이터가 스마트 사회에서는 매우 많이 발생하고 있는데, 이러한 빅데이터를 분석하여 유의미한 지식을 발생시킴으로써 가치창출을 이루고 자원을 절감하며 범죄율을 낮추고 우리의 미래를 예측하여 대처할 수 있는 수단을 제공할 수 있다는 것은 매우 흥미로운 일이다. 따라서 본 고에서는 스마트 사회의 변화와 빅데이터의 이슈를 설명하고, 빅데이터의 주요 기술과 활용사례를 살펴보고자 한다.

A Scheme on Object Tracking Techniques in Multiple CCTV IoT Environments (다중 CCTV 사물인터넷 환경에서의 객체 추적 기법)

  • Hong, Ji-Hoon;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.1
    • /
    • pp.7-11
    • /
    • 2019
  • This study suggests a methodology to track crime suspects or anomalies through CCTV in order to expand the scope of CCTV use as the number of CCTV installations continues to increase nationwide in recent years. For the abnormal behavior classification, we use the existing studies to find out suspected criminals or abnormal actors, use CNN to track objects, and connect the surrounding CCTVs to each other to predict the movement path of objectified objects CCTVs in the vicinity of the path were used to share objects' sample data to track objects and to track objects. Through this research, we will keep track of criminals who can not be traced, contribute to the national security, and continue to study them so that more diverse technologies can be applied to CCTV.