• Title/Summary/Keyword: 숨은범죄

Search Result 5, Processing Time 0.016 seconds

Analysis of Prostitution Survey Using Randomized Response Model(RRM) (확률화응답모형(RRM)을 활용한 성매매조사 분석)

  • Son, Chang-Kyoon;Joo, Jae-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.10
    • /
    • pp.65-71
    • /
    • 2017
  • It is true that there is a possibility of distortion in the statistical surveys or actual surveys depending on which investigator, what purpose, and how research method. Even statistical results are more likely to be 'lying', and statistics on crime or delinquent are sometimes referred to as 'whopper'. There are many reasons for not trusting statistics on crime or delinquent, but one of the main causes is the existence of a hidden crime or an unreported crime. In order to overcome these hidden crime problems, victim surveys or self-report surveys are being used. However, this method also has the problem of underreporting or overreporting depending on the type of crime. Because investigations into crime, delinquency, and deviant behavior are very sensitive, the subjects have a psychological burden. A randomized response model has been developed and used in the field of statistics as a way to induce a true answer to the sensitive content which is burdensome to reveal the experiences of the survey subjects. This technique is a very useful way to solve the problems of victim surveys or self-report surveys. Nevertheless, there are very few cases in the field of criminology in Korea. Therefore, in order to examine the applicability of the randomized response model in the field of criminology, this study used the randomized response model to actually measure the content of prostitution for college students and the effectiveness of the randomized response model was confirmed.

Technique for Indentifying Cyber Crime Using Clue (수사단서를 이용한 동일 사이버범죄 판단기법)

  • Kim, Ju Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.767-780
    • /
    • 2015
  • In recent years, as smart phone penetration rate is growing explosively, new forms of cyber crime data is poured out beyond the limits of management system for cyber crime investigation. These new forms of data are collected and stored in police station but, some of data are not systematically managed. As a result, investigators sometimes miss the hidden data which can be critical for a case. Crime data is usually generated by computer which produces complex and huge data and records many logs automatically, so it is necessary to simplify a collected data and cluster by crime pattern. In this paper, we categorize all kinds of cyber crime and simplify crime database and extract critical clues relative to other cases. Through data mining and network-visualization, we found there is correlation between clues of a case. From this result, we conclude cyber crime data mining helps crime prevention, early blocking and increasing the efficiency of the investigation.

Usefulness of Data Mining in Criminal Investigation (데이터 마이닝의 범죄수사 적용 가능성)

  • Kim, Joon-Woo;Sohn, Joong-Kweon;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.1 no.2
    • /
    • pp.5-19
    • /
    • 2006
  • Data mining is an information extraction activity to discover hidden facts contained in databases. Using a combination of machine learning, statistical analysis, modeling techniques and database technology, data mining finds patterns and subtle relationships in data and infers rules that allow the prediction of future results. Typical applications include market segmentation, customer profiling, fraud detection, evaluation of retail promotions, and credit risk analysis. Law enforcement agencies deal with mass data to investigate the crime and its amount is increasing due to the development of processing the data by using computer. Now new challenge to discover knowledge in that data is confronted to us. It can be applied in criminal investigation to find offenders by analysis of complex and relational data structures and free texts using their criminal records or statement texts. This study was aimed to evaluate possibile application of data mining and its limitation in practical criminal investigation. Clustering of the criminal cases will be possible in habitual crimes such as fraud and burglary when using data mining to identify the crime pattern. Neural network modelling, one of tools in data mining, can be applied to differentiating suspect's photograph or handwriting with that of convict or criminal profiling. A case study of in practical insurance fraud showed that data mining was useful in organized crimes such as gang, terrorism and money laundering. But the products of data mining in criminal investigation should be cautious for evaluating because data mining just offer a clue instead of conclusion. The legal regulation is needed to control the abuse of law enforcement agencies and to protect personal privacy or human rights.

  • PDF

"Prosthetic Memory" in TV Series & A Sense of History -Focus on - (TV미니시리즈의 '보철적 기억'과 역사인식의 형성 -미국 TV시리즈 <콜드 케이스>를 중심으로-)

  • Lee, Seung hwan
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.2
    • /
    • pp.106-116
    • /
    • 2016
  • What made stand out among these police procedurals was its focus on the importance of history to understand both the past and contemporary society and culture. Many of the cases involve aspects of history that are not part of mainstream narratives and constitute the unfinished business of America. The flashback sequences throughout the show visually and affectively transport the viewer back to an earlier historical moment. What all the victims have in common is that they refused to be silent or passive in the face of circumstances they believed were wrong, or they refused to conform to dehumanising and destructive social and cultural expectation. Those promoting these lies have the power to establish their version as the power to establish their version as the "truth" of what happened in context, but viewers are positioned to see the truth as the victims experienced it and to identify with them and against the power abusers. The Cold Case detectives pursue the ghosts of American history, restoring to our view stories of lives and experiences rendered invisible and unspeakable by dominant forms of knowledge and power. The series invites viewrs to empathize with the victim and to develop an ethical commitment to social justice in the future.

India's Maritime-Security Strategy: Pretext, Context and Subtext (인도의 해상 안보 전략: 구실, 맥락 및 숨은 의미)

  • Khurana, Gurpreet S
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.1-56
    • /
    • 2022
  • Why has India become a key actor in the maritime-configured Indo-Pacific region? There are some external factors, but for India, its geo-strategic frontier encompassing its geopolitical and maritime interests is expanding rapidly beyond its territorial space across both the Indian and Pacific oceans amidst an increasingly arduous geopolitical and security environment. India must, therefore, acquire the ability to influence events within this strategic arena using all facets of national power, including maritime-military power. Lately, therefore, New Delhi has invested much intellectual capital to review its maritime-security strategy. India's new strategy is premised on the concept of holistic security involving the 'softer' aspects of maritime-security, and a rekindling of maritime consciousness in India, a nation that has traditionally been beset by 'sea-blindness'. The strategy adopts a region-wide, inclusive, and a more proactive approach than hitherto, as is evident in its title 'Ensuring Secure Seas: Indian Maritime Security Strategy'. While it deals with the growing concern of new non-traditional threats in the Indian littoral and the need for military deterrence and preparedness, it also addresses the imperatives for India to seek a favorable and rules-based benign environment in its immediate and extended maritime periphery, including through multi-vectored strategic partnerships dictated by its enduring principle of strategic autonomy. For a more profound and comprehensive understanding of India's maritime-security strategy, this paper examines the key unstated and implicit factors that underpin the strategy. These include India's historical and cultural evolution as a nation; its strategic geography; its geopolitical and security perceptions; and the political directions to its security forces. The paper deals specifically with India's response to maritime threats ranging from natural disasters, crime and state-sponsored terrorism to those posed by Pakistan and China, as well as the Indian Navy's envisaged security role East of the Malacca Straits. It also analyzes the aspects of organizational restructuring and force planning of India's maritime-security forces.

  • PDF