• Title/Summary/Keyword: Crime Prevention Technology

Search Result 84, Processing Time 0.026 seconds

Analysis of Actors' Interaction Patterns in the Formation Process of Sexual Crime Prevention Policy: Focusing on classification and case analysis (성범죄예방정책의 형성과정에서 행위자의 상호작용 패턴분석: 유형분류 및 사례분석을 중심으로)

  • Yoo, Keun-Hwan;Kim, Duck-Hwan;Suh, Kyung-Do
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.209-215
    • /
    • 2018
  • The purpose of this study is to grasp the overall policy decision system of sex crime prevention policy and analyze the interaction and pattern of actors in policy formation process. This is a useful way to identify the causes and ways to improve the policy if the sex crime prevention policy fails. As a research method, we used a model of advocacy through case analysis and language network analysis. In the external environment, low reporting of sex offenses, technical improvement and supplement for preventive management, consciousness of victims of sexual crimes, amendment of legislation, and support of the president. The conflicts between the advocacy coalition opposed the strong regulation, the prevention of recidivism, the expansion of the range of objects to be worn, the temporary effect of the system and the retrospective of the bill. As a problem-solving strategy, it was confirmed that the opposing positions of pros and cons of lack of manpower and negligence of management through the extension of the system were acutely opposed. In the context of media reports, this tendency is more likely to be understood as the concern of prevention and management at the central government level to prevent sex crimes. Therefore, although the methods of prevention of sex crimes have been insufficient in the past, it is hoped that this study will be helpful in breaking the link of negative policy vicious cycle.

AI Crime Prediction Modeling Based on Judgment and the 8 Principles (판결문과 8하원칙에 기반한 인공지능 범죄 예측 모델링)

  • Hye-sung Jung;Eun-bi Cho;Jeong-hyeon Chang
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.99-105
    • /
    • 2023
  • In the 4th industrial revolution, the field of criminal justice is paying attention to Legaltech using artificial intelligence to provide efficient legal services. This paper attempted to create a crime prediction model that can apply Recurrent Neural Network(RNN) to increase the potential for using legal technology in the domestic criminal justice field. To this end, the crime process was divided into pre, during, and post stages based on the criminal facts described in the judgment, utilizing crime script analysis techniques. In addition, at each time point, the method and evidence of crime were classified into objects, actions, and environments based on the sentence composition elements and the 8 principles of investigation. The case summary analysis framework derived from this study can contribute to establishing situational crime prevention strategies because it is easy to identify typical patterns of specific crime methods. Furthermore, the results of this study can be used as a useful reference for research on generating crime situation prediction data based on RNN models in future follow-up studies.

Intelligent Security Solution Using Image Processing AI Technology and QR Certification (영상처리 AI기술과 QR인증을 이용한 지능형 방범 솔루션)

  • Song, Keun Yong;Kim, Seong Ho;Kim, Yoon Ho;Lee, Choong Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.394-396
    • /
    • 2022
  • After COVID-19, hybrid stores operated as unmanned stores at specific times have spread, and theft crimes against these stores have also increased. In this paper, we propose an intelligent crime prevention system that fully utilizes existing shop devices to identify and respond to crimes occurring during the late night hours of unmanned shops in real time.

  • PDF

Service Experience Design Using CPTED: Location-Based Safe Return Home Assistance Application (셉테드(CPTED)를 이용한 서비스 경험디자인: 위치기반 안전 귀가 보조 어플리케이션 개발)

  • Chung, HaeKyung;Ko, JangHyok
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.1
    • /
    • pp.48-53
    • /
    • 2021
  • The purpose of this study is to establish a crime prevention system through the Crime Prevention Through Environmental Design (CPTED). The research method went through the double diamond process and discovered the user's needs through the persona analysis. The most representative features are the functions that informs users of the safe and optimal route, checks the presence of streetlights or cctvs in real time to update them, and allows people with similar routs to return home together. It is a function to help safe return home with the help of an autonomous method, and a self-defense function to protect themselves. Therefore, the application presented in this study was intended to be of great help when actually returning home by adding these new functions. In particular, we help users to return home most safely by recommending the best safe route. Through the persona analysis, research method which we had chosen, the needs of users were discovered and implemented in a design that reflected those needs and requirements.

Information and Communications Technology in the Field of Public Security: Crime Prevention and Response System (치안분야의 정보통신기술 활용방안 연구 - 빅데이터기반 치안수요분석과 대응체계를 중심으로 -)

  • Kim, Yeon Soo
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.23-32
    • /
    • 2016
  • Rapid advances in information and communications technology are new challenges and also opportunities for the police. For the purpose of identifying its implications, this study reviews utilization cases of information and communications technology in the field of public security in South Korea and other countries. As theoretical basis for utilization of information and communications technology, this study introduces intelligence-led policing, predictive policing and evidence-based policing. Also, utilization of big-data based crime analysis and crime prediction technology, as well as advancement of information and communications system and command and control technology of the police, are discussed. Based on the identified implications in this study, the following proposals are made. They are (1) procuring basic data, (2) creating an integrated database, (3) increasing utilization of policy decision-makers, (4) exchange and cooperation between related institutions, (5) training professional analyzers, (6) establishing legal basis and practical guidelines for an integrated database.

Crime prediction Model with Moving Behavior pattern (행동 패턴 기반 범죄 예측 모델 연구)

  • Choe, Jong-Won;Choi, Ji-Hyen;Yoon, Yong-Ik
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.1
    • /
    • pp.55-57
    • /
    • 2016
  • In this paper, we present an algorithm to determine the abnormal behavior through a CCTV-based behavioral recognition and a pattern of hand using ConvexHull. In the existing way that using CCTV for crime prevention, facial recognition is mainly used. Facial recognition is the way that compares the faces that are seen on the screen and faces of criminals for determining how dangerous targets are, however, this way is hard to predict future criminal behavior. Therefore, to predict more various situations, abnormal behaviours are determined with targets' incline of arms, legs and bodys and patterns of hand movements. it can forecast crimes when an acting has been getting within common normality out, comparing whose acting patterns with the crime patterns.

Real-time video Surveillance System Design Proposal Using Abnormal Behavior Recognition Technology

  • Lee, Jiyoo;Shin, Seung-Jung
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.120-123
    • /
    • 2020
  • The surveillance system to prevent crime and accidents in advance has become a necessity, not an option in real life. Not only public institutions but also individuals are installing surveillance cameras to protect their property and privacy. However, since the installed surveillance camera cannot be monitored for 24 hours, the focus is on the technology that tracks the video after an accident occurs rather than prevention. In this paper, we propose a system model that monitors abnormal behaviors that may cause crimes through real-time video, and when a specific behavior occurs, the surveillance system automatically detects it and responds immediately through an alarm. We are a model that analyzes real-time images from surveillance cameras and uses I3D models from analysis servers to analyze abnormal behavior and deliver notifications to web servers and then to clients. If the system is implemented with the proposed model, immediate response can be expected when a crime occurs.

Crime Mapping using GIS and Crime Prevention Through Environmental Design (GIS와 범죄예방환경설계 기반의 범죄취약지도 작성)

  • Park, Dong Hyun;Kang, In Joon;Choi, Hyun;Kim, Sang Seok
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.23 no.1
    • /
    • pp.31-37
    • /
    • 2015
  • The recent long-term economic recession and business depression are constantly increasing the occurence of the five major crimes(murder, robbery, rape, theft, violence). When looking into the previously-analyzed characteristics of how the five major crimes are committed, this study understands that the crimes mostly occur in these crime-ridden areas of poor public order and security and, in order to decrease the crime rates of the crime-prone areas, any relevant fields have been emphasizing the application of CPTED. In the light of that, referring to CPTED surveillance factors and the current crime rate data, the study presented ways to help the relevant fields draw up a crime-prone area grade map. In particular, the security center among monitoring elements was visualized by dividing it into point patrol and directed patrol and by dividing it into 3 steps monitoring levels with CCTV and street lights. In addition, we checked the crime rate by zoning through crime statistics occurred in the research areas and established a crime status map. We estimated the weight through AHP analysis on the built monitoring elements and the zoning of the occurred areas, as a result of making a map vulnerable to crime by monitoring steps by overlapping each element, we were able to confirm that 60% of theft, 52% of violence and 33% of rape in the 1st grade area were reduced compared to the 1st step in monitoring Step 3.

A Basic Study on the Checklists for Crime Risk Assessment in Physical Environment of the Pedestrian Passage at Residential Area (주거지역 소규모 보행로의 물리적 환경을 대상으로 한 범죄 위험도 평가 체크리스트에 관한 기초 연구)

  • Lee, You-Mi;Park, Hyeon-Ho;Kang, Boo-Seong;Sung, Gi-Ho;Lim, Dong-Hyun
    • KIEAE Journal
    • /
    • v.16 no.3
    • /
    • pp.47-55
    • /
    • 2016
  • Purpose: This study was aimed at providing the basic checklist as a means to assess the crime risk in physical environment of the pedestrian passage at residential area. Method: For this purpose, the preliminary checklists were selected according to the review of the precedent studies of checklists in exterior pedestrian passage. The usefulness and the importance of the preliminary checklists were analyzed through the seven expert group meetings, the 87 questionnaires survey of the crime experts & the architectural/urban experts, preliminary assessment and field survey. Results: The assessment categories of checklists were sorted into six types, i.e. spatial structure & function, lighting, landscaping, security facilities, other facilities and cleaning & maintenance. The 49 checklists were proposed according to the assessment categories. The final checklists were divided key checklists and general checklists based on the results of experts' weighting of each list item. There were significant differences between crime experts' weighting and architectural/urban experts' weighting in several checklists, i.e. dividing between pavements and streets, the brightness of light, white light.

Intelligent Video Surveillance Incubating Security Mechanism in Open Cloud Environments (개방형 클라우드 환경의 지능형 영상감시 인큐베이팅 보안 메커니즘 구조)

  • Kim, Jinsu;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.105-116
    • /
    • 2019
  • Most of the public and private buildings in Korea are installing CCTV for crime prevention and follow-up action, insider security, facility safety, and fire prevention, and the number of installations is increasing each year. In the questionnaire conducted on the increasing CCTV, many reactions were positive in terms of the prevention of crime that could occur due to the installation, rather than negative views such as privacy violation caused by CCTV shooting. However, CCTV poses a lot of privacy risks, and when the image data is collected using the cloud, the personal information of the subject can be leaked. InseCam relayed the CCTV surveillance video of each country in real time, including the front camera of the notebook computer, which caused a big issue. In this paper, we introduce a system to prevent leakage of private information and enhance the security of the cloud system by processing the privacy technique on image information about a subject photographed through CCTV.