• Title/Summary/Keyword: Crime Prevention Technology

Search Result 84, Processing Time 0.024 seconds

Activation of Culture and Content Industry and Necessity of Security Industry & Concert Hall Safety (문화콘텐츠 산업의 활성화와 공연장 안전 및 보안 산업의 필요성)

  • Choi, Jeong-Il;Jang, Ye-Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.55-63
    • /
    • 2016
  • The purpose of this study is that there viewing at the future development direction and awareness of the cultural contents industry targeting college students for the activation of the domestic cultural content industry. And we want to find the need of the security industry & Concert Hall Safety. Recent worldwide it has occurred 'Soft target' terror targeting unspecified civilian in the cultural space of theater and music venues, stadiums etc. But security and safety systems against terror in Korea are very deficient situation. US security market has increased sales significantly interest in increasing against crime and terrorism prevention and depending on the price cut and technology development. It is expected to require a security industry in a variety of applications to the cultural contents industry development about Korean pop music and theatrical performances, and internet and mobile games stc.

Adaptive Convergence Security Policy and Management Technology of Home Network (홈 네트워크에서의 적응적 통합 보안 정책 및 관리 기술)

  • Lee, Sang-Joon;Kim, Yi-Kang;Ryu, Seung-Wan;Park, You-Jin;Cho, Choong-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.72-81
    • /
    • 2011
  • In this paper, we propose adaptive convergence security policies and management technologies to improve security assurance in the home networking environment. Many security issues may arise in the home networking environment. Examples of such security issues include the user privacy, the service security, the integrated networking security, the middleware security and the device failure. All these security issues, however, should be fulfilled in phase due to many difficulties including deployment cost and technical complexity. For instance, fundamental security requirements such as authentication, access control and prevention of crime and disaster should be addressed first. Then, supplementary security policies and diverse security management technologies should be fulfilled. In this paper, we classify these requirements into three categories, a service authentication, a user authentication and a device authentication, and propose security policies and management technologies for each requirement. Since the home gateway is responsible for interconnection of many home devices and external network access, a variety of context information could be collected from such devices.

Analysis of Jini 2.0 Security for Home Network (홈네트워크를 위한 Jini 2.0 Security 분석)

  • 이윤경;한종욱;김도우;주홍일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.717-720
    • /
    • 2004
  • Jini is a middle ware supposed in Sun Microsystems. The goal of lil is the establishment of dynamic distributed system, which can share information and control of other Jini technology-enabled services or devices in the same Jini system. Jini is one of the best middleware together UPnP and HAVi. Hone network security, soch as privacy protection, crime prevention, and etc, is very important. So Jini 2.0 adds security mechanism in 11. 2003. This paper describes the analysis of Jini 2.0 security mechanism, and home network security.

  • PDF

Agent for Home Server Management in Intelligent Smart Home Network

  • Moon, Seok-Jae;Shin, HyoYoung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.225-230
    • /
    • 2022
  • The intelligent home network system integrates various devices in the home into one communication network to provide information sharing, control, and operation environment between devices. This intelligent home network system operates around a home server. Home appliances in the era of the 4th industrial revolution will have numerous home servers in logical areas as the intelligent home network in the home accelerates. Therefore, the need for systematic management of home servers is emerging. We propose an agent system for efficient intelligent smart home server management. The agent system monitors the home server and operating environment for home server management of the intelligent smart home network. By referring to this monitored information, the service module of the home server is managed, and the home server is dealt with whether it is normal or not. In addition, by referring to the information collected by the service agent created in the group management server while migrating the home server, it is possible to deal with integrated meter reading, crime prevention, and topics. And when a new service is applied to the home server, it is registered in the management server and distributed to the home server through the agent, so that the intelligent smart home network can be efficiently managed.

Improving Accuracy of Violence Detection in CCTV Camera Using Pose Estimation and Face Emotion Recognition (Pose Estimation과 얼굴 감정인식을 활용한 CCTV 영상에서 폭력행위 탐지 정확도 개선 방안 연구)

  • Seong Un Noh;Dae Young Heo
    • Journal of Information Technology Services
    • /
    • v.23 no.4
    • /
    • pp.45-53
    • /
    • 2024
  • Recently, as social anxiety regarding violent crimes accompanied by frequent occurrences of violence has increased, the need for intelligent video analysis in CCTV systems for crime prevention and rapid response to incidents has grown. One of the methods used for detecting violent behavior through video analysis is action-based detection using pose estimation. However, relying solely on joint angles and changes obtained from pose estimation to detect violent acts can lead to issues. False positives occur when non-violent actions such as petting a head or hugging are mistakenly classified as violent behavior. This study aims to reduce the frequency of false positives in action-based violence detection methods that utilize only pose estimation. We propose a new violence detection method that combines the results of facial emotion recognition (anger, disgust, fear, sadness, surprise, happiness, and neutrality) of the expected victim with the existing pose estimation-based violence detection method. By combining pose estimation with facial emotion recognition results on a video dataset consisting of YouTube videos and self-made videos, we were able to achieve a higher accuracy rate of 92.5% compared to the traditional method which solely relies on pose estimation. Future research will focus on studying violence detection in actual CCTV scenarios to improve the reliability of the result data.

Development of IR Thermal Camera Detector based on Smartphone Interlocking for Hidden Camera Crime Prevention (몰래카메라 범죄방지를 위한 스마트폰 연동 기반의 IR 열카메라 탐지기 개발)

  • Kang, Young-Gil;Cho, Pil-Gu;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.1-8
    • /
    • 2021
  • The performance of hidden camera cameras is improving day by day due to miniaturization and advanced technology integration according to the speed of technological development of smartphones. As this external networking computing environment is advanced and diversified, exposure to hidden cameras in addition to general safety cameras is also increasing. On the other hand, the technology for detecting and preventing hidden cameras is not keeping up with the development and speed of these hidden cameras. Therefore, in this study, the heat of the hidden camera was detected using infrared thermal detection technology based on general image and thermal image synthesis technology, and the reflectance of each wavelength according to the difference in ambient temperature was analyzed to reduce the false positive rate.

A Study on the Industrial Security Policies in Germany (독일의 산업보안 정책과 시사점)

  • Lee, Sung-Yong
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.57-82
    • /
    • 2014
  • The purpose of this paper is to introduce the industrial security policies in Germany and to look for the implication for the development of korean industrial security. Due to highly developed economy and industrial technology, Germany has become the main stage for the industrial espionage for a long time. In Germany industrial espionage is classified into two categories; Economy-espionage and Competition-espionage. While economy-espionage is related to the Espionage of foreign intelligence agencies, Competition-espionage means the act of espionage, that is implemented by the private sector. When it comes to economy-espionage, prevention of economy-espionage is the duty of the State, because it threat the national interest. Otherwise, the private sector has to take the responsibility of prevention of competition-espionage. It goes without saying that, the state has to investigate the crime, when espionage happens. But Prevention is more important than investigation in this regard. For the realization of Public-Private-Partnership, the private sector should be the genuine counterpart of the Public through the sharing responsibility of industrial-espionage prevention. Another talking point this paper suggest, is the national ethic in connection with economy-espionage. The State could be not only a actor of espionage prevention, but also a perpetrator. The economy-espionage for the purpose of national interest would not be justified, unless it has nothing to do with national security.

  • PDF

The recognition of sexual violence of in Daegu local college students, and relations of sexual education on the coping with sexual violence (대구지역 전문대학생들의 성폭력 인식도 및 성교육이 성폭력 대처에 미치는 관련요인)

  • Kim, Sung-Woo
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.12 no.2
    • /
    • pp.13-27
    • /
    • 2011
  • Objectives: This study aims to analyze recognition and problems of in Daegu local college students on sexual violence and figure out major factors to prevent sexual violence and to use as necessary basic resources for the improvement of individual and social recognition and effective sexual education. Methods: The Data from 255 students (85%) out of 300 excluding questionnaires with insufficient answers were under analysis using Excel Program and SPSS Win 17.0 for cross-tabulations and correlation analysis. Significance test were performed using $x^2$-test. Results: 1) As to recognition of sexual violence by gender, 88.2%(60) of male and 91.4%(171) of female students conceived the current sexual violence level is hazardous which shows female students had slightly higher recognition. 2) As to recognition of sexual education by gender, both conceived it for equipping proper value system of sex(55.9% of male & 61.5% of female student). 3) As to prevention and coping with sexual violence by gender, 58.8% of male students and 65.2% of female students answered that prevention is possible. 4) As to the correlation between sexual violence factors, it showed positive (+) correlation in the experience of sexual education and the recognition of sexual violence level, in the recognition of sexual violence level and the recognition of sexual violence responsible scope, and in the possibility of sexual violence prevention and the recognition of sexual crime prevention law. 5) As to the recognition and measurement by experience of sexual education, among those who answered the current sexual violence level was hazardous 91.8% had previous sexual education experience and 83.3% had no experience. 6) As to the recognition and measurement of sexual violence by experience of sexual violence (self-determination), those with sexual education experience (79.8%) had little experience in sexual violence than those with not (91.6%). 7) As to the recognition and measurement of sexual violence by the possibility of preventing sexual violence, it showed statistically significant difference in the reason of increase of sexual violence(p<0.01). Conclusions: Accordingly, to provide systematic and sustainable sexual education, individualized education considering gender, individual development rather than standardized group education in its teaching method is necessary, and follow-up evaluation and feed-back system should be implemented to assess achievement and recognition of sexual education.

  • PDF

Practitioners' Needs Analysis to Improve the Youth Theft Prevention Program (청소년 절도비행 재범방지 프로그램 개선을 위한 실무자 요구조사 연구)

  • Choi, Jaegwang;Jang, Heamin;Lee, Yu-Kyeong;Song, Wonyoung
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.9
    • /
    • pp.145-156
    • /
    • 2021
  • This study is aimed to improve the youth theft prevention program with rationality and practicality, based on the needs of practitioners who conduct these programs in fields. The survey questionnaire was prepared based on previous researches, and the survey was conducted on 72 probation officers and education instructors nationwide running a youth theft prevention program. As a result, practitioners reported the lack of self-control and high impulsivity as the main characteristics of the theft delinquent adolescents. And they recognized peer alignment and family problems as the causes of theft. As for the contents of the program, they reported that recidivism prevention skills such as understanding psychological problems, peer relationships, raising a sense of law compliance, anger, impulse control, dealing with negative emotions, and finding alternative behaviors, as well as moral development, are necessary. These results indicate that multi-dimensional interventions such as individuals, families, and peers are needed to prevent recidivism of juvenile theft. Implications of these results, future research directions, and limitations and significance of the study were discussed.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.