• Title/Summary/Keyword: International Crime

Search Result 118, Processing Time 0.025 seconds

Detecting Crime Hot Spots Using GAM and Local Moran's I

  • Cheong, Jin-Seong
    • International Journal of Contents
    • /
    • v.8 no.2
    • /
    • pp.89-96
    • /
    • 2012
  • Scientific analysis of crime hot spots is essential in preventing and/or suppressing crime. However, results could be different depending on the analytic methods, which highlights the importance of choosing adequate tools. The purpose of this study was to introduce two advanced techniques for detecting crime hot spots, GAM and Local Moran's I, hoping for more police agencies to adopt better techniques.GAM controls for the number of population in study regions, but local Moran's I does not. That is, GAM detects high crime rate areas, whereas local Moran's I identifies high crime volume areas. For GAM, physical disorder was used as a proxy measure for population at risk based on the logic of the broken windows theory. Different regions were identified as hot spots. Although GAM is generally regarded as a more advanced method in that it controls for population, it's usage is limited to only point data. Local Moran's I is adequate for zonal data, but suffers from the unavoidable MAUP(Modifiable Areal Unit Problem).

Russian and Foreign Experience in Implementing Departmental Control and Prosecutor's Supervision when Verifying Crime Reports

  • Ivanov, Dmitriy Aleksandrovich;Moskovtseva, Kristina Andreevna;Bui, Thien Thuong;Sheveleva, Kseniya Vladimirovna;Vetskaya, Svetlana Anatolyevna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.299-303
    • /
    • 2022
  • The article examines the stage of verification of a crime report from the standpoint of the need for its legislative regulation. Moreover, it investigates the international experience in this field. The existing procedural models are described in detail on the example of the neighboring and faraway countries. An analysis of the provisions of the current criminal procedure law of Russia and foreign experience allowed the authors to identify existing problems in the implementation of departmental control and prosecutorial supervision at the stage of verifying a crime report. The aim of the study is to develop theoretical provisions and recommendations regarding the implementation of departmental procedural control and prosecutorial supervision over the activities of the investigator during the verification of reports of crimes, based on the study of experience, both in Russia and in a number of countries of the near and far abroad, which could find their reflection in law enforcement practice, as well as aimed at improving the current criminal procedure legislation. The authors substantiated the theory that a detailed examination of the foreign procedural foundations of checking a crime report will allow us to form the most suitable model for checking a crime report for our state, taking into account all possible features and successfully implement it into the current criminal procedural law of the Russian Federation.

Predicting Reports of Theft in Businesses via Machine Learning

  • JungIn, Seo;JeongHyeon, Chang
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.499-510
    • /
    • 2022
  • This study examines the reporting factors of crime against business in Korea and proposes a corresponding predictive model using machine learning. While many previous studies focused on the individual factors of theft victims, there is a lack of evidence on the reporting factors of crime against a business that serves the public good as opposed to those that protect private property. Therefore, we proposed a crime prevention model for the willingness factor of theft reporting in businesses. This study used data collected through the 2015 Commercial Crime Damage Survey conducted by the Korea Institute for Criminal Policy. It analyzed data from 834 businesses that had experienced theft during a 2016 crime investigation. The data showed a problem with unbalanced classes. To solve this problem, we jointly applied the Synthetic Minority Over Sampling Technique and the Tomek link techniques to the training data. Two prediction models were implemented. One was a statistical model using logistic regression and elastic net. The other involved a support vector machine model, tree-based machine learning models (e.g., random forest, extreme gradient boosting), and a stacking model. As a result, the features of theft price, invasion, and remedy, which are known to have significant effects on reporting theft offences, can be predicted as determinants of such offences in companies. Finally, we verified and compared the proposed predictive models using several popular metrics. Based on our evaluation of the importance of the features used in each model, we suggest a more accurate criterion for predicting var.

Time Series Crime Prediction Using a Federated Machine Learning Model

  • Salam, Mustafa Abdul;Taha, Sanaa;Ramadan, Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.119-130
    • /
    • 2022
  • Crime is a common social problem that affects the quality of life. As the number of crimes increases, it is necessary to build a model to predict the number of crimes that may occur in a given period, identify the characteristics of a person who may commit a particular crime, and identify places where a particular crime may occur. Data privacy is the main challenge that organizations face when building this type of predictive models. Federated learning (FL) is a promising approach that overcomes data security and privacy challenges, as it enables organizations to build a machine learning model based on distributed datasets without sharing raw data or violating data privacy. In this paper, a federated long short- term memory (LSTM) model is proposed and compared with a traditional LSTM model. Proposed model is developed using TensorFlow Federated (TFF) and the Keras API to predict the number of crimes. The proposed model is applied on the Boston crime dataset. The proposed model's parameters are fine tuned to obtain minimum loss and maximum accuracy. The proposed federated LSTM model is compared with the traditional LSTM model and found that the federated LSTM model achieved lower loss, better accuracy, and higher training time than the traditional LSTM model.

A Study on the Disability Hate Crime: Convergent Approach of Correction and Welfare (장애인 증오범죄에 대한 탐색적 연구 : 교정과 복지의 융복합적 접근)

  • Shin, Sook-Kyung
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.467-474
    • /
    • 2019
  • Recently, hate crime is emerging as a new social problem in Korea, as well as in many countries, as a growing number of cases of aversion to specific groups including people with disabilities. This paper was to review the concept and current status of hate crime in order to notify the seriousness of increasing hate crime, especially hate crime against persons with disabilities. Finally, This paper proposed some suggestions from the welfare point of persons with disabilities in terms of how to reduce these crimes utilizing the reports of related organizations and newspapers as well as relevant national and international studies.

Using The Internet As A Tool For The Illicit Sale Of Drugs And Potent Substances

  • Manzhai, Oleksandr;Cherevko, Kyrylo;Chycha, Ruslan;Burlaka, Iryna;Piadyshev, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.246-250
    • /
    • 2022
  • The article analyzes the regulations of current criminal law and current issues, combating drug crime on the Internet, as well as measures to combat drug crime in the field of modern information technology. In connection with the growth of crimes in the field of drug trafficking committed with the use of information and telecommunications technologies, the urgent task of the state is to find effective ways to reduce drug crime. The article considers criminologically significant aspects of the mechanism of illicit drug trafficking, which is carried out with the use of information and telecommunication technologies and means of remote communication.

A Study on Voice Phishing Countermeasures of the Police (보이스피싱에 대한 경찰의 대응방안에 관한 연구)

  • Kim, Duck-Yong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.193-198
    • /
    • 2018
  • In Korea, the penetration rate of Internet, telephone and smart devices is reaching the highest level in the world. Cyber financial crimes that exploit such infrastructures continue to evolve. Since the first Voice Phishing crime in May 2006, ten years later, there has been a constant occurrence of Voice Phishing crime. Voice Phishing is a crime in which a victim is phoned for false information to figure out the victim's account number and password. This method of Voice Phishing evolves day by day, and it is difficult to investigate. Most of Voice Phishing is a form of international organized crime that is based in Southeast Asia such as China, and it is not easy to eradicate by international cooperation investigation. The purpose of this study is to investigate the actual situation and case analysis of Voice Phishing crime, and to propose the countermeasures against police Voice Phishing counterplan.

Diagnosis Program Development for Shopping District and Shopping Mall (상가 및 쇼핑센터의 범죄예방진단 프로그램 개발)

  • Lee, Sang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.8
    • /
    • pp.317-326
    • /
    • 2010
  • Recently, in contemporary society, because of the international economic crisis and the increase of unemployment, there are dangerous crime elements that threaten the safety of citizen. The Safety from the crime is important as much as existence of need. Therefore, in order to make the safety of community, the government needs to make the best effort. In everyday life, crime is the fear of the target. Therefore, if the government can not solve the crime problem, the quality of citizen's life can not improve. In order to safety of community, this study is the one of the crime prevention diagnosis about shopping district and shopping mall. Also, this study can apply to the policy. If this study can apply to the policy, the safety of citizen's life will be protecting. The content of this study consist of introduction in chapter 1, theoretical consideration in chapter 2, foreign crime prevention diagnosis evaluation in chapter 3, crime prevention diagnosis in chapter 4 and conclusion in chapter 5.

Voice Phishing Occurrence and Counterplan (보이스피싱 발생 및 대응방안)

  • Cho, Ho-Dae
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.7
    • /
    • pp.176-182
    • /
    • 2012
  • Voice Phishing finds out personal information illegally using electrification and it is confidence game that withdraw deposit on the basis of this. It appeared by new social problem as damage instances increase rapidly. Target of the damage is invading indiscriminately to good civilian and is crime that commit by foreigners such as a most Chinese, Formosan. Voice Phishing can be crime type of new form in terms of criminal practice is achieved in the foreign countries. Therefore, this study wishes to analyze present occurrence actual conditions and example, and search effective confrontation plan regarding Voice Phishing. Voice Phishing criminal offense is growing as crime is not eradicated in spite of continuous public relations and control, and technique is diversified and specializes preferably. Hereafter, confrontation plan about problem may have to be readied in banking communication investigation to eradicate Voice Phishing. Also, polices control activity may have to be reinforce through quick investigation's practice and development of investigation technique, and relevant government ministry and international mutual assistance cooperation such as the Interpol should be reinforced because is shown international crime personality.

The Trend of Internet Related Crimes and their Solution (Internet 관련 범죄(犯罪)의 동향(動向)과 그 대책(對策))

  • Song, Kwang-Soub
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.99-123
    • /
    • 1999
  • Internet related crimes are a crime which is inter-related with high specialization ${\cdot}$ technicality ${\cdot}$ leakage of information ${\cdot}$ intellectual-offence and deviant behavior. Without the accurate countermeasure, we can't achieve the desired end. So we should find out multilateral and general measure. Always crimes go in advance of the measure, so the counter measures against, computer crime can not be final. Nevertheless, we can't be careless in making the measure, but we should always consider a counter measure. 1995. 12. 29. our country revised criminal law and consolidated direct provisions, especially on the computer-hacking. But, inspite of the revision, especially on the computer-hacking. But, inspite of the revision, we have many problems'. So, first of all, through the positive and empirical study, we should revise criminal law and computer crime related provisions systematically. As the aspects and techniques of internet related crimes are always changing with the development of computer technology, there will be many problems with principle of legality, when we apply the existing abstract provisions to the new crime. We can not be lazy in studying the emerging internet related crimes and taking concrete shape of the provision. And it will be a big help to that desirable to import the foreign provision without consideration of our reality. Without the positive and empirical study on internet related crimes, sometimes important crime will be out of reach of the punishment. Due to these day's development of computer and technology of communication, the personal computers are widely supplied and especially PC communication and exchange of the informations became the most important function. With the advent of internet, new aspects of crimes are appearing. Up to now, the fraud by using the computer or the interference in the execution of duty by the illegal operation of computer was the leading aspects of computer crime, but nowadays with the advent of internet, database crime or network crime like the computer hacking became the important aspects of internet related crimes. These new aspects of internet related crimes are defusing into domains of traditional crimes. Nevertheless to follow and punish the acts on the internet is not technically easy, and as it is emerging international shape, to settle it by international law is not that easy. Harmful acts in the information-oriented society are very diverse in kinds and aspects, and it is difficult to enumerate. The point is that among the new acts in the information-oriented society we should decide which acts are to be punished and which acts are not to be punished. It is needless to say that the criminal law should be the last resort. But owing to the characters of the characteristics of the information-oriented society, when the traditional standards can be applied, the question of what is the basis and how it can be applied in a concrete way is not settled. And if it cannot be applied, how can we make new standard is also an unsettled question.

  • PDF