• Title/Summary/Keyword: Theft

Search Result 274, Processing Time 0.034 seconds

Crime Mapping using GIS and Crime Prevention Through Environmental Design (GIS와 범죄예방환경설계 기반의 범죄취약지도 작성)

  • Park, Dong Hyun;Kang, In Joon;Choi, Hyun;Kim, Sang Seok
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.23 no.1
    • /
    • pp.31-37
    • /
    • 2015
  • The recent long-term economic recession and business depression are constantly increasing the occurence of the five major crimes(murder, robbery, rape, theft, violence). When looking into the previously-analyzed characteristics of how the five major crimes are committed, this study understands that the crimes mostly occur in these crime-ridden areas of poor public order and security and, in order to decrease the crime rates of the crime-prone areas, any relevant fields have been emphasizing the application of CPTED. In the light of that, referring to CPTED surveillance factors and the current crime rate data, the study presented ways to help the relevant fields draw up a crime-prone area grade map. In particular, the security center among monitoring elements was visualized by dividing it into point patrol and directed patrol and by dividing it into 3 steps monitoring levels with CCTV and street lights. In addition, we checked the crime rate by zoning through crime statistics occurred in the research areas and established a crime status map. We estimated the weight through AHP analysis on the built monitoring elements and the zoning of the occurred areas, as a result of making a map vulnerable to crime by monitoring steps by overlapping each element, we were able to confirm that 60% of theft, 52% of violence and 33% of rape in the 1st grade area were reduced compared to the 1st step in monitoring Step 3.

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF

Intelligent Motion Pattern Recognition Algorithm for Abnormal Behavior Detections in Unmanned Stores (무인 점포 사용자 이상행동을 탐지하기 위한 지능형 모션 패턴 인식 알고리즘)

  • Young-june Choi;Ji-young Na;Jun-ho Ahn
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.73-80
    • /
    • 2023
  • The recent steep increase in the minimum hourly wage has increased the burden of labor costs, and the share of unmanned stores is increasing in the aftermath of COVID-19. As a result, theft crimes targeting unmanned stores are also increasing, and the "Just Walk Out" system is introduced to prevent such thefts, and LiDAR sensors, weight sensors, etc. are used or manually checked through continuous CCTV monitoring. However, the more expensive sensors are used, the higher the initial cost of operating the store and the higher the cost in many ways, and CCTV verification is difficult for managers to monitor around the clock and is limited in use. In this paper, we would like to propose an AI image processing fusion algorithm that can solve these sensors or human-dependent parts and detect customers who perform abnormal behaviors such as theft at low costs that can be used in unmanned stores and provide cloud-based notifications. In addition, this paper verifies the accuracy of each algorithm based on behavior pattern data collected from unmanned stores through motion capture using mediapipe, object detection using YOLO, and fusion algorithm and proves the performance of the convergence algorithm through various scenario designs.

Intelligent Library Management System using RFID and USN (RFID 및 USN을 이용한 스마트 도서관리 시스템 개발)

  • Lee, Chang-Soo;Park, Sang-Kyoon;Ahn, Jae-Myung
    • The KIPS Transactions:PartD
    • /
    • v.19D no.3
    • /
    • pp.247-256
    • /
    • 2012
  • It's not easy for medium or large sized libraries to effectively manage their vast array of books and media data. Recently, in place of magnetic stripes and barcodes, RFID technology has been applied on a small scale to simple book management and theft-prevention initiatives. The development of RFID and USN applied systems and technology has led to RFID and USN being used in a diverse range of industrial fields, including book management systems in libraries. Using the aforementioned technology, the intelligent book management system suggested in this thesis can provide a more practical, effective, content-rich and convenient book management system.

Improving Malicious Web Code Classification with Sequence by Machine Learning

  • Paik, Incheon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.319-324
    • /
    • 2014
  • Web applications make life more convenient. Many web applications have several kinds of user input (e.g. personal information, a user's comment of commercial goods, etc.) for the activities. On the other hand, there are a range of vulnerabilities in the input functions of Web applications. Malicious actions can be attempted using the free accessibility of many web applications. Attacks by the exploitation of these input vulnerabilities can be achieved by injecting malicious web code; it enables one to perform a variety of illegal actions, such as SQL Injection Attacks (SQLIAs) and Cross Site Scripting (XSS). These actions come down to theft, replacing personal information, or phishing. The existing solutions use a parser for the code, are limited to fixed and very small patterns, and are difficult to adapt to variations. A machine learning method can give leverage to cover a far broader range of malicious web code and is easy to adapt to variations and changes. Therefore, this paper suggests the adaptable classification of malicious web code by machine learning approaches for detecting the exploitation user inputs. The approach usually identifies the "looks-like malicious" code for real malicious code. More detailed classification using sequence information is also introduced. The precision for the "looks-like malicious code" is 99% and for the precise classification with sequence is 90%.

Characteristics Related to Depression in Adolescent Conduct Disorder and Oppositional Defiant Disorder (청소년의 품행장애와 반항성 장애에서 보이는 우울증상과 연관된 특성)

  • Lee, Moon-In;Kim, Sang-Hoon;Kim, Hak-Ryeol;Park, Sang-Hak
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.22 no.3
    • /
    • pp.156-161
    • /
    • 2011
  • Objectives: Externalized behavioral problems are prevalent in adolescents, due to the difficulties associated with this developmental stage. Conduct Disorder (CD) and Oppositional Defiant Disorder (ODD), as well as other psychiatric disorders, such as major depressive disorder, result in the manifestation of many behavioral problems during adolescence. Methods: For this report, we analyzed a sample of 31 adolescents, each of whom had presented with CD or ODD at Chosun University Hospital between 2002 and 2010. We separated subjects into depressed and non-depressed groups according to their Beck Depression Inventory scores (BDI<10, non-depressed ; BDI${\geq}$10, depressed). Then we analyzed for neuropsychological differences between the depressed and non-depressed groups. Results: In our sample, adolescents in the depressed group showed less of a stealing (deceitfulness and/or theft) behavioral pattern and presented with more anxiety symptoms, lower self-esteem, and greater sensitivity in interpersonal relationships, as compared to the non-depressed group. Conclusion: When adolescents exhibit disruptive behavior, clinicians should consider the underlying causes of the behavior.

Studies about Housing Problems Perceived by Residents in Traditional Houses in Suzhou, China (중국 소주지역 민가 거주가가 지각한 주거문제에 관한 연구)

  • Cui, Erfei;Choi, Byungsook;Jiang, Lili
    • Journal of the Korean housing association
    • /
    • v.25 no.6
    • /
    • pp.11-18
    • /
    • 2014
  • This study is to explore the housing problems and environment conditions perceived by residents in traditional houses in Suzhou, China. The empirical data is based on a questionnaire survey, which were from 100 residents in traditional area in Gusu area of Suzhou. In order to understand the traditional houses, on-the-spot investigation and literature review methods are adapted in this study. The main findings are as follows. Firstly, most of residents are middle-aged or older people, and their income is not high. Secondly, there are almost no cases of organizing independent workroom and storage room in their housing. Moreover, the main problems are mildew, theft, rats and cockroaches, etc. Finally, the satisfaction with the internal housing environment was appeared reasonable, but the external environment is unsatisfactory. Therefore, the external environment should be more considered in the Chinese traditional housing policy.

A survey and categorization of anomaly detection in online games (온라인 게임에서의 이상 징후 탐지 기법 조사 및 분류)

  • Kwak, Byung Il;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1097-1114
    • /
    • 2015
  • As the online game market grows, illegal activities such as cheating play using game bots or game hack programs, running private servers, hacking game companies' system and network, and account theft are also increasing. There are various security measures for online games to prevent illegal activities. However, the current security measures are not enough to prevent all highly evolving game attacks and frauds. Some security measure can do harm game players usability, game companies need to develop usable security measure that is well fit to game genre and contents design. In this study, we surveyed the recent trend of various security measure applied in online games. This research also classified illegal activities and their related countermeasure for detection and prevention.

Empirical Analysis on Comparison between Self-checkout and Regular Staffed-checkout lanes in a Poland Retail Store

  • Kwak, Jin Kyung
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.56-61
    • /
    • 2020
  • Customer satisfaction in retail stores are considerably affected by checkout services. Self-checkout counters have been installed in order to reduce waiting times at checkout in retail stores. However, it is uncertain whether the self-checkout lanes actually decrease the average waiting time of customers. Rather, there are some problems associated with self-checkout lanes such as theft or service failure due to technological problems. This study analyzes comparison between self-checkout and regular staffed-checkout lanes, based on the dataset collected from a retail store in Poland. As a result, we observe that the average transaction times were longer at the self-checkout lanes though fewer products were purchased than at the staffed-checkout lanes. In addition, the customers who buy more products tend to use self-checkouts less frequently. We also check that transaction times are proportional to the number of products customers purchase, and that both the time to scan one item and the fixed time related to checkout are significantly longer at the self-checkout counters. As there has been very few research on the effectiveness of self-checkouts, this study can be the first step to investigate managerial insights on checkout services in retail stores.

A Study of New Authentication Method in Financial Accounts to Lock and Unlock Using the Smart-Devices (스마트기기를 이용한 금융계좌 잠금 및 해제 인증에 관한 연구)

  • Kim, Kwang Jin;Lee, Sung Joong
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.21-28
    • /
    • 2012
  • This study can be solved a means of authentication of electronic financial transactions. We suggest that smart devices can be useful to authenticate in electronic financial transactions regardless of time and place. Our new authentication method named Lock-Unlock authentication method with smart devices. This method will be expected to reduce many kind of accidents (theft, phishing, hacking, certificates and simple certified OTP, ATM withdrawals, ARS, etc.) by account locking in electronic financial transactions. And helpful to users can effectively protect electronic financial transactions and minimize the accident during get a electronic trading.