• Title/Summary/Keyword: Theft Prevention

Search Result 37, Processing Time 0.027 seconds

Visualized Determination for Installation Location of Monitoring Devices using CPTED (CPTED기법을 통한 모니터링 시스템 설치위치 시각화 결정법)

  • Kim, Joohwan;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.145-150
    • /
    • 2015
  • Needs about safety of residents are important in urbanized society, elderly and small-size family. People are looking for safety information system and device of CPTED. That is, Needs and Installations of CCTV increased steadily. But, scientific analysis about validity, systematic plan and location of security CCTV is nonexistent. It is simply put these devised in more demanded areas. It has limits to look for safety of residents by increasing density of CCTVs. One of the characteristics of crime is clustering and stong interconnectivity. So, exploratory spatial data of crime is geo-coded using 2 years data and carried out cluster analysis and space statistical analysis through GIS space analysis by dividing 18 variables into social economy, urban space, crime prevention facility and crime occurrence index. The result of analysis shows cluster of 5 major crimes, theft, violence and sexual violence by Nearest Neighbor distance analysis and Ripley's K function. It also shows strong crime interconnectivity through criminal correlation analysis. In case of finding criminal cluster, you can find criminal hotspot. So, in this study I found concept of hotspot and considered technique about selection of hotspot. And then, selected hotspot about 5 major crimes, theft, violence and sexual violence through Nearest Neighbor Hierarchical Spatial Clustering.

Crime Mapping using GIS and Crime Prevention Through Environmental Design (GIS와 범죄예방환경설계 기반의 범죄취약지도 작성)

  • Park, Dong Hyun;Kang, In Joon;Choi, Hyun;Kim, Sang Seok
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.23 no.1
    • /
    • pp.31-37
    • /
    • 2015
  • The recent long-term economic recession and business depression are constantly increasing the occurence of the five major crimes(murder, robbery, rape, theft, violence). When looking into the previously-analyzed characteristics of how the five major crimes are committed, this study understands that the crimes mostly occur in these crime-ridden areas of poor public order and security and, in order to decrease the crime rates of the crime-prone areas, any relevant fields have been emphasizing the application of CPTED. In the light of that, referring to CPTED surveillance factors and the current crime rate data, the study presented ways to help the relevant fields draw up a crime-prone area grade map. In particular, the security center among monitoring elements was visualized by dividing it into point patrol and directed patrol and by dividing it into 3 steps monitoring levels with CCTV and street lights. In addition, we checked the crime rate by zoning through crime statistics occurred in the research areas and established a crime status map. We estimated the weight through AHP analysis on the built monitoring elements and the zoning of the occurred areas, as a result of making a map vulnerable to crime by monitoring steps by overlapping each element, we were able to confirm that 60% of theft, 52% of violence and 33% of rape in the 1st grade area were reduced compared to the 1st step in monitoring Step 3.

Conceptualization of u-Bike Services and its Priorities (u-Bike 서비스의 개념 및 적용 우선순위 연구)

  • Lee, Jae-Yeong;Im, Yun-Taek;Lee, Sang-Ho
    • Journal of Korean Society of Transportation
    • /
    • v.28 no.3
    • /
    • pp.7-17
    • /
    • 2010
  • Bicycle is one of the most important eco-friendly transport mode which can cope with global warming. ICTs(information and communication technologies) on bicycles became a dominant factor for success to the spread of bicycles to public as we experienced Public Bike System. In this paper, conceptualization and classification of u-Bike services are fulfilled and its priority was examined using AHP method. Group capabilities technique of ECII, a computer fool of AHP was invited to minimize bias on appraisal. 12 u-Bike services were conceptualized. U-service with highest adoptability was 'bike and ride' service which can link bicycle to public transportation. 'Prevention system from abandonment and theft' and 'public bike system' similar to Velib system in Paris are also considered to be very important services in u-City.

Design and Implementation of DB Protection System through Critical Query Signature (핵심 쿼리 결제를 통한 DB 보호 시스템 설계 및 구현)

  • Kim, Yang-Hoon;Kwon, Hyuk-Jun;Lee, Jae-Pil;Park, Chun-Oh;Kim, Jun-Woo;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.2
    • /
    • pp.228-237
    • /
    • 2011
  • The risk of leakage or theft of critical data which is stored in database is increasing in accordance with evolution of information security paradigm. At the same time, needs for database security have been on the rapid increase due to endless leakage of massive personal information. The existing technology for prevention of internal information leakage possesses the technical limitation to achieve security goal completely, because the passive control method including a certain security policy, which allows the only authorized person to access to DBMS, may have a limitation. Hence in this study, we propose Query Signature System which signatures the queries accessing to the critical information by interrupting and passing them. Furthermore this system can apply a constant security policy to organization and protect database system aggressively by restricting critical query of database.

Study on the Design Method of the Energy Harvesting Smart Sensor for Implementing IoT Service (IoT 서비스 구현을 위한 에너지 하베스팅 Smart Sensor 설계 방안 연구)

  • Jang, Ho-Deok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.89-94
    • /
    • 2018
  • This paper investigated the design method of the smart sensor for implementing IoT (Internet of Things) service. The power supply of sensor consistently acquisting data is based on the energy harvesting technology and designed with piezoelectric transducer not affected by surrounding circumstances. The wireless communication interface for the transmission of data is designed with BLE (Bluetooth Low Energy). BLE is highly adequate wireless communication technology for low power consumption and short distance wireless communication. The main application of BLE is beacon whose usage range is extended from O2O (Online to Offline) service, navigator based on indoor positioning technology, and anti-theft/lost child prevention service to mobile game. This paper studied the method to extend wireless coverage for complementing the short wireless transmission distance of BLE. The wireless sensor network based on CATV network is proposed for the easy construction of BLE sensor network and extended wireless coverage.

Implementation of Illegal Entry Detection System using Sensor Node and Image Processing (센서 노드와 영상처리 기법을 이용한 불법 침입 감지 시스템 구현)

  • Kim, Kyung-Jong;Jung, Se-Hoon;Sim, Chun-Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.741-744
    • /
    • 2009
  • In this paper, we design and implement an illegal entry detection system which efficiently can detect illegal intruders applying image processing technique on the perceived value of the infrared sensor and acquired image from two-way wireless camera(DRC) for prevention of damage caused by theft and the ratio of security in the security of the square such as livestock, agricultural products, and logistics warehouse. At first, the proposed system acquires the image from wireless camera when infrared sensor detect the location of illegal intruders. and then, the system process to determine movement by applying image process technique with acquired image. Finally, we send the detected and analyzed the results and the final image to security company and mobile device of owner.

  • PDF

Novel Anomaly Detection Method for Proactive Prevention from a Mobile E-finance Accident with User"s Input Pattern Analysis (모바일 디바이스에서의 전자금융사고 예방을 위한 사용자입력패턴분석 기반 이상증후 탐지 방법)

  • Seo, Ho-Jin;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.47-60
    • /
    • 2011
  • With the increase in the use of mobile banking service, mobile banking has become an attractive target to attackers. Even though many security measures are applied to the current mobile banking service, some threats such as physical theft or penetration to a mobile device from remote side are still remained as unsolved. With aiming to fill this void, we propose a novel approach to prevent e-financial incidents by analyzing mobile device user's input patterns. This approach helps us to distinguish between original user's usage and attacker's usage through analyzing personal input patterns such as input time-interval, finger pressure level on the touch screen. Our proposed method shows high accuracy, and is effective to prevent the e-finance incidents proactively.

A Safe Qperati ng Strategy for Information System of Small and Medium Enterprises (중소기업 정보시스템의 안정적 운영 전략)

  • Yeo, Sang-Soo;Hwang, Su-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.105-112
    • /
    • 2009
  • Small and medium enterprises have more dependency on their information technology than large enterprises have. but they can't pay much for information technology and information security due to financial restrictions, limited resources, and lack of know-how. So there are many vulnerabilities in small and medium enterprises and these would make many security incidents. Security managers of small and medium enterprises think that information security in their company is simply equivalent to updating the antivirus solutions. managing firewall, and patching systems regularly. However, security policies, prevention of information theft. business continuity, access controls, and many other information security issues should be considered for mitigating security incidents. In this context, we redefined security countermeasures and strategies which are only appropriate to large enterprises. for making them appropriate on a secure operating for information system of small and medium enterprises, and we investigate information security issues in the four views of information system and company, and finally we present information security strategies for each view, in this paper.

A Study on the Analysis of Fraud Crime Types according to NFT Transactions (NFT 거래에 따른 사기범죄 유형 분석에 관한 연구)

  • HyeJin Song
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.4
    • /
    • pp.908-915
    • /
    • 2023
  • Purpose: The purpose of this study is to examine the types of fraudulent crimes among various crimes taking place during NFT transactions, and to approach institutional problems caused by crime types analysis and crackdown methods and legal limitations. Method: IIn order to classify the types of fraudulent crimes that appear in NFT transactions, the crime types were analyzed through the results of previous studies and cases of current incidents. Result: Most of the crimes that are taking place through NFTs are various types of fraudulent crimes such as rug pools, thefts, personal information theft fraud, and pig murder. Therefore, these types were classified and various damage cases were also analyzed. It is a matter of copyright. Conclusion: Currently, the financial problems caused by the occurrence of fraudulent crimes in NFTs worldwide are the most worrisome, and the scale will be even greater as the market grows in the future. Therefore, in Korea, various institutional supplements and policies should be prepared through analysis of crime types that can affect crime prevention and investigation and arrest activities.

Cost-benefit Analysis of Installing Crime Preventive CCTV: Focused on Theft and Assault (범죄예방용 CCTV설치의 비용편익분석: 절도와 폭력범죄를 중심으로)

  • Yun, Woo-Suk;Lee, Chang-Hun;Shim, Hee-Sub
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.209-237
    • /
    • 2017
  • Theories on 'opportunity for crime' have utilized CCTV in crime prevention approach, and empirical studies showing crime prevention effects of CCTV have supported expansion of CCTV installation. Particularly, in Korea, the number of CCTV installation had tripled from 2011 to 2015, and governmental policies regarding CCTV have become one of the mainstream social control strategies. Although a couple of empirical studies showed decrease in crime rate due to CCTV installation, there is no study investigating B/C analysis(Benefit vs. cost analysis) of CCTV installation. B/C analysis results will be beneficial for official decision-making of criminal justice policy, and this study is purported to produce such fundamental evidence for policy making procedure. To fulfill this goal, this study collected data on financial information, crime data between 2011 and 2015 across the nation from 232 governmental district offices and the Korean National Police. This study then conducted two different B/C analyses(simple B/C analysis, regression-based B/C analysis). The simple B/C analysis results showed that 1) total costs for CCTV installation in 2014 was 68,626,000,000 won(approximately, US$57,188,333.00, money exchange rate 1200won=US$1), 2) benefits of crime reduction was 90,888,000,000 won(appx. US$75,740,000), and 3) B/C rate was 1.32. The regression-based B/C analysis results showed that 1) B/C rate was 1.52 when only reduced costs of criminal justice processes for crime employed, and 2) B/C rate was 3.62 when overall social costs including reduced costs of criminal justice processes and social benefits, e.g., reduction in costs for managing fear of crime, due to the crime reduction. Based on the results, this study provided policy implications.

  • PDF