• Title/Summary/Keyword: 기술적 범죄예방

Search Result 102, Processing Time 0.026 seconds

The Authentication System using Facial Recognition Technology (얼굴 인식 기술을 활용한 인증 시스템)

  • Lee, Yongwhan;Kang, Changhoon;Shin, Jinseob
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.295-296
    • /
    • 2013
  • 본 논문에서는 얼굴인식기술을 활용한 인증처리 기법으로 범죄에 악용되고 있는 ATM 기기와 같은 자동화 기기들의 사용을 정상적인 얼굴 촬영이 가능하게 얼굴을 들어내어 보여주는 사람만 사용이 가능한 방법을 제안한다. 범죄자나 수배자의 경우 얼굴을 데이터베이스에 등록하여 카메라로 인식된 얼굴과 비교를 통하여 찾아내는 것으로 얼굴인식이 활용되며 ATM 기기와 같은 자동화기기의 사용자가 정상적인 사용자인지 아닌지를 판별하는 방법은 정확하게 얼굴을 인식할 수 있도록 들어내었는지 여부에 따라서 판별이 가능하다. 따라서 본 연구에서는 기존의 데이터베이스를 활용하는 방법 외에 정상과 비정상을 판별하는 기술을 제공하며 조명과 환경에 따라 변하는 인식률의 제고를 위하여 개선된 알고리즘을 제안하였으며 이를 검증하였다.

  • PDF

A Study on the Problems in the Use of CCTV by the Police and Some Proposals (경찰CCTV 운용상의 문제점과 개선방안)

  • Lee, Sang-Won;Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.215-242
    • /
    • 2005
  • As CCTV can be an effective tool to prevent or suppress crime at low cost, they have been widesoread in developed countries. In spite of their effectiveness, they infringe some constitutional rights such as the right to privacy, the right of likeness and the right to control over personal information. The police and ward offices install CCTV in public areas to prevent crimes without a legal basis or standard. When information obtained in such a way is used as investigation data for the police or as an evidence in a court, it can cause serious trouble. To solve this problem, legal restriction on the installation of CCTV as should be clearer. Since current laws on public agencies' protection of personal information are too general, they are not effective enough to protect personal information. Therefore, Personal Information Protection Organic Act should be enacted to make a legal basis for protecting comprehensive personal information. It should be obvious who installs CCTVs, who pay for the cost and how they are managed. Before installation, the police and ward offices should obtain residents' consent through a public hearing or voting (on the range and purpose of installation), or conduct an impact assessment. During installation, CCTVs should be limited to prevent or suppress crimes, keep public order and void dangers. In case of making a sign of installation, it must specify its rights. After installation(operation/management phase), they should abide by principles of information protection and try not to infringe constitutional right. In the cognitive aspect, the police should constitutional rights must be secured although it is important to carry out their missions. The police should serve citizens and change to the police of communities. Citizens should understand that constitutional right can be infringed if public order is not maintained. When citizens cooperate with the police, they fear of crimes will decrease.

  • PDF

Base Location Prediction Algorithm of Serial Crimes based on the Spatio-Temporal Analysis (시공간 분석 기반 연쇄 범죄 거점 위치 예측 알고리즘)

  • Hong, Dong-Suk;Kim, Joung-Joon;Kang, Hong-Koo;Lee, Ki-Young;Seo, Jong-Soo;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.2
    • /
    • pp.63-79
    • /
    • 2008
  • With the recent development of advanced GIS and complex spatial analysis technologies, the more sophisticated technologies are being required to support the advanced knowledge for solving geographical or spatial problems in various decision support systems. In addition, necessity for research on scientific crime investigation and forensic science is increasing particularly at law enforcement agencies and investigation institutions for efficient investigation and the prevention of crimes. There are active researches on geographic profiling to predict the base location such as criminals' residence by analyzing the spatial patterns of serial crimes. However, as previous researches on geographic profiling use simply statistical methods for spatial pattern analysis and do not apply a variety of spatial and temporal analysis technologies on serial crimes, they have the low prediction accuracy. Therefore, this paper identifies the typology the spatio-temporal patterns of serial crimes according to spatial distribution of crime sites and temporal distribution on occurrence of crimes and proposes STA-BLP(Spatio-Temporal Analysis based Base Location Prediction) algorithm which predicts the base location of serial crimes more accurately based on the patterns. STA-BLP improves the prediction accuracy by considering of the anisotropic pattern of serial crimes committed by criminals who prefer specific directions on a crime trip and the learning effect of criminals through repeated movement along the same route. In addition, it can predict base location more accurately in the serial crimes from multiple bases with the local prediction for some crime sites included in a cluster and the global prediction for all crime sites. Through a variety of experiments, we proved the superiority of the STA-BLP by comparing it with previous algorithms in terms of prediction accuracy.

  • PDF

Image Analysis Based on a Distributed Server Environment (분산 환경 기반 영상 분석 서버)

  • Im, Il-Myeong;Shin, Hwa-Seon;Song, Hyok;Choi, Byeon-Ho
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.07a
    • /
    • pp.63-65
    • /
    • 2012
  • 최근 치안 관련 강력 범죄 발생이 사회 이슈화가 많이 된다. 이에 대한 해결책으로 CCTV가 기하급수적으로 보급, 설치되고 있다. 하지만 현재의 CCTV 기술은 단순 녹화의 수준에서 머물고 있기에 범죄 발생 사후에나 사용되고 있는 실정이다. 영상보안 분야에서 현재 진행되고 있는 지능형 영상 분석 기술은 영상 감시, 분석을 인력으로 사용하는 방식에서 벗어서 실시간으로 시스템에서 상황판단을 하여 경보하여 줌으로써 범죄의 예방 및 조속한 해결을 가능하도록 발전하고 있다. 본 논문은 지능형 영상 분석 시스템을 구성하는데 있어서 영상 분석 기술의 인터페이스를 공통화를 적용, 모듈화 함으로써 각각의 감시사이트에 적용 가능한 최적의 비전 기술 모듈만을 시스템 관리자에 선택에 따라 해당 시스템에 적용할 수 있도록 하였다. 또한 각 비전 모듈을 개별 프로세스로 동작하게 하고 모듈간의 통신을 네트워크화 함으로써 분산 환경으로 동작할 수 있도록 개발하였다.

  • PDF

A Study on the Problems of Procedural Law Against Cyber Crimes in Korea - On the Trend of Procedural Law Against Cyber Crimes of U.S - (우리 사이버범죄 대응 절차의 문제점에 관한 연구 - 미국의 사이버범죄대응절차법을 중심으로 -)

  • Lim Byoung-Rak;Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.231-241
    • /
    • 2006
  • When current cyber attacks to information and communication facilities are examined, technologies such as chase evasion technology and defense deviation technology have been rapidly advanced and many weak systems worldwide are often used as passages. And when newly-developed cyber attack instruments are examined, technologies for prefect crimes such as weakness attack, chase evasion and evidence destruction have been developed and distributed in packages. Therefore, there is a limit to simple prevention technology and according to cases, special procedures such as real-time chase are required to overcome cyber crimes. Further, cyber crimes beyond national boundaries require to be treated in international cooperation and relevant procedural arrangements through which the world can fight against them together. However, in current laws, there are only regulations such as substantial laws including simple regulations on Punishment against violation. In procedure, they are treated based on the same procedure as that of general criminal cases which are offline crimes. In respect to international cooperation system, international criminal private law cooperation is applied based on general criminals, which brings many problems. Therefore, this study speculates the procedural law on cyber crimes and presents actual problems of our country and its countermeasures.

  • PDF

Research on the U-Safety for U-City Development in Korea (유시티 발전을 위한 U-safety에 관한 연구)

  • Hwang, Nin-Ho;Kwon, Chang-Hee
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.341-347
    • /
    • 2007
  • 본 연구는 현재와 미래의 유비커터스 도시생활에 있어서 범죄를 줄이고 철저한 대비를 하기 위하여 각종 범죄에 관한 예방 및 실제상황 정보를 체계적으로 수집 및 분석하고 이를 활용 할 수 있는 U-Safety시스템이 요구되고 있다. 안전한 삶을 위협하는 다양한 요인들에 유비쿼터스 기술을 이용하여 W-safety를 구현해 보고자 몇 가지 방법들을 사례를 통해 고찰하였다.

  • PDF

A Probability Modeling of the Crime Occurrence and Risk Probability Map Generation based on the Urban Spatial Information (도시공간정보 기반의 범죄발생 확률 모형 및 위험도 확률지도 생성)

  • Kim, Dong-Hyun;Park, Koo-Rack
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.207-215
    • /
    • 2009
  • Recently, the research of the analysis of the crime spatial is increased by using the computer information technology and GIS (Geometric Information System) in order to prevent the urban crime so as to increase the urbanization rate. In this paper, a probability map formed by the raster is organized by the quantification of crime risk per the cell using the region property of the urban spatial information in the static environment. Also, a map of the risk probability is constructed based on the relative risk by the region property, the relative risk by the facility, the relative risk by the woody plant and the river, and so on. And, this integrated risk probability map is calculated by averaging the individual cell risk applied to the climatic influence and the seasonal factor. And, a probability map of the overall risk is generated by the interpretation key of the crime occurrence relative risk index, and so, this information is applied to the probability map quantifying the occurrence crime pattern. And so, in this paper, a methodology of the modeling and the simulation that this crime risk probability map is modified according to the passage of time are proposed.

Prevention Methods for the Leakage and Crime of Industrial Technique in South Korea: Focused on the CPTED (한국 산업기술 유출 및 범죄 방지 방안: 환경설계를 통한 범죄예방을 중심으로)

  • Lee, Tae-Young;Sung, Yong-Eun
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.151-160
    • /
    • 2015
  • According to the document from the National Industrial Security Center in 2015, from 2003 to 2014 the disclosure number of industrial spy in South Korea was 438, and the damages due to the industrial technology leakages amounted 50 trillion won annually. Because the industrial technology leakage exercises great influence on the enterprises and the country. countermeasures against industrial technology leakages should be established. Therefore, the purpose of this research is to suggest measures preventing industrial technology leakages and related crimes in enterprises by applying the Crime Prevention Through Environmental Design(CPTED) technique. This research analyzed the recent technology leakage cases and used an analysis of literature research. From the result of this research, we suggested 1) Access Control, 2) Surveillance Enhancement, 3) Territoriality of Reinforcement, and 4) Activity Support by applying the CPTED technique for preventing industrial technology leakages. The limitations of this research and the recommendations for future research were discussed at the last part of this research.

A Study on the Utilization of Private Security for Park Safety (공원안전관리를 위한 민간경비 활용방안 연구)

  • Kang, Yong-Gil
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.7-32
    • /
    • 2013
  • The idea of this study was derived from awareness of local governments and police's limitation on attempts to 'creating safe park'. The purpose of this study is to examine current political measures of preventing various types of possible crimes in the park and the limitation of those policies. Furthermore, this study aims to suggest possible explanations to utilize Private Security Sector for the effective and continuous way of managing park safety by considering legal and practical solutions and its expectations. The methods of analysis used in this study are, first, literature review of current park safety management policies. Second, this article examined implications of strategies of those policies throughout the case study of the USA's park safety policy. Third, this study suggested plans of action and role of Private Security Sector to improve park safety. The results present several arguments for the park safety. First, legislation of mandatory crime preventing programme in the early stages of designing park is required. Introducing the 'park special judicial police system' to the major parks for a immediate response to the crime can be one of suggestions. Moreover, proactive police response systems, such as one of the Seoul Metropolitan Police's policies- 'returning safe parks to a citizen' are required. Second, the case study of the USA regarding park safety confirmed that major parks in the USA have rigorous and detailed park regulations. It also showed that those parks take not only preventing measures, but also follow-up measures against crimes. Third, the results suggest creating human resources by contracting out Park Managers and Private Security Sector that have specialized experiences and techniques to prevent crimes and public disorders. Overall in this study, increased citizen's satisfaction level, control of continuous and systematic crimes, the spread of joint-production of public safety, and increased fields of the Private Security Sector are expected from the findings.

  • PDF

The Necessity of Intelligent CPTED and ICT Fusion Technology -Focused on pilot project of Seongjeong-Dong in Cheonan city (지능형 CPTED 사업의 필요성과 ICT 융합 기술 -천안시 성정동 시범 사업을 중심으로-)

  • Kim, Sung-Gil;Yoon, Shin-Sook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.2
    • /
    • pp.353-360
    • /
    • 2017
  • Since the environmental redesign project for crime prevention was first implemented in Bucheon City in 2005, the same projects have been actively planned or progressed not only in the metropolitan area but also in local governments across the country. While the same overseas business has achieved remarkable results, domestic business has not achieved quantitative results. In this study, we analyzed the environmental redesign project for crime prevention in Seogjeong-Dong. In the field of electronic communication exclusion, in the course of business, it was possible to analyze the problems that the costs were increased and the business performance was difficult to be derived due to the inconvenience of the residents due to the inexperience of the business owners and the inefficiency of the facilities.