• Title/Summary/Keyword: Technical prevention of crime

Search Result 13, Processing Time 0.047 seconds

A Study on Interdependence of Private Security and Techniques of CPTED (민간경비와 환경설계를 통한 범죄예방(CPTED) 기법의 상호의존성에 관한 연구)

  • Lee, Jung-Duk;Lim, You-Seok
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.223-249
    • /
    • 2011
  • In modern society, citizens' quality of life aspects of safety and crime prevention activities are actively considering the incidence of crime prevention in advance. It also can be quite important elicit the interest of who community members through effective crime prevention strategies. For crime prevention policies and techniques over time as more scientific and advanced methods are made. Today, A typical crime prevention strategies is private security zones and Crime Prevention Through Environmental Design (CPTED) is a corresponding to the new strategy. CPTED is a diversification can be called a crime prevention approach that emphasizes the principle of natural surveillance, access control, territoriality, activity support, maintenance and management. The defensible space of the space area related to crime prevention setting the activities of private security and CPTED determine. Also, the reality of crime prevention and protection should be considered space. The emphasis on proactive prevention of crime in modern society for the prevention of crime how to approach differing perspectives and disparate aspects of private security and CPTED. Technical and professional areas that overlap to some extent in a homogeneous aspect. Ultimately, CPTED is a crime prevention through space and environmental approach for crime. In addition, Ultimate goal of convergence, crime prevention, with the same or higher is required to study for the area after looking for the characteristics and limitations of private security and CPTED.

  • PDF

A Study on Expressing the Methods of Light for Creating Safe Space (안전한 공간 조성을 위한 빛의 표현방안 연구)

  • Kim, Myoung-Seon;Moon, Jeong-Min
    • Journal of the Korean housing association
    • /
    • v.27 no.3
    • /
    • pp.39-46
    • /
    • 2016
  • On account of the increasing crime rates annually and the consequent rising anxiety, safety has become an important topic in the aspect of environmental formation to provide decent lives to urban dwellers. As a result, great emphasis has been placed in the importance of Crime Prevention through Environmental Design (CPTED), a design method which utilizes physical environmental design to prevent crime. The definition of CPTED encompasses the technological level of crime prevention as well as comprehensive environmental design which takes into consideration fear or terror in view of human recognition and emotion. However, the current application method of CPTED in Korea is still limited to the technical supplementation of facilities, such as CCTV and streetlight, and fragmental modification like village mural paintings. Moreover, the guideline for CPTED in Korea is only a theoretical adaptation of foreign books and does not offer sufficient studies for a practical design method that will improve the life of city dwellers. The purpose of this study is to examine design methods for safe environment construction in accordance with the changing concept of CPTED by understanding the characteristic of space and analyzing the how the methods of light are expressed. This study aims to provide basic material which will serve as a guideline in creating a safe environment in the future.

Analysis of Actors' Interaction Patterns in the Formation Process of Sexual Crime Prevention Policy: Focusing on classification and case analysis (성범죄예방정책의 형성과정에서 행위자의 상호작용 패턴분석: 유형분류 및 사례분석을 중심으로)

  • Yoo, Keun-Hwan;Kim, Duck-Hwan;Suh, Kyung-Do
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.209-215
    • /
    • 2018
  • The purpose of this study is to grasp the overall policy decision system of sex crime prevention policy and analyze the interaction and pattern of actors in policy formation process. This is a useful way to identify the causes and ways to improve the policy if the sex crime prevention policy fails. As a research method, we used a model of advocacy through case analysis and language network analysis. In the external environment, low reporting of sex offenses, technical improvement and supplement for preventive management, consciousness of victims of sexual crimes, amendment of legislation, and support of the president. The conflicts between the advocacy coalition opposed the strong regulation, the prevention of recidivism, the expansion of the range of objects to be worn, the temporary effect of the system and the retrospective of the bill. As a problem-solving strategy, it was confirmed that the opposing positions of pros and cons of lack of manpower and negligence of management through the extension of the system were acutely opposed. In the context of media reports, this tendency is more likely to be understood as the concern of prevention and management at the central government level to prevent sex crimes. Therefore, although the methods of prevention of sex crimes have been insufficient in the past, it is hoped that this study will be helpful in breaking the link of negative policy vicious cycle.

Applying an IPA(Importance-Performance Analysis) Model to Comparative Study on the Elementary School Students' Parents' Crime Prevention Design Element(CPTED) Awareness for Crime Prevention (범죄예방을 위한 초등학교 학부모의 범죄예방설계(CPTED)요소 인식에 관한 비교 연구: IPA(중요도-실행도 분석)기법을 중심으로)

  • Choi, Hyun-Sick
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.209-242
    • /
    • 2014
  • This study is to understand sure the primary crime prevention has been incidence as a social problem intended for parents through the analysis of the Crime Prevention Design (CPTED) CPTED element of recognize elements that target crime prevention strategy to effectively help students be and an object of the present invention is to provide a policy suggestion haryeoneunde proposed basic data required for orientation. To achieve the study objectives such as the core framework in this study IPA: Importance-Performance Analysis) also was selected. Subjects of study in 2010 Gyeongju Elementary parents name and were 203 first research group investigating the secondary school population of the region in 2014 to nomadic parents of 297 people sampled selection. Questionnaire that use by this study applies "Important-Performance Analysis : IPA" technique that Martilla & James(1977) presented and analyzed awareness for CPTED elements of strategy for student's crime prevention to elementary school pupil students' parentse. It was the first group, 0.886, 0.920, 0.895 and 2nd group 0.880, 0.906, 0.878 that reliability of (Cronbach' s ${\alpha}$) the importance, and believability of run chart was the first group, 0.880, 0.917, 0.878 and 2nd group, 0.735, 0.840, 0.830. Analysis of the data carried out frequency analysis, reliability analysis, Frequency analysis was performed, paired sample t-Test for the reliability analysis, and the technical statistical analysis of the data is. The analysis of lattice bars execution through the IPA, the importance of the primary parents elements of CPTED strategies are generally very high, but found that the variation depending on the components that Performance. This study, an important element of the strategy to eliminate the school building for students from inside and outside the criminal fears CPTED is a mechanical surveillance in the first group, organizational surveillance, and the second group is the region intensified I'll showed mechanically and organizational factors in the investigation, and request that the investment is urgently important element is also execution low, crime prevention personnel security higher importance than expanding the front door. The analysis result of this study expects that basic data can be used in policy direction presentation that examines closely CPTED elements of strategy for crime prevention of students and applies CPTED's component effectively at elementary school hereafter.

  • PDF

A Study of Information Leakage Prevention through Certified Authentication in Phishing, Vishing, SMiShing Attacks (Phishing, Vishing, SMiShing 공격에서 공인인증을 통한 정보침해 방지 연구)

  • Park, Dea-Woo;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.171-180
    • /
    • 2007
  • The financial crime that used morale anger Phishing, Pharming, Vishing, SMiSing etc. will gain during recent cyber crimes. We are study systematically whether or not leakage of information and infringement can how easily occur to Phishing, Vishing, SMiSing using a social engineering technique and VoIP at these papers through experiment. A hacker makes Phishing, Vishing site, and test an information infringement process of a user through PiSing mail and a virus, a nasty code, Vishing, a SMiSing character, disarmament of Keylogger prevention S/W etc. as establish server. Information by Phishing, Vishing, SMiSing is infringed with leakage in the experiment results, and confirm, and test certified certificate and White List and a certified authentication mark, plug-in program installation etc. to prevention, and security becomes, and demonstrate. Technical experiment and prevention regarding Phishing of this paper and Vishing attack reduce the damage of information infringement, and be education for Ubiquitous information security will contribute in technical development.

  • PDF

Comparative study on characteristics of domestic and foreign civil anti-disaster organizations (국내외 민간 방재조직의 특성에 관한 비교 분석)

  • Kim, Bo-Kyun;Lee, Jeong-Hyeok;Chae, Jong-Sik
    • The Korean Journal of Emergency Medical Services
    • /
    • v.25 no.3
    • /
    • pp.127-143
    • /
    • 2021
  • Purpose: The purpose of the study is to investigate the actual state of activity on domestic and foreign civil anti-disaster organizations, related suggestions, and development plans. Methods: This study used the documentary survey research method and the technical approach method. Civil anti-disaster organizations' information was derived from detailed scholarly monographs, specialty publications, and previous studies of master doctorate dissertation. Results: Volunteer Fire Department and voluntary crime prevention groups show problems related to budgetary deficits and volunteer deficiency. In order to resolve these issues, laws must be enacted to guarantee interest and support. In addition, the Citizen Corps Active in Disaster (CAIND) organization requires a dedicated salary system to address the investment of its workforce and the cost of heavy equipment. Moreover, deficiencies were revealed regarding the lack of systems in support of occupational education and training. In conclusion, several weak points require close attention. Conclusion: The results of this comparative analysis study about the domestic and foreign civil anti-disaster organizations provide insight into identity materialization and concept establishment.

A Study on the Estimation of CCTV Monitor Size for School Crime Prevention (학교범죄예방을 위한 CCTV 모니터 크기 산정에 관한 연구)

  • Park, Sung-chul;Cho, Jin-il;Jung, Tae-hwan
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.14 no.2
    • /
    • pp.37-44
    • /
    • 2015
  • The purpose of this study is to propose the calculation model of CCTV monitor size for school. Literature review analyzed the concept and technical characteristics of CCTV system including equation of object size calculation. Case study showed that the sizes of CCTV monitors installed in the security offices of the six object schools were 19 inches on average. And the numbers of monitor screen partitions were at least 12 on average. Due to too many partitions in small monitors of approximately 19 inches, the faces of the objects of filming in each screen could not be properly identified. Experimental test presented that the vertical length of face image clearly recognized on the screen is at least 20mm. Based on the result, this paper developed the equation for calculating monitor size. Pilot test said that 27inch Monitor is needed for 4 screens. The practitioners of school districts and schools can make appropriate CCTV system environments considering the their own CCTV system conditions.

Operation Status of Chinese Security Service Industry and Institutional Settlement Methods (중국 보안서비스산업의 운영실태 및 제도정착 방안)

  • Lee, Sangchul
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.4
    • /
    • pp.536-547
    • /
    • 2014
  • With the changing safety services and social order systems accompanied by the economic development and changing public security environment since the Chinese economic reform, the security service industry in China is growing daily and related problems are increasing. For the Chinese security service market to be activated, the monopoly of security services by the public security agencies must be removed. In addition, the research and development, expansion, and applications of safety and crime prevention technologies regarding the safety and protection of exhibition, sales, culture, sports, commerce activities, combinations of safety technologies and crime prevention processes, the provision of relevant technical operations, and the expansion of security service areas are required. Furthermore, the administration rights, property rights, and business management rights of security companies must be separated, the security headquarters must be integrated and coordinated for optimization of various resources solely by market needs, and their rights and affiliation relations must be clear. Besides, the competitiveness of security companies in the security service market must be enhanced by unifying the business management, and optimizing and sharing their resources. The security service ordinances of China that have been implemented now must be applied realistically, methods to activate the true market economy for security services must be researched, and various ordinances related to security services must be realigned in line with the characteristics of security services. Finally, for the mutual cooperation system between public and private security services, the public security agencies must acknowledge the importance of private security services and the status of security service providers in crime prevention and social order maintenance. They must establish partnership relations with each other beyond the unilateral direction and management system for security services and drive with positive attitudes the security service industry which is still in its infancy.

A Study on a scheme for more efficient crime prevention in the railway industry (철도산업 치안제도의 효율화 방안에 관한 연구)

  • Do, Jeong-Seog
    • Proceedings of the KSR Conference
    • /
    • 2005.11a
    • /
    • pp.558-568
    • /
    • 2005
  • There are two kinds of police authorities in Korea. One is the Special Judicial Police, under the authority of the Ministry of Construction and Transportation, charged with maintenance of public order on trains, in stations and other places of business operated by the Korea Railway Corporation. The other is the Local Subway Police, belonging to the Local Police Agencies, whose jurisdiction covers trains, station and other areas managed and operated by local governments. The existence of two separate entities for common objective of railway security has given rise to problems including inefficiency in performance and lack of technical knowledge and synergic effects. This study looks at the need for resolving those problems by restructuring and expanding the Special Judicial Police to bring railway security under a single authority and an integrated railway security systems operation.

  • PDF

Adaptive Convergence Security Policy and Management Technology of Home Network (홈 네트워크에서의 적응적 통합 보안 정책 및 관리 기술)

  • Lee, Sang-Joon;Kim, Yi-Kang;Ryu, Seung-Wan;Park, You-Jin;Cho, Choong-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.72-81
    • /
    • 2011
  • In this paper, we propose adaptive convergence security policies and management technologies to improve security assurance in the home networking environment. Many security issues may arise in the home networking environment. Examples of such security issues include the user privacy, the service security, the integrated networking security, the middleware security and the device failure. All these security issues, however, should be fulfilled in phase due to many difficulties including deployment cost and technical complexity. For instance, fundamental security requirements such as authentication, access control and prevention of crime and disaster should be addressed first. Then, supplementary security policies and diverse security management technologies should be fulfilled. In this paper, we classify these requirements into three categories, a service authentication, a user authentication and a device authentication, and propose security policies and management technologies for each requirement. Since the home gateway is responsible for interconnection of many home devices and external network access, a variety of context information could be collected from such devices.