• Title/Summary/Keyword: crime data

Search Result 386, Processing Time 0.027 seconds

An Analysis on the Spatial Pattern of Local Safety Level Index Using Spatial Autocorrelation - Focused on Basic Local Governments, Korea (공간적 자기상관을 활용한 지역안전지수의 공간패턴 분석 - 기초지방자치단체를 중심으로)

  • Yi, Mi Sook;Yeo, Kwan Hyun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.1
    • /
    • pp.29-40
    • /
    • 2021
  • Risk factors that threaten public safety such as crime, fire, and traffic accidents have spatial characteristics. Since each region has different dangerous environments, it is necessary to analyze the spatial pattern of risk factors for each sector such as traffic accident, fire, crime, and living safety. The purpose of this study is to analyze the spatial distribution pattern of local safety level index, which act as an index that rates the safety level of each sector (traffic accident, fire, crime, living safety, suicide, and infectious disease) for basic local governments across the nation. The following analysis tools were used to analyze the spatial autocorrelation of local safety level index : Global Moran's I, Local Moran's I, and Getis-Ord's G⁎i. The result of the analysis shows that the distribution of safety level on traffic accidents, fire, and suicide tends to be more clustered spatially compared to the safety level on crime, living safety, and infectious disease. As a result of analyzing significant spatial correlations between different regions, it was found that the Seoul metropolitan areas are relatively safe compared to other cities based on the integrated index of local safety. In addition, hot spot analysis using statistical values from Getis-Ord's G⁎i derived three hot spots(Samchuck, Cheongsong-gun, and Gimje) in which safety-vulnerable areas are clustered and 15 cold spots which are clusters of areas with high safety levels. These research findings can be used as basic data when the government is making policies to improve the safety level by identifying the spatial distribution and the spatial pattern in areas with vulnerable safety levels.

The Dynamics of Film Genre Box Office Success: Macro-Economic Conditions, Fashion Momentum, and Inter-Genre Competition (영화 장르 흥행의 동학: 거시경제, 유행의 동력, 장르 간 경쟁의 효과)

  • Dong-Il Jung;Yeseul Kim;Chaewon Ahn;Youngmin Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.389-397
    • /
    • 2023
  • This study examines how macro-economic conditions, fashion momentum, and inter-genre competition affect movie genre's popularity, thus shaping fashion trends in the feature film market in Korea. Using panel data analysis of genre-specific audience sizes with 6 genre cateories and 132 monthly time points, we found that favorable economic conditions generate the fashion trend in the action/crime genre, while the deterioration of the economic conditions leads to the decline of action/crime genre. The finding implies that economic situations influence cultural consumers' psychological states, which in turn shape the fashion trend in certain direction. Furthermore, we found that the action/crime genre has a greater fashion momentum and its competitive power is stronger than other genres, suggesting that this genre has longer fashion cycle even if other genres rise to the top in their popularity. We argue that such enlengthened fahion cycle and competitive stength of the action/crime genre are associated with its breadth of niche width and audience loyalty. Scholarly and practical implications are discussed.

Exploring the Nature of Cybercrime and Countermeasures: Focusing on Copyright Infringement, Gambling, and Pornography Crimes (사이버 범죄의 특성과 대응방안 연구: 저작권 침해, 도박, 음란물 범죄를 중심으로)

  • Ilwoong Kang;Jaehui Kim;So-Hyun Lee;Hee-Woong Kim
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.69-94
    • /
    • 2024
  • With the development of cyberspace and its increasing interaction with our daily lives, cybercrime has been steadily increasing in recent years and has become more prominent as a serious social problem. Notably, the "four major malicious cybercrimes" - cyber fraud, cyber financial crime, cyber sexual violence, and cyber gambling - have drawn significant attention. In order to minimize the damage of cybercrime, it's crucial to delve into the specifics of each crime and develop targeted prevention and intervention strategies. Yet, most existing research relies on indirect data sources like statistics, victim testimonials, and public opinion. This study seeks to uncover the characteristics and factors of cybercrime by directly interviewing suspects involved in 'copyright infringement', 'gambling' related to illicit online content, and 'pornography crime'. Through coding analysis and text mining, the study aims to offer a more in-depth understanding of cybercrime dynamics. Furthermore, by suggesting preventative and remedial measures, the research aims to equip policymakers with vital information to reduce the repercussions of this escalating digital threat.

A Comparative Study of the Security Prevention Strategies on Arson: Focused on the Behavioral Characteristics between Serial Arsonists and Simple Arsonists (방화범죄의 경비예방 전략에 관한 비교연구 - 연쇄방화범과 단순방화범의 행위적 특성을 중심으로 -)

  • You, Wan-Seok;Hwang, Sung-Hyun
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.139-162
    • /
    • 2011
  • The purpose of this study is to compare with the general and behavioral characteristics between simple and serial arsonists using the data derived from Scientific Crime Analysis System, Criminal Filing Search System, and Crime Information Management System. The analysis and findings reported here are derived from data extracted from 160 arsonists arrested by police officer. The independent variables included such socio-economic characteristic as arsonists' gender, age, occupation, education level, and previous criminal records of arsonists, and finally the general characteristics of the scene of fire settings. The dependent variable is whether or not serial fire setter. To achieve the purpose, the analysis of frequencies and cross-tab were conducted. According to frequence and cross-tab analysis, there are great differences of the general and behavior characteristics between two groups. In the comparison of simple and serial arsonists, serial arsonists are more likely to have previous criminal records, low socio-economic status, unmarried and no cohabitants than simple arsonists. furthermore, serial arsonists are more likely to use garbage papers for fire setting in the scene of the crime, to have mental or psychological problems, and to get involved in fire setting for the psychological pleasure than simple arsonists do. The present research has some obvious limitations. First, the analysis is based only on arsonists arrested by police officers. These may be considerable differences in arsonists arrested by police officers and fire setters not arrested by them. Additional research is needed to assess the extent to which these findings would apply to fire setters not arrested by police officer in Korea. Secondly, the data in this study are cross-sectional and simple cross-tab analysis are used. Potential limitation of cross-sectional data concerns the inability to specify the changes in measures as arsonists behavioral characteristics. Therefore, further studies need to use longitudinal data and more complicate statistical techniques such as correlation analysis, multiple regression analysis, or LISREL models to specify the casual relationships between dependent and independent variables for fire settings. Even if this study has some limitations, it is meaningful in which it first investigated the comparison of simple and serial arsonists focusing on the general and behavioral characteristics between two groups in Korea.

  • PDF

Study of Prevention System against Second-Convictions of Sexual Violence Offenders by Using Smart Electronic Monitoring Anklet

  • Oh, Sei-Youen;Lee, Aeri
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.8 no.2
    • /
    • pp.69-77
    • /
    • 2018
  • The study, recognizing the seriousness of such second-convictions of sexual violence offenders and supplementing the problems noticed from an integral electronic monitoring anklet, which only offers simple location information, would like to propose a Prevention System against Second-Convictions of Sexual Violence Offenders by using Smart Electronic Monitoring Anklet. Proposed System is anticipated to be able to prevent second-convictions of sexual violence offenders as the data of offenders from Smart Electronic Monitoring Anklet with various sensors and the data from Integrated DB of Judicial Authorities is comparatively analyzed, allowing anticipative actions at each stage based on the analyzed data regarding sexual violence.

A case study to standardize odor metadata obtained from coffee aroma based on E-nose using ISO/IEC 23005 (MPEG-V) for olfactory-enhanced multimedia

  • Choi, Jang-Sik;Byun, Hyung-Gi
    • Journal of Sensor Science and Technology
    • /
    • v.30 no.4
    • /
    • pp.204-209
    • /
    • 2021
  • Immersive multimedia comprising metadata for five senses can provide user experience by stimulating memory and sensation. In the case of olfactory-enhanced multimedia, a computer-generated smell is combined with additional media content to create a richer and/or more realistic experience for the user. Although several studies have been conducted on olfactory-enhanced multimedia using e-nose and olfactory display, their practical applications have been severely restricted owing to the absence of a related standard. This paper proposes a method to standardize odor metadata obtained from an e-nose system, which has been particularly used to acquire data from different coffee aromas. Subsequently, the data were transferred to an odor display applicable for olfactory-enhanced multimedia using the ISO/IEC 23005 (MPEG-V) data template.

Countermeasure strategy for the international crime and terrorism by use of SNA and Big data analysis (소셜네트워크분석(SNA)과 빅데이터 분석을 통한 국제범죄와 테러리즘 대응전략)

  • Chung, Tae Jin
    • Convergence Security Journal
    • /
    • v.16 no.2
    • /
    • pp.25-34
    • /
    • 2016
  • This study aims to prevent the serious threat from dangerous person or group by responding or blocking or separating illegal activities by use of SNA: Social Network Analysis. SNA enables to identify the complex social relation of suspect and individuals in order to enhance the effectiveness and efficiency of investigation. SNS has rapidly developed and expanded without restriction of physical distance and geo-location for making new relation among people and sharing large amount of information. As rise of SNS(facebook and twitter) related crimes, terrorist group 'ISIS' has used their website for promotion of their activity and recruitment. The use of SNS costs relatively lower than other methods to achieve their goals so it has been widely used by terrorist groups. Since it has a significant ripple effect, it is imperative to stop their activity. Therefore, this study precisely describes criminal and terrorist activities on SNS and demonstrates how effectively detect, block and respond against their activities. Further study is also suggested.

A Study of Network Forensics related to Internet Criminal at UCC (UCC와 관련된 인터넷 범죄에 대한 네트워크 포렌식 연구)

  • Lee, Gyu-An;Park, Dea-Woo;Shin, Young-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.143-151
    • /
    • 2008
  • 74% of Internet users use the UCC, and You Tube using firearms in a crime occurred. Internet crime occurred in the online, non-face transaction, anonymous, encapsulation. In this paper, we are studied a Network Forensic Way and a technique analyze an aspect criminal the Internet haying appeared at Internet UCC, and to chase. Study ID, IP back-tracking and position chase through corroborative facts collections of the UCC which used UCC search way study of the police and a public prosecutor and storage way and network forensic related to crimes of Internet UCC. Proof data encrypt, and store, and study through approach control and user authentication so that they are adopted to legal proof data through integrity verification after transmission and storages. This research via the Internet and criminal conspiracy to block the advance promotion, and for the criminal investigative agencies of the Internet will contribute to the advancement forensics research.

  • PDF

Analysis of Violent Crime Count Data Based on Bivariate Conditional Auto-Regressive Model (이변량 조건부자기회귀모형을이용한강력범죄자료분석)

  • Choi, Jung-Soon;Park, Man-Sik;Won, Yu-Bok;Kim, Hag-Yeol;Heo, Tae-Young
    • Communications for Statistical Applications and Methods
    • /
    • v.17 no.3
    • /
    • pp.413-421
    • /
    • 2010
  • In this study, we considered bivariate conditional auto-regressive model taking into account spatial association as well as correlation between the two dependent variables, which are the counts of murder and burglary. We conducted likelihood ratio test for checking over-dispersion issues prior to applying spatial poisson models. For the real application, we used the annual counts of violent crimes at 25 districts of Seoul in 2007. The statistical results are visually illustrated by geographical information system.

A Study on Mobile Forensic Extraction Methods of Cellular and Smart Phone (휴대폰과 스마트폰의 모바일 포렌식 추출방법 연구)

  • Yi, Jeong Hoon;Park, Dea Woo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.79-89
    • /
    • 2010
  • Cellular and Smart phone through the business and real life is associated with an increasing number of information processing, Breaches associated with mobile terminal Tile has occurred and cause Crime and damage. In this paper, Cellular and Smart phone for mobile forensics SYN scheme and JTAG scheme to target Cellular and Smart phone for the extraction of forensic data will be studied. SYN, JTAG approach to forensic analysis indicate with the process, Every Smart phone's OS specific performance and data extraction were compared. In the laboratory, Cell and smart phone with the SYN scheme and JTAG scheme to extract forensic data Improvement compared to the extraction is presented.