• Title/Summary/Keyword: crime data

Search Result 386, Processing Time 0.025 seconds

Grounded Theoretical Approach to the Co-offending Implementation Process of Robbery and Burglary Crime (강·절도범죄의 공범실행 과정에 대한 근거 이론적 접근)

  • Kim, Jae Kyeong;Lee, Sun Beom
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.609-620
    • /
    • 2019
  • The purpose of this study is to examine the co-offending implementation process of robbery and burglary crime. To this end, interview data for research projects conducted by the Korea Institute of Criminology in 2013(Advancing Knowledge About Co-Offending - Burglary and Robbery in Korea) were used as secondary data. Using secondary data, we attempted a grounded theory approach. Based on the procedure presented by Strauss&Corbin (1990), the open coding stage was derived from 51 concepts, 22 subcategories and 8 upper categories. According to an analysis tool called "coding paradigm," the causal condition is the cause of the robbery and burglary crime. Contextual conditions are the formation of co-offending relationship and the reason for selecting co-offending. The central phenomenon is the co-offending implementation of robbery and burglary crime. Interventing conditions are conflict between co-offenders and occurrence of arrest factor. The action/interaction strategy is arrested all co-offenders. The consequence consisted of ending the co-offending relationship. Finally, the selective coding stage selected 'the development of conflict between formation and end of co-offending relationship' as the core category, and newly established the co-offending relationship of robbery and burglary crime through the process of 'formation-implementation-conflict-arrest-end'.

A study on Introducing Intelligent Electronic Monitoring System through the Analysis of the Electronic Supervision (전자감독제도의 실태분석을 통한 지능형 전자발찌 도입 방안)

  • Cha, Minkyu;Kim, Donghee;Kim, Taehwan;Kwak, Daekyung
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.3
    • /
    • pp.374-387
    • /
    • 2014
  • Since the sexual violence crime has a high probability of repeated crime, the electronic monitoring system has been introduced as a measure to it. And this system allows the police to know the location of former criminal around the clock through the electronic device, the former criminal has the psychological/mental oppression which can restrain the intention of crime to a degree. However, there is a limit in blocking criminals with strong will from repeated crime. The next-generation intelligent electronic anklet currently under study collects and analyzes the change bio-data in real time through the location information of electronic monitoring target and attached sensor. This study is aimed to predict the symptom of crime occurrence in advance based on this and block the crime intention in advance or stop the ongoing crime before it is expanded.

Analysis of Relation Between Criminal Types and Spatial Characteristics in Urban Areas (도심지역의 범죄 종류와 공간적 특성 관계분석)

  • Cha, Gyeong Hyeon;Kim, Kyung Ho;Son, Ki Jun;Kim, Sang Ji;Lee, Dong Chang;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.1
    • /
    • pp.6-11
    • /
    • 2015
  • In this paper, we analyzed current states and spatial characteristics of crime occurring in A city of Colombia using big data of crime. The analysis draws on the crime statistics of Colombia National Police Agency from 2013 January to September. We also investigated spatial autocorrelation of crime using global and local Moran's Index. Spatial autocorrelation analysis shows significant spatial autocorrelation in the high frequency of crime. Global Moran's I analysis indicates that there are statistically significant value of crime area. Using local Moran's Index analysis, we also implement Local Indicators of Spatial Association(LISA) map and hot spot analysis helps us identify crime distribution.

A Qualitative Study on the Process of Juveniles' Steeping in Cyber Crime : Focused on Internet Fraud (청소년이 사이버범죄에 빠지는 과정 - 인터넷사기 중심으로 -)

  • Choi, Ok-Chai
    • Korean Journal of Social Welfare
    • /
    • v.56 no.4
    • /
    • pp.103-122
    • /
    • 2004
  • This study is aimed to examine the process of juveniles' steeping in cyber crime for finding out data which could be applied to prevent juveniles' cyber crime and to rehabilitate the juveniles related in cyber crime. Also, this study is designed focusing on the Grounded Theory method, and 5 probationees connected with internet fraud have been interviewed as participants for this study. For the juveniles who had been steeped in cyber crime, some findings according to the analysed data have been emerged in the context of social work intervention. First, interventions need to be focused on the improvement of social environment and juveniles' crooked thoughts to prevent juvenile's Internet fraud and to rehabilitate juveniles related with Internet fraud. Second, workers need to guide the juveniles who have been indecisive on the another crime into regretting their guilty attitude in depth. Third, the prevention of juveniles' Internet fraud needs to be conducted on the level of social movement, and social work practice centers need to grope concrete programs networked with correctional authorities for the social movement.

  • PDF

The Impact of Information System Control and Audit on the Perceived Risk of the Computer Crime in Case of Financial Institutions (정보시스템통제 및 감사가 컴퓨터범죄의 인지된 위험에 미치는 영향: 금융기관을 중심으로)

  • Han, In-Gu;Yun, Jong-Ho
    • Asia pacific journal of information systems
    • /
    • v.5 no.1
    • /
    • pp.112-128
    • /
    • 1995
  • The information system control includes organizational structure, control mechanism, and management tools which contribute to accomplish the goals of information system: asset safeguarding, data integrity, effectiveness, and efficiency. Information system audit is the process to evaluate whether the information system accomplishs the goals. Information system auditor examine the reliability of information system control and suggest recommendations to improve the information system control. Both information system control and information system audit activities contribute to prevent and detect the computer crime for the organization. This paper proposes a causal model of information system control/audit and the perceived risk of computer crime, and tests the model using a survey on 38 financial institutions in Korea. Statistical results show that information system control and audit significantly reduce the computer crime risk perceived by the user group. The general control has a stronger impact than the application control. In addition, it turns out that the greater the deviation between the importance and the actual level of information system control is, the higher the perceived risk of computer crime is.

  • PDF

New Security Approaches for SSL/TLS Attacks Resistance in Practice (SSL/TLS 공격에 대한 신규 대응 방안)

  • Phuc, Tran Song Dat;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.169-185
    • /
    • 2017
  • Juliano Rizzo and Thai Duong, the authors of the BEAST attack [11, 12] on SSL, have proposed a new attack named CRIME [13] which is Compression Ratio Info-leak Made Easy. The CRIME exploits how data compression and encryption interact to discover secret information about the underlying encrypted data. Repeating this method allows an attacker to eventually decrypt the data and recover HTTP session cookies. This security weakness targets in SPDY and SSL/TLS compression. The attack becomes effective because the attacker is enable to choose different input data and observe the length of the encrypted data that comes out. Since Transport Layer Security (TLS) ensures integrity of data transmitted between two parties (server and client) and provides strong authentication for both parties, in the last few years, it has a wide range of attacks on SSL/TLS which have exploited various features in the TLS mechanism. In this paper, we will discuss about the CRIME and other versions of SSL/TLS attacks along with countermeasures, implementations. We also present direction for SSL/TLS attacks resistance in practice.

Environmental Planning Research of Apartment Complex for Diminish the Fear of Crime - Focused on Apartment Estates Built After 2006 in Daejeon Korea - (거주민의 범죄불안심리 감소를 위한 안전한 아파트 단지 환경계획 연구 - 2006년 이후 지어진 대전지역 아파트단지를 중심으로-)

  • Chin, Kyung-Il;Song, Hyeung-Joo;Lim, Hye-Jin;Park, Jong-Ki
    • KIEAE Journal
    • /
    • v.14 no.3
    • /
    • pp.133-138
    • /
    • 2014
  • Crimes occurring in residential areas make an atmosphere of anxiety and are spread throughout the whole society as well as the residential areas, regardless of the number of crimes and how serious they are. Thus, due to their huge negative impact on the whole society, it is crucial to relieve anxiety of residents from the crimes occurring in the residential areas, which plays an important role in determining the quality of a residential environment. Before conducting the research, 18 apartment complexes in Daejeon constructed since 2006 were chosen to apply six principles of CPTED. The main purpose of the research is to observe main spaces in residential areas and analyze crime prevention environment in order to find out safe spatial composition. The data of the research demonstrate the main spaces and their composition. Henceforth, it is necessary to establish accurate data and a new evaluation method in order to obtain objective statistics and data. Furthermore, a study on development of safety and amenity of residential areas should be continued.

Time Series Analysis of the Correlation Between the Number of Drug Crime Arrests and Media Coverage for Enhancing Police Response to Drug Crimes (경찰 대응 능력 강화를 위한 마약 범죄 검거 수와 언론보도량의 시계열 분석)

  • Jeong-Woo Lee;Seungkook Roh
    • Journal of Industrial Convergence
    • /
    • v.21 no.6
    • /
    • pp.13-21
    • /
    • 2023
  • The purpose of this study is to investigate the relationship between the amount of media coverage related to drug crimes and the actual number of drug-related arrests. It aims to determine the implications of this relationship for the formulation of police policies in response to drug crimes. To achieve this, we collected and analyzed 50,355 domestic online media coverage data from 2001 to 2022 and drug crime arrest data compiled by the National Police Agency. The analysis confirmed a significant causal relationship between the amount of online media coverage of drug crimes and the actual number of drug crime arrests. This relationship was found to be influenced by the existence of dominant issues and the relevance of famous incidents. It was determined that media coverage was also influenced by public interest beyond drug crime arrest numbers. Based on these research findings, the police have proposed the need to monitor the amount of crime-related media coverage and enhance security capabilities for crimes that receive public attention in order to gain the trust of the citizens.

Crime Patterns of CBD in Cheongiu City (청주시 도심의 범죄 특성)

  • 고준호
    • Journal of the Korean Geographical Society
    • /
    • v.36 no.3
    • /
    • pp.329-341
    • /
    • 2001
  • The purpose of this study focused on the distribution of crimes in Cheongju City. This study emphasized the characteristics of place and spatial pattern of crime in Central Business District(CBD). The crime core areas were delineated and explained through land-use based on fieldwork and GIS analysis For this aim. the police crime data of Cheongju Dongbu(east). Seobu(west) for 1998 were collected In which 3.909 indictable or similar offenses were reported. In this study, Included climes are murder. rape, robbery. arson, theft, burglary, assault and vandalism. Because theme crimes are related with site-specific crime. As a result. land-use patterns are often related to specific type of offenses. The climes in Cheongju City were concentrated in the CBD Most crimes were assaults and thefts Crime areas can be classified by the age of the offender Around Chungang and Pungmul Market in the CBD. the offender's ages were 30-50 dominantly Assaults and thefts were concentrated in Songan-gil(street). which is a place teen-ages and youngsters meet frequently The result of the buffering analysis with roads, explained 40% of crime within a 30m buffer area( including both sides) of a principal road The rest of the climes mainly occurred in the vicinity of narrow streets and alleys.

  • PDF

Hotspot Analysis of Urban Crime Using Space-Time Scan Statistics (시공간검정통계량을 이용한 도시범죄의 핫스팟분석)

  • Jeong, Kyeong-Seok;Moon, Tae-Heon;Jeong, Jae-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.13 no.3
    • /
    • pp.14-28
    • /
    • 2010
  • The aim of this study is to investigate crime hotspot areas using the spatio-temporal cluster analysis which is possible to search simultaneously time range as well as space range as an alternative method of existing hotspot analysis only identifying crime occurrence distribution patterns in urban area. As for research method, first, crime data were collected from criminal registers provided by official police authority in M city, Gyeongnam and crime occurrence patterns were drafted on a map by using Geographic Information Systems(GIS). Second, by utilizing Ripley K-function and Space-Time Scan Statistics analysis, the spatio-temporal distribution of crime was examined. The results showed that the risk of crime was significantly clustered at relatively few places and the spatio-temporal clustered areas of crime were different from those predicted by existing spatial hotspot analysis such as kernel density analysis and k-means clustering analysis. Finally, it is expected that the results of this study can be not only utilized as a valuable reference data for establishing urban planning and crime prevention through environmental design(CPTED), but also made available for the allocation of police resources and the improvement of public security services.