• Title/Summary/Keyword: crime distribution

Search Result 48, Processing Time 0.026 seconds

An Analysis on the Spatial Pattern of Local Safety Level Index Using Spatial Autocorrelation - Focused on Basic Local Governments, Korea (공간적 자기상관을 활용한 지역안전지수의 공간패턴 분석 - 기초지방자치단체를 중심으로)

  • Yi, Mi Sook;Yeo, Kwan Hyun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.1
    • /
    • pp.29-40
    • /
    • 2021
  • Risk factors that threaten public safety such as crime, fire, and traffic accidents have spatial characteristics. Since each region has different dangerous environments, it is necessary to analyze the spatial pattern of risk factors for each sector such as traffic accident, fire, crime, and living safety. The purpose of this study is to analyze the spatial distribution pattern of local safety level index, which act as an index that rates the safety level of each sector (traffic accident, fire, crime, living safety, suicide, and infectious disease) for basic local governments across the nation. The following analysis tools were used to analyze the spatial autocorrelation of local safety level index : Global Moran's I, Local Moran's I, and Getis-Ord's G⁎i. The result of the analysis shows that the distribution of safety level on traffic accidents, fire, and suicide tends to be more clustered spatially compared to the safety level on crime, living safety, and infectious disease. As a result of analyzing significant spatial correlations between different regions, it was found that the Seoul metropolitan areas are relatively safe compared to other cities based on the integrated index of local safety. In addition, hot spot analysis using statistical values from Getis-Ord's G⁎i derived three hot spots(Samchuck, Cheongsong-gun, and Gimje) in which safety-vulnerable areas are clustered and 15 cold spots which are clusters of areas with high safety levels. These research findings can be used as basic data when the government is making policies to improve the safety level by identifying the spatial distribution and the spatial pattern in areas with vulnerable safety levels.

A study on the Private Investigator usage for Cyber Crime (사이버범죄의 효과적인 대응을 위한 민간조사제도의 도입방안)

  • Shin, Hyun-Joo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.63-86
    • /
    • 2016
  • The object of this study is to propose a study on the Private Investigator usage for Cyber Crime. The latest trend of cyber crime is being evolve in sophisticated and complex way over the global, like internet fraud, cyber gambling, hacking and etc. Hence national investigative authority mobilize high specialized skills and method of criminal investigation by each nation. But it is hard to respond in rapid and effective way because of propoor, distribution of group and insufficient of related legal system. Already in other countries, not considerable amount of services are given to private investigators in detection and tracking part which is inefficient by nation. So it has significantly meaningful to compensate the defect and study about private investigator usage as companion of cooperation policing for effectively respond to cyber-crime. The way to effectively deal with the cyber-crime is reevaluate meaning of partnership policing and need of private investigator usage. Also it is to analyze the main issue about introduction of a system and suggest the effective way of introduction. First, legislation of private investigator usage which is based upon partnership policing should be made up. Moreover, to establish the range of private investigator's business and enhance the reliability, it is to propose introduction of leading professional global certificate and license system with sufficient education and test. We are expecting introduction of private investigator usage can improve efficiency of investigation and promote effective countermeasures of cyber-crime.

  • PDF

Analysis of Total Crime Count Data Based on Spatial Association Structure (공간적 연관구조를 고려한 총범죄 자료 분석)

  • Choi, Jung-Soon;Park, Man-Sik;Won, Yu-Bok;Kim, Hag-Yeol;Heo, Tae-Young
    • The Korean Journal of Applied Statistics
    • /
    • v.23 no.2
    • /
    • pp.335-344
    • /
    • 2010
  • Reliability of the estimation is usually damaged in the situation where a linear regression model without spatial dependencies is employed to the spatial data analysis. In this study, we considered the conditional autoregressive model in order to construct spatial association structures and estimate the parameters via the Bayesian approaches. Finally, we compared the performances of the models with spatial effects and the ones without spatial effects. We analyzed the yearly total crime count data measured from each of 25 districts in Seoul, South Korea in 2007.

Current Status of Response to Digital Child Sexual Slavery and Comparative Analysis of Overseas Crime Prediction System Using Artificial Intelligence (디지털 아동 성착취 대응현황과 해외 인공지능 범죄 예측 시스템 비교분석)

  • Kim, Hyejin
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.357-368
    • /
    • 2020
  • This study identifies the aspects and characteristics of 'Digital Sexual Crimes' that changed rapidly in recent years. It has identified the so-called "Telegram sexual harassment and exploitation" incident on the front page. We also want to analyze this and draw up policy suggestions that can help prepare social measures. In the wake of the Telegram sexual exploitation scandal, The National Assembly is quickly proposing related bills. However, the reality is that even a clear concept and definition of "Digital sexual Crimes" have not been made yet. The effective support system for victims is also insufficient. Therefore, this paper examines the definition and concept of child sexual exploitation and harassment. We will look at the features, causes, and conditions. In addition, it will examine the current status of Digital Sexual Crimes distribution and deletion of domestic, foreign platforms. Major foreign countries, including the U. S. A. refer to cases in which big data and artificial intelligence technologies are actively used to protect victims and track perpetrators.

A study on the distribution of latent fingerprints on paper knife sheaths (간이 칼집에서의 잠재지문 분포에 관한 연구)

  • Kim, Hyo-Mi;Park, Gi-Hyun;Lee, Su-Bhin;Yu, Je-Seol
    • Analytical Science and Technology
    • /
    • v.34 no.6
    • /
    • pp.251-258
    • /
    • 2021
  • Knives are most frequently used as weapons in violent crimes. Criminals leave behind knife sheaths made of paper and tape at crime scenes. It is difficult to develop fingerprints using tape attached to a porous surface, resulting in the need to explore effective techniques for identifying fingerprints as well as the distribution of fingerprints on each surface, when evidence such as paper knife sheaths are found. In this study, 50 knife sheaths were prepared. The cyanoacrylate fuming (CA fuming) method was applied to develop fingerprints on the non-adhesive side of the tape, and a dual-purpose 1,2-indanedione/Zn (1,2-IND/Zn) reagent was used to separate tape from paper while simultaneously developing fingerprints on the paper. The fingerprints on the adhesive side of the tape were developed using Wet Powder Black®. Using the R statistical analysis program (The R Foundation for Statistical Computing), we used a heat map to indicate the location of fingerprints developed from each surface. More fingerprints were detected at the ends than in the center of the adhesive side of the tape, and although the non-adhesive sides of tape and paper did not present clear distribution patterns, many fingerprints were developed that had sufficient clarity for personal identification. The results of this study may be applicable for processing evidence when paper sheaths are found at crime scenes.

The Base of Understanding for Interdisciplinary Studies on Cyber Crimes - Centering on Regulations in Criminal Law - (사이버범죄의 학제간 연구를 위한 이해의 기초 - 형법상 규제를 중심으로 -)

  • Lim, Byoung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.237-242
    • /
    • 2008
  • This study aims to provide theoretical base in criminal law for engineers in the viewpoint of jurists to encourage interdisciplinary studies on cyber crimes. Apart from seriousness of discussion on torrent cyber crimes, a good effect of the internet networks such as sharing of information has bee emphasized while the evil influence of its side effect has been neglected. Therefore, this study suggests that we need to consider reinforcement of cyber ethics, and legal mind of IT technicians, strict security by managers, active efforts to develop legitimate contents by managers of web hardware and P2P, and reinforcement of punishments against crimes by internet users. And this study approaches new norms on computer and cyber crimes in interpretational sense of criminal law, and provides the theoretical base of the criminal law focusing on traditional theories, assumptions, and precedents involved in regulations against computer virus distribution.

  • PDF

Overcoming Cybercrime in Ukraine (Cyberterrorism)

  • Pravdiuk, Andrey;Gerasymenko, Larysa;Tykhonova, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.181-186
    • /
    • 2021
  • Ensuring national security in cyberspace is becoming an increasingly important issue, given the growing number of cybercrimes due to adaptation to new security and protection technologies. The purpose of this article is to study the features of counteracting, preventing, and detecting crimes in the virtual space of Ukraine on the example of cases and analysis of the State Center for Cyber Defense and Countering Cyber Threats CERT-UA and the Cyber Police Department of the National Police of Ukraine. The research methodology is based on the method of analysis and study of cases of crime detection in the virtual environment of the State Center for Cyber Defense and Countering Cyber Threats CERT-UA and the Cyber Police Department of the National Police of Ukraine. The results show that the consistent development of the legal framework in 2016-2020 and the development of a cyber-defense strategy for 2021-2025 had a positive impact on the institution-building and detection of cybercrime in Ukraine. Establishing cooperation with developed countries (USA) has helped to combat cybercrime by facilitating investigations by US law enforcement agencies. This means that international experience is effective for developing countries as a way to quickly understand the threats and risks of cybercrime. In Ukraine, the main number of incidents concerns the distribution of malicious software in the public sector. In the private sector, cyber police are largely confronted with the misappropriation of citizens' income through Internet technology. The practical value of this study is to systematize the experience of overcoming cybercrime on the example of cases of crime detection in a virtual environment.

The Current State and Legal Issues of Online Crimes Related to Children and Adolescents

  • Hyoung-ryul Kim
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.34 no.4
    • /
    • pp.222-228
    • /
    • 2023
  • There are two categories of online crimes related to children and adolescents: those committed by adolescents and those committed against children and adolescents. While recent trends in criminal law show consensus on strengthening punishment in cases of crimes against children and adolescents, there are mixed stances in cases of juvenile delinquency. One perspective emphasizes strict punishment, whereas the other emphasizes dispositions aligned with human rights. While various forms of online crime share the commonality in that the main part of the criminal act occurs online, they can be categorized into three types: those seeking financial gain, those driven by sexual motives, and those engaged in bullying. Among these, crimes driven by sexual motives are the most serious. Second-hand trading fraud and conditional (sexual) meeting fraud fall under the category of seeking financial gain and occur frequently. Crimes driven by sexual motives include obscenity via telecommunication, filming with discrete cameras, child and adolescent sexual exploitation material, fake video distribution, and blackmail/coercion using intimate images/videos ("sextortion"). These crimes lead to various legal issues such as whether to view vulgar acronyms or body cams that teenagers frequently use as simple subcultures or crimes, what criteria should be applied to judge whether a recorded material induces sexual desire or shame, and at what stage sexual grooming becomes punishable. For example, sniping posts, KakaoTalk prisons, and chat room explosions are tricky issues, as they may or may not be punished depending on the case. Particular caution should be exercised against the indiscriminate application of a strict punishment-oriented approach to the juvenile justice system, which is being discussed in relation to online sexual offenses. In the punishment case of online crime, juvenile offenders with a high potential for future improvement and reform must be treated with special consideration.

Big Data Strategies for Government, Society and Policy-Making

  • LEE, Jung Wan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.7
    • /
    • pp.475-487
    • /
    • 2020
  • The paper aims to facilitate a discussion around how big data technologies and data from citizens can be used to help public administration, society, and policy-making to improve community's lives. This paper discusses opportunities and challenges of big data strategies for government, society, and policy-making. It employs the presentation of numerous practical examples from different parts of the world, where public-service delivery has seen transformation and where initiatives have been taken forward that have revolutionized the way governments at different levels engage with the citizens, and how governments and civil society have adopted evidence-driven policy-making through innovative and efficient use of big data analytics. The examples include the governments of the United States, China, the United Kingdom, and India, and different levels of government agencies in the public services of fraud detection, financial market analysis, healthcare and public health, government oversight, education, crime fighting, environmental protection, energy exploration, agriculture, weather forecasting, and ecosystem management. The examples also include smart cities in Korea, China, Japan, India, Canada, Singapore, the United Kingdom, and the European Union. This paper makes some recommendations about how big data strategies transform the government and public services to become more citizen-centric, responsive, accountable and transparent.

A Causality Analysis of Lottery Gambling and Unemployment in Thailand

  • KHANTHAVIT, Anya
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.8
    • /
    • pp.149-156
    • /
    • 2021
  • Gambling negatively affects the economy, and it brings unwanted financial, social, and health outcomes to gamblers. On the one hand, unemployment is argued to be a leading cause of gambling. On the other hand, gambling can cause unemployment in the second-order via gambling-induced poor health, falling productivity, and crime. In terms of significant effects, previous studies were able to establish an association, but not causality. The current study examines the time-sequence and contemporaneous causalities between lottery gambling and unemployment in Thailand. The Granger causality and directed acyclic graph (DAG) tests employ time-series data on gambling- and unemployment-related Google Trends indexes from January 2004 to April 2021 (208 monthly observations). These tests are based on the estimates from a vector autoregressive (VAR) model. Granger causality is a way to investigate causality between two variables in a time series. However, this approach cannot detect the contemporaneous causality among variables that occurred within the same period. The contemporaneous causal structure of gambling and unemployment was identified via the data-determined DAG approach. The use of time-series Google Trends indexes in gambling studies is new. Based on this data set, unemployment is found to contemporaneously cause gambling, whereas gambling Granger causes unemployment. The causalities are circular and last for four months.