2016
DOI: 10.7472/jksii.2016.17.3.115
|View full text |Cite
|
Sign up to set email alerts
|

Designing a Crime-Prevention System by Converging Big Data and IoT

Abstract: Recently, converging Big Data and IoT(Internet of Things)has become mainstream, and public sector is no exception. In particular, this combinationis applicable to crime prevention in Korea. Crime prevention has evolved from CPTED (Crime Prevention through Environmental Design) to ubiquitous crime prevention;however, such a physical engineering method has the limitation, for instance, unexpected exposureby CCTV installed on the street, and doesn't have the function that automatically alarms passengers who pass … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(19 citation statements)
references
References 27 publications
0
18
0
Order By: Relevance
“…Except for the structured data source from crime-related government organizations, published crime open data and call data records, the collection of data from social network services, newspaper articles, and public information repository are unstructured and incomplete [5]- [11]. The data collection techniques used to collect unstructured data is mainly web crawler [5], [9], [10]. After the collection of unstructured data, Isuru et al used a classifier, entity extractor, and duplicate detector techniques to preprocess the data [10].…”
Section: A Crime Data Collection and Preprocessingmentioning
confidence: 99%
See 2 more Smart Citations
“…Except for the structured data source from crime-related government organizations, published crime open data and call data records, the collection of data from social network services, newspaper articles, and public information repository are unstructured and incomplete [5]- [11]. The data collection techniques used to collect unstructured data is mainly web crawler [5], [9], [10]. After the collection of unstructured data, Isuru et al used a classifier, entity extractor, and duplicate detector techniques to preprocess the data [10].…”
Section: A Crime Data Collection and Preprocessingmentioning
confidence: 99%
“…After the collection of unstructured data, Isuru et al used a classifier, entity extractor, and duplicate detector techniques to preprocess the data [10]. Likewise, Nasution et al and Jeon et al used map-reduce while Zhang used intelligence analysis for data preprocessing [5], [9], [11]. Despite various techniques used during data preprocessing, all the techniques are aimed to reduce and eliminate the duplication of data during data collection.…”
Section: A Crime Data Collection and Preprocessingmentioning
confidence: 99%
See 1 more Smart Citation
“…There is a new phenomenon: the 'predictive power' of BD (McGregor et al, 2013;Siegel, 2013;Simon, 2014;White House, 2014;Ferguson, 2015;Jeon and Jeong, 2016). A company can look much more deeply than before into its customers' habits with the help of BD, and based on that, it can exercise, for example, discriminatory practices.…”
Section: Risksmentioning
confidence: 99%
“…Clustering data mining technique can be used for crime detection and crime prevention. Jin-ho & Seung-Ryul [18] used text mining to extract and treat useful information based on the natural language processing, opinion mining to assigned positive and negative or neutral preference to social media unstructured data, and social network analysis to discover viral objects by measuring a user's reputation or influence based on their connection network and clustering analysis. Ceccato, & Uittenbogaard [19] assessed the crime rates in underground stations using space crime.…”
Section: Literature Reviewmentioning
confidence: 99%