주 메뉴 바로가기 본문으로 바로가기

연구보고서

범죄 빅데이터를 활용한 범죄예방시스템 구축을 위한 예비 연구 (II)

  • 작성일2016.01.20
  • 조회수3,363

범죄 빅데이터를 활용한 범죄예방시스템 구축을 위한 예비 연구 (II)

좌우로 스크롤 하시면 표의 전체 내용을 보실 수 있습니다.

연구책임자, 소속기관,내부연구참여자,외부참여연구자,발행기관,공개여부,출판일,등록일,페이지,분류기호,언어,판매여부,판매가격,보고서유형,ISBN,표준분류,연구유형,자료유형
연구책임자 탁희성 소속기관 한국형사·법무정책연구원
내부연구참여자 탁희성 외 3인 외부참여연구자
발행기관 한국형사·법무정책연구원 공개여부 공개
출판일 2015년 12월 등록일 2016.01.20
페이지 0 분류기호 15-B-18
언어 한국어 판매여부 판매
판매가격 15,000원 보고서유형
ISBN 표준분류
연구유형 자료유형
❘제1부❘ 범죄예방을 위한 빅데이터 활용 프레임의 재정립 ·· 27
제1장 연구의 개요 ·························································································· 29
제1절 연구의 목적 ····························································································31
제2절 연구내용 및 방법 ···················································································34
제2장 범죄예방 목적 빅데이터 활용을 위한 프레임 재구성 논의 ························· 37
제1절 데이터 리스크 관리 및 평가방식의 전환 ·············································39
1. 동의 방식의 한계 ····························································································39
가. 동의 기능의 변화 ·····················································································41
나. 정보주체의 동의방식에 대한 새로운 접근방법 ······································43
2. 데이터 리스크 관리 방식의 전환 ···································································45
가. 데이터 주체로부터 데이터 이용자로의 책임 전환 ································45
나. 데이터 수집으로부터 데이터 이용으로의 관리중점의 전환 ··················47
다. 데이터 리스크로서 피해의 정의 및 구제조치의 확보 ···························47
제2절 빅데이터 환경에 적합한 정보보호기술의 적용 ····································48
1. 프라이버시 중심 디자인(privacy by design)의 적용 ································48
가. 프라이버시 중심 디자인의 의의와 내용 ·················································48
나. 프라이버시 중심 디자인의 기본원칙 ······················································49
다. 기술표준으로서 프라이버시 중심 디자인의 구축 ··································52
라. 프라이버시 중심 디자인의 한계 ·····························································57
2. 개인에 대한 식별가능성 배제 기술의 적용 의무화 ·····································59
가. 빅데이터에 있어서 개인식별가능성 배제 기술의 중요성 ·····················59
나. 식별가능성 배제 정책의 기본원칙 ··························································61
다. 비식별화 방식 ···························································································61
라. 비식별화 기술의 유형 ············································································64
마. 비식별화의 리스크 관리시스템 ·····························································67
제3절 개인정보 보호와 이용의 규범적 경계의 재정립 ··································67
1. 개인정보의 보호와 이용 관계의 변화 ···························································67
2. 개인정보 보호프레임에서 이용프레임으로 전환 ···········································68
3. 수동적 권리보호의 객체에서 적극적 권리청구의 주체로 전환 ···················69

❘제2부❘ 주요 외국의 빅데이터 활용 관련 법제의 비교분석 ··· 71
제1장 빅데이터 환경을 뒷받침하는 규범적 원칙의 변화 ······································ 73
제2장 빅데이터 활용에 있어서 관련 법제의 비교 ··············································· 79
제1절 빅데이터 활용과 관련한 법제 비교 개관 ·············································81
1. 빅데이터 활용 관련 입법방향 ······································································81
2. 빅데이터 활용 관련 법제의 기본 프레임 ······················································82
제2절 미국의 개인정보보호와 정보공개 법제 ·················································83
1. 연방 프라이버시 법률 (Privacy Act) ···························································84
가. 공개요건 ····································································································85
나. 기록보유기관의 의무 ················································································85
다. 민사적 구제와 형사적 제재 ···································································86
2. 정보자유법(The Freedom of Information Act) ······································87
가. 입법과정 ····································································································87
나. 정보공개 청구권자와 공개대상 ·······························································88
다. 불복구제절차 ···························································································89
라. 정보공개 예외사유 ···················································································89
마. 전자정보자유법(the Electronic Freedom of Information Act
Amendments of 1996) ·········································································93
3. Safe Harbor 협정 ························································································94
가. 의의와 기본원칙 ·······················································································94
나. 세이프 하버 원칙에 대한 개선 논의 ······················································96
4. NAI(The Network Advertising Initiative Principles) 원칙 ·················96
5. 미국의 개인정보보호 정책과 빅데이터 활용을 위한 법제정비 방향 ··········97
가. 개인정보보호 관련 입법의 방향 ·····························································97
나. 자율규제원칙을 통한 정보의 공정한 이용 확보 ··································98
제3절 영국의 개인정보보호 및 정보공개 법제 ·············································98
1. 데이터보호법(The Data Protection Act) ··················································99
가. 데이터 보호원칙 ·····················································································100
나. 정보주체의 권리 ·····················································································103
다. 면책규정 ··································································································106
라. 데이터 관리자의 신고의무 ····································································107
마. 불복구제수단 ··························································································108
2. 정보자유법(The Freedom of Information Act 2000) ·························108
가. 공공기관에 의해 보유되는 정보에 대한 접근권 ·································109
나. 청구의 거부 ····························································································111
다. 면제정보(비공개정보) ·············································································111
라. 불복구제절차 ··························································································117
마. FOIA Awareness Guidance ······························································118
3. 영국의 개인정보보호 정책과 빅데이터 활용을 위한 법제정비 방향 ········120
가. 개인정보보호를 위한 입법방향 ·····························································120
나. 영국의 오픈데이터 정책과 공공정보 이용의 활성화 ························121
제4절 유럽연합의 개인정보보호 법제 ···························································121
1. 개인정보의 처리와 자유로운 유통에 관한 개인정보보호지침(Directive on the
Protection of Individuals with regard to the Processing of Personal Data
and on the Free Movement of Such Data)(1995) ································· 123
가. 목적과 적용범위 ·····················································································123
나. 개인정보처리 일반원칙 ··········································································124
다. 정보주체의 권리 ·····················································································125
라. 책임과 권리구제 ·····················································································125
2. 일반 데이터보호 규정(General Data Protection Regulation)(2014) ··· 126
가. 제정과정 ··································································································126
나. 개인데이터 보호 원칙 ············································································127
다. 데이터 주체의 권리 ···············································································130
라. 관리자의 의무와 책임 ············································································133
마. 데이터 보호 영향평가 ············································································134
바. 데이터 보호 담당자의 지정 및 감독기구 구성 ···································135
사. 구제수단 ··································································································136
3. 범죄의 예방・조사・수사 혹은 소추의 목적 또는 형집행을 목적으로 한 권한
있는 기관에 의한 개인정보의 처리 및 그러한 개인정보의 자유로운 유통에
관한 지침(안) ·································································································138
가. 기본원칙 ··································································································140
나. 데이터 주체의 권리 ···············································································142
다. 데이터 관리자와 처리자의 의무와 권한 ··············································143
마. 데이터 보안 ····························································································144
바. 감독기구와 데이터 주체에 대한 통지 ··················································145
사. 데이터 보호 담당자의 임무 ··································································145
아. 독립적인 감독기구의 권한과 의무 ·······················································146
4. EU 개인정보보호 정책과 빅데이터 활용을 위한 법제정비 방향 ··············146
가. 데이터 활용과 개인정보보호의 균형 ····················································147
나. 관리자와 처리자의 의무와 책임 강화 ··················································148
다. 독립적인 감독기구의 권한 강화 ···························································149
제5절 독일의 개인정보보호와 정보공개 법제 ··············································149
1. 독일의 빅데이터 활용과 관련한 입법 경향 ················································149
2. 연방정보보호법 ······························································································151
가. 정보보호 기본원칙 ·················································································151
나. 데이터 주체의 권리 ···············································································153
다. 개인정보처리자의 의무 ··········································································157
라. 손해배상 ··································································································159
3. 연방정보자유법 ······························································································160
가. 입법과정 및 배경 ···················································································160
나. 정보공개의 일반원칙 ·············································································161
다. 정보공개의 예외 ·····················································································162
라. 제3자 보호에 관한 절차 ·······································································166
마. 불복구제절차 ··························································································166
4. 독일의 개인정보 관련 법제의 입법방향 ·····················································167
제6절 빅데이터 활용 관련 법제에 대한 비교검토 ·······································168
1. 빅데이터 활용을 위한 정보공개와 정보보호의 관계 ·······························168
2. 개인정보보호 법제에 대한 비교 ··································································169
가. 국가별 개인정보보호 법제의 기본입장 ················································169
나. 개인정보보호의 기본원칙에 대한 비교 ················································170
다. 정보주체의 권리 ·····················································································171
라. 정보관리자의 의무와 책임 ····································································172
마. 불복구제수단 ··························································································173
3. 정보공개법제에 관한 비교 ···········································································175
가. 정보공개 청구권자와 청구기관 ·····························································175
나. 정보공개 예외사유 ·················································································176
다. 불복구제절차 ························································································177

❘제3부❘ 주요 외국의 빅데이터 기반 범죄예방시스템
운영현황 및 성과 분석 ··································179
제1장 빅데이터와 범죄예방 ············································································ 181
제1절 서설 ·······································································································183
1. 빅데이터를 활용한 범죄예방시스템에 대한 논의 경향 ······························183
2. 연구의 목적 및 범위 ····················································································186
제2절 범죄 예측과 경찰활동에 관한 이론적 논의 ·······································187
1. 범죄 예측과 예방 ··························································································188
가. 범죄 예측 ································································································189
나. 범죄자 예측 ····························································································193
2. 경찰활동과 지역사회 ·····················································································195
가. 지역사회 경찰활동과 협력치안 ·····························································196
나. 문제지향적 경찰활동과 비즈니스 프로세스 ·········································198
다. 경찰활동의 두 가지 차원 : 집중도와 다양성 ······································200
제2장 빅데이터 경찰활동과 범죄예방 프로세스 ················································· 203
제1절 예측의 범위 및 기법 ···········································································206
1. 예측의 범위 ···································································································206
가. 범죄 예측 ································································································206
나. 범죄자 예측 ····························································································207
다. 범죄자 신원(동일성) 예측 ·····································································208
라. 피해자 예측 ····························································································209
2. 예측 기법 ·······································································································210
가. 핫스팟 분석(Hot Spot Analysis) ························································211
나. 회귀분석(Regression Analysis) ··························································212
다. 데이터 마이닝(Data Mining) ·······························································213
라. 근접-반복 모델링(Near-Repeat Modeling) ······································215
마. 시공간 분석(Spatiotemporal Analysis) ············································216
바. 지리적 프로파일링(Geographic Profiling) ·······································217
사. 위험지역 분석(Risk Terrain Analysis) ··············································218
3. 예측기법 적용 사례 : 워싱턴 D.C. ····························································220
제2절 빅데이터 경찰활동의 개념 및 프로세스 ············································222
1. 예측적 경찰활동(Predictive Policing) ······················································222
가. 개념 및 발달과정 ···················································································222
나. 예측적 경찰활동 프로세스 ····································································223
2. 스마트 경찰활동(SMART Policing) ···························································227
가. 개념 및 발달과정 ···················································································227
나. 스마트 경찰활동 프로세스 ····································································228
3. 범죄와 교통안전에 대한 데이터 기반 접근법(DDACTS) ··························230
가. 개념 및 발달과정 ···················································································230
나. DDACTS 프로세스 ················································································236
제3절 효과적인 범죄예방 프로세스 및 핵심요소 ·········································239
1. COMPSTAT ································································································240
2. 효과적인 범죄예방 ························································································243
가. 목표에 대한 전략적 접근 ······································································244
나. 데이터 활용성 극대화 ············································································244
다. 전략적 개입 ····························································································245
라. 지속적인 모니터링 및 평가 ··································································245
마. 협력 강화 및 관계 확장 ······································································246
바. 컨트롤 타워 및 커뮤니티 구축 ···························································246
제3장 외국의 범죄 예측 프로그램 운영현황 및 성과분석 ·································· 247
제1절 서설 ·······································································································249
제2절 미국의 범죄 예측 및 예방 사례 ·························································249
1. 산타 크루즈 경찰서의 프레드폴(PredPol) ··················································249
가. 등장 배경 ································································································250
나. 프레드폴 예측기법 ·················································································250
다. 프레드폴 적용 ························································································251
라. 효과성 평가 ····························································································252
2. Shreveport 경찰서의 파일럿(PILOT) ······················································253
가. 데이터 수집 및 분석 ·············································································253
나. 운영 및 평가 ··························································································254
3. 뉴욕 경찰청(NYPD)의 Domain Awareness System(DAS) ···················256
가. DAS 개요 ·····························································································256
나. 법적 근거 및 운영목적 ··········································································257
다. 운영 ·········································································································258
4. Lafourche Parish 경찰서의 DDACTS 프로그램 ··································259
가. Anacapa Sciences의 효과성 평가연구 ·············································260
나. Urban Institute의 평가연구 적합성 ···················································264
제3절 영국의 범죄 예측 및 예방 사례 ·························································267
1. 예측적 경찰활동 사례 ···················································································267
2. 런던의 Ring of Steel ··················································································268
3. 국세청의 탈세 예방 프로그램 Connect ···················································270
가. 배경 ·········································································································270
나. Connect 시스템 ····················································································271
다. 국세청의 조치 ························································································272
제4장 외국의 범죄자 예측 프로그램 운영현황 및 성과분석 ······························· 275
제1절 서설 ·······································································································277
1. 일반적으로 이용되는 행동평가도구(behavioral instrument) ·················278
2. 행동평가도구의 한계 ·····················································································279
3. 캐나다 퀘벡 사례 : 갱단 멤버의 범죄위험성 평가 ····································281
제2절 미국의 범죄자 예측 및 예방 사례 ·····················································282
1. 플로리다 소년사법부의 재범예측 ·································································282
2. 필라델피아의 재범예측 프로그램 ·································································284
가. 프로그램 개요 ························································································284
나. Random Forest Modeling ·································································284
다. 주의사항 ··································································································288
3. 시카고 경찰청의 Custom Notification 프로그램 ···································288
가. 개요 ·····································································································288
나. 절차 ·········································································································289
다. 사회관계망분석(Social Network Analysis) ·······································290
라. 효과성 ·····································································································291
4. 연쇄범죄자 근거지 예측 ···············································································292
제3절 영국의 범죄자 예측 및 예방 사례 ·····················································293
1. 법무부의 재범 예측 프로그램 ······································································293
2. 런던 경찰의 조직범죄 예방 프로그램 시범운영 ·········································294
제5장 범죄 빅데이터 거버넌스와 효과적인 범죄예방시스템 ································ 295
제1절 범죄 빅데이터 거버넌스 ······································································297
1. 범죄 예측 및 예방 프로그램에 대한 비판 ··················································298
가. 예측의 불완전성 ·····················································································298
나. 데이터의 낮은 질 ···················································································298
다. 분석 결과에 대한 맹목적 수용 ·····························································299
라. 위험지역과 위험인물에 대한 편향적 예측 ···········································300
마. 전이효과 ··································································································300
바. 프라이버시와 인권 침해 ········································································301
2. 범죄 빅데이터 거버넌스 개요 ······································································302
가. 빅데이터 거버넌스의 개념 ····································································302
나. 빅데이터 거버넌스의 4요소 ··································································303
다. 법집행 분야의 빅데이터 거버넌스 ······················································305
3. 미국의 범죄 빅데이터 거버넌스 ······························································306
가. 전국 법집행기관 데이터교환 프로그램(N-DEx: Law Enforcement
National Data Exchange) ·········································································307
나. 경찰 데이터 이니셔티브(PDI: Police Data Initiative) ···················308
4. 영국의 범죄 빅데이터 거버넌스 ··································································308
가. data.police.uk 개요 ·············································································308
나. 비식별화, 프라이버시, 정확성 ······························································310
제2절 소결 : 효과적인 범죄예방시스템 구축을 위한 제언 ·························311

❘제4부❘ 범죄예방에 있어서 빅데이터 기술의 변화와
발전방향 ·························································315
제1장 빅데이터 기술의 발전 경향 ·································································· 317
제1절 변화하는 빅데이터 기술의 패러다임 ··················································319
1. 빅데이터 기술의 과거와 현재 ······································································319
가. 현재의 빅데이터 의미 ············································································319
나. 현재 빅데이터의 문제점 ········································································320
2. 현재 논의되고 있는 빅데이터 기술 경향 ····················································331
가. Deep Learning 기반 기술들 ······························································331
나. 토픽 모델 (Topic modelling) 기반 기술들 ······································333
제2절 빅데이터 기술의 미래 발전 방향 ·······················································336
1. 빅데이터 속성의 추가 및 수정 ····································································336
가. 가치 중심의 고도화된 빅데이터 분석 기술 ·········································336
나. 베테랑 분석관을 이용한 새로운 응용 아이템 도출 ····························337
2. 새로운 기술들과의 연계 ···············································································338
가. 클라우드 컴퓨팅과의 만남 ····································································338
나. 사물인터넷(IoT)과의 연계 ·····································································339
다. 사이버물리시스템(Cyber Physical System)과의 연계 ······················343
3. 공공데이터 및 민간데이터가 추가된 빅데이터 ···········································344
4. Open Source Intelligence와 빅데이터간의 연계 ···································346
제2장 빅데이터 기반 범죄예방시스템의 한계와 문제점 ······································ 351
제1절 빅데이터 이용 범죄예방시스템에 대한 법적 및 행정적 한계 ··········353
1. 동일 기관내 빅데이터들간의 공유 및 연동을 막는 법적인 쟁점 ·············354
2. 국가기관들이 보유한 데이터베이스들의 연동의 어려움 ····························354
3. 민간과 정부의 OSINT기술의 공동 협력 미비 ···········································355
제2절 빅데이터 분석에 기반한 범죄예방시스템에 대한 기술적 한계 ········357
1. 부정확한 데이터의 문제점 ··········································································358
2. 다채널 데이터 연동을 통한 빅데이터시스템 구축의 어려움 ·····················359
가. 증가하는 사물인터넷(IoT) 시스템들과 기존 데이터들간의 연동의 어려움 ···359
나. 미진한 OSINT 분석연구와 공개데이터 및 OSINT 분석과의 연동 미비 ····360
3. 빅데이터 분석기술을 대한 정보보호 쟁점 ··················································364
가. 빅데이터 분석 기술을 위한 공개 데이터 수집에 있어서의 어려움 ·· 365
나. 빅데이터 분석 기술을 통한 익명성 파괴 가능성 ································366
다. 범죄 데이터에 대한 클라우드 환경으로의 이전에 대한 어려움 ········368
제3절 범죄예방시스템에 대한 사회적 이슈 ··················································369
1. 전국적 사찰 또는 선거로의 이용으로 여겨질 수 있는 위험 ····················369
2. 전문가에 대한 인식 부족 ·············································································370
제3장 범죄예방시스템의 기술적 한계를 극복하기 위한 노력 ······························ 373
제1절 빅데이터 분석을 위한 공개데이터 수집에 관한 해결방안 ···············375
1. Denial of Services (DoS)에 대한 고려 ···················································376
2. 저작권에 대한 고려 ······················································································376
3. 개인정보보호에 대한 고려 ···········································································377
제2절 빅데이터 분석의 효율성과 프라이버시를 동시에 고려한 보안기술 ·378
1. 프라이버시 보존 암호 기술 (Privacy preserving Encryption) ············380
가. 순서 유지 암호 (Order Preserving Encryption) ····························381
나. 검색 가능 암호 (Searchable Encryption) ········································384
2. 프라이버시 보존 데이터 마이닝 (Privacy preserving data mining) ·· 385
3. 접근 제어를 통한 데이터 처리 ····································································387
가. 인증 기술 ································································································388
나. 인가 기술 ································································································389
다. 접근제어를 위한 여러 알고리즘들 ·······················································389
4. 추론 공격에 대비한 빅데이터 기술 ·····························································390
5. 과도한 데이터 수집 및 분석에 대한 이상 신호 탐지 기술 ······················390
제3절 SNS를 활용한 빅데이터 범죄정보 제공 및 범죄 예방 ·····················391
1. 시민들에게 SNS를 활용한 빅데이터 범죄정보 제공 ··································391
2. 시민들과 소통하는 빅데이터 기반 범죄예방시스템 ···································392
제4장 빅데이터를 활용한 범죄예방 시스템의 기술적 모델 프레임 ······················ 393
제1절 빅데이터 분석에 의한 범죄예방시스템 프로세스 ······························395
제2절 빅데이터 분석을 위한 연동 및 관계를 그린 세부 프레임 ···············399
1. 제안하는 프레임 ····························································································399
2. 각 기능에 대한 세부 구조 ···········································································400
가. 데이터 수집과 데이터베이스 연동 ·······················································400
나. 데이터 전처리 ························································································400
다. 빅데이터 분석시스템을 통한 범죄예측 및 예방 ·································401
라. 빅데이터 분석을 이용한 범죄대응시스템 ·············································401
마. 범죄 예방정책 지원시스템 ····································································403
바. 분석 결과로 얻어진 정보(Intelligence)의 추가적 이용 ····················404
제3절 소결 ·······································································································405

❘제5부❘ 범죄예방을 위한 빅데이터 활용과 관련한 인식조사 · 407
제1장 조사의 개요 ························································································ 409
제1절 조사 설계 ····························································································411
제2절 조사방법 ································································································415
1. 일반인 인식조사 ····························································································415
가. 조사대상 ································································································415
나. 조사방법 및 기간 ···················································································417
2. 전문가 조사 ···································································································417
가. 전문가 설문조사 ·····················································································417
나. 전문가 심층면접 ·····················································································418
제2장 일반인 대상 조사결과 분석 ·································································· 421
제1절 조사 대상자의 일반적 특성 ································································423
제2절 일반인 인식조사 분석결과 ··································································425
1. 빅데이터에 관한 인식 ·················································································425
가. 빅데이터에 대한 인지도 ······································································425
나. 빅데이터에 대한 인지 경로 ··································································426
다. 빅데이터에 대한 정의 ··········································································427
라. 범죄예방을 위한 빅데이터의 필요성 ··················································429
2. 범죄예방을 위한 개인정보 활용에 대한 인식 ············································431
가. 범죄예방을 위한 개인정보 제공의 필요성 ·········································431
나. 범죄예방 관련 개인정보 수집시 필요조건 및 처리절차 ·····················432
다. 개인정보처리시 정보주체의 권리 ·························································435
라. 범죄예방 관련 개인정보 제공 및 활용범위 ·········································437
마. 범죄에 대한 불안정도 ············································································443
3. 범죄예방 목적의 데이터 활용에 관한 인식 ··············································449
가. 정보 프라이버시에 대한 염려 정도 ······················································449
나. 정부에 대한 신뢰 ·················································································456
다. 빅데이터 활용영역 및 전제조건 ···························································460
라. 범죄예방영역에 있어서 빅데이터 활용시 문제점 ······························467
마. 빅데이터를 활용한 범죄예방정책에의 참여의사 ··································469
4. 개인정보보호에 대한 인식 ···········································································472
가. 개인정보의 중요성에 대한 인식 ···························································473
나. 사적/공적 이용목적상 제공가능한 정보 유형 ·····································476
다. 개인정보보호에 대한 관심과 노력 정도 ··············································477
5. 개인정보보호법에 대한 인식 ········································································480
가. 개인정보보호법에 대한 인지 경로 ·······················································480
나. 정보주체의 권리에 대한 인식 ·······························································481
다. 정보주체로서 권리행사 여부 ·······························································482
라. 개인정보 이용자의 준수의무 ·································································483
6. 온라인 프라이버시에 대한 인식 ··································································484
제3절 소결 ·······································································································487
제3장 전문가 대상 조사결과 분석 ·································································· 491
제1절 조사대상자의 특성 ·············································································493
제2절 전문가 인식조사 분석결과 ································································494
1. 빅데이터에 대한 인식 ···················································································494
가. 빅데이터에 대한 인지도 ········································································494
나. 빅데이터에 대한 정의 ············································································496
2. 빅데이터와 업무의 관계 ···············································································496
가. 업무상 빅데이터의 필요정도 ·································································496
나. 빅데이터와 업무관련성 ··········································································498
다. 소속기관의 빅데이터 관리능력 ·····························································500
라. 빅데이터 가이드라인 및 시스템 구비 여부 ·········································501
마. 데이터 관리 및 통제 여부 ····································································503
3. 정부기관의 빅데이터 활용 능력 및 제반 여건 ··········································505
가. 정부기관의 빅데이터 관리능력 ·····························································505
나. 빅데이터 업무에 필요한 인프라 ·························································505
다. 빅데이터 관리기구 ·················································································508
라. 공공기관간 데이터 공유 및 공공데이터의 공개수준 ······················509
마. 데이터 관리에 대한 책임 소재 ·····························································510
바. 빅데이터 기반 환경에 대한 신뢰 ·························································510
사. 빅데이터에 대한 수요 분야 및 효과성 ················································512
4. 범죄예방을 위한 개인정보 활용에 대한 인식 ··········································514
가. 개인정보 제공의 필요성 및 제공 의사 ··············································514
나. 개인정보 수집・처리・이용 절차에 대한 인식 ·······································515
다. 범죄예방에 있어 개인정보의 유용성 및 활용가능한 정보유형 ··········521
5. 범죄에 대한 불안 정도 ·················································································526
가. 주거지역의 안전도 ·················································································526
나. 범죄에 대한 불안 ·················································································527
6. 정부 및 정부기관에 대한 신뢰 ····································································529
가. 정보 프라이버시에 대한 염려 ·······························································529
나. 정부에 대한 신뢰 ·················································································533
7. 범죄예방을 위한 빅데이터 활용 여건 ·························································535
가. 범죄예방에 있어서 빅데이터 필요성 ····················································535
나. 빅데이터 활용의 전제조건 ··································································535
다. 범죄예방시스템에 있어서 필요요인과 장애요인 ··································536
라. 빅데이터의 활용범위 ············································································538
마. 빅데이터의 효과 ·····················································································540
8. 개인정보보호에 관한 인식 ···········································································544
가. 개인정보보호의 중요성에 대한 인식 ····················································544
나. 개인정보 제공의 필요성 및 이용의 적절성 ·······································545
다. 온라인 프라이버시에 대한 염려 ·························································546
라. 개인정보주체로서의 인식 ······································································549
제3절 소결 ·······································································································552

❘제6부❘ 빅데이터를 활용한 범죄예방시스템 구축을 위한 제언 ································································555
제1장 빅데이터 기반 범죄예방시스템을 위한 입법적 제언 ······························· 557
제1절 입법적 선결과제 ·················································································559
1. 입법 필요성에 대한 사전적 평가 ································································559
2. 범죄예방을 위한 빅데이터 활용의 법적 근거의 마련 ·······························561
제2절 빅데이터 기반 범죄예방시스템 구축을 위한 입법적 가이드라인 ···· 564
1. 범죄예방을 위한 개인정보 이용에 관한 기본원칙 ·····································564
가. 범죄예방시스템에 적합한 기본원칙 ······················································564
나. 범죄예방을 위한 개인정보보호원칙에 대한 예외의 허용 ···················567
2. 개인정보처리기준의 정립 ·············································································571
가. 이용범위 ··································································································571
나. 보유기간 설정 ························································································572
다. 삭제 및 파기 절차 ···············································································573
3. 개인정보보호를 위한 기술적・절차적 의무 규정 도입 ·······························574
가. 개인정보 익명화 조치 ············································································574
나. 범죄예방시스템에 대한 개인정보 영향평가 ·········································575
다. 개인정보처리시스템의 등록 의무화 ····················································578
4. 정보처리시스템 관리자 및 처리자의 의무 및 책임범위 설정 ···················579
제2장 빅데이터 기반 범죄예방시스템을 위한 정책적 제언 ································· 583
제1절 기술적 관점에서의 제언 ······································································585
1. 형사사법기관내 정보의 유기적 연계시스템의 구축 ···································585
2. 개인정보처리시스템 및 데이터 표준화 ·····················································587
3. 디자인과 초기설정에 의한 프라이버시 보호(Privacy by design, Privacy by default) ··········································································································588
제2절 정책적 관점에서의 제언 ······································································590
1. 정보보호 COMPLIANCE 시스템 도입 ·······················································590
2. 범죄예방에 있어서 프라이버시 가이드라인 ················································591
3. 범죄예방을 위한 빅데이터 활용의 단계적 접근방법 채택 ························593
4. 빅데이터 기반 범죄예방시스템에 대한 사후평가와 피드백 구축 ·············596

첨부파일
  • pdf 첨부파일 15-B-18-빅데이터를 활용한 범죄예방시스템구축방안-편집(16.02.19)-인쇄.pdf (7.26MB / 다운로드 123회) 다운로드
  • jpg 첨부파일 15-B-18_범죄 빅데이터를.JPG (40.67KB / 다운로드 47회) 다운로드
  • 전체다운로드
본 공공저작물은 공공누리 “출처표시+상업적이용금지+변경금지” 조건에 따라 이용할 수 있습니다.
TOPTOP