Contact Us Search Paper

Intelligent Technology to Enhance Policing and Public Accountability

Aloísio Vieira Lira Neto1,2,*

Corresponding Author:

Aloísio Vieira Lira Neto

Affiliation(s):

1 Brazilian Federal Highway Police, Fortaleza/CE, Brazil
2 University of Fortaleza, Fortaleza/CE, Brazil
*Corresponding Author

Abstract:

In view of the situation of violence faced in Brazil, several actors, from the most diverse areas of knowledge, have been dedicated to studying, analyzing and proposing solutions for public security. The great challenge of much of what is produced is to combine theory with practice. In addition, the fact that we do not have State policies, but Government policies contribute significantly to the lack of long-term studies. Discontinuities, whether due to the ineffectiveness of what is proposed, or due to cultural and organizational changes in crime, preclude a cycle of planning, execution, evaluation and correction. This brings us to the first observation of modern public security: volatility. Thus, it is impossible to imagine modern management without the use of technology for the quick and assertive analysis of the problems faced. In this sense, the use of the intelligence, strategy, and technology triad becomes essential for accurate monitoring of these changes, providing guidelines and subsidies for the modernization of public security management and security and policing matrix. Given these statements, the present study has the general objective of presenting the Policy to Combat the Mobility of Crime and its effects on the Public Security of the State of Cear[Pleaseinsert“PrerenderUnicode–˝intopreamble] (Brazil), referring to the period from 2017 to 2019. Through an empirical analysis, statistical data were collected to present a direct scenario of the implementation and the results achieved and present the theoretical relationship between the actions and the results, thus providing an exploratory depth of the facts and their impacts. In order to show the positive results achieved, a quantitative and qualitative method was used to correlate aspects and concepts in the large area of the humanities with practical policing and technological applications. As a result of the implementation of the Combating the Mobility of Crime, the State of Cear[Pleaseinsert“PrerenderUnicode–˝intopreamble] managed to place the number of robberies and homicides among the lowest rates of the decade, gaining national prominence of strategy and technology employed. Thus, the Policy to Combat the Mobility of Crime changed the policing matrix, allowing greater efficiency of the resources used and better monitoring the indicators.

Keywords:

Expert Systems, Intelligent Systems, Crime Mobility, Indicative Police System Approach, Territorial Protection and Risk Management Program, Public Security Strategy

Downloads: 348 Views: 3497
Cite This Paper:

Neto, Aloísio V. Lira (2021). Intelligent Technology to Enhance Policing and Public Accountability. Journal of Artificial Intelligence and Systems, 3, 48–67. https://doi.org/10.33969/AIS.2021.31004.

References:

[1] Metropolitan police. Engineering Technology, 1(2):57–57, 2006.
[2] David H Bayley. Padroes de Policiamento: Uma Analise Comparativa Internacional-Capıtulo 2. Edusp, 2017.
[3] Claudio C BEATO FILHO. Acao e estrategia das organizacoes policiais. In CONGRESSO DO PROJETO “POLICIA E SOCIEDADE DEMOCRATICA, volume 2, 1999.
[4] Gary S Becker. Crime and punishment: An economic approach. In The economic dimensions of crime, pages 13–68. Springer, 1968.
[5] Daniel Cerqueira and Waldir Lobao. Determinantes da criminalidade: arcaboucos teoricos e resultados empıricos. Dados, 47(2):233–269, 2004.
[6] Xiaoliang Che, Tanping Zhou, Ningbo Li, Haonan Zhou, Zhenhua Chen, and Xiaoyuan Yang. Modified multi-key fully homomorphic encryption based on ntru cryptosystem without key-switching. Tsinghua Science and Technology, 25(5):564–578, 2020.
[7] Ronald V Clarke and Marcus Felson. Routine activity and rational choice. new brunswick, 1993.
[8] Lawrence E Cohen and Marcus Felson. Social change and crime rate trends: A routine activity approach. American sociological review, pages 588–608, 1979.
[9] Clive Harfield. E-policing and the social contract. IEEE Technology and Society Magazine, 31(1):33–41, 2012.
[10] Roslin V Hauck, H Atabakhsb, Pichai Ongvasith, Harsh Gupta, and Hsinchun Chen. Using coplink to analyze criminal-justice data. Computer, 35(3):30–37, 2002.
[11] Jesse Hirsh. Predictive policing and civilian oversight: What will it take to get it right?IEEE Potentials, 35(5):19–22, 2016.
[12] P Hosmer. Use of laser scanning technology for perimeter protection. IEEE Aerospace and Electronic Systems Magazine, 19(8):13–17, 2004.
[13] Tanveer Hussain, Khan Muhammad, Amin Ullah, Zehong Cao, Sung Wook Baik, and Victor Hugo C de Albuquerque. Cloud-assisted multiview video summarization using cnn and bidirectional lstm. IEEE Transactions on Industrial Informatics, 16(1):77–86, 2019.
[14] Tanveer Hussain, Khan Muhammad, Amin Ullah, Javier Del Ser, Amir H Gandomi, Muhammad Sajjad, Sung Wook Baik, and Victor Hugo C de Albuquerque. Multi-view summarization and activity recognition meet edge computing in iot environments. IEEE Internet of Things Journal, 2020.
[15] Tanveer Hussain, Khan Muhammad, Weiping Ding, Jaime Lloret, Sung Wook Baik, and Victor Hugo C de Albuquerque. A comprehensive survey of multi-view video summarization. Pattern Recognition, 109:107567, 2021.
[16] E Ray Knickel and Albert W Van Horn. Improving police command and control with a patrol car emitter-call box sensor car location system. IEEE Transactions on Vehicular Technology, 19(2):178–184, 1970.
[17] Polychronis Koutsakis and Michael Paterakis. Call-admission-control and traffic-policing mechanisms for the transmission of videoconference traffic from mpeg-4 and h. 263 video coders in wireless atm networks. IEEE transactions on vehicular technology, 53(5):1525–1530, 2004.
[18] Jean Kumagai. Techno cops [police robotic and electronic technology]. IEEE Spectrum, 39(12):34–39, 2002.
[19] Richard C Larson, Kent W Colton, and Gilbert C Larson. Evaluating a police-implemented avm system: The st. louis experience (phase i). IEEE Transactions on Vehicular Technology, 26(1):60–70, 1977.
[20] Zheyu Li, Yongzhong Zhu, Hengliang Yang, Guohao Peng, and Xiaoyu Liu. A dual-band omnidirectional circular polarized antenna using composite right/left-handed transmission line with rectangular slits for unmanned aerial vehicle applications. IEEE Access, 8:100586–100595, 2020.
[21] Shuai Liu, Chunli Guo, Fadi Al-Turjman, Khan Muhammad, and Victor Hugo C de Albuquerque. Reliability of response region: a novel mechanism in visual tracking by edge computing for iiot environments. Mechanical Systems and Signal Processing, 138:106537, 2020.
[22] Josh Loeb. Algorithms on the beat: Ai and the future of policing. Engineering & Technology, 13(4):26–30, 2018.
[23] Naercio Magaia, Ramon Fonseca, Khan Muhammad, Afonso H Fontes N Segundo, Aloisio V Lira Neto, and Victor Hugo C de Albuquerque. Industrial internet of things security enhanced with deep learning approaches for smart cities. IEEE Internet of Things Journal, 2020.
[24] Gary T Marx. The public as partner? technology can make us auxiliaries as well as vigilantes. IEEE Security & Privacy, 11(5):56–61, 2013.
[25] Mohammed Muaafa and Jose Emmanuel Ramirez-Marquez. Engineering management models for urban security. IEEE Transactions on Engineering Management, 64(1): 29–41, 2016.
[26] Khan Muhammad, Tanveer Hussain, Muhammad Tanveer, Giovanna Sannino, and Victor Hugo C de Albuquerque. Cost-effective video summarization using deep cnn with hierarchical weighted fusion for iot surveillance networks. IEEE Internet of Things Journal, 7(5):4455–4463, 2019.
[27] Oscar Newman. Defensible space. Macmillan New York, 1972.
[28] Koichi Ogawa, Tomoki Uwano, and Masao Takahashi. A shoulder-mounted planar antenna for mobile radio applications. IEEE Transactions on Vehicular Technology, 49(3):1041–1044, 2000.
[29] David O’Reilly. Availability of required data to support criminal investigations involving large-scale ip address–sharing technologies. IEEE Security & Privacy, 15(5):90–93, 2017.
[30] Marcos Rolim. A s´ındrome da rainha vermelha. Policiamento e seguran¸ca p´ublica no s´eculo XXI. Rio de Janeiro: Jorge Zahar, 2006.
[31] Renato Saboya. Seguranc¸a nas cidades: Oscar newman e os espa¸cos defens´aveis, 2012.
[32] K Shankar, SK Lakshmanaprabu, Deepak Gupta, Ashish Khanna, and Victor Hugo C de Albuquerque. Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, 32(4):e5122, 2020.
[33] Kar Yan Tam, Yue Katherine Feng, and Michael C Lai. Effective use of policing systems: A two-stage study of the shakedown period of system implementation. IEEE Transactions on Engineering Management, 2019.
[34] Amin Ullah, Khan Muhammad, Javier Del Ser, Sung Wook Baik, and Victor Hugo C de Albuquerque. Activity recognition using temporal optical flow convolutional features and multilayer lstm. IEEE Transactions on Industrial Electronics, 66(12): 9692–9702, 2018.
[35] Jingjing Wang, Yiliang Han, and Xiaoyuan Yang. An efficient location privacy protection scheme based on the chinese remainder theorem. Tsinghua Science and Technology, 21(3):260–269, 2016.[36] Carlin Wong. Clifford r. shaw and henry d. mckay: The social disorganization theory, 2011.
[37] Hao Yin, Qiang Fu, Chuang Lin, Zhangxi Tan, Rang Ding, Yishu Lin, Yanxi Li, and Yanfei Fan. Mobile police information system based on web services. Tsinghua science and technology, 11(1):1–7, 2006.
[38] Wei Yuan, Pan Deng, Chao Yang, Jiafu Wan, Daqiang Zhang, Xiantong Chen, Chaofan Bi, and Yali Liu. A smart work performance measurement system for police officers. IEEE Access, 3:1755–1764, 2015.
[39] Neng Zhou, Minqing Zhang, Han Wang, Yan Ke, and Fuqiang Di. Separable reversible data hiding scheme in homomorphic encrypted domain based on ntru. IEEE Access, 8: 81412–81424, 2020.
[40] Biaokai Zhu, Xinyi Hou, Sanman Liu, Wanli Ma, Meiya Dong, Haibin Wen, Qing Wei, Sixuan Du, and Yufeng Zhang. Iot equipment monitoring system based on c5. 0 decision tree and time-series analysis. IEEE Access, 2021.