Use of mobile applications in citizen security

Descripción del Articulo

[...] In the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile devices.Therefore, the objective of this research is to help families with t...

Descripción completa

Detalles Bibliográficos
Autores: Andrade Arenas, Laberiano Matías, Chumbe Chocce, Juan, Hernández Celis, Domingo, Cabanillas-Carbonell, Michael
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad Tecnológica del Perú
Repositorio:UTP-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.utp.edu.pe:20.500.12867/7015
Enlace del recurso:https://hdl.handle.net/20.500.12867/7015
https://doi.org/10.11591/eei.v12i4.5227
Nivel de acceso:acceso abierto
Materia:Citizen security
Mobile application
Crimes of extortion
https://purl.org/pe-repo/ocde/ford#1.02.00
id UTPD_8a417b5d0e956faec1825a4f210f1908
oai_identifier_str oai:repositorio.utp.edu.pe:20.500.12867/7015
network_acronym_str UTPD
network_name_str UTP-Institucional
repository_id_str 4782
dc.title.es_PE.fl_str_mv Use of mobile applications in citizen security
title Use of mobile applications in citizen security
spellingShingle Use of mobile applications in citizen security
Andrade Arenas, Laberiano Matías
Citizen security
Mobile application
Crimes of extortion
https://purl.org/pe-repo/ocde/ford#1.02.00
title_short Use of mobile applications in citizen security
title_full Use of mobile applications in citizen security
title_fullStr Use of mobile applications in citizen security
title_full_unstemmed Use of mobile applications in citizen security
title_sort Use of mobile applications in citizen security
author Andrade Arenas, Laberiano Matías
author_facet Andrade Arenas, Laberiano Matías
Chumbe Chocce, Juan
Hernández Celis, Domingo
Cabanillas-Carbonell, Michael
author_role author
author2 Chumbe Chocce, Juan
Hernández Celis, Domingo
Cabanillas-Carbonell, Michael
author2_role author
author
author
dc.contributor.author.fl_str_mv Andrade Arenas, Laberiano Matías
Chumbe Chocce, Juan
Hernández Celis, Domingo
Cabanillas-Carbonell, Michael
dc.subject.es_PE.fl_str_mv Citizen security
Mobile application
Crimes of extortion
topic Citizen security
Mobile application
Crimes of extortion
https://purl.org/pe-repo/ocde/ford#1.02.00
dc.subject.ocde.es_PE.fl_str_mv https://purl.org/pe-repo/ocde/ford#1.02.00
description [...] In the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile devices.Therefore, the objective of this research is to help families with their welfare and safety and motivate the use of mobile applications. In the present work the situation, task, action, dan result (STAR)methodology was applied to elaborate the present work, this technique will allow improving the difficulties of the people. This methodology is very important because it is used to evaluate the circumstances in which people find themselves, a sequence must be followed to achieve the proposed objectives. The result obtained is an average of 84.5% on the design of the mobile prototype; being approved by the experts. The beneficiaries of the research are citizens through the mobile application.
publishDate 2023
dc.date.accessioned.none.fl_str_mv 2023-05-26T16:32:31Z
dc.date.available.none.fl_str_mv 2023-05-26T16:32:31Z
dc.date.issued.fl_str_mv 2023
dc.type.es_PE.fl_str_mv info:eu-repo/semantics/article
dc.type.version.es_PE.fl_str_mv info:eu-repo/semantics/publishedVersion
format article
status_str publishedVersion
dc.identifier.issn.none.fl_str_mv 2302-9285
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.12867/7015
dc.identifier.journal.es_PE.fl_str_mv Bulletin of Electrical Engineering and Informatics
dc.identifier.doi.none.fl_str_mv https://doi.org/10.11591/eei.v12i4.5227
identifier_str_mv 2302-9285
Bulletin of Electrical Engineering and Informatics
url https://hdl.handle.net/20.500.12867/7015
https://doi.org/10.11591/eei.v12i4.5227
dc.language.iso.es_PE.fl_str_mv eng
language eng
dc.relation.ispartofseries.none.fl_str_mv Bulletin of Electrical Engineering and Informatics;vol. 12, n° 4
dc.rights.es_PE.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.uri.es_PE.fl_str_mv http://creativecommons.org/licenses/by-sa/4.0/
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-sa/4.0/
dc.format.es_PE.fl_str_mv application/pdf
dc.publisher.es_PE.fl_str_mv Institute of Advanced Engineering and Science
dc.publisher.country.es_PE.fl_str_mv ID
dc.source.es_PE.fl_str_mv Repositorio Institucional - UTP
Universidad Tecnológica del Perú
dc.source.none.fl_str_mv reponame:UTP-Institucional
instname:Universidad Tecnológica del Perú
instacron:UTP
instname_str Universidad Tecnológica del Perú
instacron_str UTP
institution UTP
reponame_str UTP-Institucional
collection UTP-Institucional
bitstream.url.fl_str_mv http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/2/license.txt
http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/1/L.Andrade_Articulo_2023.pdf
http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/3/L.Andrade_Articulo_2023.pdf.txt
http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/4/L.Andrade_Articulo_2023.pdf.jpg
bitstream.checksum.fl_str_mv 8a4605be74aa9ea9d79846c1fba20a33
04044d7028c52e9cc34258a00f97d9d9
ed4729df5a02a99205491d743cd39442
6066add567618b4748730df9580f203e
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional de la Universidad Tecnológica del Perú
repository.mail.fl_str_mv repositorio@utp.edu.pe
_version_ 1817984876503105536
spelling Andrade Arenas, Laberiano MatíasChumbe Chocce, JuanHernández Celis, DomingoCabanillas-Carbonell, Michael2023-05-26T16:32:31Z2023-05-26T16:32:31Z20232302-9285https://hdl.handle.net/20.500.12867/7015Bulletin of Electrical Engineering and Informaticshttps://doi.org/10.11591/eei.v12i4.5227[...] In the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile devices.Therefore, the objective of this research is to help families with their welfare and safety and motivate the use of mobile applications. In the present work the situation, task, action, dan result (STAR)methodology was applied to elaborate the present work, this technique will allow improving the difficulties of the people. This methodology is very important because it is used to evaluate the circumstances in which people find themselves, a sequence must be followed to achieve the proposed objectives. The result obtained is an average of 84.5% on the design of the mobile prototype; being approved by the experts. The beneficiaries of the research are citizens through the mobile application.Campus Lima Centroapplication/pdfengInstitute of Advanced Engineering and ScienceIDBulletin of Electrical Engineering and Informatics;vol. 12, n° 4info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-sa/4.0/Repositorio Institucional - UTPUniversidad Tecnológica del Perúreponame:UTP-Institucionalinstname:Universidad Tecnológica del Perúinstacron:UTPCitizen securityMobile applicationCrimes of extortionhttps://purl.org/pe-repo/ocde/ford#1.02.00Use of mobile applications in citizen securityinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionLICENSElicense.txtlicense.txttext/plain; charset=utf-81748http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/2/license.txt8a4605be74aa9ea9d79846c1fba20a33MD52ORIGINALL.Andrade_Articulo_2023.pdfL.Andrade_Articulo_2023.pdfapplication/pdf1013236http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/1/L.Andrade_Articulo_2023.pdf04044d7028c52e9cc34258a00f97d9d9MD51TEXTL.Andrade_Articulo_2023.pdf.txtL.Andrade_Articulo_2023.pdf.txtExtracted texttext/plain37237http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/3/L.Andrade_Articulo_2023.pdf.txted4729df5a02a99205491d743cd39442MD53THUMBNAILL.Andrade_Articulo_2023.pdf.jpgL.Andrade_Articulo_2023.pdf.jpgGenerated Thumbnailimage/jpeg20746http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/4/L.Andrade_Articulo_2023.pdf.jpg6066add567618b4748730df9580f203eMD5420.500.12867/7015oai:repositorio.utp.edu.pe:20.500.12867/70152023-05-26 16:35:08.078Repositorio Institucional de la Universidad Tecnológica del Perúrepositorio@utp.edu.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
score 13.95948
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).