Use of mobile applications in citizen security
Descripción del Articulo
[...] In the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile devices.Therefore, the objective of this research is to help families with t...
Autores: | , , , |
---|---|
Formato: | artículo |
Fecha de Publicación: | 2023 |
Institución: | Universidad Tecnológica del Perú |
Repositorio: | UTP-Institucional |
Lenguaje: | inglés |
OAI Identifier: | oai:repositorio.utp.edu.pe:20.500.12867/7015 |
Enlace del recurso: | https://hdl.handle.net/20.500.12867/7015 https://doi.org/10.11591/eei.v12i4.5227 |
Nivel de acceso: | acceso abierto |
Materia: | Citizen security Mobile application Crimes of extortion https://purl.org/pe-repo/ocde/ford#1.02.00 |
id |
UTPD_8a417b5d0e956faec1825a4f210f1908 |
---|---|
oai_identifier_str |
oai:repositorio.utp.edu.pe:20.500.12867/7015 |
network_acronym_str |
UTPD |
network_name_str |
UTP-Institucional |
repository_id_str |
4782 |
dc.title.es_PE.fl_str_mv |
Use of mobile applications in citizen security |
title |
Use of mobile applications in citizen security |
spellingShingle |
Use of mobile applications in citizen security Andrade Arenas, Laberiano Matías Citizen security Mobile application Crimes of extortion https://purl.org/pe-repo/ocde/ford#1.02.00 |
title_short |
Use of mobile applications in citizen security |
title_full |
Use of mobile applications in citizen security |
title_fullStr |
Use of mobile applications in citizen security |
title_full_unstemmed |
Use of mobile applications in citizen security |
title_sort |
Use of mobile applications in citizen security |
author |
Andrade Arenas, Laberiano Matías |
author_facet |
Andrade Arenas, Laberiano Matías Chumbe Chocce, Juan Hernández Celis, Domingo Cabanillas-Carbonell, Michael |
author_role |
author |
author2 |
Chumbe Chocce, Juan Hernández Celis, Domingo Cabanillas-Carbonell, Michael |
author2_role |
author author author |
dc.contributor.author.fl_str_mv |
Andrade Arenas, Laberiano Matías Chumbe Chocce, Juan Hernández Celis, Domingo Cabanillas-Carbonell, Michael |
dc.subject.es_PE.fl_str_mv |
Citizen security Mobile application Crimes of extortion |
topic |
Citizen security Mobile application Crimes of extortion https://purl.org/pe-repo/ocde/ford#1.02.00 |
dc.subject.ocde.es_PE.fl_str_mv |
https://purl.org/pe-repo/ocde/ford#1.02.00 |
description |
[...] In the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile devices.Therefore, the objective of this research is to help families with their welfare and safety and motivate the use of mobile applications. In the present work the situation, task, action, dan result (STAR)methodology was applied to elaborate the present work, this technique will allow improving the difficulties of the people. This methodology is very important because it is used to evaluate the circumstances in which people find themselves, a sequence must be followed to achieve the proposed objectives. The result obtained is an average of 84.5% on the design of the mobile prototype; being approved by the experts. The beneficiaries of the research are citizens through the mobile application. |
publishDate |
2023 |
dc.date.accessioned.none.fl_str_mv |
2023-05-26T16:32:31Z |
dc.date.available.none.fl_str_mv |
2023-05-26T16:32:31Z |
dc.date.issued.fl_str_mv |
2023 |
dc.type.es_PE.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.version.es_PE.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
format |
article |
status_str |
publishedVersion |
dc.identifier.issn.none.fl_str_mv |
2302-9285 |
dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/20.500.12867/7015 |
dc.identifier.journal.es_PE.fl_str_mv |
Bulletin of Electrical Engineering and Informatics |
dc.identifier.doi.none.fl_str_mv |
https://doi.org/10.11591/eei.v12i4.5227 |
identifier_str_mv |
2302-9285 Bulletin of Electrical Engineering and Informatics |
url |
https://hdl.handle.net/20.500.12867/7015 https://doi.org/10.11591/eei.v12i4.5227 |
dc.language.iso.es_PE.fl_str_mv |
eng |
language |
eng |
dc.relation.ispartofseries.none.fl_str_mv |
Bulletin of Electrical Engineering and Informatics;vol. 12, n° 4 |
dc.rights.es_PE.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.uri.es_PE.fl_str_mv |
http://creativecommons.org/licenses/by-sa/4.0/ |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-sa/4.0/ |
dc.format.es_PE.fl_str_mv |
application/pdf |
dc.publisher.es_PE.fl_str_mv |
Institute of Advanced Engineering and Science |
dc.publisher.country.es_PE.fl_str_mv |
ID |
dc.source.es_PE.fl_str_mv |
Repositorio Institucional - UTP Universidad Tecnológica del Perú |
dc.source.none.fl_str_mv |
reponame:UTP-Institucional instname:Universidad Tecnológica del Perú instacron:UTP |
instname_str |
Universidad Tecnológica del Perú |
instacron_str |
UTP |
institution |
UTP |
reponame_str |
UTP-Institucional |
collection |
UTP-Institucional |
bitstream.url.fl_str_mv |
http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/2/license.txt http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/1/L.Andrade_Articulo_2023.pdf http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/3/L.Andrade_Articulo_2023.pdf.txt http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/4/L.Andrade_Articulo_2023.pdf.jpg |
bitstream.checksum.fl_str_mv |
8a4605be74aa9ea9d79846c1fba20a33 04044d7028c52e9cc34258a00f97d9d9 ed4729df5a02a99205491d743cd39442 6066add567618b4748730df9580f203e |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional de la Universidad Tecnológica del Perú |
repository.mail.fl_str_mv |
repositorio@utp.edu.pe |
_version_ |
1817984876503105536 |
spelling |
Andrade Arenas, Laberiano MatíasChumbe Chocce, JuanHernández Celis, DomingoCabanillas-Carbonell, Michael2023-05-26T16:32:31Z2023-05-26T16:32:31Z20232302-9285https://hdl.handle.net/20.500.12867/7015Bulletin of Electrical Engineering and Informaticshttps://doi.org/10.11591/eei.v12i4.5227[...] In the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile devices.Therefore, the objective of this research is to help families with their welfare and safety and motivate the use of mobile applications. In the present work the situation, task, action, dan result (STAR)methodology was applied to elaborate the present work, this technique will allow improving the difficulties of the people. This methodology is very important because it is used to evaluate the circumstances in which people find themselves, a sequence must be followed to achieve the proposed objectives. The result obtained is an average of 84.5% on the design of the mobile prototype; being approved by the experts. The beneficiaries of the research are citizens through the mobile application.Campus Lima Centroapplication/pdfengInstitute of Advanced Engineering and ScienceIDBulletin of Electrical Engineering and Informatics;vol. 12, n° 4info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-sa/4.0/Repositorio Institucional - UTPUniversidad Tecnológica del Perúreponame:UTP-Institucionalinstname:Universidad Tecnológica del Perúinstacron:UTPCitizen securityMobile applicationCrimes of extortionhttps://purl.org/pe-repo/ocde/ford#1.02.00Use of mobile applications in citizen securityinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionLICENSElicense.txtlicense.txttext/plain; charset=utf-81748http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/2/license.txt8a4605be74aa9ea9d79846c1fba20a33MD52ORIGINALL.Andrade_Articulo_2023.pdfL.Andrade_Articulo_2023.pdfapplication/pdf1013236http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/1/L.Andrade_Articulo_2023.pdf04044d7028c52e9cc34258a00f97d9d9MD51TEXTL.Andrade_Articulo_2023.pdf.txtL.Andrade_Articulo_2023.pdf.txtExtracted texttext/plain37237http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/3/L.Andrade_Articulo_2023.pdf.txted4729df5a02a99205491d743cd39442MD53THUMBNAILL.Andrade_Articulo_2023.pdf.jpgL.Andrade_Articulo_2023.pdf.jpgGenerated Thumbnailimage/jpeg20746http://repositorio.utp.edu.pe/bitstream/20.500.12867/7015/4/L.Andrade_Articulo_2023.pdf.jpg6066add567618b4748730df9580f203eMD5420.500.12867/7015oai:repositorio.utp.edu.pe:20.500.12867/70152023-05-26 16:35:08.078Repositorio Institucional de la Universidad Tecnológica del Perúrepositorio@utp.edu.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 |
score |
13.95948 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).