Exportación Completada — 

Use of mobile applications in citizen security

Descripción del Articulo

[...] In the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile devices.Therefore, the objective of this research is to help families with t...

Descripción completa

Detalles Bibliográficos
Autores: Andrade Arenas, Laberiano Matías, Chumbe Chocce, Juan, Hernández Celis, Domingo, Cabanillas-Carbonell, Michael
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad Tecnológica del Perú
Repositorio:UTP-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.utp.edu.pe:20.500.12867/7015
Enlace del recurso:https://hdl.handle.net/20.500.12867/7015
https://doi.org/10.11591/eei.v12i4.5227
Nivel de acceso:acceso abierto
Materia:Citizen security
Mobile application
Crimes of extortion
https://purl.org/pe-repo/ocde/ford#1.02.00
Descripción
Sumario:[...] In the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile devices.Therefore, the objective of this research is to help families with their welfare and safety and motivate the use of mobile applications. In the present work the situation, task, action, dan result (STAR)methodology was applied to elaborate the present work, this technique will allow improving the difficulties of the people. This methodology is very important because it is used to evaluate the circumstances in which people find themselves, a sequence must be followed to achieve the proposed objectives. The result obtained is an average of 84.5% on the design of the mobile prototype; being approved by the experts. The beneficiaries of the research are citizens through the mobile application.
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).