Use of mobile applications in citizen security

Descripción del Articulo

“An abstract is often presented separately from the article, so it must be able to in the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile...

Descripción completa

Detalles Bibliográficos
Autores: Chumbe Chocce, Juan, Andrade-Arenas, Laberiano, Hernández Celis, Domingo, Cabanillas-Carbonell, Michael
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad Privada Norbert Wiener
Repositorio:UWIENER-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.uwiener.edu.pe:20.500.13053/9100
Enlace del recurso:https://hdl.handle.net/20.500.13053/9100
Nivel de acceso:acceso abierto
Materia:Citizen security Crimes of extortion Mobile application Public safety STAR methodology
1.02.00 -- Informática y Ciencias de la Información
id UWIE_3fe5e1b580a8a087608ffe1399ffbeb7
oai_identifier_str oai:repositorio.uwiener.edu.pe:20.500.13053/9100
network_acronym_str UWIE
network_name_str UWIENER-Institucional
repository_id_str 9398
dc.title.es_PE.fl_str_mv Use of mobile applications in citizen security
title Use of mobile applications in citizen security
spellingShingle Use of mobile applications in citizen security
Chumbe Chocce, Juan
Citizen security Crimes of extortion Mobile application Public safety STAR methodology
1.02.00 -- Informática y Ciencias de la Información
title_short Use of mobile applications in citizen security
title_full Use of mobile applications in citizen security
title_fullStr Use of mobile applications in citizen security
title_full_unstemmed Use of mobile applications in citizen security
title_sort Use of mobile applications in citizen security
author Chumbe Chocce, Juan
author_facet Chumbe Chocce, Juan
Andrade-Arenas, Laberiano
Hernández Celis, Domingo
Cabanillas-Carbonell, Michael
author_role author
author2 Andrade-Arenas, Laberiano
Hernández Celis, Domingo
Cabanillas-Carbonell, Michael
author2_role author
author
author
dc.contributor.author.fl_str_mv Chumbe Chocce, Juan
Andrade-Arenas, Laberiano
Hernández Celis, Domingo
Cabanillas-Carbonell, Michael
dc.subject.es_PE.fl_str_mv Citizen security Crimes of extortion Mobile application Public safety STAR methodology
topic Citizen security Crimes of extortion Mobile application Public safety STAR methodology
1.02.00 -- Informática y Ciencias de la Información
dc.subject.ocde.es_PE.fl_str_mv 1.02.00 -- Informática y Ciencias de la Información
description “An abstract is often presented separately from the article, so it must be able to in the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile devices. Therefore, the objective of this research is to help families with their welfare and safety and motivate the use of mobile applications. In the present work the situation, task, action, dan result (STAR) methodology was applied to elaborate the present work, this technique will allow improving the difficulties of the people. This methodology is very important because it is used to evaluate the circumstances in which people find themselves, a sequence must be followed to achieve the proposed objectives. The result obtained is an average of 84.5% on the design of the mobile prototype; being approved by the experts. The beneficiaries of the research are citizens through the mobile application. “
publishDate 2023
dc.date.accessioned.none.fl_str_mv 2023-08-01T15:11:01Z
dc.date.available.none.fl_str_mv 2023-08-01T15:11:01Z
dc.date.issued.fl_str_mv 2023-01-25
dc.type.es_PE.fl_str_mv info:eu-repo/semantics/article
dc.type.version.es_PE.fl_str_mv info:eu-repo/semantics/publishedVersion
format article
status_str publishedVersion
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.13053/9100
dc.identifier.doi.none.fl_str_mv 10.11591/beei.v12i4.5227
url https://hdl.handle.net/20.500.13053/9100
identifier_str_mv 10.11591/beei.v12i4.5227
dc.language.iso.es_PE.fl_str_mv eng
language eng
dc.rights.es_PE.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.uri.es_PE.fl_str_mv https://creativecommons.org/licenses/by/4.0/
eu_rights_str_mv openAccess
rights_invalid_str_mv https://creativecommons.org/licenses/by/4.0/
dc.format.es_PE.fl_str_mv application/pdf
dc.publisher.es_PE.fl_str_mv Institute of Advanced Engineering and Science (IAES)
dc.publisher.country.es_PE.fl_str_mv ID
dc.source.none.fl_str_mv reponame:UWIENER-Institucional
instname:Universidad Privada Norbert Wiener
instacron:UWIENER
instname_str Universidad Privada Norbert Wiener
instacron_str UWIENER
institution UWIENER
reponame_str UWIENER-Institucional
collection UWIENER-Institucional
bitstream.url.fl_str_mv https://dspace-uwiener.metabuscador.org/bitstreams/497fcc06-c9c4-426e-b092-c9bb25033075/download
https://dspace-uwiener.metabuscador.org/bitstreams/23007d2c-9396-4a5e-bf1e-3fbc10bc44ce/download
https://dspace-uwiener.metabuscador.org/bitstreams/57b2ddfb-5491-4ab7-af0e-d809243caf66/download
https://dspace-uwiener.metabuscador.org/bitstreams/1564f4af-3baf-4fee-9ce2-e8ea4786b48d/download
bitstream.checksum.fl_str_mv 04044d7028c52e9cc34258a00f97d9d9
8a4605be74aa9ea9d79846c1fba20a33
ed4729df5a02a99205491d743cd39442
e6423c0e33a1c541586bee4dcb0655d1
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional de la Universidad de Wiener
repository.mail.fl_str_mv bdigital@metabiblioteca.com
_version_ 1835828758701932544
spelling Chumbe Chocce, JuanAndrade-Arenas, LaberianoHernández Celis, DomingoCabanillas-Carbonell, Michael2023-08-01T15:11:01Z2023-08-01T15:11:01Z2023-01-25https://hdl.handle.net/20.500.13053/910010.11591/beei.v12i4.5227“An abstract is often presented separately from the article, so it must be able to in the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile devices. Therefore, the objective of this research is to help families with their welfare and safety and motivate the use of mobile applications. In the present work the situation, task, action, dan result (STAR) methodology was applied to elaborate the present work, this technique will allow improving the difficulties of the people. This methodology is very important because it is used to evaluate the circumstances in which people find themselves, a sequence must be followed to achieve the proposed objectives. The result obtained is an average of 84.5% on the design of the mobile prototype; being approved by the experts. The beneficiaries of the research are citizens through the mobile application. “application/pdfengInstitute of Advanced Engineering and Science (IAES)IDinfo:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by/4.0/Citizen security Crimes of extortion Mobile application Public safety STAR methodology1.02.00 -- Informática y Ciencias de la InformaciónUse of mobile applications in citizen securityinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionreponame:UWIENER-Institucionalinstname:Universidad Privada Norbert Wienerinstacron:UWIENERPublicationORIGINAL5227-14686-1-PB.pdf5227-14686-1-PB.pdfapplication/pdf1013236https://dspace-uwiener.metabuscador.org/bitstreams/497fcc06-c9c4-426e-b092-c9bb25033075/download04044d7028c52e9cc34258a00f97d9d9MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://dspace-uwiener.metabuscador.org/bitstreams/23007d2c-9396-4a5e-bf1e-3fbc10bc44ce/download8a4605be74aa9ea9d79846c1fba20a33MD52TEXT5227-14686-1-PB.pdf.txt5227-14686-1-PB.pdf.txtExtracted texttext/plain37237https://dspace-uwiener.metabuscador.org/bitstreams/57b2ddfb-5491-4ab7-af0e-d809243caf66/downloaded4729df5a02a99205491d743cd39442MD53THUMBNAIL5227-14686-1-PB.pdf.jpg5227-14686-1-PB.pdf.jpgGenerated Thumbnailimage/jpeg10872https://dspace-uwiener.metabuscador.org/bitstreams/1564f4af-3baf-4fee-9ce2-e8ea4786b48d/downloade6423c0e33a1c541586bee4dcb0655d1MD5420.500.13053/9100oai:dspace-uwiener.metabuscador.org:20.500.13053/91002024-12-13 11:43:02.392https://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/openAccessopen.accesshttps://dspace-uwiener.metabuscador.orgRepositorio Institucional de la Universidad de Wienerbdigital@metabiblioteca.comTk9URTogUExBQ0UgWU9VUiBPV04gTElDRU5TRSBIRVJFClRoaXMgc2FtcGxlIGxpY2Vuc2UgaXMgcHJvdmlkZWQgZm9yIGluZm9ybWF0aW9uYWwgcHVycG9zZXMgb25seS4KCk5PTi1FWENMVVNJVkUgRElTVFJJQlVUSU9OIExJQ0VOU0UKCkJ5IHNpZ25pbmcgYW5kIHN1Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3Iocykgb3IgY29weXJpZ2h0Cm93bmVyKSBncmFudHMgdG8gRFNwYWNlIFVuaXZlcnNpdHkgKERTVSkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBEU1UgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgRFNVIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgRFNVIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gRFNVLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpEU1Ugd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
score 13.905282
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).