Use of mobile applications in citizen security
Descripción del Articulo
“An abstract is often presented separately from the article, so it must be able to in the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile...
| Autores: | , , , |
|---|---|
| Formato: | artículo |
| Fecha de Publicación: | 2023 |
| Institución: | Universidad Privada Norbert Wiener |
| Repositorio: | UWIENER-Institucional |
| Lenguaje: | inglés |
| OAI Identifier: | oai:repositorio.uwiener.edu.pe:20.500.13053/9100 |
| Enlace del recurso: | https://hdl.handle.net/20.500.13053/9100 |
| Nivel de acceso: | acceso abierto |
| Materia: | Citizen security Crimes of extortion Mobile application Public safety STAR methodology 1.02.00 -- Informática y Ciencias de la Información |
| id |
UWIE_3fe5e1b580a8a087608ffe1399ffbeb7 |
|---|---|
| oai_identifier_str |
oai:repositorio.uwiener.edu.pe:20.500.13053/9100 |
| network_acronym_str |
UWIE |
| network_name_str |
UWIENER-Institucional |
| repository_id_str |
9398 |
| dc.title.es_PE.fl_str_mv |
Use of mobile applications in citizen security |
| title |
Use of mobile applications in citizen security |
| spellingShingle |
Use of mobile applications in citizen security Chumbe Chocce, Juan Citizen security Crimes of extortion Mobile application Public safety STAR methodology 1.02.00 -- Informática y Ciencias de la Información |
| title_short |
Use of mobile applications in citizen security |
| title_full |
Use of mobile applications in citizen security |
| title_fullStr |
Use of mobile applications in citizen security |
| title_full_unstemmed |
Use of mobile applications in citizen security |
| title_sort |
Use of mobile applications in citizen security |
| author |
Chumbe Chocce, Juan |
| author_facet |
Chumbe Chocce, Juan Andrade-Arenas, Laberiano Hernández Celis, Domingo Cabanillas-Carbonell, Michael |
| author_role |
author |
| author2 |
Andrade-Arenas, Laberiano Hernández Celis, Domingo Cabanillas-Carbonell, Michael |
| author2_role |
author author author |
| dc.contributor.author.fl_str_mv |
Chumbe Chocce, Juan Andrade-Arenas, Laberiano Hernández Celis, Domingo Cabanillas-Carbonell, Michael |
| dc.subject.es_PE.fl_str_mv |
Citizen security Crimes of extortion Mobile application Public safety STAR methodology |
| topic |
Citizen security Crimes of extortion Mobile application Public safety STAR methodology 1.02.00 -- Informática y Ciencias de la Información |
| dc.subject.ocde.es_PE.fl_str_mv |
1.02.00 -- Informática y Ciencias de la Información |
| description |
“An abstract is often presented separately from the article, so it must be able to in the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile devices. Therefore, the objective of this research is to help families with their welfare and safety and motivate the use of mobile applications. In the present work the situation, task, action, dan result (STAR) methodology was applied to elaborate the present work, this technique will allow improving the difficulties of the people. This methodology is very important because it is used to evaluate the circumstances in which people find themselves, a sequence must be followed to achieve the proposed objectives. The result obtained is an average of 84.5% on the design of the mobile prototype; being approved by the experts. The beneficiaries of the research are citizens through the mobile application. “ |
| publishDate |
2023 |
| dc.date.accessioned.none.fl_str_mv |
2023-08-01T15:11:01Z |
| dc.date.available.none.fl_str_mv |
2023-08-01T15:11:01Z |
| dc.date.issued.fl_str_mv |
2023-01-25 |
| dc.type.es_PE.fl_str_mv |
info:eu-repo/semantics/article |
| dc.type.version.es_PE.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
| format |
article |
| status_str |
publishedVersion |
| dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/20.500.13053/9100 |
| dc.identifier.doi.none.fl_str_mv |
10.11591/beei.v12i4.5227 |
| url |
https://hdl.handle.net/20.500.13053/9100 |
| identifier_str_mv |
10.11591/beei.v12i4.5227 |
| dc.language.iso.es_PE.fl_str_mv |
eng |
| language |
eng |
| dc.rights.es_PE.fl_str_mv |
info:eu-repo/semantics/openAccess |
| dc.rights.uri.es_PE.fl_str_mv |
https://creativecommons.org/licenses/by/4.0/ |
| eu_rights_str_mv |
openAccess |
| rights_invalid_str_mv |
https://creativecommons.org/licenses/by/4.0/ |
| dc.format.es_PE.fl_str_mv |
application/pdf |
| dc.publisher.es_PE.fl_str_mv |
Institute of Advanced Engineering and Science (IAES) |
| dc.publisher.country.es_PE.fl_str_mv |
ID |
| dc.source.none.fl_str_mv |
reponame:UWIENER-Institucional instname:Universidad Privada Norbert Wiener instacron:UWIENER |
| instname_str |
Universidad Privada Norbert Wiener |
| instacron_str |
UWIENER |
| institution |
UWIENER |
| reponame_str |
UWIENER-Institucional |
| collection |
UWIENER-Institucional |
| bitstream.url.fl_str_mv |
https://dspace-uwiener.metabuscador.org/bitstreams/497fcc06-c9c4-426e-b092-c9bb25033075/download https://dspace-uwiener.metabuscador.org/bitstreams/23007d2c-9396-4a5e-bf1e-3fbc10bc44ce/download https://dspace-uwiener.metabuscador.org/bitstreams/57b2ddfb-5491-4ab7-af0e-d809243caf66/download https://dspace-uwiener.metabuscador.org/bitstreams/1564f4af-3baf-4fee-9ce2-e8ea4786b48d/download |
| bitstream.checksum.fl_str_mv |
04044d7028c52e9cc34258a00f97d9d9 8a4605be74aa9ea9d79846c1fba20a33 ed4729df5a02a99205491d743cd39442 e6423c0e33a1c541586bee4dcb0655d1 |
| bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 |
| repository.name.fl_str_mv |
Repositorio Institucional de la Universidad de Wiener |
| repository.mail.fl_str_mv |
bdigital@metabiblioteca.com |
| _version_ |
1835828758701932544 |
| spelling |
Chumbe Chocce, JuanAndrade-Arenas, LaberianoHernández Celis, DomingoCabanillas-Carbonell, Michael2023-08-01T15:11:01Z2023-08-01T15:11:01Z2023-01-25https://hdl.handle.net/20.500.13053/910010.11591/beei.v12i4.5227“An abstract is often presented separately from the article, so it must be able to in the following article the use of the mobile application is recommended as a tool that serves public safety because currently crimes of extortion and fraud are committed by making false calls to people's mobile devices. Therefore, the objective of this research is to help families with their welfare and safety and motivate the use of mobile applications. In the present work the situation, task, action, dan result (STAR) methodology was applied to elaborate the present work, this technique will allow improving the difficulties of the people. This methodology is very important because it is used to evaluate the circumstances in which people find themselves, a sequence must be followed to achieve the proposed objectives. The result obtained is an average of 84.5% on the design of the mobile prototype; being approved by the experts. The beneficiaries of the research are citizens through the mobile application. “application/pdfengInstitute of Advanced Engineering and Science (IAES)IDinfo:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by/4.0/Citizen security Crimes of extortion Mobile application Public safety STAR methodology1.02.00 -- Informática y Ciencias de la InformaciónUse of mobile applications in citizen securityinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionreponame:UWIENER-Institucionalinstname:Universidad Privada Norbert Wienerinstacron:UWIENERPublicationORIGINAL5227-14686-1-PB.pdf5227-14686-1-PB.pdfapplication/pdf1013236https://dspace-uwiener.metabuscador.org/bitstreams/497fcc06-c9c4-426e-b092-c9bb25033075/download04044d7028c52e9cc34258a00f97d9d9MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://dspace-uwiener.metabuscador.org/bitstreams/23007d2c-9396-4a5e-bf1e-3fbc10bc44ce/download8a4605be74aa9ea9d79846c1fba20a33MD52TEXT5227-14686-1-PB.pdf.txt5227-14686-1-PB.pdf.txtExtracted texttext/plain37237https://dspace-uwiener.metabuscador.org/bitstreams/57b2ddfb-5491-4ab7-af0e-d809243caf66/downloaded4729df5a02a99205491d743cd39442MD53THUMBNAIL5227-14686-1-PB.pdf.jpg5227-14686-1-PB.pdf.jpgGenerated Thumbnailimage/jpeg10872https://dspace-uwiener.metabuscador.org/bitstreams/1564f4af-3baf-4fee-9ce2-e8ea4786b48d/downloade6423c0e33a1c541586bee4dcb0655d1MD5420.500.13053/9100oai:dspace-uwiener.metabuscador.org:20.500.13053/91002024-12-13 11:43:02.392https://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/openAccessopen.accesshttps://dspace-uwiener.metabuscador.orgRepositorio Institucional de la Universidad de Wienerbdigital@metabiblioteca.comTk9URTogUExBQ0UgWU9VUiBPV04gTElDRU5TRSBIRVJFClRoaXMgc2FtcGxlIGxpY2Vuc2UgaXMgcHJvdmlkZWQgZm9yIGluZm9ybWF0aW9uYWwgcHVycG9zZXMgb25seS4KCk5PTi1FWENMVVNJVkUgRElTVFJJQlVUSU9OIExJQ0VOU0UKCkJ5IHNpZ25pbmcgYW5kIHN1Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3Iocykgb3IgY29weXJpZ2h0Cm93bmVyKSBncmFudHMgdG8gRFNwYWNlIFVuaXZlcnNpdHkgKERTVSkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBEU1UgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgRFNVIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgRFNVIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gRFNVLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpEU1Ugd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo= |
| score |
13.905282 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).