Towards a Holistic ICT Platform for Protecting Intimate Partner Violence Survivors Based on the IoT Paradigm
Abstract
:Featured Application
Abstract
1. Introduction
2. Hardware-Based Solutions: Telemonitoring
2.1. Wearable Devices Structured in a Body Area Network (BAN) Environment Within an Internet of Things (IoT) Context
- Location
- Movement
- Heart rate
- Temperature
- Perspiration
- Blood pressure
- Schedule (habits)
- Other physical features considered in the system, with the aim of personalizing their management, such as age, height and weight
- Keep the software responsible for managing a risky situation and supervise the survivor protection.
- Gather information from wearables devices. There are many possibilities for connectivity, including not only 4G/5G, but also Bluetooth, Wi-Fi, NFC (Near Field Communication), Ant+, and so on, offering a plethora of different choices.
- Send data and information to the cloud, to be either stored or computed (cloud computing).
- Forward emergency calls in case the survivor is at risk.
- Update their software when required.
2.2. Communications Environment
2.3. Other IoT Devices
2.4. Offenders Monitoring: Global Positionining System (GPS) Bands/Social Networks Monitoring
3. Software-Based Solutions
3.1. Machine Learning (ML) Algorithms
3.2. Other Strategies: Apps for Smartphones/Social Media Monitoring/Tele-Assistance
4. Emergency Measures
5. Vulnerabilities: Ethics, Hardware Limitations and Survivors’ Acceptance
5.1. Ethics: Security and Privacy Dilemmas
5.2. Hardware Limitations and Information and Communication Technology (ICT) Weaknesses: Interoperability and Battery Autonomy
5.3. Survivor Acceptance and ICT Education
6. Challenges to Be Overcome
- The complete characterization of IPV survivor status: not only related to biological facts, but also to their environment (including their home or workspace), and their virtual life (i.e., social networks).
- Full sensor integration. Technological advances have introduced novel biosensors, which have to be coordinated with smartphone capabilities (accelerometers, gyroscopes, light sensors, microphone, camera, and many others). These devices could work with different ways of transmitting information. A management platform needs to unite all these data sources.
- Large data volume. Considering the previous requirement, the amount of data provided could be huge, so we have to foresee ways to deal with it (Big Data solutions).
- Leverage of ML techniques. AI and particularly ML techniques are being applied to a wide variety of fields where data can be collected. Although some approaches have been made, the applications of these algorithms have not been exploited to their limits.
- Emergency module. With all the previously mentioned tools, an IPV platform needs to take control of the situation when an abusive situation is taking place. So, we need mechanisms to: (1) Detect situations (activated by survivor or automatically), (2) Discourage offenders (using acoustic alarms or other defenses), and (3) Warn emergency services and security forces about the status of the survivor.
- Easy connection between survivor, reliable persons, police and counselors. Information should flow in many directions, contacting all the subjects involved in IPV management.
- Multiple access points. From the survivor’s smartphone, and also from an internet browser, to provide access for the authorized people involved.
- Privacy, security, integrity. The previous point requires that the privacy and security of the survivor needs to be insured, since personal data is processed and survivor safety is at stake. This is a critical point that requires special attention.
- User-oriented environment. Taking into account all these ideas, it should not be forgotten that the IPV survivor will be the final user, so a proper interface is essential to create a satisfying quality of experience (usually called QoE), maintaining a good quality of service (QoS). This ICT habitat needs to be intuitive and simple, considering that some survivors could have certain disabilities, or be elderly, and enable a fast response without mistakes in the case of danger. Customizable options could also be considered.
7. An Holistic ICT Platform Proposal for Intimate Partner Violence (IPV) Management Based on an IoT Approach
- Substrate. This is the layer where data is generated, that is, the real source of information, and this is where the inception of the data occurs. Here we distinguish three areas: (1) Cyberspace: social networks and daily use of internet; (2) Environment monitoring (work/home); and, (3) Biological substrate: the physical survivor’s status.
- Sensorization layer. Data is acquired via applications, sensors and biosensors, all connected to an IoT framework. It can be configured and controlled remotely through the internet, creating a technological structure. (1) Cyberspace: here we use software that intercepts writing, video and audio, either received by the survivor or self-generated, for monitoring; (2) Environment monitoring (work/home): using the domotic resources detailed; and, (3) Biological substrate: using biosensors which monitor physical changes. It should be remembered that if a court deems it appropriate, these resources could be extended to the offender.
- Communication layer. The aim here is data permeation in preparation for the next stage. Using wireless communications such as Wi-Fi, 4G/5G, ZigBee (or 6LowPAN) and Bluetooth connections, information is sent to a more capable smart device (smartphone) which collects the data and acts as a gateway. Following the IoT idea, this layer sends communications to the cloud.
- Middleware layer. As we are working with different biosensors, domotic sensors, and also capturing software, a middleware mediator is required to transform and unite all the data sources.
- Computing and management layer. In this layer, the data collected is managed in order to carry out a data analysis, which could be text/voice/image/video recognition in order to identify harassment, but also to forecast and then anticipate risky situations and assaults. This task should be carried out in the cloud by powerful servers, as the ML algorithms used can be very demanding in terms of computer resources. Ubiquitous computing can therefore be used to enhance the process and achieve a faster solution.
- Display layer (interface). Access to the system will be via a friendly browser, in order to check information, adjust user preferences but also to launch the alarm if under an attack. It is thus possible to use not only a smartphone to display the interface, but also a desktop computer. This way, not only the survivor, but also the police and emergency services can gain access in case of alarm, and also a trusted person who can check that the survivor is out of risk.
- Output. We can consider several outputs of the management system, depending on the situation. The platform simply check the survivor’s status, study possible risk situations to enhance the ML forecasting algorithm, and of course, manage a risky situation with the cooperation of security forces, medical services, and remote tele-assistance in ICT areas.
- Continuous knowledge of the status of the survivor and, if necessary, of the offender. In this way, and using GPS location, it is possible to avoid their accidental meeting. It can provide help in terms of emergency situations but also in routine tasks.
- Emergency management. A comprehensive management system must be ready to deal with a risky situation. GPS would show the exact point where an assault has taken place; biosignals would suggest the survivor’s status, etc., and the coordinated action of resources.
- Easy exchange of information. Between the survivor and police, healthcare professionals, trusted person, and all people involved in managing IPV.
8. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Devries, K.M.; Mak, J.Y.; Garcia-Moreno, C.; Petzold, M.; Child, J.C.; Falder, G.; Pallitto, C. The global prevalence of intimate partner violence against women. Science 2013, 340, 1527–1528. [Google Scholar] [CrossRef] [PubMed]
- Heras, P.; Padilla, M.J. Contra la violencia, la formación en igualdad. Isonomía. Elimin. Obs. Para Alcanzar La Igual. 2014, 3, 79–95. [Google Scholar]
- Hyman, I.; Forte, T.; Mont, J.D.; Romans, S.; Cohen, M.M. Help-seeking rates for intimate partner violence (IPV) among Canadian immigrant women. Health Care Women Int. 2006, 27, 682–694. [Google Scholar] [CrossRef] [PubMed]
- West, C.M.; Kantor, G.K.; Jasinski, J.L. Sociodemographic predictors and cultural barriers to help-seeking behavior by Latina and Anglo American battered women. Race Crime Justice A Reader 2005, 1, 161–173. [Google Scholar] [CrossRef]
- Dimond, J.P.; Fiesler, C.; Bruckman, A.S. Domestic violence and information communication technologies. Interact. Comput. 2011, 23, 413–421. [Google Scholar] [CrossRef]
- Tully, J.; Larkin, F.; Fahy, T. New technologies in the management of risk and violence in forensic settings. CNS spectrums 2015, 20, 287–294. [Google Scholar] [CrossRef]
- Haraway, D. A manifesto for cyborgs: Science, technology, and socialist feminism in the 1980s. Fem. /Postmod. 1990, 190–233. [Google Scholar]
- Box, S.; West, J.K. Economic and social benefits of internet openness. OECD Digit. Econ. Ser. 2016, 257, 101–110. [Google Scholar] [CrossRef]
- Henry, N.; Powell, A. Technology-facilitated sexual violence: A literature review of empirical research. Trauma Violence Abus. 2018, 19, 195–208. [Google Scholar] [CrossRef]
- Woodlock, D. The abuse of technology in domestic violence and stalking. Violence Against Women 2017, 23, 584–602. [Google Scholar] [CrossRef]
- Machimbarrena, J.; Calvete, E.; Fernández-González, L.; Álvarez-Bardón, A.; Álvarez-Fernández, L.; González-Cabrera, J. Internet risks: An overview of victimization in cyberbullying, cyber dating abuse, sexting, online grooming and problematic internet use. Int. J. Environ. Res. Public Health 2018, 15, 2471. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Snyder, P.; Doerfler, P.; Kanich, C.; McCoy, D. Fifteen minutes of unwanted fame: Detecting and characterizing doxing. In Proceedings of the 2017 Internet Measurement Conference, London, UK, 1–3 November 2017; pp. 432–444. [Google Scholar]
- Carvin, A. Mind the Gap: The Digital Divide as the Civil Rights Issue of the New Millennium. Multimed. Sch. 2000, 7, 56–58. [Google Scholar]
- Joiner, R.; Stewart, C.; Beaney, C. Gender digital divide. In The Wiley Handbook of Psychology, Technology, and Society; John Wiley & Sons, Ltd.: Hoboken, NJ, USA, 2015; pp. 74–88. [Google Scholar]
- Gray, T.J.; Gainous, J.; Wagner, K.M. Gender and the digital divide in Latin America. Soc. Sci. Q. 2017, 98, 326–340. [Google Scholar] [CrossRef] [Green Version]
- Kavitha, M.; Sivachidambaranathan, V. Women Self Protecting System Using Internet of Things. In Proceedings of the 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Madurai, India, 13–15 December 2018; pp. 1–4. [Google Scholar]
- Rodríguez-Rodríguez, I.; Zamora-Izquierdo, M.Á.; Rodríguez, J.V. Towards an ICT-based platform for type 1 diabetes mellitus management. Appl. Sci. 2018, 8, 511. [Google Scholar] [CrossRef] [Green Version]
- Bryant, R.; Katz, R.H.; Lazowska, E.D. Big-data Computing: Creating Revolutionary Breakthroughs in Commerce, Science and Society; New York Times: New York, NY, USA, 2008. [Google Scholar]
- Ye, L.; Wang, L.; Wang, P.; Ferdinando, H.; Seppänen, T.; Alasaarela, E. Physical Violence Detection with Movement Sensors. In Proceedings of the International Conference on Machine Learning and Intelligent Communications, Hangzhou, China, 6–8 July 2018; pp. 190–197. [Google Scholar]
- Elbasiony, R.; Gomaa, W. A Survey on Human Activity Recognition Based on Temporal Signals of Portable Inertial Sensors. In International Conference on Advanced Machine Learning Technologies and Applications; Springer: Cham, Switzerland, 2019; pp. 734–745. [Google Scholar]
- Nakano, K.; Chakraborty, B. Effect of dynamic feature for human activity recognition using smartphone sensors. In Proceedings of the 2017 IEEE 8th International Conference on Awareness Science and Technology, (iCAST), Taiwan, 8 November 2017; pp. 539–543. [Google Scholar]
- Alruban, A.; Alobaidi, H.; Clarke, N.; Li, F. Physical activity recognition by utilising smartphone sensor signals. In Proceedings of the 8th International Conference on Pattern Recognition Applications and Methods, Prague, Czech Republic, 19–21 February 2019; pp. 342–351. [Google Scholar]
- Populi, C.A.; Huela, M.E.; Ilagan, J.P.; Noble, C. On a Touch-Activated Wearable Device with Automated Location Sending Capability. Proc. Eng. Technol. Innov. 2018, 9, 38. [Google Scholar]
- Hussain, S.M.; Nizamuddin, S.A.; Asuncion, R.; Ramaiah, C.; Singh, A.V. Prototype of an intelligent system based on RFID and GPS technologies for women safety. In Proceedings of the 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 7–9 September 2016; pp. 387–390. [Google Scholar]
- Islam, M.N.; Promi, N.T.; Shaila, J.M.; Toma, M.A.; Pushpo, M.A.; Alam, F.B.; Khaledur, S.N.; Alam, T.T.; Anannya, M.F. SafeBand: A Wearable Device for the Safety of Women in Bangladesh. In Proceedings of the 16th International Conference on Advances in Mobile Computing and Multimedia, Yogyakarta, Indonesia, 19–21 November 2018; pp. 76–83. [Google Scholar]
- Ferdinando, H.; Ye, L.; Seppänen, T.; Alasaarela, E. Emotion recognition by heart rate variability. Aust. J. Basic Appl. Sci. 2014, 8, 50–55. [Google Scholar]
- Ferdinando, H.; Ye, L.; Han, T.; Zhang, Z.; Sun, G.; Huuki, T.; Alasaarela, E. Violence detection from ECG signals: A preliminary study. J. Pattern Recognit. Res. 2017, 12, 7–18. [Google Scholar] [CrossRef]
- Broens, T.; Van Halteren, A.; Van Sinderen, M.; Wac, K. Towards an application framework for context-aware m-health applications. Int. J. Internet Protoc. Technol. 2007, 2, 109–116. [Google Scholar] [CrossRef] [Green Version]
- Yuce, M.R. Implementation of wireless body area networks for healthcare systems. Sens. Actuators A Phys. 2010, 162, 116–129. [Google Scholar] [CrossRef]
- Monisha, M.; Mohan, P.S. A novel IOT based approach to establish an ultra-low power self security system. In Proceedings of the 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India, 18 March 2017; pp. 1–6. [Google Scholar]
- Shaik, K.; Bogaraju, S.; Vadepu, S. Implementation of Novel Application for Woman and Child Protection Using IOT Enabled Techniques. Int. J. Adv. Res. Comput. Sci. 2017, 8, 227–242. [Google Scholar]
- Jatti, A.; Kannan, M.; Alisha, R.M.; Vijayalakshmi, P.; Sinha, S. Design and development of an IOT based wearable device for the safety and security of women and girl children. In Proceedings of the 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bengaluru, India, 20–21 May 2016; pp. 1108–1112. [Google Scholar]
- Mavromoustakis, C.X.; Mastorakis, G.; Batalla, J.M. (Eds.) Internet of Things (IoT) in 5G Mobile Technologies; Springer: Berlin/Heidelberg, Germany, 2016; Volume 8. [Google Scholar]
- Gomez, C.; Oller, J.; Paradells, J. Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology. Sensors 2012, 12, 11734–11753. [Google Scholar] [CrossRef]
- Hoy, M.B. Alexa, Siri, Cortana, and more: An introduction to voice assistants. Med Ref. Serv. Q. 2018, 37, 81–88. [Google Scholar] [CrossRef] [PubMed]
- Bergen, H. ‘I’d blush if I could’: Digital assistants, disembodied cyborgs and the problem of gender. Word Text J. Lit. Stud. Linguist. 2016, 6, 95–113. [Google Scholar]
- Vora, J.; Tanwar, S.; Tyagi, S.; Kumar, N.; Rodrigues, J.J. Home-based exercise system for patients using IoT enabled smart speaker. In Proceedings of the 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom), Dalian, China, 12–15 October 2017; pp. 1–6. [Google Scholar]
- Huang, W.; Chiew, T.K.; Li, H.; Kok, T.S.; Biswas, J. Scream detection for home applications. In Proceedings of the 2010 5th IEEE Conference on Industrial Electronics and Applications, Taichung, Taiwan, 15 June 2010; pp. 2115–2120. [Google Scholar]
- Peng, Z.; Kato, T.; Takahashi, H.; Kinoshita, T. Intelligent home security system using agent-based IoT Devices. In Proceedings of the 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), Nagoya, Japan, 27–37 October 2015; pp. 313–314. [Google Scholar]
- Domestic-abuse-violence-harassment-smart-home-monitoring. Available online: https://www.refinery29.com/en-ca/2019/01/220847/ (accessed on 15 August 2019).
- Beyens, K.; Roosen, M. Suspects being watched in real time: Introducing GPS tracking in Belgium. J. Technol. Human Serv. 2016, 34, 102–116. [Google Scholar] [CrossRef]
- Gies, S.; Gainey, R.; Healy, E. Monitoring high-risk sex offenders with GPS. Crim. Justice Stud. 2016, 29, 1–20. [Google Scholar] [CrossRef]
- Payne, B.K.; DeMichele, M. Sex offender policies: Considering unanticipated consequences of GPS sex offender monitoring. Aggress. Viol. Behav. 2011, 16, 177–187. [Google Scholar] [CrossRef]
- Islam, A.; Akter, A.; Hossain, B.A. HomeGuard: A Smart System to Deal with the Emergency Response of Domestic Violence Victims. arXiv 2018, arXiv:1803.09401. [Google Scholar]
- Ye, L.; Ferdinando, H.; Seppanen, T.; Huuki, T.; Alasaarela, E. An instance-based physical violence detection algorithm for school bullying prevention. In Proceedings of the 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, Croatia, 24–28 August 2015. [Google Scholar] [CrossRef]
- Hegde, N.; Bries, M.; Swibas, T.; Melanson, E.; Sazonov, E. Automatic recognition of activities of daily living utilizing insole-based and wrist-worn wearable sensors. IEEE J. Biomed. Health Inform. 2017, 22, 979–988. [Google Scholar] [CrossRef]
- O’Halloran, K.L.; Tan, S.; Wignell, P.; Bateman, J.A.; Pham, D.S.; Grossman, M.; Moere, A.V. Interpreting text and image relations in violent extremist discourse: A mixed methods approach for big data analytics. Terror. Polit. Violence 2019, 31, 454–474. [Google Scholar] [CrossRef] [Green Version]
- Ozkan, T. Predicting Recidivism Through Machine Learning. Ph.D. Thesis, University of Texas and Dallas, Richardson, TX, USA, 2017. [Google Scholar]
- Ward-Lasher, A.; Sheridan, D.J.; Glass, N.E.; Messing, J.T. Prediction of Interpersonal Violence: An Introduction. Assess. Danger. Domest. Violence Offenders Child Abus. 2017, 1, 1–32. [Google Scholar]
- Berk, R.A.; Sorenson, S.B.; Barnes, G. Forecasting domestic violence: A machine learning approach to help inform arraignment decisions. J. Emp. Leg. Stud. 2016, 13, 94–115. [Google Scholar] [CrossRef]
- García Revilla, M.R. El impacto de las APPS en la violencia de género. Asparkía: Investigació Feminista 2016, 28, 159–160. [Google Scholar]
- Mareeswari, V.; Patil, S.S. Smart Device for Ensuring Women Safety Using Android App. In Advanced Computational and Communication Paradigms; Springer: Singapore, 2018; pp. 186–197. [Google Scholar]
- Purohit, H.; Banerjee, T.; Hampton, A.; Shalin, V.L.; Bhandutia, N.; Sheth, A.P. Gender-based violence in 140 characters or fewer: A BigData case study of Twitter. arXiv 2015, arXiv:1503.02086. [Google Scholar] [CrossRef] [Green Version]
- Del Vigna, F.; Cimino, A.; Dell’Orletta, F.; Petrocchi, M.; Tesconi, M. Hate me, hate me not: Hate speech detection on facebook. In Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, 17–20 January 2017. [Google Scholar]
- Hassija, C.; Gray, M.J. The effectiveness and feasibility of videoconferencing technology to provide evidence-based treatment to rural domestic violence and sexual assault populations. Telemed.e-Health 2011, 17, 309–315. [Google Scholar] [CrossRef] [PubMed]
- Kortendiek, B. Supporting the Bologna process by gender mainstreaming: A model for the integration of gender studies in higher education curricula. Studies on Higher Education. In From Gender Studies to Gender IN Studies and beyond; UNESCO-CEPES: Bucharest, Romania, 2011. [Google Scholar]
- Nanjo, H.; Nishiura, T.; Kawano, H. Acoustic-based security system: Towards robust understanding of emergency shout. In Proceedings of the 2009 Fifth International Conference on Information Assurance and Security IEEE, Xian, China, 18–20 August 2009; Volume 1, pp. 725–728. [Google Scholar]
- Viswanath, N.; Pakyala, N.V.; Muneeswari, G. Smart foot device for women safety. In Proceedings of the 2016 IEEE Region 10 Symposium (TENSYMP) IEEE, Bali, Indonesia, 9–11 May 2016; pp. 130–134. [Google Scholar]
- Harikiran, G.C.; Menasinkai, K.; Shirol, S. Smart security solution for women based on Internet of Things(IOT). In Proceedings of the International Conference on Electrical, Electronics, and Optimization Techniques, Chennai, India, 3–5 March 2016; pp. 3551–3554. [Google Scholar]
- Toney, G.; Jabeen, F.; Puneeth, S. Design and implementation of safety armband for women and children using ARM7. In Proceedings of the 2015 International Conference on Power and Advanced Control Engineering (ICPACE) IEEE, Piscataway, NJ, USA, 12–24 August 2015; pp. 300–303. [Google Scholar]
- Mohanaprakash, K.; Sekar, T.G. A Smart Alarm System for Women’s Security. Int. J. Eng. Manag. Res. (IJEMR) 2018, 8, 89–92. [Google Scholar]
- Li, N.; Sun, M.; Bi, Z.; Su, Z.; Wang, C. A new methodology to support group decision-making for IoT-based emergency response systems. Inf. Syst. Front. 2014, 16, 953–977. [Google Scholar] [CrossRef]
- Yu, S.; Wang, G.; Liu, X.; Niu, J. Security and privacy in the age of the smart internet of things: An overview from a networking perspective. IEEE Commun. Mag. 2018, 56, 14–18. [Google Scholar] [CrossRef]
- Chiang, M.; Zhang, T. Fog and IoT: An overview of research opportunities. IEEE Internet Things J. 2016, 3, 854–864. [Google Scholar] [CrossRef]
- Machanavajjhala, A.; Gehrke, J.; Kifer, D.; Venkitasubramaniam, M. l-diversity: Privacy beyond k-anonymity. In Proceedings of the 22nd International Conference on Data Engineering (ICDE’06), Atlanta, GA, USA, 14 April 2006; p. 24. [Google Scholar]
- Kshetri, N. Can blockchain strengthen the internet of things? IT Prof. 2017, 19, 68–72. [Google Scholar] [CrossRef] [Green Version]
- Lim, H.B.; Teo, Y.M.; Mukherjee, P.; Lam, V.T.; Wong, W.F.; See, S. Sensor grid: Integration of wireless sensor networks and the grid. In Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary (LCN’05), Sydney, Australia, 15–17 November 2005; pp. 91–99. [Google Scholar]
- Talpur, M.S.H.; Bhuiyan, M.Z.A.; Wang, G. Energy-efficient healthcare monitoring with smartphones and IoT technologies. Int. J. High Perform. Comput. Netw. 2015, 8, 186–194. [Google Scholar] [CrossRef]
- Omre, A.H.; Keeping, S. Bluetooth low energy: Wireless connectivity for medical monitoring. J. Diabetes Sci. Technol. 2010, 4, 457–463. [Google Scholar] [CrossRef] [PubMed]
- Jara, A.J.; Lopez, P.; Fernandez, D.; Zamora, M.A.; Ubeda, B.; Skarmeta, A.F. Communication protocol for enabling continuous monitoring of elderly people through near field communications. Interact. Comput. 2013, 26, 145–168. [Google Scholar] [CrossRef]
- Claudio, D.; Velázquez, M.A.; Bravo-Llerena, W.; Okudan, G.E.; Freivalds, A. Perceived usefulness and ease of use of wearable sensor-based systems in emergency departments. IIE Trans. Occup. Ergon. Hum. Factors 2015, 3, 177–187. [Google Scholar] [CrossRef]
- Motti, V.G.; Caine, K. Human factors considerations in the design of wearable devices. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Chicago, IL, USA, 27–31 September 2014; Volume 58, pp. 1820–1824. [Google Scholar]
- Finn, J.; Atkinson, T. Promoting the safe and strategic use of technology for victims of intimate partner violence: Evaluation of the technology safety project. J. Fam. Violence 2009, 24, 53–59. [Google Scholar] [CrossRef]
- Miriyala, G.P.; Sunil, P.V.V.N.D.P.; Yadlapalli, R.S.; Pasam, V.R.L.; Kondapalli, A.T.; Miriyala, A. Smart intelligent security system for women. Int. J. Electron. Commun. Eng. Technol. (IJECET) 2016, 7, 41–46. [Google Scholar]
- Ahir, S.; Kapadia, S.; Chauhan, J.; Sanghavi, N. The Personal Stun-A Smart Device for Women’s Safety. In Proceedings of the 2018 International Conference on Smart City and Emerging Technology (ICSCET), Mumbai, India, 5 January 2018; pp. 1–3. [Google Scholar]
- Seth, D.; Chowdhury, A.; Ghosh, S. A Hidden Markov Model and Internet of Things Hybrid Based Smart Women Safety Device. In Proceedings of the 2018 2nd International Conference on Power, Energy and Environment: Towards Smart Technology (ICEPE), Shillong, India, 1–2 June 2018; pp. 1–9. [Google Scholar]
Topic | Related Works |
---|---|
Contextualization | [1,2,3,4,5,6,7,8] |
Emergence of ICT related violence | [9,10,11,12] |
Gender gaps | [13,14,15] |
Smart management platforms | [16,17,18,74] |
Telemonitoring, Body Area Network | [19,20,21,22,23,24,25,26,27,28,29,30,31,32,75,76] |
Communications funnels | [33,34] |
Potential IoT devices | [35,36,37,38,39,40] |
Offenders monitoring | [41,42,43] |
Machine learning algorithms | [44,45,46,47,48,49,50] |
Apps, Social media, Tele assistance | [51,52,53,54,55,56] |
Emergency measures | [57,58,59,60,61,62] |
Ethics, privacy | [63,64,65,66] |
Hardware weakness | [29,67,68,69,70] |
Survivors’ acceptance | [71,72,73] |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Rodríguez-Rodríguez, I.; Rodríguez, J.-V.; Elizondo-Moreno, A.; Heras-González, P.; Gentili, M. Towards a Holistic ICT Platform for Protecting Intimate Partner Violence Survivors Based on the IoT Paradigm. Symmetry 2020, 12, 37. https://doi.org/10.3390/sym12010037
Rodríguez-Rodríguez I, Rodríguez J-V, Elizondo-Moreno A, Heras-González P, Gentili M. Towards a Holistic ICT Platform for Protecting Intimate Partner Violence Survivors Based on the IoT Paradigm. Symmetry. 2020; 12(1):37. https://doi.org/10.3390/sym12010037
Chicago/Turabian StyleRodríguez-Rodríguez, Ignacio, José-Víctor Rodríguez, Aránzazu Elizondo-Moreno, Purificación Heras-González, and Michele Gentili. 2020. "Towards a Holistic ICT Platform for Protecting Intimate Partner Violence Survivors Based on the IoT Paradigm" Symmetry 12, no. 1: 37. https://doi.org/10.3390/sym12010037
APA StyleRodríguez-Rodríguez, I., Rodríguez, J. -V., Elizondo-Moreno, A., Heras-González, P., & Gentili, M. (2020). Towards a Holistic ICT Platform for Protecting Intimate Partner Violence Survivors Based on the IoT Paradigm. Symmetry, 12(1), 37. https://doi.org/10.3390/sym12010037