Sunteți pe pagina 1din 4

Technological Solution using low cost devices to

prevent feminicide scenes


1st Pedro Arteaga Gonzales 2nd Erik Jimenez Chacon 3rd Jimmy Armas-Aguirre
Information Systems Engineering Information Systems Engineering Information Systems Engineering
Universidad Peruana de Ciencias Aplicadas Universidad Peruana de Ciencias Aplicadas Universidad Peruana de Ciencias Aplicadas
Lima, Perú Lima, Perú Lima, Perú
u201111456@upc.edu.pe u201214284@upc.edu.pe jimmy.armas@upc.pe

Abstract— In this research paper, we present a technological harm, suffering or death. 11.1% of the women surveyed suffered
solution proposal to the problem associated to violence towards physical or sexual violence [3] from their partner or ex-partner who
women in Peru. A conclusion was reached, based on a study, of the tried to strangle her, burn her, attacked her with a knife, gun or
main existing channels for prevention and complaint. From the another weapon. During the first third of 2019, there were 142
carried out study, it was determined that there are high attention attempts of feminicide in the country and 50 women were victims
times and information asymmetries between the different actors in of feminicide, of which 80% of these attempts are located in Lima
the system. The posed solution reduces the minimum time necessary [3]. When properly structured actions are taken, they can help
for the attention and detention of an act of violence by providing an reduce this type of violence, the rate of femicides is greatly
immediate reaction. In this procedure we use low-cost components
reduced. According to the national budget for the fight against
and existing systems on the market. The solution brings together
technological components properly configured to track violence,
women violence, there are no mechanisms that react to violence
which consists mainly of: 1) A wearable device, alerting a specific [3]. Thus, many entities and social groups do not have mechanisms
group of people previously added, relatives, acquaintances or people to act and stop violence, since they are non-reacting actions, but
willing to help, 2) A communication system with a real-time alert, rather, they wait for the victim to show signs of having suffered
which, through signals, communicates to a cloud platform, these aggression. Some aggressors tend to even go free of all guilt due
signals are distributed to a mobile application and website. The to lack of evidence or witnesses. As a result, an extremely high
solution was validated at a national police station located in Lima. cost is paid by allowing violence to end in femicide.
The aim is to contribute to the reduction of the response time of help
According to the 2018 survey conducted by ENDES, 70.8% of
and the asymmetry of information. The time used with the proposed
solution reduced 60% with respect to two solutions that the Ministry
women between the ages of 15 and 49 suffered violence from their
of Justice of Peru has implemented in the last five months. of partner or ex-partner and did not seek help from a public institution
operation. [3]. It can be concluded that there is little trust in the institutions
and another type of solution is being sought.
Keywords—low-cost wearable, alert, The Internet of Things, Cloud Faced with this problem, a technological solution is
computing, feminicide, prevent attack recommended in order to reduce reaction time and improve
I. INTRODUCTION efficiency in alerting acts of violence, especially when the situation
is critical. The solution establishes as critical aspects, immediate
Violence against women is a form of discrimination not only contact of the victim with a support group (family, acquaintances
of gender, but also of race and social class [1]. It is clear to mention or help group), the follow-up system, communication devices, the
that in Peru, a pluricultural country, there are diverse social observation unit, the alert measure and the sending the signal time.
manifestations, therefore, discrimination is a common and This solution seeks to empower women against potential
reoccurring topic. Partner violence is a form of gender violence aggressors, and directly or indirectly reduce the feminicide and
recognized by the National Plan against Gender Violence 2016- psychological problems of the aggressors.
2021 (D.S.008-2016-MIMP) [2], which describes it as a problem
that is not very visible and is under-recorded, since the belief The article is organized as follows. First, it explains the existing
persists that violence in the family is a private, normal and solutions of wearable devices and mobile applications to alert
legitimate matter that should not be publicly discussed. situations of violence against women, IoT architectures, Cloud
platforms and mobile operating systems. The components of the
One of the main causes of violence is the existence of recommended solution are then described. The article ends with
sociocultural patterns that generate unequal power relations and the results of the case study in this research and ends with the
hierarchical differences of men over women. These patterns are conclusion.
attitudes, beliefs, imaginary prejudices present in the population
that justify and, therefore, tolerate violence. II. LITERATURE REVIEW
In Peru, 65.9% of women between the ages of 15 and 49 were
victims of some type of violence (psychological, verbal, physical Violence involves social reality. Poverty, disease, inequality in
or sexual) [3]. It should be noted that many acts of violence end in income distribution and discrimination in all its forms (race, class,

978-1-7281-3818-3/19/$31.00 ©2019 IEEE


age, sexual orientation, nationality and ethnicity) are expressions TABLE III. CHARACTERISTICS OF EXISTING DEVICES
of the structural violence present in today's society. Studies Devices
associate women's violence with factors of inequality, which are Characteristics
[4] [5] [6] [7] [8] [9] [10]
difficult to control, but not to stop. In most cases violence against
women ends in femicide. In the following table we can observe the Comfort - - - - - - -
main variables of violence found by authors and how limits and Included Modules x x x - X X X
prevention strategies are established. Validation of factors
x x - X X X X
A. Violence variables of violence
Accuracy - - - X X - -
Different Variables were found in the analysis of the literature.
Accessibility x - - x x - -
TABLE I. VIOLENCE VARIABLES
Num. Violence variables References
In table III, the characteristics of some existing solutions are
1 Education [16], [17], [18] displayed. The authors of document [11] point out that the most
2 Economical [17], [18] commonly used components are Arduino modules, which have
better performance but are large in size.
3 Gender [16], [17], [18]
D. Cloud Platform Assessment
4 Relationship duration [16], [17], [18], [20]
Cloud computing is a technology that facilitates organizations
and individuals to host their computing services without worrying
In table I, Rodolfo J. Castro and others [18] mention that about IT infrastructure and thus investing in other supporting
indicators of violence are linked to socioeconomic factors and services [refs]. This technology has largely been used in healthcare
domestic partnership. The authors also acknowledge that partners applications where scalability, mobility, agility and privacy are
of women who consume alcohol tend to be violent. Therefore, the essential factors to consider [rfs]. These factors are equally
authors recommend the establishment of prevention mechanisms important in our present study.
and the investigation of more factors to prevent violence. Table IV shows and describes the main cloud platform service
On the other hand, the factor with the greatest reoccurrence is providers in which IOT technologies can be integrate.
the variable of relationship duration, Delgado A. and others [20]
mention that the duration of a relationship of aggression in past and TABLE IV. CLOUD PLATFORMS
present time is presented as an effect of a need for emotional Num. Cloud Platforms
support. Thus, the authors suggest a system of community help and Platform Description
individual professional help. It is an integrated group of cloud services that can
be used to create, implement, and manage
B. Alert Components 1
Microsoft applications across a global network of data centers.
Azure Integrated tools, DevOps and a marketplace help
There are various forms of violence prevention in the world create mobile applications and Internet-oriented
which use different methods of response. Many of the strategies solutions [11].
are established with state measures, but there are also methods It is a platform like a service (PaaS) offering
created by ordinary people. memory capabilities, core platform services, and
2 IBM Cloud business services to create and expand custom,
The following components are mentioned as a strategy: collaborative, mobile-enabled cloud applications
[12].
TABLE II. COMPONENTS OF EXISTING SOLUTIONS It is a platform used to create solutions through
technology stored in the cloud and allows to
Num. Response Components References highlight the speed and scaling of its infrastructure.
Google Cloud
Global Positioning System (GPS) 3 It contains a set of Cloud Computing services (data
1 [12], [13], [15] Platform
storage, data analysis, automatic learning, etc.)
2 Default messages [10] using the Google cloud as the only way to access,
store and manage data [13].
3 Video Recording [12], [13], [15]

4 Voice Recording [9], [13] The IBM solution was chosen as this solution offers better tools
5 Global System for Mobile (GSM) [9], [13] for integrating cloud devices with services such as NODE RED
and a non-relational Cloudant base.
6 Open Source delivered [14]
III. TECHNOLOGICAL SOLUTION PROPOSED

The more common response components are the GPS strategy A. Solution description
and voice recording [12, 13]. These responses act more as a The solution is implemented in an IOT environment, cloud
repelling strategy that would drive attackers to keep away when computing with Node.js as framework and NODE RED as the
recording is shown as an evidence. However, they are not reactive main application. Platform independence was obtained in the
strategies and therefore the act of violence will often end up synchronization of the device and other components such as a
happening. smart phone. In addition, an application and a web page were
developed, which are synchronized with the wearable.
C. Characteristics Evaluation
Several devices were found that were conducted in researches, The architecture and the way in which the system was modeled
which were developed with previously presented components. make it scalable, that is, it has the capacity to expand in terms of
functionality. Therefore, this work can be considered as a starting sought for this project. For the development of the prototype, a
point for the development of similar projects fig. 1. fieldwork was carried out measuring the reaction time using the
device and a survey to measure the satisfaction of the same.
B. Implementation
Based on the benchmarking point shown in the literature paper
on wearable devices, a device was designed taking into account the
needs and criteria evaluated. Therefore, a prototype was designed
with basic functionalities that capture the location of the device by
means of a GPS module. A pushbutton that acts as a panic button
and a module of the ESP series as a WiFi receiver and connector
for its application in IoT projects.

Fig. 1. Technological Solution Arquitecture

B. Solution Phases
• Device Layer: This layer describes the users who connect
to the devices and therefore to the IoT platform. It also
describes the components that the device has for capturing
information and as a model of connection to the server.
The Sensor is the component that generates a piece of Fig. 2. Assembling view of the componens
information, this data refers to variables such as location
and alert level of aggression. The implementation was carried out in 3 parts which are as
follows:
• Gateway Layer: Connectivity of the sensor to receive and
transfer data. • First Stage: We proceeded to explain the functioning of the
device and installation of the application to the potential
• Data processing layer: In this layer the data received is victim’s cell phones. The function is for example, the
processed and sent to different devices (e.g., mobile woman sends the signal by activating the alert on the
applications or desktop environments). device, the signal ends when the person who helps opens
• Data storage layer: It is the layer that takes on the the application and tracks the signal, finally the reaction
persistence within the solution since the architecture time between the alert and the help received is calculated.
describes that there is a database group to store the Preceding the installation, training was provided. An
information that arrives from the sensors to be later important aspect of this training was the treatment of false
exploited and distributed. positive alerts. For example, accidental activations could
happen if the device becomes lodged or stuck or if it is left
• Application layer: This layer is in charge of data reporting unattended and at the reach of children. Women were
and has the function of distributing the most relevant and constantly reminded of the keeping the device safe and
ordered information for user analysis as a support group refraining from leaving it unattended.
role. The result will be backed up by a mobile solution that
will record and store the person's location history and • Second Stage: The reaction time was evaluated, which is
allow help personnel to have knowledge in an initial established by the action of the support community
context. This information will also be visualized through (Relatives, acquaintances, neighbors and others).
a web platform that will have credentialed access to C. Results
maintain data confidentiality. The benefit will be to keep
After the tests carried out in the emergency center, 60 time
a support group alert by two means (Mobile and Web
results were obtained as shown in the following table.
Application) so that people can take action immediately
and not after an incident has occurred. VOLUNTARIAS
TIEMPO DE RESPUESTA POR NÚMEROS DE APOYOS (MIN)
APOYO 1 APOYO 2 APOYO 3 APOYO 4 APOYO 5 PROMEDIO
Voluntaria 1 9.52 9.32 10.26 7.60 7.32 8.80

IV. CASE STUDIES Voluntaria 2


Voluntaria 3
6.09
7.03
7.99
10.65
11.16
12.13
8.77
8.39
6.51
5.26
8.10
8.69
``Voluntaria 4 9.52 12.33 11.98 7.33 6.87 9.61

A. Organization Voluntaria 5
Voluntaria 6
11.89
9.00
7.23
7.37
6.86
9.76
6.02
9.25
6.37
9.11
7.67
8.90
Voluntaria 7 12.56 11.21 10.55 11.32 8.12 10.75
Women's Emergency Centers (CEM, by its Spanish initials) Voluntaria 8 11.23 13.62 13.82 12.86 11.90 12.69

are free, specialized, comprehensive and multidisciplinary public Voluntaria 9


Voluntaria 10
12.79
8.22
12.15
7.22
9.20
5.26
9.67
5.64
10.40
6.39
10.84
6.55

services for victims of domestic and sexual violence, which Voluntaria 11


Voluntaria 12
10.37
12.36
12.33
9.69
10.24
13.23
13.45
9.41
6.37
13.20
10.55
11.58
provide legal advice, legal defense and psychological counseling; Voluntaria 13
Voluntaria 14
11.03
8.94
8.14
7.54
8.30
6.62
8.62
7.69
13.02
6.19
9.82
7.40
it is where the solution’s development is made. The center seeks to Voluntaria 15 10.72 9.88 7.70 8.33 7.43 8.81
Voluntaria 16 13.38 8.42 7.23 7.64 7.61 8.86
recover the damage suffered and provides social assistance. There Voluntaria 17 7.57 5.03 5.75 4.10 5.39 5.57

are also 351 women's emergency centers in Peru, 105 in police Voluntaria 18 13.96 13.00 11.00 9.92 8.37 11.25

stations open 24 hours a day, 7 days a week, 245 in agreements Fig. 3. Test results with real users.
with municipalities with office care and 1 in a hospital open 24
hours a day, prevention activities are carried out through training, From the figure 4 it can be observed that the volunteers had the
communication campaigns, training of community agents and support in average times of 9.25 min, this is due to the fact that
mobilization of organizations. For this reason, one of the centers they were not accustomed to the use of devices. The comparison
with the highest number of reports of violence in recent years was of current state services with programs such as CEM, “Línea 100”
and “Chat 100” was carried out, of which the following table sugar level, among others. Last but not least, the integration of the
shows that the solution is on average the fastest. technological solution with new devices and implementation
TIEMPO DE RESPUESTA DE PROGRAMAS DE ATENCIÓN CONTRA VIOLENCIA HACIA LA
within low-cost domotics is left to research. This in order to
MUJER achieve technological advancement in sectors that are less
Programa
CEM
Tiempo Promedio de atención
60.00
explored due to the expensive technology approach for Smart
COMISARIA 120.00 Homes.
LINEA 100 15.00
CHAT 100 15.00 REFERENCES
STAAM - T. Prom. 9.25
[1] Violencia contra la mujer. (2017). Retrieved 13 June 2019, from
Fig. 4. Comparison of times with other violence care services. https://www.who.int/es/news-room/fact-sheets/detail/violence-against-
women
In the same way, a mobile application was developed to [2] El Peruano. (2016). Plan Nacional Contra la Violencia de Género 2016- 2021
support the taking of results and the implementation of the project, [PDF] (8th ed., pp. 7-8). Lima. Retrieved from
https://www.gob.pe/institucion/mimp/normas-legales/20769-008-2016-
which has the following characteristics: mimp
• Alert reception: The device emits a signal when pressing [3] Ministerio de la Mujer y Poblaciones Vulnerables. (2019). Resumen
Estadístico Personas Afectadas por Violencia Familiar y Sexual atendidas
the button implemented, the response time of the server CEM 2019 [PDF] (1st ed., pp. 1-5). Lima.
was evaluated, it being 0.7 seconds. The mobile
[4] G. Toney, F. Jabeen and Puneeth S, "Design and implementation of safety
application and the web page receive and emit the alert armband for women and children using ARM7," 2015 International
signal with an emergency message and sound and then Conference on Power and Advanced Control Engineering (ICPACE),
stored in the application server database. In addition, the Bangalore, 2015, pp. 300-303.
application saves the GPS position and distance from it as [5] S. Sharmin, M. Khaliluzzaman, S. F. Khatun and S. Khanam, "An android
shown in fig. 5. based security alert system for female," 2016 International Workshop on
Computational Intelligence (IWCI), Dhaka, 2016, pp. 11-14.
Data visualization platform: Data acquired from users that is stored [6] D. S. Prashanth, G. Patel and B. Bharathi, "Research and development of a
in server databases in the "cloud". The history of each user and mobile based women safety application with real-time database and data-
their information in real time, and the alerts are visualized by stream network," 2017 International Conference on Circuit, Power and
Computing Technologies (ICCPCT), Kollam, 2017, pp. 1-5.
means of Web applications implemented in HTM, CSS and
JavaScript and by means of the mobile application developed [7] M. Mahajan, K. Reddy and M. Rajput, "Design and implementation of a
rescue system for safety of women," 2016 International Conference on
natively in Android (fig. 5). The members of the support Wireless Communications, Signal Processing and Networking (WiSPNET),
community will be able to see the alerts in real time and carry out Chennai, 2016, pp. 1955-1959.
the reactive measures instantly. [8] S. KishorBabu, V. V. Sagar, B. Nikhitha and P. Priyanka, "Exigency alert
and tracking system," 2015 International Conference on Advances in
Computer Engineering and Applications, Ghaziabad, 2015, pp. 700-705.
[9] G. C. Harikiran, K. Menasinkai and S. Shirol, "Smart security solution for
women based on Internet of Things (IOT)," 2016 International Conference
on Electrical, Electronics, and Optimization Techniques (ICEEOT),
Chennai, 2016, pp. 3551-3554.
[10] M. Mahajan, K. Reddy and M. Rajput, "A Switch Triggered Rescue
Assistance System for Safety of Women," 2018 International Conference on
Smart City and Emerging Technology (ICSCET), Mumbai, 2018, pp. 1-7.
[11] Tuan Tran, M. A., Le, T. N., & Vo, T. P. (2018). Smart-config wifi
technology using ESP8266 for low-cost wireless sensor networks. Paper
presented at the Proceedings - 2018 International Conference on Advanced
Computing and Applications, ACOMP 2018, 22-28.
[12] F. Xia, H. Song and C. Xu, "Securing the wireless environment of IoT," 2018
Fig. 5. Operating Application IEEE International Conference of Safety Produce Informatization (IICSPI),
Chongqing, China, 2018, pp. 315-318.
V. CONCLUSIONS [13] Byungseok Kang, Hyunseung Choo. (2016). A deep-learning-based
emergency alert system. ICT Express, 2(2), 67-70.
The solution explicitly seeks to empower women and, with the https://doi.org/10.1016/j.icte.2016.05.001.
help of the alert, GPS and visualization platforms establish that [14] Sumangali, K., & Kiran, P. (2016). Comparative study of open source tools
they are not alone. EMFs can add alerts to their processes because for internet of things. International Journal of Pharmacy and Technology,
they are available to any user willing to support and stop violence. 8(4), 26235-26241.
[15] Kim, B. (2018). Development of autosensing for self-protection device based
The solution explicitly seeks to empower women and, with the IOT. International Journal of Engineering and Technology (UAE), 7(2), 84-
help of the alert, GPS and visualization platforms establish that 86. doi:10.14419/ijet. v7i2.12.11041.
they are not alone. EMFs can add alerts to their processes because [16] Wood, S. N., Glass, N., & Decker, M. R. (2019). An integrative review of
they are available to any user willing to support and stop violence. safety strategies for women experiencing intimate partner violence in low-
and middle-income countries. Trauma, Violence, and Abuse.
Due to the nature of the project, it is open to a number of issues [17] Cripe, S. M., Espinoza, D., Rondon, M. B., Jimenez, M. L., Sanchez, E.,
for the continuity of the project. One of them is the exploitation of Ojeda, N., . . . Williams, M. A. (2015). Preferences for intervention among
data for predictions through Big Data and even the application of peruvian women in intimate partner violence relationships. Hispanic Health
Machine Learning for a system that helps the support group for Care International, 13(1), 27-37.
women who are victims of aggression. Another application that [18] Castro, R. J., Cerellino, L. P., & Rivera, R. (2017). Risk factors of violence
could be addressed in the project would be the implementation of against women in peru. Journal of Family Violence, 32(8), 807-815.
doi:10.1007/s10896-017-9929.
additional sensors such as detection the level of sweat, heart rate,

S-ar putea să vă placă și