ABSTRACT
Context: The sexual violence is recognized as a serious violation of women’s human rights and a global public health problem. The World Health Organization (WHO) claims that 23% of brazilians have already been sexually or physically abused by their intimate partners. Considering Latin America and Caribe, the WHO indicates that 11% of women have been sexually abused by relatives, friends or unknown persons. This insecurity cenario combined with the Internet of Things popularization has motivated the emergence of wearable systems to prevent sexual violations. Problem: Such artifacts have been continually produced by public and private organizations. However, few studies investigate the particularities of these wearable applications and how they can benefit or prejudice the women’s well-being. Solution: This work aims to identify these technologies and apurate their functionalities, characteristics, limitations and implications with the security of the users. IS Theory: This study was outlined according to the foundations of General Systems Theory, mainly for approaching interdisciplinary scientific concepts. Method: This paper executes a Systematic Literature Mapping which analyzes and synthesizes evidences from primary studies to structure the proposed research topic. Summary of results: Through the analysis of 16 publications, an overview of the identified wearable systems was constructed. Contributions to IS: The main contribution of this work is to expose the attributes of wearable applications for women’s safety and the effects arising from the use of these technologies. Besides, this research also contributed to the GranDSI-BR 2016-2026, in the line "Systemic and Socially Aware Perspective for Information Systems".
- Wasim Akram, Mohit Jain, and C. Sweetlin Hemalatha. 2019. Design of a Smart Safety Device for Women using IoT. Procedia Computer Science 165 (2019), 656–662. https://doi.org/10.1016/j.procs.2020.01.060 2nd International Conference on Recent Trends in Advanced Computing ICRTAC -DISRUP - TIV INNOVATION, 2019 November 11-12, 2019.Google ScholarDigital Library
- Farida A. Ali, Siksha ’O’ Anusandhan, and Laxmi Goswami. 2021. Virtual safety device for women security. Materials Today: Proceedings (2021). https://doi.org/10.1016/j.matpr.2021.03.405Google ScholarCross Ref
- Gabriela Almeida and Sérgio Nojiri. 2018. COMO OS JUÍZES DECIDEM OS CASOS DE ESTUPRO? ANALISANDO SENTENÇAS SOB A PERSPECTIVA DE VIESES E ESTEREÓTIPOS DE GÊNERO. Revista Brasileira de Políticas Públicas 8 (09 2018). https://doi.org/10.5102/rbpp.v8i2.5291Google ScholarCross Ref
- Amy Buddie and Arthur Miller. 2001. Beyond Rape Myths: A More Complex View of Perceptions of Rape Victims. Sex Roles 45 (08 2001). https://doi.org/10.1023/A:1013575209803Google ScholarCross Ref
- Lauren F. Cardoso, Susan B. Sorenson, Olivia Webb, and Sara Landers. 2019. Recent and emerging technologies: Implications for women’s safety. Technology in Society 58 (2019), 101108. https://doi.org/10.1016/j.techsoc.2019.01.001Google ScholarCross Ref
- Michela Cozza, Antonella Angeli, and Linda Tonolli. 2017. Ubiquitous Technologies for Older People. Personal Ubiquitous Comput. 21, 3 (jun 2017), 607–619. https://doi.org/10.1007/s00779-017-1003-7Google ScholarDigital Library
- Adrian Friday and Jakob Bardram. 2009. Ubiquitous Computing Systems. 37–94. https://doi.org/10.1201/9781420093612.ch2Google ScholarCross Ref
- Chandan Gautam, Abhishek Patil, Akanksha Podutwar, Maitreyee Agarwal, Pranali Patil, and Apurva Naik. 2022. Wearable Women Safety Device. In 2022 IEEE Industrial Electronics and Applications Conference (IEACon). 214–217. https://doi.org/10.1109/IEACon55029.2022.9951850Google ScholarCross Ref
- Prachi Gupta, Yashika Goyal, Divita Gulati, Palak Rastogi, and Shagun Saboo. 2021. Women’s Safety Device Based On Internet Of Things. In 2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC). 1–6. https://doi.org/10.1109/ICMNWC52512.2021.9688529Google ScholarCross Ref
- Md. Imtiaz Hanif, Shakil Ahmed, Wahiduzzaman Akanda, and Shohag Barman. 2020. Anti-Molestation: An IoT based Device for Women’s Self-Security System to Avoid Unlawful Activities. International Journal of Advanced Computer Science and Applications 11, 11 (2020). https://doi.org/10.14569/IJACSA.2020.0111188Google ScholarCross Ref
- G C Harikiran, Karthik Menasinkai, and Suhas Shirol. 2016. Smart security solution for women based on Internet Of Things(IOT). In 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT). 3551–3554. https://doi.org/10.1109/ICEEOT.2016.7755365Google ScholarCross Ref
- V. Hyndavi, N. Sai Nikhita, and S. Rakesh. 2020. Smart Wearable Device for Women Safety Using IoT. In 2020 5th International Conference on Communication and Electronics Systems (ICCES). 459–463. https://doi.org/10.1109/ICCES48766.2020.9138047Google ScholarCross Ref
- Muhammad Nazrul Islam, Nuzhat Tabassum Promi, Jannatul Maowa Shaila, Mohoshina Akter Toma, Maria Afnan Pushpo, Fatema Binte Alam, Syeda Nusraht Khaledur, Tasmiah Tamzid Anannya, and Md. Fazle Rabbi. 2018. SafeBand: A Wearable Device for the Safety of Women in Bangladesh. In Proceedings of the 16th International Conference on Advances in Mobile Computing and Multimedia (Yogyakarta, Indonesia) (MoMM2018). Association for Computing Machinery, New York, NY, USA, 76–83. https://doi.org/10.1145/3282353.3282363Google ScholarDigital Library
- Mirjami Jutila, Esko Strömmer, Mari Ervasti, Mika Hillukkala, Pekka Karhula, and Juhani Laitakari. 2015. Safety services for children: a wearable sensor vest with wireless charging. Personal and Ubiquitous Computing 19 (02 2015). https://doi.org/10.1007/s00779-015-0838-zGoogle ScholarCross Ref
- Naga K, Rupa Ch, Venkata P, and Lokesh Ch. 2022. PAW Patrol: IoT based Smart Wearable Device for Protection Against Violence on Pedophile, Alzheimer’s, Women. 1416–1421. https://doi.org/10.1109/ICICCS53718.2022.9788333Google ScholarCross Ref
- V. Mareeswari and Sunita S. Patil. 2018. Smart Device for Ensuring Women Safety Using Android App. In Advanced Computational and Communication Paradigms, Siddhartha Bhattacharyya, Tapan Gandhi, Kalpana Sharma, and Paramartha Dutta (Eds.). Springer Singapore, Singapore, 186–197. https://doi.org/10.1007/978-981-10-8240-5_21Google ScholarCross Ref
- Syeda Ramisa Masum, Sayed Hasan Salim, Zubair Hussain, Faria Soroni, Talat Mahmud, and Mohammad Monirujjaman Khan. 2021. ‘BACHAO’ A One Click Personal Safety Device. In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). 1–4. https://doi.org/10.1109/ICCCNT51525.2021.9579726Google ScholarCross Ref
- Aleksandr Ometov, Viktoriia Shubina, Lucie Klus, Justyna Skibińska, Salwa Saafi, Pavel Pascacio, Laura Flueratoru, Darwin Quezada Gaibor, Nadezhda Chukhno, Olga Chukhno, Asad Ali, Asma Channa, Ekaterina Svertoka, Waleed Bin Qaim, Raúl Casanova-Marqués, Sylvia Holcer, Joaquín Torres-Sospedra, Sven Casteleyn, Giuseppe Ruggeri, Giuseppe Araniti, Radim Burget, Jiri Hosek, and Elena Simona Lohan. 2021. A Survey on Wearable Technology: History, State-of-the-Art and Current Challenges. Computer Networks 193 (2021). https://doi.org/10.1016/j.comnet.2021.108074Google ScholarCross Ref
- World Health Organization. 2021. Violence against women prevalence estimates, 2018: global, regional and national prevalence estimates for intimate partner violence against women and global and regional prevalence estimates for non-partner sexual violence against women. Genebra.Google Scholar
- World Health Organization and Pan American Health Organization. 2012. Understanding and addressing violence against women: Overview. Technical Report. World Health Organization.Google Scholar
- World Health Organization and Pan American Health Organization. 2012. Understanding and addressing violence against women: Sexual Violence. Technical Report. World Health Organization.Google Scholar
- Shivam Pandey, Rahul Kumar Barik, Somya Gupta, and R. Arthi. 2021. Automatic Threat Sensing and Monitoring System for Woman Safety—RAKSHAK. In Advances in Power Systems and Energy Management, Neeraj Priyadarshi, Sanjeevikumar Padmanaban, Ranjan Kumar Ghadai, Amiya Ranjan Panda, and Ranjeeta Patel (Eds.). Springer Nature Singapore, Singapore, 179–187.Google Scholar
- Sungmee Park, Kyunghee Chung, and Sundaresan Jayaraman. 2014. Chapter 1.1 - Wearables: Fundamentals, Advancements, and a Roadmap for the Future. In Wearable Sensors, Edward Sazonov and Michael R. Neuman (Eds.). Academic Press, Oxford, 1–23. https://doi.org/10.1016/B978-0-12-418662-0.00001-5Google ScholarCross Ref
- Roberto Pereira and M. Cecilia Baranauskas. 2016. Visão Sistêmica e Socialmente Consciente para Sistemas de Informação.Google Scholar
- Roberto Pereira and M. Cecilia Baranauskas. 2017. Systemic and Socially Aware Perspective for Information Systems. 148–160. https://doi.org/10.5753/sbc.2884.0.12Google ScholarCross Ref
- S Priyanka, Shivashankar, K.P Roshini, S.Pooja Reddy, and K Rakesh. 2018. Design and implementation of SALVUS women safety device. In 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). 2438–2442. https://doi.org/10.1109/RTEICT42901.2018.9012442Google ScholarCross Ref
- A. Ranganadh. 2020. Women Safety Device with GPS Tracking and Alerts. 797–805. https://doi.org/10.1007/978-981-15-2256-7_74Google ScholarCross Ref
- N Saranya, R Aakash, K Aakash, and K Marimuthu. 2021. A Smart friendly IoT device for women safety with GSM and GPS location tracking. In 2021 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA). 409–414. https://doi.org/10.1109/ICECA52323.2021.9676087Google ScholarCross Ref
- Katia Romero Felizardo Scannavino, Elisa Yumi Nakagawa, Sandra Camargo Pinto Ferraz Fabbri, and Fabiano Cutigi Ferrari. 2017. Revisão Sistemática da Literatura em Engenharia de Software: teoria e prática. Elsevier.Google Scholar
- Jorge Luis Victoria Barbosa. 2015. Ubiquitous computing: Applications and research opportunities. In 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). 1–8. https://doi.org/10.1109/ICCIC.2015.7435625Google ScholarCross Ref
- Roy Want. 2009. An Introduction to Ubiquitous Computing. 1–35. https://doi.org/10.1201/9781420093612.ch1Google ScholarCross Ref
- Mark Weiser. 1999. The Computer for the 21st Century. SIGMOBILE Mob. Comput. Commun. Rev. 3, 3 (jul 1999), 3–11. https://doi.org/10.1145/329124.329126Google ScholarDigital Library
- Deborah White and Lesley McMillan. 2020. Innovating the Problem Away? A Critical Study of Anti-Rape Technologies. Violence Against Women 26, 10 (2020), 1120–1140. https://doi.org/10.1177/1077801219856115 arXiv:https://doi.org/10.1177/1077801219856115PMID: 31327309.Google ScholarCross Ref
- Sumit Yadav, Kavita Sharma, and Ananya Gupta. 2021. SafeWomen: A Smart Device to Secure Women’s Environment Using ATmega328 With an Android Tracking App. International Journal of Digital Crime and Forensics 13 (01 2021), 48–64. https://doi.org/10.4018/IJDCF.2021010103Google ScholarCross Ref
Index Terms
- The use of wearables to prevent sexual violence: a systematic mapping study
Recommendations
Image-based sexual abuse: Victim-perpetrator overlap and risk-related correlates of coerced sexting, non-consensual dissemination of intimate images, and cyberflashing
AbstractThe advent of technology has dramatically changed the way sexual violence is perpetrated and experienced. Understanding the context of image-based sexual abuse (IBSA) and risk factors associated with perpetration are key to effective prevention ...
Highlights- There is considerable victim-perpetrator overlap across all three forms of IBSA, especially cyberflashing.
- IBSA victim-perpetrators tend to score higher on risk factors associated with traditional forms of sexual offending.
- Drug ...
Comments