Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

CHAPTER I A.

STATEMENT OF THE STUDY

THE PROBLEM AND ITS The purpose of the study is to design


BACKGROUND and develop a mobile application
that will automatically send help to
INTRODUCTION the registered emergency contacts
and aims to solve the following
In today’s world, women safety has become problems:
a major issue in our country as women can’t
step out of their house at any time, 1. How the application does help the
especially during night. It is primarily due to client from emergency?
fear of violence against them or being 2. How will the system know about
physically or sexually abused. The fear of the current location of the person?
harassment against women is not only the 3. Is the application can be easily
condition at outside but it may also happen access in case of current emergency
at homes. The technology is rapidly growing event?
and new gadgets are being developed but 4. How does the system seeks help to
still women are facing their problem. We nearby people?
know that our society is all aware of 5. Does the police be able to get into
importance of women safety, but it’s also act upon receiving the emergency?
the duty of individual that they should be 6. What other emergency can they be
properly protected. Women are not able to report?
physically fit as compared to men so incase
they need a help it would be a boon for B.OBJECTIVE OF THE STUDY
them. women in all aspects. The crimes
against women are increasing at a higher The main purposes of the study is to
rate. The employed women are feeling develop an application that can help
unsafe due to increasing crimes. This not just women to seek an immediate
proposes a quick responding mechanism that help from the police, registered
helps women during trouble. When someone emergency contacts and nearby
is going to harass, she can long press the people when they feel that they are
button and the location information is sent in danger.These are the specific
as an SMS alert to few pre-defined objectives:
emergency numbers in terms of latitude and
longitude., it activates the speech circuit to 1. To develop a well-functional and
capture the attention of the people nearby to organized application.
for help. The program is developed in 2. To provide ease and comfort to
embedded language to demonstrate the users by having a direct contact
system capability in providing real time to the police and their trusted
response. Thus the girl can be safe and she reliable people.
can feel protected.
3. To provide an accurate location The input are from external
of the users with stamp of date environment that is fed to the
and time . system.It maybe raw the data
4. Includes other emergency and captured which has been provided by
crime report. the beneficiary where you conduct
5. Includes the hotline of the your study while process accepts the
emergency contacts such as inputs into the system and perform
BFP,ambulance,police,etc.. operation on it which will result to
the output of the processed input.
C . SIGNIFICANCE OF THEE
STUDY F . DEFINITION OF TERMS
The significance of the study will
benefit the people in the Cagayan
and the government which lessen the CHAPTER II
time reaction in cases of
emergencyand crimes being reported REVIEW OF RELATED
through android application internet LITERATURE AND STUDIES
and GPS.

D. SCOPE AND LIMITATION Maznah Kamat, Anazida Zainal &


Rashidah Kadir (2003) conducted
The system is only limited to the a research and development
design development,testing and regarding the emergency handling
implementation of the application for system. They developed the system
Women protection in Tuguegarao call emergency handling system
City. The app will need an internet (EHS), they applied location based
and open GPS location in order for technologies to this system, in order
them to send a report.In actual event, to detect the caller or the user
the system included a special gesture location and connect to a database
for automatic report when the user is server. This kind of system they
on the run.Users outside the scope enable user to send a emergency
place cannot report or use the app message to a police station, rescue
since it was only build with their team, hospital etc. The receiver will
government emergency contact check and ensure the location when
within. they login in to the system portal and
check the message of the sender to
E.CONCEPTUAL estimate the location.
FRAMEWORK
Jethro, Ritz & Engr (2014)
conducted a research or a
development regarding the mobile and append with the message
emergency response technology by together and send it to the user
using geolocation. They develop a family and friend, the user can stop
mobile application can RescueMe, application continue sending
which using this technologic and the message by using the personal
mobile application will work password.
together with the web application
command center. The command Brad Ford (2000)
center will read the user information people who had experienced child
when the user request certain abuse are more depressed alcohol
emergency unit. The application will abuse and dating
have three type of emergency unit, stress. In the survey by Campbell
for example ambulance, police and harassmen,t survivors were
fire truck. After the command center interviewed
get the user information from the about social reaction and family and
mobile application, the command friends support post-harassment. The
center will immediately plot the support from
information on google map . society and friends are negligible.
Instead of giving care and help
Kalyanchakravarthy, Lakshmi, regarding physically
Rupavathi & Lakshmankumar and mentally, they (society and
(2014) conducted a research and friends) lead them into misery by
development about safety triggering giving negative
system. They develop an android complaints and blaming. The survey
based safety triggering mobile concludes that the support from
application, the main purpose of society as well as
them to create this apps is woman’s the friend and family did not
safety, to provide a quick react when adequate.
the user are in emergency situation.
This application will operate when Ceccato, V., D.J. Wiebe, B.
the user press the power button of Eshraghi, and K. Vrotsou.
the phone, after pressed the power 2017 A third of all rapes in
button, the phone will popup an alert Stockholm, the capital of Sweden,
screen and the screen will show user take place in public outdoor places.
a button, when the pressed the Yet, little is known about the events
triggering button to active the apps that precede this type of sexual
and the apps will starting perform the offence and less about the
emergency function at the situational context of rape. This
background. The application will study aims to improve the
understanding of the nature of
detect the current location of the user
situational conditions that
immediately precede events of rape. connections between the learning
Using medical records of 147 rape objectives of a multi-part assignment and
victims during 2012 and 2013, we issues of citizenship, inclusivity, and
constructed time- and place-specific equity.
records of the places women
traveled through or spent time at, the Madan, M., and M. Nalla.
activities they engaged in, and the 2015. In this article, we examine the
people they interacted with
situational conditions of female
sequentially over the course of the
sexual victimization in public spaces.
day when they were raped. The
Using survey questionnaire
analysis uses visualization tools
methodology, we explore gender
(VISUAL-TimePAcTS),
differences in perceptions of the
Geographical Information Systems,
occurrence and location of sexual
and conditional logistic regression to
harassment in public spaces as well
identify place-, context-, and social
as the extent to which such
interaction–related factors
behaviors are considered serious.
associated with the onset of rape.
The study’s methodology relies on
Results for this sample of cases
using multistage cluster and quota
reported to hospitals show that being
sampling technique, where we
outdoors was not necessarily riskier
interviewed nearly 1,387
for women when compared with
respondents (both men and women)
indoor public settings; some outdoor
from the capital city of India, New
environments were actually
Delhi. This study finds an overall
protective, such as streets. Being in
congruence between perceived
a risky social context and engaging
likelihood of female sexual
in a risky activity before the event
harassment victimization and actual
was associated with an increased
self-reported victimization in most
risk of rape, and the risk escalated
public transportation modes, but
over the day. Among those women
there is a significant gap between
who never drank alcohol, the results
these two indicators for occurrences
were similar to what was observed in
that take place in certain
the overall sample, which suggests
transportation modes, such as taxis
that risky social interaction and risky
and auto-rickshaws. There are
activity made independent
statistically significant gender
contributions to the risk of rape. The
differences in the seriousness
article finishes with suggestions for
ratings of various behaviors that
rape prevention.
constitute sexual harassment to
women. Policy implications include
Keddy, K. 2015. The focus of this adoption of a zero-tolerance policy
paper is to present a method of teaching toward any form of sexual
architecture students how to learn from harassment in public spaces.
conducting a socio-spatial analysis in
order to design a safe and secure built
environment. This paper illustrates the
Sokoloff, N.J., and I. Dupont. The following information will
2005. This article provides a
comprehensive review of the
help you and the survivor think
emerging domestic violence through how to narrow down
literature using a race, class, technology misuse by the abuser so
gender, sexual orientation
intersectional analysis and structural you can properly safety plan. The
framework fostered by women of questions are only meant to quickly
color and their allies to understand
the experiences and contexts of
assess what might be an issue and
domestic violence for marginalized is not meant to be an exhaustive list
women in U.S. society. The first half of all technology‐related safety
of the article lays out a series of
challenges that an intersectional concerns a survivor might face.
analysis grounded in a structural Advocates should follow up with a
framework provides for
understanding the role of culture in
more thorough conversation about
domestic violence. The second half the survivor’s specific concerns and
of the article points to major discuss strategies to increase safety,
contributions of such an approach to
feminist methods and practices in document incidents, and get
working with battered women on the additional help. Keep in mind that
margins of society.
survivors often attend support
groups with little direct and
ongoing interaction with advocates,
Technology Safety (2014a) The so consider incorporating this
safety and privacy of survivors is information as a support group
often compromised by abusers who topic as well.
misuse technology, as well as the
ways that the survivor’s personal Technology Safety (2014b) There are

information is shared. As many smartphone and tablet


advocates, it is imperative that we applications (apps) available that
take the time to educate ourselves attempt to address the issues of
domestic violence, sexual assault,
and our clients about the various
and stalking. Some of these apps
ways stalking, tracking, and
offer general information to raise
monitoring through technology
awareness, some provide screening
happens.
tools to help identify whether abuse
is occurring and provide resources
A. The Development Approach
for help, and others are personal
safety tools to inform others if you
are in danger and need assistance.
Your phones and devices, and the
apps on them, offer many
B. Locale of the Study
opportunities for increasing access
to information, resources, and
assistance. However, how you use C. RESEARCH INSTRUMENT

your devices and the information This research are the tools and
that's accessed or stored on them instruments that we used to gather
and obtain data.
can create safety and privacy risks.
Survivors often need to take into
account their safety and privacy
when communicating and
accessing information; this is true
when determining which app to
download and use.
V. Mareeswari, Sunita S. Patil in Advanced
Computational and Communication
Paradigms (2018)

CHAPTER III

RESEARCH DESIGN AND


METHODOLOGY

This chapter presented the research


design and methodology utilized in
the research.

You might also like