2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops 2015
DOI: 10.1109/waina.2015.97
|View full text |Cite
|
Sign up to set email alerts
|

A Usable and Secure Crime Reporting System for Technology Resource Constrained Context

Abstract: Crime in technology resource constrained environments has been shown to adversely affect economic growth by deterring investment and triggering emigration. To address this secure reporting channels are being investigated to encouraging anonymous crime reporting. In this paper, we present a system (CryHelp App) developed to enable residents of a university community situated in technology resource constrained environment to facilitate secure and covert crime reporting. We focus primarily on the usability of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0
1

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 9 publications
(10 reference statements)
0
11
0
1
Order By: Relevance
“…There are two primary requirements for an online crime reporting system: Informers must provide their real identities, and their identities must be well protected. With these requirements in mind, several online crime reporting systems have been proposed for different applications in recent years [1,2,6,7]. In order to ensure that the informer's identity is protected during reporting, anonymity can effectively protect victims and witnesses; however, the security mechanisms involved in identity verification and data transmission are important issues to be addressed.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…There are two primary requirements for an online crime reporting system: Informers must provide their real identities, and their identities must be well protected. With these requirements in mind, several online crime reporting systems have been proposed for different applications in recent years [1,2,6,7]. In order to ensure that the informer's identity is protected during reporting, anonymity can effectively protect victims and witnesses; however, the security mechanisms involved in identity verification and data transmission are important issues to be addressed.…”
Section: Introductionmentioning
confidence: 99%
“…Many online reporting systems have been proposed to date, and research into such systems has provided several requirements for such systems [6,[15][16][17][18]. For example: trusted third-parties are used to verify legitimate informer identities using digital certificate technology to prevent abuse of the system by impostor attacks [15,16]; authentication mechanisms are crucial to such systems [19][20][21].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A study [1] carried out in technologically resource-constrained environments has revealed that collected crime data are usually not studied or analysed to support crime resolution. A possible reason for this is the lack of the necessary in-house expertise, both in terms of human capital and computational processing power [15,5,25]. This deprives policy makers in these regions of the benefits that could have been derived through data analytics.…”
Section: Introductionmentioning
confidence: 99%
“…It should be noted that the high-tech crime forecasting resulting from the need of ensuring safety, as well as the simulation and modeling of crime risk development and the probability of events, requires careful monitoring and obtaining information about new technological solutions according to the developed and implemented models [8].…”
Section: Introductionmentioning
confidence: 99%