3.1. Categories of scenario for child crimes

The following scenario was written based on crime categorization of Table 9 and was used to support reasons for necessary device features.


**Table 9.** Setting up four categories

170 Child Abuse and Neglect – A Multidimensional Approach

for their children's age-specific cognition levels.

2.5. Summary

device.

Crime.

party.

Sung Univ.

near routing of children.

characterized by prevention prior to a crime.

3. Design concept of device for preventing child crime

suggesting guidelines needed for a device from the extracted factors.

The users have a need for normalization and avoiding admitting that they are special<sup>3</sup>. Thus, mobile phones for kids that are currently available have very small LCDs or none at all; nevertheless, designs for both specified-key mode and 10-key mode would be viable by parents setting up the key-type screens based on the Full Touch Technology and adjusted

• Children aged 7 to 11 experience concrete operational stage as mentioned by Piaget with regard to characteristics of children who can deal with simplified manipulation and logical inference, which suggests that children have no problem manipulating a

• With regard to characteristics of crimes against children, a perpetrator commits a crime if three conditions, crime will, victim, and crime scene are met and the crime goes through the stages Approaching→ Luring and Kidnapping →Movement→ Committing

• Cases where victim's house, commit place, lure place, victim's school, and perpetrator's house are located within 2 km account for 50% or more; therefore, crimes are committed

• As it is deemed impossible for children to protect themselves due to physical differences between the child and perpetrator, it is perceived that intervention by a third party is essential and many thoughts have been given to intervention by a third

• There are various methods to prevent crimes, which are divided into individual and social means. Individual means are preventive measures to protect oneself and family from many and unspecified perpetrators; however, few methods have been found to enable children to protect themselves. On the other hand, social means are related to excons and are characterized by prevention after the fact; therefore, they are less often

According to an inquiry into preventive technologies, many useful technologies and functions have been found with mobile phones and include such diversified technologies as LBS and SOS functions. However, they may have problems because children are unable to perceive situations where they are exposed to crimes or there are difficulties in helping them directly or indirectly when they ask for help even thought they have perceived a crime.

As the study aims to prevent crimes, it is focused on suggesting the direction of design so that children can be protected from a crime through a device one way or another. Accordingly, it has designated a scenario to extract factors according to situations while

<sup>3</sup> Shin Ah Jo, 'Research on Designing Customized Menu for Users in Mobile Phone', Dept. of Digital Design, Kyung

This scenario was established based on a previous research and has the following conditions. It has been sub-divided into the following crime stages: crime prerequisite → approaching → luring and kidnapping → movement → committing crime before suggestion.

First, perpetrators are divided into ex-cons and first offenders and this scenario is related to the application of electric tagging. Some criminals attempt to commit a crime after removing electronic tagging; these are regarded as first offenders. These criminals are divided into luring and kidnapping and luring refers to as a situation where a child is unable to be exposed to a crime; kidnapping refers to as a circumstance where a child perceives that he or she is in danger.

Category 1 : Without Electronic Tagging and Luring

Category 1 of Table 10 describes the role of mobile phone for each phase under the premises that a 40-year-old man with less than two previous convictions targets a 12-year-old female victim.


**Table 10.** Category 1: Criminal without Electronic Tagging and Luring

The worst case is Category 1 because the perpetrator can hide intention and the child may never recognize the danger until right before the crime. In such a case, parents can be informed about abnormal activity of their child such as different routine pattern or sudden acceleration of speed and detect changes in mode of transportation; they can also confirm

the situation of their child. In many cases, the child does not recognize danger until right before a crime, thus, active involvement of third party is necessary.

Interaction Design for Preventing Child Abuse 173

(threatening) Movement Commit a

Recognize Recognize Recognize

Emergency button / Alarm/ Lighting

crime

Emergency button / Alarm/ Lighting

The signal received from the Electronic Tagging transmits a warning message, such as "exposed to possible threat," to the child's guardian so they can determine whether their child is exposed to the actual threat or not. Additionally, if the guardian believes there is an actual threat, they can remotely sound the alarm on the child's mobile phone regardless of

Category 4, as seen in Table 13, is criminal wearing Electronic Tagging and kidnapping a child by threatening. In such a case, the child recognizes a danger and may take immediate action to notify a third party by pressing the emergency button. Even if the child fails to press button, he or she still can get help because the guardians are being notified by signals

Category 4 Setting Phase 1 Phase 2 Phase 3 Phase 4

Does not recognize/ wariness

receives signals from Electronic Tagging, transmits warning message to guardians

**Table 13.** Category 4: Criminal with Electronic Tagging and Kidnapping

it is necessary to be able to communicate with parents or a guard.

protector. The following figure provides a detailed explanation.

Approaching Kidnapping

Although it was impossible to consider every circumstance, this chapter has discussed the most common circumstances to conduct a study on children's perceptions of crimes and devices that can be helpful in such situations. This discussion has led to the understanding that devices require the LBS function to locate a child, a child's action radius and progress needed to be recorded and designated and a remotely controlled camera and microphone are required to help a protector judge the situation. It has also helped better understand that

Research was conducted to determine how devices sense abnormal movement by situation and how to deliver the information to a third party via logical operational device systems.

For the purpose of the operational system, routing, the rate of movement and location of a child, needs to be collected as data in advance for a certain period to be patternized. If the patternization is completed, the movement deviating from it, which is abnormal speed or change in rout, is considered abnormal movement of a child and is primarily reported to a

check with guardian's remote camera, sound the emergency alarm, report to the police

the child's will.

Perpetrator

Victim

Function of mobile phone

Category 4 : With Electronic Tagging and Kidnapping

from Electronic Tagging device.

40 year old, more than one previous conviction

6-12 year old girl / Apartment entrance

Detecting any abnormal activities (route, speed, etc.)

3.2. Model for device system

Category 2 : Without Electronic Tagging and Kidnapping

Category 2, seen in Table 11, shows a case of threatening and forcible kidnapping by a criminal with a similar previous conviction. Here, the child does not recognize danger until the criminal approaches; however, is aware of that the situation is threatening


**Table 11.** Category 2: Criminal without Electronic Tagging and Kidnapping

While the mobile phone detects routine pattern and speed, it can also alert a nearby third party by sounding an alarm or informing the child's parents and police when he or she presses the emergency button. However, when the child is being kidnapped forcibly or too nervous to control the device, the mobile phone's secondary function activates through LBS and informs guardians of abnormal activities.

#### Category 3 : With Electronic Tagging and Luring

Category 3, seen in Table 12, shows crimes committed by 40-year-old man with more than one previous conviction, wearing Electronic Tagging. Proposed mobile phone receives signals from Electronic Tagging; however, does not inform the child to avoid the human rights violation of the ex-convict.


**Table 12.** Category 3: Criminal with Electronic Tagging and Luring

The signal received from the Electronic Tagging transmits a warning message, such as "exposed to possible threat," to the child's guardian so they can determine whether their child is exposed to the actual threat or not. Additionally, if the guardian believes there is an actual threat, they can remotely sound the alarm on the child's mobile phone regardless of the child's will.

### Category 4 : With Electronic Tagging and Kidnapping

172 Child Abuse and Neglect – A Multidimensional Approach

Perpetrator 40 year old, less than two

Victim 6-12 year old girl /

Function of mobile phone

Perpetrator

Victim

Function of mobile phone

playground

Detecting any abnormal activities (route, speed, etc.)

and informs guardians of abnormal activities. Category 3 : With Electronic Tagging and Luring

rights violation of the ex-convict.

40 year old, more than one previous conviction

6-12 year old girl / road

Detecting any abnormal activities (route, speed, etc.)

Category 2 : Without Electronic Tagging and Kidnapping

the situation of their child. In many cases, the child does not recognize danger until right

Category 2, seen in Table 11, shows a case of threatening and forcible kidnapping by a criminal with a similar previous conviction. Here, the child does not recognize danger until

Category 2 Setting Phase 1 Phase 2 Phase 3 Phase 4

Does not recognize/ wariness


While the mobile phone detects routine pattern and speed, it can also alert a nearby third party by sounding an alarm or informing the child's parents and police when he or she presses the emergency button. However, when the child is being kidnapped forcibly or too nervous to control the device, the mobile phone's secondary function activates through LBS

Category 3, seen in Table 12, shows crimes committed by 40-year-old man with more than one previous conviction, wearing Electronic Tagging. Proposed mobile phone receives signals from Electronic Tagging; however, does not inform the child to avoid the human

Category 3 Setting Phase 1 Phase 2 Phase 3 Phase 4

Does not recognize/ wariness

receives signals from Electronic Tagging, transmits warning message to guardians

**Table 12.** Category 3: Criminal with Electronic Tagging and Luring

(threatening) Movement Commit a

danger

Emergency button / Alarm/ lighting

Recognize Recognize

Approaching Luring Movement Commit a

check with guardian's remote camera, sound the emergency alarm, report to the police

Does not recognize Does not

recognize

Emergency button / Alarm/ Lighting

Emergency button / Alarm/ lighting

crime

Recognize danger

Emergency button / Alarm/ lighting

crime

Does not recognize

Emergency button / Alarm/ Lighting

before a crime, thus, active involvement of third party is necessary.

the criminal approaches; however, is aware of that the situation is threatening

previous convictions Approaching Kidnapping

**Table 11.** Category 2: Criminal without Electronic Tagging and Kidnapping

Category 4, as seen in Table 13, is criminal wearing Electronic Tagging and kidnapping a child by threatening. In such a case, the child recognizes a danger and may take immediate action to notify a third party by pressing the emergency button. Even if the child fails to press button, he or she still can get help because the guardians are being notified by signals from Electronic Tagging device.


**Table 13.** Category 4: Criminal with Electronic Tagging and Kidnapping

Although it was impossible to consider every circumstance, this chapter has discussed the most common circumstances to conduct a study on children's perceptions of crimes and devices that can be helpful in such situations. This discussion has led to the understanding that devices require the LBS function to locate a child, a child's action radius and progress needed to be recorded and designated and a remotely controlled camera and microphone are required to help a protector judge the situation. It has also helped better understand that it is necessary to be able to communicate with parents or a guard.

## 3.2. Model for device system

Research was conducted to determine how devices sense abnormal movement by situation and how to deliver the information to a third party via logical operational device systems.

For the purpose of the operational system, routing, the rate of movement and location of a child, needs to be collected as data in advance for a certain period to be patternized. If the patternization is completed, the movement deviating from it, which is abnormal speed or change in rout, is considered abnormal movement of a child and is primarily reported to a protector. The following figure provides a detailed explanation.

As seen in Figure 5, a model for device function has been proposed based on the analysis of the above stated categories.

Interaction Design for Preventing Child Abuse 175

**Figure 7.** Role of guardians through understanding the situation

**Figure 8.** Model showing how children can report.

button.

Fig. 8 shows how a system can automatically be activated and reported to the police when the device is damaged, the battery is forcibly removed, or the child presses the emergency

Findings suggest that a government agency (the police or a private company), a protector, and a child need to be linked to one another for cooperation when equipped with the system above as the device acts as a link. From examining products with similar or available functions among those on the market, smart phones are the technologies that best meet these requirements. However, given children aged 6 to 12 and such peripheral functions as

**Figure 5.** Model showing function of child protection device

**Figure 6.** Model showing function of device when abnormal activities are detected

Based on the model illustrated on Fig. 5, Fig. 6 explains how a device for kids uses data on a child's routine pattern, moving speed, and signal from the Electronic Tagging and transmits information to a child's guardian when it detects abnormal activities

Fig. 7 shows how parents can explain to a child how to act through texting or calling based on the level of the threat. If a serious threat is determined, parents can sound the alarm and notify people nearby or contact a preregistered 911(US), 119(Korea), 112(Korea), or security company.

**Figure 7.** Role of guardians through understanding the situation

**Figure 5.** Model showing function of child protection device

**Figure 6.** Model showing function of device when abnormal activities are detected

information to a child's guardian when it detects abnormal activities

company.

Based on the model illustrated on Fig. 5, Fig. 6 explains how a device for kids uses data on a child's routine pattern, moving speed, and signal from the Electronic Tagging and transmits

Fig. 7 shows how parents can explain to a child how to act through texting or calling based on the level of the threat. If a serious threat is determined, parents can sound the alarm and notify people nearby or contact a preregistered 911(US), 119(Korea), 112(Korea), or security

the above stated categories.

As seen in Figure 5, a model for device function has been proposed based on the analysis of

Fig. 8 shows how a system can automatically be activated and reported to the police when the device is damaged, the battery is forcibly removed, or the child presses the emergency button.

**Figure 8.** Model showing how children can report.

Findings suggest that a government agency (the police or a private company), a protector, and a child need to be linked to one another for cooperation when equipped with the system above as the device acts as a link. From examining products with similar or available functions among those on the market, smart phones are the technologies that best meet these requirements. However, given children aged 6 to 12 and such peripheral functions as an emergency button, it is difficult to apply existing smart phones as they are, and guidelines are deemed necessary for developing beneficial devices.

Interaction Design for Preventing Child Abuse 177

and number button (includes emergency button)

Number and size of buttons should be designed while carefully examining ability of 6-9 year old child's operational skill. Uses numeric keys and should be limited with call, end, select menu, and number button (includes emergency button)

two hand operation separately

frequently used buttons

Should be differentiated with general button and minimize unintended operation

minimize unintended operation, but should not hide it

Specified key type makes for easy operation for a child under the age of 9. However, cannot make calls to many people

rapidness and is easy to operate for a child over age of 9

Can use specified key in addition to keypad to supplement weakness of 10-key type

and different operational strategies

Change of chrome can visually alert people to cognize threat

Separate button can activate emergency button. It is easy to locate but has high risk of malfunctioning and is easily exposed to criminals

Projected type looks as if part of a mobile phone but activates when broken. Once it is broken, it is hard to restore. It is not easily exposed to criminals and may be hard for a child to break under certain circumstances

Has a strap with hook. The hook may lead into malfunctioning; however, it has the advantage that a child can operate quickly compares to a button in any case

Child can inform guardians of his/her location when it is hard to make phone call or cognize great danger (unlike emergency button, it is used with general button and transmits signal with special operational method in emergency)

> -During night time phone calls -Notifying self location through flickering -Used as lantern in dark areas

Main body has integrated battery and powering off should not be easy

Sound Speaker Informs a child what he/she should do through sound siren Ask for help through sound

buttons - Size and shape of buttons should consider one hand and

of buttons - General and emergency buttons should be separated to

color -

General Should have convex design for easy operation of

10 key Able to make phone calls to many people, but losses

Track me Unlike emergency button or strap, it has general button


emergency

Hot key

Emergency key or strap

Achromatic

Low /high chroma

Button type

Projected type

(integrated)

buttons - -

Size of

Shape of buttons

Arrangement

Type of buttons

Color of buttons

Text of

Emergency buttons

Emergency strap

Track me button

Battery Battery cover Enclosed type

Lighting Lamp

Emergency function

Emergency function
